0% found this document useful (0 votes)
3 views

ICT Andethics Notes-1

The document provides an introduction to Information and Communication Technology (ICT), defining its components and functions, including communication, data management, marketing, and process improvement. It discusses the positive and negative effects of ICT on contemporary society, such as improved access to information and job loss due to automation. Additionally, it covers computer studies, including definitions, classifications, and the historical development of computers, highlighting their applications in various sectors like supermarkets, offices, and banks.

Uploaded by

oduori313
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

ICT Andethics Notes-1

The document provides an introduction to Information and Communication Technology (ICT), defining its components and functions, including communication, data management, marketing, and process improvement. It discusses the positive and negative effects of ICT on contemporary society, such as improved access to information and job loss due to automation. Additionally, it covers computer studies, including definitions, classifications, and the historical development of computers, highlighting their applications in various sectors like supermarkets, offices, and banks.

Uploaded by

oduori313
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 103

1

CHAPTER ONE
INTRODUCTION TO ICT
DEFINITION OF ICT
ICT is the infrastructure and components that enable modern computing

ICT refers to all communication technologies that enable the users to access, retrieve, store,
transmit and manipulate information in a digital form

ICT include all media that record information, technologies that broadcast information and
technologies that enable people communicate via audio or video
FUNCTIONS OF ICT
The Function of Communication: ICT allows organizations to achieve communication at
very high speeds through multiple channels:
Email: You can easily send your employees an email when you need to communicate
something without having to see them in person..
Video Conferencing: Video conferencing is a great way to communicate with a faraway team
and being able to see them at the same time. It’s easier to have remote meetings and even
collaborate on a project together. With video conferencing, you might as well be in the same
room.
Social Media: Social media not only allows your employees to keep up to date with the latest
industry information but also presents a fun way to wind down and socialize.

The Function of Data Management: ICT Store Data by putting the data in a storable
format, a database allows you to store vast amounts of data in a small space. ICT also
provides the tools with which this data can be managed, including analyzing it and drawing
conclusions from it.
ICT provides the security measures that will safeguard data and prevent
unauthorized access to it.
The Function of Marketing: ICT department can help with the marketing functions of a
business in numerous ways:
Content Creation: You can create advertising and sales copy on a computer using word
processing software. You can also create beautiful graphical ads using powerful computers
with graphics capabilities.
Online Advertising: Social media is becoming increasingly important to advertising by
launching social media marketing campaigns, the IT department can improve sales and
increase revenue.

The Function of Process Improvement: ICT is quite important in the improvement of


processes and efficiency in order to save the company money
The Function of Enterprise Resource Planning: Enterprise resource planning is all about
linking the different functions of an organization, such as accounting, human resources,
manufacturing, and sales, using software systems. These systems can help in operations as
well as strategic decision making.
EFFECTS OF ICT IN THE CONTEMPORARY SOCIETY
Positive effects of ICT
Prepared by Patrick Page 1 of 103
2

Quick and Easy access to information: The major benefit of ICT on people is the
increased access to services, and information that has accompanied in the progress of
the Internet.
Offer new tools, and new opportunities: it provides access to a wide range of new
tools that have not existed before. ICT provides highly innovative set of tools and
processes in areas of photography. Use of photo-editing software, high quality
printers, and digital cameras enables people to yield impressive outcome.
Enhances operation of organizations: Organizations that have implemented ICT
ensures good communication. This implies that they can quickly and easily respond
to changes.
Information management: Organizations greatly benefit from ICT for management
of their information.
Enhanced Security: ICT improves security of the data.

Negative impact of ICT


Loss of Job: A major negative effect of ICT is seen in the form of job loss. This
technology is capable of automating commonly used operations in an organization so
that humans are no more required for performing those tasks.
Reduced personal interaction: Work from home that is considered as a benefit of
ICT also has negative impact on a person. A person loses touch with people due to
reduced social interaction. This makes him/her feel unhappy, and isolated.
Reduced physical activity: As most of the operation have now become automated,
and are done by machines, the life of people is becoming more and more sedentary.
This lack of physical activity gives rise to health issues such as obesity, diabetes,
heart disease etc.
Expensive: Cost of implementation and use of ICT is high. This technology requires
installation of several specialized software, and hardware that are expensive to buy
and upkeep. It requires a specialist, and dedicated staff to operate equipment that
work on ICT technology.
Need for heightened Security: As with ICT systems, data is stored at a centralized
place on the web, an organization should constantly monitor internet connections and
data for its safety from hackers, viruses, malware and other threats that are released
every day.

CHAPTER 2

INTRODUCTION TO COMPUTER STUDIES


Prepared by Patrick Page 2 of 103
3

What is a computer?
 A computer is an electronic device that works under the control of stored
Programmes (instructions), accepts raw data and processes it into information.
 Information production is a cycle of input, processing and output as shown in the
diagram below.

Input is a way entering/ keying Input Output


data in the computer. Output is a way of receiving
333333333333333333 information from the computer. It
can be either softcopy output or
hardcopy output

Process

Processing is the manipulation of


data to achieve certain objectives.
It may include calculations,
comparisons to produce desired
results.

Computer terminologies
1. Program-is a step by a step instruction which helps the computer to perform a given
task. It can also be referred to as software.
2. Data - These are raw or basic facts which are meaningless unless undergone
processing. It may include numbers, letters and symbols.
3. Information- is processed data which is meaningful. It also refers to summarized
data.

Parts of a computer
A computer is made up of a collection of different components that are inter-connected
together in order to function as a single entity.

Prepared by Patrick Page 3 of 103


4

i) System unit- This is the part that houses the brain of the computer called central
processing unit (CPU). It also houses other devices like: - Drives, Motherboard,
Power supply unit, Hard disk etc. Drives are used to store (write), record and read
data. There are two common types of system units namely: Tower system unit
and Desktop system unit.

Desktop system unit


Tower System unit

ii) Monitor/ Visual Display Unit (VDU)/ Screen- It is a television like device used
for displaying output. It is called the monitor because it enables the user to
monitor or see what is going on in the computer.
iii) Mouse- It is a device that enables the user to issue instruction in the computer by
controlling a special mouse pointer displayed on the screen. It is a pointing device
mainly used in Graphical User Interfaces (GUI).
iv) Keyboard- It is a device that enables the user to enter data and instruction in the
computer by pressing its keys.

NB: Devices connected together to the system unit using cables are called peripheral
devices. Examples of peripheral devices include: Mouse, Keyboard, Monitor, Scanner,
Speakers e.t.c.

Diagram of computer system

Prepared by Patrick Page 4 of 103


5

CLASSIFICATION OF COMPUTERS
Computers are classified according to:
1. Physical size and processing power
2. Purpose
3. Functionality

1. Classification according to physical size and processing power


Computers in this category can be classified into 4 main groups namely:
a) Super computers
b) Main frame computers
c) Mini computers
d) Micro computers

a) Super computers
 They are the fastest, largest, most expensive and power computers.
 They are mainly used in scientific research, simulation weapon analysis etc.

Prepared by Patrick Page 5 of 103


6

 Due to their extreme weight they are kept in a special room.


 Due to their high processing power they generate a lot of heat and therefore they
require special cooling system.
 They are mostly found in developed countries such as USA where they are used for
advanced scientific research such as nuclear physics.

b) Main frame computers


 They are less powerful and less expensive than super computers.
 Although super computers may be described as giant computers, the main frames are
said to be big in size.
 They are used for processing data and performing complex mathematical
calculations.
 They have a large storage capacity and can support a variety of peripherals.
 They are mostly found in government agencies, big organizations and companies
such as banks, hospitals, airports etc, which may have large information processing
needs.

c) Mini computers
 They are physically smaller and cheaper than main frame computers and they are
referred to as small – scale main frame computers.
 They support fewer peripheral devices than mainframes.
 They are less powerful and have less speed than main frame.
 They are used mainly in scientific laboratories, research institutions, engineering
plants and other places where processing automation is required.
 They are well adapted for functions such as accounting, word processing, database
management and specific industry application.

d) Micro computers
 They are the smallest, cheapest and less powerful than any other type of computer.
 They are called micro computers because their CPU is called a micro processor
which is very small compared to that of mini, main frame or super computers.

Prepared by Patrick Page 6 of 103


7

 Micro computers are also called Personal Computers (PC) because they are designed
to be used by one person at a time.
 They are mainly used for teaching and learning institutions, small businesses and
communication centres e.t.c.
 Technological advancement with time has seen the development of smaller micro
computers that have greater processing speed and power.

Types of micro computers


1. Desktop computers - they are not portable and they are designed to be placed on top
of an office desk.
2. Laptop computers - they are portable like a briefcase and they are designed to be
used by placing it on the lap hence, its name.
3. Palmtop computers - they are small enough to fit in the pocket and can be held in
the palm while being used e.g. Personal Digital Assistant (PDA).

2. Classification according to purpose


a) General purpose computers
b) Special purpose computers

a) General Purpose Computers


 They are the most common type of computers in use today.
 They are designed to be able to perform a variety of tasks when loaded with
appropriate programs.
 They can be applied in a wide range of applications such as document processing,
performing calculations, accounting, and data & information management.

b) Special Purpose Computers


 They are designed to perform a specific task.
 They cannot perform other tasks except the one they were meant to do.

Prepared by Patrick Page 7 of 103


8

 Since, they are dedicated to only a single task, they can perform it quickly and very
efficiently.
 Examples of such computers include robots, Mobile phones and electronic
calculators.

3. Classification according to Functionality


 This category classifies computers according to the type of data they process.
 Data can either be discrete or continuous (analog).
 Discrete data is data represented as distinct values which do not have transitional
stages over time. Discrete data is also known as digital data. Digital data is based on
two states i.e. “on” and “off”, or 1’s and 0’s.

A data signal represented using a two-state square waveform

 Analog data is data which is continuous that can be represented as progressively


changing over time.

Analog signal represented using a continuous waveform

 This classification has three types namely:


a) Digital computers
b) Analog computers
c) Hybrid computers

a) Digital Computers
 They process data which is discrete in nature.

Prepared by Patrick Page 8 of 103


9

 Any data to be manipulated by a digital computer must first be converted to digital


form.
 These types of computers are mainly used in scientific and industrial areas.
b) Analog Computers
 They process data which is continuous in nature.
 They are used in manufacturing process like monitoring and regulating furnace
temperatures, pressures etc. they are also used in weather stations to record and
process physical quantities like wind, cloud speed, temperature etc.

c) Hybrid Computers
 They are designed to process both analog and digital data.

DEVELOPMENT OF COMPUTERS
 The first computing machine was known as Abacus.
 It was used in ancient China and Japan thousands of years BC.
 It was made up of rectangular frame and a crossbar at the middle.
 In 17th Century, a Scottish Mathematician, John Napier developed a machine called
Napiers bones which helped in multiplication and division.
 An English mathematician called Charles Babbage developed a machine called
Analytical engine. This machine is regarded as the forerunner of the modern
computers and thus, Charles Babbage is referred to as the father of modern
computers.
 Charles Babbage died in 1871 and thereafter, there was little improvement on his
work until the 1930s.
NB: The Abacus, Napiers bones and the Analytical engine were all non-electronic tools
that would simplify arithmetic.
Representing numbers using an abacus

Prepared by Patrick Page 9 of 103


10

1st Generation computers (1940 - 1958)


 Very large in physical size.
 Used vacuum tubes or thermionic valves.
 Consumed a lot of power hence, the excessive heat generated caused their
breakdown.
 Examples of such computers are:
i) Electronic Numeric Integrator and Calculator (ENIAC)
ii) Electronic Discrete Variable Automatic Computer (EDVAC)
iii) IBM 650

2nd Generation computers (1958 - 1964)


 They operated using tiny, solid-state electronic devices called transistors.
 They produced less heat and consumed less power.
 They were faster, smaller in size and more reliable than 1st generation computers.
 Examples include: IBM 1401/7070, UNIVAC 1107(Universal Automatic Computer),
ATLAS LEO Mark III and Honeywell 200.

3rd Generation computers (1964 - 1970)


 They are used Integrated Circuits (IC). An integrated circuit consists of thousands
small transistors mounted on a semiconductor called a silicon chip.
 The use of ICs improved the processing speed and capacity of the computers.
 Examples include Smaller and less expensive mini computers such as IBM 360 and
ICL1900 series.

4th Generation computers (1970 – present)


 They used Large Scale Integrated (LSI) and Very Largfe Scale Integrated (VLSI)
circuits which was an improvement of silicon chip.

Prepared by Patrick Page 10 of 103


11

 These circuits were designed by compressing more tiny circuits and transistors into
even smaller space.
 The circuits were used for the development of the brain of the computer called the
micro processor which was used in micro computers.
 Then 1st micro computer was called Apple II.
 Examples include: IBM 370/ 4300, Honeywell DPS – 88, Burroughs.

5th Generation computers


 They are the today’s computers.
 They have very high processing power and speed.
 Their size is increasingly becoming smaller.
 They have special instruction set that allow them to support complex Programmes
that mimic human intelligence often referred to as Artificial Intelligence (AI).

CHAPTER 4
AREAS WHERE COMPUTER ARE USED / APPLICATION AREAS OF
COMPUTERS
1. Supermarkets
 Stock control where the stock control system keeps account of what is in the
store, what is to be sold and what is out of stock.
 Payment of bills
 Making and keeping accounting records
 Surveillance of shoppers

2. Offices
 Most modern offices functions have been automated for faster message distribution
and processing.

3. Banks
 Efficiency and speed has increased in banks due to better keeping and document
processing by computers.
Prepared by Patrick Page 11 of 103
12

 Special Cash Dispensing Machines called ATMs (Automatic Teller Machines) have
enabled automated cash deposits and withdrawal services.

4. Industry Commerce
 Computers are being used to monitor and control industrial processes.
 Remote controlled devices like robots are also being used to perform human tasks
which are too dangerous, complex, unpleasant and tedious to human beings.

5. Health care
 Computers are used:
 To keep patients records in order to provide easy access to all patients is treatment
and diagnosis. A doctor in need of specialized opinions can easily retrieve such
information from computer storage memory.
 For electro-cardiogram screening and motoring for patients’ diagnosis.
 Enable access to foreign consultations and expertise / labour easily which would
otherwise have not been possible due to high traveling costs
 To carry out computerized diagnosis
 To carry out computerized surgery

6. Transport and Communication industry


 Computers are used:
 To monitor vehicle traffic in busy towns, aircrafts navigation and to make
reservations.
 In telephone exchange to switch incoming and out going calls.
 to coordinate the movement of their wagons and goods at Railway corporations
 to control air traffic and surveillance of air space
 to make air ticket reservations

7. Education and research


 Computers are widely used:
 In teaching and learning processes and in research institutions. E.g. long distance
learning, open university concept

Prepared by Patrick Page 12 of 103


13

 Learning and teaching using computers is referred to as Computer Aided Learning


(CAL) and Computer Aided Teaching (CAT).
 In aviation for training pilots through simulation i.e. computers are used to physically
change the environment so that the pilot feels as if he controlling an actual aircraft.
 Engineers and architects use computers to design test and re-design.
 By scientists to analyze experimental data
 For manned and unmanned space exploration

8. Police and defense


 Computers are widely used today in fighting crime through:
 Police keep record of finger-prints which are automatically analyzed by
computers.
 Computer-based face recognition and scene monitoring help police force to arrest
traffic offenders and criminals.
 In defense, computers are used:
 in electronic news gathering
 efficient communication
 detection and tracking of targets,
 radar systems
 warning systems,
 Military laser and missile systems.

9. Home and leisure


 At home computers are used:
 For shopping purposes because they provide shopping lists as well as electronic
money transfer facilities
 For entertainment
 To play games e.g. chess
 To assist the handicapped at home e.g turning text into speech for the blind

10. Employment

Prepared by Patrick Page 13 of 103


14

 Computers create many jobs e.g computer engineers, system analysts, programmers,
Teachers etc

11. Multimedia applications


 Used in business presentations,training,, information distribution, point of sale
terminals, photo albums e.t.c
 Used in entertainment to add stereo sound and digital video clips to make games more
realistic
 Multimedia disks are used for training as teaching aids.

12. Library services

Advantages of computers
1. Speed
 Computers process data faster compared with devices like calculators and type
writers.
 The speed of a computer is measured in fractions of seconds.

2. Computers never make error normally


 Usually error committed by users feed in correct data. When you enter incorrect data
and have it processed, the computer will give you misleading information thus the
saying “Garbage In Garbage Out” (GIGO).
3. Storage
 A computer is capable of storing large amount of data and it can produce this data
again and again on demand. A human being can’t do that.
4. Diligence
 This means that a computer never gets tired or bored if it has to do the same job again
and again. Human beings will get bored and tired very easily.
 Even if the computer has to do a million calculations, it will do the last one with the
same speed and accuracy as it did the first one.
5. Automation

Prepared by Patrick Page 14 of 103


15

 Once the instructions have been given, the computer can carry on with its job
automatically till it is complete.
6. Versatile
 A computer is capable of performing large number of different jobs depending on the
instructions fed to it and hardware characteristics.

Prepared by Patrick Page 15 of 103


16

THE COMPUTER LABORATORY


 A computer lab is a room specially prepared to facilitate installation of computer and
to provide a safe conducive environment for teaching/ learning of computer studies.
Factors to consider when preparing a computer lab
1. Security of computer programs and other resources.
2. Reliability of the source of power.
3. Number of computers to be installed and the available floor space.
4. The maximum number of users the lab can accommodate.

Safety precautions and practices in the computer lab


 A number of safety precautions, rules and practice need to be observed in order to
avoid accidents, injury, damage of computers or lack of conducive environment for
learning and teaching.

The safety precautions and practices include:


1. Proper behavior in computer lab.
2. Protection against fire.
3. Proper cable insulation.
4. Stable power supply.
5. Burglar proofing.
6. Proper ventilation.
7. Dust and dump control.
8. Proper lighting.
9. Standard furniture.

1. Proper behaviour in the computer laboratory


 The following rules must be observed in and around the computer lab:
i) Avoid smoking or exposing computers to dust. This is because smoke and
dust contains small abrasive particles that can damage computer components
and cause wearing of moving parts.

Prepared by Patrick Page 16 of 103


17

ii) Avoid carrying food and beverages in the lab. This is because food may fall
into the moving parts of a computer and damage them. Liquids may also spill
into the computer causing rusting or electrical faults.
iii) Avoid unnecessary movements because you may accidentally knock down
peripheral devices.
iv) At all times follow the correct procedure for starting and switching off the
computer to avoid loss of data and also avoid damage to computer
Programmes.
v) Do not open up the metallic covers of computer or peripheral devices without
permission and particularly when the computer is on.

2. Protection against fire


 The main cause of fire in the lab may either be inflammable chemicals or electrical
faults. A Computer lab should therefore, have gaseous fire extinguisher filled with
carbon dioxide.
 Water based or powder fire extinguisher should be avoided because they may cause
damage (rusting or abrasion) to computer components.

3. Proper cable insulation


 All power cables in the computer lab must be properly insulated and laid away from
busy path ways.
 The cables should be laid along the walls to avoid the danger of exposing the user to
electric shock and power interruptions caused by stumbling on cables.

4. Stable power supply


 To protect the computers against damage due to power instabilities, avoid connecting
them directly to the mains supply. Instead, connect them to a special device called
Uninterruptible Power Supply (UPS) and then connect the UPS to the mains.
 The UPS stores some power and when the mains power goes off, it gives out some
sound alert to the user.
 UPS can also be referred to as: Power Regulator/ Power Stabilizer/ Surge
Suppressor.

Prepared by Patrick Page 17 of 103


18

The UPS performs two main functions:


1. It regulates power from unstable power source to the required clean voltage by
eliminating surges and brown-outs.
2. It temporarily provides power to the computer incase of sudden power failure, thus
allowing the user to store his/her work and shut down the computer using the
correct procedure.

 Organizations, schools, hospitals and banks usually install stand-by generators that
automatically comes on incase of power failure.
 Power from generators must pass through UPS before being fed to the computer
because it is not stable.
 NB: Generally devices that produce alternative source of power are usually referred
to as power backups.

5. Burglar proofing
 Computer should be protected against theft at all times.
 Unauthorized access to the computer lab should be avoided by the following:
i) Fit strong metallic grills and padlocks on doors, windows and roof incase the
roofing is weak.
ii) Do not welcome strangers in computer lab.
iii) Install security alarms that would alert security personnel incase of a break in.

6. Proper ventilation
 Computers generate a lot of heat and electronic components can be damage by
excessive heat. It is therefore, important to ensure adequate flow of air in the lab.
 Proper ventilation enables the computer to cool and hence avoid damage to computer
components.
 Proper ventilation can be ensured by:
1. Installing air-conditioning systems
2. Ensure the room has enough ventilation points e.g. windows.
3. Avoid overcrowding of machine/ people in the room.

Prepared by Patrick Page 18 of 103


19

7. Dust and dump control


 Computer lab should be located away from excessive heat.
 The lab should be fitted with special curtains to reduce entry of dust particles.
 The computers must remain covered using dust covers when not in use.
 Humidity lower than 50%, allows electricity to build up and cause damage to
sensitive electronic components.
 Humidity of over 70%, causes rusting of the metallic parts of the computer system.
8. Proper lighting
 A computer lab must be well lit to avoid eye strain that eventually leads to headache,
stress and fatigue.
 Very bright wall paints, reflect too much light causing eyestrain.
 The user should adjust the brightness of the computer monitor until the eyes feel
comfortable.
 Avoid using a flickering monitor which may cause eye strain leading to eye sight
damage.
 Consider fitting radiation filter screens (antiglare screens) to reduce the radiation
rays and light that reaches the eyes.

9. Standard furniture
 The table which a computer is placed must be strong and wide enough to bear the
weight and accommodate all the peripherals devices.
 The seat must be comfortable and have a straight backrest that allows the user to sit
upright. This is important because it avoids muscle pains and backaches caused by
poor sitting posture.
 The chair must be high enough relative to the table to enable comfortable use of the
hands on the keyboard.
 The eyes must be at same level as the top of the screen when the user is seated
upright.

PRACTICAL HANDS-ON-SKILLS

Starting-up the computer (Booting)

Prepared by Patrick Page 19 of 103


20

 Booting refers to the process of starting-up a computer.


 When the computer is switched on, it goes through a process called POST (Power
On-Self Test). The POST checks whether all the system components are working
properly and if not, an error message is displayed on the screen or an abnormal beep
is produced or a blue screen appears.
 The special firmware programme that directs the POST process is called BIOS (Basic
Input Output System).
 After the POST process, the computer reads some instructions such as the current
time and date from a special memory called CMOS (Complementary Metal-Oxide
Semiconductor).
 When every component is checked and found to be working properly, the Operating
System (OS) is loaded to the computer memory and the computer is no ready for use.

Types of booting
i) Cold booting
ii) Warm booting

i) Cold booting
 This starting up a computer that was originally off. This is achieved by pressing the
power button on the system unit.

ii) Warm booting (Restarting)


 This starting up the computer that was originally on. This may be achieved by one of
the three methods given below:
i) By pressing a combination of keys at the same time i.e. Alt + Ctrl + Delete
ii) By pressing the re-start/ reset button on the system unit
iii) By using the start button menu (Click start button, Click Turn Off Computer
then click Restart).

Shutting down a computer


 It is important to follow the correct procedure of shutting down a computer at all
times. Failure to follow the correct procedure, the following might happen:

Prepared by Patrick Page 20 of 103


21

i) Loss of data
ii) Damage of computer programs
iii) Damage of computer components such as hard disk
 The procedure of shutting down a computer may vary depending on the type and
version of Operating System (OS) you are using.

Procedure
Escape key
1. Ensure that all the work has been properly saved/ stored.
2. Close all the Programmes that may be currently running in the computer.

3. If your computer is running on Microsoft Windows XP or Vista then,


a) Click the start button
b) Turn Off Computer commands from the menu.
c) Select Turn Off
d) After a few seconds the computer will automatically switch itself off.
Special Keys
 If your computer is running on Windows 95/98/2000 then,
Diagram of a keyboard layout
i) On the start menu, click Shut Down
ii) Select Shut Down and then click OK.

THE KEYBOARD LAYOUT


The keys on the keyboard can be categorized into five groups namely:
i) Alphanumeric keys (Typing keys)
ii) Function keys
iii) Cursor movement & editing keys
iv) Special PC Operation keys
v) Numeric key pad

Prepared by Patrick Page 21 of 103


22

i) Alphanumeric keys
 These keys are labeled with alphabetical letters A – Z, numbers arranged in a line 1,
2, 3 0 respectively and symbols like? { [ > , @ % &.
 This group also includes the following keys: CapsLock key, Enter key, Tab key,
Space bar key and Backspace key.
 CapsLock key - Pressing this key lets the user to type in upper case letter (Capitals).
To switch back to lower case letters, press the same key again.
 Enter key (return key) - Pressing this key forces the cursor to move to the beginning
of the next line. Cursor is a blinking insertion ( I ) that shows where the next
character to be typed will appear. The Enter key is also used to instruct the computer
to execute a command that has been selected on the screen.
 Tab key - This key is used to move the cursor at set intervals on the same line.
 The space bar key – This key creates a space words during typing.
 Back space key – This key deletes characters that are to the left side of the cursor.

ii) Function keys


 Functions keys are usually located along the top of the key board.
 They are labeled F1, F2 F12.
 They are used for the tasks that occur frequently in various Programmes e.g. F1 key
in most programs, starts the Help Menu.

iii) Cursor movement and editing keys


 Cursor movement keys are used to move the cursor on the screen. They include:
(a) Arrow keys - Pressing the left arrow moves the cursor towards the left. The Cursor
moves to the right if you press the right arrow. The cursor move up or down
whenever you press the up arrow or down arrow respectively.

Prepared by Patrick Page 22 of 103


23

(b) Page up or page down keys - Pressing page up key moves the cursor up one page
and pressing page down key moves the cursor down one page incase the document
has many pages.
(c) Home and end keys - Pressing home key moves the cursor at the beginning of the
current line. Pressing end key moves the cursor at the end of the correct line.

 Editing keys are used to delete or insert characters in a document. They include:
(a) Insert key – This key helps the user to replace or insert characters at the cursor
position.
(b) Delete (Del) key – This key erases characters that are to the right side of the cursor.

iv) Special PC Operation keys


 These keys are used in combination with other keys to give instructions/ commands
to the computer. E.g. if you press Ctrl + Esc you display the start menu. They include:
Shift key, Ctrl (control) key, and Alt (Alternate) key and Esc (escape) key.

v) Numeric keypad
 The numeric keypad consists of a set of numbers from 0 to9 and arithmetic signs like
+ (addition), - (minus), * (multiplication), and / (division). The numeric key pad is
located on the right hand side of the keyboard.
 The keypad is meant to help the user to rapidly enter numeric data.
 The numbers on the numeric keypad can only be used when the Num Lock turned on.
When the Num Lock is turned off, the keys can be used as cursor movement and
editing keys.

Proper Typing Guidelines


1. Sit upright with both feet firmly on the ground maintaining an alert posture.
2. Place the material to type on your left hand side, in a position you can read
without straining.
3. Rest your fingers on the homes keys i.e. left hand fingers on A, S, D, F and the
right hand fingers on J, K, L, ; and the thumbs on the space bar.
4. Always return the fingers to the home keys after striking other keys.

Prepared by Patrick Page 23 of 103


24

5. Starting typing and don’t look at your fingers or even the keyboard when typing.
NB: To gain speed in typing, you can use typing tutor software such as typing master, typing
pal, touch tutor, mavis beacon etc.

Mouse skills
i) Clicking - This means pressing and releasing the left mouse button once. Clicking
selects an icon or object.
ii) Double clicking – This means pressing the left mouse button twice in a quick
succession. Double clicking usually opens a file or starts a programme.
iii) Right clicking – This means pressing the right mouse button once and releasing it.
Right clicking displays a list of commands from which the user can make a selection.
iv) Drag and drop - This is where the user points at an item, holds down the mouse
button, slides the mouse and moves the item to a different location on the screen.
Once you reach to the desired location release the mouse button.

When using a mouse:


(a) Place the mouse on a flat surface
(b) Hold the mouse with the right hand (if you are right handed), using the thumb
and the two last fingers.
(c) The index finger should rest on the left button and the middle finger should
rest on the right button.

Prepared by Patrick Page 24 of 103


25

CHAPTER 5

COMPUTER SYSTEMS
A System - is a collection of independent entities that collectively work together to achieve a
desired goal.
A Computer system – is a collection of entities that work together to process and manage
information using computers.

Computer system consists of three main components


i) Hardware – these are the physical or tangible computer components e.g. Keyboard.
Mouse, monitor system unit e
ii) .t.c.
iii) Software – these are set of instructions or programs that direct a computer on what
to do. They are classified into two categories namely: system software and
application software.
iv) Live ware – refers to a computer user or operator who commands a computer to
perform certain tasks.

Hardware
 The hardware elements of the computer are grouped into four categories namely:
1. Input devices
2. Output devices
3. Storage devices
4. C.P.U (Central Processing Unit)

1. Input devices
 Input is a way of entering or keying data and information into the computer using input
devices.
 Data may be entered into a computer using keying devices such as keyboard or using
pointing devices such as mouse.

Prepared by Patrick Page 25 of 103


26

 The main purpose of input devices is to convert human readable data into machine
readable form.

 Input devices are classified according to how they are used to enter data; this include:
i) Keying devices e.g. keyboard, keypads
ii) Pointing devices e.g. mouse, track ball
iii) Scanning devices
iv) Speech recognition
v) Touch screen digitizer and digital cameras

Keying devices
 These are the most common input devices. They enter data into a computer by typing.
 A computer keyboard resembles a typewriter keyboard,
 Examples include: keyboard and keypad.
 A keypad is a tiny keyboard which is mostly used on small portable computers,
calculators, palmtop, mobile phones etc.
 Types of keyboard include:
 Traditional keyboard – is the most common type of keying device. It is a
full sized rigid keyboard.
 Flexible keyboard – is a more portable keyboard that can be folded and
packed into a bag.
 Ergonomic keyboard – is a specially designed to provide comfort and
alleviate wrist strain.
 Braille keyboard – is a keyboard designed for use by the blind. It consists of
keys identified by raised dots.

A diagram of a Standard keyboard


A diagram of an Ergonomic keyboard

Prepared by Patrick Page 26 of 103


27

Pointing devices
 They are used for controlling a pointer on the screen.
 Examples include: mouse, trackball, joystick, light pen, pointing stick touch etc.

Mouse
 A mouse is a pointing device mainly used in GUI (Graphical User Interface)
operating system.

A diagram of a standard mouse

 Types of mouse include:


 Standard mouse – is also called traditional mouse. It has a ball underneath,
two buttons and an optional scroll button located between the left and the right
buttons.
 Optical mouse – it does not have any moving parts instead, it uses principles
of light to move the pointer on the screen.
 Cordless moue – is also called wireless mouse. It is a battery powered mouse
that uses radio or infrared waves instead of being physically connected to the
system unit.

Uses of a mouse
i) Used to select icons and options from menus
ii) Used to position the cursor when editing text
iii) Used to select text or objects
Advantages of a mouse
i) Easy and convenient to use

Prepared by Patrick Page 27 of 103


28

ii) It is cheap
iii) Selects a position on screen faster than a keyboard

Disadvantages of a mouse
i) The mouse requires a flat surface to operate
ii) It not accurate for drawing purposes
iii) It cannot be used to input text easily

Track ball
 It is like a mouse that has been turned upside down. The ball is on top and the user
just rolls the ball without moving the whole gadget. It does not require a flat surface
or extra space for movement.

A diagram showing different styles of track ball

Joystick
 It is a hand held device with an upright handle that resembles a can gear lever.
 The handle is moved sideways, upwards or downwards to control the position of the
cursor on the screen.
 Joysticks are mainly used to play computer games.

Light pen
 It is light sensitive device with the size of an ordinary pen.
 It is sensitive to presence and absence of light through a light sensitive cell at its end.
 A light pen does not emit/ produce light instead it reacts to the light emitted by the
display using a photo sensitive detector at its base.

Prepared by Patrick Page 28 of 103


29

Uses of light pen


i) Design tool – used to indicate which shape to draw, where they should be drawn on
the screen and the size.
ii) Reading bar codes - indicating the point on a screen e.g. when selecting options for
drawing.

Advantages of a light pen


i) Provides a direct mode of input
ii) More accurate than using a mouse

Disadvantages of light pen


i) Can only detect the presence and absence of light
ii) Can only be used with monitors that are able to sense light shinning on the screen.

A diagram of different versions of light pen

Other pointing devices


 Pointing stick
 Touch pad

Scanning devices
 These are input devices that can read or capture data directly into the computer as
electronic signals from source document. Documents that can be read may include:
bank cheques, electricity meter reading etc.

Prepared by Patrick Page 29 of 103


30

 Scanner is like a photocopying machine that captures a copy of text or a drawing


from a piece of paper and then produces the same in a computer.

 Scanning is the process of using a scanner to capture information from a document


into the computer.
 After scanning a document, its copy which looks more like a photocopy of the
original is referred to as bitmap of the original document. This is because the copy is
made up of tiny dots called bits.

Classification of scanners
 Scanners are classified according to the technology they use to capture data.
i) Optical scanners
ii) Magnetic scanner

i) Optical scanners
 They use the principles of light to sense the document contents.
 An optical scanner converts the data into digital form and passes it to the computer
for processing.

Types of optical scanners


i) Optical Mark Reader/ Recognition (OMR)
ii) Optical Bar Reader/ Recognition (OBR)
iii) Optical Character Reader/ Recognition (OCR)

Optical Mark Reader/ Recognition (OMR)


 It detects marks/ lines which have been made in exact positions on a piece of paper
using a pencil or a soft pen.
 The reader detects the presence or absence of a mark on a form by sensing reflected
infrared light.
Uses of OMR
1. Marking multiple choice examination
2. Voters’ registration process

Prepared by Patrick Page 30 of 103


31

3. Pay roll data entry


4. Students’ university application forms

5. National examination registration forms


6. Supermarkets for stock records
7. Insurance premium collection

Advantages of OMR
1. Data can be prepared where it is collected e.g. students sitting for a multiple choice
examination mark the answers themselves.
2. Data can be prepared without any other special equipment.
3. Has low error rates

Disadvantages of OMR
1. The person putting the marks on the document/ form has to follow instructions
precisely.
2. It’s difficult for a computer to check marked data i.e. verification of data is difficult.
3. Documents may be difficult to understand and fill.

Optical Character Reader/ Recognition (OCR)


 It recognizes characters as well as real objects, text, pictures and drawings then
transforms them into a softcopy that can be manipulated using a computer.
 It operates more like a human eye.
 The most common type of this scanner is the flatbed scanner.

Uses of OCR
1. Stocktaking sheet- the computer prints out stock sheet in OCR characters and the
stock checkers enter actual quantities on the form in careful handwriting. The sheet
can then be read by OCR into the computer for emending the stock records.
2. In electricity billing

Prepared by Patrick Page 31 of 103


32

Advantages of OCR
1. Provides a faster input compared to typing.
2. The contents of the documents are both human or machine sensible.
3. Data can be captured at the source hence errors are limited.

Disadvantages of OCR
1. Documents should not be folded or creased for accurate reading.
2. Expensive methods of input because special technique and equipment are required.
3. Only a certain font type is acceptable.

Optical Bar Reader/ Recognition (OBR)


 Bar codes are lines of different thickness that identify a product’s information such
as country of manufacture, name of manufacturer and the item code.
 Each item is labeled with a Universal Produce Code (UPC) identifying it. The code is
a set of bars and spaces of varying thickness and width representing a number code. A
space represents a ‘0’ while a bar represents a ‘1’.
 The code recorder moves across the bars. The bars are scanned by a laser beam which
generates electrical pulses co
 rresponding to the reflected light received. These pulses are compared with standard
codes stored in the computer and the details of the price and description printed out
on a receipt.

A diagram of Barcodes

Prepared by Patrick Page 32 of 103


33

ii) Magnetic scanners


 Captures data by use of magnetic technology. The data being read can either be in
form of special magnetic characters or a continuous magnetic strip.

Types of magnetic scanners


(a) Magnetic Ink Character Reader/ Recognition (MICR)
(b) Magnetic stripe recognition

(a) Magnetic ink character recognition (MICR)


 MICR reader recognizes character formed from magnetic ink.
 The document characters are typed or printed in ink containing Iron (II) Oxide that
gives them magnetic property. As the document passes into the reader, the ink is
magnetized and therefore the characters are recognized by the strength of magnetism.
 The magnetized characters cause current to flow through read head then the MICR
recognizes these characters and conveys them to go as computer input in terms of
electrical signals.

Uses of MICR
1. In banks for cheque processing
2. In local authorities for payments of rate by installments.
N/B: An example MICR device is a cheque reader that reads the cheques number, the branch
number of the bank and the customer’s account number and sends the details to the
computer for updating the customer’s account.

Advantages of MICR
1. It is fast, accurate and automatic
2. The codes are both machine and human readable
3. Reduces forgery

Prepared by Patrick Page 33 of 103


34

Disadvantages of MICR
1. MICR readers and encoders are very expensive
2. MICR system is limited to only 14 characters
3. MICR system is based on magnetism and can be damaged

An example of MICR characters mainly used in banker’s cheque

(b) Magnetic stripe recognition


 A magnetic stripe is a thin magnetic tape mostly found at the bank of a plastic card
Magnetic stripe
e.g. ATM.

An example of the back view of an ATM card

Speech recognition/voice input devices


 Microphone is used to enter data into the computer system.
 Special systems can recognize standard vocabulary of spoken words through a
microphone linked into a computer system.
 A user must train the system to recognize his/ her voice by repeating each word
several times. Each word is analyzed and filed for later matching and identification.

Prepared by Patrick Page 34 of 103


35

Uses of speech input


1. Suitable for the handicapped especially those with impaired hands.
2. Electronic funds transfer
3. House/ car security using voice activated locks
4. Voice activated toys and games

Limitations of speech input


1. Limited vocabularies to most systems
2. Speaker’s variability - these include varying in speech, tones, accents, intonation and
pronunciation e.t.c.
3. Homophones - some records sounds the same.
4. Recognition is slow i.e. the vocabulary and speech response is relatively low.

Touch screen
 It is an input method that utilizes the technology of touch sensitive screen. When the
user touches the screen the computer detects the figure and responds it.
 Used in places where keyboards are prone to damage due to the environment. They
are also used in areas where is little space for keyboard.

Advantages of touch screen


1. No extra peripherals are needed except the monitor.
2. Effective where a keyboard /mouse would get wet or dirty.
3. Useful for people who work when standing or moving about.

Disadvantage of touch screen


1. Unsuitable for inputting large quantities of data.

A diagram of a touchPage
Prepared by Patrick screen
35 of 103
36

Digitizers/ graphic tablet


 The user writes on graphic tablet using a stylus pen.
 The image being drawn does not appear on the tablet but on the computers screen.
 Mostly used for tracing detailed architectural and engineering drawings and designs.

Digital cameras
 They capture images the same way as other cameras, only that the image is stored in
digital form.
 The images are entered directly into the computer for editing or printing by
connecting the camera to the computer using a special cable.

Interactive whiteboard
 It is also known as smart board.
 It is a large interactive display that is connected to a computer. The computer display
is projected onto the board’s surface where users control the computer.
 Smart boards are used in places like classrooms, corporate board rooms and
broadcasting studios.

A diagram of a smart board

Prepared by Patrick Page 36 of 103


37

Prepared by Patrick Page 37 of 103


38

CENTRAL PROCESSING UNIT (CPU)


 It is also referred to as the Processor.
 It is the brain of the computer and carries out all the processing.
 It is mounted on a circuit board called mother board (system board)
Parts of CPU
i) Control unit
ii) Arithmetic logic unit(A.L.U)
iii) Main memory(MM)
iv) Auxiliary processors (AP)

i) Control Unit (CU)


 It coordinates all processing activities in the C.P.U well as input, output and storage
operations
Functions of the control unit
1. Directs the flow of information in the C.P.U, main memory and storage media.
2. Control the instructions the C.P.U will perform next.

ii) Main Memory (Primary Storage)


 Provides storage location for data and instructions accessed by the control unit.
Functions of the main memory
1. Holds data awaiting processing
2. Holds data that has been processed awaiting to be output
3. Holds data being processed
NB: Computer memory can be classified into:
i) Read Only Memory (ROM)
ii) Random Access Memory (RAM)
iii) Arithmetic Logic Unit (ALU)
 It carries out all the arithmetic and logical operations of the CPU
 The basic arithmetic operations include: addition, subtraction, multiplication and
division.
 Logical operations include: equal to, not equal to, less than, greater than etc.
Functions of ALU

Prepared by Patrick Page 38 of 103


39

i) Carries out all the mathematical computations in the computer


ii) Carries out all the logical comparison of values
NB: In order for ALU to be able process data, it has special temporary storage locations
called registers. A register is a special temporary storage location for holding data just
before processing and after processing.

TYPES OF MEMORY
1. ROM (Read Only Memory)
2. RAM (Random Access Memory)

1. READ ONLY MEMORY


 It is used to store programmed instructions/ data permanently or semi permanently.
 Data and instructions stored in Rom are those required unchanged for a very long
time e.g. booting instructions, computerized fuel pump instructions etc.

Types of ROM
a) MROM (Mask Read Only Memory)
 Once contents are written on it by the manufacture they cannot be changed.
b) PROM (Programmable Read Only Memory)
 Allows the user to alter it only once after the content is written on it.
c) EPROM (Erasable Programmable Read Only Memory)
 The content stored in the memory can be erased by exposing them to ultra violet
(UV) light and then reprogrammed for another use.
d) EEPROM (Electrically Erasable Programmable Read Only Memory)
 This type of ROM can be erased and programmed using electricity e.g. BIOS

Characteristics of ROM
1. Can only be read but cannot be written on it unless it is a special type of ROM
2. It is non-volatile i.e. its content is not lost when the computer is switched off
3. Stores permanent instructions from the manufacturer
2. RANDOM ACESS MEMORY
 It is most common type of main memory

Prepared by Patrick Page 39 of 103


40

 It is called random access memory because its content can be read directly regardless
of the sequences in which it is stored.
NB: The content in RAM is held temporarily and therefore, the content is lost once the
computer is turned off.
Types of RAM
a) SRAM (Static Random Access Memory)
 It is a very fast memory and holds its content as long as there is power.
 It is more expensive than DRAM.
b) DRAM (Dynamic Random Access Memory)
 Holds its content for short time, even when power is on. To maintain its content, it
must be refreshed severally per second.

Characteristics of RAM
1. Data can be read (retrieved/ opened) & written (stored) in it.
2. It is volatile (temporary) storage because its content is lost when the power is
switched off.
3. Its content is user defined i.e. the user dictates what is to be contained in RAM.

SPECIAL PURPOSE MEMORIES


 Apart from ROM and RAM, there are several types of special memories found inside
the CPU or found in the input/ output devices.
NB: These memories increase the overall performance of the CPU during processing of
data & instructions. These memories include buffers, registers and cache memory.

a) Buffer
 It is a special purpose memory used to provide temporally storage so that the CPU is
set free to carry out other activities instead of waiting for all data to be entered or to
be output.
 For example, a printer cannot work at the sped of the CPU, therefore the printer
buffers temporarily holds the output to be printed hence freeing the CPU to perform
other functions.
NB: Buffers can hold more than one piece of data at a time.

Prepared by Patrick Page 40 of 103


41

b) Cache memory
 It is a very high speed type of SRAM whose purpose is to allow the processor to
access data and instructions faster.
c) Registers
 They are special purpose memories which hold data temporarily before and after
processing.
 Unlike buffers, registers hold one piece of data at time and are inside the CPU.
Purpose of registers
i) Used for holding instructions currently being processed.
ii) It is a high speed storage location.
Examples of Register
i) Accumulator – Temporarily holds the results of the last processing step of ALU.
ii) Instruction register - Temporarily holds an instruction just before it is interpreted
into a form that CPU can understand it.
iii) Address register - Temporarily holds next piece of data waiting to be processed.
iv) Storage register - Temporarily holds a piece of data that is on its way to and from the
CPU and the main memory

Memory capacities
 Memory and storage capacity is measured in units called bytes.
 A byte is equivalent to a single character. A character can be letters of the alphabet,
punctuation marks, digits, symbols. Eg. A – Z, 0 – 9 etc
 A byte is made up of 8 bits. Bit is an acronym standing for BInary digiT.
 There are two standard 8-bit codes widely used today to represent information in
computers i.e. American Standard Code for Information Interchange (ASCII) and
Extended Binary Coded Decimal Interchange Code (EBCDIC).

 E.g Character “A” = 1 1 0 0 0 0 0 1 in ASCII

8 Bits

8 Bits = 1 byte
1 Kilobyte (KB) 1,000 bytes (1 Thousand bytes)

Prepared by Patrick Page 41 of 103


42

1 Megabyte (MB) 1,000,000 bytes (1 Million bytes)


1 Gigabyte (GB) 1,000,000,000 bytes (1 Billion bytes)
1 Terabyte 1,000,000,000,000 bytes (1 Trillion bytes)

FUNCTIONAL ORGANISATION OF THE CPU


 The ALU, CU and the Main Memory are linked through electrical pathways called
buses.
 A complete bus is an electrical pathway for signal to flow from one point to another
in circuit.
Types of computer buses
i) Control bus
ii) Address bus
iii) Data bus
i) Control bus
 It is a pathway to all timings and controlling functions sent by the control unit to other
parts of the system.
ii) Address bus
 It is the pathway used to locate the storage position in the memory where the next
instruction or data is to be executed are found.
iii) Data bus
 The pathway where the actual data transfer takes place.

Prepared by Patrick Page 42 of 103


43

CPU Organization/ Structure

Control Unit
(CU)

Data Input Arithmetic & Logic Unit Data Output


(ALU)

Input devices Output devices


e.g. Keyboard e.g. Printer
Main Memory
(MM)

Data to be stored Data to be processed


Computer Bus
Secondary Storage
(Auxiliary storage)
e.g. Hard disk, CD

. NB: The arrows ( ) represent computer buses

Types of processor and their clock speed.


 Since 1971 Intel Company has specialized in manufacturing CPU by combining the
ALU& CU on a single tiny processor called Micro-processor.
 Other companies that started manufacturing processor include Advanced Micro
Device (AMD), Cyrix and Motorola.
 The following are the types of processors available in market today:
 Pentium Pro
 Intel Pentium
 Pentium (I)
 Pentium (II)
 Pentium (III)
 Pentium (IV)
Processor Clock Speed
 The speed of which a processor executes is determined by it clock speed.
 The system clock speed is measured in units called Hertz (Hz).

Prepared by Patrick Page 43 of 103


44

 The hertz is a unit of frequency which measures the number of cycles per second in a
signal.
1 kilohertz (KHz) 1000 hertz
1megahertz (MHz) 1000000 hertz
1Gigabyte (GHz) 10000000 hertz

OUTPUT DEVICES
These are peripheral devices that a computer uses to give out information produced after
processing operations.

TYPES OUTPUT DEVICES


1. Softcopy Output Devices
2. Hardcopy Output Devices

1. SOFTCOPY OUTPUT DEVICES


These are devices that produce intangible output. They include: Speakers, Monitors (Screen)
and LED (Light Emitting Diodes) among others.
NB: The term softcopy output refers to the intangible output; mainly displayed on the screen
or through devices like speakers.
- Softcopy output is temporary (as in the output is no longer available when the devices are
not powered either through electricity or from other sources of power.)

Prepared by Patrick Page 44 of 103


45

i) MONITOR (VDU)
It displays information on its screen thus helping the user to monitor operation being carried
out by the computer.
NB: The size of a monitor is measured in inches (“) diagonally; as in from corner to corner.

Size 15”
(Measured
Diagonally)

TYPES OF MONITORS
a) Monochrome monitors
They display images and text in only one colour mostly black and water.
b) Colour monitors
They display images and text in multiple colours.

Note: Monitors display text and graphics with the help of Video Card (Graphics Adapter).
- Video Card (Graphics Adapter) is circuit board where the monitor must be connected for
it to display information. The video card is plugged into the motherboard.
- However, some monitors come with on-board video capability and therefore there is no
need for a video card.

Examples of graphic adapters/ Video Cards


Graphics Adapters or Video Cards are circuit boards that enable the monitor to display
information.

Prepared by Patrick Page 45 of 103


46

1. Monochrome Display Adapter (MDA) - It was the first video card that displayed
text in only one colour and could not support images.
2. Hercules Graphics Cards (HGC) - Supports monochrome images and text.
3. Colour Graphics Adapter (CGA) - Displays text and images using 16 colours.
4. Enhanced Graphics Adapter (EGA) - An improvement of Colour Graphics
Adapter.
5. Video Graphics Array (VGA) - Displays images and text with at most 256 colours.
6. Super Video Graphics Array (SVGA) - An improvement of VGA but offering over
256 colours.

- The sharpness and clarity of an image on the screen depends on the type of monitor.
Monitors that display sharp and clear images are said to have high resolution.
- The images on the screen are formed by small dots called pixel (picture element) hence, the
number of pixels per square centimeter, the higher the resolution thus high clarity of the
image.
- Resolution-is the measure of how fine, clear or sharp an image appears on the screen.
- Pixel – Are small dots that form an image on the screen.

TECHONOLOGIES USED IN MONITORS (Types of display screens)


There are two commonly used technologies in monitors namely:
1. Cathode Ray Tube (CRT)
2. Liquid Crystal Display (LCD) or Flat Panel Display

1. CRT MONITORS
- It uses along tube called cathode ray tube that emits light.
- The screen of CRT is curved slightly outwards forming a convex shape.
- The CRT must be refreshed constantly and if the refresh rate is low, the screen flickers
or a line scrolls down the screen.
Characteristics of CTR Monitors
1. The screen is curved slightly outwards
2. They are not portable i.e. they are bulky hence occupy a lot of space
3. They consume a lot of power

Prepared by Patrick Page 46 of 103


47

4. They are cheap

2. LIQUID CRYSTAL DISPLAY (LCD) OR FLAT PANEL DISPLAY


- It is made up of 2 sheets of polarized and flexible plastic material & a layer of crystals
between them.
- LCD does not refresh like CTR, instead it sends variable voltages to cells of liquid
crystals & cause the crystals to uncoil.
- Liquid crystal displays are widely used in watches, calculators, cell phones & digital
cameras.

Characteristics of (LCD) or flat panel display


1. The screen is flat
2. They are portable
3. Consume less power compared to CRT
4. They are expensive
5. They occupy less space
6. Provides high quality output compared to CRT

Examples of Flat Panel Displays


1. Liquid Crystal Display (LCD) - They have tiny liquids crystals that reflect light
falling on them from the environment.
2. Electro luminescent (EL) - An improvement of LCD and emits light when
electrically charged.
3. Gas Plasma - Use Gas That Emits Light In Presence Of Electric Current
4. Thin Film Transistor (TFT) - It is latest technology advancement in displays. It
provides a high quality output than all the others.

Advantages of Monitors (VDU)


1. The output is almost instant
2. It minimizes the paper work.

Disadvantages of Monitors (VDU)

Prepared by Patrick Page 47 of 103


48

1. The screen might not allow the full viewing of all the data
2. Can lure the computer user not to keep hardcopy records

ii) SOUND/VOICE OUTPUT DEVICES


- Voice output device mainly are speakers. The sound may be inform of music, video,
warning or interactive communication with the computer e.t.c

Advantages of sound output


1. No reading is required
2. It is a fast and natural output
3. Useful in situations where you can’t see or where you are busy

Disadvantages of sound output


1. Not suitable in noisy environment
2. Inappropriate for lengthy information.

Application of sound output


1. Text to speech translation for the blind
2. Emergency messages e.g. in airports
3. Learning aids e.g. Computer Aided Learning

iii) LIGHT EMITTING DIODES (LED)


- They are light emitting component that display light when on electric current is passed
through them. E.g. the red and green light displayed by the system unit to help user the user
know whether it is ON or OFF.
- Most LEDs are used to give warnings.

2. HARDCOPY OUTPUT DEVICES


These are devices that produce tangible output mainly on paper. They include: Printers,
Plotters, COM (Computer Output on Microfilm) e.t.c.
NB: The term hardcopy output refers to the tangible output produced mostly on papers.
- Hardcopy output is permanent.

Prepared by Patrick Page 48 of 103


49

i) PRINTERS
They produce hardcopy information mainly on paper.
Types of printers
a) Impact Printers
b) Non-Impact Printers

a) Impact Printers
- The printing head comes into actual contact with the paper. The printing mechanism is
similar to that of a typewriter.
- They use special hammers with characters and the paper is placed behind an inked ribbon.
- The printing head element creates the imprint when the printing head strikes.

Types of impact printers


1. Dot Matrix Printer
2. Daisy Wheel Printer
3. Drum Printer
4. Chain Printer

1. Dot Matrix Printer


- Produces a hardcopy by arranging patterns of dots on the paper using pins held on the
printing head.
- The pins/ needles are activated depending on the character to be formed for printing.

2. Daisy Wheel Printer


- It has wheels with petals on which characters are mounted.
- When printing, the wheel rotates allowing petals to hit a ribbon with different characters.
- It provides a better print quality compared to Dot Matrix though slower.
3. Drum Printer
- It provides one whole line print at a time.

Prepared by Patrick Page 49 of 103


50

- The characters are incorporated on circular band that move round the surface of the drum
surface.
- Each band contains all the possible character sets.

4. Chain Printer
- It incorporates engraved character printing slugs on a moving belt/chain.
- The chain /belt moves the character printing slugs at a high speed past printing positions.

b) Non-impact Printers
- These printers do not use the striking mechanism to produces characters.
- The printing head element does not come into actual contact with the stationary.

Types of Non-Impacts Printers


1. Inkjet printers
2. Thermal printers
3. Laser printers
4. Electrostatic printers
1. Inkjet printer
- These printers form characters by spraying ink from tiny nozzles through an electrical field
that arranges the charged ink particles into characters.
- They are cheap to buy but expensive to run because of the high cost of ink cartridges.
2. Thermal printer
- It uses heat to transfer characters onto a piece of paper.
- It use special print paper that senses the heated head character images, which are then
passed onto the papers as character prints.

3. Laser printer
- It prints by passing a laser beam back and forth over a rotating drum.
- The laser draws the image on the drum by static electricity.
- The charged areas pick up the ink toner from a cartridge & press it onto the paper.
- It is expensive to buy, but it’s faster and cheaper to run than ink jets.

Prepared by Patrick Page 50 of 103


51

4. Electrostatic printers
- It uses electrostatic charges to form characters in a line on a special paper.

Classification of Printers Based On Printing Speed


a) Character printers
- They print one character at a time. E.g. Daisy wheel, Dot matrix etc.
b) Line printers
- They print one line at a time e.g. inkjet, drum, chain, electrostatic printers.
c) Page printers
- They print an entire page at a time e.g. laser printers, xerographic printers.

Factors To Consider When Selecting A Printer


1. Speed of printing
2. Quality of print output
3. Initial cost and subsequent cost of maintenance
4. Volume of printing expected
5. Interface with the computer system
6. Range of capability for selected printer e.g. multiple copy facility, print styles, page
width e.t.c
7. The nature of reports to be generated

Differences Between Impact and Non Impact Printers


1. Impact printers are slow while non impact printers are fast
2. Impact use inked ribbons while non impact use thermal/electrostatic Impact are noisy
while non impact are quiet
3. Impact printers are cheap while non impact are expensive
4. Impact printers produce multiple copies while non impact produce single copies.

ii) PLOTTERS
- They are output devices that mainly produce graphical output e.g. diagrams, maps.
- They are mostly used in the field of engineering and architecture for producing graphical
output.

Prepared by Patrick Page 51 of 103


52

- They commonly used graph plotters include: flat bed plotters and drum potters.

iii) COMPUTER OUTPUT ON MICROFORM (COM)


- It records images onto a photographic film which is viewed by a special microfilm reader.
- This output method provides miniature/ small film strips into the microform.
- Microforms are photographically reduced documents on films.

Types of Microforms
a) Microfilm
- The output is usually on a roll of film which is about 16mm.
b) Microfiche
- The output is on page of film where data image are arranged in a grid of patterns. It
measures 105mm by 48mm.

Advantages of COM
1. Saves on stationery and space
2. Faster than printing
3. Not bulky hence portable
4. The contents of COM are not easily read using naked eyes, hence guaranteeing
the security of reports.
5. Have longer life span compared to paper output
Disadvantages of COM
1. It is expensive
2. Cause eye strain in an attempt to read its content.
3. Additional equipment for viewing its contents are required

Application of COM
1. In libraries for books, catalogues and references
2. In local authorities to retain town plans, maps e.t.c.
3. In banks, Insurance companies to store personal and customer’s records.

Prepared by Patrick Page 52 of 103


53

SECONDARY STORAGE DEVICES AND MEDIA /BACKING STORAGE/


AUXILLARY STORAGE
- These are devices that compliment the primary memory or the main memory. They
store information for longer period.
- Data is either read from or written to the storage media.
- To write data means to store/save it i.e. moving it from the main storage to backing
storage.
- To read data means to open/ retrieve it i.e. moving it from the backing storage to the
main storage.
Characteristics of secondary storage
1. Non-volatile storage - data stored is permanent unless deleted by the user.
2. Mass storage- stores large volume of data
3. Re-usability- stored data can be erased and the media is re-used to store fresh
data.
4. Data is accessed using read/write heads. The head transfers data while the
medium rotates the drive.
N/B: A storage medium has either serial access or direct access.
Serial access - All the preceding data is read before the required data can be
accessed, e.g. magnetic tapes, compact cassettes.
Direct access - Stored data items can be accessed without reading other data first, e.g.
Compact disk, floppy disk.
Classification of secondary storage
1. Removable storage devices
- These devices are housed outside the system unit hence they can be used in
another computer e.g. floppy disk, CD, zip disks e.t.c.
2. Fixed storage devices
- These devices are housed inside the system unit e.g. hard disk.

REMOVABLE STORAGE DEVICES


i.) Magnetic disks e.g. floppy disks, Zip disks, Jaz disk e.t.c.
ii.) Magnetic tapes
iii.) Optical disks e.g. CDs, DVDs, and optical tapes e.t.c.

Prepared by Patrick Page 53 of 103


54

MAGNETIC DISKS
- A magnetic disk is a flat circular platter on which data can be stored using magnetic
process.
- Data can be read from and written to the disk.
Note:
ACCESS TIME - Is the time taken to read the data from the disk to the main storage.
The access time consists of:
i.) Seek time - This is taken by the read/write head to locate the right track which
contains the required data.
ii.) Rotation delay time - This is taken for the drive motor to spin the read/write
head until the right contents come and align directly below the read/write head.
iii.) Data transfer time – This is time taken for data to be transferred to the main
storage.
a) Floppy disk/ Diskettes
- Is a thin, light flexible disk held in a protective cover.
- It is made of small flexible disk coated with iron oxide.
- Floppy disks are inserted in a floppy disk drive which has read/write head.
- Initial floppy disks were large in size but with smaller storage capacities. The two common
disks are 51/4 inch and 31/2 inch. Floppy disks are gradually becoming obsolete and being
replaced by CDs, Memory sticks and Flash disks.
- Each of these disks has low density (single sided) and high density (double sided) versions.
- For the single sided, data can only be recorded on one side; while for the double sided, data
can only be stored on both sides of the disk.
Internal structure of floppy disk
Sector

Tracks

Block

Prepared by Patrick Page 54 of 103


55

Advantages of floppy disk


1. They are cheap
2. Small and light weight
3. Exchangeable

Disadvantages of floppy disk


1. Easily damaged
2. Storage area is limited, maximum data stored is 1.44MB (megabytes).
3. Slower than hard disk in terms of data access.
4. Have short life span

b) Zip Disk
- Resemble floppy disk but have higher storage capacity
- They are slightly larger and thicker in size
- It can hold 250MB of data
- They come with portable external zip drive

c) Jaz Disk
- They are small portable disks with high storage capacity of about IGB to 2GB.
- They are used for storing large amounts of data.
- They come with portable external jazz drives.

Maintenance of Magnetic disks


1. Should be kept away from dust
2. Should be kept away from magnetic material/field because data can be lost.
3. Keep away from moisture.
4. Keep away from direct sunlight.
5. Should not drop them to avoid damage.
6. Keep away form excessive heat

MAGNETIC TAPES

Prepared by Patrick Page 55 of 103


56

- Magnetic tape is a ribbon of Mylar (plastic like) material coated with a thin layer iron
oxide.
- It resembles the ordinary music cassettes.
- Data is stored in block separated by inter-Record Gaps (IRG) which is left for the purpose
of stopping the tape.
- Examples of magnetic tapes are: Reel to reel tapes, Cassette tapes & Cartridge tapes.
Advantages of Magnetic Tapes
1. They are portable
2. They are cheap
3. Can be erased and re-used
4. Holds a lot of data in a compact space

Disadvantages of Magnetic Tapes


1. Very slow in accessing data since it uses serial access
2. Easily damaged by dust, heat, touch etc
3. The one RG is a waste of space of the storage area

OPTICAL DISKS (LASER DISKS)


1. These are disk on which data is recorded using a laser beam
2. A laser beam is a very strong concentrated light
3. The laser beam burns tiny holes (pit) into a thin shinny surface to record data
4. Examples of optical disks include: LS 120 super disk, Compact disk, DVDs disk,
Optical card, Optical tape, Photo CD.

a) L-S-120 Super Disk


- It resembles a floppy disk but uses optical technology to read data
- It has greater storage capacity and greater speed of data retrieval.

b) Compact Disk (CD)


- Hold large quantities of data and information one CD can hold 700 MB.
- They mostly store video, music, software and data requiring a lot of space.

Prepared by Patrick Page 56 of 103


57

Forms of CD
1. CD-ROM (Compact Disk Read Only Memory) - When data is recorded on them one
cannot add or change anything.
2. CD-R (Compact Disk Recorder) - They are initially blank and the user can record
data in it. NB: Once data has been written or recorded in it, it cannot be changed but
can be read or opened.

3. CD-RW (Compact Disk Re- Writable) - Unlike the CD-R, CD-RW allows the user to
record and erase information. It behaves like a floppy disk.
NB: Both CD-ROMs and CD-Rs are referred to as WORM. That is (Write Once Read Many)
because they allow the user to record data on them once but read/ open the data as many
times as possible.

c) DVD (Digital Video Disk)


- Also called Digital Versatile Disk.
- They resemble Compact Disk (CD) but have lighter storage capacity of up to 4.7 GB. They
are suitable for recording motion pictures e.g. video because they offer better sound and
picture quality than CD.

d) Optical Card
- It resembles Magnetic Ink Character Reader (MICR) but uses optical recordable stripe that
stores information.
- Mainly used in banks and companies.

e) Optical Tape
- It resembles a magnetic tape only that data is stored using optical technology.

f) Photo CD
- This is used to process photographic film or negative to produce and store high quality
photographs on a CD-R.

Advantages of Optical Storage Devices

Prepared by Patrick Page 57 of 103


58

1. Store high volume of data


2. Store data permanently
3. Access of data is faster
4. High qualities pictures and sounds
5. It is portable

Disadvantages of Optical Storage Devices


1. Expensive hardware and software for reading
2. Fragile that break easily
3. Very sensitive to dust, water, heat and scratches

FIXED STORAGE MEDIA


Are devices house within the system unit e.g. hard disk (WINCHESTER DISK)

Hard Disk (Winchester Disk)


It is made up of shiny rigid magnetic disk or plotters arranged vertically on a common axis
forming an imaginary cylinder.
Advantages of Hard Disk
1. Store data in large capacity
2. They are faster in terms of data transfer very malleable
3. They are cheap
Disadvantages of Hard Disk
1. They can suffer from hard disk clash resulting to loss of data
2. They are inflexible i.e. fixed in the system unit
3. Sensitive to dust, humidity, magnetism which can damage the data.

Precautions in Preventing Hard Disk Crash


1. Keep the disk away from dust and smoke. The smoke and dust particles causes
scratches on the surface of the disk as the heads read the data
2. .Switch off the computer using right procedure. Improper procedure would risk heads
scratches on rotating disks hence clutching them.

Prepared by Patrick Page 58 of 103


59

Flash Disk
- This is the most current storage device in the market it is removable media in the emerging
trends in storage devices
- It is a massive storage media move reliable and portable
- It is small in size and can store data from 250 MB, 512 MB,1 GB, 2GB, 4GB etc
POWER SUPPLY AND PERIPHERAL DEVICE INTERFACING
- Any Computer system needs to be connected to a mains power supply through a power
supply cable to the power supply unit or adapter for a notebook/ Laptop PC.

Power supply unit and adapter


- Though computers are connected to AC (Alternating Current) power supply, internal components
require DC (Direct Current) power.
- The work of the power supply unit and the adapter is to convert AC to DC.
Power Cable - is used to supply power to the motherboard and other internal devises inside the
system unit.

Peripheral device interfacing


- Peripheral device interfacing refers to connecting a peripheral device to a computer through ports
using either cables or wireless connectivity.
- A Port - is a socket on the system unit into which a cable from an external peripheral
device like mouse, keyboard is plugged to facilitate transfer of information between the
device and the CPU.
Interface Cable – links all peripheral devices to the motherboard.

TYPES OF INTERFACE CABLES


a) Parallel Interface Cable
- They transmit information simultaneously using a set of many conductors (wires).
- It uses 8 lines to transmit data at the same time, it is said to be an 8-bit parallel cable.
- The advantage of this cable is that they transmit data faster over a short distance.
- It connects to a parallel interface port commonly referred to as Line Printer (LPT).
- Parallel cables are used to connect printers, optical scanners and some removable storage drives
such as zip drive.

Prepared by Patrick Page 59 of 103


60

b) Serial interface Cable


- They transmit data one bit at a time.
- They are slower than the parallel cables.
- Although they are slower, they are more reliable than the parallel ports because they can support
data transmission to devices connected 15m away.
- Serial ports also known as COM or RS232 ports.
- Serial cables are generally used to connect devices such as the mouse, Modems and some printers.

c) Universal serial bus (USB) interface


- Universal serial bus is a new standard serial interface that is set to replace the conventional parallel
and serial cables and ports.
- Although it transmits only 1 bit at a time, it provides very high-speed and quality data transmission
over distances of approximately 5 metres.
- There are two types of USBs namely:
i) Low speed USB (1.1)
ii) Relatively faster high speed USB (2.0).
- A USB port can be used to connect as many as 127 peripheral devices to a computer daisy chained
to a single port known as the root hub.

USB Symbol

d) Small Computer System Interface (SCSI)


- They transmit data in parallel but are faster than the parallel cables.
- The advantage of the SCSI port is that it allows connection of multiple devices.

e) Personal System 2 (PS/2) Interface


- Originally, most computers used the 5-pin DIN to connect a keyboard to the system unit but the
smaller 6-pin mini-DIN (PS/2) interface has replaced this technology.
- Currently most desktop computers come with two PS/2 ports, one for mouse and the other for
keyboard.

Prepared by Patrick Page 60 of 103


61

PS/2 Port
5 – Pin DIN Port

f) Video Graphics Array (VGA) Interface


- They are used to connect monitors and data projectors.
- They are shaped like letter D with 15 Pins or 9 Pins.
g) Audio interface
Audio interface is used to connect speakers and microphone.
h) Firewire interface
- Firewire or IEEE 1394 has the same features as the USB but transmits data faster than USB.
- It is mostly used for streaming video from a digital video camera.
i) Infrared
- Infrared, also referred to as Infrared, Data Association (IrDA) is a wireless interface that uses infrared
to connect to infrared-enabled devices.
- Communication is over short distances and in-line of sight i.e. there should be no obstruction
between the communicating devices.
j) Bluetooth
- Bluetooth is also a wireless interface that uses short range radio broadcast to connect to any
bluetooth-enabled device.

Prepared by Patrick Page 61 of 103


62

Summary of Standard Port & Interface symbols

BASIC COMPUTER SETUP AND CABLING


The following precautions should be observed before attempting any setup activity is carried out:
1. Disconnect all devices from power source before starting to work on them.
2. Do not work on any peripheral device without the guidance of the teacher.
3. Never work alone because you may need help in case of an emergency.
4. Discharge any static electricity that might have built up on the hands by touching an earthed
metallic object and then wearing an antistatic wrist member. This is because your body can
hold as much as 200 volts of static charge that can damage sensitive components on the
motherboard.

Prepared by Patrick Page 62 of 103


63

Tools and Other Requirements


To assemble any computer system you may need the following:
- Screw drivers of different sizes
- Antistatic wrist member
- Pliers
- Device manuals
- Devices drivers (Device software) e.t.c.

Mounting Internal Devices


- External devices are connected to the motherboard through ports, but internal devices are
connected through slots and sockets.
- Before you mount any device, study the manufacturer's manual carefully.

Mounting Hard Drives and Optical Drives


- Hard disks and optical drives are connected using ribbon interface connectors referred to as
controllers.
- There are three types of controllers:
a) Enhanced Integrated Drive Electronics (EIDE)
b) Serial Advanced Technology Attachment (SATA)
c) Small Computer System Interface (SCSI)
- EIDE and SATA are commonly used on most personal computers while SCSI is used on servers.
- SATA is meant to be a replacement of both the older Parallel ATA (PATA) and EIDE because it is
more efficient and supports hot-swapping.
- Hot-swapping means that a drive can be removed or inserted while the computer is still on.
- Each EIDE controller supports up to two drives on a sing cable. This type of setup is called a
master/slave configuration because one controller directs the activities of both drives.

Prepared by Patrick Page 63 of 103


64

To mount Hard disk drive, proceed as follows:


1. Wear antistatic wrist member to discharge any static charge on the body.
2. Determine which drive will be the master and use the drive label information to determine which
jumper settings to use for a master or a slave.
3. Check that a free drive bay is available, slide the disk into that bay and screw it into place.
4. Ensure that there is a free power connector from the power supply unit and connect it to the drive.
5. Identify pin 1 as labeled on the drives socket and match it with the red or brown continuous line
of the ribbon cable. Most cables will only fit in one direction.
6. Connect the interface cable to the drive, then into the controller slot on the motherboard.
7. If installation is complete replace the casing cover.

Installing Floppy Drives


- Floppy drives are installed the same way as the Hard disk drives, only that there is no master/slave
configuration. However you can attach two floppy drives on the same ribbon cable. One floppy drive
will be automatically assigned letter A, while the other will be drive B.

Connecting External Devices


To connect a device to the system unit, you need to identify its port and interface cable.
1. Gently and carefully connect the interface cable of each device to the correct port and to the
device if it is not already fixed permanently
2. Connect the computer to the power source and switch it on.
3. Observe boot up information on the screen to see whether Power On-Self Test (POST) displays
any error message.
4. A successful boot means that the computer was properly set up.
Note: If the computer is completely new, programs have to be copied (installed) on the hard disk.

Prepared by Patrick Page 64 of 103


65

CHAPTER 7
COMPUTER SOFTWARE
- Software is a set of instructions that enables a computer to operate. It is also known as programs.

Classification of Computer Software


a) Classification according to purpose
b) Classification according to acquisition
c) Classification according to End-User-License

a) Classification According to Purpose


- They are primarily designed to manage the hardware resources or to help the user accomplish
specific tasks.
- Software according to purpose is further categorized into:
i) System software
ii) Application software.

i) System Software
- It manages the operation of the computer and makes sure that the computer works efficiently.
- It performs operations to avail computer resources to the user.
Its functions include:
1. Booting the computer and making sure that all the hardware elements are working properly.
2. Performing operations such as retrieving, loading, executing storing application programs.
3. Storing and retrieving files.
4. Performing a variety of system utility functions.

System software is further subdivided into four sub-categories namely:


1. Operating systems (OS)
2. Firmware.
3. Utility software.
4. Networking software.

Prepared by Patrick Page 65 of 103


66

1. Operating systems (OS)


- The OS is the main program that controls and supervises the execution of user applications and
hardware resources.
-It acts as a go-between (interface) between the applications and the computer hardware.
- It manages input, output and storage operations in a computer.
- Examples of common operating systems are:
- Microsoft Windows (2000, XP, Vista, 7, 8 etc)
- UNIX
- Linux
- Macintosh (Mac OS), etc

2. Firmware
- It is a combination of both the software and hardware recorded permanently on electronic chips.
- Firmware, also referred to as stored logic.
- It is a read-only memory chip (Contents cannot be changed) that is mounted or plugged into the
motherboard. Read-only memory means that its contents cannot be changed.
- It may hold an operating system, utility programs, language processors etc.

3. Utility software
- It is a special program that manages computer files, repairs computer problems and makes the
computer run more efficiently.
- It performs commonly used services like sorting, copying, file handling, disk management etc.
There are two basic types of utility software:
a) System-level utility - These help the user to work with the operating system and its functions. For
example, a utility software tells user when he/she enters a wrong command and gives suggestions how
the error can be corrected.
b) Application-level utility - These make application programs run more efficiently and smoothly.
Other common utility Programs are:

Prepared by Patrick Page 66 of 103


67

- Text editor – Used to type text without any special format. E.g Liner editor and
Screen editor.
- Linker and Loader – Linker accepts separately translated modules as inputs and
combines them into one logical module. Loader transfers the load module of the
linker from storage to main memory for execution.
- Language translator – Used to convert source code of a programming language to
object code.
- Sort & Merge utility – Sort utility arranges records in a file to predetermined
sequence. Merge utility is used to combine two or more input files into one output
file.
- Diagnostic tools - Used to detect and correct system errors. E.g Norton Utilities, PC
Tools, QAPlus, Dr. Watson etc.
4. Networking software
- It is used to establish communication between two or more computers by linking them using a
communication channels like cables to create a computer network.
- It enables exchange of data in a network as well as providing data security.
- Networking software may come as independent software or integrated in an operating system. An
example of networking software is novel netware.

ii) Application software


- Application software, also known as application packages are programs that are designed to help the
user accomplish specific tasks.
- Examples of Application software include: Word Processors, Spreadsheets, Desktop
Publishing (DTP), Databases, Computer Aided Design (CAD), Graphics software,
Presentation software, etc.

Prepared by Patrick Page 67 of 103


68

- The table below gives a summary of application packages.


Application software Examples Uses
Word Processors - Microsoft word, - Word perfect, Used for typing documents
- Wordpro, - Lotus, etc like letters.
Spreadsheets - Microsoft Excel, - Lotus 123, Used in performing
- Quattro Pro, - Visi Calc, - Sage, mathematical calculations.
- Quck Books, etc

Desktop Publishing (DTP) - Microsoft Publisher, Used for designing publication


- Adobe PageMaker, like News papers, Calendars
- Adobe InDesign, etc.
- Print Shop Ensemble,
- FrameMaker, - QuarkXpress,
- Interleaf, etc
Databases - Microsoft Access, - FoxBase Used for keeping records.
- Paradox, - MySQL, - Oracle,
- Sybase, - Informix, - Ingress,
- FoxPro, - Dbase, etc
Computer Aided Design - AutoCAD, Used in technical drawing
(CAD) - SolidWorks, etc
Graphics software - Corel Draw, - Photoshop, etc Used in designing and
manipulating graphics
Presentation software - Microsoft PowerPoint, Used to develop presentations
- Freelance Graphics, etc on slides or overhead
transparencies.

Prepared by Patrick Page 68 of 103


69

b) Classification According to Acquisition


- Software according to acquisition can be categorized into:
i) In-house developed software
ii) Vendor off-the-shelf software (Standard software)
i) In-house developed software
- These are programs that are uniquely designed and tailored to meet a particular user's needs.
- For example, a bank may decide to manage its banking operations using a unique program
developed by hired programmers to just meet the needs of that bank only and not other banks.
- These programs are not available in shops and once developed for a particular company/
organization/ user may not necessarily meet the needs of other users.

ii) Vendor off-the-shelf software/ Standard Software


- They are developed by software engineers, packaged and then made available for purchase through a
vendor, a distributor or directly from the developer.
- A developer may bundle more than one but closely related software into one package to form a suite
or integrated software as opposed to single-purpose software.
- An integrated software combines several general purpose applications into a single package.
- Examples of suites are:
- Lotus Suite
- Microsoft-Office
- Corel Office
Examples of single purpose are:
- QuickBooks
- Sage Pastel.
The term package is sometimes used to refer to these types of software that are packaged and sold
by vendors.
Advantages of standard software (Vendor off-the-shelf) over the in-house developed software
1. They can easily be installed and run.
2. They are cheaper than in-house developed software.
3. They are readily available for almost any task.
4. Minor or no errors since they are thoroughly tested.

Prepared by Patrick Page 69 of 103


70

5. They can easily be modified to meet user's needs.


Disadvantages of Vendor off-the-shelf software
1. They may have some features not needed by the user which may take extra storage.
2. They may require the user to change processes and hardware for compatibility which may
in turn be expensive.
3. They may lack some features required by the user.

c) Classification according to End-User-License (EUL)


- Software according to End-User-License (EUL) is categorized into:
i) Open source (non-proprietary software)
ii) Proprietary software
iii) Freeware.
i) Open source or non-proprietary software
- is software whose source code is made available to users for free.
- The users may use, modify and distribute the modified software.
- Examples include: Linux Operating system
ii) Proprietary software
- is software whose source code is hidden from users.
- Modifications are only made by the software manufacturer.
- Proprietary software may be licensed to users at a fee or applied freely.
- Examples include: - Microsoft Operating System
- Microsoft Office
- Adobe PageMaker
- Corel Draw Suite
iii) Freeware
- Is a form of Proprietary software which is freely made available to the user.
- Most freeware may be malicious, and therefore take caution when acquiring one.
Examples include: - Avast Free Edition Antivirus
- AVG Free Edition Antivirus

Prepared by Patrick Page 70 of 103


71

CRITERIA FOR SELECTING A COMPUTER SYSTEM


Before purchasing a computer, hardware or software resources, it is advisable to do a requirement
analysis of all the requirements necessary in order to balance between cost and user needs.
Requirements analysis involve, identifying user needs, hardware and software evaluating.

HARDWARE CONSIDERATIONS
There are a number of factors you need to put into consideration before acquiring a computer or
hardware accessories.
1) Microprocessor type and speed
- The processing power, speed and cost of a computer mainly depends the type of a microprocessor
and its clock speed.
- Consider an acceptable speed and meets the user requirements at a fair price.
2) Memory Capacity
- The memory capacity of a computer determines what operating system and application programs
can be installed.
- A computer might be having a Processor with very high speed, but it may perform poorly if it has
low memory capacity.
- When purchasing a Computer or memory modules for upgrade consider the following::
a) The type of memory package e.g. DDR, DDR II
b) Availability of empty memory slot
c) Capacity of memory modules e.g 128 MB, 256 BM etc
d) Compatibility with other Modules in case of upgrade
3) Warranty
- This is the agreement between the seller and the buyer that spells out the terms and conditions of
maintaining/ replacing the product after sale.
- A good warranty should cover:
a). Scope of cover e.g. Six months, one year, etc
b). Callout response and liability agreement – repair or replace cost.
c). Preventive maintenance.

Prepared by Patrick Page 71 of 103


72

4) Cost
- It is important to make a market survey from Newspapers, Magazines, Vendors to compare prices
before purchasing a computer.
- It is important also to know what kind of computer you are buying, is it a branded computer or a
clone.
- A branded computer all its components are from one manufacturer and it has not been tampered
with. Some brands are IMB, Compaq, HP etc.
- A Clone Computer its components have been assembled together perhaps from different
manufacturers. A clone may work well, but the components are not optimized to work with each
other.
- Clones are usually cheaper than Branded computers.
- The cost of a computer depends on:
a) The Processor Speed
b) The RAM Capacity
c) The Hard Disk Capacity
d) Whether it is a Clone or Branded
e) Its Portability – Laptops are more expensive than Desktops

5) Upgradability and Compatibility


The hardware bought must be compatible across platforms and easily upgradable.

6) Portability
Consider if the computer can be easily moved from one point to another. Laptops can easily be
moved around than Desktops.

7) User needs
Consider how the computer will be used and if some physically challenged people will use it, it must
have features for such. E.g Braille Keyboard fort the Blind.

8) Monitor

Prepared by Patrick Page 72 of 103


73

- Consider the type of monitor you need depending on size, resolution and technology used on it.
Whether it is CRT or TFT etc.

9) Multimedia capability
- Multimedia refers to the ability for a computer to process and output text, sound, video and pictures.
- A multimedia system will consist of speakers, CD/DVD drive, sound cards and a SVGA monitor.

Other considerations
These include available ports, wireless connectivity and the system unit design (Tower or Desktop).

SOFTWARE CONSIDERATIONS
The following factors should be considered when selecting software:
1) Authenticity
- This is the genuineness, validity and or legitimacy of an item.
- An original copy of software is accompanied by the developer’s license and certificate of
authenticity.
- It is illegal to produce pirated copies of somebody’s software.

2) Documentation
It refers to the manuals/ booklet prepared by the developer having details on how to install, use and
maintain the software.

3) User needs
User needs dictates the type of operating system and application programs one should have. E.g We
need Microsoft Office in schools for learning, Banks will require Accounting software for there
activities, Physically challenged people may require software to recognize voice input, etc.

4) Reliability and security


- A good software should have security mechanism to protect data from illegal access. E.g able to use
passwords and log-in accounts.
- Data security is paramount. Consider security features of the software.

Prepared by Patrick Page 73 of 103


74

5) User friendliness
- This is a measure of how easily the user can operate the computer.
- A good software will have the WIMP feature; i.e
W – Has a Window (A Frame like Interface)
I – Has Icons representing commands, Files or folders.
M – Has a Menu of commands to choose from
P – Use a Pointing device to select commands
6) Cost
The cost must be considered before buying a program against the benefits that it is likely to bring.
7) Compatibility and system configuration
A software product must be compatible with the existing hardware, operating system or application
programs and should be upgradable.
8) Portability
Software portability is the capability of the software to be installed in more than one computer.

Prepared by Patrick Page 74 of 103


75

OPERATING SYSTEM (OS)


- The OS is the main programme that controls the execution of user applications and enables
the user to access hardware or software resources.
- The OS therefore supervises all the other Programmes in the computer and manages access
to the hardware.

User (Runs Application Programs)

Application Software (Sends user requests to O.S)

Operating System (Receives and executes requests)

Hardware (Receives and performs O.S commands)

Resources Under The Control Of Operating System (O.S)


1. Processor
2. Main Memory (R.A.M)
3. Input/output devices and ports.
4. Communication devices and ports
5. Secondary storage devices

1. Processor
- It executes tasks called processes.
- The OS arranges the tasks according to priority and has the ability to stop a particular task
to allow the processor to service another one.

Prepared by Patrick Page 75 of 103


76

2. Main memory
- The OS determines which task will remain in main memory awaiting execution and which
one would be sent back to secondary storage to wait.
- The OS is usually installed in the hard disk and must be loaded to RAM during the booting
process.
NB: It is only a small special part of the OS that is loaded to RAM during booting process
because it contains the most necessary commands and procedures for the booting process.
This special part is called the kernel.

3. Input/output devices and ports


- The OS controls all the data input and information and output tasks.
- The OS controls the flow of data from the time of input to the time the user receives it as
information.
- It also ensures that the right data reaches the processor at the right time.
- The OS also defines the various input/output ports found on the computer e.g. the printer
port, U.S.B port e.t.c.

4. Communication devices and ports


- The OS controls the overall communication process between various tasks and computers.
- Communication can either be external or internal whereby the computer system sends and
receives messages from various devices and Programmes.
- External communication can be achieved by connecting an external device to a
communication port using cables or wireless communication.

5. Secondary storage devices


- The OS manages the storage and retrieval of data on secondary storage devices.
- It also utilizes the free space on hard disks to enhance the performance of the computer by
temporarily holding tasks on it that were in R.A.M ready for processing but have to wait
for sometime.

Prepared by Patrick Page 76 of 103


77

FUNCTIONS OF OPERATING SYSTEM (OS)


1. Job Scheduling
2. Job Sequencing
3. Error Handling
4. Input/Output Handling
5. Interrupt Handling
6. Resource control & Allocation
7. Memory Management

1. Job scheduling/ Processor scheduling


- The OS determines which task to be processed first and makes sure that the one which is
currently being processed is closely monitored to avoid wasting time in the processor.
- The OS schedules, controls and monitors the tasks submitted for execution to ensure the
most efficient processing.
- The O.S schedules jobs according to priorities; the higher the priority, the higher the
likelihood of being allocated CPU time.

2. Job sequencing
- The OS keeps a list of jobs or tasks currently being run and clocks them in and out of the
processor.
- It arranges these tasks in a particular order to make it easy for the processor to execute
them and to know how and when to fetch instructions for each task.

3. Error handling
- The OS provides error correction routines to ensure smooth operations within the C.P.U
and possibly make suggestions on how to correct the errors.
- The OS does this by monitoring the status of the computer system and performing error
checks on both the hardware and software.

4. Input/output handling
- The OS co-ordinates the input or output devices and other peripherals making sure that
data flows properly between them and sorting out any possible confusion.

Prepared by Patrick Page 77 of 103


78

- The OS also governs the input and output of data and the allocation, storage and retrievals.

5. Interrupt handling
- An interrupt is a break from normal sequential processing of instructions in a programme.
- The OS determines the cause of the interrupt and transfers the control to the most
appropriate programme.
- An external request causes the processor to stop executing current tasks and do something
else before returning to the control back to the process that was initially interrupted.
- Each hardware device communicates to the processor using a special unique number called
IRQ (Interrupt Request Number)

6. Memory management
- All the data and instructions must be temporarily held in the main memory before and after
processing.
- The OS therefore organizes the main memory into blocks of sizes called page frames.
- Processes are divided equally into pieces that can fit into frames called pages.
- The O.S swaps/ exchanges pages between the main memory and the secondary storage.
- When the hard disk is used to hold the pages it is referred to as a virtual memory.
- The OS constantly assigns the main memory storage pages to data and instructions.
- To access a piece of data or instruction the OS knows how to find each piece of data or
instructions as long as the correct address or the page is used.

7. Resource control and allocation


- Resource control and allocation determines which task uses a particular resource and at
what time.
- In order for the processor to recognize and prioritize the use and request for resources it
gives each resource a unique identification number called an Interrupt Request (IRQ).
- The O.S uses the IRQ number to identify the resource being requested.
- When two tasks request to use the same resource at the same time then one with higher
priority interrupt is granted control.
- When two or more tasks request for a single resource at the same time, a conflict occurs
leading to deadlock.

Prepared by Patrick Page 78 of 103


79

- Deadlock is a situation where a shared resource is being requested by two or more


processes at the same time.
- Conflict occurs when two or more resources have a common IRQ.
- NB: examples of resources that can be shared include: Processor, Memory areas protected
against modification, Read only files e.t.c.

TYPES OF OPERATING SYSTEM (OS)


OS can be classified according to:
1. Number of tasks
2. Number of users
3. User Interface

1. CLASSSIFICATION ACCORDING TO NUMBER OF TASKS


a) Single-Tasking Operating System (Single Program OS)
- The OS allows only one program at a time to run in the computer.
- This means that the user can only run one interactive program at a time. The user must exit
from the program before loading and running another program e.g. MS DOS (Microsoft
Disk Operating system)

b) Multi- Tasking Operating System (Multi-programming OS)


- It allows a single CPU to execute more than one program at the same time.
- The C.P.U switches its attention between programs as it receives requests for processing,
executing statements from one program then from another program using the concept of
giving a time slice for each program.
- This switching of attention is so fast that it appears as if the programs are being executed
simultaneously.
- Most Graphical User Interfaces are multi tasking e.g. Windows Versions
(95/98/200/2003/XP/Vista, 7), Linux e.t.c.

2. CLASSIFICATION ACCORDING TO THE NUMBER OF USERS


a) Single-User Operating System
- It allows only one user at a time to access the computer. e.g. MS DOS.

Prepared by Patrick Page 79 of 103


80

b) Multi-User Operating System (Multi-access operating system)


- It allows more than one user to interactively access a computer at the same time.
- Examples of these are: Novell, UNIX, Linux, and Windows NT/2000

3. CLASSIFICATION ACCORDING TO USER INTERFACE

- The term User Interface refers to the method of interaction between computer and the user
and determines how easily the user can operate the computer.

Currently, there are 3 main types of user interface:


a) Command line interface
- The user interacts with the computer by typing a command at the prompt found on a
command line.
- A computer reads instructions from the command line and executes them. After the correct
command is typed the user must press the enter key for the command to be executed.
Examples include: Earlier Versions of MS-DOS, PC-DOS, OS/2 AND UNIX.
- Command line interface operating systems have become unpopular because:
i. it’s difficult to remember the commands

ii. It cannot process complex graphics

iii. It does not make use of emerging hardware and software technologies.

b) Menu driven interface


- This type of interface provides the user with the list of options to choose from.
- This interface therefore is suitable for beginners who may have difficulties in recalling
commands.
- The user is presented with a single menu or a submenu or a sophisticated menu to choose
from. Examples include: DOS editor and DOS shell.

Prepared by Patrick Page 80 of 103


81

c) Graphical user interface (GUI)


- This type of interface represents commands as small pictures on the screen called icons.
- An icon is a graphical representation of a command or a file or a folder or an application
which is selected using a pointing device like a mouse.
- GUI has become the latest effort to make user interface more user friendly. Examples of
GUI are Linux, Apple Macintosh and Microsoft Windows etc.

Features of a User Friendly Operating System

The features are given an acronym WIMP:

a) W - Window – is a rectangular work area where different programs of files are


displayed.

b) I - Icon - is a graphical representation of a command or a file or a folder or an


application.

c) M - Menu – a list of options inform of commands to choose from.

d) P - Pointing Device – A device that enables someone to select icons of menus on


the display screen.

Factors to Consider when Choosing an Operating System

1. Hardware configuration of the computer such as memory size, hard disk capacity
and processor speed.
2. User friendliness of the operating system i.e. is it command-line or menu driven or
GUI.
3. Basic design of the computer i.e. is it an IBM compatible or an apple computer.
4. Availability in the market e.g. Microsoft windows based OS is very common.
5. The cost of the operating system.
6. Reliability i.e. can it run without crushing or hanging
7. The number of users it can support.
8. The application software intended for the computer
9. The documentation available.

Prepared by Patrick Page 81 of 103


82

DISK MANAGEMENT USING WINDOWS


Windows provides the user with tools that help the user manage storage devices and media.

These disk management activities include:

1. Formatting of disks

2. Scanning of Storage devices for problems

3. Defragmenting disks

4. Compressing disks

5. Scanning of Storage devices for viruses

6. Backing up data

7. Creating Startup (Boot up ) disk

8. Partitioning disks

1. Formatting Disks
Formatting a disk is the process of preparing a new disk for use by imprinting empty sectors
and tracks on the surface of the disk.

The formatting is done so that the OS can recognize and be able to access the disk.

Formatting deletes all the content in the disk.

Other drives which are not disks can also be formatted so as to create a file system on them.
A file system is an efficient way of organizing information on a storage device.

Microsoft Windows operating systems uses the following file systems:

 FAT (File Allocation Table)

 NTFS (New Technology File System)

Apple’s Mac Operating Systems uses the following file systems:

 HFS (Hierarchical File System)

 HFS + (Hierarchical File System Plus)

Prepared by Patrick Page 82 of 103


83

Procedure
1. Insert the disk into the drive
2. Double click my computer icon
3. Right click the drive then select format
4. Select the disk capacity e.g. 1.44 MB.
5. Select a File System e.g. FAT 32 or NTFS
6. Select the format type i.e. either quick erase or full.
7. Give the diskette an internal name (label)
8. Click start to begin formatting
9. Once the process is over click close.

2. SCANNING A STORAGE DEVICE FOR PROBLEMS


Windows has a disk management tool called the scan disk that helps the user checkup and
repair minor storage problems such as lost storage location or damaged surfaces.

Procedure
1. Double click My Computer icon.
2. Right click a drive of icon e.g. 3½ floppy disk (A:).
3. From the shortcut menu click properties then click Tools tab.
4. Click the check now button.
5. A prompt appears requesting the use of specifying scan disk options like whether
errors found should be corrected automatically.
6. Once scan disk is complete, windows will give a summary statistics on errors
encountered if any.

3. DISK DEFRAGMENTATION
Disk Defragmentation is the process of rearranging scattered folders and files in a storage
media.

The main reason of defragmentation is to speed up access to files and folders in storage
media.

Prepared by Patrick Page 83 of 103


84

Defragmentation is done using a disk defragmenter tool. This enables the read/write head not
to waste time looking for the same item allover the disk.

Pagination-the automatic incitation of page breaks.

Fragmentation is a condition in which files and folders are scattered allover in the storage
surface of the disk. This translates into wastage of time when retrieving data and also
wastage of disk space.

Fragmentation occurs naturally when you use a disk frequently especially when creating,
deleting or modifying files.

Procedure
1. Double click my computer icon.
2. Right click a disk drive icon e.g. 3 ½ floppy disk (A:)
3. From the short cut menu, click properties then click Tools tab
4. Click defragment now button then click defragment, a progress status bar is
displayed.
5. Wait for the process to complete then close the defragmenter.

4. DISK COMPRESSION
Disk Compression is the process of decreasing the amount space occupied by files and
folders stored in the disk.

This process creates more space in the disk for more files to be stored.

Microsoft Windows provides the user with two compression tools namely:

1. Compression agent
2. Drive space

Procedure
1. Double click My Computer icon
2. Right click a drive icon e.g. 3 ½ floppy disk
3. Click Properties, if you are using windows XP select the Compress drive to save disk
space check box and click OK to start the Zip process.

Prepared by Patrick Page 84 of 103


85

4. Confirm Attribute Changes; select the options that you want i.e. whether to zip the
folder only or the entire content and then click OK.

5. SCANNING FOR VIRUSES


A computer virus is a malicious programme aimed at conducting unwanted operations like
damaging disk, data or causing a malfunction.

Virus attack may result in complete system failure.

Computer viruses may be spread through storage devices or through e-mail and internet.

To protect a computer against virus attack special programs called antivirus software are
installed in the computer. The antivirus software checks the computer for known viruses and
eradicates them.

Some of the antivirus software available in the market are: Norton antivirus, PC- Cillin,
McAfee, AVG-Grisoft, NOD 32, Avira, Avast, Kerspasky, Quick Heal etc.

Procedure
1. Double click My Computer icon
2. Right click drive icon
3. Select the name of the antivirus program e.g. Norton, Kerspasky, Quick Heal
4. Follow the instructions displayed on the antivirus program to start scanning.

6. BACKING UP DATA
Backing up data is the creation of duplicate copies of data and programs especially on a
separate storage device.
The aim of backing up data is to avoid losing important data and program files in case the
original storage device or the computer fails.
It is therefore, a good practice to keep the back ups of data away from the computer room
to ensure security of the information incase of a calamity such as fire.
Microsoft Windows comes with a back up utility which enables the user to create copies.

Prepared by Patrick Page 85 of 103


86

Procedure of Creating a Back up


1. Click Start button, point to All Programs, Accessories, System Tools then
Click Back up.
2. Follow the on screen instructions (Wizard) to finish the process.

7. START UP DISK (BOOT UP DISK)


A Boot up disk is a disk that has booting instructions. The Boot up disk is usually a
floppy disk that is created using the operating system.
The Boot up disk is mainly used when the computer fails to boot or the computer has
problems in booting.
The Boot up disk allows the system to boot to an MS-DOS Command Prompt.
To boot up the computer using the boot up disk, insert the startup disk in the floppy drive,
then switch on the computer. The computer reads the boot up instructions from the disk
then displays a command prompt (A:>) that enables the user to type the commands in
order to diagnose the problem that might have led to the boot failure.

Procedure
1. Double click My Computer icon, then click Control Panel.
2. Select Add /Remove programme.
3. Click Startup disk, then select create disk.
4. The start up disk creation progress will be displayed.

8. PARTIONING A DISK
Partitioning refers to the process of dividing a large physical disk into two or more partitions
called logical drives.
A logical drive is drive that can be accessed as if it is a separate disk but in actual sense it is a
partition of one large physical disk. Each Partition or Logical drive is treated like a separate
disk drive.

Reasons for partitioning a disk

Prepared by Patrick Page 86 of 103


87

1. For the purpose of back up on the same disk. This means that back up in different
partitions so that if one partition fails the other will still be working
2. When the user intends to install more than one operating system on the same disk but
on a separate partition.
Before partitioning a disk, you need to know which file systems are used in your operating
system:
1. FAT (File Allocation Table) – was mainly used in MS DOS and Windows 95
2. FAT 32 (File Allocation Table 32 bit – was mainly used in Windows 98 and
Windows Me. Windows XP also uses FAT 32.
3. NTFS (New Technology File System) – is mainly used in Windows NT, 2000, XP,
2003, and Vista.

Procedure
Before partitioning a disk you must have a start up disk.
1. Insert the start up disk and switch on the computer
2. Select Start with CD ROM support if necessary
3. Let the computer boot to A:\> prompt
4. Type FDISK command and then press enter key
5. A prompt “Do you wish to enable a large disk supporting” appears. Press (Y) to
enable the computer support a large capacity of hard disk of more than 500 MB
otherwise press (N)
6. Choose 1 to create disk partition or logical disk drive.
7. From the sub menu displayed:
(i) Choose 1 to create primary DOS partition which is treated as the
bootable disk or drive C.
(ii) Choose 2 to create extended DOS partitions
(iii) Choose 3 to give your extended DOS partitions drive labels.

NB: Once you finish partitioning the disk, re-boot the computer for the changing to be
effected then format the drive created.

INSTALLING AND CONFIGURING WINDOWS OPERATING SYSTEM

Prepared by Patrick Page 87 of 103


88

Since OS is the supervisor for all other computer programs it must be installed into the
computer hard disk before installing any other program.
Installation refers to the process of copying program files into the hard disk.
Installation differs from copy paste process in that Installation is specifically meant to copy
executable files in a format that allows the computer to run the program.
To correctly install an OS, carefully study manufacturer’s documentation (readme or html
file) in order to get the correct information on installation procedures and system
requirements.
To install Windows 98 Microsoft recommends the following minimum requirements:
1. At least 486-66 MHz of processor
2. At least 16 MB of RAM
3. At least 170 MB of hard disk space
4. CD-ROM drive because windows 98 come with a CD-ROM.

Procedure for Installing Windows XP


We shall look at Clean Installation where a computer comes without an operating system.
To perform Clean Installation, the computer BIOS should be set up to boot from CD ROM
drive.
1. Insert the CD/DVD with the OS in the CD/DVD drive.
2. Turn on the computer. The rest of the installation is by wizard.
3. Partition the disk if necessary.
4. Windows XP copies all the files into the hard disk and reboot several times during the
installation process.
5. Once Windows XP is successfully installed, you may be required to set up User
accounts.

TROUBLE SHOOTING WINDOWS RELATED PROBLEMS

Prepared by Patrick Page 88 of 103


89

Trouble shooting refers to the process of diagnosing and trying to resolve or fix hardware and
software related problems.
When using Windows you may experience some problems such as:-
1. Failure to load the operating system during the booting process.
2. The computer hanging (not responding to commands) often.
3. Abnormal restarting to the computer
4. Displaying a blue screen with the message such as: fatal exception error as
occurred, e.t.c.
The above problems may result from:-
1. Invalid system disk – this occurs as a result of missing system files in the primary
partition needed to load the operating system. Ensure that the active partition is
selected as the start up drive or re-install the operating system.
2. Missing Operating System – Missing system files such as HIMEM.SYS,
CONFIG.SYS e.t.c. during the installation process. This may lead to boot failure. Use
start up disk or rescue disk or re-install the operating system to counter the problem.
3. Corrupted system registry - Registry is a database where Windows stores all its
System software and application software information installed in the computer. If the
registry is corrupted, repair it using emergency repair disk, or restore the registry back
up or re-install the operating system
4. Infection by malware – this may lead to failure to load the GUI desktop due to
missing or corrupted display drivers by viruses. The viruses may also attack the hard
disk boot sector and lead to boot failure. Locate the malfunctioning device in the
device manager and disable it or start the system in safe mode or scan for viruses.
5. Runtime problems – this hanging of the system where it does not respond to
commands. Restart the system by pressing the restart keys (Crtl+Alt+Del) in order to
display the Task manager and terminate non-responding programs. Shutdown the
computer and turn it on again if the problem above persists.
6. Hardware conflict or incompatibility caused by IRQ. IRQ conflict that is if two or
more devices are sharing the interrupt request number.
7. Insufficient system memory or damaged system memory.

Prepared by Patrick Page 89 of 103


90

HOW AN OPERATING SYSTEM ORGANIZES INFORMATION


Most operating systems organize information in three-tier hierarchy namely:

1. Files

2. Folders

3. Drives

1. FILES
A file is a collection of related data stored in a storage media and given unique name that
enables the operating system to identify it during storage and retrieval process.

A file must have the following details.

1. A unique name and an extension of three characters e.g. LOVE.DOC


LOVE is the file name while DOC is the extension. The file name and the
extension are separated by a Period/ Full stop (.).

2. The size, date, and the time the file was created or modified.

TYPE OF FILES
a) System files
b) Application files
c) Data files

a) System files
These are files that contain critical information necessary for the computer operation e.g.
System.ini, Autoexec.bat, command.com, msdos.sys, user.dat, system.dat etc

b) Application files
They are also called program files because they hold program or application files.

They have extension such as .exe which represents an executable files.

c) Data files
Data files are user files that contain users, created data. E.g. letter, reports, memos.

Prepared by Patrick Page 90 of 103


91

The table below shows files extensions and the file types.

Extension File type Description

.doc Data A Microsoft word document file

.tft Data A graphic file created using an application such as Adobe


Photoshop

.txt Data A plain text file created using note pad

.exe Application file An executable file that launches a particular application

.bat System file File containing a series of commands loaded during boot up

.sys System file System file that perform critical operations in a computer

2. FOLDERS (Directory)
A folder or a directory is a named storage location where related files are stored.

A folder enables easy access of files since they are grouped together.

A folder is meant to help the user divide a large storage media into small and manageable
storage locations.

All folders/ directories originate from a root directory/ root folder. A root directory/ root
folder is a special directory where all folders originate from.

A folder/ directory can be created inside another folder or directory; such a folder is called a
subfolder or a subdirectory.

3. DRIVES

A drive a way in which the operating system recognizes storage devices. Usually, drives are
given labels such as letters (A-Z) to identify.

The table below shows Microsoft operating system identifies drives.

Prepared by Patrick Page 91 of 103


92

Storage device Drive label Description

Floppy disk A and B Floppy drives are assigned letters A and B.

Hard disk C, D, E, F Any hard disk in the computer will take letter
starting from C – F.

Optical disks D, E, F, G Any CD/ DVD attached to the computer may


take any letter from D – Z.

Other removable devices D, E, F, Z Any removable drive attached to the computer


may take any letter from D – Z.

Network drives Logical Network drives takes D – Z depending on the


number physical drives attached

The figure below shows how information in the hard disk is organized. The folder system
is hierarchical and forms a tree like structure called a folder tree. To access a certain file
the right path should be followed from the root folder. In this case, the root folder is C:\>.
C:\>

Folder 1 Folder 2 Folder 3

Subfolder Subfolder Subfolder Subfolder Subfolder


1 2 3 4 5

File 6
File 8
File 1 File 2 File 3 Subfolder File 7
6
File 9
File 4

File 5 File 10

- For instance, to open File 1, follow the path: C:\Folder 1\Subfolder 1\File 1.

Prepared by Patrick Page 92 of 103


93

- To open File 5, follow the path: C:\Folder 2\Subfolder 3\Subfolder 6\File 5.

- Try the same to other files in the hierarchy.

SOME COMMON FEATURES IN WINDOWS OPERATING SYSTEMS


Microsoft Windows Operating system is one of the world’s most popular operating system
in use today. It has evolved gradually through upgrading of the previous versions in order to
make it more user-friendly. Some of the recent Microsoft Windows Operating systems
available in the market today include: Windows 2000, Windows NT, Windows XP,
Windows Vista, and Windows 7. Earlier versions include: Windows 95 and Windows 98.
All these versions of Windows have some features in common, which include:
1. They all have similar user structure interface.
2. They all support multiple tasks and multiple users.
3. Various versions of windows operating system automatically accept new
hardware once it is connected to the computer. This feature is called PnP
(Plug and Play).
4. They have ability to handle long file names of up to 255 characters including
spaces.

FEATURES OF WINDOWS DESKTOP


A desktop: A display on the computer screen that appears after the OS has been loaded in
the main memory of the computer.
The desktop consists of; Icons, task bar and the background.
Icons: Small pictures that represent commands, files, folders and storage locations. These
icons are manipulated by pointing devices.
Common icons on the desktop are: My Computer, My Documents, Recycle Bin,
Internet Explorer etc.
Task bar: A bar that enable one to easily switch between different programs that are
currently running. (Multi-tasking). A task bar consist of 3 parts:
Start button: Displays the start menu.
Task Manager: a plain strip that displays buttons of all currently running tasks.
System tray: Displays icons of applications/programs that automatically start and run in the
background. E.g. Time, calendar, anti-virus program, volume control, etc.
Background: The part of the desktop that appears behind the icons on the screen.
Prepared by Patrick Page 93 of 103
94

COMMON ITEMS AT THE START MENU


Programs/ All programs: Displays a list of all programs installed in the computer. This
menu has a small solid arrow called a side kick menu which when clicked on displays a list
of other menus.
Documents/ My Recent Documents: Displays a list of 15 most recently accessed files.
Settings/ control Panel: It provides tools from which the user can select and make changes
to the computer set up. N/B: Never tamper with this menu as you may interfere with the
computer's functionality.
Find/ Search: It enables the user to search for a file, folder, picture or even music incase the
user forgets the name and location.
Help/ Help & Support: One can learn more about the OS using this menu. It also gives
detailed information on how to troubleshoot a problem in case the computer fails to function
properly.
Run: It enable one to:
Install programs on the hard disk.
Open files and folders from a storage location.
Run programs from a removable storage media.
Log on/ log Off
Log on: Is a security measure that restricts one from accessing the computer unless one has a
user ID and password.
Log off: Exiting from one's user account in order to move to a log on window.
Shut down: Enables one to turn off , restart or hibernate the computer.
Turn off: Shuts down the OS so that one can safely turn off the computer.
Restart: Shuts down the OS and starts it again.
Standby: It puts your computer in low power state so that you can quickly resume windows
session. It does not switch off the computer.
Hibernation: Is where a computer stores whatever it has in memory to your hard disk and
then shuts down the computer but will then resume to its previous state when put on.

MANAGING/MANIPULATING FILES AND FOLDERS WITH THE OS

Prepared by Patrick Page 94 of 103


95

Files and folders can be managed or manipulated using Windows Explorer or My Computer
icon.
Either of the two lets you to view the arrangement of storage devices/ their storage locations,
files and folders.
Windows Explorer:
It displays files, folders and drives in a hierarchy/tree structure.
The computer tree has an upside down tree structure with the highest level being the
root (desktop).
To launch the Explorer window:
Click on START menu then click on ALL PROGRAMS.
Click on ACCESSORIES then select WINDOWS EXPLORER
The Explorer window appears that divides the window into two panes:
The left pane: Displays a tree structure consisting of storage locations i.e. drives, files and
folders.
The right pane: Displays a list of files and sub-folders contained an open
drive or folder.
In windows Explorer window, some items have a plus (+) or minus (-) sign
Plus sign: Means the item has some other lower items. Therefore to display them,
just click on the plus sign.
Minus sign: Means that all sub-folders in that level have been accessed. Click on
it to reduce (collapse) the tree.
My Computer icon
It displays the different drives and folders found in the computer. E.g. drives, control
panel and other resources.
To display files and folders in a particular drive:
Double click the drive icon e.g. C
A window appears having files and folders stored in the root of the drive.
Double click the folder to display its content.

i) Creating a folder/ directory


In windows:
Using My Computer icon, display the Explore window

Prepared by Patrick Page 95 of 103


96

From the folder tree on the left pane, select the location for the new folder.
From File Menu, click on NEW, then click on FOLDER. A new folder with a temporary
name NEW FOLDER appears.
Type a new name for the folder to replace the temporary name and press ENTER key.
In DOS:
The command MD (Make Directory) is used to create a directory.
C:\>MD directory name Then Press Enter e.g. C:\>MD jane Then Press Enter
To create a sub-folder, follow the same procedure, but choose a folder to be its storage
location.

ii) Opening a folder/ directory


In windows:
Using My Computer icon, display the Explore window
From the folder tree on the left pane, click the plus sign against the storage location that
contains the folder you wish to open.
From Folder tree, select the folder. Its contents will be displayed on the right pane.
In DOS:
The command DIR (Directory) is used to display/ view a list of files and directories.
C:\>DIR directory name Then Press Enter e.g. C:\>DIR Jane Then Press Enter

iii) Creating a new File


In windows:
Using My Computer icon, display the Explore window
From the folder tree on the left pane, select the location for the new file.
From File Menu, click on NEW, then click on TEXT DOCUMENT. A new file with a
temporary name appears on the right of Explore window.
Type a new name for the file to replace the temporary name and press ENTER key.
In DOS:
We create a file using either COPY CON of EDIT command.
COPY CON
At C-prompt, type COPY CON followed by the file name.

Prepared by Patrick Page 96 of 103


97

C:\>COPY CON filename. Extension Then Press Enter e.g. C:\>COPY CON
Job.DOC Then Press Enter
To create a document file called John with the text "Home is the sweetest place to
stay" type C:\>COPY CON John.DOC
Home is the sweetest place to stay
<Ctrl Z>
EDIT command
This is the latest version of DOS that has an editor screen for creating text files. It is a
full screen editor that allows one to create, edit, save and print files.
To create a file using EDIT
C:\>EDIT File name Then Press Enter

iv) Renaming a File/ folder


Is the changing the previous name of a file or folder to a new one.
In windows:
Using My Computer icon, display the Explore window
From the folder tree on the left pane, select file/folder you wish to rename.
From File Menu, click on RENAME,
Type a new name for the file/ folder and press ENTER key.

Prepared by Patrick Page 97 of 103


98

In DOS:
The command REN (Rename) is used to rename files or folders.
C:\>REN Old Name New Name Then Press Enter e.g. C:\>REN Jane Job Then
Press Enter

v) Saving changes to a File/ folder


Save: Saves a file with existing name
Save As: Saves a file with a different name and location.
To save a file:
Click on FILE, then SAVE AS
In the Save As dialog box, select where the document is to be saved.
Type its name the click on SAVE button.

vi) Deleting Files/ Folders


In windows, if you delete an item form the hard disk, it temporarily held in the recycle bin.
A recycle bin: Is a storage place where deleted objects (files, folders of programs) are
temporarily held. The items in the recycle bin can then be deleted completely or restored if
necessary.
Recycle bin is a default icon on the desktop which cannot be removed.
N/B: Never attempt to delete system and application files from the hard disk.
Items deleted from removable devices are never held in the recycle bin but are
completely lost.
To delete a file in windows
Using My Computer icon, display the Explore window
From the folder tree on the left pane, select file/folder you wish to delete.
From File Menu, click on DELETE.
A message appears on the screen prompting you to delete.
Confirm by clicking on yes.

Prepared by Patrick Page 98 of 103


99

In DOS:
The command for deleting a file is DEL (Delete).
C:\>DEL Job.txt, Then Press Enter Deletes a file in drive C called Job with the
extension .txt.
The command for deleting a folder is RD (Remove Directory)
e.g. C:\>RD Directory name Then Press Enter e.g. C:\>RD Jane, Then Press
Enter Deletes/ Removes a directory called Jane in drive C.

vii) Restoring Deleted Files/ Folders


To restore/empty deleted files/ folders from the recycle bin;
Double click the recycle bin on the desktop
Choose Empty the recycle bin or select the deleted files/folders then click on Restore All
items.
Choose Yes if prompted to empty the recycle bin.

viii) Copying/ Moving Files and Folders


Copying: Creating a duplicate file or folder in another storage location. The command
COPY/PASTE is used.
Moving: Changing the location of files and folders. The command CUT/PASTE is used.
When you cut or copy a file/ folder, it is temporarily held in storage location called the
Clipboard.
In windows:
To copy a file or folder
Using My Computer icon, display the Explore window
From the folder tree on the left pane, select file/folder you wish to copy.
From EDIT Menu, click on COPY,
Select the folder or drive you want it copied
From EDIT Menu, click on PASTE
A copy dialog box will be displayed showing that the information/ item is being copied in a
new location.
To move a file or folder
Using My Computer icon, display the Explore window

Prepared by Patrick Page 99 of 103


100

From the folder tree on the left pane, select file/folder you wish to move.
From EDIT Menu, click on CUT,
Select the folder or drive you want it moved to.
From EDIT Menu, click on PASTE
A move dialog box will be displayed showing that the information/ item is being moved to a
new location.
In DOS:
The command COPY is used to copy files or folders.
C:\>COPY Source File Destination drive
e.g. C:\>COPY Jane.txt A: Then Press Enter Copies a file Jane.txt which is in drive C to
drive A.
To copy a file to a folder e.g. jane.txt to a folder named Job in drive C, C:\>COPY Jane.txt
Job
ix) Changing Files and Folders
In windows, to change from one folder to another, simply click or select the folder you wish
to change to in the windows Explorer.
In DOS: We use CD (Change directory) command
C:\>CD Directory name , Then Press Enter

x) Sorting Files and Folders


Sorting: Arranging files and folders in a particular order. i.e either alphabetically, by size, or
date of last modification or creation.
To sort a file or folder:
Open the storage location that contains the files/folders you want sorted.
Under VIEW menu, point to Arrange Icon By
Choose the method of sort. i.e. by name, Date modified or size etc

xi) Selecting Multiple Files and Folders


If you want to manipulate multiple files and folders or multiple non-continuous files and
folders, you can select them by clicking each item as you hold down CTRL (Control) Key
or SHIFT key.
To select all files in an open folder:

Prepared by Patrick Page 100 of 103


101

Open the folder, then click EDIT menu and click on SELECT ALL.
OR
Press Ctrl+A on the keyboard.
xii) Searching for Files and Folders
It is used when one is not sure of the name of a file or folder and its location.
To search for files and folders:
From the START menu, click SEARCH.
In the Search dialog box, type the name of file or folder and its location
Click Search.

THE APPLICATION WINDOW


A rectangular area on the screen where text or graphical images are entered.
You can open an application file by:
Double clicking a file icon from the start menu / desktop.
Using My Computer icon, display the Explorer window, then from File menu, click on NEW
then Microsoft Word document.
Parts of the Application Window:
Title bar: A bar located at the top of the window that displays the name of the active
application program
It contains the title of the window's contents. The title bar has 3 buttons:
Minimize button: Reduces a window to an icon.
Maximize /Restore button: Stretches the window to cover the entire desktop or restore it to
its original size.
Close button: Exits an application.
Menu bar: A bar located below the title bar that provides a list of commands that can
manipulate a task. E.g. FILE, VIEW, EDIT, INSERT, FORMAT etc.
Tool bar: Are icons which are short cuts to menu commands. There are several tool bars
Formatting tool bar: Contain icons for formatting a document.
Standard tool bar: Contain icons for making certain changes to a document.
Picture tool bar: For working with pictures in a document.
Auto shape tool bar: working with preformatted shapes.
Table and borders tool bar: Working with table

Prepared by Patrick Page 101 of 103


102

Work area: An area where text or text or graphical objects are inserted. It has an insertion
pointer.
Status bar: An interactive strip at the bottom of the window that displays activities of the
programs that are currently running. E.g. Ready, Saving, Cursor position etc
Scroll bar: Are horizontal and vertical bars that the user drags to move upwards,
downwards, right or left of the document.
Rulers: Are vertical and horizontal onscreen rulers that enable the user to position text or
objects in their right position. It is used to adjust column width, change page margins, set
tabs etc. it is not visible: Click on VIEW, then on drop down menu click on RULER.

Prepared by Patrick Page 102 of 103


103

Prepared by Patrick Page 103 of 103

You might also like