You are on page 1of 40

[www.wisdomac.wordpress.

com]

fun

ICT
FUNDAMENTAL
BEGINNERS GUIDE

WISDOM C. UDO

[2013]
Fundamental of I nformation and communication technology

INTRODUCTION
Internet is another world of its own which accommodates all most the same
activities in the real world. Business are done on the internet, it has government
(known as internet government) tax force, shop or office (known as website)
companies and schools (known as online companies and schools) etc.

There are so many things to discover over the internet, that’s why it is important
for you to explore internet to get more information and to be aware of the
world’s latest invention in technology. During this period I taught personalities
of different profession. This book is meant to answer some of the question that
has been asked by my student and others in search of knowledge about the
internet.

This book is not only a product of my theoretical knowledge of information


technology. It is also accumulation of practical experience in the field of
information technology
As an I T instructor; I have also worked as cyber café administration, manager
in several I T centers. And an online marketer, I work with sitesell.com
(www.sitesell.com) also known as SBI. We offer online training on how to, and
help you built online business that works.

The advice I give my student is; learn all the things you can, ignore no
information or knowledge that come across you. For no knowledge is vain, if
not presently important, it shall later be. I promise you that you’re going to
enjoy this book a lot because it is loaded with vital information about net. I
know you can’t miss it!

Beginners Guide
2
Fundamental of I nformation and communication technology

PART I.1

INFORMATION TECHNOLOGY
Information technology (IT) is defined: as any technology that helps to produce,
manipulate, store, communicate and disseminate information

Information technology as define by information technology Association of


American (ITAA), “is the study, design, development, implementation, support
or management of computers based information system particularly software
application and computer hardware”.

I T deals with use of electronic computers and computer software to convert,


store, protect, transmit and safely retrieve information.

The canopy of information technology covers many fields. And IT professional


performs a variety of duties such ranges are:

1. Data Management
2. Computer Networking
3. Engineering Computer hardware
4. Data and Software Design
5. Management and Administration of entire systems.

IMPORTANCE OF IT IN INDIVIDUAL LIFE


It is impossible or difficult to imagine a development or advance
Society/country without considering information technology. It is rear to find a
field not influenced by IT.

These are some importance of IT


1. IT Training
2. It offers opportunities for true creativity
3. It enables a person to make a positive impact in the world etc.

IT Training
This will provide you with a foundation of knowledge, problem solving and
Logical reasoning that will serve as a competitive advantage to you in your
Career and whatever field you choose.

IT Offers opportunities for true creativity


It gives you the ability to create a highly creative activity, and it also support

Beginners Guide
3
Fundamental of I nformation and communication technology

Creative work in many other fields


It enables you to make positive impact in the world through research,
Environmental monitoring and protection (security) and also in engineering,
Business, entertainment and education etc.

Importance of Information Technology In Business

In business, information technology plays a major role in the management and


upkeep of huge amount of information. It helps in creating information as well
as aids in information exchange. Due to this, business can work with their
clients in any part of the world, as though they were in the same building.
There are many businesses which are in need of the software packages for
satisfying their operational as well as functional needs. Therefore, information
technology is useful in ensuring the smooth functioning of all departments in a
company such as the human resource department, finance department,
manufacturing department and also in security related purposes.

Importance of Information Technology in Education


Importance of information technology in education sector is well known.
Information technology helps the students as well as the teachers in studying the
course material easily because of fast access. Studying the subjects with the help
of online libraries and dictionaries has made grasping and increasing the
knowledge easy for the students. The inclusion of information technology in the
syllabus in schools, colleges and universities has helped them in grasping the
subject well and getting their basics cleared.

Importance of Information Technology in Management


Importance of Information Technology in Education is quite significant. It helps
the mangers in adapting to the new business processes and also to predict the
possible impact of new technologies. The managers can benefit fro the
efficiently prepared computer packages and the electronically stored
confidential information. With just a single click of the mouse, they can have
the relevant information in front of their screen. However, in order to be able to
handle these software packages in a better way, the managers should have
undergone quality training in Information Technology.

In the field of medicine, information technology plays a major role in various


diagnostic procedures such a magnetic Resonance Imaging (MRI), scans, and
other tools used to diagnose major conditions. These days, there are computer-
aided surgeries that are being performed as well.

Beginners Guide
4
Fundamental of I nformation and communication technology

In the fields of science and engineering, information technology plays an


important role in the collection and exchange of demographic data, weather
reports, behavioral science and numerous other areas where automation and
quick work is needed.

Information technology has contributed to various security systems for homes


as well as businesses, to a large extent. More complex security systems are
being used in the cases of government agencies and military bases.

Public databases and secret identification of people is now maintained with the
help of information technology. In fact, a large number of criminals are traced
with the aid of modern technology, since the exact location of people can be
traced by tracking out the computer that they had used.

GPS or Global Positioning System is one facet of information technology that


is fast catching up with more and more people these days. Using this
technology, people can not only track out travel routes, but can also recover
steal items, such as cars, mobile phones, etc.

Entertainment sector Information technology is extremely important to the


entertainment sector. Numerous special effects, graphical additions and
innovation multimedia application are being used these days in movies. All this
has been made possible because of information technology.

Nowadays the job outlook for people interested in this field is very good. With
data security and server specialists are among the highest paid in the field, those
with the needed skills and a keen interest in IT stands to earn a substantial
annual income.

With the increasing concern for data storage and management, along with the
security issues that most companies and corporation are facing, a career in IT is
an excellent choice for those who posses mathematical and strategic planning
skills.

Do not forget that IT deals with use of electronic computers and computer
software to convert, store, protect and process, transmit and safely retrieve
information which is known as ICT. But I only deal on networking & internet
use, cyber café administration in this Guide.

Before we go over to internet, we need to start from networking which will lead
us into exploring the internet.

Beginners Guide
5
Fundamental of I nformation and communication technology

SELF ASSESSMENT EXERCISE


1. What are the 5 professional area of Information Technology?
2. Give the definition of Information Technology?
3. Give 5 importance of IT?

Beginners Guide
6
Fundamental of I nformation and communication technology

PART I.2

NETWORK

A network is any collection if independent computers and other devices that


communicate with one another over a shared network medium.

Wireless Network
Wireless network is a collection of an independent computer or device to
communicate with one another over share wireless network with the help of
wireless modem and router or wireless card, wireless USB.

LANS (Local Area Networks)

LANs: are networks usually confined to a geographic area such as a single


building or a college campus. This type of network has antenna that is mounted
on a pole or on the roof of a building. ICP/IP (for UNIX, Windows NT. LANs
can be small, linking as few as three computer, but often link hundreds of
computers used by thousands of people. The development of standard network
networking protocols and media has resulted in worldwide proliferation of
LANs throughout business and educational organizations.

WANs (Wide Area Networks)

Wide Area Networks is a network that combines multiple LANs, which are
geographically separated.

This is accomplished by connecting the different LANs using services such as


dedicated leased phone lines, dial-up phone lines (both synchronous and
asynchronous), satellite links, and data packet carrier services. Wide area

Beginners Guide
7
Fundamental of I nformation and communication technology

networking can be as simple as modem and remote access server for employees
to dial into, or it can be as complex as hundreds of branch offices globally
linked using special routing protocols and filters to minimize the expense of
sending data sent over vast distances.

Intranet

An intranet is a private network utilizing Internet-type tools, but available only


within that organization. Advancements made in browser-based software for the
Internet, many private organizations are implementing intranets. For large
organization, an intranet provides an easy access mode to corporate information
for employees.

Ethernet

Ethernet is the most popular physical layer LAN technology in use today. Other
LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface
(FDDI), Asynchronous Transfer Mode (ATM) and Local Talk.

Ethernet is popular because it strikes a good balance between speed, cost and
case of installation. These benefits, combined with wide acceptance in the
computer marketplace and the ability to support virtually all popular network
protocols, make Ethernet an ideal networking technology for most computer
users today.
The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet
standard as IEEE Standard 802.3. This standard defines rules for configuring an
Ethernet network as well as specifying how elements in an Ethernet network
interact with one another. By adhering to the IEEE standard, network equipment
and network protocols can communicate efficiently.

Protocols
Network protocols are standards that allow computer to communicate. A
protocol defines how computers identify one another on a network, the form
that the data should take in transit, and how this information is processed once it
reaches its final destination.

Protocols also define procedures for handing lost or damaged transmissions or


“packets.” Windows 95 and other platforms), IPX (for Novell Netware), Decent
(for networking Digital Equipment Corp. computer), Apple Talk (for Macintosh
computer), and NetBIOS/NetBEUI (for LAN Manager and Window NT
networks) are the main types of network protocols in use today.

Beginners Guide
8
Fundamental of I nformation and communication technology

Although each network protocol is different, they all share the same physical
cabling. This common method of accessing the physical network allows
multiple protocols to peacefully coexist over the network media, and allows the
builder of a network to use common hardware for a variety of protocols. This
concept is known as “protocol independence,” which means that device that are
compatible at the physical and data link layers allow the user to run many
different protocols over the same medium.

Topologies

A network topology is the geometric arrangement of nodes and cable links in a


LAN, and is used in two general configurations: bus and star. These two
topologies define how nodes are connected to one another. A node is a printer.
A node can also be a piece of networking equipment such as a hub, switch or
router.

A bus topology consists of nodes linked together in a series with each node
connected to a long cable or bus. Many nodes can tap into the bus and begin
communication with all other nodes on that cable segment. A break anywhere in
the cable will usually cause the entire segment to be inoperable until the break is
repaired. Examples of bus topology include 10BASE2 and 10BASE5.

Star topology, in which a central computer controls access. Generally, a


computer is located at one end of the segment, and the other end is terminated in
central location with a hub. Because UTP is often run in conjunction with
telephone cabling, this central location can be a telephone closet or other
backbone.

The primary advantage of this type of network is reliability, for if one of these
‘point-to-point’ segments has a break; it will only affect the two nodes on that
link. Other computer users on the network continue to operation as if that
segment were nonexistent.

Beginners Guide
9
Fundamental of I nformation and communication technology

Network Interface Cards

Network interface cards, commonly referred to as NICs, and are used to connect
a PC to a network. The NIC provides a physical connection between the
networking cable and the computer’s internal bus. Different computers have
different bus architectures; PCI bus master slots are most commonly found on
486/Pentium PCs and ISA expansion slots are commonly found on 386 and
older PCs. NICs come in three basic varieties: 8-bit, 16bit, and 32-bit. The large
the number of bits that can be transferred to the NIC, the faster the NIC can
transfer data to the network cable.

Many NIC adapters comply with Plug-n-Play specifications. On these systems,


NICs are automatically configures without user intervention, while on non-
Plug-n-Play systems, configuration is done manually through a setup program
or Dip switches.

Cards are available to support almost networking standards, including the latest
Fast Ethernet environment. Fast Ethernet NICs are often 10/100 capable, and as
for the speed, it will automatically set to the appropriate speed. Full duplex
networking is another option, where a dedicated connection to a switch allows a
NIC to operate at twice the speed.

Networking and Communication Cables

CAT 5, CAT 6 and CAT 7 network cables for both internal and external
applications.

RS-232, RS-422, RS-449, RS-485, RS-530,


V.11, V.35, x.21 molded cable

RS-232, RS422, RS-449, RS-485, RS-530


V.11, V.35, x.21 custom assembled cables.

Beginners Guide
10
Fundamental of I nformation and communication technology

T1 Network Cable E1 Network Cables

Network Cable Applications

Backbone network cabling for networks such Gigabit Ethernet.

Interconnect cable from DCE/DTE devices routers, switches and hubs.

How to installed network

To start the installation; you have to choose the type of wiring you want to use
for your installation there are two major types mainly surface installation Trunk
installation.

Surface is one, in which the cables are installed with clip while trunk is installed
in a pipe.

But it is recommended that you use trunk, to safe guild the installation from
damages caused by external force.

This is example of trunk

Now, let’s get going;

We are to install wireless network but, mind you, is the same as when you are
installing LAN network. The only difference is that, in LAN you draw the cable
from outside antennal to you router.

Here is ipNX Wireless network router;

The image at left is Cisco route; right is ipNX soma port 300 which is the
network device; the second image is Cisco wireless USB.

This is a network socket. It is used to connect the network cable direct to


system.

Beginners Guide
11
Fundamental of I nformation and communication technology

Because the installation is for multiple systems for us to achieve it, there is need
for Ethernet switch

One image: when off & on.

After installing all the necessary accessories

To power it:



On your light


Connect the network cable each to allocated system


Power all system and allow then to boot finished


On your server which is you network device and the router
Wait a while.

Wow! Is working, enjoys your service.

What of if you are not using it for cyber café?

Whether is for cyber café or your home use, the installation is the same.

The installation is almost on the base wall;

This is the connection; you can install either on downside or on topside of the
wall. It’s based on where is more secured

But if you do not want to use networking cables then use USB.

So how do you install the USB type?

Here we go,

At the above diagram we have Cisco router and USB

This router and USB comes with installation software (CD)

Install the router in the system first followed by USB

After the installation, slot the USB

Make sure the router is on, click on the network icon

Beginners Guide
12
Fundamental of I nformation and communication technology

When it displays, press refresh icon on your router then go back to the system
and

Click connect wait a little, it will pick up if not

Go to control panel and choose the connection and activate that’ all.

SELF ASSESSMENT EXERCISE


1. What do you understand by Network?
2. Explain three types of network?
3. What do you understand by the following?
i. Topology
ii. Protocol
iii. Ethernet
iv. Intranet
v. NIC

Beginners Guide
13
Fundamental of I nformation and communication technology

PART II.1
World Wide Web

The World Wide Web, abbreviated as WWW and commonly known as the
Web, is a system of interlinked hypertext document accessed via the Interne.
Using concepts from earlier hypertext systems, British engineer and computer
scientist Sir Tim Berners- Lee, now the Director of the World Wide Web
Consortium, wrote a proposal in March 1989 for what would eventually become
the World Wide Web. In 1990, they proposed using “HyperText to link and
access information of various kinds as a web of nodes in which the user can
browse at will” and released that web in December.

Account of the World Wide Web


This NeXT Computer used by Tim burners-Lee at CERN became the first web
server.

Burners-Lee used a NeXT Computer as the world’s first web server and was use
to write the first web browser, World Wide Web, in 1990. By Christmas 1990,
Berners-Lee had built all the tools necessary for a working web: the first web
browser (which was a web editor as well); the first web server; and the first web
pages, which described the project itself. On August 6, 1991, he posted a short
summary of the World Wide Web project on the alt. hypertext newsgroup this
date also marked of information over the Internet through an easy-to-use and
flexible format.

Although the two term are sometimes conflated in popular use, World Wide
Web is not synonymous with Internet. The terms Internet and Word Wide Web
are often used in everyday speech without much distinction. However, the
Internet and the World Wide Web are not the same.

The Internet is a global system of interconnected computer networks. In


contrast, the Web is one of the services that run on the Internet. Web is an
application running on the Internet. This IP address is necessary to contact the
Web server. The browser then requests the resource by sending an HTTP
request to the Web server at that particular address. Most Web pages will
themselves contain hyperlinks of other related pages and perhaps to downloads,

Beginners Guide
14
Fundamental of I nformation and communication technology

source documents, definitions and other Web resources. Such a collection of


useful, related resources, interconnected via hypertext links, is what was called
a “Web” of information.

WWW prefix

Many web addresses begin with www, because of the long-standing practice of
naming Internet hosts (servers) according to the services they provide. The
HTTP network protocol is fundamental to the way the World Wide Web works,
and the encryption involved in HTTPS adds an essential layer if the debut of the
Web as a publicly available service on the Internet.

Web Server – The web server utilizes the Hypertext Transfer Protocol (HTTP)
server program. In other words, it accepts and delivers HTTP programs from the
network computer in order to accept and respond to client requests and
instructions. An error message is forwarded by the web server in order to
communicate any possible problem via the Hyper Text Markup Language
(HTML).

FTP Server – This is a server that allows you to share and transfer files with
other interconnected computers, which form a network under the FTP server.

Game Server – Most of you who are or have been student must have had the
pleasant experience of downloading forms on the Internet instead of wasting
time queuing up to buy the forms. The server that allows your computer to
receive the concerned application forms is known as the Application server.

The World Wide Web had number of differences from other hypertext system
that were then available. The Web required only unidirectional links rather than
bidirectional ones, Connected by the existing internet, other websites were
created around the World Wide Web which enables its spread. Many formal
standard and other technical specifications define the operation of different
aspects of the World Wide Web, the Internet, and computer information
exchange. Many Consortium (W3C), headed by Berners-Lee, but some are
produced by the Internet Engineering Task Force (IETF) and other
organizations.

Beginners Guide
15
Fundamental of I nformation and communication technology

Web accessibility

Access to the Web is for everyone regardless of disability including visual,


auditory, physical, speech, cognitive, or neurological. Accessibility features also
help others with temporary disabilities like a broken arm or the aging population
as their abilities change. The web is used for receiving information as well as
providing information and interacting with society, making it essential that the
web be accessible in order to provide equal access and equal opportunity to
people with disabilities.

Tim Berners-Lee once noted, “The power of the Web is in its universality.
Access by everyone regardless of disability is an essential aspect.” Many
countries regulate web accessibility as a requirement for websites. International
cooperation in the W3C Web Accessibility Initiative led to simple guidelines
that web content authors as well as software developers can use to make the
Web accessible to persons who may or may not be using assistive technology.

Internationalization

The W3C Internationalization activity assures that web technology will work in
all languages, scripts, and cultures.

According to a 2001 study, there were massively more than 550 billion
documents on the web, mostly in the in the invisible confidential information
such as password or bank details are to be exchanged over the public internet. In
overview, RFC 2396 defines web URLs have the following form:

<Scheme>://<authority><path>?<query>#<fragment>

Here <authority> is for example the web server (like www.example.com), and
<path> identifies the web page, from just’/’ for the root default page to longer
paths in the form common on Unix-like computers. The web server processes
the <query>, which can be data sent via a form, e.g., terms sent to a search
engine, and the returned page depends on it.

Finally, <fragment> is not sent to the web server. It identifies which portion of
the page the browser initially shows.

In English, www is pronounced by individually pronouncing the name of


character (double-u double-u double-u). Although some technical users
pronounce in dub-dub-dub this is not widespread. The English writer Douglas
Adams once quipped in the Independent on Sunday (1999): “The World Wide is

Beginners Guide
16
Fundamental of I nformation and communication technology

the only thing I know of whose shortened form takes three times longer to say
than what it’s short for

Tim Berners-Lee’s web-space states that World Wide Web is officially spelled
as three separate words, each capitalized, with no intervening hyphens.

Standard

Wed standards

Web operating system

Web science

Web search engine

Web or deep Web: A more recent study, which used Web searches in 75
different languages to sample the web, determined that there were over 11.5
billion Web pages in the publicly index-able Webs as of the end of January
2005.

Standard guideline for ideal Web response time:



Ideal response time.
Unacceptable response time.

If a user revisits a Web page after only a short interval, the page data may not
need to be re-obtained from the source Web server. Almost all web browsers
cache recently obtained data, usually on the local hard drive. Caching helps
reduce the amount of Web traffic on the Internet. This helps reduce page
download times and lowers demands on the web server.

There are other components of Internet that can cache web content. Internet
banking and news sites frequently use this facility.

Deep web

Beginners Guide
17
Fundamental of I nformation and communication technology

Web 1.0

Web 2.0

Web accessibility

Web archiving

Web browser

Web directory

SELF ASSESSMENT EXERCISE


1. Write a short note on the following:
2. www
3. Web Server
4. FTP Server
5. Game Server

Beginners Guide
18
Fundamental of I nformation and communication technology

PART II.2

Internet

The Internet is a global system of interconnected computer networks that use


the standard Internet protocol Suite (ICT/IP) to serve billions of users
worldwide. It is a network of networks that consists of millions of private,
public, academic, business, and government networks of local to global scope
that are linked by a broad array of electronic and optical networking
technologies and facilitate data communication service such as remote login,
file transfer, electronic mail, worldwide information research, the World Wide
Web and newsgroups

The Internet carries vast array of information resources and services, most
notably the inter-linked hypertext documents of the World Wide Web (WWW)
and the infrastructure to support electronic mail.

Most traditional communication media, such as telephone and television


services, are reshaped or redefined using the technologies of the Internet, giving
rise to services such as Voice over Internet Protocol (VoIP) and IPTV.
Newspaper publishing has been reshaped into web sites, blogging, and web
feeds. The Internet has enabled or accelerated the creation of new forms of
human interactions through instant messaging, Internet Forums, and social
networking sites.

Only the overreaching definitions of the two principles name spaces in the
Internet, the ‘internet protocol address space’ and the ‘Domain name System’,
are direct by a maintainer organization, the Internet Corporation for assigned
Names and Numbers (ICANN).

Terminology

Beginners Guide
19
Fundamental of I nformation and communication technology

The term the Internet, when referring to the Internet has traditionally been
treated as a proper noun and written with an initial capital letter. There is a trend
to regard it as a generic term or common noun and thus write it as “the internet
without the capital. The word Internet can be shortened to Net.

Internet vs. Web

The terms Internet World Wide Web are often used in everyday speech without
much distinction. However, the internet and World Wide Web are not the same.
The Internet is a global data communications system.

On 6 August 1991, CERN, a PAN European organization for particle research,


publicized the new World Wide Web project. British scientist Tim Berners-Less
invented the Web in 1989. Meanwhile, over the course of the decade, the
Internet successfully accommodated the majority of previously existing public
computer networks (although some networks, such as FidoNet, have remained
separate). The estimated population of Internet users is 1.67 billion as of June
30, 2009.

Protocols

Internet Protocol Suite

The Internet Protocol Suite is the set of communications protocol used for the
Internet and other similar networks. It is commonly also known as TCP/IP,
named from two of the most important protocols in it: the Transmission Control
Protocol (TCP) and the Internet Protocol (IP), which were the first two
networking protocols defined in this standard.

Internet Protocol Suit, like many protocol suites, is constructed as a set of


layers. The TCP/IP model consists of four layers (RFC 1122). In 1975, a two-
network TCP/IP communications test was performance between Stanford and
University College London (UCL). In March 1982, the UAS Department of
Defence declared TCP/IP as the standards for all military computer networking.

However, the Internet Engineering Task force from the four layers defined in
RFC 1122 has never altered the Internet protocol stack. RFC 3439, addressing
Internet architecture, contains a section entitled: “Layering Considered
Harmful”. Most computer operating systems in use today, including all
consumer-targeted systems, include a TCP/IP implementation.

Beginners Guide
20
Fundamental of I nformation and communication technology

The responsibility for the architectural design of the Internet software systems
has been delegated to the Internet Engineering Task Force (IETF). The principal
methods of networking that enable the Internet are contained in specially
designated RFCs that constituted the Internet standards. The Internet standards
describe a framework known as the Internet Protocol Suite.
At the top is the Application Layer, the space for the application-specific
networking methods used in software applications, e.g., a web browser program.
Below this top layer, the Transport layer connects applications on different
hosts via the network (e.g., client-server model) with appropriate data exchange
methods.
Underlying these layers are the core networking technologies, consisting of two
layers. The Internet Layer enables computers to identify and locate each other
via Internet protocol (IP) addresses, and allows them to connect to one-another
via intermediate (transit) networks. The most prominent component of the
Internet model is the Internet Protocol (IP), which provides addressing
named from two of the most important protocols in it: The Transmission control
Protocol (ICP), and the Internet Protocol (IP), which were the first two
networking protocols defined in this standard.

The cellular routers allow user to connect to the Internet from anywhere there is
a wireless network supporting that device’s technology. Social and Political
collaboration is also becoming more widespread as both Internet access and
computer literacy other computers and information stores easily, wherever they
may be across the world.

Information

Many people use the term Internet and World Wide Web, or just the Web,
interchangeably, but the two terms are not synonymous. URIs (Uniform
Resource Locator) allow providers to symbolically identify services and clients
to locate and address web servers, file servers, and other databases that store
documents and provide resources and access them using store the Hypertext
Transfer Protocol (HTTP), the primary carrier protocol of the Web. HTTP is
only one of the hundreds of communication protocols used on the Internet. Web
services may also use HTTP to allow software systems to communicate in order
to share and exchange business logic and data.

World Wide Web browser software, such as Microsoft’s Internet Explorer,


Mozilla Firefox, Opera, apple’s safari, and Google Chrome, let user navigate
from one web page to another via hyperlinks embedded in the document. IP
enable internetworking and essentially establishes the Internet itself.

Beginners Guide
21
Fundamental of I nformation and communication technology

It was designed to address up to ~4.3 billion (10 9) Internet hosts. Most modern
computer operating systems are already converted to operate with both versions
of the Internet Protocol. The internet structure and its usage characteristics have
been studied extensively. It has been determined that both the Internet IP
routing structure and hypertext links of the World Wide Web are examples of
scale-free networks. Similar to the way the commercial Internet providers
connect via Internet exchange points, research networks tend to interconnect
into large subnetworks such as GEANT, GLORIAD, Internet2 (successor of the
Abilence Network), and the Uk’s national research and education network
JANET. These in turn are built around smaller networks.

The Internet is a globally distributed network comprising many voluntarily


interconnected autonomous networks. ICANN is the authority that coordinates
the assignment of unique identifier for use the Internet, including domain names
Internet protocol (IP) addresses, application port numbers in the transport
protocols, and many other parameters. On November 16, 2005 the World
Summit on the Information Society, held in Tunis, establishes the Internet
Governance Forum (IGF) to discuss Internet-related issues.

The Internet is allowing great flexibility in working hours and location,


especially with the spread of unlettered high-speed connections and web
applications.

The Internet can now be accessed almost anywhere by numerous means,


especially through mobile Internet devices. Mobile phones, data-cards, handheld
game consoles and an Internet access provider and protocol matrix differentiate
the methods used to get online.

Sociology of the Internet

The Internet has achieved new relevance as a political tool, leading to internet
censorship by some states. The Internet has seen a growing number of Web
desktops, where user can access their files and settings vis the Internet.
Freedom of information

To printed encyclopedias and traditional libraries, the World Wide Web has
enabled the decentralization of information.

Collections of personal web pages published, by large services providers remain


popular, and have become increasingly sophisticated. Advertising on popular
web pages can be lucrative, and e-commerce or the sale of products and services
directly via the Web continues to grow. In the early days, web pages were

Beginners Guide
22
Fundamental of I nformation and communication technology

usually created as sets of complete and isolated HTML text files store on a web
server.

Communication
E-mail is an important communications service available on the Internet. Today
it can be important to distinguish between Internet and internal e-mail systems.
Internet telephony is another common communications services made possible
by the creation of the Internet. VoIP stands for Voice-over- Internet Protocol,
referring to the protocol that underlies all Internet communication.

The prevalent language for communication on the Internet English. Public place
to use the Internet include libraries and Internet cafes, where computers with
Internet connections are available. Various terms are used, such as “public
Internet kiosk”, “public access terminal”, and “Web payphone”. Wi-Fi provides
wireless access to computer networks, and therefore can do so to the Internet
itself. Grassroots efforts have led to wireless community networks. High-end
mobile phones such as smart phones generally come with Internet access
through the phone network. Web browsers such as Opera are available on these
advanced handsets, which can also run a wide variety of other Internet software.
More mobile phones have Internet access than PCs, though this is not as widely
used.

Beginners Guide
23
Fundamental of I nformation and communication technology

PART II.3
INTERNET BROWSING

To Instigate the Use of Internet


You can launch the internet explorer (or any other internet software) in two
ways.
1. Click on start button of you computer at the bottom left corner.
Click on internet explorer on the pop-out administrative bar
2. Double click on internet explorer icon on the desktop.

INTERNET EXPLORER WINDOW


The internet explorer window is the program environment where to do your
browsing and it contains the following:
1. Title bar
2. Menu bar
3. Address bar
4. Link bar
5. Standard toolbar
6. Home page

Attention: Address bar is that bar where web address of your choice is typed, in
other to have access to a particular website.

The link bar is that which contains icons that are used as hyperlinks to related
site that have been bookmarked.

Internet Option

This option provides the user with alternative to change the Internet homepage.
This means that you can make your preferred web page for your Internet
explorer homepage. By typing your choice web page, then click Apply, and ok
to close the window.

STEPS

1. On the internet explorer menu bar click on tools


2. Click on internet option

Beginners Guide
24
Fundamental of I nformation and communication technology

3. Type web addresses of your choice, click on apply and then ok.

INTERNET SEARCH ENGINE

The search engine is automatic software, which assists the internet user to
search for specific information on the web. Examples are:
Google search, Yahoo search, Ask me MSN search etc.

STEPS ON HOW TO USE SEARCH ENGINE


Steps
Type www.google.com into the address bar and press enter key on your
keyboard

On the web search page type the question or information you want to search and
click search or press enter key on your keyboard.
Allow Google to finish search, and then click on the one that best describes
answer or relatives answer to your question.

Note that within the first instant search, Goggle gives you more than one page
search answers. When you look below you will see numbers with dot, each of
them stands for each page answer.

HOW TO CREAT AN E-MAIL


E-mail is an electronic mailing system or a way of sending massage, pictures
and data internationally or locally from one location to another by means of
internet. It’s free

Hence creating an email address implies having an account with an online


company such as Yahoo.com Gmail.com etc. in other for you to send and
receive emails.


Steps


Type www.yahoomail.com on the address bar, press enter on your keyboard


Click on sign up on the yahoo best mail page below sign in.
Fill the subscription form correctly and submit by clicking on “Create My
Account”

Beginners Guide
25
Fundamental of I nformation and communication technology

 When created follow strictly the demo on how to check your mail by
clicking continue, in order to check your mail.

CHECK AND SEND EMAIL

First thing to do is to open yahoo best mail page like the one above.
(www.yahoomail.com)
Then sign in with your I D and PASSWORD, type each of them on appropriate


column.


Click on compose to send message


When the compose dialog box open


Fill the columns accordingly


Type your message or comment inside the message box.


Click on send button


For you to read the massage, click on the subject of the message to read
After that click on back-to-message on the mail toolbar to return to inbox for
another message

There will be a delivery report telling you that your message have been sent,
then click on “back to inbox” to return to your mail inbox for more message
reading. When you are done click on sign out or log out.

UPLOAD OF PHOTOS TO AN E-MAIL

For you to upload picture to someone else or yourself (i.e. to your own Email)


below are procedure you must follow:-
Scan and save photos with a scanner or snap with digital camera to your


computer.


Sign in with I D and password


Click on compose or new mail, when opened


Click on attach files, on the attach files columns
Click Browse, the open dialog box of your computer will open, and then


select the picture or document.
Select the document to attach (repeat action if multiple files) always


allow each file to attached before new attach.
Then send your message.

Beginners Guide
26
Fundamental of I nformation and communication technology

SOCIAL NETWORK SITES


Social Network Site is any site that is designed for social activities such as
friendship, relationship and advert or group etc. the purpose of these sites is to
connect friends together which are in difference place round the world, it could
be whom you lost contact with and to find friends as well.

THESE ARE SOME SOCIAL SITES:-

www.facebook.com
www.linkedin.com
www.twitter.com
www.myspace.com etc.

I’m going to teach you how to sign up for facebook.


Take note: the way you sign up facebook is same to other website provided you
fill the form. Thereafter continue according to the site features, such as pictures,
additional personal information etc.

Let’s keep going,

Facebook (www.facebook.com)

Sign up by filling the form

DOWNLOAD FROM INTERNET

Downloading is simple the way of taking something from internet; it could be


from your mail or a website, either you buy it or free.

Beginners Guide
27
Fundamental of I nformation and communication technology

Therefore, browse to the website you want to download their product and
Click on download.
Some site will required your information, so you fill the form and then
download.

Note: there are free downloads and not free once, you can only download the
previous when paid.


Procedure:


Click on the word ‘Download’


A dialog box will displays, on it click Save


‘save as dialog box’ will also displays
Type the name you want to save with, and select the file drive to save in,
and then click save.
Immediately you click save, the product will start downloading.
After downloading click open or go to where you save the file and open it, if the
dialog box is close.

You can as well download through Google search, by typing


www.google.com
When opened type downloads or free downloads on the Google search result,
click on product needed strictly follow the instruction to complete download.

PAST QUESTION AND ANSWER ON INFORMATION AND


COMMUNICATION TECHNOLOGY (ICT)
National Business and Technical Examinations Board
Objective and Essay
1. The technology of processing, storing and transferring information is
called (a) computer technology (b) information and communications
technology (c) data technology (d) human technology.
2. The class of computers with smallest physical size is
(a) Mainframe computer (b) mini-computers (c) super computers (d)
micro computers

3. Input Operation requires


(a) Memory device (b) input device (c) processor (d) output device

Beginners Guide
28
Fundamental of I nformation and communication technology

4. Information stored in Rom are:


(a) Manufacturers information (b) user’s information (c) teachers
information (d) students information

5. Pc Dos and Ms Dos are:


(a) Command interface (b) menu driven operating systems (c) graphical
interface operating systems (d) file drive operating system.

6. The major functions of the operating system include the following except:
(a) resource sharing (b) memory management (c) protection and error
handling (d) playing video.

7. To execute more than one program at a time the systems software must
be capable of: (a) word processing (b) virtual memory (c) multi – tasking
(d) virtual memorizing

8. Deleted files are normally transferred to the (a) trash (b) recycle bin (c)
hard disk (d) recoverable disk.

9. An internet is a:
(a) Village network (b) global network (c) school network (d) local
network

10. Browsing on the internet means:


(a) Jumping from one place to another (b) running from one network to
another (c) surfing the net (d) hitting the net

11. Internet modem enables a computer to be connected to the (a) UPS (b)
Printer (c) Monitor (d) Internet

12. Search engine is used to locate (a) information on the web (b) ups on the
web (c) memory on the web (d) computer on the web.

13. A network host is (a) a ring topology (b) any computer connected to the
internet (c) an organizer of a computer system. (d) a computer marketer.

14. The browser used to view the web page is called a web (a) client (b)
protocol (c) server (d) browser

15. The acronym for F.T.P. is:


(a) Full Time Pastor (b) File Transfer Protocol (c) Full Task Protocol (d)
File Task Time.

Beginners Guide
29
Fundamental of I nformation and communication technology

16. Merging documents in a word processor means combining:


(a) Two words (b) three lines (c) two or more documents (d) folders

17. The procedure for inserting number and bullet in Ms – word using menu
command is (a) format bullets and numbering (b) insert – bullets and
numbering (c) tools – bullets and numbering (d) view bullets and
numbering.

18. The keyboard command for find and replace is (a) Ctrl + F, (b) Alt +R (c)
Shift + F (D) Ctrl + R.

19. Split windows provide users the opportunity to easily move from one (a)
file to another (b) windows to another (c) folder to another (d) person to
another.

20. Presentation is applicable to (a) Ms Excel (b) Page maker (c) Power point
(d) Ms Word.

21. E-mail providers are as follows except


(a) Google mail (b) Yahoo mail (c) Hotmail (d) Cool mail.

22. Word perfect is an example of (a) database package (b) drawing package
(c) word processor (d) graphic package

23. Typed documents can be formatted by (a) changing the font size (b)
cutting the document (c) copying the document (d) pasting the document.

24. Thesaurus is used to (a) format document (b) spell check document (c)
replace words in documents (d) change font size.

25. In Ms Excel, data are entered in consecutive (a) work sheet locations (b)
range locations (c) memory locations (d) cell location.

26. Formulae are equations that perform (a) sorting (b) storage (c) calculation
(d) input information

27. Which of the following is not a valid formulae in Ms Excel (a) A5 x 2+4
(b) =C6 ^ 6 (c) =F45 – H60 (d) = 5 +4x3

28. In Ms Excel, the menu based procedures for inserting a column in a


worksheet is (a) edit – insert – column (b) insert – column (c) format –
column – insert (d) tool – column – insert.

Beginners Guide
30
Fundamental of I nformation and communication technology

29. Rows, columns and cells in Ms – Excel can be (a) a page break, (b)
pasted (b) forwarded (d) inserted

30. Spreadsheet is capable of processing (a) range (b) folder functions (c)
statistical data (d) calculus

31. The procedure for breaking a worksheet into pages using menu command
is (a) file – view page (b) insert page break (c) tool page break (d) view
page break preview.

32. A function in Ms – Excel many reference a range of (a) file (b) folder (c)
data (d) worksheet

33. A collection of related information on a particular subject is called (a)


folder (b) document (c) data base (d) information.

34. In Ms – Access, data base can be created using (a) worksheet (b) database
wizard (c) range (d) report.

35. Sorting a database involves arranging (a) files in ascending or descending


order (c) folders in ascending or descending order (d) records in
ascending or descending order.

36. In AutoCAD, layers are created or controlled in the (a) properties tool bar
(b) layer tool bar (c) draw tool bar (d) draining area.

37. In AutoCAD environment a scale of 1:200 means (a) 1mm to represent


200mm (b) 1mm to represent 20m (c) 1mm to represent 200m (d) 1mm to
represent 200km.

38. AutoCAD is an electronic (a) viewer (b) drawing (c) maker (d)
movement

39. Erase in AutoCAD means to (a) delete unwanted objects (b) improve on
the view of objects (c) remove part of an object (d) control the look of an
object.

40. In AutoCAD, the Z Co-ordinate always refer to the (a) left – right across
the screen (b) vertical position (c) in or out the of the screen. (d)
Isometric position

ATTEMPT FIVE QUESTIONS IN ALL, AT LEAST ONE QUESTION FROM


EACH PART ALL QUESTIONS CARRY EQUAL MARKS.

Beginners Guide
31
Fundamental of I nformation and communication technology

PART 1
1. (a) Mention four relevance of ICT to education
(b) Identify three devices necessary to facilitate information
(c) State four external storage devices you know
(d) Explain briefly a micro computer

2. (a) Distinguish between internet and intranet


(b) Write short notes on
(i) Browser
(ii) Website
(iii) Home page
(iv) Web server

PART 11
COMPUTER APPLICATION 1& 11

3. (a) Specify two uses of word processing packages


(b) Give three examples of word processing packages
(c) List three advantages of computer application in word processing
over manual typewriter.
(d) State the steps for creating a document using templates

4. (a) What is the function of the office assistance in Microsoft-office


environment
(i) How is excel addressed in a spreadsheet
(ii) Where is formulae entered in a spreadsheet
(b) Write short note on database.

5. Write short notes on the following terms in Ms-Excel


(i) Formula bar
(ii) Title bar
(iii) Workbook
(iv) Cell pointer
PART III
AUTOCAD 1 & II
6. (a)State two advantage of AutoCAD over technical drawing
(b) Outline the procedure used in creating a new drawing in AutoCAD
7. Explain briefly the difference between using rectangle option and
line option in drawing a rectangle in AutoCAD

OBJECTIVE ANSWERS
(1) B (2) D(3) B (4) A (5) A (6) D(7) C (8) B(9) B(10) C(11) D(12)
A(13)A(14) D (15) B(16) C(17) B(18) (19) B(20) C(21) D (22) C (23) A(24)

Beginners Guide
32
Fundamental of I nformation and communication technology

C(25) D(26) C (27) A (28) B (29) D(30) C(31) B(32) C (33) C(34) B(35)
D (36) B(37) (38) B (39) A(40) D

ESSAY ANSWERS

(2) b (iii) Home page is a person’s or organization introductory document on the


internet. Homepage is also known as the first website that always introduced your
computer to the internet which can be change to the user’s choice.
(iv) Website this is a location connected to the internet that maintains one or more
web pages.
(iv) Web server: This is a computer, which utilizes the Hypertext Transfer
Protocol (HTTP) server program, to accept and delivers HTTP programs from the
network computer system, in order to responds to client request and instruction.
(i) Browser is a computer software or program used to navigate or browse
the World Wide Web.
2. (a) Internet is a global system of interconnected computer networks that use the
standard internet protocol suite (TCP/IP) to serve billions of users worldwide.
While intranet is a private network utilizing internet type tools or program but
available only within that organization.
(b) Input device
Processing device
Output device
(c) USB flash drive
Diskette hard drive
CD Rom drive
External Hard Disk Drive
(d) Micro computer is the smallest size computer and a single user often times
called PC.
PART II
3 A word processing package is use for
a. typing, edit, save and print text
b. Producing letters, memos and reports
c. Typing of document
d. Publishing of books

1a Easy accessible to any course or subject in education


Easy research
Online libraries
Education program in ay part of the world can be easily accessible at your
own comfort.

Beginners Guide
33
Fundamental of I nformation and communication technology

4. i. Function of office assistance in Microsoft office environment is to assist


the user when there is need for help in terms of searching for file, drawing and
saving etc.
ii. Cell address is the name of a cell, which is the column heading and the row
number. Example; A2, B4, A6, H4etc.
iii. Formula is entered in a cell
5. i Formulae bar: this is the bar that displays the cell address of any cell your
pointer move to, and it also brings out excel functions as soon as you entered
equal sign (=)
ii. Title bar bears the title of the program you are using, like Microsoft Excel and
the name of the file you are working on if saved.
iii. Workbook is application to MS-Excel
iv. cell pointer is a rectangle
PART III
6a. (i) Auto CAD makes drawing easier and faster, because of its electronic
interface with available tools and commands.
ii)It gives you an accurate measurement and design modeling which is not
available in technical drawing.

PART III.1

Cyber café Administration

An internet café or cybercafé is a place where one can use a computer with
Internet access, most for a fee, usually per hour or minute; sometimes one can
have unmetered access with a pass for a day or month, etc. it may serves as a
regular café as well, with food and drinks being served

You have to subscribe to any ISP to have access to Internet connection, (i.e
purchasing their internet service). Then Install your network with above steps
on networking in Part II.1

What you need to do now is to install cybercafé software to your computers,


(client) except of course one computer, which will be the server for those
computers (server) in the network. You can get the original software with
licenses in the market or buy from the net. You can as well download free trial
from the internet for one-month utility.

Beginners Guide
34
Fundamental of I nformation and communication technology

Attention: Restart each system after installation to launch it.


TO ORIGINATE


Double click on server icon on the desktop to open or
Right click on it and click open

Features and settings:


Pay-Before-Scheme (Membership Schemes):


Different Membership scheme can be created using Scheme >Add


Different schemes can have different following parameters


Amount


Allotted Minutes


Number of Valid days
Minimum Slot (i.e. if minimum slot is 30 minutes, and if the customer
has browses for 12 minutes, 30 minutes)

However, this is how it looks when opened, if you are using easy browsing
software.
This window is for you to view all current user, and some of their information
without any setting or editing, and the slot scheme as well vacant machines.

Obviously, without your password as administrator or receptionist you will not


have access to login, into the café billing software.



Now click on login menu


Point on, login as
Choose administrator if you are, vice vassal.

The first login is for setting, mind you, the first thing to do is to change this
software password to your own and update. Then continue your setting, logout
in the same menu when through

Pay-before-Scheme (Slot Schemes):


Slot-hour such as 1 hour slots, 2-hour slots, can be created members will be sold
a set of login name and password for each slot.

Usually, cybercafés design the slot-membership-account to be expired within


few days. However, if you cross the day, take care.

Pay-After-Scheme (Walk-in Schemes):


Use Menu Schemes > Walk-in
Beginners Guide
35
Fundamental of I nformation and communication technology

Walk-in Scheme can be constructed with the table (MINUTES Vs Amount)


maximum Slot (i.e. if the maximum slot is 1 hour, the customer will be
automatically logged out after 1 hour). He has to again login to continue.

Time Internet between Successive Logins (i.e. if the Time Internet is 24 hours,
the customer can login only tomorrow after he has logged in, to be very precise
He can use only once per day)

If the Time Internet is set to 24 hour and the Maximum Slot is set to 1 hour,
The scheme will allow the customer to browse, only one hour per day.

MAXIMUM
Browsed Minutes Rounded in step of: i.e. if it is set to 5 minutes, even if the
customer has used only 12 minutes, it will be rounded to 15 minute.

Restricted Program Running: if this option is selected as ‘yes’ the members


can be restricted from launching some programs. Cybercafé Administrators can
edit this restricted program list, in the client machines.



Enable Checkbox near Allow Walk-in-Special Charges.
Walk-in-special Scheme can be constructed with the table
(MINUTES Vs Amount)

By default, the first Walk-In-Special scheme table is occupying the major


portion of the day.

Other Walk-in-special Scheme table can also be constructed and the start Time
and End Time to be set, to suit the Cybercafé Different schemes at Schemes at
Different Time Intervals.

If the customer is logged in as walk-In-Special, the client screen


Is also updated with Walk-In-Special charges.
It is the Receptionist’s responsibility to differentiate the Walk-in-Customers and
Walk-in-Special Customers (may be with the membership cards or photo
identity).

Day Report will also reflect the details of walk-in-customers. By default, the
first walk-in scheme table is occupying the major portion of the day.

Other Walk-in Scheme tables can also be constructed and the Start Time and
End Time
To be set, to suit the Cyber Café’s Different Schemes at different Time
Intervals.

Beginners Guide
36
Fundamental of I nformation and communication technology

Walk-in customers can enter their name and login.


Members can be created in the server, using the menus
Member >Add
Member’s detail can be viewed in the server, using the menus member >View

Walk-in-Special Schemes:
- If your Cybercafé has two sets of Walk-In customers, having two different
charges,


Consider one set of walk-in Customers as Walk-in-Special group.
Use Menu Schemes > Walk-in-special

EXPENSES:
All the Day-To-Day experience as Printing Paper purchase, Ink-Refilling can be
added using the Expense window.
These expenses will be reflected in the DAT-BOOK and used for account
balancing.

REPORT: - DAY-REPORT:
Daybook-leaf can be printed at the end of the day, it is just enough to count the
denominations of the current collected, and enter it in the Day-Book-Leaf. The
Day Book will be created within seconds and can be printed.

By default, the daybook-leaf is prepared between morning (when the server


Program started working)
and night (when the Cybercafé is to be closed).

MEMBERS

Add New members: New members can be added using Members > Add new.
Before adding the members in a particular scheme, the administrator can
compare the schemes nearby.

The Amount will be reflected automatically in the DAY-REPORT


And used for account balancing.

View members: members’ details can be viewed using members > view

TOOLS:
Remote Shutdown Click Machines: All the click machines can be Restart or
shutdown, by a single click at the end of the day.

Beginners Guide
37
Fundamental of I nformation and communication technology

The time intervals can be changed and day sheet can be printed for WEEKELY,
MONTHLY REPORTS.

Order Window in the Click Machines:


Customers can place the order for Drinks, etc, or call the Reception, by clicking
the ORDER button in the client program.

As soon as the ORDER button is clicked in the client machine, ORDER-


WINDOW in the server program flashes which machine is calling or placing
order.

Receptionist can clear the order request by clicking the check-box near-by.

However, the time intervals can be changed and the same DAY-REPORT can
ALSO be used for printing WEEKLY and MONTHLY REPORTS.

DAY SHEET:


By default, Day sheet menu will be showing the daily transactions of
Session details



Item details (floppy, scan, etc)
Bill details
 User details

This option is for you to choose or select particular receptionists for the day
Work Moreover, their information such as starting and ending time.

There is an important need for your staff to be register in your computer


especially receptionist and café Attendance. Therefore, choose add receptionist
from Tools menu. Type the person’s username, password, and click add.

To remove
Select the user name and click remove
Click close if you are ok.

TICKET CREATION


To create Ticket follows these procedures


Form tools menu choose Bulk Ticket Creation


Update first


Select your scheme and Number of member
Generate members

Beginners Guide
38
Fundamental of I nformation and communication technology



Then print and update for another print.
Close when through.

HOW TO COPY FROM NET


When you or your customer search for an information from the net and want to
copy to your computer. Follow this procedure



Click and drag from beginning to end of what you want copy


From edit menu click copy


Open Microsoft word application or applicable program
Click paste from edit menu or paste icon on standard bar or better press
Ctrl+V of your keyboard.


TO SAVE FROM NET


Click on save icon or save from file menu.
Type the name you want to save with and file drive and then click save.

Note: if you just save from window of your homepage, it will open anytime
with internet homepage format. So to avoid this in order to get the right format
program needed, you have to copy it to appropriate program and paste before
save.


TO SAVE TO COMPUTER IN YOUR LOCAL AREA NETWORK


Form the document you want to save


Click Save As from file menu


On the dialog box of “Save As”


Click on “my network places”
Then choose the particular client you want to save to and click save.

Beginners Guide
39
Fundamental of I nformation and communication technology

Beginners Guide
40

You might also like