You are on page 1of 51

INTRODUCTION TO COMPUTING

Definition;

A computer is an electronic automatic device that transforms or converts data into


information.

OR

A computer is an automatic electronic device that accepts data input, stores it, processes it &
outputs the result in desired format.

A computer system is made of physical Hardware & Software programmers, users and data.

A computer performs 5 major functions i.e.

i) Data input
ii) Data storage
iii) Data processing
iv) Information outputting
v) Communication

X-tics of Computers

For a device to be called a computer, it must have some or all the following X-tics

1. Speed

Computers are quite fast in their operation and work at amazingly high speeds (Measured in
Hertz (Hz))

2. Accuracy

Computers are so accurate that they hardly make mistakes. In fact they detect mistakes made
by users. It therefore follows that if wrong data is fed in a computer, wrong results are
expected out hence a common saying that “Garbage in Garbage Out” (GIGO).

3. Storage

Data is stored before and after processing.

4. delligence

1
This is the ability of a computer to perform the same task or routine over and over again for a
long period of time without getting tired, bored or fatigue. E.g. Industrial robots used in car
assemblies, the ATM machines of banks, and the telecommunication company computers etc.

5. Automation.

Computers can also work automatically; they do not need any supervision or monitoring to
perform tasks. Computers use programs to perform automatically.

6. Versatility (Multi purpose)

This is the ability of a computer to perform wide range of tasks given i.e. calculation of
numbers, typing of texts, playing games, surfing the Net, down loading etc.

7. Artificial Intelligence

This is the ability of a computer to respond to requests given to them by people /users. This is
accomplished by use of programs or instructions installed in them so as to make decisions and
functions in a required way. Computers with artificial intelligence can perform almost all tasks
human being does.eg Industrial Robot computers, Super computers like NASA in US.

ADVANTAGES OF USING COMPUTERS

i) Computers make communication very easy i.e. receiving & sending information
around the world very quickly.
ii) Tasks can be completed faster because computers work at a very higher speed.
iii) Computers can process large amount of data & generate error free results provided
data entered is correct i.e. computers are accurate in performing tasks.
iv) Computers help in storage of large volumes of data for future use.
v) Computers are highly reliable and enable us to produce consistent results.
vi) With computers, efficiency and productivity can be increased and maintained.
vii) The running cost in an organization or business or business becomes cheaper or low
in a long run when using computers to do work.
viii) Computers are very automatic hence tasks can be done and completed with little or
no human intervention.
ix) Overall security can be achieved by use of passwords to protect data, CCTV cameras
to protect some areas.
x) Computers are flexible therefore new changes can easily be made to data or
information when deemed necessary.
xi) Computers are known to be best devices for entertainment.

2
DISADVANTAGES

i) The initial cost of purchasing/buying computers can be very high and also acquiring
related programs used in them thus making them very expensive.
ii) Extra costs are normally required in maintaining the computer systems as well as
training the users.
iii) Computers can only be used by people who are computer literate thus illiterate
people are unflavored to use computers.
iv) Face to face interactions are limited especially when using computers for
communication and Ecommerce.
v) Some information obtained from computer internet may be inaccurate, false,
unauthentic or not up to date.
vi) Transmission of computer viruses from one computer to another can result into
massive loss of vital information of a person or organization.
vii) Computers create/promote moral degeneration (immorality) by exposing people to
pornographic materials such as pictures, videos, audio unhealthy to human moral
behavior.
viii) Over using computers without protecting screen glares (antiglare screens) or eye
glasses can lead to eye defects.
ix) Computers promote crime rate and frauds (cheating).
x) They are being used to steal Banks, forge documents like receipts, Reports,
Certificates, Tickets, etc.
xi) Computers highly rely on electricity for operation therefore absence of power
renders them nearly useless or non-functional.
xii) Computer devices are not degradable and therefore
Some countries deliberately use computer to promote insecurity. E.g. Countries use
computers to set or launch missiles, atomic bombs, Nuclear weapons/tools.

3
INTRODUCTION TO HARDWARE AND SOFTWARE
Hardware

These are the physical or tangible parts of the computer. Which include things like system unit,
keyboards, mouse etc.

The most common hardware parts of a desktop computer system include the following;

1-Keyboard

Allows a user to enter data, instructions or commands. A keyboard is mainly used to type texts
in a computer. It has keys or buttons with letters, symbols and Numbers.

2-Mouse

Is a small device used to point & select items on a computer screen. It moves the pointer and
directs the cursor on the screen. A mouse is used for clicking, pointing, Dragging and making
selections.

3-Monitor

It displays information to the user in visual form (softcopy) information. The portion of monitor
that displays information is called the screen. Monitor allows you to see what the computer is
processing and activities taking place inside the computers. Two common types of monitors
include *CRT monitors and *LCD monitors.

4-System Unit / System Case

This is the core of computer system. Usually it is a rectangular box inside which many
electronic components that helps in processing information. The most important component
inside the system unit is the CPU –Central Processing Unit also called the brain of a computer.
The system case provides protection to the internal components of the computer.

5-Printer

It helps to output information in form of hardcopy on a paper medium. Main types of printers
include;

• LaserJet printers
• Inkjet printers
• Thermal printers

4
• Dot matrix printers

6-Speakers

They are used to output sound. They may be built into the system unit or connected with
cables speakers that allow you to listen to audios such as music and other sound effects.

Some internal components of a computer inside the system unit include;

7 -C.P.U

It’s the main component which is responsible for processing data into information.

It interprets and executes instructions entered into a computer.

8-RAM (Random Access Memory)

RAM is the main memory of a computer used for temporary storage of data during operation.

9-CD/DVD (Digital Versatile Devices)

Drives are used to read and write data on discs such as CDs and DVD.

10-FLOPPY DRIVE

It is used to read and write data on floppy discs

11-Motherboard

It is a very important component in a computer system on which other electronic components


are connected i.e. It accommodates most internal components such as CPU, RAM, Slots,
Resistors, Transistors, Buses etc.

12-The Power Supply Unit

It is used to regulate the amount of power consumed by a computer. It converts a.c power
supply into d.c power supply so that computers can safely it.

13-Hard disk drive

It is a metallic drive/device used for permanent storage of files & programs in the computer

It stores large volumes of information for future use.

14-Video & Sound Cards (Graphic Cards)

5
They are required to convert binary codes from the CPU to appropriate image and sound that
can be produced on a monitor.

15-Ports & Slots

These are connection interfaces found inside the computer system unit and are used for
inserting various cards such as Sound cards, Video cards, Network Cards and RAM or eternal
deices like keyboards, mouse monitor, flash disks, speakers etc.

16-BUSES

These are electronic channels or pathways through which information or data is transmitted or
flows.

CATEGORIES OF HARDWARE

The hardware devices can be categorized into two i.e.


▪ Internal hardware devices
▪ External hardware devices

COMPUTER INTERNAL HARDWARE DEVICES


A computer is made up of hardware that is found inside the system
Examples include;
CPU, Buses, RAM, Power Unit Supply, Slots, Motherboard, Memory chips, Transistors, Hard
disks, Expansion cards, CMOS battery, BIOS, ROM.

EXTERNAL HARDWARE DEVICES


These are all those hardware devices found outside the system unit.
They are connected to the computer via parts on the outer surface of the system unit.
E.g. keyboard, mouse, monitor, speakers, flash, scanner, printer, headphones etc.
N.B

All the above internal & external hardware devices can be grouped into the following:

1. Memory hardware devices

2. Input hardware devices

3. Output hardware devices

6
4. Storage hardware devices

5. Processing hardware devices

6. Network hardware devices.

INPUT HARDWARE DEVICES


Input device is any hardware component that allows a user to enter or feed data & instruction
into a computer for processing.

1. Mouse – Is the most widely used pointing device with personal computers (PCs).
It is used to control the movement of the pointer & cursor on the screen.
It is also used for quick selection of points on the Graphical User Interface (GUI).

2. Touch pad- Is a small flat rectangular pointing device that is sensitive to pressure in
motion.
When you touch this pad, it responds & makes the pointer to the direction specified.
They are mostly used on laptops.

3. Track ball- Is an input device that is mostly used in notebooks or laptop computers
instead of a mouse.
It has a ball which is half inserted on top & by moving the fingers on the ball pointer can
be moved.
Since the whole device is not moved, a track ball requires less desktop space than a
mouse.

4. Joystick- It is also a pointing device which is used to move a cursor on a monitor screen.
It is a stick having a spherical ball at both its lower & upper ends.
The function of a joystick is similar to that of a mouse & it is mainly used when playing
computer games & also when in Computer Aided Designing (CAD).

5. Touch screen- It is a pointing device which is sensitive through which data can be input
into a computer just by touching it with a finger or its pencil.
They are often used with information works e.g. Banks, Military, Museums etc.
They are also used to enter data in touch screen mobile phones, ATM, security devices,
laptops, TV systems etc.

6. Light pen- It is a pointing device which is smaller to a pen. It is used to select a displayed
menu item or write text & draw pictures on the monitor screen.
When a light pen’s tip is moved over the monitor screen & the pen bottom is pressed,
its photocell sensing element detects the screen location & sends the corresponding
signal to the CPU.

7
Keyboard
Primary input device used for entering text data into a computer. It contains keys with
different characters e.g. letters, numbers, symbols & modifier keys which help in data
entry into the computer.

Barcode reader
It is a text input device that uses a laser beam to read bar codes on products.
This information is interpreted as text and displayed on the screen. Barcode readers are
widely used in supermarkets, libraries, shops, departmental stores, factories to read bar
codes on manufactured products like books, pens, clothes, drinks, snacks etc.

Digital Video Recorder (DVR)


It records videos in digital form so that it can be down loaded into the computer.
It also stores the recorded video onto its hard disk or memory card.

Digital Video Camera (DVC)


It records videos. DVCs can also capture still images.

Digital Camera
It’s used for capturing digital photographs and images which are then downloaded into a
computer.
There is need to buy a film since they record digital images on memories.
Some digital cameras are used for surveillance e.g. the Circuit Controlled television Cameras
(CCTV) for taking pictures of over speeding vehicles.

Webcam (Web camera)


Is a video camera whose output displays on a Webpage. It usually takes digital pictures &
uploads them to the internet website. Webcams are also used in teleconferencing.

Microphone
Is an input device that allows the user to speak & enter sound data into the computer.

They only help capture and feed sound (audio) related data.

THE KEYBOARD AND NAVIGATION

The keyboard is a primary input device used to enter or feed data into the computer for
processing.

A keyboard contains keys (buttons) that a user presses to allow data entry into a computer.

8
THE MOUSE
The mouse has four major parts namely;
1. The left button
2. The Right button
3. The scroll button
4. Underside button/ball
Underside ball rotates in different directions that in turn move the pointer.
Some mouse do not have underside balls but instead use laser light to move the pointer.

OUTPUT DEVICES

refers to devices that present information e.g. text, graphs and videos to the users.

A softcopy refers to the information displayed by an output device in an intangible form e.g.
information displayed by monitors, projectors, plasma screens and gas plasma screens.

OR

A softcopy is the information stored on the storage media e.g. CDs, DVDs, hard disks, flash disks
etc.

They include;
-Smart boards
-Terminals
-Light emitting diode screens
-Gas plasma screens
-Projector
-Monitors

FAX MACHINE
It is an output device that transmits & receives documents over telephone lines.
Documents sent or received via fax machines are called Fax.
.
BUZZER
It is an output device used in microwave ovens.

MOTOR
It is an electrical device used in conversion of electrical energy into mechanical energy.
They are widely used in running industries, running turbines.

COMPUTER MONITORS

It refers to the common output device used to display information from the computer.

They are also known as the Visual Display Unit (VDU).

9
Information displayed by a monitor is intangible and it is often called Softcopy Information.

You can see information but you cannot touch it physically.

Monitors can display information in either one color or more than one color.

Monitors that display information in one color are called Monochrome monitors while those
that display in many colors are called Graphic or Colored monitors.

1. PRINTERS
It refers to output device that produces text and graphics on the physical medium such as a
paper.
Printed information produced by printers is often called a hard copy.
CATEGORIES/GROUPS OF PRINTERS
Printers can be grouped into two namely;
Impact printers
Non-Impact printers
❖ IMPACT PRINTERS
These are printers that form characters, graphics or information on a piece of paper by the
print mechanism physically striking against an ink ribbon that is in contact with the paper.
Examples of impact printers include;
1. Dot matrix printer
2. Line printer
3. Character printer
➢ DOT MATRIX PRINTER
It is an impact printer that produces images by the print mechanism physically striking against
the paper.
Their speed is slow in printing and its speed is measured in terms of characters per second
(CPS).
➢ LINE PRINTERS
These have a higher speed than dot matrix printers.
It is an impact printer that can print an entire line of text at once.
Its speed is measured in terms of number of lines per minute.
Impact printers are generally very noisy & slow in printing. They have a low print quality.
However they can withstand a dusty environment and can print multiple papers at once.
❖ NON-IMPACT PRINTERS
These are printers that produce information (text and graphics) on a piece of paper without the
print mechanism physically striking or coming into contact with the paper (Print media).
With non-impact printers, there is no physical contact between the printing mechanism & the
paper.

10
Examples of non-impact printers include;
1. Thermal printer
2. Ink jet printer
3. Laser jet printer
Others include;
-The Daisy Wheel
-Braille
-Canon Printers
-Graphics
PLOTTER
A plotter is a sophisticated printer used to produce large quality drawing that can be very large
in size.
This printer can handle papers with of over 60inches and are used to produce drawings such as
blue-prints, maps, circuit diagrams, large adverts etc.
-Speakers
-Headsets

STORAGE DEVICES
These are devices that record & access information to & from the storage media.
Examples of storage media;
-Hard disk
-Tape
-Compact Disc (CDs)
-Digital Versatile Disk (DVDs)
-Video Compact Disk (VCDs)
-Hard disk
-Floppy disk
-Memory Cards
-Zip disks
-Flash disk

MEMORY HARD WARE DEVICES

SECONDARY STORAGE MEDIA / BACKING STORAGE


This refers to any media on which data or information can be kept & stored in a relatively
permanent form e.g. CDs, Flash disks etc.
MEMORY OR PRIMARY STORAGE MEDIA
Primary storage media refers to media that temporarily stores data/information for a relatively
short time.
The information is immediately lost if the computer is turned off. E.g. RAM
READING & WRITING ON A MEDIA

11
This is the process of transferring data or information from a storage media to a computer
memory e.g. from a CD to computer, from a flash disk to a computer.
Writing is the process of transferring data or information from the computer memory to a
storage media e.g. burning a song from a computer to a CD, loading Video files from a
computer to a flash.
DIFFERENCES BETWEEN SECONDARY & PRIMARY STORAGE MEDIA

Secondary Primary
1.It stores data in a relatively permanent form Stores data in a relatively temporary form
2. They are non-volatile i.e. cannot lose data They are volatile i.e. immediately lose data if
when power goes off or switched off. power is switched off.
3.They have larger storage capacities Have relatively smaller capacities of storage
4. They are more portable & can be moved They are normally fixed in computers less
within case e.g. flash disk. portable e.g. RAM
5.They have high access time than the primary Have low access time i.e. it takes long minutes
storage media i.e. it is very fast to record data to record data.

SIMILARITIES BETWEEN SECONDARY & PRIMARY STORAGE


a) Both are computer hardware devices i.e. they are tangible.
b) Both are used to keep or store data or information.
c) Their capacities can be increased
d) Both allow random access of data / information.

Examples of storage (secondary storage) media.


-Hard disks-Floppy disks
-Compact Disks (CDs)-Digital Versatile Disks (DVDs)
-Memory Cards-Data loggers
-Magnetic tapes-Zip disks
Blue-Ray Disks-Magnetic Strip cards
-Smart Cards-Punched cards
Differences between RAM & ROM
RAM ROM
*It is a temporary type of memory It is a permanent type of memory.
*It is a volatile memory i.e. the contents are It is a non volatile memory i.e. contents can’t
immediately lost if power is switched off. be lost even if power disappears.
*The RAM capacity can be increased. The ROM capacity can’t be increased.
*The RAM is re-writable type of memory & it The ROM is recordable once then it becomes
is a Read /write. (Read Only)
*The RAM is Random Access Memory The ROM is Read Only Memory

12
PROCESSING HARDWARE DEVICES

THE CENTRAL PROCESSING UNIT (CPU) /MICRO PROCESSOR


The CPU is also called the brain of the computer.
It refers to the computational engine found in a computer whose major purpose is to process
data.
OR
The CPU is the electronic device that interprets & carries out instructions that tell the computer
how to work.
The CPU is at times called the micro processor.
it is an electronic device that contains the control unit, Arithmetic Logic Unit (ALU), Register&
System clock.
FUNCTIONS OF THE CPU
The CPU performs a number of functions that include the following;
1. It controls all devices connected to the computer system
unit
2. It helps in all the stages of data processing
3. It is the chief brain of the computer which performs
arithmetic, logical & comparison operation of data.
4. It determines how fast a computer performs a given
function
5. It helps the user to work with many programs at the
same time.
6. It controls which component (part) to handle, which
category of task it can also handle within the computer.
7. It stores data temporarily for the computer during
processing
8. It is used as a yard stick to determine the type & model
of a computer

Control Unit

The control unit directs & coordinates most of the operations in the computer.

1. ALU
2.
The ALU specifically performs the arithmetic, logical & comparison operations.
Arithmetic operations include; Addition, Subtraction, Multiplication & Division.
Comparison operations include; comparing one data item to another & determine whether it is
greater than, less than, equal (=) to the other.
Logical operations work conditions & logical operations such as AND, OR, NOT, IF etc.

13
3. Register

This is a high speed storage location in the CPU used to temporarily hold data & instructions
during processing.
4. System Clock
5.
It controls how fast all the operations within a computer take place.
The system clock generates regular electronic pulses that set the operating pace of components
in the system unit.
The speed at which the processor or executes instructions is called the clock speed / clock rate
measured in Mega hertz (MHz or (gigahertz)

FACTORS AFFECTING THE PROCESSING SPEED


1. The Register Size
The CPU contains a number of small memory areas called registers which store data and
instructions during processing by the CPU
The size of the registers determines the amount of data with which the computer can work at
any given time
2. The Ram Capacity
The amount of ram in a pc has a direct effect on the system’s speed. The more ram a pc has ie
more programs instructions and data that can be held in the memory hence a faster rate of
processing by the CPU
3. Size The Bus Cable
The bus width determines how many bites (data)Can be transmitted between the CPU and
other devices
4. System Desk Speed
The faster a PC clock runs /ticks, the more the instructions the pc can execute each second
5. The Cache Memory
Cache memory is an extremely high speed memory that holds most recent and frequently used
data and instructions that have been loaded by the CPU. Cache is located directly on a CPU or
between the CPU and ram
Cache makes data flow between the CPU and the ram faster and the amount cache memory
has a tremendous effect on the computer’s speed.

14
THE WORLD OF ICTS
Definition of key terms

Information and Communication Technology (ICT);


This is defined as a set of technological tools and resources to create, disseminate, store,
communicate and manage information.

OR

It also refers to the combination of computers and communication technologies to process data
into information. It as well involves use of devices such as computers, phones, satellites,
printers etc.

INFORMATION AND COMMUNICATION TECHNOLOGY DEVICES (TOOLS)

ICT involves the use of various devices for creating, storage, disseminating, communication &
managing the data/information.
Examples of ICT devices (tools) include;

➢ Computers e.g. desktop, laptop, palmtop, and I pads etc.


➢ Communication phones
➢ Printers, Scanners and Photocopiers.
➢ Fax machines
➢ Terminals
➢ Multipurpose machines
➢ Routers, Switchers, Hubs, Bridges, IPods
➢ Programmable Scientific Calculators
➢ Digital watches/analog watches
➢ Satellites phones/Radio calls
➢ Security touch screens (sensitive screens)
➢ Radios, Televisions, CDs, DVDs
➢ Data cables (Transmission lines)
➢ Signal boosters (Dish)

15
IMPLICATIONS OF USING ICT

❖ In Education Sectors:

The following are the advantages (Positive impacts) and disadvantages (Negative impacts) of
using ICT in the education sector.

Advantages

• CAI & CAL packages that usually maintain multimedia effects e.g. Edutainment make
learning more interesting and interactive.
• Students can learn by themselves even if the teacher is not around or available.
• Students can learn and proceed by themselves or on their own.
• Students can get their results or feedback immediately after they have sat for
exams/tests as questions can easily be marked e.g. OMR to mark objectives.
• They are rich educational sources on the internet that students can obtain for
research.
• Teachers can present subjects matter and explain abstract concepts more clearly
with multimedia software and slide show effects (Power Point).
• Teachers can show experiments that are difficult to perform or dangerous in nature
through simulation software.
• Helps to keep or store information of students, teachers & staff.
• Provide leisure or entertainment for students & school staff.
• Helps to save time and improve efficiency in school activities e.g. typing exams,
tests, Reports, Letters etc.
• Computers are very good tools needed for communication (delivery of information)
fast and over large geographical areas.

Disadvantages

• Face to face interactions between teachers & students may be reduced yet many
students find it difficult or hard to understand concepts without teachers’ explanation.
• Students can only follow what the computer aided learning packages are predefined
to offer.
• Students may not be well versed with the system and this may limit them from
learning.
• Students may develop tendencies of dodging lessons with view of self learning,
research and yet computer information may not be explained in depth or not clear.
• The system may not be applicable to some disadvantaged students e.g. disable

16
• Loss of jobs when tasks that could be done by seven secretaries are being done by
only one person.
• Data loss due to viruses may cause serious damage in the Education
sector/institution.
• Not all the materials on internet resources are valid and up to date therefore the
teacher needs to guide the students on what materials to access and use.
• Instead of suffering and searching for educational resources, students may end up
enjoying and watching uneducative pornography films, pictures, audios, videos etc.
• Computers are expensive to buy and in addition they are very costly to maintain.
• This increases total expenses on using computers in the educational sector.
• Computers are power dependent, absence of power or electricity renders them
useless.
• Over reliance by students on using computers narrows down their thinking &
reasoning capabilities of logic and math.
• Over use of computers have side effects such as causing sight defects, backache,
neck & arm strains.

❖ In Business Sector:

Advantages (Pros)

• It helps to store business information.


• Transactions can be made instantly and worldwide thus saves time for the
participants on both ends.
• Enable transactions to take place or occur 24hours daily.
• Enable business people to access customers across the globe/worldwide through
advertising their products online.
• Businesses can easily gather a variety of customer ideas or views and demands and
respond positively.
• Business information can constantly be changed and made available quickly.
• Manufacturers can buy and sell directly to their customers hence eliminating cost of
middle-men i.e. through e-commerce.
• Helps eliminate distribution costs and reduce cost of advertising products via online
transactions.
• They help to make business communication easy.
• Help strengthen business security thus minimize losses in business.

17
• Can be very time saving and convenient e.g. when using ATM, Electronic Fund
Transfer Point of Sales (EFTPOS) and e-money for conducting transactions.

Disadvantages (Cons)

• The initial cost of buying ICT devices for business and their maintenance cost can be
very high (expensive).
• Mechanical failures in the ICT system can lead to massive loss to the business e.g.
break down of server computer, Network failure etc.
• ICT systems can only be used conveniently in places with sufficient & steady power
supply.
• Many customers are still not comfortable with natural occurrencese.g.landslides,
powerful winds, Earthquakes.
• They are used in measuring the of ocean currents, depth of seas and oceans to
provide information to people.
• They have hazardous effect on the environment through emission of
electromagnetic radiation eg X-rays, gamma rays, cathode rays etc which are dangerous
to human and plant life.
• They promote environmental degradation such as swamp reclamation,
deforestation for installing ICT tools like masts, stations etc.
• They pollute the environment through noise, vibration, heavy smoke, emissions etc.
• They are not renewable or biodegradable and therefore affect the water cycle of the
land.

❖ POLITICAL IMPLICATIONS (Government/State)

Positive;

• They enable easy communication


• They allow electronic meetings to be conducted e.g. teleconferencing meetings,
workshops etc with minimum absenteeism.
• They help in electoral process such as voters’ registration counting of votes, e-
voting,provision of the voting results.
• They are important tools for politicians to expose themselves & give ideas to
electorates/voters. E.g. during campaigns, via radios, TVs, phones etc.

18
• Government uses ICT tools for delivering services to the people eg paying salaries,
advertising jobs, make announcements etc.
• ICT is used when drafting and preparing the National budget through the ministry of
finance.
• They permit/allow voters to closely monitor and access the effectiveness of their
members or representatives in parliament through watching them on TVs, radio shows
(talks) where they can express their views.
• They are used as media to provide information to the citizens eg Presidential
address to the Nation, emergency situations etc.
• They play a vital role in conducting National exercises such as population census,
Birthrate/registration, recruitment etc in the country.
• ICT tools are used to monitor National security through the intelligence department
the police, the military & security Bureaus e.g. FBI in USA.
• They are very usually in knowing the past, present and predicting the future political
trends of the country or the world.
• The government can use ICTs for strengthening its relationship with other
governments around the world.
• Political donations from donor countries are sent & received via electronic means.

Negatives (Disadvantages)

• Powerful politicians may take their advantage to practice corruption eg transferring


public funds into their own accounts.
• Government in power may become unpopular and disliked by the people especially
if it mistreats political opponents as the citizens are able to get information through TVs,
internet, phones, radios etc.
• ICT devices can be used by government officials to promote malpractice ej stealing
of votes, diverting funds, frauds.
• ICT devices can be used to promote malpractices such as vote rigging by those who
are in political authority.
• They can be used to track political suspects, opponents etc and cause arrests &
assassinations.
• With ICT devices, political & personal confidential information & secretes are hardly
kept out of reach of people confidential information may leak to the public.
• They are tools used by criminals or wrong doers e.g. rebels, terrorists, assassins,
robbers etc to locate places & cause destruction e.g. by use of GPS and satellite phones.

19
APPLICATIONS OF ICTs (USES)

ICT is used in a number of fields to perform many different tasks. Such fields include; Business,
Home, Education ,Health, Security, Politics and governance, Leisure and Entertainment,
Industries, Scientific research, offices Banking, Communication and many more.

APPLICATION OF ICT IN EDUCATION


• There are variety of using educational resources on CD-ROMS and the Internet.
• Computers make teaching and learning more interesting and interactive through the use
of computer aided instruction.
• Computers are used in Computer Aided Learning (CAL) where multi-media effects are
used to express concept.
• Students can learn & proceed at their own pace depending on the learner’s individual
ability.

• Learners can get their results immediately after doing some assignments or tasks.
• The teacher (instructor) can present subject matter and explain abstract or difficult
questions or concepts more clearly with multi-media S/W.
• Teachers /Instructor can show experiment which is dangerous or difficult to perform
physically through the use of simultaneous S/W programs.
• Advanced instructions can be given to learners more appropriately especially in areas
where the teacher may not be well versed with.
• Computers are used for online education (E-learning) good for distance learning.
• Computers are used to store large volumes of data or information in Education Sectors
e.g. in schools, Colleges, Universities etc.
• Computer projectors are used in many educational institutions to facilitate teaching
where the audience is large.
• Computers give practical training skills to generate income for self sustenance to
students, teachers, administrators etc.
• They are used to conduct or to carry out research, projects by learners, teachers,
scientists, and many others.
• Computers can be used to promote social interaction in the educational field through
the use of services such as Face book, Twitter, Whatsapp.

20
A. APPLICATION OF COMPUTERS AT HOME
• At home, computers can be used to pay domestic bills e.g. water bills, Electricity bills,
T.V bills, etc.Computers are useful to do domestic work e.g. washing, domestic
apparatus, monitoring babies, elderly, disabled etc.
• They are used to provide home entertainment e.g. games, playing music, audios etc.
• They are used for budgeting & personal financial management.
• Used for accessing and listening to the news about daily affairs of the society.
• They are used for communication by family members.
• At home it can be used to carry out personal research e.g. on social/political affairs.

B. APPLICATION OF COMPUTERS IN LEISURE, ART & ENTERTAINMENT


• Used to play music
• To play computer games.
• Used to watch videos, films, movies
• To read online books, news, and magazines.
• Used to download online pictures, videos, music, etc.

• APPLICATION IN OFFICES
• For creating memos, letters, forms and reports etc.
• To create pay roll of or for employees, prepare income and expenditure statement
and balance books. Present project and proposals using presentation software.
• For communication with other employees or offices such as through calls, fax mails,
emails, and video conferencing, telegrams etc.
• Used for proper data management of the office activities e.g. using the Data
management system (DBMS).
• Used for telecommuting i.e. where employees can do official works away from
physical work place. This helps to save time, costs & overcome fatigue etc.
• Useful in keeping office records.
• Used to provide security to offices and businesses e.g. using CCTV cameras for
surveillance.
• Useful in creating official websites for an office or business to advertise products &
services and conduct official E-commerce.

C. APPLICATION IN COMMUNICATION FIELD


• Computers are used to carry out internet conferencing & video conferencing
(meeting).

21
• They provide access to instant messaging when using internet services.
• They facilitate email services i.e. sending & receiving of e-mails.
• They are used for making direct calls e.g. using phones, personal computers (PCs),
radio calls.
• They are used for chatting online or on internet via chat room services.
• Computers are used for sending fax mails using fax machines.
• Used for sending telegrams using telegram machines.
• Used for conducting discussion forums with friends.

D. APPLICATION IN MEDICINE & HEALTH CARE UNITS


• To maintain patients’ records in hospitals, clinics.
• To monitor patients’ vital signs in hospitals rooms and at home.
• Used in computer assisted medical tests e.g.
• Used by doctors for research & diagnosed medical conditions of patients.
• Implant computerized devices e.g. Pacemakers are used to allow patients live longer
under adverse conditions.
• They are used in computer controlled devices that require great precision during
some operations e.g. eye, liver and heart surgeries.
• They are used to administer telemedicine.
• Used in computer aided surgery for training doctors and medical officers prior to
performing major surgery on a living human being through simulation software
programs.
• Used in industrial manufacture of medical gadgets (tools) that require high degree of
precision and accuracy with almost no mistake e.g. manufacture of drugs, testing
devices, the condoms etc.

E. APPLICATION IN BUSINESS (BANKS)


• For keeping records of customers e.g. names, the account number, contacts,
residence, employment status etc.
• For calculating gross profit and loss account of the business, Net profits, balance
statements and trial balance of the business.
• For communication in the business.
• Conduct video conference meetings to discuss business ideas with other business
partners.
• For printing business receipts, delivery notes, stamps, invoices, logos etc. to facilitate
business activities.

22
• To generate business reports, memos, forms and letters.
• Banking institutions use ICT for printing Bank notes, coins, cheques.
• They are used in electronic money transfer to send and receive money quickly and
on time.
• Bank ATM out letsis used to withdraw and deposit cash, cheque thus provide
convenience and save time.
• The EFT and e-money terminals can be used to conduct transactions without
involving physical money item.
• It is used to create business websites to advertise products & services and conduct
Ecommerce.
• ICT devices such as MICR are used to read bank cheques, Barcode readers for
reading codes on products.00000/4
F. APPLICATION IN INDUSTRIES

They are used for data sensing and logging.

Robots are best used for performing repetitive tasks, lifting heavy equipments in the industries
and doing tasks that require high degree of precision and accuracy. They also control the
running of the industry.

They are used for quality control measure e.g. by use of Computer Aided Design (CAD) and
Computer Aided Manufacturing (CAM).

Computers are used for industrial, Engineering, Architectural & Scientific drawings.

Computers are used in car assemblies for assembling and testing components.

G. APPLICATION IN RESEARCH

Providing assignments and reports, forms and publications.


Take online classes and lessons.
Learn how to speak foreign languages.
Helps learners to improve on how to read, write, count and spell.
Locate mineral resources underneath the ground, rocks etc.
Study about different objects on the surface, underneath and in space e.g. ozone, clouds,
moon, stars etc.
Contact different authors (persons) and resourceful books to obtain required data or
information.
To enhance self discoveries & learning e.g. how to type using the keyboard fast and accurate.

23
H. APPLICATION IN POLITICS& GOVERNANCE

For national planning and budgeting requires the usage of ICT especially at the ministry of
Finance, planning & economic planning.

Discoveries and exploitation of the natural resources e.g. oil, gold etc. requires the use of ICTs.

Sector planning e.g. education also heavily rely on the usage of ICT e.g. for keeping its records
for its employees.

ICT is used in civil aviation to monitor and find schedule flights at airports & airfields.

ICT is fundamental in conducting population census and national planning.

For communication both within and outside the nation by people and government officials.

ICT is used for national sector monitoring and spying on internal & foreign strang ers (terrorism).

ICT is used in national & private industrial manufacturing firms e.g. food processing, textiles,
chemicals and weapon manufacturing industries.

The government uses ICT to provide information and get feedback from citizens about its
program and daily happening in the country.

Used in sensitizing voters, register voters, voting, count votes and announce its results and
political campaigns etc.

To advertise government jobs keep employee records.

I. APPLICATION IN SECURITY/MILITARY

Computers are instrumental in training & education of military personnel

Computer simulation allows the military to train soldiers for combat situations. The air force
can train pilots in flight simulators, long bet-They actually get in a cockpit.

Computers help in communication during war situation.

Military schools depend on computers to testing aptitudes of the students. Some of the
aptitude tests are used to decide the ability of the student and during his/her service time.

Many military programs & Hardware is kept confidential for purposes of national security.

24
Used for storing military information.

J. APPLICATION IN BANKS

a) Physical Banking

Automatic Teller Machines (ATM), with a Self Service Banking machine attached to a host
computer through a telephone network. Services available through an ATM machine include
the following;

1. Making deposits of cash &cheque

2. Withdrawing cash

3. Transfer money between accounts

4. Apply for a cheque book

5. Obtain your account balances and Mini statements

6. Change your Personal Identification Number (PIN) cords(passwords)

To keep customers’ information e.g. their names, account details, Addresses etc.

Generate reports about profits & losses so as to analyze to make changes where necessary.
Helps tellers to keep records for daily transactions e.g. daily depositing withdraws made,
Account opening, Loan processing etc.
Computers are used to track customers who are deliquescing to their loan and credit card
payment.
For printing or minting of bank notes, coins, cheques or other forms of currency.
Keeps security in the Bank e.g. detecting suspects or wrong doers.
They are used to detect fake cheques/money from original money.
Used to count large sums of money.
For making communications.
b) Online Electronic Banking Services

E-Banking refers to the banking services conducted over the electronic network e.g. the
internet.

E-services include;

-Transfer money electronically among different accounts e.g. Western Union Money Transfer.

-Loan & Credit card application

25
-Obtain credit card statements, bank statements & account balances.

-Download monthly transaction information.

-Used to process cheques.

-Use of micro-films to store transaction records

-Mobile money i.e. sending & receiving money electronically via computer networks.

-Make deposits (E-deposits) e.g. NSSF, water bills, TV bills into the services providers Account.

-Electronic cheque conversion i.e. converting a paper cheque into an e-charge for payment.

-Electronic point of sale (POS) terminals used to record purchases at the pointer where their
customer purchases the product or services.

-Electronic fund transfer point of sale (EFT-POS) terminals involves transfer of funds from
customer bank accountants directly to the sales account in the customers date cord

ONLINE E-COMMERCE

This is the financial business transaction that takes place over an electronic network such as
internet.

Online shopping and banking (E-transaction) can be done or affected using the following ways
or modes of payment.

1. E-money; where e-money is used as a means of paying for goods & services over the
network.

2. Electronic Data Interchange (EDI); involves use of a set of standards that control the
transfer of business and information among transacting parties using computers.
3. EFTPOS(Electronic Fund Transfer Point Of Sale); Where funds are transferred from a
customer’s bank account directly to the sellers account after reading the money value
from the customer’s credit or debit card.

4. EPOS(Electronic Point Of Sale); It is used to record purchases at a point where the


customer purchases a product or service and the related money value is captured &
deducted from the customer’s credit card.

26
Advantages of E-commerce
• Transaction can occur instantly and globally thus saves time for both parties.
• Transactions can occur 24hours per day.
• Businesses have access to millions of customers with internet access.
• Businesses have the ability to gather customers’ information, analyze it and react
accordingly.
• Information can be changed and made available quickly.
• Customers can compare prices quickly & make their choices.
• Feedback can be immediate.
• Manufacturers can buy and sell directly avoiding the cost of middle-men.
• Distribution costs for information (Advertising) are reduced as well as the transport
costs.
• Security is guaranteed since you don’t need to carry physical money

COMPUTER LABORATORY SAFETY AND MAINTENANCE


Computer lab is a place where students and instructors conduct practical application skills such
as programming, creating files & documents etc.
The following factors must be considered when preparing a room as a computer lab;
o Security of computers, its programs and other resources
o Reliability of the source of power
o No. of computers to be installed in the lab
o Maximum no- of users that a lab can accommodate

Computer Literacy

Refers to having the knowledge & understanding about computers and their operations.

OR

Its one’s ability and skills to operate a computer(s) meaningfully.

A person who has knowledge & skills of how to use computers to do some tasks is said to be
computer literate.

The degree of computer literacy varies from one person to another depending on individual
differences basing on knowledge, skills, understanding and ability.

27
Computer Professionals

The following are some of the computer professions or fields that are related to computing.

1. Computer users
2. Computer programmers
3. Data entry clerks
4. Information system managers
5. Database managers
6. Computer engineers
7. Computer scientist
8. Computer analysts
9. Computer designers
10. Website designers
11. Computer instructors, tutors, teachers
12. Network administrators13.
13. Secretaries etc

COMPUTER LAB RULES & REGULATIONS

The following rules must be followed in & around the lab;

• Handle every computer device with maximum care without dropping them.
• Switch on the computer system starting from the wall socket switch, then USB (UPS
–Uninterrupted Power Supply) or a stabilizer and computer itself then other peripheral
devices connected later.
• Always ensure to protect computers from power surge or high voltage by use of UPS
or stabilizer or an inverter.
• Avoid making connections of peripheral devices such as monitors, keyboards,
printers, scanners etc which a computer is already powered/switched on.
• Do not insert in floppy discs, flash discs, CDs & DVD which are suspected to be
having computer viruses & always ensure to scan them before using them in the
computer.
• Avoid exposing computers to direct sun heat. This may cause the expansion of
metallic components like hard disk hence loss of data or information.
• Avoid on and off switching of computer system to prevent untimely damage.
• Always cover the computer with clean piece of cloth or material to prevent them
from effects of dust.
• Avoid entering in the lab with unauthorized objects or materials such as sweater,
forks, bags etc.

28
• Avoid making noise in the lab so as not to inconvenience other lab users.
• Avoid running, jumping, fighting & playing in the computer lab, you may cause
damage to the equipment or injure yourself.
• Never carry any magnet or magnetic object to the lab.
• Ensure that there are fire extinguishers in the lab to control fire in case of fire
outbreaks.
• Always follow the instructions of the teacher or instructor whenever in the lab &
always report problems to the people in charge.
• Avoid carrying food & beverages to the computer room, drinks may accidentally
pour on the components/devices and damage them.

SECURE LAB ENVIRONMENT

The following are some of the areas where lab security measures should be taken to safe guard
computers from damage.

1. PHYSICAL SECURITY MEASURES


2. ELECTRICAL POWER SECURITY MEASURES
3. AIR CONDITIONING
4. SOFTWARE/DATA SECURITY

A. Electrical Power Security Measures


The following measures should be used to safeguard computers from electrical power
problems.
➢ A surge protector is highly recommended in the computer lab to protect the
computers from power surge.
➢ Use the UPS (Uninterruptible Power Supply) fora long term power surge
protection. The UPS also provides temporary power storage for the computer
when the main power goes off.
➢ Avoid running extensions (cables) across the floor of the lab to prevent electric
shock. The lab users should ensure that cables run through the walls or under
woolen carpets.
➢ Don’t over load the electrical system with more computers and accessories than
it can handle. This would result into a constant power problem & even cause fire
outbreaks.
➢ Use stabilizers to prevent the computers from being damaged by high power
voltage. They regulate the amount of power of power needed by the computer.

29
➢ Use woolen carpets to cover the floor of the lab to prevent excessive dust from
affecting computers. This also helps to prevent computer users from electrical
power shock.
➢ Ensure that you provide a standby power supply (substitute) in case the area
does not have a steady power supply e.g. generators, solar, etc.

B. The Physical Security Measures


This refers to the measures taken to protect computer systems, buildings & related
supported infrastructure from fire, thieves & environment hazards. These include the
following;
• A computer lab should be monitored either by a person such as a lab technician
or lab attendant as well as security guards, security camera or a combination of
all the above.
• Installing burglar proofing so as to prevent forceful entry of unauthorized people
in the lab with the intension of stealing the lab items.
• Some large items such as system units, monitors & printers should be fastened
or tied to the desk with strong cable locks.
• They should be protected by strong proximity locks or very powerful locks that
can’t be easily broken. Electronic locks can also be used to lock down the doors
of the lab so that unauthorized persons cannot get access to the lab.
• Put identification codes on all equipment by branding them, putting
identification tags & also labeling them for easy identification once stolen.
• Disable all the floppy flash & disk drives so that unauthorized persons cannot
access your data. This also helps to prevent the storage devices from
transmitting virus into your computer.
• Always scan the computers or any storage device before opening it. This helps to
detect viruses & to remove them.
• Always ensure to install and update your computer anti-virus to allow it perform
effectively.
• Installing lighting systems around the computer premises to enable easy
monitoring of intruders e.g. thieves, robbers & any unauthorized individuals.
• Install the lightening conductors to guard against lightening effects.
• Use burglar alarms in the computer lab to alert against possible intrusions.
• Provide fire extinguishers to the lab to control fire outbreaks.
• Install electric fencing systems to prevent intruders or unauthorized persons
from illegally accessing the lab premises.
• The use of passwords should be ensured to protect user accounts.

30
C. Air Conditioning
Computer equipments easily get damaged with hot environment, dusty environment &
a humid environment. Therefore such conditions can be minimized through the
following ways;
a) Use of air conditioners; this helps to filter the air in the lab and allow the flow of
dust free air in the lab. Air conditioners also help to provide fresh air to the lab
users hence maintaining their conducive atmosphere.
b) The lab should have enough ventilation incase the air conditioners are off so that
the ventilators can provide can provide fresh air.
c) Lab doors & windows should be well located and kept open to provide sufficient
air incase air conditioning and ventilators do not function properly.
d) Where possible, ceilings and wall fans should be installed to supply fresh air in
the computer room.

D. Software/Data Care Security Measures


The most vital part of the computer system is data. In fact data is exposed to a number
of risks and care must be taken to protect them from these risks.
RISKS TO DATA
Data is exposed to the following risks;
-The effect of viruses that may attack the computer system.
-Untimely power breakout before saving the work.
-Accidental breakage of the computer system especially the hard disk.
-Effect of natural disasters e.g. earthquakes, fire outbreaks etc.
-Deletion of data by a user knowingly or unknowingly.
-Formatting a storage disk without backing up
-Effect of corrupt software and un-updated software
-Breakage into the computer system by hackers & crackers.

SECURITY MEASURES TO GUARD AGAINST THESE RISKS


To protect data from being lost the user observe the following;
1. Make backup copies of the data regularly. Make sure that the data is error free
before backing up otherwise you might backup corrupt data.
2. Install strong anti-virus programs to your computer to guard against viruses &
always update them.

31
3. Minimize the number of visitors to your computer as some might be
untrustworthy.
4. Always scan for viruses from storage devices before you open them as some may
carry computer viruses.
5. Save your data regularly since abrupt power cut off can cause loss of unsaved
data.
6. Use UPS, stabilizers and invertors to protect computers from power instabilities.
7. Ensure to run scan disk and defragmenters utility programs to keep your hard
disk drive health & free from crashes.
8. Destroy unwanted copies of data on a hard copy since data is not supposed to be
exposed to unauthorized persons.

LABORATORY SECURITY TOOLS

Examples include;

✓ Fire extinguishers
✓ Burglar alarms
✓ Security cameras
✓ Security lights
✓ Woolen & plastic carpets
✓ Un interruptible Power Supply
✓ Invertors & Stabilizers
✓ Computer locks
✓ Disk drive locks
✓ Burglar proofing
✓ System unit enclosure

SERVICING & MAINTENANCE OF A COMPUTER SYSTEM

SERVICING

It refers to the act (practice) of performing some tasks aimed at keeping your computer & its
systems operating safely & properly.

Caring for micro computer

Like all electronic equipments, computers need to be serviced regularly to maintain their
operability.

Some of the measures that should be taken for safe use of computers are;

32
❖ Switch on your computer hardware system starting from the wall socket, UPS or
stabilizer, computer & then other peripheral devices e.g. the printer.
❖ Avoid making connections when the computer is already powered on e.g. the keyboard,
the mouse, monitor & a printer.
❖ Avoid abrupt switching on & off of the computer system. Use the normal way of
shutting or closing down of all computer programs then shut down the computer.
❖ Place the micro computers in a dusty free environment with good ventilation. Dust
covers should be used to cover the computers from dust.
❖ Micro computers should not be exposed to direct sunlight.
❖ Foods or drinks should not be allowed near the computers.
❖ The computer should be regularly serviced at least a year or more frequently if the
environment is dusty.
❖ Do not open the computer for inside cleaning. This should be handled by a qualified
personnel.
❖ It is a good practice to keep a record of a daily condition in case of computer failure.
❖ The peripheral devices e.g. printers should be serviced regularly.
❖ The floppy disks & CDs used for installation of programs & backups should be kept safely
in disk banks & kept always away from sunlight, dust magnetic medium.
❖ In areas with power fluctuations, it is important either to use a power stabilizer or a UPS
to ensure a steady power supply to a computer system.
❖ *Floppy disks, flashes have to be write protected all the time especially those
installation.
❖ Do not smoke around your computer because tar from cigarettes can accumulate &
cause them to jam & sometimes leads to overheating.
❖ Try utilizing of good virus protection & detection of software to remove malicious virus
programs e.g. using Avila anti-virus & Norton etc.(other antivirus; MacAfee, kaspersky,
arras, smadav).
❖ Run scan disk & defragmenter at least once a month. This helps to remove
fragmentation & system tools in WOS which allows proper arrangement of files hence
easy access.
❖ Do not leave the PC turned off for weeks or months as this can corrupt the good record
of the hard drive which can cause computer failure to boot.
❖ Keep your computer off the floor or under the desk where it can’t be knocked
accidentally.
❖ Never use liquids e.g. water, wines or alcohol directly when cleaning electronic
components e.g. a keyboard, monitor etc. as this may damage the computer.

33
BOOTING OF A COMPUTER
The booting is the process of staring & restarting a computer which involves loading of an
operating system into the memory (RAM).

Types

There are two types of booting namely;

• Cold booting
• Warm booting

Cold Booting

This is the process of turning on a computer after it has been powered off completely.

Warm Booting

This is a method of resetting or restarting a computer that has been already powered on.

A warm boot can be accomplished by pressing the Alt + Ctrl + Delete simultaneously.

Reasons for Restarting Computer systems:

✓ When a computer jams or freezes or hangs up.


✓ Commonly used to recover from errors that occur frequently when using the computer
✓ After installing certain new programs
✓ After installing a new hardware device e.g. printers
✓ After un installing a hardware device
✓ After un installing a software program
✓ When a computer slows down
✓ After changing CMOS or BIOS chip
✓ When a computer has virus

Qn1a) Define the term booting of a computer


b) Briefly explain the steps taken by a computer during cold booting using WOS
2a) Differentiate between cold and soft booting

b) Outline seven reasons for carrying out warm booting

34
c) Write in full as used in booting

i) POST
ii) BIOS
iii) CMOS
iv) CPU
v) RAM

DATA AND INFORMATION


Definition:

Data refers to a collection of raw unprocessed facts or figures, letters and symbols entered into
a computer.

OR

Data refers to any unprocessed, unorganized and meaningless facts entered into a computer
for processing.

Such facts are of little or no meaning until they are put in a more useful format (organized
format).

INFORMATION

Refers to a processed data

OR

Information is a processed is a processed, organized and meaningful fact.

Examples of data and Information

DATA INFORMATION
Letters e.g. a,b,c,d,e,f Words e.g. apple, boy, girl etc.
Words e.g. name, etc Reports, letters, essays
Symbols e.g. ? ,”, !, etc. Mathematical formula e.g.
Numbers e.g.1, 2, 3, 4, 5, 6, 7. 8, 9 , 10. Comments e.g. good, excellent, poor etc.
Musical notes e.g. d.r.m.f.s Music (songs)

35
INFORMATION PROCESSING CYCLE

Definition

Refer to the different stages/steps through which data passes to be transformed into
information.

OR

It refers to the series of input, processing, output and storage activities in a computer.

For data to be processed into information, it has to pass through five stages.

Diagram of information processing cycle


Data Processing
Feeding data Output of information
Data input Processing Information output

Storage

Storage

The Steps/Stages

The five (5) basic steps of information processing cycle include;

1) Collection of data:
This involves capturing or collecting data from their sources and recording onto some
form of media e.g. papers.
Data can be got through questionnaire, Random sampling, observation, Question and
Answer method etc.
2) Preparation of data:
This involves copying, grouping or organizing data collected in a more convenient form
ready for input into the computer. It also involves data verification to establish and
verify the validity of data.
3) Input of data:
Refers to entering or feeding the prepared and verified data onto the computer system
for processing.
4) Processing of data:
This involves manipulating or transforming the input data into information. Data
processing is done by central processing input (CPU) or the processor.

36
5) Output of information:
Refers to displaying or presenting the processed data(information) to the user in a
meaningful format e.g. Letters, Reports, Music, Notes, Memos, Videos etc.
6) Storage of information:
This involves keeping or backing up of data on a storage media e.g. hard disk, CDs, Flash,
DVDs, memory cards etc for future use.

Question

1a) Differentiate between Data and Information

b) Explain briefly the four major steps of information processing cycle.

2a) What is information processing cycle?

b) Briefly describe the activities that take place in the following stages of information processing
cycle

i) Processing stage

ii) Input

iii) Output

iv) Storage

c) Explain briefly what happens during collection and preparation of data.

37
COMPUTER SOFTWARE

Computer software refers to the collection of computer programs or instructions that help the
computer to perform various tasks.
OR
Software refers to the collection of computer programs installed in a computer so as to perform
specific functions.

Categories of Computer Software

Computer software is broadly divided into categories namely;


-System Software
-Application Software

1. SYSTEM SOFTWARE
This refers to programs that control or manage the operating of the computer & its devices.
It is a program that serves as the interface between the user, application software & the
hardware components.
The system software controls the way a computer & its devices operate.
Types of System Software
These include;
-Operating system
-Utility programs
-Programming languages & Processors.

1- Operating System
Operating system software refers to a type of system software that controls & manages the
overall operation of the computer system.
OR
It is system software that coordinates the general activities of the computer system. The
operating system acts as an interface for application software, user & hardware devices.

Groups of Operating System Software


The Operating system is grouped according to the state of a computer system i.e. either
networked or not networked.
a)Operating System for Networked computers.
b)Operating System for Standalone Computers (not networked)

38
Examples of Operating System software (OS)
a)For Networked Computers
-Windows NT
-Windows 2000 server
-Windows XP
-Windows 7
-Netware
-Linux
NB: On phones which have -Android Operating System
-WOS
b)Standalone Computers (Not Networked)
-Microsoft windows XP professional
-Windows ME
-Windows Dark Edition
-Windows 7, Windows 8
-Windows 95
-Unix-Solaris
-Mac Operating System (Macintosh Operating System)-PDA operating system -DOS

FUNCTIONS OF OPERATING SYSTEM

Operating system plays major roles in a computer system such as;


1. It acts as an interface between the user, hardware &
application programs used on a computer.
2. It boots the computer system in order to load programs.
3. It schedules & loads application programs (tasks) from
the memory (RAM) to the processor.
4. It manages the storage media e.g. hard disks, floppies
etc.
5. It manages the computer memory space (RAM)
6. It monitors (supervises) the system performance, by
reading all activities taking place in a computer.
7. It controls the hardware devices of the computer i.e. by
allocating tasks to appropriate devices.
8. It provides system security to protect the files & other
programs in the computer through use of passwords, firewalls etc.
9. It helps to configure hardware devices e.g. flash disks,
mouse, keyboards, printers etc i.e. it supports plug & play devices.
10. It communicates with the user allowing the user to know
what is happening in the computer.
11. It helps in provision of error corrections routines.
12. It spools & sends documents to the printer for printing.

39
13. It provides a complete track record of what is taking
place in a computer by keeping system analog.
14. It helps in network connectivity i.e. connecting a
computer to the network.
QUESTIONS
1a) Define the term “operating system” software.
b) State 8 functions of operating systems.
c)List five examples of operating system that support connectivity to the network and 7
operating system for standalone PCs.

APPLICATION PROGRAMS / SOFTWARE


Application software refers to programs that perform specific tasks for users e.g. in typing,
games etc.
OR
These are software programs that help a user perform a particular desired task.
Categories of Application software
Application programs fall into two categories namely;
a) Off the shelf/General purpose software
b) Customized /Tailored made /Special purpose software

1. OFF-THE SHELF (GENERAL PURPOSE) SOFTWARE


These are commercially (public) made programs designed to serve a variety of purposes & solve
needs of many users e.g. Word Processors, Databases, Spreadsheet, Power point, Presentation,
Communication, entertainment software etc.

2. CUSTOMISED / TAILOR MADE (SPECIAL PURPOSE)


SOFTWARE
These are programs designed or developed on request to satisfy specific needs of an
organization or an individual.
With custom made software, the user makes requests to a developer to develop a program to
meet the specific needs of the user or organization e.g. Banks, schools, individuals, churches,
NGO, business

40
COMPUTER VIRUSES

A computer virus is program (software) designed especially to damage the integrity of other
programs (software) or cause irregular behaviors.

A virus is designed to carry out two major tasks;

1. To replicate it’s self from one computer to another.

2. It is designed to destroy other files and programs on the computer in order to make the
computer malfunction. At the end of the day the outcome is loss of vital information in
system crashes.

Types of viruses

Parasitic virus - This virus attaches itself to a program slowly eating it up until it totally
stops working. Initially the program works hardly until it stops totally.

Stealth virus - This virus is designed to hide from ant-virus software and can have any
effect which might be parasitic or polymorphic.

Boot sector virus - This is a virus that attacks and destroys the boot files and makes the
computer start with difficulty at worse fail to start at all.

Polymorphic virus - This virus changes or mutates itself and attacks different areas it may be
parasitic today, boot sector tomorrow etc.

41
RISKS / EFFECTS THAT MIGHT BE POSED BY VIRUSES

Replication

One of the primary purposes of a computer virus is to infect as many other systems as possible.
In order to do this, the virus replicates itself by attaching to other files on your computer. A
common method of spreading to other computers is by sending out email messages with a
infected attachments to everyone in your address book. If you find that the free space on your
computer is rapidly decreasing or people are receiving infected email from you, it is very
possible that your computer has a virus.

Reduced Computer Performance

While computers can become slower over time due to the amount of available hard drive space
decreasing, it is also possible for a virus to drastically reduce performance. The boot time of an
infected computer is often much slower than usual and programs take much longer to launch
as well. You might also notice an increase in crashes and freezes when working with the
infected computer. It is also not uncommon for the infected computer to restart unexpectedly
or display strange error messages.

Corrupted Data

The data on a computer that is infected by a virus often becomes corrupted. This is either
through the virus attaching itself to files which renders these files unusable in the process or by
maliciously destroying the data. Files or folders are either deleted outright or become
inaccessible. When attempting to launch applications, you might receive error messages about
the file not being

found or not being valid. In some cases, this can lead to the operating system not starting due
to missing or corrupted files.

Unusual Browser Activity

Once your computer is infected, the virus might also change your browser startup page to a
website that contains other malicious code. The virus also sometimes blocks access to security
websites with updates or information on how to remove it. These types of viruses often
attempt to install further malware on your computer by displaying links – disguised as system
messages – to software that will purportedly clean the infection.

In summary,computer virus can have many effects, such as deleting or corrupting files,
replicating itself, affecting how programs operate or moving files.

42
affecting how programs operate or moving files.

Source of viruses

1. Contact with infected computers- this is through sharing of viral infected diskettes and other
storage devices from the sick computer to those not yet affected.

2. Pirated software- The use of non licensed software may cause harm because it will be
contaminated with malicious code that could damage the system.

3. Games- Many games that are pirated or contain corrupt code that may damage to systems
programs and since every one wishes to use them, they spread very first hence causing
harm to many systems.

4. Freeware and shareware- Programs normally used got from bulletin boards systems that is
via the internet and normally require one to pay a fee that goes directly to the author or
are free but require your e-mail sometimes also contains viruses that might be
intentional or otherwise.

5. Updates of software programs via the internet

Since networks link many computers they serve as good centers of distribution for
viruses so normally when updates of programs take place via a network it might contain
some malicious code that may damage the system.

Virus symptoms

1. Unfamiliar graphics or quizzical messages appearing on the screen.


2. Programs taking longer than usual to load.
3. Disk accessing seeming excessive for simple tasks.
4. Unusual message occurring more frequently.
5. Less memory available from usual.
6. Programs/files mysteriously disappearing.
7. Changing of disk volumes ids.
NB. These symptoms however may not necessarily be viruses it could be another system
malfunction.

43
VIRUS DETECTION AND REMOVAL

The center piece to viral detection and removal is ant viral software.

This is software designed to detect and remove viruses when detected in a computer
system.

- It is normally advisable to first scan all storage devices with antivirus software before
accessing them.

These are some of the common anti-virus software on the market:

Avira, Avast, Nod32, Kaspersky, AVG, Bit defender, Trend micro, Norton, McAfee, Panda,
F-secure.

- Reject the installation of non licensed software on your computer.

- Make sure you are running an up to date anti-virus software on your system.

- Sharing of storage devices like diskettes should be avoided or controlled.

44
INTERNET & W.W.W

INTRODUCTION TO INTERNET
The internet is the worldwide connection of network linked together.
OR
It is a global collection of interconnected computer network that use standard protocol (TCP/IP)
TCP- Transmission Control Protocol
IP- Internet Protocol
NETWORK
It is a collection of computers and other devices connected together to share resources or
communication with each other
HISTORY OF THE INTERNET
It started as a networking project called ARPANET by the Advanced Research Agencies (ARPA)
of Pentagon in USA.
ARPA NET
The ARPA NET became functional in September 1969 linking scientific and academic
researchers in US. However with the main aim of sharing military information.
In 1986, the National Science Foundation (NSF) connected huge network of 5super computers,
centers called NSF network to ARPANET and thus internet.
NSF NET was the major backbone network on the internet till 1995 when it became a global
research network.

Requirements for Internet connectivity


The basic requirements needed to connect the internet include;
1. Computer machine
2. Modem
3. Internet Service Provider (ISP)
4. Network Internet Cord (NIC)
5. Browser

IMPLICATIONS OF USING INTERNET SERVICES

• You can communicate with other people around the world instantly e.g.
through emails, chartrooms, video conferencing, Face booking and Skype.
• Sharing of information; you can share information with other people around
the globe easily, fast & cheaply.
• Access to news: You can get the latest news, first news around the world
immediately e.g. magazines, newspapers, articles, Television & radio news.
• Searching for job opportunities around the world, advertise jobs on-line. You
can apply, conduct interviews & even work on-line, variety of products are advertized
on-line. It’s cheap, faster & worldwide form of advertisement.
• Entertainment:It provides a lot of entertainment to people e.g. videos, audios,
sports, etc.

45
• Online education variety of resourceful educational materials can be accessed
online. You can carry out any form of research online e.g. conduct online lessons.
• Research information: A lot of information is available online. You can carry
out any form of information online e.g. local & international news, weather news.
• Online shopping; business transactions can be carried out online e.g. by
buying & selling of products, ordering of goods etc.
• Reliability & flexibility; information on internet is readily available &up to date.
Information on internet is also kept online achieves to accessing fast
information/resources.
• Electronic transfer of money & online banking services are provided easily,
cheaply & faster means of financial transactions can be made.
• Storage of data theft and other personnel data can be kept online.

Disadvantages of using internet services


a) Easy spread of computer viruses; internet is the most popular & fastest way of
virus spreading in computers.
b) Security threats e.g. hackers, crackers often take advantage of internet to hack
into computers & corrupt data or cause malicious damage to computer systems.
c) Immorality (Moral Degeneration); many internet websites publish many
immoral material e.g. pornographic videos, clips etc which are unhealthy for society
wellbeing.
d) Inauthentic & inaccurate information; some information online is not valued
or updated thus wrong information can be obtained online depending on the source.
e) Time wastage; some people waste a lot of time in chatting, Face booking,
playing online games, watching videos than doing productive work.
f) Language barrier; most of the information on internet is available in English &
few other international languages which many people are not familiar with.
g) Internet services such as online education, video conferencing can be very
costly & require sufficient skills which many users lack.
h) It is an ideal platform (medium) for crimes e.g. stealing,forging, money
laundering, software piracy, conning by hackers, crackers.

46
DATA COMMUNICATIONS AND COMPUTER NETWORKS

A computer network is a system where computers are interlinked together with the sole aim of
sharing resources.

A computer network is formed whenever more than one computer is connected together.

A computer network normally has one computer reserved as a server or mother of all the
computers.

Types of networks
Computer networks are generally classified into:

 Local Area Network (LAN)

 Metropolitan Area Network (MAN)

 Wide Area Network (WAN)

Local Area Network (LAN)

They are formed whenever computers are connected together in a small geographical area
e.g. in buildings or floors) within a radius of 10m to 3km, they are characterized by low cost
and increased or high data rates. They high rate is 10 - 100mbps and the low rate is1-
10mbps.

Metropolitan Area Network (MAN)

This covers a medium a size geographical area with in radius of 10km. They have data rates
of 100mbps and above and they are more expensive than Local Area Networks. They usually
cover big towns or cities and are expensive because they require more labour, cables and
other equipment.

Wide Area Network (WAN)

These cover unlimited geographical area e.g. across states, a country or the entire world.
They are expensive to build and have low data rates.

The High data rates are 100mbps and the low data rates are 9.6kbps.

Intranet and Extranet

47
An intranet is a network that is restricted to a few workgroups say within a company and
is not open to the public.

An extranet is a network that is open or can be accessed by both parties in an organizational


setting and outside it is not highly restricted.

Network Topology

This refers to the physical layout of cables, computers and other equipment that
make up a computer network.

Bus Topology, Star Network Topology, Ring Network Topology

Components of a Network

Any network is supposed to have the following components:

1.computers

2.Software which includes:- Operating systems, Network software etc.

3.Media: this is the channel through which the information is carried across the
network, which include Cables like Twisted pair, Coaxial cable, Fibre optics etc.

Network Models

Are logically divided into two categories i.e.

 Client-server based.

• Peer to peer

PEER TO PEER NETWORK

In this type of network there is no dedicated server or hierarchy among the network
computers.

All the computers are equal and therefore are known as peers. Normally each computer act as
client as well as server.

No computer acts the administrator of the system.

48
Client – Server network

This unlike the peer – peer network, it works with more computers, has central controller for all
the other computers and works in a big environment.

A computer is dedicated as server quickly services the requests from the network clients and
ensures that the security of data is not abused or compromised.

Server networks have been a model of networking computers in organizations to date.

Hybrid Network topology

This is a topology that combines two or more topologies for example a star-bus or ring-bus or a
combination of all the topologies to make one network.

Network Devices

1.MODEM (wire and Wireless) (Modulation Demodulation) – this is a device that converts
digital signals from the computer into analog so that they can travel on a communication
network and then back to digital so that they can be received by the computer.

2.HUB- Is a network device that is used to extend a network to several workstations, it


works like a power extension.

3.MULTIPLEX – Is the change of one signal to pass in many channels and the opposite is to

De-multiplex the change of many signals to pass in one channel.

(Multiplexer and De-multiplexer are the devices that perform that kind of operation)

34ROUTER (wire and wireless) - Is a network device that makes sure that the data
transmitted over the network reaches the destination it was meant.

Routers are normally used to join network of different topologies say joining a ring to
a token or bus. They are used in big networks.

Merits and Demerits of Computer Networking

Merits

 Easy and quick sharing data of data and information via networks.

 Peripheral sharing is made easy and cost efficient like sharing of printers, scanners etc.

49
 Networks enhance the corporate image of organizations proves the organization serious
and market the organization.

 Networks promote research that through the internet.

 Communication is efficient and very fast through E-mail, SMS, and GSM technology.

 It provides control of the firms activities since the network can be monitored to see who
does what and when to avoid compromises.(It provides administration).

Demerits

 Network hacking can cause serious loss to the organization if un authorized access goes
to the wrong hands.

 Jam in the machines can also cause loss to institutions for examples in
telecommunications were people make free calls or break down in the systems causing
leading to loss of customers.

 Lack of privacy through network tapping.

 Addiction for example on the internet.

 Promotions of immorality through things like pornography for the under aged.

Easily prone to viruses and very good avenues for spreading viruses

50
END

51

You might also like