Professional Documents
Culture Documents
Definition;
OR
A computer is an automatic electronic device that accepts data input, stores it, processes it &
outputs the result in desired format.
A computer system is made of physical Hardware & Software programmers, users and data.
i) Data input
ii) Data storage
iii) Data processing
iv) Information outputting
v) Communication
X-tics of Computers
For a device to be called a computer, it must have some or all the following X-tics
1. Speed
Computers are quite fast in their operation and work at amazingly high speeds (Measured in
Hertz (Hz))
2. Accuracy
Computers are so accurate that they hardly make mistakes. In fact they detect mistakes made
by users. It therefore follows that if wrong data is fed in a computer, wrong results are
expected out hence a common saying that “Garbage in Garbage Out” (GIGO).
3. Storage
4. delligence
1
This is the ability of a computer to perform the same task or routine over and over again for a
long period of time without getting tired, bored or fatigue. E.g. Industrial robots used in car
assemblies, the ATM machines of banks, and the telecommunication company computers etc.
5. Automation.
Computers can also work automatically; they do not need any supervision or monitoring to
perform tasks. Computers use programs to perform automatically.
This is the ability of a computer to perform wide range of tasks given i.e. calculation of
numbers, typing of texts, playing games, surfing the Net, down loading etc.
7. Artificial Intelligence
This is the ability of a computer to respond to requests given to them by people /users. This is
accomplished by use of programs or instructions installed in them so as to make decisions and
functions in a required way. Computers with artificial intelligence can perform almost all tasks
human being does.eg Industrial Robot computers, Super computers like NASA in US.
i) Computers make communication very easy i.e. receiving & sending information
around the world very quickly.
ii) Tasks can be completed faster because computers work at a very higher speed.
iii) Computers can process large amount of data & generate error free results provided
data entered is correct i.e. computers are accurate in performing tasks.
iv) Computers help in storage of large volumes of data for future use.
v) Computers are highly reliable and enable us to produce consistent results.
vi) With computers, efficiency and productivity can be increased and maintained.
vii) The running cost in an organization or business or business becomes cheaper or low
in a long run when using computers to do work.
viii) Computers are very automatic hence tasks can be done and completed with little or
no human intervention.
ix) Overall security can be achieved by use of passwords to protect data, CCTV cameras
to protect some areas.
x) Computers are flexible therefore new changes can easily be made to data or
information when deemed necessary.
xi) Computers are known to be best devices for entertainment.
2
DISADVANTAGES
i) The initial cost of purchasing/buying computers can be very high and also acquiring
related programs used in them thus making them very expensive.
ii) Extra costs are normally required in maintaining the computer systems as well as
training the users.
iii) Computers can only be used by people who are computer literate thus illiterate
people are unflavored to use computers.
iv) Face to face interactions are limited especially when using computers for
communication and Ecommerce.
v) Some information obtained from computer internet may be inaccurate, false,
unauthentic or not up to date.
vi) Transmission of computer viruses from one computer to another can result into
massive loss of vital information of a person or organization.
vii) Computers create/promote moral degeneration (immorality) by exposing people to
pornographic materials such as pictures, videos, audio unhealthy to human moral
behavior.
viii) Over using computers without protecting screen glares (antiglare screens) or eye
glasses can lead to eye defects.
ix) Computers promote crime rate and frauds (cheating).
x) They are being used to steal Banks, forge documents like receipts, Reports,
Certificates, Tickets, etc.
xi) Computers highly rely on electricity for operation therefore absence of power
renders them nearly useless or non-functional.
xii) Computer devices are not degradable and therefore
Some countries deliberately use computer to promote insecurity. E.g. Countries use
computers to set or launch missiles, atomic bombs, Nuclear weapons/tools.
3
INTRODUCTION TO HARDWARE AND SOFTWARE
Hardware
These are the physical or tangible parts of the computer. Which include things like system unit,
keyboards, mouse etc.
The most common hardware parts of a desktop computer system include the following;
1-Keyboard
Allows a user to enter data, instructions or commands. A keyboard is mainly used to type texts
in a computer. It has keys or buttons with letters, symbols and Numbers.
2-Mouse
Is a small device used to point & select items on a computer screen. It moves the pointer and
directs the cursor on the screen. A mouse is used for clicking, pointing, Dragging and making
selections.
3-Monitor
It displays information to the user in visual form (softcopy) information. The portion of monitor
that displays information is called the screen. Monitor allows you to see what the computer is
processing and activities taking place inside the computers. Two common types of monitors
include *CRT monitors and *LCD monitors.
This is the core of computer system. Usually it is a rectangular box inside which many
electronic components that helps in processing information. The most important component
inside the system unit is the CPU –Central Processing Unit also called the brain of a computer.
The system case provides protection to the internal components of the computer.
5-Printer
It helps to output information in form of hardcopy on a paper medium. Main types of printers
include;
• LaserJet printers
• Inkjet printers
• Thermal printers
4
• Dot matrix printers
6-Speakers
They are used to output sound. They may be built into the system unit or connected with
cables speakers that allow you to listen to audios such as music and other sound effects.
7 -C.P.U
It’s the main component which is responsible for processing data into information.
RAM is the main memory of a computer used for temporary storage of data during operation.
Drives are used to read and write data on discs such as CDs and DVD.
10-FLOPPY DRIVE
11-Motherboard
It is used to regulate the amount of power consumed by a computer. It converts a.c power
supply into d.c power supply so that computers can safely it.
It is a metallic drive/device used for permanent storage of files & programs in the computer
5
They are required to convert binary codes from the CPU to appropriate image and sound that
can be produced on a monitor.
These are connection interfaces found inside the computer system unit and are used for
inserting various cards such as Sound cards, Video cards, Network Cards and RAM or eternal
deices like keyboards, mouse monitor, flash disks, speakers etc.
16-BUSES
These are electronic channels or pathways through which information or data is transmitted or
flows.
CATEGORIES OF HARDWARE
All the above internal & external hardware devices can be grouped into the following:
6
4. Storage hardware devices
1. Mouse – Is the most widely used pointing device with personal computers (PCs).
It is used to control the movement of the pointer & cursor on the screen.
It is also used for quick selection of points on the Graphical User Interface (GUI).
2. Touch pad- Is a small flat rectangular pointing device that is sensitive to pressure in
motion.
When you touch this pad, it responds & makes the pointer to the direction specified.
They are mostly used on laptops.
3. Track ball- Is an input device that is mostly used in notebooks or laptop computers
instead of a mouse.
It has a ball which is half inserted on top & by moving the fingers on the ball pointer can
be moved.
Since the whole device is not moved, a track ball requires less desktop space than a
mouse.
4. Joystick- It is also a pointing device which is used to move a cursor on a monitor screen.
It is a stick having a spherical ball at both its lower & upper ends.
The function of a joystick is similar to that of a mouse & it is mainly used when playing
computer games & also when in Computer Aided Designing (CAD).
5. Touch screen- It is a pointing device which is sensitive through which data can be input
into a computer just by touching it with a finger or its pencil.
They are often used with information works e.g. Banks, Military, Museums etc.
They are also used to enter data in touch screen mobile phones, ATM, security devices,
laptops, TV systems etc.
6. Light pen- It is a pointing device which is smaller to a pen. It is used to select a displayed
menu item or write text & draw pictures on the monitor screen.
When a light pen’s tip is moved over the monitor screen & the pen bottom is pressed,
its photocell sensing element detects the screen location & sends the corresponding
signal to the CPU.
7
Keyboard
Primary input device used for entering text data into a computer. It contains keys with
different characters e.g. letters, numbers, symbols & modifier keys which help in data
entry into the computer.
Barcode reader
It is a text input device that uses a laser beam to read bar codes on products.
This information is interpreted as text and displayed on the screen. Barcode readers are
widely used in supermarkets, libraries, shops, departmental stores, factories to read bar
codes on manufactured products like books, pens, clothes, drinks, snacks etc.
Digital Camera
It’s used for capturing digital photographs and images which are then downloaded into a
computer.
There is need to buy a film since they record digital images on memories.
Some digital cameras are used for surveillance e.g. the Circuit Controlled television Cameras
(CCTV) for taking pictures of over speeding vehicles.
Microphone
Is an input device that allows the user to speak & enter sound data into the computer.
They only help capture and feed sound (audio) related data.
The keyboard is a primary input device used to enter or feed data into the computer for
processing.
A keyboard contains keys (buttons) that a user presses to allow data entry into a computer.
8
THE MOUSE
The mouse has four major parts namely;
1. The left button
2. The Right button
3. The scroll button
4. Underside button/ball
Underside ball rotates in different directions that in turn move the pointer.
Some mouse do not have underside balls but instead use laser light to move the pointer.
OUTPUT DEVICES
refers to devices that present information e.g. text, graphs and videos to the users.
A softcopy refers to the information displayed by an output device in an intangible form e.g.
information displayed by monitors, projectors, plasma screens and gas plasma screens.
OR
A softcopy is the information stored on the storage media e.g. CDs, DVDs, hard disks, flash disks
etc.
They include;
-Smart boards
-Terminals
-Light emitting diode screens
-Gas plasma screens
-Projector
-Monitors
FAX MACHINE
It is an output device that transmits & receives documents over telephone lines.
Documents sent or received via fax machines are called Fax.
.
BUZZER
It is an output device used in microwave ovens.
MOTOR
It is an electrical device used in conversion of electrical energy into mechanical energy.
They are widely used in running industries, running turbines.
COMPUTER MONITORS
It refers to the common output device used to display information from the computer.
9
Information displayed by a monitor is intangible and it is often called Softcopy Information.
Monitors can display information in either one color or more than one color.
Monitors that display information in one color are called Monochrome monitors while those
that display in many colors are called Graphic or Colored monitors.
1. PRINTERS
It refers to output device that produces text and graphics on the physical medium such as a
paper.
Printed information produced by printers is often called a hard copy.
CATEGORIES/GROUPS OF PRINTERS
Printers can be grouped into two namely;
Impact printers
Non-Impact printers
❖ IMPACT PRINTERS
These are printers that form characters, graphics or information on a piece of paper by the
print mechanism physically striking against an ink ribbon that is in contact with the paper.
Examples of impact printers include;
1. Dot matrix printer
2. Line printer
3. Character printer
➢ DOT MATRIX PRINTER
It is an impact printer that produces images by the print mechanism physically striking against
the paper.
Their speed is slow in printing and its speed is measured in terms of characters per second
(CPS).
➢ LINE PRINTERS
These have a higher speed than dot matrix printers.
It is an impact printer that can print an entire line of text at once.
Its speed is measured in terms of number of lines per minute.
Impact printers are generally very noisy & slow in printing. They have a low print quality.
However they can withstand a dusty environment and can print multiple papers at once.
❖ NON-IMPACT PRINTERS
These are printers that produce information (text and graphics) on a piece of paper without the
print mechanism physically striking or coming into contact with the paper (Print media).
With non-impact printers, there is no physical contact between the printing mechanism & the
paper.
10
Examples of non-impact printers include;
1. Thermal printer
2. Ink jet printer
3. Laser jet printer
Others include;
-The Daisy Wheel
-Braille
-Canon Printers
-Graphics
PLOTTER
A plotter is a sophisticated printer used to produce large quality drawing that can be very large
in size.
This printer can handle papers with of over 60inches and are used to produce drawings such as
blue-prints, maps, circuit diagrams, large adverts etc.
-Speakers
-Headsets
STORAGE DEVICES
These are devices that record & access information to & from the storage media.
Examples of storage media;
-Hard disk
-Tape
-Compact Disc (CDs)
-Digital Versatile Disk (DVDs)
-Video Compact Disk (VCDs)
-Hard disk
-Floppy disk
-Memory Cards
-Zip disks
-Flash disk
11
This is the process of transferring data or information from a storage media to a computer
memory e.g. from a CD to computer, from a flash disk to a computer.
Writing is the process of transferring data or information from the computer memory to a
storage media e.g. burning a song from a computer to a CD, loading Video files from a
computer to a flash.
DIFFERENCES BETWEEN SECONDARY & PRIMARY STORAGE MEDIA
Secondary Primary
1.It stores data in a relatively permanent form Stores data in a relatively temporary form
2. They are non-volatile i.e. cannot lose data They are volatile i.e. immediately lose data if
when power goes off or switched off. power is switched off.
3.They have larger storage capacities Have relatively smaller capacities of storage
4. They are more portable & can be moved They are normally fixed in computers less
within case e.g. flash disk. portable e.g. RAM
5.They have high access time than the primary Have low access time i.e. it takes long minutes
storage media i.e. it is very fast to record data to record data.
12
PROCESSING HARDWARE DEVICES
Control Unit
The control unit directs & coordinates most of the operations in the computer.
1. ALU
2.
The ALU specifically performs the arithmetic, logical & comparison operations.
Arithmetic operations include; Addition, Subtraction, Multiplication & Division.
Comparison operations include; comparing one data item to another & determine whether it is
greater than, less than, equal (=) to the other.
Logical operations work conditions & logical operations such as AND, OR, NOT, IF etc.
13
3. Register
This is a high speed storage location in the CPU used to temporarily hold data & instructions
during processing.
4. System Clock
5.
It controls how fast all the operations within a computer take place.
The system clock generates regular electronic pulses that set the operating pace of components
in the system unit.
The speed at which the processor or executes instructions is called the clock speed / clock rate
measured in Mega hertz (MHz or (gigahertz)
14
THE WORLD OF ICTS
Definition of key terms
OR
It also refers to the combination of computers and communication technologies to process data
into information. It as well involves use of devices such as computers, phones, satellites,
printers etc.
ICT involves the use of various devices for creating, storage, disseminating, communication &
managing the data/information.
Examples of ICT devices (tools) include;
15
IMPLICATIONS OF USING ICT
❖ In Education Sectors:
The following are the advantages (Positive impacts) and disadvantages (Negative impacts) of
using ICT in the education sector.
Advantages
• CAI & CAL packages that usually maintain multimedia effects e.g. Edutainment make
learning more interesting and interactive.
• Students can learn by themselves even if the teacher is not around or available.
• Students can learn and proceed by themselves or on their own.
• Students can get their results or feedback immediately after they have sat for
exams/tests as questions can easily be marked e.g. OMR to mark objectives.
• They are rich educational sources on the internet that students can obtain for
research.
• Teachers can present subjects matter and explain abstract concepts more clearly
with multimedia software and slide show effects (Power Point).
• Teachers can show experiments that are difficult to perform or dangerous in nature
through simulation software.
• Helps to keep or store information of students, teachers & staff.
• Provide leisure or entertainment for students & school staff.
• Helps to save time and improve efficiency in school activities e.g. typing exams,
tests, Reports, Letters etc.
• Computers are very good tools needed for communication (delivery of information)
fast and over large geographical areas.
Disadvantages
• Face to face interactions between teachers & students may be reduced yet many
students find it difficult or hard to understand concepts without teachers’ explanation.
• Students can only follow what the computer aided learning packages are predefined
to offer.
• Students may not be well versed with the system and this may limit them from
learning.
• Students may develop tendencies of dodging lessons with view of self learning,
research and yet computer information may not be explained in depth or not clear.
• The system may not be applicable to some disadvantaged students e.g. disable
16
• Loss of jobs when tasks that could be done by seven secretaries are being done by
only one person.
• Data loss due to viruses may cause serious damage in the Education
sector/institution.
• Not all the materials on internet resources are valid and up to date therefore the
teacher needs to guide the students on what materials to access and use.
• Instead of suffering and searching for educational resources, students may end up
enjoying and watching uneducative pornography films, pictures, audios, videos etc.
• Computers are expensive to buy and in addition they are very costly to maintain.
• This increases total expenses on using computers in the educational sector.
• Computers are power dependent, absence of power or electricity renders them
useless.
• Over reliance by students on using computers narrows down their thinking &
reasoning capabilities of logic and math.
• Over use of computers have side effects such as causing sight defects, backache,
neck & arm strains.
❖ In Business Sector:
Advantages (Pros)
17
• Can be very time saving and convenient e.g. when using ATM, Electronic Fund
Transfer Point of Sales (EFTPOS) and e-money for conducting transactions.
Disadvantages (Cons)
• The initial cost of buying ICT devices for business and their maintenance cost can be
very high (expensive).
• Mechanical failures in the ICT system can lead to massive loss to the business e.g.
break down of server computer, Network failure etc.
• ICT systems can only be used conveniently in places with sufficient & steady power
supply.
• Many customers are still not comfortable with natural occurrencese.g.landslides,
powerful winds, Earthquakes.
• They are used in measuring the of ocean currents, depth of seas and oceans to
provide information to people.
• They have hazardous effect on the environment through emission of
electromagnetic radiation eg X-rays, gamma rays, cathode rays etc which are dangerous
to human and plant life.
• They promote environmental degradation such as swamp reclamation,
deforestation for installing ICT tools like masts, stations etc.
• They pollute the environment through noise, vibration, heavy smoke, emissions etc.
• They are not renewable or biodegradable and therefore affect the water cycle of the
land.
Positive;
18
• Government uses ICT tools for delivering services to the people eg paying salaries,
advertising jobs, make announcements etc.
• ICT is used when drafting and preparing the National budget through the ministry of
finance.
• They permit/allow voters to closely monitor and access the effectiveness of their
members or representatives in parliament through watching them on TVs, radio shows
(talks) where they can express their views.
• They are used as media to provide information to the citizens eg Presidential
address to the Nation, emergency situations etc.
• They play a vital role in conducting National exercises such as population census,
Birthrate/registration, recruitment etc in the country.
• ICT tools are used to monitor National security through the intelligence department
the police, the military & security Bureaus e.g. FBI in USA.
• They are very usually in knowing the past, present and predicting the future political
trends of the country or the world.
• The government can use ICTs for strengthening its relationship with other
governments around the world.
• Political donations from donor countries are sent & received via electronic means.
Negatives (Disadvantages)
19
APPLICATIONS OF ICTs (USES)
ICT is used in a number of fields to perform many different tasks. Such fields include; Business,
Home, Education ,Health, Security, Politics and governance, Leisure and Entertainment,
Industries, Scientific research, offices Banking, Communication and many more.
• Learners can get their results immediately after doing some assignments or tasks.
• The teacher (instructor) can present subject matter and explain abstract or difficult
questions or concepts more clearly with multi-media S/W.
• Teachers /Instructor can show experiment which is dangerous or difficult to perform
physically through the use of simultaneous S/W programs.
• Advanced instructions can be given to learners more appropriately especially in areas
where the teacher may not be well versed with.
• Computers are used for online education (E-learning) good for distance learning.
• Computers are used to store large volumes of data or information in Education Sectors
e.g. in schools, Colleges, Universities etc.
• Computer projectors are used in many educational institutions to facilitate teaching
where the audience is large.
• Computers give practical training skills to generate income for self sustenance to
students, teachers, administrators etc.
• They are used to conduct or to carry out research, projects by learners, teachers,
scientists, and many others.
• Computers can be used to promote social interaction in the educational field through
the use of services such as Face book, Twitter, Whatsapp.
20
A. APPLICATION OF COMPUTERS AT HOME
• At home, computers can be used to pay domestic bills e.g. water bills, Electricity bills,
T.V bills, etc.Computers are useful to do domestic work e.g. washing, domestic
apparatus, monitoring babies, elderly, disabled etc.
• They are used to provide home entertainment e.g. games, playing music, audios etc.
• They are used for budgeting & personal financial management.
• Used for accessing and listening to the news about daily affairs of the society.
• They are used for communication by family members.
• At home it can be used to carry out personal research e.g. on social/political affairs.
• APPLICATION IN OFFICES
• For creating memos, letters, forms and reports etc.
• To create pay roll of or for employees, prepare income and expenditure statement
and balance books. Present project and proposals using presentation software.
• For communication with other employees or offices such as through calls, fax mails,
emails, and video conferencing, telegrams etc.
• Used for proper data management of the office activities e.g. using the Data
management system (DBMS).
• Used for telecommuting i.e. where employees can do official works away from
physical work place. This helps to save time, costs & overcome fatigue etc.
• Useful in keeping office records.
• Used to provide security to offices and businesses e.g. using CCTV cameras for
surveillance.
• Useful in creating official websites for an office or business to advertise products &
services and conduct official E-commerce.
21
• They provide access to instant messaging when using internet services.
• They facilitate email services i.e. sending & receiving of e-mails.
• They are used for making direct calls e.g. using phones, personal computers (PCs),
radio calls.
• They are used for chatting online or on internet via chat room services.
• Computers are used for sending fax mails using fax machines.
• Used for sending telegrams using telegram machines.
• Used for conducting discussion forums with friends.
22
• To generate business reports, memos, forms and letters.
• Banking institutions use ICT for printing Bank notes, coins, cheques.
• They are used in electronic money transfer to send and receive money quickly and
on time.
• Bank ATM out letsis used to withdraw and deposit cash, cheque thus provide
convenience and save time.
• The EFT and e-money terminals can be used to conduct transactions without
involving physical money item.
• It is used to create business websites to advertise products & services and conduct
Ecommerce.
• ICT devices such as MICR are used to read bank cheques, Barcode readers for
reading codes on products.00000/4
F. APPLICATION IN INDUSTRIES
Robots are best used for performing repetitive tasks, lifting heavy equipments in the industries
and doing tasks that require high degree of precision and accuracy. They also control the
running of the industry.
They are used for quality control measure e.g. by use of Computer Aided Design (CAD) and
Computer Aided Manufacturing (CAM).
Computers are used for industrial, Engineering, Architectural & Scientific drawings.
Computers are used in car assemblies for assembling and testing components.
G. APPLICATION IN RESEARCH
23
H. APPLICATION IN POLITICS& GOVERNANCE
For national planning and budgeting requires the usage of ICT especially at the ministry of
Finance, planning & economic planning.
Discoveries and exploitation of the natural resources e.g. oil, gold etc. requires the use of ICTs.
Sector planning e.g. education also heavily rely on the usage of ICT e.g. for keeping its records
for its employees.
ICT is used in civil aviation to monitor and find schedule flights at airports & airfields.
For communication both within and outside the nation by people and government officials.
ICT is used for national sector monitoring and spying on internal & foreign strang ers (terrorism).
ICT is used in national & private industrial manufacturing firms e.g. food processing, textiles,
chemicals and weapon manufacturing industries.
The government uses ICT to provide information and get feedback from citizens about its
program and daily happening in the country.
Used in sensitizing voters, register voters, voting, count votes and announce its results and
political campaigns etc.
I. APPLICATION IN SECURITY/MILITARY
Computer simulation allows the military to train soldiers for combat situations. The air force
can train pilots in flight simulators, long bet-They actually get in a cockpit.
Military schools depend on computers to testing aptitudes of the students. Some of the
aptitude tests are used to decide the ability of the student and during his/her service time.
Many military programs & Hardware is kept confidential for purposes of national security.
24
Used for storing military information.
J. APPLICATION IN BANKS
a) Physical Banking
Automatic Teller Machines (ATM), with a Self Service Banking machine attached to a host
computer through a telephone network. Services available through an ATM machine include
the following;
2. Withdrawing cash
To keep customers’ information e.g. their names, account details, Addresses etc.
Generate reports about profits & losses so as to analyze to make changes where necessary.
Helps tellers to keep records for daily transactions e.g. daily depositing withdraws made,
Account opening, Loan processing etc.
Computers are used to track customers who are deliquescing to their loan and credit card
payment.
For printing or minting of bank notes, coins, cheques or other forms of currency.
Keeps security in the Bank e.g. detecting suspects or wrong doers.
They are used to detect fake cheques/money from original money.
Used to count large sums of money.
For making communications.
b) Online Electronic Banking Services
E-Banking refers to the banking services conducted over the electronic network e.g. the
internet.
E-services include;
-Transfer money electronically among different accounts e.g. Western Union Money Transfer.
25
-Obtain credit card statements, bank statements & account balances.
-Mobile money i.e. sending & receiving money electronically via computer networks.
-Make deposits (E-deposits) e.g. NSSF, water bills, TV bills into the services providers Account.
-Electronic cheque conversion i.e. converting a paper cheque into an e-charge for payment.
-Electronic point of sale (POS) terminals used to record purchases at the pointer where their
customer purchases the product or services.
-Electronic fund transfer point of sale (EFT-POS) terminals involves transfer of funds from
customer bank accountants directly to the sales account in the customers date cord
ONLINE E-COMMERCE
This is the financial business transaction that takes place over an electronic network such as
internet.
Online shopping and banking (E-transaction) can be done or affected using the following ways
or modes of payment.
1. E-money; where e-money is used as a means of paying for goods & services over the
network.
2. Electronic Data Interchange (EDI); involves use of a set of standards that control the
transfer of business and information among transacting parties using computers.
3. EFTPOS(Electronic Fund Transfer Point Of Sale); Where funds are transferred from a
customer’s bank account directly to the sellers account after reading the money value
from the customer’s credit or debit card.
26
Advantages of E-commerce
• Transaction can occur instantly and globally thus saves time for both parties.
• Transactions can occur 24hours per day.
• Businesses have access to millions of customers with internet access.
• Businesses have the ability to gather customers’ information, analyze it and react
accordingly.
• Information can be changed and made available quickly.
• Customers can compare prices quickly & make their choices.
• Feedback can be immediate.
• Manufacturers can buy and sell directly avoiding the cost of middle-men.
• Distribution costs for information (Advertising) are reduced as well as the transport
costs.
• Security is guaranteed since you don’t need to carry physical money
Computer Literacy
Refers to having the knowledge & understanding about computers and their operations.
OR
A person who has knowledge & skills of how to use computers to do some tasks is said to be
computer literate.
The degree of computer literacy varies from one person to another depending on individual
differences basing on knowledge, skills, understanding and ability.
27
Computer Professionals
The following are some of the computer professions or fields that are related to computing.
1. Computer users
2. Computer programmers
3. Data entry clerks
4. Information system managers
5. Database managers
6. Computer engineers
7. Computer scientist
8. Computer analysts
9. Computer designers
10. Website designers
11. Computer instructors, tutors, teachers
12. Network administrators13.
13. Secretaries etc
• Handle every computer device with maximum care without dropping them.
• Switch on the computer system starting from the wall socket switch, then USB (UPS
–Uninterrupted Power Supply) or a stabilizer and computer itself then other peripheral
devices connected later.
• Always ensure to protect computers from power surge or high voltage by use of UPS
or stabilizer or an inverter.
• Avoid making connections of peripheral devices such as monitors, keyboards,
printers, scanners etc which a computer is already powered/switched on.
• Do not insert in floppy discs, flash discs, CDs & DVD which are suspected to be
having computer viruses & always ensure to scan them before using them in the
computer.
• Avoid exposing computers to direct sun heat. This may cause the expansion of
metallic components like hard disk hence loss of data or information.
• Avoid on and off switching of computer system to prevent untimely damage.
• Always cover the computer with clean piece of cloth or material to prevent them
from effects of dust.
• Avoid entering in the lab with unauthorized objects or materials such as sweater,
forks, bags etc.
28
• Avoid making noise in the lab so as not to inconvenience other lab users.
• Avoid running, jumping, fighting & playing in the computer lab, you may cause
damage to the equipment or injure yourself.
• Never carry any magnet or magnetic object to the lab.
• Ensure that there are fire extinguishers in the lab to control fire in case of fire
outbreaks.
• Always follow the instructions of the teacher or instructor whenever in the lab &
always report problems to the people in charge.
• Avoid carrying food & beverages to the computer room, drinks may accidentally
pour on the components/devices and damage them.
The following are some of the areas where lab security measures should be taken to safe guard
computers from damage.
29
➢ Use woolen carpets to cover the floor of the lab to prevent excessive dust from
affecting computers. This also helps to prevent computer users from electrical
power shock.
➢ Ensure that you provide a standby power supply (substitute) in case the area
does not have a steady power supply e.g. generators, solar, etc.
30
C. Air Conditioning
Computer equipments easily get damaged with hot environment, dusty environment &
a humid environment. Therefore such conditions can be minimized through the
following ways;
a) Use of air conditioners; this helps to filter the air in the lab and allow the flow of
dust free air in the lab. Air conditioners also help to provide fresh air to the lab
users hence maintaining their conducive atmosphere.
b) The lab should have enough ventilation incase the air conditioners are off so that
the ventilators can provide can provide fresh air.
c) Lab doors & windows should be well located and kept open to provide sufficient
air incase air conditioning and ventilators do not function properly.
d) Where possible, ceilings and wall fans should be installed to supply fresh air in
the computer room.
31
3. Minimize the number of visitors to your computer as some might be
untrustworthy.
4. Always scan for viruses from storage devices before you open them as some may
carry computer viruses.
5. Save your data regularly since abrupt power cut off can cause loss of unsaved
data.
6. Use UPS, stabilizers and invertors to protect computers from power instabilities.
7. Ensure to run scan disk and defragmenters utility programs to keep your hard
disk drive health & free from crashes.
8. Destroy unwanted copies of data on a hard copy since data is not supposed to be
exposed to unauthorized persons.
Examples include;
✓ Fire extinguishers
✓ Burglar alarms
✓ Security cameras
✓ Security lights
✓ Woolen & plastic carpets
✓ Un interruptible Power Supply
✓ Invertors & Stabilizers
✓ Computer locks
✓ Disk drive locks
✓ Burglar proofing
✓ System unit enclosure
SERVICING
It refers to the act (practice) of performing some tasks aimed at keeping your computer & its
systems operating safely & properly.
Like all electronic equipments, computers need to be serviced regularly to maintain their
operability.
Some of the measures that should be taken for safe use of computers are;
32
❖ Switch on your computer hardware system starting from the wall socket, UPS or
stabilizer, computer & then other peripheral devices e.g. the printer.
❖ Avoid making connections when the computer is already powered on e.g. the keyboard,
the mouse, monitor & a printer.
❖ Avoid abrupt switching on & off of the computer system. Use the normal way of
shutting or closing down of all computer programs then shut down the computer.
❖ Place the micro computers in a dusty free environment with good ventilation. Dust
covers should be used to cover the computers from dust.
❖ Micro computers should not be exposed to direct sunlight.
❖ Foods or drinks should not be allowed near the computers.
❖ The computer should be regularly serviced at least a year or more frequently if the
environment is dusty.
❖ Do not open the computer for inside cleaning. This should be handled by a qualified
personnel.
❖ It is a good practice to keep a record of a daily condition in case of computer failure.
❖ The peripheral devices e.g. printers should be serviced regularly.
❖ The floppy disks & CDs used for installation of programs & backups should be kept safely
in disk banks & kept always away from sunlight, dust magnetic medium.
❖ In areas with power fluctuations, it is important either to use a power stabilizer or a UPS
to ensure a steady power supply to a computer system.
❖ *Floppy disks, flashes have to be write protected all the time especially those
installation.
❖ Do not smoke around your computer because tar from cigarettes can accumulate &
cause them to jam & sometimes leads to overheating.
❖ Try utilizing of good virus protection & detection of software to remove malicious virus
programs e.g. using Avila anti-virus & Norton etc.(other antivirus; MacAfee, kaspersky,
arras, smadav).
❖ Run scan disk & defragmenter at least once a month. This helps to remove
fragmentation & system tools in WOS which allows proper arrangement of files hence
easy access.
❖ Do not leave the PC turned off for weeks or months as this can corrupt the good record
of the hard drive which can cause computer failure to boot.
❖ Keep your computer off the floor or under the desk where it can’t be knocked
accidentally.
❖ Never use liquids e.g. water, wines or alcohol directly when cleaning electronic
components e.g. a keyboard, monitor etc. as this may damage the computer.
33
BOOTING OF A COMPUTER
The booting is the process of staring & restarting a computer which involves loading of an
operating system into the memory (RAM).
Types
• Cold booting
• Warm booting
Cold Booting
This is the process of turning on a computer after it has been powered off completely.
Warm Booting
This is a method of resetting or restarting a computer that has been already powered on.
A warm boot can be accomplished by pressing the Alt + Ctrl + Delete simultaneously.
34
c) Write in full as used in booting
i) POST
ii) BIOS
iii) CMOS
iv) CPU
v) RAM
Data refers to a collection of raw unprocessed facts or figures, letters and symbols entered into
a computer.
OR
Data refers to any unprocessed, unorganized and meaningless facts entered into a computer
for processing.
Such facts are of little or no meaning until they are put in a more useful format (organized
format).
INFORMATION
OR
DATA INFORMATION
Letters e.g. a,b,c,d,e,f Words e.g. apple, boy, girl etc.
Words e.g. name, etc Reports, letters, essays
Symbols e.g. ? ,”, !, etc. Mathematical formula e.g.
Numbers e.g.1, 2, 3, 4, 5, 6, 7. 8, 9 , 10. Comments e.g. good, excellent, poor etc.
Musical notes e.g. d.r.m.f.s Music (songs)
35
INFORMATION PROCESSING CYCLE
Definition
Refer to the different stages/steps through which data passes to be transformed into
information.
OR
It refers to the series of input, processing, output and storage activities in a computer.
For data to be processed into information, it has to pass through five stages.
Storage
Storage
The Steps/Stages
1) Collection of data:
This involves capturing or collecting data from their sources and recording onto some
form of media e.g. papers.
Data can be got through questionnaire, Random sampling, observation, Question and
Answer method etc.
2) Preparation of data:
This involves copying, grouping or organizing data collected in a more convenient form
ready for input into the computer. It also involves data verification to establish and
verify the validity of data.
3) Input of data:
Refers to entering or feeding the prepared and verified data onto the computer system
for processing.
4) Processing of data:
This involves manipulating or transforming the input data into information. Data
processing is done by central processing input (CPU) or the processor.
36
5) Output of information:
Refers to displaying or presenting the processed data(information) to the user in a
meaningful format e.g. Letters, Reports, Music, Notes, Memos, Videos etc.
6) Storage of information:
This involves keeping or backing up of data on a storage media e.g. hard disk, CDs, Flash,
DVDs, memory cards etc for future use.
Question
b) Briefly describe the activities that take place in the following stages of information processing
cycle
i) Processing stage
ii) Input
iii) Output
iv) Storage
37
COMPUTER SOFTWARE
Computer software refers to the collection of computer programs or instructions that help the
computer to perform various tasks.
OR
Software refers to the collection of computer programs installed in a computer so as to perform
specific functions.
1. SYSTEM SOFTWARE
This refers to programs that control or manage the operating of the computer & its devices.
It is a program that serves as the interface between the user, application software & the
hardware components.
The system software controls the way a computer & its devices operate.
Types of System Software
These include;
-Operating system
-Utility programs
-Programming languages & Processors.
1- Operating System
Operating system software refers to a type of system software that controls & manages the
overall operation of the computer system.
OR
It is system software that coordinates the general activities of the computer system. The
operating system acts as an interface for application software, user & hardware devices.
38
Examples of Operating System software (OS)
a)For Networked Computers
-Windows NT
-Windows 2000 server
-Windows XP
-Windows 7
-Netware
-Linux
NB: On phones which have -Android Operating System
-WOS
b)Standalone Computers (Not Networked)
-Microsoft windows XP professional
-Windows ME
-Windows Dark Edition
-Windows 7, Windows 8
-Windows 95
-Unix-Solaris
-Mac Operating System (Macintosh Operating System)-PDA operating system -DOS
39
13. It provides a complete track record of what is taking
place in a computer by keeping system analog.
14. It helps in network connectivity i.e. connecting a
computer to the network.
QUESTIONS
1a) Define the term “operating system” software.
b) State 8 functions of operating systems.
c)List five examples of operating system that support connectivity to the network and 7
operating system for standalone PCs.
40
COMPUTER VIRUSES
A computer virus is program (software) designed especially to damage the integrity of other
programs (software) or cause irregular behaviors.
2. It is designed to destroy other files and programs on the computer in order to make the
computer malfunction. At the end of the day the outcome is loss of vital information in
system crashes.
Types of viruses
Parasitic virus - This virus attaches itself to a program slowly eating it up until it totally
stops working. Initially the program works hardly until it stops totally.
Stealth virus - This virus is designed to hide from ant-virus software and can have any
effect which might be parasitic or polymorphic.
Boot sector virus - This is a virus that attacks and destroys the boot files and makes the
computer start with difficulty at worse fail to start at all.
Polymorphic virus - This virus changes or mutates itself and attacks different areas it may be
parasitic today, boot sector tomorrow etc.
41
RISKS / EFFECTS THAT MIGHT BE POSED BY VIRUSES
Replication
One of the primary purposes of a computer virus is to infect as many other systems as possible.
In order to do this, the virus replicates itself by attaching to other files on your computer. A
common method of spreading to other computers is by sending out email messages with a
infected attachments to everyone in your address book. If you find that the free space on your
computer is rapidly decreasing or people are receiving infected email from you, it is very
possible that your computer has a virus.
While computers can become slower over time due to the amount of available hard drive space
decreasing, it is also possible for a virus to drastically reduce performance. The boot time of an
infected computer is often much slower than usual and programs take much longer to launch
as well. You might also notice an increase in crashes and freezes when working with the
infected computer. It is also not uncommon for the infected computer to restart unexpectedly
or display strange error messages.
Corrupted Data
The data on a computer that is infected by a virus often becomes corrupted. This is either
through the virus attaching itself to files which renders these files unusable in the process or by
maliciously destroying the data. Files or folders are either deleted outright or become
inaccessible. When attempting to launch applications, you might receive error messages about
the file not being
found or not being valid. In some cases, this can lead to the operating system not starting due
to missing or corrupted files.
Once your computer is infected, the virus might also change your browser startup page to a
website that contains other malicious code. The virus also sometimes blocks access to security
websites with updates or information on how to remove it. These types of viruses often
attempt to install further malware on your computer by displaying links – disguised as system
messages – to software that will purportedly clean the infection.
In summary,computer virus can have many effects, such as deleting or corrupting files,
replicating itself, affecting how programs operate or moving files.
42
affecting how programs operate or moving files.
Source of viruses
1. Contact with infected computers- this is through sharing of viral infected diskettes and other
storage devices from the sick computer to those not yet affected.
2. Pirated software- The use of non licensed software may cause harm because it will be
contaminated with malicious code that could damage the system.
3. Games- Many games that are pirated or contain corrupt code that may damage to systems
programs and since every one wishes to use them, they spread very first hence causing
harm to many systems.
4. Freeware and shareware- Programs normally used got from bulletin boards systems that is
via the internet and normally require one to pay a fee that goes directly to the author or
are free but require your e-mail sometimes also contains viruses that might be
intentional or otherwise.
Since networks link many computers they serve as good centers of distribution for
viruses so normally when updates of programs take place via a network it might contain
some malicious code that may damage the system.
Virus symptoms
43
VIRUS DETECTION AND REMOVAL
The center piece to viral detection and removal is ant viral software.
This is software designed to detect and remove viruses when detected in a computer
system.
- It is normally advisable to first scan all storage devices with antivirus software before
accessing them.
Avira, Avast, Nod32, Kaspersky, AVG, Bit defender, Trend micro, Norton, McAfee, Panda,
F-secure.
- Make sure you are running an up to date anti-virus software on your system.
44
INTERNET & W.W.W
INTRODUCTION TO INTERNET
The internet is the worldwide connection of network linked together.
OR
It is a global collection of interconnected computer network that use standard protocol (TCP/IP)
TCP- Transmission Control Protocol
IP- Internet Protocol
NETWORK
It is a collection of computers and other devices connected together to share resources or
communication with each other
HISTORY OF THE INTERNET
It started as a networking project called ARPANET by the Advanced Research Agencies (ARPA)
of Pentagon in USA.
ARPA NET
The ARPA NET became functional in September 1969 linking scientific and academic
researchers in US. However with the main aim of sharing military information.
In 1986, the National Science Foundation (NSF) connected huge network of 5super computers,
centers called NSF network to ARPANET and thus internet.
NSF NET was the major backbone network on the internet till 1995 when it became a global
research network.
• You can communicate with other people around the world instantly e.g.
through emails, chartrooms, video conferencing, Face booking and Skype.
• Sharing of information; you can share information with other people around
the globe easily, fast & cheaply.
• Access to news: You can get the latest news, first news around the world
immediately e.g. magazines, newspapers, articles, Television & radio news.
• Searching for job opportunities around the world, advertise jobs on-line. You
can apply, conduct interviews & even work on-line, variety of products are advertized
on-line. It’s cheap, faster & worldwide form of advertisement.
• Entertainment:It provides a lot of entertainment to people e.g. videos, audios,
sports, etc.
45
• Online education variety of resourceful educational materials can be accessed
online. You can carry out any form of research online e.g. conduct online lessons.
• Research information: A lot of information is available online. You can carry
out any form of information online e.g. local & international news, weather news.
• Online shopping; business transactions can be carried out online e.g. by
buying & selling of products, ordering of goods etc.
• Reliability & flexibility; information on internet is readily available &up to date.
Information on internet is also kept online achieves to accessing fast
information/resources.
• Electronic transfer of money & online banking services are provided easily,
cheaply & faster means of financial transactions can be made.
• Storage of data theft and other personnel data can be kept online.
46
DATA COMMUNICATIONS AND COMPUTER NETWORKS
A computer network is a system where computers are interlinked together with the sole aim of
sharing resources.
A computer network is formed whenever more than one computer is connected together.
A computer network normally has one computer reserved as a server or mother of all the
computers.
Types of networks
Computer networks are generally classified into:
They are formed whenever computers are connected together in a small geographical area
e.g. in buildings or floors) within a radius of 10m to 3km, they are characterized by low cost
and increased or high data rates. They high rate is 10 - 100mbps and the low rate is1-
10mbps.
This covers a medium a size geographical area with in radius of 10km. They have data rates
of 100mbps and above and they are more expensive than Local Area Networks. They usually
cover big towns or cities and are expensive because they require more labour, cables and
other equipment.
These cover unlimited geographical area e.g. across states, a country or the entire world.
They are expensive to build and have low data rates.
The High data rates are 100mbps and the low data rates are 9.6kbps.
47
An intranet is a network that is restricted to a few workgroups say within a company and
is not open to the public.
Network Topology
This refers to the physical layout of cables, computers and other equipment that
make up a computer network.
Components of a Network
1.computers
3.Media: this is the channel through which the information is carried across the
network, which include Cables like Twisted pair, Coaxial cable, Fibre optics etc.
Network Models
Client-server based.
• Peer to peer
In this type of network there is no dedicated server or hierarchy among the network
computers.
All the computers are equal and therefore are known as peers. Normally each computer act as
client as well as server.
48
Client – Server network
This unlike the peer – peer network, it works with more computers, has central controller for all
the other computers and works in a big environment.
A computer is dedicated as server quickly services the requests from the network clients and
ensures that the security of data is not abused or compromised.
This is a topology that combines two or more topologies for example a star-bus or ring-bus or a
combination of all the topologies to make one network.
Network Devices
1.MODEM (wire and Wireless) (Modulation Demodulation) – this is a device that converts
digital signals from the computer into analog so that they can travel on a communication
network and then back to digital so that they can be received by the computer.
3.MULTIPLEX – Is the change of one signal to pass in many channels and the opposite is to
(Multiplexer and De-multiplexer are the devices that perform that kind of operation)
34ROUTER (wire and wireless) - Is a network device that makes sure that the data
transmitted over the network reaches the destination it was meant.
Routers are normally used to join network of different topologies say joining a ring to
a token or bus. They are used in big networks.
Merits
Easy and quick sharing data of data and information via networks.
Peripheral sharing is made easy and cost efficient like sharing of printers, scanners etc.
49
Networks enhance the corporate image of organizations proves the organization serious
and market the organization.
Communication is efficient and very fast through E-mail, SMS, and GSM technology.
It provides control of the firms activities since the network can be monitored to see who
does what and when to avoid compromises.(It provides administration).
Demerits
Network hacking can cause serious loss to the organization if un authorized access goes
to the wrong hands.
Jam in the machines can also cause loss to institutions for examples in
telecommunications were people make free calls or break down in the systems causing
leading to loss of customers.
Promotions of immorality through things like pornography for the under aged.
Easily prone to viruses and very good avenues for spreading viruses
50
END
51