Professional Documents
Culture Documents
Table of contents.
Computer department
Definitions ................................................................................................................... 3
Some computer terms ................................................................................................. 3
General characteristics of a computer ....................................................................... 4
Advantages of using a computer ................................................................................ 5
Disadvantages of computers .......................................................................................6
Functions of computers ..............................................................................................6
Computer and Lab care...............................................................................................8
Rules that govern a computer Room or Laboratory ..................................................8
The Background of Computer systems ......................................................................9
Computer generations ............................................................................................... 11
Computer classifications (by size)............................................................................ 16
Computer Categories (classification by process) .................................................... 20
Classification by purpose ...........................................................................................21
The Computer system ............................................................................................... 22
In put hardware/devices ........................................................................................... 23
The central processing unit (system unit) ............................................................... 35
Memory...................................................................................................................... 37
Commutation devices ...............................................................................................40
Storage devices ..........................................................................................................44
Out put devices ......................................................................................................... 53
Computer security ..................................................................................................... 58
Computer viruses ...................................................................................................... 59
Computer software.................................................................................................... 65
Operating system ...................................................................................................... 67
Utilities and service programs .................................................................................. 70
System tools (programming languages) ...................................................................71
Application software ................................................................................................. 73
Networking ................................................................................................................ 81
Networks.................................................................................................................... 82
Topology ....................................................................................................................84
Factors to consider before a network ....................................................................... 87
Advantages of a school network ...............................................................................88
Disadvantages of a school network ......................................................................... 90
Computer as an aid to education ............................................................................. 91
The internet .............................................................................................................. 96
Components of the internet ..................................................................................... 97
Advantages of the internet ......................................................................................102
Disadvantages........................................................................................................... 103
Factors affecting the speed of the internet ............................................................. 103
Web terms ............................................................................................................... 106
........................................................................................................................................
Computer department
Introduction to computers
The word computer is derived from a Latin word "Computare" which means to
count or to calculate. The computer is an extension of human mind, which can
perform several tasks with a great speed. Computers are just like a dumb servant
who cannot take any decision by itself they only do what they are told to do.
Definitions
Any subject/item can be defined basing on one or a few areas. Below are some of
the areas that people who define always look at during the formulation of a
definition.
Definition 1.
Definition 2.
Definition 3.
Computer department
Definition 4.
Is a general purpose digital machine machine that can receive, store, manipulate,
and output information.
Some Computer basic terminologies
Information
This refers to processed data
Data processing
Data processing therefore means transferring the raw facts into information.
N.B. Data processing is an iterative process i.e. an on going process (one step leads
to another),
All tasks in data processing take place in three stages: 1.in put, 2.processing,
3.out put
5. It is a diligent tool i.e. it does repetitive and boring work without getting
tired.
Computer department
6. Among others, computers are also; accurate, fast in processing
(speed),have storage, have an artificial intelligence, are automatic, efficient
e.t.c.
3. Correction of mistakes: not only does it identify mistakes but also gives an
option to correct the mistakes for example the spelling and grammar checker.
4. Neatness /professionalism: Computers have got fonts like times new roman
that are outstanding, neat and smart compared to the different handwriting
that people have.
Computer department
Disadvantages of computers
1. They are relative expensive to buy and to maintain where by they need
regular servicing, repairs, and anti virus updates and installation.
2. They require intensive training before one can be able to use. Which is
costly
3. They are delicate machines, where by any simple harm like dropping or
falling off, heat; dust can cause damage the machine.
4. They are some times called stupid machines because whatever data either
right or wrong they just accept (Garbage In Garbage Out) GIGO
6. They are power dependant, since they are electronic machines they only
operate when there is power, only for laptops that may be charged and later
used.
FUNCTIONS OF COMPUTERS:
2. Computers are storage devices; they store information that could other
wise be lost or damaged due to poor whether conditions or poor
handling most especial paper work.
Computer department
3. Computers play a great role in documentation and report production
mostly by word processor programs i.e. Microsoft word, word perfect
7. Computers are also used to carry out data organization, budgets and
calculations ranging from simple to complex. Computers have got in
built formulae “the functions”, logical interpreters for example the (IF
function) spreadsheet programs are designed to help in this area.
10. Computers are teaching aids. They are used to enhance teaching and
learning processes of various subjects like computer studies, biology,
chemistry etc by running illustrations and any other presentations.
Computer department
COMPUTER AND LAB. CARE:
Use of the resources and an account on the computer system are privileges,
not rights. Misuse of the resources may result in a loss of your computer
privileges. Specific misuse includes
Early developments
In the mid 1600s, Blaise Pascal, a French Mathematician, invented an adding
machine called the Pascaline. This machine was based on the decimal system, it
used rotating gears, or notched wheels, each wheel stood for one place the 1s, 10s,
100s and so on. Unfortunately the market did not grow, only 50 pascalines were
built although the machine never became popular, Pascal has been honored for his
role in computer history: the computer language was named after him.
Liebniz wheel
In the early 1700s Liebniz invented a machine that performed Arithmetic
operations of additions, subtractions, multiplications, and divisions. It was the first
general-purpose machine.
Computer department
Babbage’s Analytical Engine
This was an English mathematician, was the first person to plan an automatic
calculating machine he wanted his machine to build tables showing results of
complex math operations quickly and accurately. His first attempt was in 1822
when he built a working model of his idea, called the different Engine. But
building the parts was too difficult and he lost interest and he began a new
machine called the analytical engine.
He was this time assisted by Ada Augusta Byron the daughter to the Romantic
poet Lord and a brilliant mathematician they planned coded card programs. The
analytical engine would have been able to add, subtract, divide and multiply
unfortunately; the analytical engine was too advanced for its time. Babbage died
before building a working model of the machine. His design for the analytical
engine incorporated key concepts used in computers today. This is the reason as to
why Babbage is known as the father of computers.
Herman Hollerrith
The punched card concept from the weaving industry was put to good use at the
end of 1800s by Herman Hollerith, a statistician. The U.S. government was
encountering problems in trying to process data from a census. He developed the
forerunner of standard computer cards. His coding scheme, called the Hollerith
code, could present data in eighty column punched cards. This invention reduced
the time required to process the census 2 ½ years instead of 7 ½, if it was to be
computed manually. His tabulating machine company later became the
international business machine Corporation (IBM)
COMPUTER GENERATIONS
Computer department
(Computer generation is thus the advancement in computer technology over a
period of time.)
With each new generation, the circuitry has gotten smaller and more advanced
than the previous generation before it. As a result of the miniaturization
(Efficiency, smallness), speed, power, and memory of computers has
proportionally increased. New discoveries are constantly being developed that
affect the way we live, and work.
The ENIAC gave off so much heat that they had to be cooled by gigantic air
conditioners. However even with these huge coolers, vacuum tubes still
overheated regularly. It was time for something new.
Characteristics in summary
Computer department
1. They used vacuum tubes for internal operations
2. They were very large (1800 square feet)
7. They used punched card for input and out put and magnetic tapes
10. Memory size was about 2kb and the speed about 10kips(kilo instructions
per second)
Build than a vacuum tube. One transistor replaced the equivalent of 40 vacuum
tubes. These transistors were made of solid material, some of which is silicon, an
abundant element (second only to oxygen) found in beach sand and glass.
Computer department
Therefore they were very cheap to produce. Transistors were found to conduct
electricity faster and better than vacuum tubes. They were also much smaller
and gave off virtually no heat compared to vacuum tubes. Their use marked a
new beginning for the computer. Without this invention, space travel in the 1960's
would not have been possible. However, a new invention would even further
advance our ability to use computers.
Characteristics in summary
Examples
IBM 1401
NCR 501
Computer department
Since the invention of integrated circuits, the number of transistors that can
be placed on a single chip has doubled every two years, shrinking both the
size and cost of computers even further and further enhancing its power.
Most electronic devices today use some form of integrated circuits placed
on printed circuit boards-- thin pieces of bakelite or fiberglass that have
electrical connections etched onto them -- sometimes called a mother
board.
These third generation computers could carry out instructions in
billionths of a second. The size of these machines dropped to the size of
small file cabinets. Yet, the single biggest advancement in the computer era
was yet to be discovered.
Characteristics in summary
They were cheaper, more reliable, smaller and used less power
In 1977 the Apple II was sold to the public and in 1981 IBM entered the PC
(personal computer) market.
Today we have all heard of Intel and its Pentium® Processors and now we
know how it all got started. The computers of the next generation will have
millions upon millions of transistors on one chip and will perform over a billion
calculations in a single second. There is no end in sight for the computer
movement.
Characteristics in summary
Computer department
Computers became cheaper that schools and homes were able to purchase
them.
These are software programs that can search a stored base of knowledge and
recommend solutions to specific problems.
Other people believe that the fifth generation computers will have circuitry based
on gallium arsenide. Very less power and no heat but great speed computers.
Optical circuitry that transmits data with light rather than electricity.
A. A machine.
10. Which of these best characterizes the mechanical era between (1623-1945)?
12. A program that occupies the computer screen when a computer is not in use for a
long time is?
Computers are of different sizes, shapes, and processing power capabilities. The
earliest computers were quite large because of the crude technologies used; as
technological improvements were made in computer components, the sizes began
to reduce. As we talk now the central processing unit can be smaller than a
postage stamp.
And their jobs also vary from one another according to the class they belong to.
1. Super computers
2. Mainframe computers
6. Micro controllers
Computer department
Super computers
These are giant (largest), high speed computers with vast processing power applied
in a narrow range of applications and certain kind of problems e.g. nuclear
stations, scientific research, scientific computation, weather forecasting, defense
and weapon analysis, petroleum/oil exploitation Different industries also use this
huge computer for designing their products.
They are described as “Giant computers”, they are kept in special rooms with
cooling systems,
Characteristics
They process millions of instructions per second (MIPS)fastest
Their memory size is very huge
They are the most expensive, they cost over $10,000,000
They are very large computers
e.g. Option Red (1600ft) Mexico, Blue mountain, Cray t-90 system
Mainframe Computers
These are huge electronic machines that may be used by a hundred or more users
at the same time, main frames were widely used during the era of centralized
computing, before the invention of the personal computer, they are mainly used in
weather forecasts, guiding missiles, solve scientific and commercial problems and
also handling complex mathematical calculations. Airline reservations companies,
The servers on the World Wide Web
E.g. IBM s/390
Mostly found in developed countries and in Government agencies.
Characteristics
They have high data storage capacity
Their memory is large
They very expensive
Can be used by more than one user at the same time, which means they
support a wide range of in put and out put devices
They have a high rate of data transfer between the processor and the
peripherals
Computer department
E.g. IBM 370, MCR 8000 and 8400
Mini computers
Characteristics
Diligent
They support a limited range of peripherals
They can accommodate many users from remote locations
The data is transferred at a lower speed compared to mainframes
Their storage capacity is lower than that of the mainframe
They are commonly used in data processing and industrial applications
Workstation
Microcomputers
DESKTOP
These are commonest in offices and commercial institutions, schools, banks etc.
There is another model called the Tower model which other than laying
horizontally like the original desktop computer, it stands vertically to allow more
space for other devices like printers, scanners, speakers. Etc
LAPTOP/Note BOOK
These are briefcase like type of microcomputers, many of them have back up
batteries to enable usage even while traveling, which means they can operate on
alternating current or on special batteries.
This is easy to carry around and preferred by students and business people to
meet their assignments and other necessary tasks.
The approach of this computer is also the same as the Personal computer. It
can store the same amount of data and having a memory of the same size as
that of a personal computer. One can say that it is the replacement of personal
desktop computer.
Network computers
Computer department
They are mainly used in taking notes, calculations, displaying phone numbers,
address, keeping track of date, agendas etc
They can be connected to larger computers for data exchange
Most of them come with an electronic pen that allows the user to write on a touch
screen
Some have a built in microphone and speakers to record speed digitally
They have personal information management software (PIMS)
They can be used for Internet services, facts and E-mail services
Cellular phones
This allows the user to communicate
It allows the user access the Web
Micro Controllers
These are also called Hidden/Embedded/Dedicated computers
They are tiny computers fixed in smart appliances like microwave oven, pocket
calculators.
They are dedicated to performing a particular task or a specific task.
Characteristics of microcomputers
They are basically single users but with a technology of networking i.e.
users can use them at different locations.
They are smaller than both mainframe and mini computers
They are relatively cheap, portable and convenient.
1. Digital computer
2. Analogue computer
3. Hybrid computer
Digital
Traditionally, digital means the use of numbers and the term comes from digit
or figure. Digital computers use binary digits 0’s and 1’s in all their operations.
Computer department
Advantages
They work at a very fast rate.
They are more accurate
Today digital is Synonymous with computer
Analog
A representation of an object that resembles the original
Analog devices monitor conditions such as movement, temperatures, and ound
and convert them into analogous electronic or mechanical patterns, for
example an analog watch represents the planet’s rotation with the rotating
hands on the watch face. Telephones turn voice vibrations into electronical
vibrations
Definition
These compute by a physical quantity as measured by some system unit.
The physical quantities may be electrical voltage, electric current etc
Hybrid
A digital computer that accepts analog signals converts them to digital and
processes them in digital form. It is used in process control and robotics, that is
to say they work on a combination of both analog and digital
Some calculations are processed in the analog and vice versa, these are mostly
used in scientific research.
Classification by purpose
These computers are classified according to the work they are designed for.
Here they are categorized in two classes.
General-purpose computers
These are designed to solve a wide range of problems. They can be adopted to
perform particular tasks or solve specific problems by means of specially
written programs. Most digital computers are general-purpose computers and
used in business and commercial data processing.
Computer department
Classification by processing power
Processing power is the measure of the processing speed of the computer and it
is measured in Hertz
Exercise:
1. Write the following abbreviations in full;
(a) PDA
(b) GIGO
(c) PC
2. Describe the four categories and classification of computers.
3. What do you understand by the following terms: (i) Microcomputer (ii) Special Purpose
computers?
4. What are the major differences between a mini computer and a mainframe computer?
COMPUTER SYSTEM
A complete working computer. The computer system includes not only the
computer, but also any software and peripheral devices that are necessary to make
the computer function.
Elements of computing:
Hardware,
Software,
Human ware (trained)
Computer department
Data/information
Procedures
Hardware:
This refers to the parts of a computer you can touch and feel that is to say the
physical or tangible components a computer.
Hardware' is the term used to describe any kind of computer equipment (think of
it as being something that can be physically touched).
For example - on a CD, the music or the computer files are the software, the disk
itself is the hardware.
In Put Hardware/Devices
Input
Output
Storage.
Communication.
Processing.
Input devices:
Keyboard.
This is the oldest and most familiar of all in put devices (primary computer in put
device)
Keyboards of all in put devices contain their own chips or memory.
Computer department
In computing, a keyboard is a peripheral partially modelled after the typewriter
keyboard.
A majority of all keyboard keys produce letters, numbers or signs (characters) that
are appropriate for the operator's language.
Computer keyboard
Keyer
Chorded keyboard
LPFK
Functions of a keyboard:
(i) Its used to in put data into a computer, its keys allow the user to type
data inform of text o numbers
(iii) It is a major connector or interface between the computer and the user
without which the user commands will not be put in a language the
computer understands.
Computer department
A keyboard is made up of various special buttons that perform specific functions.
These buttons include:
Control key:
Is a key, which when pressed in conjunction with another key, will perform a
special operation. The Control key is a modifier key, it is used in the same fashion
as the Shift key.
Functional key:
Alt key:
Is either of two keys located next to the Space bar, used to change the function of a
key pressed. The Alt key is a modifier key, it is used in the same fashion as the shift
key. For example, simply pressing "A" will type the letter A, but if you hold down
either alt key while pressing A, the computer will perform an "Alt-A" function,
which varies from program to program.
Caps lock:
Space bar:
Shift key:
Is either of two modifier keys on the QWERTY computer keyboard, located on the
edges of the row below the home row, used to type an alternate 'upper' character,
when there are upper and lower characters shown on a key. The Shift key will also
capitalize the letter keys.
Modifier key:
Computer department
Is a special key on a computer keyboard that modifies the normal action of
another key when the two are pressed in combination.
For example, <Alt> + <F4> in Microsoft Windows will automatically close the
program in an active window. In contrast, pressing just <F4> will probably do
nothing unless assigned a specific function in a particular program. By themselves,
modifier keys usually do nothing.
Pointing devices
A computer mouse
While the most common pointing device by far is the mouse, many more devices
have been developed. However, mouse is commonly used as a metaphor for
devices that move the cursor.
Definition
The mouse is an input device, used to move, point and select objects and
instructions on the computer screen, because of its shape and tail like cable; it was
name mouse, Plural mice.
Most mice have got two or more buttons, which users press to select items from a
menu or to click graphical objects on the computer screen.
Functions of a mouse.
Computer department
The mouse is used as a pointer to move to, or select a particular section of
the displayed window.
Mechanical: Has a rubber or metal ball on its underside that can roll in all
directions. Mechanical sensors within the mouse detect the direction the ball is
rolling and move the screen pointer accordingly.
Optical: Uses a laser to detect the mouse's movement. You must move the mouse
along a special mat with a grid so that the optical mechanism has a frame of
reference. Optical mice have no mechanical moving parts. They respond more
quickly and precisely than mechanical and optomechanical mice, but they are also
more expensive.
Serial mice connect directly to an RS-232C serial port or a PS/2 port. This is the
simplest type of connection.
Disadvantage:
Track ball
Computer department
A trackball is a pointing device consisting of a ball housed in a socket containing
sensors to detect rotation of the ball about two axes—like an upside-down mouse
with an exposed protruding ball. The user rolls the ball with the thumb, fingers, or
the palm of the hand to move a cursor.
Workstations for easy precision. Before the advent of the touchpad, small
trackballs were common on portable computers, where there may be no desk
space on which to run a mouse.
Some small thumb-balls clip onto the side of the keyboard and have integral
buttons with the same function as mouse buttons. The trackball was invented by
Tom Cranston and Fred Longstaff as part of the Royal Canadian Navy's DATAR
system in 1952[1], eleven years before the mouse was invented. This first trackball
used a Canadian five-pin bowling ball.
The world's first trackball invented by Tom Cranston, Fred Longstaff and Kenyon
Taylor working on the Royal Canadian Navy's DATAR project in 1952. It used a
standard Canadian five-pin bowling ball.
When mice and trackballs still used a mechanical design (with slotted 'chopper'
wheels interrupting a beam of light to measure rotation), trackballs had the
advantage of being in contact with the user's hand, which is generally cleaner than
the desk or mouse pad and doesn't drag lint into the chopper wheels. The late
1990s advent of scroll wheels, and the replacement of mouseballs by direct optical
tracking, put trackballs at a disadvantage and forced them to retreat into niches
where their distinctive merits remained important. Most trackballs now have
direct optical tracking which follows dots on the ball. Some mice, in place of a
scroll wheel, acquired a small trackball between the buttons, useful in maps and
other circumstances calling for scrolling in two dimensions.
Advantages:
Computer department
Does not need as much desk space as a mouse.
Is not as tiring since less motion is needed.
Disadvantages:
Requires fine control of the ball with just one finger or thumb.
Repeated motions of the same muscles ares tiring and can cause carpal tunnel
syndrome.
JOYSTICK
Joystick is an input device consisting of a stick that pivots on a base and reports
its angle or direction to the device it is controlling. Joysticks are often used to
control video games, and usually have one or more push-buttons whose state can
also be read by the computer. A popular variation of the joystick used on modern
video game consoles is the analog stick.
The joystick has been the principal flight control in the cockpit of many aircraft,
particularly military fast jets, where centre stick or side-stick location may be
employed (see also Centre stick vs side-stick).
Joysticks are also used for controlling machines such as cranes, trucks, underwater
unmanned vehicles and zero turning radius lawn mowers. Miniature finger-
operated joysticks have been adopted as input devices for smaller electronic
equipment such as mobile phones.
Joysticks can be used within first-person shooter games, but generally provide less
accurate control than a combination of mouse and keyboard input. Also popular in
hospitals by scanners.
Image scanner
Computer department
In computing, a scanner is a device that optically scans images, printed text,
handwriting, or an object, and converts it to a digital image. Common examples
found in offices are variations of the desktop (or flatbed) scanner where the
document is placed on a glass window for scanning. Hand-held scanners, where
the device is moved by hand, have evolved from text scanning "wands" to 3D
scanners used for industrial design, reverse engineering, test and measurement,
orthotics, gaming and other applications. Mechanically driven scanners that move
the document are typically used for large-format documents, where a flatbed
design would be impractical.
Digital camera
Many compact digital still cameras can record sound and moving video as well as
still photographs. In the Western market, digital cameras outsell their 35 mm film
counterparts.[1]
Digital cameras can include features that are not found in film cameras, such as
displaying an image on the camera's screen immediately after it is recorded, the
capacity to take thousands of images on a single small memory device, the ability
to record video with sound, the ability to edit images, and deletion of images
allowing re-use of the storage they occupied.
Digital cameras are incorporated into many devices ranging from PDAs and
mobile phones (called camera phones) to vehicles. The Hubble Space Telescope
and other astronomical devices are essentially specialised digital cameras.
Digital video cameras can record video in digital form so that it can be
downloaded to a computer for editing. A web cam is a digital video camera. It can
be directly connected to a computer. It usually takes a digital picture at regular
intervals and uploads the picture to an Internet website. Web cams are used for
Computer department
teleconferencing. Users communicate with each other using microphones and
speakers as well as web cams to see each other on their monitors.
Light pen
A light pen is a computer input device in the form of a light-sensitive wand used
in conjunction with the computer's CRT TV set or monitor. It allows the user to
point to displayed objects, or draw on the screen, in a similar way to a touch
screen but with greater positional accuracy. A light pen can work with any CRT-
based display, but not with LCD screens, projectors and other display devices.
A light pen is fairly simple to implement. The light pen works by sensing the
sudden small change in brightness of a point on the screen when the electron gun
refreshes that spot. By noting exactly where the scanning has reached at that
moment, the X,Y position of the pen can be resolved. This is usually achieved by
the light pen causing an interrupt, at which point the scan position can be read
from a special register, or computed from a counter or timer. The pen position is
updated on every refresh of the screen.
Advantages:
Disadvantages:
Computer department
Must learn gestures or train device to recognize the ones you create.
Can lose the pen, which is not usually attached to the device.
A touchscreen is a display which can detect the presence and location a touch
within the display area. The term generally refers to touch by a finger or hand.
Some touchscreens can sense other passive objects, such as a stylus. However, if
the object sensed is active, as with a light pen, the term touchscreen is generally
not applicable. The rule of thumb is this: if you can interact with the display using
just your finger, it is likely a touchscreen - even if you are using a stylus or some
other object. If it does not work with just the finger, it is most likely not a
touchscreen.
Up until recently, most touchscreens could only sense one point of contact at a
time, and few have had the capability to sense how hard one is touching. This is
starting to change with the emergence of multi-touch technology - a technology
that was first seen in the early 1980s, but which is now appearing in commercially
available systems.
The touchscreen has two main attributes. First, it enables you to interact with
what is displayed directly on the screen, where it is displayed, rather than
indirectly with a mouse (computing) or touchpad. Secondly, it lets one do so
without requiring any intermediate device, again, such as a stylus that needs to be
held in the hand. Such displays can be attached to computers or, as terminals, to
networks. They also play a prominent role in the design of digital appliances such
as the personal digital assistant (PDA), satellite navigation devices and mobile
phone.
Computer department
Advantages:
Disadvantages:
The hand tires faster than with a mouse since there are no support.
Some people don't find the motion as natural as a mouse.
Barcode reader
Bar codes:
Computer department
A bar code is a set of parallel printed lines of differing thicknesses, which are used
to store coded information about an item.
Bar codes are read using a Bar Code Reader, which can be in the form of a hand-
held ‘wand’ or a stationary laser scanner over which the bar code is passed. This
method of data entry is used in big shops and supermarkets and in libraries.
Advantages:
Disadvantages:
Refers to the peripheral devices that generate input for the computer such
as a keyboard, scanner, mouse or digitiser tablet. Devices used included:
Computer department
1. MICR reader:(magnetic-ink character recognition)
Characters are printed using special magnetic ink, which contains iron oxide. As
the document passes into the M.I.C.R. reader, the ink is magnetized, so that the
shapes of the characters can be recognized electronically. The characters have to
be printed in a special font style. The main use of MICR is to input data from bank
cheques. The Cheque Number, the Branch Sort Code and the Account Number are
printed in magnetic ink at the bottom. The Amount gets typed in later. All the
cheques received get fed into an MICR Reader and the data is automatically input
to the bank's computer system.
Advantages:
Documents can still be read after being written on, folded, spilt on etc...
Disadvantages:
Midi instruments:
Refers to normal musical instruments which have a midi port for input into
a midi interface in the computer. The music can then be stored as a file,
displayed on screen and edited ready for playback.
Sensor
Remote Control
Computer department
Emits a beam of infra red light, which carries data signals. Commonly used for
input to TVs and VCRs and now becoming used by computers as a "wireless"
method of communication.
C.P.U.
Out put
In put Cu ALU M
CU Control Unit
ALU Arithmetic logic unit
M Memory
The central processing unit has a function of processes raw ideas (data) and turns
it into information.
Computer department
The Control unit
It is a group of control circuits that has all important function of controlling all the
operations with in the C.P.U.
The control unit controls what is happening in the CPU. It does not process or
store data, instead it directs the order of operations.
The control unit retrieves one instruction at a time from a stored program. It
interprets the instruction and sends signals to the ALU directing it to execute the
instruction. This process is repeated until all the data instructions have been
completed and all data have been processed.
Another function of the control unit is to communicate with the input devices in
order to transfer program instructions and data into storage.
The control unit also communicates with the output device to transfer results from
storage to the output devices
Handles arithmetic and logic computations. It does not store data. The arithmetic
operations it handles are addition, subtraction, multiplication and division. The
logic operations it handles are comparisons such as greater than, less than and
equal to, true or false
MEMORY
It refers to the location of information or where data is stored before processing
and reprocessing.
When data are entered into a computer through a device such as a keyboard, they
are not in a form that the computer can interpret, computers cannot understand
the complex symbols that humans use. They recognize only a code composed of 0s
and 1s, known as machine language. Machine language suits the computer because
electronic components and storage media represent two states: on/off,
conducting/non-conducting, or present/absent.
Computer department
Binary representation:
Many computers use coding group of adjacent bits called a byte. Bytes are usually
7 or 8 bits long. A byte can represent one character or a letter. The number of
possible combinations of 0s and 1s in 7 or 8 bits is enough to represent all the
characters. For example, one standard coding system codes an uppercase letter B is
as follows:
Bit
1000010
Byte
The American Standard Code for Information Interchange (ASCII) is a 7 bit code
but because certain machines are designed to accept 8-bit rather than 7 an 8 –bit
version of ASCII, called ASCII-8, was also created.
The other is the Extended binary coded decimal interchange code.(EBCDIC)
The number of adjacent bits that a computer can store or manipulate as a unit is
called a word (byte), there computers that can manipulate 16-bits at ago and also
32. The more words a computer can manipulate the faster the computer.
PRIMARY MEMORY
Primary storage (also called main storage, main memory, or internal storage)
holds all instructions and data needed for processing
It consists of:
CHARACTERISTICS OF RAM
Computer department
A computer has a built up set of instructions (non volatile) it has to know what
to do when switched on and those instructions are residents on ROM
The instructions in Rom are stored permanently; the computer can read or
follow instructions in Rom but cannot change them.
Cannot write and thus called read only. A good example of Rom is POST
(power on self test), which initializes the computer when power is turned on.
CHARACTERISTICS OF ROM
REGISTERS
The control unit and A.L.U. also contain registers.
Registers temporarily store data during processing and provide working areas for
computation. They hold material to be processed immediately.
NB Ram which is outside the processor hold material that is to be processed a little
later.
Examples of registers:
Instruction registers
Address registers
Program registers
Acculator.
COMMUNICATION DEVICES
Computer department
Communication refers to the transfer of data from a transmitter/sender/source to
a receiver across a distance
Modem
For communication to take place between two people from widely different
countries or cultures, an electronic or human translator is required to act as an
interface between them. Similarly for a computer to communicate with another
completely different system, this will also require an interface of some kind.
An interface is usually provided by a card, which contains ports for input and
output devices, plus processing and memory microchips.
1. MODEM (MODulator-DEModulator) –
Or
A device which allows the user to connect the computer system to another
computer system.
A modem attaches to a telephone line and dials up another computer via the
telephone. The modem converts the computer signals so that they work over the
telephone circuits used by the telephone companies
A modem can be internal that is to located inside the base unit or external device
that attaches to the base unit via a cable.
Modulation/demodulation
Modulation Converts digital signals into analogue form so that data can be sent
over phonelines
Computer department
Demodulation
Converts analogue signals back into digital form so that the transmitted signal can
be processed by the receiving computer.
A good modem can transmit and receive at a speed of 33,600 bits per second (bps)
which is about 4200 bytes (or characters) a second. This is about one page of text,
so it is much cheaper and somewhat quicker than ordinary mail.
2. Sound Card:
4. Network Card:
DOMESTIC DEVICES:
These are computer control devices used in the home. Basically any device, which
can be programmed by data input, which is then processed, stored (remembered)
and acted upon to provide some form of output. These are really self-contained
microcomputers, called micro controllers. They have input devices, output devices
and processing chips all linked together and embedded inside them. The program
Computer department
used by the device is not loaded from disk like a normal computer but is
permanently stored on an internal memory chip or ROM.
Inputs devices: sensors for water flow, water level and temperature; door switch;
selector knob or buttons for settings such as spin speed, temperature, load size
and types of wash cycle required.
Output devices: switches to operate the water pump, inlet and outlet valves,
heater and drum motor.
Inputs devices: buttons or keypad; temperature sensors for hot water storage
tank, room air and radiators; timer switches; water flow sensor.
Output devices: switches to operate the water pump, valves, and boiler; LCD
screen display.
Inputs devices: door and window switches; infra-red sensors; buttons or keypad
for setting password and for activating and deactivating the system.
Processing: program to control all of the above settings and provide time to allow
delayed activation of the system.
Inputs devices: control panel switches and infra-red detector for remote control;
UHF channel sensor; sensor to read tape.
Processing: keep current time and date; respond to recording dates and times,
scan and store channel settings; amplify and convert UHF signals.
Computer department
Output devices: LCD display; tape drive motors; recording to tape device; video
and sound output to television.
5. Microwave Oven
Inputs devices: door switch; buttons or keypad for settings such as time and heat
output.
6. Digital Watch
Inputs devices: button switches to set current time, alarm time and date.
Processing: program to keep an accurate calculation of the time and date and to
control all of the above settings.
Output devices: LCD display or motor to move hands; beeper; back light.
7. Pocket Calculator
8. Mobile Telephone
Output devices: LCD display; button clicks; dialling and ringing tones; back light.
9. Toys
Computer department
Inputs devices: sensors for sound and light; pressure or feeler switches; selector
knob or buttons for settings or infra-red sensor for remote control device.
Primary memory can’t store our data and programs permanently we therefore use
several secondary storage devices such as compact disks (CDs), floppy disks,
magnetic tapes etc
This is referred to as secondary memory.
Storage devices:
Storage devices refer to the electronic equipment that is used to store the
data on a storage medium, such as a floppy disk; Storage media is the actual
material on which the data is stored, such as a floppy disk. Storage media are
described as below: -
1. Hard Disk
Characteristics
Computer department
a) They store mass volumes of programs and data thus
increases the productivity of a computer
b) They are faster in loading or retrieving data and programs
than other forms of secondary storage.
Seek time: Refers to the time it takes the read/write head to locate the
correct track.
Latency: Refers to the time it takes the read/write head to locate the
correct sector.
Access time: is the summation of seek time and latency. Or the time
taken to fetch an instruction from a memory medium.
2. Magnetic Tape:
(a) Can hold thousands of megabytes (MB) of data depending on the length of
the tape.
(b) Useful for daily backups of all work and programs on a large network.
Computer department
(c) Can be set to run automatically during the night and then will only be
needed in an emergency.
(a) Very slow, as need to wind tape (perhaps a long way) to find any specific
position.
(b)
3. Floppy Disk
These are the most used storage media in data exchange and back up due to
their cost, size, cost and convenience. The floppy disk uses a thin, flexible
circular disk (the floppy) which is enclosed in a protective shell/plastic
platter to store data.
Storage
=
capacity
360 A4 pages
1.44MB
(approx)
Diskettes come in varying sizes and shapes. There are the 5 ¼ inch diskettes
and the 3 ½ inch diskettes. To store information on a floppy diskette, one
needs to have a floppy disc drive. Information is recorded or retrieved from
the diskettes by the read / write head in the drive.
(a) Whether the diskette stores data on only one side (single – sided) or on
both sides (double – sided).
(b) Whether the diskette drive is equipped with read / write heads for both
the top and bottom surfaces of the diskette.
Computer department
(c) What the data recording density is – that is the number of bits that can
be stored per inch. The recording density may be classified as either
Single – Density, Double – Density, Quad – Density or High Density.
(d) What the track density (the number of tracks per inch) is?.
In view with the above factors, diskettes are commonly labeled as:
The 5 ¼ inch diskette has capacity ranging from 360 KB to 1.2 MB. The 3 ½
inch diskette has a capacity ranging 720K for a single sided 1.44 MB for a
double sided. Compared with the 5 ¼ inch diskette, the 3 ½ inch diskette
has the following advantages:
(c) Its floppy drives are smaller and lighter and therefore require less power
to operate and generate a lot less heat.
(d) The drives are faster and data is easier to transfer during storage and
retrieval.
(e) It is reusable
For proper use of the floppy diskettes, one must study the following aspects:
Keep diskettes away from magnet fields, such as near wire telephones,
loud speakers, and other appliances, which contain magnets.
Do not keep heavy objects on top of the diskettes.
Computer department
Do not fold or bend diskettes.
While labeling or writing on the diskettes use felt tip pen, not pencil or
ballpoint pen.
Do not pull out the diskette from its drive when the drive light is still on.
Two sizes most common are 100MB and 250MBeach and being about the
same physical size have become a popular replacement for the floppy disk as
a mobile means of storage.
4. Compact Disk
These are read only media in general but there exists 3 different types
Computer department
b) Write once read many times (WORM)
CD – Rom
Uses laser (light) technology to store the data. Comes with the data already
on it for reading only (ROM = Read Only Memory) and hence cannot be
written to for everyday storage. Like a floppy disk it has to spin up to the
correct speed each time it is accessed.
Much faster to access than a floppy but currently slower than a hard disk
(single-speed 15 KB per second so a 40X speed CD-ROM drive is 40 times
faster, and they are getting faster).
Can hold up to 650 MB (megabytes) of data.
Also widely used by the music industry as they give better quality sound
and do not wear out like audiocassette tape.
It is the safest form of storage, provided that you don’t attack it with a
sharp or heavy object. CD-ROM drives cost under £20 and are now an
expected standard on most computers. Cost of a CD disk is under £0.50 +
cost of software.
Computer department
Also known, as a Digital Video Disk is a very large capacity CD with similar
access speed. It can store up to 17 GB (gigabytes) of data, which is more than
enough to store 8 music albums with full video presentation, or 4 feature-
length films. A DVD drive can also read a normal CD-ROM and currently
costs around £50.
Writeable DVD drives are currently quite expensive at over £150 but will
very likely replace the standard video cassette tape in the future.
6. Optical Disk
Looks and is used just like a floppy disk but contains a compact disk inside.
Unlike a CD-ROM drive, the optical disk drive is able to both read and write
to this disk many times. With 100 megabytes capacity it is most suitable for
the large picture files created on modern computers and for storing
photographs in a digital camera. Cost of disks around £20.00 but the drives
are currently very expensive.
7. Magnetic Strip
a short strip of magnetic tape for storing a small amount of data. The
simplest type has a personal identity number (PIN) permanently stored on
it, eg. Credit card, cash-point card - used to withdraw cash from the
Automatic Teller Machines (ATMs) on the walls of banks. Others can be
written to as well, perhaps to store a running total, eg. Phone card, debit
card, library card.
8. Smart Card
9. Data Logger
A remote input/output device, which stores data received from sensors that
can then be input into a computer at another time or place. It can be left
alone to collect data over a long period of time and in hostile places, such as
on a satellite, at the bottom of the ocean or at the South Pole.
Computer department
10. Microchip
There are many chips inside a computer, some perform all the processing
tasks (eg. the Intel Pentium CPU), and some are used for the storage of data
as internal memory. They have the fastest access of all storage media.
Because of this, all files read from the hard disk into memory are also copied
into a separate memory "cache" and the next time you attempt to load them
from the hard disk, the computer will look in the cache first. There are two
types of internal memory:
Are used to store the permanent operating system data (the basic input and
out put system. (BIOS). In some types of computer, such as a pocket book,
they may be used to store major programs such as a word processor. They
are however more difficult to replace when a new version is released. They
are also used to store the permanent programming inside a domestic device
such as a television or washing machine.
Are used for temporary storage. They can be written to as well as read. A
program and your work files have to be transferred from your hard disk into
RAM when you want to work with them. You must then save your new work
back onto the hard disk or any other medium, as all RAM memory is lost
when the computer is switched off. Computers today are normally sold with
16, 32, 64, 128 and 256 megabytes of RAM plus at least a 512KB cache RAM.
First RAM chip introduced by Intel. It was called to 1103 and had a capacity of 1 K-
bit, 1024 bit.
The ultimate (and latest) replacement for the floppy disk. High memory
capacity on microchip therefore no moving parts and instant access. It plugs
directly into the USB port on any computer.
Measurement of memory:
Computer department
Memory refers to the space required to handle specific data capacity at any
one time. Memory is measured in basic units as below: -
About 4 kilobytes (4KB) is needed to store one full A4 page of text. A ten volume
encyclopaedia or 20 musical recordings might occupy 600 megabytes (600MB) on
a CD-ROM.A full-length feature film might occupy 4 gigabytes (4GB) on a DVD.
You would need something in the order of petabytes (billions of megabytes) to
store all the data for a complete human being in an electronic state, either on a
microchip to produce a hologram person such as "Rimmer" in "Red Dwarf" or for
transporting as a beam of energy to another planet as in "Startrek".
Screens, printers, and plotters all provide computer output that the user can read.
Out put that appears on a visual display terminal is called soft copy.
Computer department
Refers to any peripheral that presents output from the computer, Output devices
include: -
1. Monitor.
It is an output device that provides the means of obtaining the soft copy.
a) mono-chrome
this type is capable of displaying only one colour using the white or
green or umber (yellowish green) in the back ground and these are
less popular today
A red, green and blue (RGB) dot makes up a pixel of visible light. By
varying the intensity of each of these primary colours, the whole pixel will
appear to the human eye as any colour desired. The denser the pixels the
greater are the clarity, or resolution, of the screen image.
Computer department
LCD Monitor - smaller, lighter and using much less power than a normal CRT
monitor makes them ideal for portable laptop computers. Also used in watches
and calculators. For the scientists amongst you this is all to do with the
polarisation of light by an electromagnetic field applied to a crystal. This produces
a liquid crystal display (LCD).
It displays the progress or output of the user’s commands and this helps to
decide on the next step.
It makes a computer productive, interactive tool due to its instant visual
feedback.
It makes computing to be a continuous process due to its ability to provide
constant visual feedback.
Screen size
The screen size is measured in diagonal distance left to bottom right or top right to
bottom left.
Antiglares
Screens are normally mounted with rectangular glasses called antiglares which are
to reduce on the intensity of light and the flickering effect.
Antiglares are recommended for any person spending at least two hours a day on a
personal computer.
2. Speakers.
For playing music or speech from programs, CD-ROMs and musical instruments.
3. Printer.
Is an output device used to write a copy after a days’ processing. A copy normally
printed is referred to as a hard copy. Printers come in different types depending on
the nature of work as designed by the manufacturer. Printer can be categorized in
several ways the most common distinction is IMPACT and NON-IMPACT.
Computer department
Impact printers:
This is a printer whose print mechanism gets into contact with the paper. It works
like a typewriter, examples include: Dot matrix, line printers, Band printers.
These use a printing metal “hammer” embossed with a character strikes a print
ribbon, which presses the characters image into paper. In other types the hammer
strikes the paper and presses it into the ribbon characters created through impact
printing can be formed by either a solid font or dot matrix printing mechanism.
Non-impact printers:
Does not depend on the impact of metal on paper. In fact no physical contact at all
occurs between the printing mechanism and the paper. The most popular non-
impact methods today utilize thermal transfer, ink-jet.
Daisy-Wheel Printer:
Like a typewriter but with the preformed letters on the ends of spokes to form a
wheel. The letters strike an inked ribbon onto paper.
Disadvantages:
(c) Can only print the characters provided on the wheel and no graphics (line
drawings, pictures).
Dot-Matrix Printer:
Is a set of steel pins strikes an inked ribbon onto paper producing a sequence of
dots. Low resolution - 72 dpi (dots per inch) - can just see the dots.
Computer department
(a) Quite fast - 1 ppm.
(c) Can print any shape of character (font) stored in the computer memory and
any graphics, all on the same page.
(d) Some are capable of printing low quality colours on same page using multiple
ribbons.
Ink-Jet Printer:
Fires a jet of liquid ink through tiny holes. High resolution - 300 to 600 dpi for
almost professional quality, sharp printing. Fast - 3 ppm.
(d) Thousands of colours are created by mixing tiny dots of cyan, magenta and
yellow (CMY) ink on the paper.
Better printers have separate black, cyan, magenta and yellow cartridges for
easier replacement when empty.
Disadvantages:
(a) It is very expensive in the long run to replace the cartridges after being used up.
Laser Printer:
First laser printer introduced by IBM - the IBM 3800. The first colour versions
came onto the market in 1988. It works like a photocopier; powdered ink is fused
onto paper by heat and pressure. Very high resolution - 600 to 1200 dpi for full
professional quality.
i. Colour laser printers are quite expensive but are cheaper to run than colour
inkjet printers.
Braille Printer:
By converting text into the Braille code, this printer produces patterns of raised
dots on paper for use by the blind.
4. Graphics Plotter:
Uses high precision motors controlled by the computer to draw on paper with
coloured ink pens. Used for drawings where a high degree of accuracy is required
such as building plans, printed circuit boards and machine parts.
Small low power devices, which emit light. Used to indicate various events such as
power on or hard disk in operation and to monitor other control applications.
A computer can be programmed very easily to turn switches on and off at the
required times. For example to control traffic lights or electric motors in a robot
arm. Used in the automobile industry to spray body shells or to assemble and weld
parts together; or to assemble delicate electronic components on a printed-circuit
board for computers, radios and almost anything else you can think of.
2. Speed
Computer department
By measuring the pages per minute (ppm)
3. initial costs
colour printers always cost more than the black and white
4. Cost of operation
This includes the cost of maintaining the printer, the cost of toner or ink
REVISION EXERCISE 1.
QUESTION ONE:
Use the diagram below to answer questions 1 (a) and (b)
i
iii
ii
B B
The above diagram represents the flow of data i.e. capital B, from device (i) to
device (ii), then device (iii).
a. What are the functions of devices labeled (i), (ii), and (iii)?
i. .............................................................................
ii. ……………………………………………………………………………..
iii. ……………………………………………………………………………..
b. How was letter ‘b’ capitalized on the input device labeled
(i)?...................................................................................................
...................................................................................
c. Fill the blank spaces of the passage with the most appropriate
word from the words in the box.
Computer department
d. A computer system regardless of its size consists of an input
device, memory, an device, and a
device. A computer system is a group of
machines or . A computer performs its
information processing operations under the control of sets of
instructions called . Printers are examples of
devices which can be attached as part of the computer system.
e. There are 8 bits in one byte. How many bits in five bytes?
QUESTION 2.
1) (a) Explain the term “System Unit” and name 6 six components found in the
system unit.
(b) Why would it not be good to install water based fire extinguishers in the
computer room?
2)What precaution would you take in the computer room in case:
(i) The humidity falls below normal for prolonged periods due to weather
change.
(ii) Users complain of backaches after long periods of using the computer.
QUESTION 3.
1. (a) Distinguish between a Computer and a computer system.
(b) Write short notes on the five computer generations that are existent.
(c)Describe the various categories and classification of computers.
PRACTICAL ACITIVITY
‘’With the help of the computer lab technician and instructor, open up the system
unit, identify 15 (fifteen) different computer components inside the system unit
and give the function of each”.
Computer department
COMPUTER DATA SECURITY
Computer department
This involves the putting up of necessary firewalls and protection against
alteration of software and data.
Common data security threats and risks include:
1) Computer viruses.
2) Unauthorized access and use of computer systems
3) Computer errors and accidental access.
4) Theft of data, hardware, and software.
1. COMPUTER VIRUSES
It destroys program and data files by interfering with the normal processes
of the operating system.
The spread of the virus is accelerated by the increased use on networks,
internet and e-mail.
The risks or threats posed by viruses and the primary impact of a virus can be
broadly classified into:
1. Destructive Viruses
Computer department
memory during normal program
execution, or changing key stroke
values, or data from other input/output
devices.
Network Saturation Systematically using up computer
memory or space to impede
performance or cause the system to
crash.
2. Non-Destructive Viruses
These viruses do not cause any destruction, but are annoying. They usually display
messages, change display messages, change display colors, change key stroke
values (e.g. changing the effect of the SHIFT/UNSHIFT keys) and delete characters
displayed on a visual display.
Research has shown that viruses can be introduced into computer systems from a
variety of sources. Some of the most common sources are the following:
2. Pirated Software
The use of pirated software introduces the risk that the software may be
contaminated by the virus code or amended to perform some other
destructive function which may affect your system.
4. Fake games
Many people like playing games on the computers and for the same reason
games programs spread very fast. It can take less than two years for a game
program to spread to Australia, South America and Europe. There are even
some game programs that pose as software e.g. hotsex.exe these games
infect the system as they are installed.
Computer department
5. Freeware and Shareware
Both freeware and Shareware are commonly available from Bulletin Board
Systems (BBS). Generally a registration fee is requested, to be sent directly
to the author. Such programs should be treated with caution, and initially
used in a controlled environment until it is clear that the program actually
does what it is supposed to do and does not contain either virus or
destructive code.
A File Virus
This attaches itself to program files, and is loaded into memory when the infected
program is run.
Macro Virus
This uses the macro language of an application (e.g. Word processor or
spreadsheet) to hide the virus code.
Logic Bomb
Is a virus that activates when it detects a certain condition.
Time Bomb
Is a kind of logic bomb that activates on a particular date.
Computer department
Worm
This copies itself repeatedly in memory or on a disk drive until no memory or disk
space remains, which makes the computer stop working.
Trojan horse
Is the program that hides within or looks like a legitimate program, but executes
when a certain condition or action is triggered.
Polymorphic Virus
This modifies its program code each time it attaches itself to another program or
file, so that even an antivirus utility has difficulty in detecting it.
Virus Symptoms
The presence of a virus can be indicated if one or more of the following symptoms
appear on your computer. Any evidence of these or similar events should be an
immediate cause for concern to isolate the PC at once and investigated.
Computer department
An antivirus utility scans for programs that attempt to modify the boot program,
the operating system, and other programs that are normally read from but not
modified.
Users of antivirus utilities must update the virus definition files as often as possible
to ensure that such files have patterns of newly discovered viruses.
However a polymorphic virus modifies its program code each time it attaches itself
to another program or file, so that even an antivirus utility cannot detect it by its
virus signature.
Antivirus utilities may also detect viruses by inoculating existing program files.
To inoculate a program file, the antivirus utility records its file size and file
creation date in a separate inoculation file, and uses this information to detect if a
virus has altered the inoculated program file.
However a stealth virus infects a program file, but still reports the size and
creation date of the original, uninfected program.
If an antivirus utility cannot remove the virus, it often quarantines the infected file
in a separate area of a hard disk until the virus can be removed.
Most antivirus utilities can create a recovery disk to remove or repair the infected
programs and files. E.g. boot sector virus.
A backup is a duplicate of a file, program, or disk that can be used if the original is
lost, damaged or destroyed.
Files can be restored by copying the backed up files for their original location on
the computer.
1. Ensure that there is a policy to ensure the usage of computers and their
protection and regulations.
Computer department
2. Ensure that the e-mail is from a trusted source before opening or
executing any e-mail attachment.
3. Install an antivirus utility and update its virus definitions frequently for
detecting and removing viruses.
4. Never start up a computer with a floppy disk in a floppy drive.
5. Scan all floppy disks and files for possible virus infection before opening
them.
6. Set the security level for macros in an application so that the user can
choose whether or not to run potentially unsafe macros.
7. Write protect the recovery disk before using it.
8. Back up important files regularly.
9. sharing of diskettes
Computer department
a) Eavesdropping: This is the tapping into communication channels to get
information. Hackers mainly use eavesdropping e.g. to obtain ATM pin-
numbers, and or credit card numbers.
b) Surveillance (Monitoring): This when a person keeps a profile of all
computer activities done by another person or people. The information
gathered may be used to spread propaganda or cause sabotage. Websites
keep track of your activities using special programs such as cookies.
c) Industrial espionage: This the act of spying on your competitor to get
information that you can use to counter or finish the competitor. An
example is when MTN-Uganda may spy the activities and plans of WARID-
Telecom or vice-versa in an operation to become supreme over one
another.
d) An employee who gets access to information he or she is not
supposed to get to.
e) Forced entry to a computer room through weak access points.
f) Strangers who may stray into the computer room through weak access
points.
Enforce data and information access control policies on all employees and
non-employees. Such policies may include: who can access the computers
or network, when to access them, what they can do when using the
computers or networks etc.
Encrypt data data and information during transmission. Data encryption is
the mixing up of data into a form that is only understood and interpreted
by the sender and its receiver.
Keep the computer room closed when nobody is using it.
Enforce network security measures.
Reinforce the weak access points like doors and windows by using metallic
grills and burglar alarms.
Use of passwords (A password is a combination of characters associated
with a user name that allows a user to access a computer or a network.),
Biometric devices such as fingerprints, tokens (an object users may
carry to authenticate them), call back systems (this connects a user to a
computer only after the computer calls the user back at a previously
established telephone number).
Computer department
downloading an unknown file which may be a virus and hence dangerous to the
computer system.
Computer errors and accidental access can be controlled through giving various
file access privileges and roles to end users and technical staff in organizations.
4. Theft.
Stealing of computer hardware parts, software and computer data and information
is real and rampant. Some information is so valuable that business competitors
and governments can pay a fortune to somebody who can steal the information for
them to use. Hardware theft is also rampant ranging from students, technicians
and immoral persons in organizations.
Computer Crimes
Common computer crimes include:
1. Trespass:
2. hacking
3. cracking
4. tapping
5. piracy
6. fraud
7. sabotage
8. alteration
Explanation:
1. Trespass: is the illegal physical entry to restricted places where
computer hardware, software and backed up data is kept. Or
Computer department
accessing information illegally on a local or remote computer
over a network.
2. Hacking: A hacker is a person who intentionally breaks codes
and passwords to gain unauthorized entry to computer systems.
3. Tapping: This when a person sends an intelligent program on a
host computer that sends him information from that computer.
This is at times referred to as spying.
4. Cracking: cracking refers to the se of guesswork over and over
again by a person until he or she finally discovers a weakness in
the security policies or codes in software.
5. Piracy: Piracy is the making of illegal copies of copyrighted
software, information or data. Software piracy is common in
many developing countries since most of the population cannot
afford prices of original copyrighted and licensed software.
Software piracy may be controlled through:
Enacting laws that protect the owners of copyrighted
software.
Making software cheap to increase affordability.
Use licenses and certificates to identify originals.
Set installation passwords that deter illegal installation of
software.
6. Fraud: computer fraud is the use of computers to conceal
information or cheat other people with the intention of gaining
money or information. An example of fraud is when a person
creates an intelligent program in the tax department that credits
his account with cents from other tax payers. Fraudsters may be
employees in a company or outsiders. In fact the insiders are
even more dangerous since they have a lot of information about
the running of organizational activities.
7. Sabotage: this is the illegal destruction of data and information
with the aim of crippling service delivery or causing great loss to
an organization. Sabotage is usually done by disgruntled
employees or those sent by competitors to cause harm to the
organization.
8. Alteration: This is the illegal changing of data and information
without permission with the aim of gaining or misinforming the
authorized users. This is usually done by persons who want to
hide the truth.
Explanation.
1) Firewalls: a firewall is a device or software that filters the data and
information exchanged between different networks. It does so by enforcing
the host networks access policy. Firewalls monitor and control access to or
from protected networks.
2) Log files: these are special system files that keep a record (log) of events on
the use of computers and resources of a given information system. In a
mobile phone log files help users to establish missed, dialed, and received
calls. It is also possible to know the amount of money used or how long a
call has lasted, and who sent a message and at what time.
3)Data Encryption: Data encryption is the mixing up of data into a form that
is only understood and interpreted by the sender and its receiver.
Decryption is the process of reconstructing the mixed up message into the original
message.
4) Audit trial: this is a careful study of an information system by experts in
order to establish or find out all weaknesses in the system that could lead to
security threats and weak access points for crimesters.
Exercise:
1.”Data and Information security has recently become very important “Explain.
2. (i) Define the term computer virus, and explain any four types of computer viruses.
(ii) Describe any five ways through which computer viruses are spread.
(iii) List any 6 six examples of antivirus software you know.
Computer department
COMPUTER SOFTWARE
You will recall from earlier sections that “hardware is the term used to describe all
the physical pieces of equipment used for data processing,
Where as “Software” is usually taken to mean all the programs containing
commands used to instruct a computer to perform a certain task. (set of electronic
instructions consisting of complex codes)
Software is a general term used to describe the role that program, procedures and
documentation play in a computer system
Software piracy:
a) System software
b) Application software
System software
Is the software that manages all the operations of the computer, it consists of
programs and routines concerned with the control and performance of the
computer itself.
Booting means switching on the computer, when you switch on the computer it
performs the following.
3. then the computer proceeds to look into the following files which
allow the booting and loading the operating systems, lo.sys –
control the initial booting
Computer department
System software can be subdivided into
1. Operating system
2. Utilities and service programs
3. Software tools (programming languages)
4. Firmware
5. Networking software
Operating system
This refers to a set of system programs that allow the computer to manage its own
operations (responsible for managing resources of a computer enabling them to be
utilized efficiently).
Examples
Disk operating system (D.O.S)
Operating system programs for micro computers are usually stored on a secondary
storage device, such as floppy disk, when an operating an operating system
program is stored on a disk, it is called a Disk Operating System, Dos.
The process of loading a disk operating system into the microcomputer’s RAM is
called Booting
Microcomputers also store basic input and output commands for the operating
system in Rom. These operating system commands that are stored in Rom are
Computer department
called BIOS, which stands for Basic Input and Output System these programs are
available just by turning the computer on.
Unix is an operating system that Bell Laboratories developed for mini computers
in the late 1960s, it was first used on a micro computer in 1978. an advantage of
unix is that it can run on micro-computers, mini,and mainframe. It is a mult user
operating system
Linux, machintosh
The machintosh was introduced by Apple Computers in January 1984
Os/2
This first appeared in January 1988, is the most talked about new operating system.
The commands in Os/2 are almost all identical to ms-dos commands. Developing
os/02 was a joint effort between IBM and Microsoft corporation. The most
importance feature is that it can support multitasking, which means that it can ran
two or more programs at the same time.
It has got the Graphic programming interface (GPI) a very powerful graphics
system.
The current version of Os/2 has a few problems, it can on computers with 80286 or
80386 microprocessors
An operating system provides an interface to enable the user interact with the
system.
Computer department
The graphical user interface provides commands and options in a graphical
environment, its basic components are windows dropdown and popup menus,
buttons,dialogue boxes, scroll bars and icons the user then uses a mouse to
execute commands. icons (picture or graphic image that appears on the screen to
present a command or menu choice, an icon system is often used together with a
mouse and eliminates the need for typing and memorizing complex commands).
The user uses keys in commands using the keyboard. However one needs to
memorise all the commands and their syntax example (Dos)
Functions
A) Sorting/merging routine
This is a program designed to reorganize data files into the desired key- field
sequence, taking in data and rearranging it in any order as specified by the
user.
Combining data from more than one file into one file.
The machine language is built into the processor hardware and comprises sets of
numbers which correspond to specific tasks (sometimes called machine’s
instruction set)
Computer department
Machine language
Each machine language is specific to each type of computers different types of
computers will have a different instruction set.
These are instructions written in binary code and can be directly obeyed by the
computer.
This is the language used in processing commands.
PASCAL
Its named after Pascal a French mathematician, it facilitates the use of structured
programming techniques and is popular in both Education and commerce
WORD PROCESSORS
These are application that allow the user to manage documents consisting of text
(such as reports, letters, and memos.
Examples
Microsoft word
Word pad
Note pad
Word perfect
Kingsoft writer
Microsoft word
It is an application software that helps the user create, edit, format, save typed
documents, open or retrieve and print out.
Computer department
Functions
1. Allows the creation and editing of documents by entering or typing text
using the keyboard and there after you can insert, copy replace delete and
spell check text
2. Helps to set the lay out of a document to make the document readable and
visually attractive by applying formatting options such as text type, size lay
outs, spacing.
3. It enables the user to print the document specifying whether to the whole
document or certain pages, either portrait or landscape
Advantages
Produces professional work
Identification of mistakes
Editing, correction of mistakes
Can easily integrate with other packages
SPREADSHEETS
Definition
Types of spreadsheets:
1. Manual spreadsheets
2. The electronic spreadsheets
The manual spreadsheet is the most commonly used type by book keepers as a
ledger book with many sheets of papers divided into rows and columns on which
various amounts of money are entered manually using a pen or a pencil.
Computer department
ADVANTAGES OF USING ELECTRONIC SPREADSHEETS OVER MANUAL
SPREADSHEETS
The electronic spreadsheet utilises the powerful aspect of the computer like
speed, accuracy and efficiency to enable the user quickly accomplish tasks
The electronic spreadsheet offers a lager virtual sheet for data entry and
manipulation.
255 columns and 65536 rows
The electronic spreadsheets enables the user to produce neat work, all the
work is edited on the screen and a final clean copy is printed unlike the
manual whose neatness depends on the writer’s handwriting and skills
VisiCale: this was the first type of spreadsheet to be developed for personal
computers
Lotus 1-2-3: this is an integrated software with spreadsheet module, graphs
and database
Microsoft Excel
Quattro pro
Grass hopper
View sheet
Multiplan
And other spreadsheets that are customised to specific organisations
Components of a spreadsheet:
Computer department
Worksheet
Database
Graphs
Worksheet
This is the component in which data values are entered. It is made up of rows and
columns. The intersection between a row and a column is called a cell. A group of
many worksheets make up workbook
Database
Data values can be entered in the cells of the spreadsheet and managed by special
excel features found on the data menu. These features were incorporated in excel
but they actually belong to database management software.
Graphs
Functions of spreadsheets
Uses of spreadsheets
1. Preparation of budgets
2. Preparation of cash flow analysis
3. General accounting preparations of financial statements
4. Basic business information (job costing, payment schedules, pay slips, stock
control and records, tax records.
5. Analysis of data from questionnaires
6. Presentation of information in tabular form graphical and chart
7. Mathematical techniques and computation like trigonometry
Computer department
Cell data types
There are four basic types of data used with spreadsheets:
Labels
Values
Formulae
Functions
Labels
Any text or alphanumeric characters entered in a cell are viewed as labels by the
spreadsheet program. Labels are used as row or column headings.
Labels are aligned to the left of the cell and cannot be manipulated
mathematically.
Values.
These are numbers that can be manipulated mathematically. They may include
currency, date, numbers (0-9), and special symbols
Formulae
These are user designed mathematical expressions that create a relationship
between cells and return a value in a chosen cell. In Microsoft Excel, a formula
must start with an Equal sign. =B3+D4. Using cell addresses, also called
referencing enables accuracy and automatic recalculation
Functions
These are inbuilt predefined formulae that the user can quickly use instead of
having to create a new one. Ie =SUM(), AVERAGE etc
(Statistical functions, logical ieIF function, mathematical using operators +
,=.>=*%/ etc
Cell referencing
A cell reference identifies a cell or a range of cells on the worksheet and shows
Microsoft Excel where to look for the values or data needed to use in a formula.
DATABASES
This an application package which permits the creation, storage and quick
retrieval of information,
Examples of databases
School grade book
Library catalogue
Telephone directory
Address book
Definitions
File: the entire collection of data
Field: Each bit of information in the record, The individual data items
held for each record.
Computer department
A primary key: used to ensure that there is no duplicate field in the table
Functions of database
Background Electronic databases allow the user to carry out the same tasks as
paper-based databases but with the following advantages:
Increased speed.
Easy to use.
Store very large amounts of data.
Allow for easy inputting and editing of data.
Automatic updating and recalculating of data.
Allow for easy sorting of data.
Allow for easy searching and selection of data.
Format, arrange and present information in the way that you want it.
Share the information with other software applications/programs.
On networks, electronic databases allow you to share one set of information
amongst many users and therefore reduce duplication.
Reduction of duplication prevents the problem of keeping several copies of the
same database up to date and in-line with each other.
The objects/structures
A table: this the basic database structure, it consists of columns and rows
Background
When working with a database you require more than just the data. In order
to manipulate, process and present your data as information you require a set of
utilities or tools.
Computer department
What are forms?
You can use a form to input, edit or view information in your database record by
record.
It will allow you to see what you want in the way that you want to see it.
What is a query/dynaset?
A query is a question you ask about your data:
Whenever you ask a query of your database you get the latest up to date
information.
What are reports? You use reports to print and view information from your
database.
Reports allow you to produce your information in the way that you want and
enable you to:
Group information.
Calculate totals and averages.
What is PowerPoint?
Computer department
Overhead transparencies You can print your slides in either portrait or
landscape formats for the creation of overhead transparencies. If you have the
correct printer type you can print directly onto acetates in color.
Paper printouts It is possible to print out slides onto paper for review and/or
use within discussions.
Handouts You can print handouts for delegates that contain reduced size
copies of your slides, with multiple sides per page.
Notes PowerPoint is also able to produce notes pages with one slide per page.
These can be used by speakers to write their presentation or by delegates to record
their own notes.
Banners (for Web sites) Used for creating small rectangular banners that can be
placed on a Web site page.
Examples
Novell net ware (most popular)
Microsoft Windows NT
Apple share
UNIX/NFS
Is a computer network covering a local area, like a home, office or small group of
buildings such as a college. The topology of a network dictates its physical
structure. The generally accepted maximum size for a LAN is 1000m2.
Are large computer networks usually spanning a campus or a city. They typically
use optical fiber connections to link their sites.
Functional relationship:
Computer department
Client / Server is a network application architecture, which separates the client
from the server. Each instance of the client software connects to a server or
application server.
Client software on the other hand generally runs on common PCs or workstations.
Clients get all or most of their information and rely on the application server for
things such as configuration files, stock quotes, business application programs or
to offload computer intensive application tasks back the server to keep the client
computer free to perform other tasks.
Centralized - Resources and data security are controlled through the server.
Scalability - Any or all elements can be replaced individually as needs increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components (client/network/server) work together.
Accessibility - Server can be accessed remotely and across multiple platforms.
Refers to the network, where any node is able to initiate or complete any
supported transaction with any other node. It is a network in which resources and
files are shared without a centralized management source.
Computer department
Disadvantages of a peer-to-peer network:
Topology:
Advantages
Disadvantages:
Difficult to administer/troubleshoot
Limited cable length and number of stations
A cable break can disable the entire network
Maintenance costs may be higher in the long run
Performance degrades as additional computers are added
Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.
Mesh topology:
A network topology in which there are at least two nodes with two
or more paths between them. A special kind of mesh, limiting the
Computer department
number of hops between two nodes, is a hypercube.
Ring topology:
Advantages
Disadvantages
Star topology:
Advantages
Disadvantages
Computer department
Performance degrades as additional computers are added
Failure of the central node can disable the entire network.
A grid network
1. Ease of use. Teachers and students have to be able to send and receive software,
messages and schoolwork easily. Management programs should be easy to use.
Computer department
2. Compatibility. Most computer manufacturers now produce their own networks,
so compatibility shouldn't be a problem. Increasingly, however, other
companies are selling LANs, mostly for IBMs or clones. These might be cheaper
or more appropriate.
3. RAM use. How much random access memory does the network need for each
computer? With the minimum amount, you should still be able to run all your
essential programs and more.
4. Size, distance, and expandibility. How many computers can the network
accommodate, and can it be expanded? Although it may seem unlikely now,
you may want to add more computers in the future. In addition, discuss closely
with the manufacturer how you intend to use the network. Placing computers
far apart can affect the network's efficiency.
5. Security. If you need security, how does it work? Does the network provide the
security you need while still allowing you to run the programs you need?
8. Ease of installation. Installation might come with the package, or it may be easy
enough to do yourself. Some LANS, however, require extensive wiring or
software installation. If you're not prepared to manage this, pay the installation
charge.
1. Money. A linear bus network may be the least expensive way to install a
network; you do not have to purchase concentrators.
2. Length of cable needed. The linear bus network uses shorter lengths of cable.
Computer department
4. Cable type. The most common cable in schools is unshielded twisted pair,
which is most often used with star topologies.
The days of the standalone computer are drawing to a close. Networks will
dominate the educational technology scene into the 1990s. Why are networked
computers making greater inroads into schools than ever before? The answers are
many and varied, but most educators agree that networks offer them the following
advantages:
1. Use of diskettes:
2. Costs of printing:
They cut down on computer printouts, making it possible for students' work to be
viewed on-screen, sent to teachers' workstations, or even channeled into
"electronic gradebooks."
3. Management programmes:
4. Sharing:
They allow several students in a class to use one program at the same time, or to
work on different programs or different parts of the same program at the same
time.
5. Cost:
They eliminate the need to buy several copies of one software program, thereby
often reducing costs.
6. Speed.
Networks provide a very rapid method for sharing and transferring files. Without a
network, files are shared by copying them to floppy disks, then carrying or sending
Computer department
the disks from one computer to another. This method of transferring files (referred
to as sneaker-net) is very time-consuming.
7. Security.
Files and programs on a network can be designated as "copy inhibit," so that you
do not have to worry about illegal copying of programs. Also, passwords can be
established for specific directories to restrict access to authorized users.
One of the greatest benefits of installing a network at a school is the fact that all of
the software can be loaded on one computer (the file server). This eliminates that
need to spend time and energy installing updates and tracking files on
independent computers throughout the building.
9. Electronic Mail.
School networks allow students to access their files from computers throughout
the school. Students can begin an assignment in their classroom, save part of it on
a public access area of the network, then go to the media center after school to
finish their work. Students can also work cooperatively through the network.
Computer department
13. interactive communication like chanting
1. Expensive to Install.
Although a network will generally save money over time, the initial costs of
installation can be prohibitive. Cables, network cards, and software are expensive,
and the installation may require the services of a technician.
What is a Bus?
A bus is an electronic path way that provides interface for movement of 1s and 0s
from one place to another.
Functions
It provides connection of devices
It allows transmissions of 1s and 0s from one place to another
To connect the cpu to Ram
With the help of the cpu determines a unique address for data.
NETWORK
Computer department
It refers to a series of physical remote devices (terminals and computers) and their
associated connecting cabling and transmission facilities.
Intranet
Computers today:
Computers are used in very many areas today to supplement on the days man’s
efforts. Today computers are used in the following areas: -
In medicine.
In education (computer aided learning CAL, computer based training CBT).
In medicine (body chips, etc).
In manufacturing (computer aided design CAD).
In office automation.
Question1:
Approach:
Define a computer.
Facts:
Computers are increasingly being used in schools in the various areas of education
life in Uganda. Computers can aid education in the following ways:
1. Computers are used in the teaching as an aid in many different subject e.g. in
maths, geography, e.t.c. Much safer and cheaper to use when learning than in a
real plane/rocket etc.
Computer department
2. Can be used in while monitoring progress and testing pupils eg computer
generated reports.
3. Computers are used for electronic mailing systems both inside the school and
to communicate with other schools or organisations. This brings schools in the
world as a mere centre of education.
6. As the expansion of our own school’s web site has shown, the Internet is
increasingly important being used for research. Students can obtain notes in all
the subjects that they do study and sometimes tasks, projects are also provided
which in all promote education.
7. Can be used to simulate emergency situations such as engine failure or fire, and
give the pilot/driver practice in handling a dangerous situation which might
never occur, but which if it did, would require a correct and rapid response.
8. Can standardise training given to different trainees - each person using the
program is receiving identical input, which would be difficult to produce in real
life. This may even be impossible e.g. medical training for cervical smear
testing.
9. Students can revisit the training package as many times as is necessary for
further reference and acquaintance.
Sometimes, it is not true that computers can aid learning and education in
general because of the following eventualities: -
1. Only as good as the program / rules that have been written - all rules must be
completely accurate. This limits the use of other programs in line with
education.
Computer department
3. If data or rules written into program are wrong, then answers/responses will be
wrong for example for all computer based examinations that include the
multiple choice mode of response.
4. Does not provide human interaction - may not answer all of the trainees
questions. This makes the learning and education process more of a theory that
a required necessity.
Question 2:
In what ways have computers improved the quality of life for the
ordinary person? Are there any ways in which the use of computers
have contributed to a supposed decline in our quality of life? From
your knowledge, make a considered evaluation of the role of IT in
bringing about changes, which effect individuals, organisations and
society.
Approach:
Answer sketch:
Definition:
Negative:
Computer department
2. The widespread use of computers has led to new crimes such as hacking; this
violates the software copyright, and virus creation that cause crashing of PCs.
4. Information handling tasks have been taken over by computers and can
therefore be performed by lower grade workers. This is dangerous where a non
– professional secretary who may release information that may be harmful for
public consumption typesets an official document on a street.
5. There are problems with undesirable material published on the Internet for
example pornography, which hinders the psychological growth of the child.
6. Some digital devices are costly to repair for example a digital camera, keyboard,
and mouse, among others. This makes the use of a computer and IT equally
expensive.
7. Teleworkers are unable to separate home and work commitments this make
bring about domestic disagreements elsewhere. Businesses feel that they have
less control over Teleworkers.
8. Some people find the new technology too complicated. This encourages the
gradual intentional damage and corruption of the technology with a view of
benefiting if the technology is not used for example Accountants.
Positive:
1. There are many new forms of entertainment for instance one can make
bookings, bet, on-line music, radio stations, newspapers, and other forms of
entertainment a person can access within a short time possible. Therefore,
mostly the boring and repetitive jobs have been removed from factories
3. Many people have access to money via debit and credit cards. This promotes
the discharge of goods and services for money. For example with the Nile Bank
of Uganda. This promotes e-business.
Computer department
4. Many large companies send computerised statements telling people how much
they owe e.g. Gas Bills, Water Bills, Electricity Bills among others.
5. There is much personal data stored on computers. This makes a computer the
most reliable device where a person can store and retrieve data from at a stone
throw. This speeds business decision. People have become too reliant on
microprocessor-controlled equipment in the home and other places.
6. The time taken to search for information has been reduced. This has
encouraged the Computer Aided Learning (CAL) facility. Persons can graduate
on-line, access job opportunities, etc.
8. Inland revenue monitor the tax that people pay using computers. This means
that they have more accurate records about us. In terms of Pay As You Earn
(PAYE), and other forms of tax levies.
No one is fully in charge of the internet there are organizations which develop
technical aspects of this network and set standards for creating applications on it
but no governing body in control.
All computers on the internet communicate with one another using the
Transmission Control Protocal/Internet Protocal suit; abbreviated to TCP/IP
Computer department
TCP/IP (transmission control protocol/internet protocol)
It is a basic communication language of the internet, it can also be used as a
communication protocol in the private networks called intranets and extranets.
Computers on the internet use a client/ server architecture, which provides files
and services to the user’s local client machine.
Many internet users are familiar with even higher layer applications protocols that
use TCP/IP to get to the internet.
These include world wide web’s hyper text transfer protocol (HTTP), the File
Transfer Protocol (FTP), Telnet which you logon to remote computers and the
Simple Mail Transfer Protocol (SMTP)
These and other protocols are often packed together with TCP/IP as a “suite”
Personal computers usually get to the internet through serial line internet protocol
(SLIP) or the point to point protocol (PPP) these protocols encapsulate the IP
packets so that they can be sent over a dial up phone connection to access a
provider.
Protocols related to TCP/IP include the User Datagram Protocol (UDP) which is
used instead of TCP for special purposes.
Other protocols are used by network host computers for exchanging router
information. These include the Internet Control Message Protocol (ICMP) the
Interior Gateway Protocol (IGP) the Exterior Gateway Protocol (EGP) and the
Border Gateway Protocol (BGP)
These include:
To get linked to the internet special software are needed: these are called
BROWSERS. These are commonly two Netscape communicator and Microsoft
internet explorer.
A technical definition of www and all the resources and users on the internet that
are using hypertext Transfer Protocol
Is a set of rules for exchanging files (text, graphics, sound, Video and other
multimedia files on the www relative to the TCP/IP suite of protocols which are
the basis for information exchange on the internet
With html tags are placed within the text to accomplish document formatting
visual features such as font size, italics, bold.
Html is an evolving language with new tags being added and released
Computer department
The www led by tim berner lee co-ordinates the efforts to standardizing the html,
the w3c now calls the language Xhtml and considers it to be an application of the
xml language standard
The www consists of files, called page or home pages, containing links to
documents and resources through the internet.
Programming languages such as Java, Java scrip, Visual Basic, Cold fashion and
Xml are extending the capability on the web.
E.mail allows computer users locally and world wide to exchange messages Each
user of an e.mail has a mail box address to which messages are set, messages sent
through e.mail can arrive within a matter of seconds
Examples
Hot mail,Yahoo, G.mail
Computer department
Email Features
To: (recipient’s email address)requires the E.mail address of the person you are
sending mail to
Cc: Refers to Carbon copy of the message to the selected person (second recipient)
BCC: Blind carbon copy, a blind carbon copy is a copy of the message that is sent
to some one in secrete, other recipients of the message will not know that the
selected person has received the message.
Computer department
Subject: e.g. My Application Letter
c.c:
e.g.
Bcc: Blind Carbon Copy
example2@mtn.com e.g: example1@mtn.com
ADVANTAGES OF E.MAIL
Computer department
DISADVANTAGES
1. When some one comes across a password s/he may have access to all
mails
2. E. mail only sent to people with these services
3. it only caters for computer literate people
The URL specifies the internet address of a file stored on a host computer
connected to the internet, every file on the internet, no matter what its access
protocol, has a unique URL. Web software program use the URL to retrieve the file
from the host computer and the specific directory in which it resides. This file is
then displayed on the monitor connected to the user’s local machine.
URLs are translated into numeric addresses using the Domain Name System
(DNS)
The DNS is a world wide system of servers that stores location pointer to web sites
Anatomy of a URL.
This is the format of the URL
Protocol://host/path/file name
For example. URL on the home page of the house committee on Agriculture of the
US house of representatives.
Http://www.housegov/agriculture/schedule.html
protocol: Http:
host computer name. www.
second level domain name. house
top level domain name. gov
directory name. agriculture
file name schedule.html
3. TELNET
Computer department
telnet is a program that allows you to log into computers on the internet and use
online database, library catalogue, chat services and more, there are no graphics in
Telnet sessions just text.
Telnet is a available on the www probably the most common web based resources
available through Telnet have been library catalogs through most catalogs have
since migrated to the web.
A link to a telnet resource may look like any other link, but it will launch a telnet
session to make the connection.
A telnet program must be installed on your local computer and configured to your
web browser in order to worker.
With the tiny popularity of the web telnet has become less frequently used as a
means of access to information on the internet,
4. FTP
FTP Stands for File Transfer Protocol. This is both a program and a method used to
transfer files between computers.
Anonymous FTP
Is an option that allows users to transfer files from thousands of host computers on
the internet to their personal computers account. FTP site contain books, articles,
software, games, images, sound, multimedia, course work, there is no need of a
special software in this case the web browser can suffice
This goal required the creation of a set of connected networks that would act as a
coordinated whole.
The cold war generated interest in a “bomb proof” net work. If a part of the net
work were destroyed data would still travel towards its destination with help from
the surviving parts, the resulting internet, the responsibility of message routing,
were spread throughout the network instead of being centered in one location.
In large part the internet, now two decades old, has grown in popularity because of
the use of browsers.
Computer department
A browser is a software tool that greatly simplifies the process of user visiting
different locations on the internet.
1. E.mail
2. Information
There is huge amount of information available on the internet about every subject,
ranging from government, services, trade market new ideas
3. employement
Carring out office work from any where away from the office and communicating
with the employer through the use of internet
4. Services
5. E.Commerce (advertising)
Buy or sell product. The internet is a very effective way to buy and sell products all
over the world.
6. Communities
Communities of all types have sprung up on the internet it’s a great way to meet
up with people of similar interest.
7. Video conferencing
8. Employment
Computer department
Carrying out work away from the office and communicating with the employer
through the user of telecommunications equipment
9. Multimedia displays
DISADVANTAGES
1. Immorality (pornography)
2. Addiction (internet games)
3. Virus spread
4. Cultural value elusion
Computer department
and are now quite reasonably priced. These modems are usually standard in any
new computer purchased and are gaining wide support from most ISPs. With
anything less than 28.8 kbps you will notice a significant “lag time” when
attempting to download software or graphic intensive Web pages. Since there are
many places on the Web to get the same information, try to avoid such overly
large slow loading pages.
The modem type and speed supported by the ISP number dialed
If you are dialing into an access number that only supports 28.8 kbps modems,
28.8 kbps is fast as you will ever connect, even if you have a 56 kbps modem
installed in your computer fortunately, most ISPs now support 56 kbps modem
access and allow you to choose access numbers that support different modem
speeds. Check with your ISP for more details.
There are factors associated with your computer that can affect your
internet connection speed as well
Processor speed
A faster processor (say 500 Mhz) will allow you to surf the Web at a faster speed
than a slower one say 200Mhz you can remedy this problem by upgrading your
computer’s processor
Memory
A computer with more memory available will tend to surf faster than one with less.
One way to avoid slowdowns in this area is to avoid opening other software
Computer department
applications that are not needed while you are surfing the Web. You can also
upgrade your system memory if you find the slowdowns too much to bear
Hard disk
A full or highly fragmented hard disk can act to slow Web surfing considerably. It
is a good idea to keep your hard drive defragmented and optimized.
Connection
a) (direct “dedicat”, land-wired access)
b) ISDN (Integrated Service Digital Network) or DSL, TI,T3, cable modem,
regular modem
c) internet service provider (direct access or dial up with modem)
d on line service eg Aol, web Tv of connections
DIRECTORY
A directory is a search tool (engine) that provides lists of several categories of web
sites classified by topic such as Business finance, sports, health etc its purpose is to
allow you to access information in specific categories by clicking on hyper text
link. Directories are useful for browsing-looking at web pages in a general category
and finding items of interest examples include:
SEARCH TOOLS (ENGINES)
Alta Vista – http://www.altavista.com/
HotBot- http://www.hotbot.com/
Lycos- http://www.lycos.com/
Yahoo- http://www.yahoo.com/
Google- http://www.google.com/
Infoseek- http://www.infoseek.com/
Webcrawler
Excite
Computer department
Standalone Computer Access Multiple Computer Access
Requirements: Requirements:
A telephone line
A modem A local area network (LAN)
An ISDN line
Software - usually provided by
the Internet Service Provider An Internet router or Internet
(ISP) 'box' solution (this is a hardware
unit which is plugged into the
network)
One of the most exciting aspects of the Internet is the fact that it gives schools the
ability to publish material 'globally'. School Web pages can be created without
difficulty using user-friendly software, and both teachers and students can publish
and share their work with their peers. In addition, a Web site can help promote
the school within the wider community by publishing information on school
activities, policies and events.
There are no real limits as to what a school can publish on its Web site - any type
of information or work done by the pupils and staff would be suitable for
Computer department
publication. Ideally, the content being presented should be curriculum-centered
and, where possible, focus on the work of students. Rather than creating new or
additional work, current projects and assignments could be carried out on a
computer and then incorporated into Web pages.
It is recommended that all classes are involved in the design and creation of the
Web site, with teachers handling the more technical aspects of pushing the site
live. It is important to ensure that the design of the Web site is both inclusive of all
students, e.g., special needs students, and accessible to all potential users of the
site. For instance, some people may need to use special technologies in order to
access your site.
Schools should also be realistic when outlining the scope of their Web site first
time round. One of the greatest pitfalls in Web publishing is the tendency to
attempt to create a 'super' site - this may lead to difficulties in completing,
updating and managing the Web site.
Before commencing work on a Web site, consider the following questions:
WEB TERMS
Web site
Often spelled “website” is the location of data stored on a www server which can
be freely accessed by people through surfing the net using a domain name ie
www.transworld.educ.ug.
Web page
Is a document on a web site, that can includes text, pictures, sound, and video.
Computer department
Home page
This is the first page you see at a website, it acts like a title page of a book, the
hope page or welcome page identifies the web site and contains links to other
pages at the site
Web server
A www server is just a computer not different but just bigger and faster, also a
www server is permanently connected to the internet so that other people can surf
24 hours a day
Web publishing
This when designed pages (documents of html nature acquire space on the www
server to be shared by other people on the net.
Hyperlink
It is part of the text or graphic on a web page, that when clicked at will
automatically do the following:
A Bus
A bus is an electronic pathway that provides interface for movement of 1’s and 0’s
from one location, address to another
Browsing
Searching for particular /specific items
A web browser is a software tool, a program that knows how to go out on the
internet in search of a certain type of data, in other words is a software program
that allows navigation through the web.
Surfing
Computer department
Means moving from one website to another for topics of interest, the term surf is
generally used to describe a rather undirected type of web browsing.
Mosaic
Other Terms
Account
Address
Computer department
Baud
Bit rate Bit rate is the amount of digital data that is moved from one
place to another in a given time, usually in a second's time, for example,
kilobits, or thousands of bits per second [Kbps].. The bit rate can be viewed
as the speed of travel of a given amount of data from one place to another. In
general, the greater the bandwidth of a given path, the higher the data
transfer rate.
Bookmark
Browser
Computer department
Bug An error or fault in computer software or hardware, which
causes a program to malfunction.
CAD (Computer Aided Design) Drafting and design through the aid
of a computer, which can handle technical geometric detail. It allows the user
to manipulate drawings and view them from all angles.
Compression The process of storing data in a way that requires less storage
space. For example MPEGS compress video data.
Domain name A name that identifies one or more IP addresses that deliver
information, or other services, to Internet users.
Computer department
Download The process of transferring a copy of an electronic file from a
remote computer to the requesting computer by means of a modem or
network.
DVD (Digital Versatile Disc or Digital Video Disc) a new type of CD-
ROM that holds a minimum of 4.7GB, enough for a full-length movie. A DVD
player or drive is required to read the contents of a DVD.
End user The final or ultimate user of a computer system. The end user is
the individual who uses the software after it has been fully developed.
Graphics card A printed circuit board that plugs into a computer to give it
display capabilities and to allow graphics output
Computer department
Hard disk A fixed magnetic disk generally fitted internally in a personal
computer, on which you can store computer data. The term hard is used to
distinguish it from a soft, or floppy, disk. Hard disks hold more data
(anywhere from 10 megabytes to several gigabytes) and are faster than floppy
disks.
Home page The first Web page or entry point of any World Wide Web site.
Inkjet printer A non-impact printer that fires tiny drops of ink at the paper.
Computer department
JPEG A JPEG or JPG is a standard type of image file. It is a common
way to compress and store images, particularly photos, for the Web.
Monitor A device, also known as a VDU (visual display unit) for viewing
visual input to and output from a computer.
Mouse A device, moved by hand across a flat surface, which control the
movement of the cursor or pointer on a display screen.
Computer department
Multimedia The use of computers to present text, graphics, video,
animation, and sound in an integrated way. A multimedia machine is fitted
with hardware such as a sound card and a CD-ROM drive to allow the full use
of a multimedia product.
Operating system (OS) Software which provides all the basic control
functions to supervise the computer system. Not all computers use the same
operating system.
Pixel Short for Picture Element. The smallest unit of the computer
display screen.
Portal A Web site or service that offers a broad array of resources and
services, such as e-mail, forums, search engines and links for a specific
subject area. For example, www.scoilnet.ie is a portal Web site for Irish
education.
Computer department
Protocol An agreed-upon format or set of rules to enable smooth data
transmission between computers.
RealAudio
With this plug-in installed in your browser, you can listen to live
and on-demand audio over the Internet using your standard modem.
RealPlayer
Sample rate
Search tool
A free service on the Net. Search tools are like master librarians
that index and find links on the Internet to the information you request.
When you types in a phrase or keyword, the search tool scans the pages in its
index for matches.
Server
Computer department
A commercial company selling Internet access. Also called an
Internet Service Provider or ISP.
Shareware
Computer programs that you can download from the Net. You
are free to use them for a period of time — often 30 days. If you keep them
longer, you are expected to pay the shareware provider.
Shockwave
Smiley
Snail mail
The slow stuff from the post office. As opposed to faster email.
Spam
Spiders
Search tools send out small programs that we once called robots
but now refer to as spiders, crawlers or 'indexers' - to review and catalogue
Web sites and copy text they finds into a database.
Surfing
Uploading
Computer department
URL (Uniform Resource Locator)
A Web site address with the name of the server where the site's
files are stored, the file’s directory path, and its file name. For example
http://www.idrc.ca/.
UUencoding
Virus
Web site
WinZip
Computer department
Exercise:
1. (a) Define the following terms:
(i) Hyperlink
EXERCISE: (UNEB QUESTIONS) (viii) packet
(ii) web browser (ix) search engine
(iii) web master (x) Network Administrator
(iv) web site (xi) Network Protocol
(v) Web authorising software (xii) Bandwidth
(vi) Web server (xiii)Surfing
(vii) Web mail provider (xiv) Email
Computer department