Professional Documents
Culture Documents
COMPUTER ORGANIZATION
MEMORY UNIT
Used to store data instructions and information.
Memory unit is further Divided into ROM and RAM.
ROM-is read only cant be used for write.
- stores data for long even without power supply
RAM-Random Access Memory used for temporary storage of data.
-holds necessary data for processing and instruction
-keep track of processing data
-receives and transmit all inputs and output.
1. Education.
Computers are widely used in the teaching & learning process. Learning and
teaching using computers is referred to as Computer Aided Learning (CAL)
and Computer Aided Teaching (CAT).
-To assist the Long distance learning in universities usually referred to as
the Open University Concept.
-To analyze academic data.
2. Communication industry.
The integration of computers & telecommunication facilities has made the
transmission and reception of messages very fast and efficient.
-They are used in telephone exchanges to switch incoming & outgoing calls.
-For sending & receiving electronic messages, e.g. fax and e-mails, if
connected to a computer network.
3. Transport industry.
Computers are used in:
-Automobile traffic control, e.g., to monitor vehicle traffic in a busy town.
-Railway corporations to co-ordinate the movement of their goods & wagons.
-Airports (Airline industry). The computers are used;
To control the movement of aircrafts, take off & landing through the
use of radar equipment.
Making reservations (booking purposes).
Storing flight information.
4. Library services.
Computers can be used in a library:
To enable the library personnel to easily access & keep updated records of
books and other library materials.
To search for book titles instead of using the manual card catalogue.
Employment:The emergence of computers has provided employment
opportunities to very many people.
5. Domestic and Entertainment systems.
Computers are used at homes:
-For watching movies, playing music and computer games.
-For storing personal information.
-For calculating and keeping home budgets.
-In household items, such as, Microwave ovens, Televisions, etc.
6. Multimedia applications.
-Computers are used to prepare business presentations for advertisement
purposes.
The presentations are done using overhead projectors attached to
computers running slide shows & digital video clips taken using a Camcorder.
An overlaid voice is used to describe the product.
-Computers are used in music related equipment such as Synthesizers.
-In entertainment (i.e., games & movies), computers are used to add stereo
sound & digital video clips, which make games more realistic
7. Defense
Computers are largely used in defense. Modern tanks, missiles, weapons etc.
Military also employs computerized control systems.
Some military areas where a computer has been used are
Missile Control
Military Communication
Military Operation and Planning
Smart Weapons
8. Police (Law enforcement agencies).
Computers are widely used in fighting crime. The Police use computers to
keep databases on fingerprints and also analyze them.
The Police also use computers for face recognition, scene monitoring &
analysis, which help them to arrest traffic offenders and criminals.
The information held in computers such as fingerprints, photographs and
other identification details helps law enforcers to carry out criminal
investigations speedily.
9. Government Institutions.
Computers play an important role in government. Some major fields in this
category are:
Budgets
Sales tax department
Income tax department
Male/Female ratio
Computerization of voters lists
Computerization of driving licensing system
Ecitizen online services
Weather forecasting
If computers were not used, the large number of files in government
registries would make information recovery extremely difficult.
10. Offices.
For receiving & sending of messages through e-mails, fax, etc.
Production of documents.
Keeping of records.
11. Health Care
Computers have become important part in hospitals, labs, and dispensaries.
The computers are being used in hospitals to
keep the record of patients and medicines.
scanning and diagnosing different diseases.
To control life-supporting machines in the Intensive Care
Units (ICU).
To enable medical experts in different countries to share their
expertise or labour, thus reducing the transportation of patients &
professionals.
Diagnostic System - Computers are used to collect data and identify
cause of illness.
Lab-diagnostic System - All tests can be done and reports are
prepared by computer.
Surgery : Nowadays, computers are also used in performing surgery.
12. Process control.
Computers are used in production environments such as factories to control
chemical & mechanical processes. The computers are usually loaded with
specialized programs & each computer is designed to do a specific job.
13. Banks/Insurance industries
Computers are used by Banks & Insurance industries:
-To manage financial transactions. They use special cash dispensing
machines called Automated Teller Machines (ATMs) to enable them provide
cash deposit & withdrawal services.
-For processing of Cheques.
-For preparation of Payrolls.
-For better record keeping and processing of documents.
-To provide electronic money transfer facilities
14. Industries.
The use of computers has made Industries more productive & efficient.
They are used:
-To monitor and control industrial processes. The industries use remote
controlled devices called Robots. A Robot is a machine that works like a
human being, but performs tasks that are unpleasant, dangerous, and tedious
to be done by human beings.
-For management control, i.e. to keep track of orders, bills and transactions.
-For advertisement purposes, which enable an industry to attract more
customers.
15. Supermarkets.
Supermarkets and other retail stores use computers for stock control, i.e.,
to help them manage their daily activities.
The stock control system keeps record of what is in store, what has been
sold, and what is out of stock. The Management is automatically alerted
when a particular item or items are running out of stock and need to be
reordered.
For calculating customer’s change.
For production of receipts.
It can be used as a barcode reader.
16. Research.
Computers can be used for research in various fields. They are used by:
Scientists to analyze their experimental data, e.g., in weather
forecasting.
Engineers & Architects to design & test their work.
17. Engineering Design
Computers are widely used in Engineering purpose.
One of major areas is CAD (Computer aided design). That provides creation
and modification of images. Some fields are:
Structural Engineering - Requires stress and strain analysis for design
of Ships, Buildings, Budgets, Airplanes etc.
Industrial Engineering - Computers deal with design, implementation
and improvement of integrated systems of people, materials and
equipment.
Architectural Engineering - Computers help in planning towns,
designing buildings, determining a range of buildings on a site using
both 2D and 3D drawings
Negative
Incraesed social isolation
Decreased privacy
Loss of jobs
Reduced personal interaction.
It took long for the next significant advance in computing devices to emerge. In
1642, Blaise Pascal (1623-1662), the 18-year old of son of a French tax
collector, invented what he called a numeric wheel calculator to help his
father with his duties but which used 8 movable dials to add sums up. I was
not until the 1940s that the electronic computers emerged.
In 1980s, Charles Babbage designed the ‘Difference Engine’ a machine which could
perform mathematical calculations. A 6 wheeled model was initially
constructed and demonstrated to a number of audiences. He also worked on
another invention, the more complex Analytical Engine, a revolutionary
device which was intended to be able to perform any arithmetical calculation
using punched cards that would deliver the instructions, as well as a memory
unit to store numbers and many other fundamental components of today’s
computers. Lady Ada produced programs to be used by the analytical
machine. She is claimed to be possibly the first programmer.
Five generations of Modern computers
It took several years after Babbage designed the analytical engine to come
up with an electronic computer.
First generation computers. (1946-1959)
The 1st generation of computers started with using vacuum tubes as the
basic components for memory and circuitry for CPU. These tubes like
electric bulbs, produced a lot of heat and were prone to frequent fusing of
the installations, therefore were very expensive and could be afforded only
by very large organizations. The Electronic Numerical Integrator and
Computer (ENIAC) was announced in 1946. The computer contained 17,486
vacuum tubes and consumed 150 kW of electricity. Another example of
computers in this generation was the UNIVersal Automatic Computer I
(UNIVAC) which used 5200 vacuum tubes and weighed 13 metric tons. It
consumed 125 kW, and could
perform about 1,905
operations per second.
CLASSIFICATION OF COMPUTERS
Analog Computer:
An Analogue computer is a computer that operates on continuous data.
They carry out their data processing by measuring the amount of change
that occurs in physical attributes/quantities, such as changes in electrical
voltage, speed, currents, pressure, length, temperature, humidity, etc.
An Analogue computer is usually a special-purpose device that is dedicated
to a single task. For example, specialized areas such as in:
Scientific or engineering experiments, Military weapons, controlling
manufacturing processes like monitoring & regulating furnace temperatures
and pressures., Weather stations to record & process physical quantities,
e.g., wind, cloud speed, temperature, etc.
The output from analogue computers is in form of smooth graphs produced
by a plotting pen or a trace on a Cathode Ray Tube (CRT) from which the
information can be read.
Note: Analogue computers usually use one characteristic, e.g. a length, to
give information about another physical characteristic, such as weight.
Analogue computers are very accurate & efficient since they are dedicated
to a single task.
They are very fast since most of them use multiple processors.
Examples of analogue devices:
¨ The computer used to control a flight simulator for training pilots.
The computer responds to the Cockpit simulator control movements made by
the pilot to physically change the environment so that the pilot feels as if he
were controlling an actual aeroplane.
¨ A Bathroom scale.
It uses the weight of a person to move a pointer smoothly/continuously over
calibrated scale, which shows the person’s weight.
¨ Thermometer.
It uses a volume of Mercury to show temperature. The Thermometer is
calibrated to give an exact temperature reading.
¨ Speedometer.
In Speedometer, the rotation of the wheel is converted to a voltage, which
causes a pointer to rotate over a dial calibrated in Km/h or Miles/h.
¨ A Petrol pump measures the rate of flow of Gasoline (petrol) &
converts the volume delivered to 2 readings; one showing the volume & the
other showing the cost.
¨ A Post-office scale converts the weight of a parcel delivered into a
charge for posting.
¨ A Monitor with knobs that are rotated to increase brightness.
¨ A Television with knobs that are rotated to increase or decrease the
volume.
¨ A Radio with a knob that slides in a slot to increase volume.
Hybrid Computer:
They are designed to process both analogue & digital data. They combine
both the functional capabilities of the digital and analogue computers.
Hybrid computers are designed by interconnecting the elements of a digital
computer & analogue computer directly into one processor, using a suitable
interfacing circuitry.
Hybrid computers are more expensive.
Example;
In a hospital Intensive Care Unit, an analogue device may be used to
measure the functioning of a patient’s heart, temperature and other vital
signs. These measurements may then be converted into numbers and sent to
a digital device, which may send an immediate signal to the nurses’ station if
any abnormal readings are detected.
NOTE: When referring to a portable or home user computer, hybrid
computer is a slang term used to describe a 2-in-1 PC. A 2-in-1 PC comprises
a screen and a detachable keyboard, combining the functionality of a laptop
computer and a tablet.
4. Classification by Size
Supercomputer
Supercomputers are largest, heavy and are usually kept under special
environmental conditions (i.e., in a special room) and operated by computer
specialists.
Mainframe computers
Mainframes are smaller, less powerful (very high processing speed), less
expensive than supercomputers. They also have a large backing storage
capacity.
Microcomputers are the PCs mostly found today in homes, schools & many
small offices. They are called Personal Computers (PCs) because they are
designed to be used by one person at a time. They consist of very few
connected units, i.e. can support very few peripheral devices (usually 1 or 2).
The term “microcomputer” was introduced with the advent of single chip
microprocessors. Microcomputers are smaller in size & also cheaper than
minicomputers. Their design is based on Very Large-Scale
Integration (VLSI) that confines several physical components into an IC.
They are less powerful than minicomputers & their internal memory is
smaller than that of minicomputers.
These computers include:
● Desktop computers – A case and a display, put under and on a desk.
● In-car computers (“carputers”) – Built into a car, for entertainment,
navigation, etc.
● Game consoles – Fixed computers specialized for entertainment
purposes (video games).
5. Classification by function
Servers
Client/Workstations
It is a desktop computer or workstation that is capable of obtaining
information and applications from a server.
Workstations are computers that are intended to serve one user and may
contain special hardware enhancements not found on a personal computer. It
is a special computer designed for technical or scientific applications.
THE MAJOR COMPONENTS OF COMPUTER SYSTEMS
COMPUTER HARDWARE
Even though the pinout of both mouse and keyboard PS/2 ports are same,
computers do not recognize the devise when connected to wrong port.
PS/2 port is now considered a legacy port as USB port has superseded it and
very few of the modern motherboards include it as a legacy port.
B) Serial Port
Serial (COM)
The serial port, also known as RS-232 or
COM (communication) ports, historically has
rivaled the parallel port in versatility.
There are two types of serial ports that
are commonly found on a computer: DB-25
and DE-9.
DB-25
DB-25 is a variant of D-sub connector and
is the original port for RS-232 serial
communication. They were developed as the
main port for serial connections using RS-
232 protocol but most of the applications
did not require all the pins.
Hence, DE-9 was developed for RS-232 based serial communication while
DB-25 was rarely used as a serial port and often used as a parallel printer
port as a replacement of the Centronics Parallel 36 pin connector.
The use of DB-25 and DE-9 ports for communication is in decline and are
replaced by USBs or other ports.
Serial ports have been used to connect the following:
External modems - connect an external modem to a serial port.
Serial mouse or pointing devices such as trackballs or touchpads
Plotters
Label printers
Serial printers
PDA docking stations
Digital cameras
PC-to-PC connections used by file transfer programs such as Direct
Cable Connection, LapLink, and Interlink
To avoid confusion, most recent systems and sound cards use the PC99 color
coding listed as follows:
Pink—Microphone in
Light Blue—Line in
Lime Green—Stereo/headphone out
Brown—Left to right speaker
Orange—Subwoofer
S/PDIF / TOSLINK
Many systems include both analogue audio (delivered through 1/8-inch audio
mini-jacks) and digital audio. Sony/Philips Digital Interconnect Format
(SPDIF) ports output digital audio signals to amplifiers, such as those used
in home theatre systems, and come in two forms: optical and coaxial.
Optical SPDIF uses a fiber optic cable, while coaxial SPDIF uses a shielded
cable with an RCA connector.
SPDIF optical (top) and coaxial (bottom)
cables. Sound cards might incorporate
SPDIF ports into the card itself or into
drive bay or external extension modules.
By default, systems with both analog
and digital output use analog output. To
enable digital output, use the Sounds
and Audio Devices dialog in Windows
Control Panel or the proprietary mixer provided with some sound cards or
onboard audio devices.
DVI-D connectors carry a digital-only signal and DVI-I adds four pins
for analog capability. Both connectors can be used with a single-link or
a dual-link cable, depending upon the requirements of the display.
DVI-A supports only analogue signals.
Mini-DVI
Mini-DVI port is developed by Apple as an alternative to Mini-VGA port and
is physically similar to one. It is smaller than a regular DVI port.
It is a 32 pin port and is capable of transmitting DVI, composite, S-Video
and VGA signals with respective adapters.
The following image shows a Mini-DVI port
and its compatible cable.
Micro-DVI
Micro-DVI port, as the name suggests is
physically smaller than Mini-DVI and is
capable of transmitting only digital signals.
This port can be connected to external devices with DVI and VGA interfaces
and respective adapters are
required. In the following
image, a Micro-DVI port can
be seen adjacent to
headphone and USB ports.
H) Display Port
Display Port is a digital display interface with optional multiple channel audio
and other forms of data. Display Port is developed with an aim of replacing
VGA and DVI ports as the main interface between a computer and monitor.
The latest version DisplayPort 1.3 can handle a resolution up to 7680 X
4320.
The Display Port has a 20 pin connector, which is a very less number when
compared to DVI port and offers better resolution. The pin out diagram of a
Display Port is shown below.
I) HDMI
If you've shopped for an HDTV, a PlayStation 3, or an HD-DVD or Blu-ray
player, you've probably heard about HDMI. It can seem like just one of many
connections on televisions or home-theater receivers. But HDMI is more
than a port on the back of a TV (and the often-expensive cable that fits
inside). It's a set of rules for allowing high-definition electronic devices to
communicate.
HDTVs are digital. They use information in the form of ones and zeros. This
information travels through cables as distinct electrical pulses. HDTVs have
an aspect ratio of 16:9, so the picture is rectangular. They also have a higher
resolution -- current HDTV standards allow for resolutions of up to 1920 x
1080 pixels. HDTV signals can also be progressive, meaning that each frame
of the moving image is a whole picture rather than half of one. HDMI is
unique in its ability to support digital audio as well as video through a single
cable. With the right setup, HDMI can make a significant difference in a
home-theater system. The current standard can carry 1080p high-definition
signals, and it supports eight channels of uncompressed audio, enough for a
7.1 surround-sound system. HDMI can cut down on the number of cables
required to connect components, and it can even reduce the number
of remote controls needed to watch a movie.
But there's a catch. In order to take advantage of everything HDMI has to
offer, all of the components of a home theater have to be compatible with
them.
HDMI uses transition minimized differential signaling (TMDS) to move
information from one place to another. TMDS is a way of encoding the signal
to protect it from degrading as it travels down the length of the cable.
Here's what happens:
The sending device, such as an HD-DVD player, encodes the signal to
reduce the number of transitions between one (on) and zero (off).
Think of each transition as a sharp drop-off -- as the signal travels,
this drop-off can begin to wear away, degrading the signal. The
encoding step helps protect signal quality by reducing the number of
chances for the signal to degrade.
One of the cables in the twisted pair carries the signal itself. The
other carries an inverse copy of the signal.
The receiving device, such as an HDTV, decodes the signal. It
measures the differential, or the difference between the signal and
its inverse. It uses this information to compensate for any loss of
signal along the way.
HDMI also has the ability to protect data from piracy. It uses high-
bandwidth digital copy protection (HDCP) to accomplish this. HDCP is
an authentication protocol. Basically, each home-theater device has
identification data and encryption data stored on its extended display
identification data (EDID) chip. The source device, such as a Blu-ray player,
checks the authentication key of the receiving device, such as an HDTV. If
both keys check out, the sending device moves on to the next step. It
generates a new key and shares it with the receiving device. In other words,
it creates a shared secret. Ideally, this whole process, known as
a handshake, takes place almost instantaneously.
The source device encodes its information using the key it generated it. The
receiving device decodes it using the same information. If an unauthorized
device tries to intercept the data, the source device stops transmitting. It
also makes sure that the key hasn't changed and that the system is still
secure every few minutes. All HDMI-compatible devices are required to
support HDCP, but the companies that manufacture and distribute high-
definition content aren't required to enable it. In the United States, this
content-protection ability is mandated by the Federal Communications
Commission (FCC).
Many HDTV early adopters rely on DVI, since it hit the market before
HDMI did. Since DVI and HDMI both use the TMDS protocol, they're
compatible. All you need to connect an HDMI cable to a DVI port is a passive
adapter.
The DVI and HDMI connectors have some other similarities. Both use a grid
of pins to transmit signals from the cable to the device. While DVI has a 29-
pin connector, HDMI's type A connector has 19 pins. A DVI connector also
uses a pair of built-in screws to anchor it to the device. HDMI plugs don't
have this extra support, and some users have expressed concern that this
puts unnecessary strain on the device's circuitry. There's also a miniature
version of the HDMI connector for use on smaller devices like digital
camcorders as well as a 29-pin type B connector, although most consumer
devices use type A.
From the HDMI connector's pins, signals travel through twisted pairs of
copper cable. Three audio and video channels travel through two pins each,
for a total of six pins. The TMDS clock, which allows devices to synchronize
the incoming data, travels through one pair of pins. Each of these four total
pairs has a shield -- another wire that protects it from interference from
its neighbors. The TMDS channels, the clock and the shields make up the
bulk of the cable pairs inside the HDMI cable.
The other signals that
travel through the HDMI
cable need only one pin.
One such channel is
the consumer electronics
channel (CEC). If your
devices support it, this
channel allows them to
send instructions to one
another. For example,
an HD-DVD player could
automatically turn on a
home-theater receiver and
an HDTV when it started
playing a disk. The hot plug
detect channel, which uses
one pin, senses when you
plug in or unplug a device,
re-initializing the HDMI
link if necessary. The one-
pin display data channel (DDC) carries device information and the HDCP
encryption information discussed in the previous section. Other channels
carry encryption data and electricity to power communication between
devices.
The cables themselves come in two categories. Category 1 has a speed of
74.25 MHz. Category 2 has a speeded of 340 MHz. Most consumer cables
are the faster category 2 variety.
The HDMI connector consists of 19 pins and the latest version of HDMI i.e.
HDMI 2.0 can carry digital video signal up to a resolution of 4096×2160 and
32 audio channels. The pinout diagram of an HDMI port is as follows.
J) Component Video/RGB
Component Video is an interface where the video signals are split into more
than two channels and the quality of the video signal is better that
Composite video.
Like composite video, component video transmits only video signals and two
separate connectors must be used for stereo audio. Component video port
can transmit both analogue and digital video signals.
The ports of the commonly found Component video uses 3 connectors and
are colour coded as Green, Blue and Red.
K) Composite
The lowest-quality video signal supported by PCs is composite video, which
uses a single RCA cable and port to transmit a video signal. Video cards sold
in Europe usually use a composite signal for their TV-out signal.
Composite video can be used by standard definition TVs (SDTVs) and VCRs.
If you need to connect a PC with an S-video port to a TV or VCR that has a
composite port, you can use an S-video to composite video adapter.
RCA Connector
RCA Connector can carry
composite video and stereo audio
signals over three cables.
Composite video transmits
analogue video signals and the
connector is as yellow colored RCA
connector.
The video signals are transmitted
over a single channel along with
the line and frame
synchronization pulses at a
maximum resolution of 576i
(standard resolution).
The red and white connectors are
used for stereo audio signals (red for right channel and white for left
channel).
L) S-Video
S-video divides a video signal into separate luma and chroma signals,
providing a better signal for use with standard TVs, projectors, DVD
players, and VCRs than a composite signal. The so-called "TV-out" port on
the back of many video cards is actually an S-video port.
S-Video or Separate Video connector is used for transmitting only video
signals. The picture quality is better than that of Composite video but has a
lesser resolution than Component video.
The S-Video port is generally black in color and is present on all TVs and
most computers. S-Video port looks like a PS/2 port but consists of only 4
pins.
Out of the 4 pins, one pin is used to carry the intensity signals (black and
white) and other pin is used to carry color signals. Both these pins have their
respective ground pins. The pinout diagram of an S-Video port is shown
below.
The figure below compares component, S-video, and composite video cables
and ports to each other. Note that composite video cables are often bundled
with stereo audio cables, but can also be purchased separately.
M) USB (Universal Serial Bus)
USB have largely replaced PS/2 (mini-DIN) mouse and keyboard, serial
(COM), and parallel (LPT) ports on recent systems. Most recent desktop
systems have at least four USB ports, and many systems support as many as
eight or more front- and rear-mounted USB ports.
USB port can be used to transfer data, act as an interface for peripherals
and even act as power supply for devices connected to it. There are three
kinds of USB ports: Type A, Type B, Type B mini-USB and Micro USB, Type
C.
Although a cable has two differently shaped connectors, it takes the name
of whichever connector is not USB Type-A. That’s because USB Type-A is
the most commonly used USB port and connector so an alternative type is
the most distinguishing feature.
For example, a cable with both a USB Type-A and a Type-C connector is a
USB Type-C cable.
TYPES OF USB CONNECTOR
USB connectors are sometimes referred to as “male” connectors, as they
plug into a “female” port.
There are three standard types of USB ports you need to know:
USB 1.1
USB 2.0 (also called Hi-Speed USB)
USB 3.0 (also called SuperSpeed USB)
MINI CONNECTORS
USB Type-A Mini
Developed to allow On-The-Go (OTG) peripheral devices such as
smartphones and tablets to function as host devices for keyboards
and mice
Superseded by USB Type-B Mini and Type-B micro connectors
USB Type-B Mini
Found on digital cameras, external hard drives, USB hubs and other
equipment
Used by USB 1.1 and 2.0
MICRO CONNECTORS
USB Type-A Micro
Found on USB On-The-Go (OTG) devices such as smartphones and
tablets
Doesn’t have a dedicated port but instead fits into a special AB port
which accommodates both USB Type-A Micro and USB Type-B Micro
Mostly superseded by USB Type-B Micro
USB Type-B Micro
Used by modern Android devices as their standard charging plug and
port
TYPES OF USB PORT
The port (also called a socket, jack or receptacle) is the part of your device
the USB connector plugs into. USB ports are sometimes referred to as
“female”, as they accept a “male” connector.
The different types of port—shown by USB version—are as follows:
USB Type A
USB Type-A port is a 4-pin connector. There are different versions of Type
– A USB ports: USB 1.1, USB 2.0 and USB 3.0. USB 3.0 is the common
standard and supports a data rate of 400MBps.
USB 3.1 is also released and supports a data rate up to 10Gbps. The USB 2.0
is Black color coded and USB 3.0 is Blue. The following image shows USB 2.0
and USB 3.0 ports.
The pinout diagram of USB Type – A port is shown below. The pinout is
common to all standards of Type – A.
There is a USB type-A to micro-HDMI
You might use one of these cables when connecting a smartphone or tablet
to a larger display, such as a computer monitor, high-definition TV or video
projector.
Micro-HDMI is also known as HDMI Type-D, and is a very similar shape to
the USB Type-B Micro connector.
USB TYPE-B
You’ll typically find USB Type-B ports on larger devices you connect to your
computer, such as printers and scanners. You might also have external
storage devices or drives that use them.
Most USB Type-B connectors are at one end of a USB Type-B to USB Type-
A cable. You plug the Type-B connector into the printer, scanner or other
device and the Type-A connector to the standard USB port on your
computer.
USB Type C
USB Type – C is the latest specification of the USB and is a reversible
connector. USB Type – C is supposed to replace Types A and B.
Still fairly new (2014), so used by only a limited number of devices, such as:
Apple MacBooks (for charging, transferring data and playing video)
some of the latest laptops
Nintendo Switch games console
The port of USB Type – C consists of 24 pins. The pinout diagram of USB
Type – C is shown below. USB Type – C can handle a current of 3A.
This feature of handling high current is used in the latest Fast Charging
Technology where a Smart Phone’s battery will reach its full charge is very
less time.
Ethernet Port – This port is used for networking and fast internet
connections.
RJ-45 Ethernet is a networking technology that is used to connect your
computer to Internet and communicate with other computers or networking
devices.
The interface that is used for computer networking and telecommunications
is known as Registered Jack (RJ) and RJ – 45 port in particular is used for
Ethernet over cable. RJ-45 connector is an 8 pin – 8 contact (8P – 8C) type
modular connector.
The latest Ethernet technology is called Gigabit Ethernet and supports a
data transfer rate of over 10Gigabits per second. The Ethernet or a LAN
port with 8P – 8C type connector along with the male RJ-45 cable is shown
below.
The un-keyed 8P – 8C modular connector is generally referred to the
Ethernet RJ-45. Often, RJ-45 ports are equipped with two LEDs for
indicating transmission and packet detection.
As mentioned earlier, an Ethernet RJ-45 port has 8 pins and the following
picture depicts the pinout of one.
RJ-11
RJ-11 is another type of Registered Jack that is used as an interface for
telephone, modem or ADSL connections. Even though computers are almost
never equipped with an RJ-11 port, they are the main interface in all
telecommunication networks.
RJ-45 and RJ11 ports look alike but RJ-11 is a smaller port and uses a 6
point – 4 contact (6P – 4C) connector even though a 6 point – 2 contact (6P –
2C) is sufficient. The following is a picture of an RJ-11 port and its
compatible connector.
The following image can be used to compare RJ-45 and RJ-11 ports.
e-SATA
e-SATA is an external Serial AT Attachment connector that is used as an
interface for connecting external mass storage devices. Modern e-SATA
connector are called e-SATAp and stands for Power e-SATA ports.
They are hybrid ports capable of supporting both e-SATA and USB. Neither
the SATA organization nor the USB organization has officially approved the
e-SATAp port and must be used at user’s risk.
The above image is of an e-SATAp port. It shows that both e-SATA and
USB devices can be connected.
Input Devices:
Input devices are used for entering data or instructions to the central
processing unit (CPU). The data obtained is converted from human readable
form to machine language (0s and 1s) commonly referred to as binary digits
(bits). The process of converting data to binary digits is called digitizing.
Data and instructions from input devices must be digitized in order for them
to be understood by the computer.
Input devices can be classified according to how they are used to enter
data.
KEYBOARD
A keyboard is a device that converts letters, numbers and other characters
into electrical signals that are machine-readable, so that they can be
recognized by the computer processor. The keyboard is used to enter
textual data. Most computer keyboards follow the QWERTY order, which
refers to the sequence of the alphabetic keys on the top left row on a
standard keyboard. Another keyboard layout is the AZERTY, which is
common in European countries.
During the typing in process, the keyed data and instructions are displayed
on the screen. They are sent as electric signals to the CPU through
electrical pathways called buses where they are digitized, that is, converted
to digital data. They are then displayed back on the screen in human
readable characters, that is, converted to analog data.
In the key-to-store method, data are input directly, saved or stored in a
hard disk, a magnetic tape or a diskette.
The keyboard is divided into several groups based on function:
1. Alphanumeric Keys - Also known as typing keys. They are labelled with
alphabetic letters A to Z,numbers arranged in line 1,2,3……..0 and special
symbols such as ?,%,$ .This group also includes the following keys:Caps
Lock,Enter,,Tab, Spacebar and Backspace.
2. Function keys - usually located along the top of the keyboard. They are labelled
F1,F2….up to F12.They are used for tasks that occur frequently in various programs.
For example pressing F1 key in most programs starts the Help menu.
3. Curser movement and Editing Keys – used to move cursor on the screen. They
include; Page Up, Page Down, Home, End, & the four Arrow Keys.
a) Arrow keys: To move the cursor one character to the right in a
Word processing document, press the Right arrow key; to move
the cursor one character to the left, press the Left arrow key.
To move the cursor one line up, press the Up arrow key; to
move the cursor one line down, press the Down arrow key.
b) Page Up & Page Down: To move the cursor up one page in case
the document has many pages, press the Page Up key; to move
the cursor down one page, press the Page Down key.
c) Home & End keys: To move the cursor to the beginning of the
current line, press the Home key; to move the cursor to the
end of the current line, press the End key.
4. Editing keys.
They are used to delete or insert characters in a document. These are:
a) Backspace key. It has a backward arrow (¥) marked on it. Used
to erase characters to the left of the cursor (i.e., from right
to left on the same line). When pressed, it makes the cursor
move one space backwards and the immediate letter or number
to the left is erased.
b) Delete (Del) key. It is used to erase characters to the right of
the cursor, (i.e., from left to right).
c) Insert (Ins) key. Used in a word processor to switch between
the Insert mode & Overtype mode. When pressed, it helps
the user to insert text in the middle of a sentence or replace a
character at the cursor position (i.e., overwrite the text).
Special purpose keys: used in combination with other keys to give certain commands
to a computer. Examples: Esc,Tab,Shift,Ctrl,Alt,Enter,Num Lock,Scroll Lock, CAPS
Lock.
A Cursor is a blinking underscore ( __ ) or a vertical beam (I ) that shows where the
next character to be typed will appear.
It controls various functions in combination with other keys, e.g. CTRL+”S” is used
to give the command for saving the text/objecNumeric Keys – numeric keypad
consists of a set of numbers 0 to 9 and arithmetic signs like +(addition),-
(subtraction),/(division).They are located on the right hand side of the keyboard.
Only used when the Num Lock keypad is turned on
Types of keyboard
1. Standard/Traditional keyboard ; Is the most common type of keying
device. Though standard keyboards have undergone considerable
changes in design over the last 20 years, their basic layout remains
similar. The average number of keys on a regular keyboard is 105,
though some older versions have keys in the range of 95-103.
2. Flexible keyboard; Is more portable and can be folded and packed into
a bag.
3. Ergonomic Keyboard; Is specially designed to provide comfort and
alleviate wrist strain. This is to prevent Carpal Tunnel Syndrome,
which causes numbness and tingling sensation in the hands and fingers
after typing for a long duration.
4. Braille keyboard; Is a keyboard designed for use by the blind. It
consists of keys identified by raised dots.
5. Keypad; This are small /miniature keyboard which are mostly used on
portable computers such as palmtops, laptops, mobile phones and
PDAs.
6. Wireless keyboards these keyboards do not need to be connected to
the computer via a wire. This makes it very convenient for the user to
use the keyboard comfortably. Three basic types of connections,
Bluetooth, Infrared (IR), and Radio Frequency to connect to the
computer. Radio Frequency (RF) keyboards have a limited range of
only about 6 feet, but are much cheaper than Bluetooth keyboards,
and much more effective than Infrared keyboards. The latest models
of RF keyboards have no issues like frequency disturbance, and can be
the best bet if you do not need more than around 5 feet of freedom.
Infrared (IR) keyboards, have a major drawback. They need to be in
the line-of-sight of the transceiver. This makes it very difficult to
use such keyboards effectively, and almost impossible to use mice
featuring this technology. Though they are not as expensive as
Bluetooth keyboards, and have a decent range of about 12 feet, the
line-of-sight problem makes this type very ineffective.
7. Compact keyboards are slim and usually do not have the numeric
keypad that is present on the right side of other keyboards. These
are typically used in laptops, where sizing issues make it difficult to
accommodate a standard keyboard. To make up for the small size,
these keyboards rely on the use of multiple keys to carry out
functions that would only use a single key on a standard-sized
keyboard. Some models also include a touch-pad that can be used
instead of the mouse.
8. Internet keyboards have special keys, called hot keys, which perform
functions related to Internet usage.
Typical hot keys have functions like back, forward, bookmarks list,
e-mail inbox, Google search, YouTube, shopping online, etc. This
makes browsing the Internet
very convenient, as the user does
not have to go through the
process of clicking buttons via a
mouse.
These days, many standard keyboards
have adopted the concept of Internet
keyboards by placing internet hot keys
at the top, since almost every kind of
work requires the use of the Internet.
POINTING DEVICES
Pointing devices are used for controlling a pointer cursor on the screen. The
items to be entered are selected by either pointing to or clicking on them.
Apart from the mouse, other pointing devices include; trackball, joystick,
light pen and touch sensitive screens.
Mouse
It is used to point to and select items on your computer screen. It has two
buttons: a primary button (left) and a secondary button. Mouse clicking
techniques:
1. Pointing and Single Clicking
2. Double clicking
3. Right clicking
4. Dragging and dropping
5. Scrolling
Types of mouse
1. Standard mouse; The standard mouse or traditional mouse has a ball
underneath, two buttons and an optional scroll button located between
the left and right buttons.
2. Optical mouse; A pointing device found on most PCs. Sensors on the
bottom of the mouse detect when the mouse is moved. Data about this
movement is sent to the computer.
3. Cordless mouse; cordless or wireless mouse, is a battery powered
mouse that uses radio or infrared waves instead of being physically
connected to the system.
4. Joystick/Joypad
Used mainly for playing games. The user
moves the joystick left/right,
forward/back and data about these
movements are sent to the computer.
Small joysticks
can also be found on some mobile
phones.
3. Touch sensitive screens.
A touch screen is an alternative to a separate pointing device. With a touch
screen the user selects items on the screen by touching the surface. This
makes touch screen systems very intuitive and simple to use. Often used for
information terminals in public places e.g. libraries or museums where mice
or keyboards may be stolen or damaged.
4. Light pens and stylus
A light pen is a light sensitive pen-like device connected by a cable to the
computer system. The user brings the light pen to the desired point on the
screen and presses the pen button, which identifies the screen location on
the computer. Commonly used as design aids. Also used as selecting items on
mobile phones, tablets, PDAs.
5. Touchpad
A pointing device found on most laptops. Used instead of a
mouse since it takes up less space. The user moves a finger
across the touch pad and this movement data is sent to the
computer.
6. Pointing Stick
A pointing stick is a small joystick with a pressure
sensitive nub about the size of a pencil eraser. The user
pushes the nub around (not pressing it down) to make the
pointer move in that direction. More pressure makes the
pointer move faster. A pointing stick is usually on the
keyboard of a laptop between the G, H, and B keys. A
pointing stick needs either a touchpad or separate keys
to create clicks like the left and right mouse buttons.
7. Light Pen
A light pen is a device used as a pointing device or to
‘write’ on the screen of a computer. Light pens are rarely
used today since graphics tablets and high-quality touch
screens provide similar functionality.
SCANNING DEVICES
Their first goal was to avoid mistakes in data entry by making the initial
entering of the data as automatic as possible. The second goal was to avoid
having to re-enter data to perform a different task with it. Scanners are
generally classified into two: flatbed and handheld scanners. Flatbed
scanners are named after the flat bed of glass that the item to be scanned
would lie upon, they resemble the top half of a photocopier.
1. Optical scanners.
Optical scanners capture data using a beam of light. A light beam passes
over an object and the image is analyzed by specialized software.
2. Optical Bar-Code
Reader/Recognition
Used to capture data coded in lines of
varying thickness known as barcodes or
Universal Product Code(UPC). Barcodes
holds manufacturer’s details and the
product code but not price details
because prices vary from one place to
another.
Optical Marks Reader
OMR detects human marked data from document forms such as surveys and
tests. OMR is used to recognize the type of mark made by pen or pencil.
This is how, for instance standardized tests such as KCPE, SAT or GMAT
are scored. These marks can then be detected by an OMR scanner.
Common uses of OMR are multiple-choice exam answer sheets and lottery
number forms. It is specially used for checking the answer sheets of
examinations having multiple choice questions.
OCR
Optical Character Recognition: An OCR
scanner is used to read handwritten
characters, typewritten or printed text
into machine encoded text. Today, a
more advanced OCR scanner called a
flat-bed scanner is used to capture
pictures and real objects. An OCR
software is used in this process.
Documents must be carefully checked for wrong conversions. If the original
print was not very crisp and clean, errors are very likely. Manually checking
for proper conversion is necessary. These programs are getting really good
if they have a clear scan to work with.
Some use of OCR
Handling sales orders
Clearing Cheques
Magnetic scanners
Magnetic scanners are used to capture data written using magnetic ink or
coded onto a magnetic strip. This device uses the principle of magnetism to
sense the document characters, which have been written using magnetized
ink. The ink is magnetized using particles of iron(II) oxide.
Common examples of magnetic scanners are, the Magnetic Ink Character
Reader/Recognition (MICR), Magnetic Strip Readers (MSR) and card
readers.
Magnetic Ink Character Reader (MICR)
Magnetic Ink Character Recognition (MICR) is a technology that allows
details from bank cheques to be read into a computer quickly and accurately.
The cheque number and bank account
number are printed at the bottom of each
bank cheque in special magnetic ink using a
special font. These numbers can be
detected by an MICR reader.The details of
the cheque, for example, serial number, bank
branch number, and account holder’s number, among others are coded in
magnetic ink.
It is more secure against forgery than the OCR. Reading speed is high.
One disadvantage of MICR is that the system is expensive.
Input: Digitizer
Digitizers convert analog or physical input into digital images. This makes
them related to both scanners and mice, although current digitizers serve
completely different roles. They can be used by the computer to create a
picture of whatever the camera had been pointed at. Modern digitizers
appear as flat scanning surfaces or tablets that connect to a computer
workstation. The surface is touch-sensitive, sending signals to the software,
which translates them into images on the screen.
Digitizers carry out important work in
computer-aided design, graphics design
and engineering. They also help convert
hand-drawn images into textures and
animation in video games and movie CGI
[The common gateway interface (CGI) is a standard way for a Web server to
pass a Web user's request to an application program and to receive data
back to forward to the user].
N/B:
Stylus-The flat surface may be a screen on a monitor or mobile device, a
signature capture pad, or a graphics tablet. A stylus is a small metal or
plastic device that looks like a tiny ink pen but uses pressure instead of ink.
Digital Pen-A digital pen, which is slightly larger than a stylus, typically
provides more functionality than a stylus, featuring electronic erasers and
programmable buttons. Most digital pens, often simply called pens, are
pressure-sensitive.
Output devices
Output devices are peripheral devices that a computer uses to give out
information produced after the processing operations. There are two types
of output devices namely the softcopy and the hardcopy output
devices. Softcopy refers to intangible output mainly displayed on the screen
or through other output devices such as speakers. A hardcopy is a tangible
output produced mostly on papers by devices such as printers.
Softcopy output devices.
Some of the softcopy output devices are;
Output devices
The most common hardcopy output devices are printers and plotters.
Output: printers
Printers produce a hardcopy of information on papers. The quality of the
hardcopy depends on the printers printing mechanism. There are two types
of printers namely impact and non-impact printers−
Impact Printers
Impact printers print the characters by striking them on the ribbon, which
is then pressed on the paper.
Characteristics of Impact Printers are the following −
● Very low consumable costs
● Very noisy
● Useful for bulk printing due to low cost
● There is physical contact with the paper to produce an image
These printers are of two types −
● Character printers
● Line printers
Character Printers
Character printers are the printers which print one character
at a time.
These are further divided into two types:
● Dot Matrix Printer(DMP)
● Daisy Wheel
Dot Matrix Printer
In the market, one of the most popular printers is Dot Matrix Printer. These
printers are popular because of their ease of printing and economical price.
Each character printed is in the form of pattern of dots and head consists
of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out to form a
character which is why it is called Dot Matrix Printer.
Advantages
● Inexpensive
● Widely Used
● Other language characters can be printed
Disadvantages
● Slow Speed
● Poor Quality
Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals
of Daisy flower which is why it is called Daisy Wheel Printer. These printers
are generally used for word-processing in offices that require a few letters
to be sent here and there with very nice quality.
Advantages
● More reliable than DMP
● Better quality
● Fonts of character can be easily changed
Disadvantages
● Slower than DMP
● Noisy
● More expensive than DMP
Line Printers
Line printers are the printers which print one line at a time.
These are of two types −
● Drum Printer
● Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The
surface of the drum is divided into a number of tracks. Total tracks are
equal to the size of the paper, i.e. for a paper width of 132 characters, drum
will have 132 tracks. A character set is embossed on the track. Different
character sets available in the market are 48 character set, 64 and 96
characters set. One rotation of drum prints one line. Drum printers are fast
in speed and can print 300 to 2000 lines per minute.
Advantages
● Very high speed
Disadvantages
● Very expensive
● Characters fonts cannot be changed
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain
Printer. A standard character set may have 48, 64, or 96 characters.
Advantages
● Character fonts can easily be changed.
● Different languages can be used with the same printer.
Disadvantages
● Noisy
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These
printers print a complete page at a time, thus they are also called as Page
Printers.
These printers are of two types −
● Laser Printers
● Inkjet Printers
Characteristics of Non-impact Printers
● Faster than impact printers
● They are not noisy
● High quality
● Supports many fonts and different character size
Laser Printers
These are non-impact page printers. They use laser lights to produce the
dots needed to form the characters to be printed on a page.
Advantages
● Very high speed
● Very high quality output
● Good graphics quality
● Supports many fonts and different character size
Disadvantages
● Expensive
● Cannot be used to produce multiple copies of a document in a single
printing
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new
technology. They print characters by spraying small drops of ink onto paper.
Inkjet printers produce high quality output with presentable features.
They make less noise because no hammering is done and these have many
styles of printing modes available. Color printing is also possible. Some
models of Inkjet printers can produce multiple copies of printing also.
Advantages
● High quality printing
● More reliable
Disadvantages
● Expensive as the cost per page is high
● Slow as compared to laser printer
Fax Machine
A device that sends and receives printed pages or images over telephone
lines by digitizing the material with an internal optical scanner and
transmitting the information as electronic signals. Surprisingly, fax machines
are still used routinely in many places. In fact, faxes were once at the
forefront of communication technologies. Even today, it is regularly used by
law enforcement agencies for bail postings or the delivery of public records.
Businesses also still use it as a “network effect”; “Because other people are
using it”.
b) Flat-Bed Plotter
A flat-bed plotter is a mechanical drafting device used with many CAD
programs for designers. The paper remains stationary on a flat surface while
a pen moves across it horizontally and vertically. This plotter may use
several different pen colors to create the graphics. The size of the graphic
is limited to the size of the flat-bed plotter's surface.
c) Inkjet Plotter
The inkjet plotter creates an image by spraying small droplets of ink on to
paper. A popular choice for advertising agencies and graphic designers,
inkjet plotters are used generally for large outputs, such as banners and
billboards and large signs often seen along roadsides. They are available in
thermal or piezoelectric models. Thermal inkjet plotters use heat to apply
droplets of ink, while piezoelectric plotters use charged crystals to apply
the ink. Inkjet plotters typically produce better quality graphics than other
plotter types.
d) Cutting Plotter
The cutting plotter is a large scale cutting device that produces ready-cut
mylar or vinyl lettering and graphics. Automated plotter knives cut into a
sheet of the material lying on the plotter's flat surface area, carving out
the design stored in the attached computer. Used for sign making, billboard
advertising and vehicle graphics, the devices offer far greater speed and
precision than can be achieved with the traditional method of creating sign
lettering and logos by hand.
Voice Output Devices
Use prerecorded vocalized sounds to produce output. The computer speaks
synthesized words. Most widely used voice output devices are stereo
speakers and headphones. Devices are connected to a sound card in the
system unit. Sound card is used to capture sound as well as play it back.
Examples of voice output uses:
Telephones and in cars
Learning - help student study foreign language
In supermarkets at the counter to confirm purchases.
Assist the physically challenged
Output: Speakers
Speakers are used to output sound from a computer. Sound may be inform of
music, warning, video, interactive communication with a computer etc.
Speakers are used to connect to a computer to generate sound, which are
one of the most common output devices. Some speakers are designed to
connect with any kind of sound system, while some can be hooked up only
with computers. ... The amplitude and frequency define the sound produced
by speakers.
Memory Unit
The CPU transfers instructions and, when necessary their input data, called
operands, from the Main Memory into the registers of the CPU. The CPU
executes the instructions in their stored sequence (one after another)
except when the execution sequence is explicitly altered by a branch
instruction. When necessary, the CPU transfers results from the CPU
registers into the Main Memory (RAM). The RAM can store instructions,
data, and intermediate results. This unit supplies information to other units
of the computer when needed. It is also known as internal storage unit or
the main memory or the primary storage or Random-Access Memory (RAM).
Its size affects speed, power, and capability. Functions of the memory unit
are −
● It stores all the data and the instructions required for processing.
● It stores intermediate results of processing.
● It stores the final results of processing before these results are
released to an output device.
● All inputs and outputs are transmitted through the main memory.
Processors from AMD and Intel feature at least two levels of cache:
Level 1 (L1) cache is built into the processor core. L1 cache is
relatively small (8KB–64KB). When the processor needs to access
memory, it checks the contents of L1 cache first.
Level 2 (L2) cache is also built into the processor. On older slot-
mounted processors, L2 cache was external to the processor die, and
ran at slower speeds than the processor. On socketed processors, L2
cache is built into the processor die. If the processor does not find
the desired memory locations in L1 cache, it checks L2 cache next.
Level 3 (L3) cache is found on some very high-performance processors
from Intel (such as the Core i7 series) and on several high-
performance and mid-level processors from AMD. L3 is also built into
the processor die. On systems with L3 cache, the processor checks L3
cache after checking L1 and L2 caches.
If cache memory does not contain the desired information, the
processor retrieves the desired information from main memory, and
stores copies of that information in its cache memory (L1 and L2, or
L1, L2, and L3). Processors with larger L2 caches (or L2 and L3 caches)
perform most tasks much more quickly than processors that have
smaller L2 caches for two reasons. Cache memory is faster than main
memory, and the processor checks cache memory for needed
information before checking main memory.
With Internet browsers, cache is a temporary storage area where
website data is stored. By caching this data, the web browser can
improve performance by loading data from your disk, instead of the
Internet, if it is ever needed again. In most cases, each time you open
a web page, the page and all its files are sent to the browser's
temporary cache on the hard drive. If the web page and its resources
have not changed since the last time you viewed it, the browser loads
the data from cache rather than downloading the files again. Cache
saves lots of time, especially if you use a modem, and can also help
save on bandwidth for the website owner.
Tip
Anyone concerned about their privacy or want to hide pages they have
visited can clear their Internet cache. If you clear your Internet
browser cache frequently, you may also want to consider using
incognito mode
2. Clock Speed/rate
Microprocessor Transistors Clock Speed
Word Size
Intel Pentium IV 42 million 2.4 GHz 32
bit
AMD Athlon64 105.9 million 2.2 GHz 32 bit
AMD K10 758 million 1.6 GHz 64 bit
Intel i7 Quad 731 million 2.93 GHz 64
bit
Intel Atom Z540 47 million 1.86 GHz 64
bit
Intel i7 Six Core 2.2 billion 3.9 GHz 64
bit
An internal system clock synchronizes the machine cycle. On each
clock tick, the CPU executes another instruction. Clock speed is the
rate at which the CPU carries out its basic instructions. Computers
execute instructions very rapidly, at speeds measured in hertz.
Microcomputer clock speed is measured in megahertz (MHz, millions
of cycles/second) or gigahertz (GHz, billions of cycles/second).
Newer chip set designs combined with faster electronic storage are
making it is difficult to rate CPU performance solely on clock speed.
Increasing internal clock speed is just one method of improving the
performance of a CPU. Other performance features must also be
optimized to take full advantage of the processor’s power.
3. Word Size
One important factor that contributes to CPU power is the amount of
data or instructions that are moved through a processor in one
machine cycle.
Word size refers to the group of bits that a processor can manipulate
as a unit in one machine cycle. A 64-bit processor can manipulate 64
bits (or 8 bytes) of data at one time, clearly an advantage over a 32-
bit (4 bytes) processor.
4. Bus Width
Another performance factor is the width of the system bus between
the processor and memory. A bus is an electronic path for the flow of
data. The system bus is an electronic pathway between the CPU,
memory, and other system components. The processor has two bus
connections to memory: the data bus and the address bus. The data
bus is the set of pathways that carries the actual data between
memory and the CPU. A 64-bit data bus can move 8 bytes of data to
the processor in the same machine cycle. The data bus width should
be matched to the word size of the CPU for optimum performance.
The address bus is the electronic pathway that carries information
about the memory locations of data. The width of the address bus
determines how much potential memory a processor can recognize.
Larger address buses mean the processor can address more memory.
Processors that use a 64-bit address bus can access a potential of 16
GB of memory. The processor’s ability to access a large address space
is important for multimedia applications. Digital video, sound, and
images produce large data files. Larger address buses support faster
multimedia processing by allowing these files to be moved from hard
drives, CD-ROMs, DVDs, and other peripheral storage devices to the
computer’s electronic memory where they can be processed and
displayed faster.
N/B:- Control Bus : The control bus carries the control signals that
make sure everything is flowing smoothly from place to place.
5. Pipelining
Microprocessor manufacturers such as Intel, Motorola, and IBM
utilize additional techniques to maximize the CPU’s speed. Pipelining
increases CPU efficiency by reading an instruction, starting
processing, and reading another instruction before finishing the
previous one. Using pipelining, different steps of the machine cycle
can be carried out on several instructions simultaneously. This reduces
CPU idle time and increases the speed at which instructions can be
executed.
Processors have multiple pipelines (separate internal buses) that
operate simultaneously. To understand pipelining, take the example of
a fast-food restaurant. In the restaurant, assume that there are five
steps (and one employee per step) involved in making a burger and
giving it to the customer. First, (1) take the order and input it into the
computer system; (2) brown the buns and cook the burgers; (3) add
the condiments to the buns and burgers; (4) wrap the burgers, add
fries, and insert them into the bag; and then (5) take the customer’s
money and give the bag to the customer. Keep in mind that the person
taking the customer’s order and inputting the order can serve another
customer once he or she has completed this task for the first
customer. The same is true for each person along the line. (1) Make
your employees work faster; (2) break the tasks into smaller tasks
(such as seven steps instead of five and have seven people); or, (3)
have more lines of people doing exactly the same process tasks.
To relate this to processors, making the employees work faster is the
same as increasing the CPU clock speed. Breaking the tasks into
smaller tasks is the same as changing the structure of the CPU
pipeline. Instead of performing the standard 5 tasks, the CPU might
perform 6, 7, 14, 20, or even more steps. This allows each step to be
acted upon more quickly, the task to be smaller, and production to be
faster. Having more lines of people doing the same complete process is
like having multiple pipelines.
A 32- or 64-bit CPU can have separate paths, each of which handles
32 or 64 bits. For example, if a processor has two pipelines, the Dear
Mom letter can be in one pipeline, while a photo upload using a
different application can be in the other pipeline.
A processor might have 12 pipelines for integers and 17 pipelines for
floating-point numbers. (A floating-point number is a number that can
include a decimal point.) Other processors contain anywhere from 20-
to 31-stage pipelines. Debate continues about whether a longer
pipeline improves performance.
6. Multiprocessing
Multiprocessing can also improve system performance. Multiprocessing
is a combination of multiple processors on the system board that
execute instructions simultaneously. There are several approaches to
multiprocessing. Computers may have a CPU and math coprocessor or
graphics coprocessor working together to increase the overall
performance of a system.
The Apple G5 computer has dual processors that speed CPU
operations using 64-bit chips, reaching processing power comparable
to a supercomputer. Multimedia development may also employ parallel
processing, a technique of linking multiple processors to operate at
the same time on a single task. Parallel processing is often used to
speed the final stage of 3-D animation, known as rendering.
7. Multicore Technology
Multicore processors are an increasingly popular approach to
multiprocessing in personal computers. A processor core is a CPU’s
“computational engine,” that is, those components that directly
execute instructions. Older processors were single core. The CPU was
built around a single computational engine that fetched and executed
each command in the pipeline as fast as it could. To improve
processing capacity, engineers increased clock speeds and made other
improvements that added transistors to the CPU. However, the extra
electronics increased the heat on the chip and did not achieve the
performance gains necessary for current computing demands.
Manufacturers looked for a different strategy to increase processing
speeds while reducing heat and improving energy efficiency. The
result was the multicore architecture. Multicore technology combines
two or more processor cores and cache memory on a single integrated
circuit. A dual-core processor has two execution cores and two L2
memory caches. These two “cores” work together simultaneously to
carry out different tasks. More cores can be added to further
improve computer response time for increasingly complex operations.
[For example, intel(R) core (TM) 2 Duo CPU). To achieve these
computing gains however, the operating system and applications must
be adjusted to take advantage of the multiple cores using a technique
called multi-threading, or passing tasks simultaneously to different
cores to execute.
Multicore processors can significantly improve performance in
multitasking work
Environments where one processor core can address one task while a
second task is completed by another core. For example, one core
might be directed to writing a DVD and a second one to editing images
in Photoshop. A multicore processor would execute both tasks faster
because each core could address a separate task. This can speed the
process of multimedia development. The technology also has benefits
for multimedia playback, particularly for graphics-intensive
applications. Multicore processors are used in many video gaming
consoles where they speed real-time rendering of complex graphics
and player interactions. The fetch/execute cycle of the CPU is
optimized by a variety of techniques to increase speed and deal with
more complex data types. By increasing clock speed, word size, and
the system bus, the control unit and ALU can process data faster.
New developments in pipelining, multiprocessing, and multicore chips
are producing faster processors that can handle increasingly complex
commands for manipulating multimedia data. Research continues to
improve the speed and performance of the CPU. Moore’s Law suggests
that manufacturers can double the speed of a processor every 18
months. Future computers may use nanotechnology to achieve smaller
and faster processors. Reliance on electronics may be replaced with
optical circuitry to increase the speed of processing to “light speed.”
Whatever the technique, we can expect new computer processors to
continue to show improvements in performance.
BUS SYSTEM
What is Computer Bus is the electrically conducting path along which data
is transmitted inside any digital electronic device. The Computer bus helps
the various parts of the PC to communicate. A Computer bus consists of a
set of parallel conductors, which may be conventional wires, copper tracks on
a PRINTED CIRCUIT BOARD, or microscopic aluminum trails on the surface
of a silicon chip.
A computer bus normally has a single word memory circuit called a
LATCH attached to either end, which briefly stores the word being
transmitted and ensures that each bit has settled to its intended state
before its value is transmitted.
If there was no bus, you would have an unwieldy number of wires connecting
every part to every other part. It would be like having separate wiring for
every light bulb and socket in your house.
The bus contains multiple wires (signal lines) that contain addressing
information that describes the memory location of where the data is being
sent or where it is being retrieved.
How Does Computer Bus Work?
A bus transfers electrical signals from one place to another. An actual bus
appears as an endless amount of etched copper circuits on the
motherboard’s surface. The bus is connected to the CPU through the Bus
Interface Unit.
Each wire in the bus carries a single bit of information, which means the
more wires a bus has the more information it can address. For example, a
computer with a 32-bit address bus can address 4 GB of memory, and a
computer with a 36-bit bus can address 64 GB of memory.
A computer or device's bus speed is listed in MHz, e.g., 100 MHz FSB. The
throughput of a bus is measured in bits per second or megabytes per second.
Data travels between the CPU and memory along the data bus. The location
(address) of that data is carried along the address bus.
A clock signal which keeps everything in synch travels along the control bus.
The clock acts like a traffic light for all the PC’s components; the “green
light” goes on with each clock tick. A PC’s clock can “tick” anywhere from 20
to 65 million times per second, which makes it seem like a computer is really
fast. But since each task (such as saving a file) is made up of several
programmed instructions, and each of those instructions takes several clock
cycles to carry out, a person sometimes has to sit and wait for the computer
to catch up.
B) System Software
The software that helps to activate the computer system and provide
operating environment for other application software is called system
software. Its primary work is to control, integrate and manage the individual
hardware components of the computer system. System software is the basic
requirement of a computer system. System software is further classified
into:
(i) Operating Systems
An operating system is a program that acts as an interface between the user
and the computer hardware and controls the execution of all kinds of
programs.
The operating system is the most important program that runs in
every computer to manages the resources of a computer i.e hardware and
software.
An Operating System (OS) is an interface between a computer user and
computer hardware. An operating system is a software which performs all
the basic tasks like file management, memory management, process
management, handling input and output, and controlling peripheral devices
such as disk drives and printers.
There are primarily three choices: Windows, Linux, Apple OS X.
● Linux is free, however people generally do not use it for home purpose.
● Apple OS X works only on Apple desktops.
● Windows 7 is very popular among desktop users.
● Most of the computers come pre-equipped with Windows 7 Starter
edition.
● Windows 8 is recently introduced and is available in the market.
● Windows 7 and Windows 8 come in multiple versions from starter,
home basic, home premium, professional, ultimate, and enterprise
editions.
(ii) Utility software
These are system softwares designed to help analyze, configure, optimize
or maintain the computer. Utility software usually focuses on how the
computer infrastructure (including the computer hardware, operating
system, application software and data storage) operates..
● Anti-virus used to scan for computer viruses in memory and storage
devices.
● Backup software can make copies of all information stored on a disk
and restore either the entire disk (e.g. in an event of disk failure) or
selected files (e.g. in an event of accidental deletion).
● Disk cleaners can find files that are unnecessary to computer
operation, or take up considerable amounts of space. Disk cleaner
helps the user to decide what to delete when their hard disk is full.
A. PACKAGED SOFTWARE
Advantages of packaged software Disadvantages of packaged
software
1) No development time. They can easily If procured from foreign vendor without
Development be installed immediately and run. local representative, offering support and
time customization, the application package may
not readily yield the special MIS reports the
user wants.
2) They are readily available for almost Unless dealing with a local vendor or a
Completeness any task. foreign vendor with local presence, technical
of solution support may be expensive to access (long-
distance phone calls) and/or involve robotic
systems with no human touch.
3) Cost They are less expensive to acquire than Some packaged software products can be
the cost of developing in-house very difficult to use since they have very
software. many option thefre by confusing the user.
User must choose wisely.
B. TAILOR-MADE SOFTWARE
4) Technical support If dealing with an established vendor Unless dealing with a established
organization, tech support is available. organization, technical support
for a price. may not be reliable, or even
available at all.
The table below gives examples and uses of common application packages
1. Feasibility study
The feasibility study, that is computer feasibility study and not project
feasibility study, should establish:
The replies are evaluated by the steering committee and the decisions taken
are contained in the feasibility study report, which contains the following:
COMPUTER ACQUISITION
There are several methods that can be applied in acquiring Hardware and for
an organization. Some major options are buy, lease, develop in-house, or
outsourcing a system from any other companies.
In the past anything that has been deemed strategic has been built in-house
but the trend to outsource and buy more systems has grown. Below are some
critical factors that should be evaluated prior to choose preferable IS
procurement strategy, whether to buy, lease, build in-house, or outsource.
1. Outright purchase
The computer facility is obtained by payment of the amount that is
equivalent to the value of the computer to the supplier.
It involves purchase of the facility followed by transfer of ownership from
the supplier to the purchasing firm. Payment can be made in cash, loan
arrangements or hire purchase.
Advantages
• The computer becomes an asset to the buyer
• Can be used for loan acquisition in bank as security.
• The choice of the facility solely depends on the buyer.
• It may be cheaper in the long run
• Frequent expenditure is not expected since the facility is bought
once
• The buyer may decide to resell the facility to generate cash
depending on the market value of the equipment.
• No charge for additional work done like in renting.
Disadvantages
• High initial cost
• In the long run the computer may become obsolete due to
technological changes
• High maintenance costs
• The computer at times may be below or beyond the configuration
capabilities.
• It may not sometimes be able to process certain types of data
• In case of loss, the buyer is affected directly
2. Rental method
This involves installation of the facility at the user’s premises in an
agreement to pay a fixed periodic charge to the owner. The period is
usually short for example a day, week or month.
Advantages
● Cheaper in the short run
● The effects of technological change are minimized since up-to-date
facilities are always rented
● No large initial expenditure is needed
● Maintenance of the facility is a responsibility of the owner
● Obsolescence is not a concern of the user.
●
Disadvantages
Advantages
● It’s the cheapest method especially in the short run
● Makes it possible for companies without capital to purchase their own
facility, to have the service
● Organisations can use a computer bureau in case of peak loads.
● Good for those without the expertise.
● Can be used in case of loss or failure of the in-house system
● It is faster at processing client’s work
● As a means of evaluation facilities before installing
● Staffing costs are spread over all the bureau users
Disadvantages
● The facility doesn’t become an asset to the clients
● Clients may not be able to gain the necessary experience since the
processing is done for them
● Client’s confidential information can be leaked
● Mistakes are likely to be made
● May not provide all the services as desired by the client
Worms
Worm Example:
Ransomware Example:
This year, the city of Baltimore was hit by a type of ransomware named
RobbinHood, which halted all city activities, including tax collection,
property transfers, and government email for weeks. This attack has cost
the city more than $18 million so far, and costs continue to accrue. The
same type of malware was used against the city of Atlanta in 2018,
resulting in costs of $17 million.
2. Fileless Malware
3. Spyware
Spyware collects information about users’ activities without their
knowledge or consent. This can include passwords, pins, payment
information and unstructured messages.
The use of spyware is not limited to the desktop browser: it can also
operate in a critical app or on a mobile phone.
Spyware Example:
4. Adware
Adware Example:
5. Trojan
Trojan Example:
6. Worms
Worm Example:
7. Virus
8. Rootkits
Rootkit Example:
9. Keyloggers
Keylogger Example:
10. Bots/Botnets
Botnet Example:
Triada is a rooting Trojan that was injected into the supply chain when
millions of Android devices shipped with the malware pre-installed.
Triada gains access to sensitive areas in the operating system and installs
spam apps. The spam apps display ads, sometimes replacing legitimate ads.
When a user clicks on one of the unauthorized ads, the revenue from
that click goes to Triada’s developers.
A wiper is a type of malware with a single purpose: to erase user data and
ensure it can’t be recovered. Wipers are used to take down computer
networks in public or private companies across various sectors. Threat
actors also use wipers to cover up traces left after an intrusion,
weakening their victim’s ability to respond.
Slow computer
Very frequent ads and pop-ups, especially if they appear in unexpected places
Battery drains rapidly
System crashes
Sudden loss in disk space
Browser settings change on their own
Browser redirects on its own
Unfamiliar apps appear on mobile device
Increase in system’s internet activity
Disabled antivirus product
Lost access to files or computer
Deleted files
Contacts receive strange messages from you
Regular Breaks
Computer users, both in workplaces and in schools, should be encouraged to
take regular breaks if working for protracted periods on a computer. This
may mean leaving the workstation for a few minutes every hour to avail of a
work-break or to engage briefly in some other work-related activity. Not
only will this allow eye muscles to re-adjust, it will also refresh all of the
body’s muscles, promoting personal health and a safe learning environment.
By encouraging such practices in schools, teachers are reinforcing the
importance of human– computer interaction, allowing students to form
positive habits at an early stage in their development, ones that they can
take with them into the world of work.
Computer Laboratory: The computer laboratory or simply computer lab is a
special room set aside and prepared specifically for safe installation and use
of computers.
Requirements of a Computer Laboratory.
i. Standard and Enough furniture.
ii. Good ventilation.
iii. Reliable & Enough source of power supply.
iv. Free from Dust and Moisture.
v. Enough floor space.
vi. Proper cabling of electric wires.
vii. Firefighting equipment. Fitted with gaseous fire extinguisher.
viii. Good lighting equipment.
ix. Strong rooms & doors for the security of computers.
TELECOMMUNICATION
Telecommunication is the science and practice of transmitting information by
electromagnetic means. Telecommunications are the means of electronic
transmission of information over distances. The information may be in the form of
voice telephone calls, data, text, images, or video. ... Telecommunications links that
form a channel through which information is transmitted from a sending device to a
receiving device. Digital transmission is employed in order to achieve high reliability
and because the cost of digital switching systems is much lower than the cost
of analog systems. In order to use digital transmission, however, the analog signals
that make up most voice, radio, and television communication must be subjected to a
process of analog-to-digital conversion. (In data transmission this step is bypassed
because the signals are already in digital form; most television, radio, and voice
communication, however, use the analog system and must be digitized.) In many
cases, the digitized signal is passed through a source encoder, which employs a
number of formulas to reduce redundant binary information. After source encoding,
the digitized signal is processed in a channel encoder, which introduces redundant
information that allows errors to be detected and corrected. The encoded signal is
made suitable for transmission by modulation onto a carrier wave and may be made
part of a larger signal in a process known as multiplexing. The multiplexed signal is
then sent into a multiple-access transmission channel. After transmission, the above
process is reversed at the receiving end, and the information is extracted.
TYPES OF A NETWORK/TELECOMMUNICATION NETWORKS
Networks are categorized based on the following characteristics:
1. Network coverage/scale/scope/size: LAN, MAN, WAN
2. Network topologies. How the computers are connected together
3. Network technologies
4. Network architecture/functionality
Network coverage/scale/scope/size
Network coverage/scale/scope/size
The following factors are considered while selecting a topology:
1. Cost
2. Reliability
3. Scalability- produced in a range of capabilities
4. Bandwidth capacity
5. Ease of installation
6. Ease of troubleshooting
7. Delay involved in routing information from one node to another.
Types of Topologies
Limited failure: A failure in one node will not have any effect on other
nodes.
Ring Topology
1. Single ring - In single ring network, a single cable is shared by all the devices and
data travel only in one direction.
Each device waits for its turn and then transmits. When the data reaches its
destination, another device can transmit.
2. Dual ring: This topology uses two rings to send the data, each in different
direction. Thus allowing more packets to be sent over the network. Dual-
ring Topology
Advantages of Dual-ring Topology
• Very orderly network where every device has access to the token and the
opportunity to transmit.
• Performs better than a star topology under heavy network load.
• Does not require network server to manage the connectivity between the
computers.
Disadvantages of Dual-ring Topology
• One malfunctioning workstation or bad port can create problems for the entire
network.
• Moves, adds and changes of devices can affect the network.
• Much slower than and bus network under normal load.
Star Topology
The central computer is known as a server, and the peripheral devices attached to
the server are known as clients.
Advantages of Star Topology
Limited failure: As each station is connected to the central hub with its
own cable, therefore failure in one cable will not affect the entire
network.
o Dependency of the whole topology on one single point, the hub: If the
central hub or switch goes down, then all the connected nodes will not be
able to communicate with each other.
o Although a star requires far less cable than a mesh, each node must be
linked to a central hub. For this reason, often more cabling is required in a
star than in some other topologies (such as ring or bus).
Mesh Topology
The use of dedicated links guarantees that each connection can carry its
own data load, thus eliminating the traffic problems that can occur when
links must be shared by multiple devices.
The sheer bulk of the wiring can be greater than the available space (in
walls, ceilings, or floors) can accommodate.
Tree Topology
Advantages:
Easily expandable: As long as one connection exists, the new line can
expand the reach of the network by creating another simple point of
access.
Limited failure: The breakdown in one station does not affect the entire
network.
The network can be expanded by the addition of secondary nodes. Thus,
scalability is achieved.
Disadvantages:
Failure: A tree topology mainly relies on main bus cable and failure in
main bus cable will damage the overall network.
Owing to its size and complexity, maintenance is not easy and costs are
high. Also, configuration is difficult in comparison to that in other
topologies.
Though it is scalable, the number of nodes that can be added depends on
the capacity of the central bus and on the cable type.
Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the
functioning of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as
these hubs are different from usual Hubs used in other topologies.
B. Client/Server Architecture
In a client/server network, a centralized, really powerful computer(server) acts as
a hub in which other computers or workstations(clients) can connect to. This server
is the heart of the system, which manages and provides resources to any client
that requests them.
Connection method
Connection method
Communication Systems can be Wired or Wireless and the medium used for
communication can be Guided or Unguided. In Wired Communication, the medium is
a physical path like Co-axial Cables, Twisted Pair Cables and Optical Fiber Links
etc. which guides the signal to propagate from one point to other.
On the other hand, Wireless Communication doesn’t require any physical medium
but propagates the signal through space. Since, space only allows for signal
transmission without any guidance, the medium used in Wireless Communication is
called Unguided Medium.
Generally, in a communication system, information is transmitted from transmitter
to receiver that are placed over a limited distance. With the help of Wireless
Communication, the transmitter and receiver can be placed anywhere between few
meters (like a T.V. Remote Control) to few thousand kilometers (Satellite
Communication).
a) Wired technologies
Twisted pair wire is the most widely used medium for telecommunication. Twisted-
pair wires are ordinary telephone wires which consist of two insulated copper wires
twisted into pairs and are used for both voice and data transmission. Compared to
a single conductor or an untwisted balanced pair, a twisted pair reduces
electromagnetic radiation from the pair and crosstalk between neighbouring pairs
and improves rejection of external electromagnetic interference. The transmission
speed ranges from 2 million bits per second to 100 million bits per second.
Coaxial cable is widely used for cable television systems, office buildings, and
other worksites for local area networks. The cables consist of copper or aluminium
wire wrapped with insulating layer typically of a flexible material with a high
dielectric constant, all of which are surrounded by a conductive layer. The layers
of insulation help minimize interference and distortion. Transmission speed range
from 200 million to more than 500 million bits per second.
Optical fiber cable consists of one or more filaments of glass fiber wrapped in
protective layers. It transmits light which can travel over extended distances.
Fiber-optic cables are not affected by electromagnetic radiation. Transmission
speed may reach trillions of bits per second. The transmission speed of fiber
optics is hundreds of times faster than for coaxial cables and thousands of times
faster than a twisted-pair wire.
b) Wireless technologies
If there is no physical medium, then how does wireless communication transmit
signals? Even though there are no cables used in wireless communication, the
transmission and reception of signals is accomplished with Antennas.
Antennas are electrical devices that transform the electrical signals to radio
signals in the form of Electromagnetic (EM) Waves and vice versa. These
Electromagnetic Waves propagates through space. Hence, both transmitter and
receiver consist of an antenna. We can divide wireless transmission into three
broad groups:
1. Radio waves
2. Micro waves
3. Infrared waves
Radio Waves
Radio waves are a type of electromagnetic radiation best-known for their
use in communication technologies, such as television, mobile phones and
radios. These devices receive radio waves and convert them to mechanical
vibrations in the speaker to create sound waves.
Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are
normally called radio waves.
Radio waves are omnidirectional. When an antenna transmits radio waves,
they are propagated in all directions. This means that the sending and
receiving antennas do not have to be aligned. A sending antenna send waves
that can be received by any receiving antenna. The omnidirectional property
has disadvantage, too. The radio waves transmitted by one antenna are
susceptible to interference by another antenna that may send signal suing
the same frequency or band.
Radio waves, particularly with those of low and medium frequencies, can
penetrate walls. This characteristic can be both an advantage and a
disadvantage. It is an advantage because, an AM radio can receive signals
inside a building. It is a disadvantage because we cannot isolate a
communication to just inside or outside a building.
Applications of Radio Waves
The omnidirectional characteristics of radio waves make them useful
for multicasting in which there is one sender but many receivers.
AM and FM radio, television, maritime radio, cordless phones, and
paging are examples of multicasting.
Wireless LANs – Wireless local area network use a high frequency radio
technology (radio frequency). Similar to digital cellular and a low-frequency
radio technology. Wireless LANs use spread spectrum technology to enable
communication between multiple devices in a limited area. An example of
open standards wireless radio-wave technology is IEEE.
Micro Waves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
micro waves. Micro waves are unidirectional. When an antenna transmits
microwaves, they can be narrowly focused. This means that the sending and
receiving antennas need to be aligned. The unidirectional property has an
obvious advantage. A pair of antennas can be aligned without interfering with
another pair of aligned antennas.
The following describes some characteristics of microwaves propagation:
Microwave propagation is line-of-sight. Since the towers with the
mounted antennas need to be in direct sight of each other, towers
that are far apart need to be very tall.
Very high-frequency microwaves cannot penetrate walls. This
characteristic can be a disadvantage if receivers are inside the
buildings.
The microwave band is relatively wide, almost 299 GHz. Therefore,
wider sub-bands can be assigned and a high date rate is possible.
Use of certain portions of the band requires permission from
authorities.
Applications of Micro Waves
Microwaves, due to their unidirectional properties, are very useful when
unicast(one-to-one) communication is needed between the sender and the
receiver. They are used in cellular phones, satellite networks and wireless
LANs. The satellites can relay signals around the Earth. Microwaves are
used because they pass through the atmosphere and through the
ionosphere. Mobile phones use microwave signals.
There are 2 types of Microwave Transmission :
1. Terrestrial Microwave
2. Satellite Microwave
Terrestrial Microwave
Terrestrial microwaves use Earth- based transmitter and receiver. The
equipment looks similar to satellite dishes. Terrestrial microwaves use low-
gigahertz range, which limits all communications to line-of-sight. Path
between relay stations spaced approx, 30 miles apart. Microwave antennas
are usually placed on top of buildings, towers, hills, and mountain peaks.
For increasing the distance served by terrestrial microwave, repeaters can
be installed with each antenna. The signal received by an antenna can be
converted into transmittable form and relayed to next antenna as shown in
below figure. It is an example of telephone systems all over the world
Satellite Microwave
The satellites use microwave radio as their telecommunications medium
which are not deflected by the Earth's atmosphere. Satellite accesses the
internet via a satellite in Earth’s orbit. The satellites are stationed in space,
typically 22,000 miles (for geosynchronous satellites) above the equator.
These Earth orbiting systems are capable of receiving and relaying voice,
data, and TV signals. This is a microwave relay station which is placed in
outer space. The satellites are launched either by rockets or space shuttles
carry them.
These are positioned 36000 Km above the equator with an orbit speed that
exactly matches the rotation speed of the earth. As the satellite is
positioned in a geo-synchronous orbit, it is stationery relative to earth and
always stays over the same point on the ground. This is usually done to allow
ground stations to aim antenna at a fixed point in the sky.
Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz, can be used
for short-range communication. Infrared waves, having high frequencies,
cannot penetrate walls. This advantageous characteristic prevents
interference between one system and another, a short-range communication
system in on room cannot be affected by another system in the next room.
Infrared communication, which can transmit signals between devices within
small distances not more than 10 meters peer to peer or (face to face)
without anybody in the line of transmitting. The most
common use of infrared in everyday life is remote controls. These work by
sending pulses of infrared that spell out a message to an electronic device.
This device could be a television, blu-ray player, or even a
computer. Infrared can be used in a similar way for communication. When we
use infrared remote control, we do not interfere with the use of the remote
by our neighbours. However, this same characteristic makes infrared signals
useless for long-range communication. In addition, we cannot use infrared
waves outside a building because the sun's rays contain infrared waves that
can interfere with the communication.
Life Skills
Life Skills are abilities which enable an individual to develop adaptive and
positive behavior. These skills enable individuals to deal effectively with
challenges and demands of everyday life.
A learner who is equipped with the necessary life skills is likely to lead a
more successful life than one who does not have them.
Life Skills comprises of competencies that can enable the youth cope with
challenges and manage that lives in a healthy and productive manner.
BENEFITS OF LIFE SKILLS
Peer pressure is pressure from one’s Peer influence is when a peer’s act
persuades/ encourages the others to
peers to act in a way that is acceptable
act in a particular way without the use
to the others in the same group.
of force.
vii. Empathy
Empathy is being able to understand the feelings of other
people and appreciate their positions or ideologies. It can also
be defined as putting oneself in the shoes of another.
Moreover, it is the ability to sense and share the emotions of
other people – being able to imagine or consider the feelings
and thoughts of other people in certain situations. Empathy
falls under the cluster of social awareness in the field of
Emotional Intelligence.
This skill enables us to share our friend’s problems.
Importance of Empathy
Understanding other people’s feelings helps the subject of
empathy to feel relieved or feel as though some burden have
been removed off their shoulders.
Promotes effective communication
Allows room for feedback and improvement
Helps people to demonstrate their understanding of others.
When you understand that someone has a certain feeling,
e.g. when a child is sad, you can be able to determine what
they are going through in their home, e.g. if their mother is
ill.
Empathy helps someone to know what to do or how to react
to certain situations involving interactions with others.
Empathy helps people to share the same feelings that other
people feel, helping them to find the right solution in given
situations.
Empathy is important in building trust because one is able
predict the reactions of teammates by empathizing with
them.
Difference between Empathy and Sympathy
Empathy refers to understand and share the feelings of other
people as though we have the same feelings ourselves.
Sympathy entails being able to take part in the feelings of
others, e.g. feeling sad when someone else is undergoing a
misfortune.
Empathy refers to the ability to project one’s feelings onto
another object. Sympathy involves a focus on tastes and
opinions, e.g. when you feel sympathy for a character in a movie.
Situations Requiring Empathy
During the death or loss of a loved one
When infected with HIV & AIDS
When one loses a job or being jobless
During illness or a pandemic
In any other life-threatening situation
“Ethics are moral standards that help guide behavior, actions, and choices .
Ethics are grounded in the notion of responsibility (as free moral agents,
individuals, organizations, and societies are responsible for the actions that
they take) and accountability (individuals, organizations, and society should
be held accountable to others for the consequences of their actions). ICT
ethics are not exceptional from the above-mentioned view of ethics.
LEGISLATION OF ICT
The purpose of legislation is to control and regulate the use of ICT.
Different acts in result in different benefits to the end user or other
people affected by the technology.
Legislation protects people and ensures that there is no abuse by others to
those investing in the technology.
Both the public and private sectors collect, use and transfer Personal Data
at an unprecedented scale and for multiple purposes. This Personal Data can
be put to beneficial use, however, the unregulated and arbitrary use of
Personal Data, has raised concerns regarding the privacy and control over
such data by the data subject. Through the Constitution, the Government of
Kenya is committed to protecting the privacy of individuals. The Government
recognizes that this protection is an essential element in maintaining public
trust in entities managing Personal Data and essential for the social-
economic development of Kenya in the fourth revolution. It is also meant to
protect children and vulnerable groups
The Constitution of Kenya 2010, under Article 31 recognizes the right to
privacy. Kenya acknowledges the importance of accessing information and
safeguarding it as articulated in the National ICT Policy. The purpose of this
policy is to lay foundation to enforce Article 31 of the Constitution of Kenya,
by developing privacy and data protection laws.
ICT legislations
Legislations by the government include: Property law to protect intellectual
property and Privacy law to protect information and data.
A. Intellectual Property refers to works created by inventors, authors and
artists. Legal rights that provide creators protection for original works,
inventions, or the appearance of products, artistic works, scientific
developments, and so on.
There are four types of Intellectual Property protection. They are
patents for invention, trademarks for brand identity, and designs for
product appearance and copyright for material and Trades secrets.
Patents for inventions
A patent is an exclusive right granted for an invention, which is a
product or a process that provides, in general, a new way of doing
something, or offers a new technical solution to a problem. To get a
patent, technical information about the invention must be disclosed to
the public in a patent application (request pending patent rights).
The three types of patents are utility patents, design patents, and
plant patents. Utility patents are issued for inventions that are novel
and useful. Design patents protect the design or image of a product.
Plant patents are issued to applicants for plants that can reproduce.
These patents protect inventions and improvements to existing
inventions.
Trademarks for brand identity
A trademark is generally a word, phrase, symbol, or design, or a
combination thereof, that identifies and distinguishes the source of
the goods of one party from those of others. A service mark is the
same as a trademark, except that it identifies and distinguishes the
source of a service rather than goods. Design for product
appearance Literary and artistic material, music, films, sound
recordings and road casts, including software and multimedia. Nike,
Bata or Adidas, for example, are all protected by a group of legal
rights.
Copyright for material
Copyright is a type of intellectual property that gives its owner the
exclusive right to make copies of a creative work, usually for a limited
time (copyright protection lasts for the life of the author plus an
additional 70 year). The creative work may be in a literary, artistic,
educational, or musical form.
A trade secret is any practice or process of a company that is
generally not known outside of the company. Information considered a
trade secret takes a variety of forms, such as a proprietary process,
instrument, pattern, design, formula, recipe, method, or practice that
is not evident to others and may be used as a means to create an
enterprise that offers an advantage over competitors or provides
value to customers.
Trade secrets are defined differently based on jurisdiction, but all
have the following characteristics in common:
1. They are not public information. The company must make a
reasonable effort in concealing the information from the public.
NOTE: If a trade secret holder fails to safeguard the
secret or if the secret is independently discovered,
released, or becomes general knowledge, protection of the
secret is removed.
2. Their secrecy provides an economic benefit to their holder.
3. Their secrecy is actively protected.
Unlike a patent, a trade secret is not publicly known. Companies can
find ways to figure out what makes their competitors successful. To
protect its trade secrets, a company may require employees privy to
the information to sign non-compete or non-disclosure agreements
(NDA) upon hire.
B. Information privacy is described as the rights of individuals and companies
to deny or restrict the collection and use of information about them. Every
time you click on an advertisement or register a software product online,
your information is entered into a database. Computer technology can also
threaten privacy through spam. Spam is unsolicited e-mail messages,
advertisements or newsgroup postings sent to many recipients at once.
Computer technology threatens the privacy of our data through:
i. Cookies - contain user information and are saved in the
computer hard disk. It enables web sites to collect information
about your online activities and store them for future use, then
the collected details will be sold to any company that requests
for it. This can be protected by blocking cookies.
ii. Electronic profile/ Digital profiling - It is the process of
collecting in-depth information about a person. Details like
individual’s name, current address, previous address, age,
marital status, number and age of children are generally listed
in an individual`s profile. Such information or details are
obtained from a variety of sources that have association with
personally identifiable information that exists online. A digital
profile can include information about personal characteristics,
behaviours, affiliations, connections and interactions. Digital
profiling is used in marketing, enterprise security, criminal
justice and recruitment, among other areas.
iii. Spyware- refers to a program that collects user information
without the user’s knowledge. This can be protected by use of
an antispyware.
ICT policies
ICT policies - “The rules and regulations set by the organization. Policy
determines the type of internal and external information resources
employees can access, the kinds of programs they may install on their own
computers as well as their authority for reserving network resources. Policy
is also related to network quality of service (QoS), because it can define
priorities by user, workgroup or application with regard to reserving network
bandwidth”
The following are the objectives of ICT policies in organizations:
1. Provide guidelines for the conditions of acceptance and the
appropriate use of the computing and networking resources provided
for use by academic, professional and support staff and students of
the University.
2. Ensure that ICT resources are used in an appropriate fashion, and
support the organisation mission and institutional goals.
3. Encourage users to understand their own rights and responsibility for
protecting the ICT resources.
4. Protect the privacy and integrity of data stored on their network.
5. Elaborate the consequences of the inappropriate use of these
resources.
Outcomes of the ICT Policy
By enforcing the acceptable use policy, we aim to achieve the following
outcomes:
1. Better informed users regarding acceptable and unacceptable use of ICT
resources.
2. Responsible users regarding the value and use of ICT resources.
Causes of conflict
Workplace
Family
Scarce resources
Personal Interests
There are future and emerging technologies that may have an even more
profound impact.
1. Consider for example brain-computer interfaces. In case computers
are connected directly to the brain, not only behavioral
characteristics (recording user internet activities) are subject to
privacy considerations, but even one’s thoughts run the risk of
becoming public, with decisions of others being based upon them. In
addition, it could become possible to change one’s behavior by means
of such technology. Such developments therefore require further
consideration of the reasons for protecting privacy. In particular,
when brain processes could be influenced from the outside,
autonomy would be a value to reconsider to ensure adequate
protection.
2. Technology thus does not only influence privacy by changing the
accessibility of information, but also by changing the privacy norms
themselves. For example, social networking sites invite users to
share more information than they otherwise might. This
“oversharing” becomes accepted practice within certain groups.
With future and emerging technologies, such influences can also be
expected and therefore they ought to be taken into account when
trying to mitigate effects.
3. Another fundamental question is whether, given the future (and
even current) level of informational connectivity, it is feasible to
protect privacy by trying to hide information from parties who may
use it in undesirable ways. Gutwirth & De Hert (2008) argue that it
may be more feasible to protect privacy by transparency – by
requiring actors to justify decisions made about individuals,
thus insisting that decisions are not based on illegitimate
information. This approach comes with its own problems, as it might
be hard to prove that the wrong information was used for a decision.
Still, it may well happen that citizens, in turn, start data collection
on those who collect data about them, e.g. governments. Such
“counter(sur)veillance” may be used to gather information about the
use of information, thereby improving accountability (Gürses et al.
2016). The open source movement may also contribute to
transparency of data processing. In this context, transparency can
be seen as a pro-ethical condition contributing to privacy (Turilli &
Floridi 2009).
4. It has been argued that the precautionary principle, well known in
environmental ethics (man's moral and ethical obligations toward
the environment), might have a role in dealing with emerging
information technologies as well (Pieters & van Cleeff 2009; Som,
Hilty & Köhler 2009). The principle would see to it that the burden
of proof for absence of irreversible effects of information
technology on society, e.g. in terms of power relations ( able to get
the other person to do what they wish) and equality, would lie with
those advocating the new technology. Precaution, in this sense, could
then be used to impose restrictions at a regulatory level, in
combination with or as an alternative to empowering users,
thereby potentially contributing to the prevention of informational
overload on the user side. Apart from general debates about the
desirable and undesirable features of the precautionary principle,
challenges to it lie in its translation to social effects and social
sustainability, as well as to its application to consequences induced
by intentional actions of agents. Whereas the occurrence of natural
threats or accidents is probabilistic in nature, those who are
interested in improper use of information behave strategically,
requiring a different approach to risk (i.e. security as opposed to
safety). In addition, proponents of precaution will need to balance it
with other important principles, viz., of informed consent and
autonomy.
Finally, it is appropriate to note that not all social effects of information
technology concern privacy (Pieters 2017). Examples include the effects of
social network sites on friendship (due to availability of info), and the
verifiability of results of electronic elections. Therefore, value-sensitive
design approaches and impact assessments of information technology should
not focus on privacy only, since information technology affects many other
values as well.
Because of the aforementioned trends (and a few others beyond the scope
of this blog post), the following developments are anticipated:
Artificial Intelligence is becoming a part of Everything: It getting
integrated into everything from machine learning, predictive analytics,
security software, intelligent agents, and more.
REFERENCES
https://www.iau.edu.sa/sites/default/files/content-box/
ict_policies_procedures_-v6.0.pdf
https://www.chegg.com/homework-help/t-f-electronic-profiling-act-using-
electronic-means-collect-chapter-15-problem-2sq-solution-9781285225456-
exc
https://www.investopedia.com/terms/p/patent.asp
https://whatis.techtarget.com/definition/digital-profiling
https://www.wipo.int/patents/en/
https://www.shuledirect.co.tz/notes/list_notes/45474/45475#45476
https://pdfeducation.com/life-skills-knec-notes-for-diploma-certificate-
and-craft-courses/