Professional Documents
Culture Documents
PREPARED BY
KASULE KALULE JOHN
ICT / COMPUTER STUDIES
DEPARTMENT 2020
A LEVEL ICT 4
© , MR. KASULE KALULE JOHN MADIBA 2021
ICT
ICT in full stands for
Information and Communication Technology
Definition:
ICT can be defined as a set of technological tools
and resources used to collect, communicate,
create, disseminate, store and manage
information.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 55
Reasons for studying ICT.
Need to reduce the digital Divide.
To acquire skills in critical thinking and
problem solving.
To be equipped with skills for life long learning.
To acquire knowledge and be aware of new and
emerging technologies.
High demand of ICT skills in the job market.
To develop into an independent user of ICT
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 6
Digital divide
Digital divide is a term that refers to the gap
between demographics and regions that have
access to modern information and
communications technology, and those that
don't or have restricted access.
These include.
i. Hardware
ii. Software
iii. Data
iv. User.
A LEVEL ICT
6/28/2021 © , MR. KASULE KALULE JOHN MADIBA 2021 13
Parts of a computer system
Hardware: These are the physical components
that makeup a computer.
Software is a term for electronic instructions
that tell the computer how to perform a task.
Data is a collection of unprocessed items,
which can include text numbers, images audio
and video.
Human ware refers to the people who operate
and initialize instructions to the computer
system
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 14
Function of components of the computer
system
Inputs data
Outputs information/data
Processing data
Storage of data
Communication.
Positive implication
Positive
COMPUTER MANAGEMENT
MOUSE POINTERS.
It is an arrow used in pointing at the screen.
Or
Select the file or Folder
Press F2 from the keyboard
Or
Right click on the file.
Then press delete
From the message box “Are sure you want to
delete the folder” click OK/Yes
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 126
Illustrations
C:\users\Desktop\classlessons\mumbejja.xls
Click on Start.
Click Control Panel.
Click Folder Options.
Click View.
Uncheck Hide extensions for known file types.
Or
The process of starting or restarting a
computer is called booting.
PHYSICAL
ELECTRICAL
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Antiglare screens
Regulate excess light from monitors
especially CRT monitors.
Creating Backups
Input devices
Processing devices.
Output devices.
Storage devices
A LEVEL ICT
6/28/2021 © , MR. KASULE KALULE JOHN MADIBA 2021 294
Microphones
8 inches wide
3.5 inches wide ( was commonly used)
5 inches wide,
Examples include.
Compact Discs
Digital Versatile Disc.
Blue Ray.
Disadvantages
A LEVEL ICT
6/28/2021 © , MR. KASULE KALULE JOHN MADIBA 2021 406
Types of memory cards
Secure Digital card, the SD card is one of the
more common types of memory cards used
with electronics.
MicroSD
CompactFlash, CF is a 50-pin connection storage
device. CompactFlash is a storage medium
commonly found in PDAs, digital cameras, and
other portable devices.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 407
Smart cards
A smart card, typically a type of chip card, is a
plastic card that contains an embedded computer
chip–either a memory or microprocessor type–that
stores and transacts data.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Laptop Mother
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Mobile device motherboard
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Parts (components) of the
Motherboard
1. Processor (Central Processing Unit (C.P.U))
The processor (C.P.U) is a component of a
computer that interprets and carries out the basic
instructions that operate a computer.
Or
The component of a computer for turning data
into information.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 427
Components / Parts of the
C.P.U
Processors contain the control unit, Arithmetic
Logic unit and registers.
Examples
Adobe PDF
yahoo messenger
Google Talk
MSN messenger
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 542
Public ware
Public domain software is any software that has no
legal, copyright or editing restrictions associated with
it.
It is free and open-source software that can be
publicly modified, distributed or sold without any
restrictions.
Examples : SQLite, I2P and CERN httpd are
popular examples of public domain software.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 543
Open source software
Open source software is software provided for
use, modification, and redistribution. This
software has no restrictions from the copyright
holder.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
What is Internet
The Internet is a global system of
interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link
several billion devices worldwide.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Advantages
Easy access to of variety of information.
Faster transmission of information
Efficient and effective communication through
the use of email and social network.
Reduced expenses for example transport due
to online services like video conferencing.
Provision of online employment.
Internet is a source of income to people who
engage in online businesses.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 589
Easy and flexible research that is available any
time as long as your connected.
Increased storage space as a result of online
storage facilities like google drive.
Easy access and use of software i.e. almost
most of the software can be installed online.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Disadvantages of the Internet
No Information control over the Internet such
that all sorts of bad information is accessed.
There is no privacy of information and
information piracy is common.
Indecent material is published on the Internet.
Its not readily available to most people.
It is expensive to access drains school
resources.
Time is lost where Internet speed is low due to
poor links, hardware and congestion.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Disadvantages
Some sites give outdated therefore misleading
information because they are not regularly
updated.
Time wasting occurs when students easily
stray into non essential materials.
Computer viruses are easily spread over the
Internet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Disadvantages
Difficult to obtain information relevant to a
particular level of a student.
It is possible to obtain contradictory
information.
Many students and teachers do not have
adequate skills of accessing the Internet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Possible solutions to Internet
issues
Use of firewalls against illegal access to networks
Use of updated antivirus software against viruses
Use of anti spyware against hackers.
Carefully choosing an ISP who will provide the best
service within your means.
Installing filters against pornographic and other
undesirable content.
Use of encryption software to protect sensitive
information and prevent fraud.
Use of complicated passwords to restrict access to.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Uses of the internet
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Uses of Internet
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Spending time on social networks e.g. facebook at the
expense of doing their work.
Slowing it down due to many users accessing at the same
time.
Cost implication according to the package.
Efficient in terms initial cost and regular maintenance.
Effective internal communication
Reduce on easy spread of viruses
Reduce on possibility of hackers getting access to the
system. A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Determinants of internet
access speed
The amount of bandwidth allocated by ones ISP.
Connection technology used ; telephone lines are much
slower than newer technology such as ISDN and ADSL.
The volume of traffic. the more the number of people
logged on the internet the slower the internet speed.
Modem
Nature of web browser used.
Speed of the device being used to access the
internet.
speed used. A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Review Questions
1. How can the Internet be useful in the area of
education?
2. List at least possible advantages and disadvantages
connected with a school being online.
3. State the similarity and difference between internet and
intranet.
4. List and explain some of the services offered by the
internet.
5. What is an information network? Give examples of
computer networks.
6. Why is there low internet use in Uganda.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Requirements/infrastructure for
Internet connection
Host computer
Communication hardware such as Modem
and router.
Communication Software such as a Web
browser and internet protocols
Communication media such as VSAT,
wireless antenna or telephone line.
Internet Service provider(ISP)
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Internet Service providers (ISP)
ISP is a company which provides services for
accessing and using the Internet at a fee.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
SERVICES OFFERED BY
THE ISP.
Internet access- internet connectivity.
Internet transit- connecting smaller ISP networks
to the Internet
Domain name registration
Web hosting
Hiring storage space to small organisations
Electronic mail services
They do system analysis and consultancy
Network servicing and maintenance
Provide network security
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 607
Task
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Examples Of ISPs
MTN - Vodafone
Africa online - Roke
Uganda one - Broadband
Uganda telecom
Infocom
Airtel
Orange
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
There are many ISPs on the market in Uganda
to choose from such as AFSAT, UTL, MTN etc.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Which services ISPs offer?
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
The Factors to consider when
choosing an ISP
Setup costs that the ISP requires
Experience for both ISP and client.
Auxiliary/additional services offered by the ISP
e.g. E – Mail/telephone SMS facility.
Availability of online help.
Compatibility of ISP software with yours e.g.
windows Vs Linux Vs Wang.
Efficiency/Effectiveness of ISP devices e.g.
speeds of ISP modem, Bandwidth etc. cabling
architecture, Bit–Bus architecture for devices etc.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Available technology. For example, In case you
intend to hire a dial-up service, you need to
consider the availability of a local phone
number or toll-free number for access,
You also need to consider the level of update
Technology offered by the ISP. i.e. should be
recent.
Availability of Technical support that ISP offers.
The terms of service offered by the IsP
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Other services offered by the ISP that you can
have on top of internet connection. E.g. web
hosting and domain services.
The fee charged for the services. i.e. Monthly fee
for the services,
The size of the ISP’s Client base. ISP capacity is
usually limited, the bigger the client base the less
reliable is the ISP.
Coverage. Does the ISP coverage reach your
location or not?
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Services offered by the
Internet
What is available on the
Internet (Internet services)
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Services offered by
the Internet
World wide web Video conferencing
E-mail E-commerce,
FTP Telnet,
Newsgroups Gopher
Message boards Discussion boards.
Mailing lists E- Banking and electronic
Chat rooms money transfer
Instant messaging E- Libraries
Internet telephony. Usenet.
Wikis and blogs
A LEVEL ICT
6/28/2021 © , MR. KASULE KALULE JOHN MADIBA 2021 618
1. E. mail
(Electronic mail)
This is a messages (text, sound, video and
graphics) send and received on the internet or via
a network.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
E-mail
When mail is received on a computer system,
it is usually stored in an electronic mailbox for
the recipient to read later.
Messages can be replied to or forwarded with
speed and ease.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
E-mail software (e-mail
client)
E-mail software is an application software
which allows individuals to create an e-mail
accounts and be able create, send and receive,
store, and forward e-mail using SMTP and POP.
Examples Microsoft outlook express, Yahoo,
Eudora light, Gmail, Opera mail, etc.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Mail servers
Username: nabunyajanelinda.
Domain name: yahoo.
Top level domain: com
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
One advantage of this is that large files are
conveniently sent.
Address book: is an area that stores email
addresses for future use or mailing lists
Inbox: this where all incoming messages are
stored and can be viewed, it shows the name of
the sender of he message, the date it was sent
and the subject of the message.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Outbox/sent messages: Stores copies of any
messages that have been sent at stated dates.
This is useful for future reference.
Spam: where unwanted messages are stored
e.g. unsolicited adverts.
Draft. Folder that stores messages that were
not sent.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Handling ones mails
Creating document folders in which to store mails.
Checking and reading mail in the inbox
Transfer messages form the inbox to a specific
folder or storage file either by the drag and drop
facility or right click and move.
Deleting a message. This can be done by right
click then delete or delete on the tool bar
Sorting messages .
Drafting or composing a new message
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Handling ones mails
Inserting an attachment/file to your message.
To insert and attachment, click on insert file
attachment or attach file, then browse the hard
disk or any other disks to find the file you want.
Repeat the operation as many times as you
need.
Adding new contacts in your address book.
Filtering messages received to avoind spam in
your mail box.
Sending messages.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Sending an Email to Multiple
Recipients – Cc and Bcc
Use Cc and Bcc to send an email to more than one
person easily and fast
"Cc" is short for "carbon copy". Enables one to
send the same e-mail to two (or more) people
without the task of having to write it more than
once.
The message you compose is sent to the person
in the To: field, but a copy of exactly the same
message is also sent to all the addresses listed in
the Cc: field
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
To enter more than one address in the Cc:
field, separate them with commas.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
The Shortcomings of Cc:
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
BCC
Bcc is stands for "blind carbon copy".
This component enables copies of the e-
message to be sent to a third party without
acknowledge any other recipient (if present).
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
What to consider when using
email
Email can be junk mail. so avoid unnecessary
proliferation of messages.
Email takes up computer space, so delete
messages you no longer need.
The integrity of an email message cannot be
guaranteed. If a received message seems out of
character for the sender, double-check before
taking it seriously.
Take care opening attachments. treat any
attachment you receive with suspicion unless you
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Benefits/advantages of using email
Faster delivery of information by e-mail
E-mail services are cheaper in terms of delivering
information
They are secure since can be protected by passwords
Offers immediate delivery report/feedback
Mail can be sent to multiple recipients at the same
time and cost.
Less prone/susceptible to loss
Facilitates management of stored mails
Can be sent anywhere at any time
Allow attachments A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Disadvantages of e-mail
The sender and receiver both need internet
access and e-mail accounts-most people in
Uganda do not have access to e-mail.
The hardware needed is expensive
Email will not be delivered if there is a small
error in the address.
Some people are not keen on checking their
mail boxes. So an urgent message may not be
read in time.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Advantages of post-mail services
over e-mail communication
There are lower chances of eavesdropping
Legal documents with original signatures can
be sent using post mail service
Physical messages can be sent by post.
No loss of mail due to virus attack
Documents can be tracked during transit
Possibility of checking documents before
sending to the destination
It is convenient for all categories of people.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 641
2. File transfer
This is an Internet standard service that allows
us to upload and download files with other
computers on the Internet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
8. Voice / Video
Communication – Skype
Skype is software that enables the world's
conversations. Millions of individuals and
businesses use Skype to make free video and
voice one-to-one and group calls, send instant
messages and share files with other people
on Skype
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
12. Usenet
This is a service on the Internet on which one
can post and read electronic messages.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
There is a large volume of unsolicited e-mail
known as ‘spam’ that tends to fill up mailboxes.
E-mail tends to take peoples valuable time at
the expense of work or study.
Parcels cannot be delivered via e-mail which
limits its usability.
Most viruses are spread via email.
The privacy of an email message cannot be
guaranteed. So confidential messages ought
not sent via e-mail.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
13. Video Conferencing
This is an internet service that allows users
conduct meeting between two or more
geographically separated people who use
a network or the Internet to transmit audio and
video data
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Video conferencing
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Advantages of Video
conferencing
Reduces on transport costs.
Saves the members on any exposure to risks
like accidents while travelling.
Save time that would have been used while
traveling.
Information can be backed up.
It is convenient because members do not have
to move place to place.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Disadvantages
It might affected by network problems.
It requires a computer and other related
devices which makes it expensive.
The information can easily be hacked.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
13. Electronic commerce
This is business where the buying and selling
of products or services is conducted over
electronic systems such as the Internet and
other computer networks, involving the
exchange of data to facilitate the financing and
payment of business transactions.
Business organisations have websites(online
market place), where online transactions and
purchases can be made.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Example of virtual shops/online
market place include;
http://www.shopsonthenet.co.uk
http://www.ukshops.co.uk/enter.shtml
http://bookshop.co.uk
http://www.amazon.com
http:// www. Jumia.com
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Merits of e-commerce
Overheads are reduced as there is no need for
retail premises that is shops
Businesses can attract new customers through
the Internet who might not have come into their
shops.
The number of employees is reduced which
reduces costs.
Customers have access to information all the
time increasing the chances of making sales
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
There is no need to handle money because
payment is done through electronic fund
transfer(EFT)
Businesses are able to collect information
about their customers(market research) that
they wouldn’t be able to do normally.
It reduces travel time and costs for the
customers since they do not need to visit the
shops
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Prices are reduced as the business can offer
lower prices due to lower overheads.
The customer is able to sample the products
on-line, for example view movie clips or listen
to music before buying.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Disadvantages of on-line
businesses
Many businesses have to run traditional retail
businesses alongside their Internet operation which
increases cost.
Sales may be reduced if customers are unable to try
products before they can buy.
The web may be hacked leading to loss of money
fraudulently by businesses.
Conmen can easily trick unsuspecting customers
leading to loss of money when they get access to
customer’s credit card numbers.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Online Shopping
This is the buying of products via the internet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
1. Web Portal
Web portal: Is a site that provides a starting
point or gateway to other resources on the
internet or intranet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Don’t write
A website or similar online resource which allows anyone to set up a
resource in which content can be created collectively. It's important
feature is that it allows anyone who views the wiki to add to or edit the
existing content as if they were adding to or editing, for example,
someone else's Word document. Wiki also refers to the software used
to create such a website. The word "wiki" derives from the Hawaiian
"wiki-wiki", meaning "quick". Wikipedia is the best known example of a
wiki. It's a collaboratively written encyclopaedia:
http://www.wikipedia.org. There is an article on Computer Assisted
Language Learning in Wikipedia, which you can add to or edit yourself:
http://en.wikipedia.org/wiki/Computer-assisted_language_learning. It is
also possible to set up a personal wiki that cannot be added to or
edited by other people, e.g. here is Graham Davies's personal wiki:
http://grahamdavies.wikispaces.com. Wikis may also be used for
Conferencing: see Section 12, Module
6/28/2021 A LEVEL ICT 1.5, headed Discussion lists,
683
© , MR. KASULE KALULE JOHN MADIBA 2021
A Wiki
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
4. Community Site
Is a site where persons with similar interests
communicate to each other through chatting
and messaging or through social message
boards, such as MySpace or Face book.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
8. Media sharing website
Is a site that enables users to upload and view
media such as pictures, music and video clips.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
11. School site
A site on which teachers, students, or
administrators can post information about
current events at or involving their school.
For example the home page for bbc web site has
a web address of http://.bbc.com. A web browser
retrieves a web page such as bbc home page
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 712
Parts of a URL
i. The protocol being used, which could be http
or ftp
ii. The domain name which is the location that
contains the file of web page
iii. The path to a web page which may contain a
folder name and document file name both of
these separated by forward slashes
iv. The query string, or parameters. These are
optional but show information about the
page/file
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Components of a web
address / URL
Example of a web address / URL
http://www.newvision.com http: //
www.globalcomacademy.co.ug
Http: Protocol
//
www: World Wide Web
globalcomacademy: host / domain name
co: top level domain
Ug: country domain
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 714
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
6/28/2021 A LEVEL ICT
716
© , MR. KASULE KALULE JOHN MADIBA 2021
Task
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
INTERNET ADDRESS
The internet relies on an addressing system
much like the postal service to send data to a
computer at a specified destination.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
“Don’t write”
Think about using the Internet. You open your
browser, and in the address bar type the name
of your favorite website, something like
www.google.com, and press Enter. The first
question your computer asks is, "Who is that?"
The DNS server provides the answer, "That is
72.14.205.104." Now that your computer knows
the address of the website you want, it's able to
traverse the Internet to find it. Think about the
implications of that for just a minute.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 724
Domain name hierarchy on
the domain name
The hierarchy of domains descends from the
right to the left label in the domain. Each label
specifies a sub domain of the domain to the
right.
For example, given the domain name
www.bbc.co.uk
.bbc is the subdomain of co.uk, while .co is the
subdomain of .uk
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Top level (highest level)domain names
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Third level domain
This is the part of the domain name that is
immediately to the left of the second level
domain
For example;
www.bbc.co.uk
bbc is the third level domain
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Uniform resource locator(URL)
A URL is the full address used to find files
or web pages on the internet. For example
http://www.awebsite.co.uk/index.html
http://www.nypl.org/sitemap/index.html
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Parts of a URL
i. The protocol being used, which could be http
or ftp
ii. The domain name which is the location that
contains the file of web page
iii. The path to a web page which may contain a
folder name and document file name both of
these separated by forward slashes
iv. The query string, or parameters. These are
optional but show information about the
page/file A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Guidelines for URL
URLs don’t contain capital letters or spaces,
but contains dots and forward slashes.
The Forward slashes specify the path to the
location of the file needed.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Internet connection
technologies
Dial-up (DUN)
This is a connection method where the client
must request for a connection to the ISP server
each time he wishes to access the Internet.
This method requires the use of a MODEM and
a telephone line and the fee depends on the
amount of time spend on-line.
Dial-up networking with WindowsXP
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Leased line
This is where there is a permanent connection
between the user and the ISP at a fixed fee.
This connection normally uses DSL technology
DSL stands for Digital subscriber line. DSL or
xDSL, is a family of technologies that provide
digital data transmission over the wires of a
local telephone network via a DSL adaptor. DSL
Equipment.docx
DSL family includes ADSL and ISDN, SDSL,
HDSL and others. A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Integrated Services Digital
Network (ISDN)
ISDN is a method of creating high speed data
transmission using a telephone system in
Digital form by using an ISDN adapter at either
end to send and receive the data in digital form
instead of using a modem. There is no need to
modulate and demodulate data.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Asymmetric Digital Subscriber line
(ADSL)
ADSL is a technology that provides high speed
transmission using the standard telephone
network in digital form with ADSL adaptor at
either end, but splitting the frequencies on the
telephone line into three channels of different
bandwidth (asymmetric).
The bandwidth for each channel is set
according to how much data will be transmitted
through it
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
for example one channel is set to send and
receive voice data for telephone conversations,
one channel is set to upload to the internet and
the third one to download form the Internet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Cable modem
A cable modem is a type of modem that
provides access to a data signal sent over the
cable television infrastructure. Cable modems
are primarily used to deliver broadband Internet
access, taking advantage of unused bandwidth
on a cable television network.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Broadband Internet access
Broadband Internet access (broadband), is
high-speed Internet access. In some countries
such as USA, TV cable companies install a
single cable to provide both cable TV and
Internet services to customers. A special cable
box is needed to split the signal for the
television and the PC. These cables are two-
way, an improvement over the one-way cables
used solely for cable TV.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
BANDWIDTH
Bandwidth is the amount of Data (bits) that can
be transmitted along a communication channel
in a given time (per second) which is measured
in bits per second or bps e.g. 32 bps. The larger
the range of frequencies the greater the amount
of data that can be transmitted.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
The web server
This is a dedicated computer which accepts file
uploads, downloads, distribution and storage
of these files over the Internet upon the users’
request.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Subject Directories
This is a software that contains a listing of
links to different subjects or topics
already sorted by suject or topic category.
Examples include; dir.yahoo.com,
infomine.ucr.edu, academicinfo.net,
about.com’ lii.org howstuffworks.com, etc.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Characteristics of Subject
Directories
They are built by human selection not
based on automated systems.
The sites/pages are organised into subject
categories
The sites/pages are evaluated. Only most
relevant web pages are availed.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
How to effectively use a
search engine.
Note that one can do a more complex search
using more than one keyword and linking them
together with AND and OR or NOT (boolean’s
logic)
Be specific- eg if one wants to search about
windows 98 bugs, the search query should be
“windows 98 bugs” not just “windows”
Using the symbols + or - the plus symbol lets
you find pages that have all the words in the
query eg to get pages that refer to both john
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
How to evaluate search
results
Not all that is published over the internet is good
or accurate. So the need to evaluate what one
finds. The following are the guidelines;
The author’s authority on the subject.
Accuracy of information.
Objectivity or intention of the author.
How current is the information presented.
The extent of coverage of the topic.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Authority Who are the authors? Are they
qualified? Are they credible?
With whom are they affiliated? Do their
affiliations affect their credibility?
Who is the publisher? What is the publisher’s
reputation?
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
How to evaluate search
results
Accuracy Is the information accurate? Is it
reliable and error-free?
Are the interpretations and implications
reasonable?
Is there evidence to support conclusions? Is
the evidence verifiable?
Do the authors properly list their sources,
references or citations with dates, page
numbers or web addresses, etc.?
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Objectivity What is the purpose? What do the
authors want to accomplish?
Does this purpose affect the presentation?
Is the information fact, opinion, spoof, or satirical?
Currency Is the information current(up to date) ?
Is it still valid?
When was the site last updated?
Is the site well-maintained? Are there any broken
links?
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
How to evaluate search results
Coverage Is the information relevant to
your topic and assignment?
What is the intended audience?
Is the material presented at an appropriate
level?
Is the information complete?
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Extranets
An extranet is a private network that uses
internet protocols to share data of a particular
organisation with selected outside users such
as the clients of the company or subsidiaries of
a company.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Differences between an
Intranet and Internet
Intranet is private while Internet is public.
Intranet has geographical boundaries while
internet has no boundaries.
Intranet only shares company information while
Internet has all sorts of information
Intranet is a single source information while
Internet is a multisource information.
Intranet is controlled by an organisation while
there is no control over the Internet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Website publishing
Web publishing is the process involved in
making information available on the
World-Wide Web.
A website (or Web site) is a collection of
related hyperlinked web pages hosted on
a particular webServer on the World Wide
Web.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Web publishing process
This involves;
Web designing
Web site hosting
Web site content management.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Web designing
This is the initial process of web publishing
through which a web page is created.
It’s about organizing web content so that it can
be easily found and easily read and is attractive
to visitors.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021
Web authoring
Legal issues
Legal issues relate to a system of rules/laws
and principles backed by sanctions governing
computer system acquisition, usage and
disposal.
Ethical issues
Ethical issues are general moral guidelines of
conduct or behavior for computer systems
acquisition, usage and disposal
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 824
(ii) Ethical issues
Respect of computer ownership without recourse to
laws.
Guarding against computer misuse
Systems safety (Hardware, software, Data and users
safety)
Systems privacy
Environmental protection
Respect for human dignity
Usage with permission
Shutting down the computer properly after use
Virus alerts
Polite tone
6/28/2021
A LEVEL ICT
825
© , MR. KASULE KALULE JOHN MADIBA 2021
Computer crime
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 843
Computer Communication
(Illustration)
Computer Communication
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 844
Definition of terminologies
Computer Network
A computer Network is a collection of two or
more computers and devices connected by
channels so that they can communicate with
each other and share resources:
Examples of resources
data, a single internet connection,
software,
peripheral devices, processing power.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 845
Definition of terminologies
Encoding
This is the process through which Information
(e.g. data, text, voice or video) from the sending
device is converted into signals which the
communication medium can carry.
010110
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 848
Definition of terminologies
Data Encryption
This is Process of converting data into coded form
(cypher text) to prevent it from being read or
understood by unauthorized people.
This is the process of converting readable characters
into un readable characters.
Communications Software
This refers to a set of instructions (software) needed
by a computer before it starts sending and receiving
data from other computers.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 849
Importance of computer
communication
It allows sharing of hardware like printers.
It allows sharing of software between two or
more computers, hence reducing on cost.
It allows sharing and transfer of data and
information stored on other computers on the
network.
Facilitate communications between people e.g.
through electronic-mail, Mobile phones,e.t.c.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 850
Importance of computer
communication
Computer communication has security & tight
control measures over data access.
It enables online learning and collaborative
research.
It allows access to common databases for
example in banks.
Has enabled improved travel service through e-
bookings and e-reservation.
Provides for online employment e.g.
telecommuting.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 851
Limitations of computer
communication
Data theft. If a computer is a standalone, physical access becomes
necessary for any kind of data theft. However, if a computer is on a
network, a computer hacker can get illegal access.
Rapid Spread of Computer Viruses: If any computer system in a
network gets infected by computer virus, there is a possible threat
of other systems getting infected.
Expensive Set Up: The initial set up cost of a computer network
can be high depending on the number of computers to be
connected.
Dependency on the Main File Server: In case the main File Server
of a computer network breaks down, the system becomes useless.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 852
Limitations of computer
communication
Exposure to External Exploits. Someone on a different computer
can send data to the computer in such a way as to attack it - make
it lock up or crash, make it slow down, or even take control of it.
Automatic Downloads. If a computer is connected to a network, it's
easier to download and install software from the network onto the
computer without any human intervention. If the new software
hasn't been tested, it could cause unpredictable behavior.
Computer Networks can Fail. Computer networks can be so
powerful and useful that it is very vital for them to be used. All of
the computers in an office building might become completely
useless if a single network component fails.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 853
Factors to consider while choosing
a communication media
Cost – Initial, maintenance/support cost
Speed – Data transfer, propagation speed
Distance and expandability
Environment – Noise level
Security – Wiretap possible? Need encryption
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 855
Cable/ Guided
transmission media
This is the type of transmission media where
data is transmitted from one device to another
through a physical medium (device)
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
875
Advantages of wireless
transmission
It is fast to connect the device to the network.
Can move longer areas with the device i.e. allow
mobility.
Can connect many devices cheaply
Fast data transfer rates are possible where there are no
environmental obstacles.
It also allows an organization to offer visitors wireless
internet access or hot-desk or hotspot facilities.
Wireless technology makes it easy to set up temporary
network installations.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 876
Disadvantages
It requires one to have a password or security
key to connect to a network.
It may be only accessible at a given range/
distance.
Signals can be interfered with by bad weather
and other noises
Can be easily hacked.
They are exposed to external interference
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 877
DATA TRANSMISSION
This is the sending or transferring of data,
information, and instructions among computers.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 878
Features of a data / Transmission
communication Media
Transmission speed (measured in bps)
Band width (capacity of communication media,
measure is Hertz or bps)
Transmission mode
Transmission Direction
Signal Type
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 882
Digital Signals
A digital signal is a series of discrete
(discontinuous) bits which are simply the
presence or absence of an electric pulse. The
state of being on or off represents the binary
digit of 1 or 0, respectively.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 883
2. Transmission Mode
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 885
Asynchronous transmission
Asynchronous transmission transmits one byte
at a time over a line at random intervals.
Asynchronous transmission is relatively slow
and used for low-speed transmission.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 886
Characteristics of
Asynchronous Transmission
Each character is headed by a beginning bit and
concluded with one or more end bits.
There may be gaps or spaces in between
characters.
Examples of Asynchronous Transmission
Emails
Forums
Letters
Radios
Televisions
6/28/2021 A LEVEL ICT
887
© , MR. KASULE KALULE JOHN MADIBA 2021
Synchronous transmission
Synchronous transmission transmits groups of bytes
simultaneously at regular intervals.
Characteristics of Synchronous Transmission
There are no spaces in between characters being sent.
Timing is provided by modems or other devices at the
end of the transmission.
Special ’syn’ characters goes before the data being sent.
The syn characters are included between chunks of data
for timing functions.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 888
Examples of Synchronous
Transmission
Chatrooms
Video conferencing
Telephonic conversations
Face-to-face interactions
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 891
Simplex transmission
Simplex transmission is the transmission data
signals in one direction only.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 892
Examples of Simple
Duplex
Television broadcasting.
Radio broadcasting
Keyboard and traditional monitors. The
keyboard can only introduce input, the monitor
can only give the output.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 894
Examples of Half
Duplex
Walkie- talkie in which message is sent one at a
time and messages are sent in both the
directions.
Many fax machines,
police radio calls,
credit card verification systems and automatic
teller machines use half-duplex transmission.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 896
Multiplex transmission
In multiplex transmission, several different
types of signals can be carried at once through
the same line. E.g. During Video calls where
Images
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 897
Describe what you can see.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
898
COMPUTER NETWORKS
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
900
Types of computer networks
There basically three types of computer
Networks namely.
1. Local Area Network (LAN).
2. Wide Area Network (WAN).
3. Metropolitan Area Network (MAN).
These networks are grouped basing on the
distance that they cover.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
901
Local Area Network
This is a network that connects computers and
devices in a limited geographical area such as
a home, school computer lab, Office Building
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
902
Wide Area Network
Is a Network that covers a large geographical
area such as a city, country or the world using
a communication channel.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
903
Metropolitan Area Network
(MAN)
Is a high-speed network that connects local
area networks in a metropolitan area e.g. a city
or town.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
904
Requirements Needed to
connect to a network
There both hardware and software
requirements.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
905
Components of a computer
Network.
Network hardware devices e.g. a network card
Terminal nodes e.g. Computers and Printers
Communication (Network) media/Channels
Network software e.g. network protocols
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
906
Network Hardware Devices
Hubs/concentrators
MODEM
Switches
Repeaters
Bridges
Routers
Network Interface Cards (NICs)
etc.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
907
Networking hardware
Networking hardware includes all computers,
peripherals and Communications devices that
enable two or more computers to exchange
items such as data, instructions, and
information with each other.
Examples include: a server computer,
clients/work stations, network interface card,
modems, Hub/Switch, repeater, Router, etc.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 908
1. SERVER
A server is the host or central computer that
manages the resources on a network.
A server provides a centralized storage area for
programs, data, and information.
A dedicated server is a server that performs a
specific task. Examples of dedicated Servers
include: file server, print server, database
server, and a network server
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 909
Roles of Dedicated Servers
A file server stores and manages files on a
network
A print server manages printers and print jobs.
A database server stores and provides access
to a database
A network server (e.g., a DNS) manages
network traffic.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 910
Requirements of a server
computer
It needs a computer with very high processing
speed
It needs large amounts of RAM
It needs a very big storage capacity
It needs a very fast Network interface card
It needs network operating system such as
Novell Netware, Windows NT Server or Apple
Share
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 911
2. NETWORK INTERFACE CARD
A network card, also called
network interface card (NIC),
is a device that enables the
computer or device that
does not have built-in
networking capability to
access a network.
Examples include
adapter card, PC Card,
USBJune
network
21 adapter, flashA LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 912
3 MODEMS (signal
converters)
The modem, is a device which Modulates a
digital signal from computers into an analog
one to send data out over the phone line. Then
for an incoming signal it Demodulates, the
analog signal into a digital one.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 913
4. HUBS and SWITCHES
This is a central device that provides a
common connection points for nodes on a
network.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 914
Difference between a hub
and a switch
A hub has no capability of directing data to a particular IP
address.
A hub is a layer 1 device implying that it has no knowledge of
address while a switch is a layer 2 device
A hub is half duplex while the switch is full duplex.
vital difference between a hub and a switch is that all the
nodes connected to a hub share the bandwidth among
themselves, while a device connected to a switch port has
the full bandwidth all to itself
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 916
Switch
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
917
6. A ROUTER
This is a communication
device that connects
multiple computers
together and transmits
data to its correct
destination on the
network.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 918
7. NETWORK
BRIDGE
This is a device A bridge knows all of the addresses on
that joins similar each side of the bridge and can send
topologies and information accordingly.
are used to
divide network
segments.
Bridges keep
traffic on one
side from
crossing to the
other.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 28-Jun-21
920
8. MULTIPLEXER
A multiplexer is a device that combines two or
more input signals from various devices into a
single stream of data and then transmits it over
a single transmission medium.
By combining the separate data streams into
one, a multiplexer increases the efficiency of
communications and reduces the need for
using multiple separate transmission media.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 921
COMMUNICATIONS
SOFTWARE
The principal functions of communications software are
network control, access control, transmission control, error
detection/correction, and network security.
Communications software consists of programs that :
1. (1) help users establish a connection to another computer or network;
2. (2) manage the transmission of data, instructions, and information;
3. (3) provide an interface for users to communicate with one another.
The first two are system software and the third is application
software.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 922
Networking Operating System
A network operating system (NOS) is the Examples of
system software that organizes and NOSs include:
coordinates the activities on a network. Novell NetWare
The principal functions of NOS include Microsoft
network control, access control, Windows
transmission control, error server 2003
detection/correction, and network security. and 2008.
System maintenance tasks such as backup AppleShare
File management tasks Unix /NFS
Prioritizing print jobs on the network Sun Solaris
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
927
Comminucations application
software.
These are computer e-mail,
software programs that FTP,
help to accomplish Web browsers,
specific tasks related to newsgroup/message
telecommunications. boards,
A variety of examples of chat rooms,
application software for instant messaging,
communications video conferencing, and
include: VoIP.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
933
Disadvantages
Initial cost of installing a network on Cables,
network cards, and software are expensive, and the
installation may require the services of a technician.
Networks require Administrative Time and expertise
for Proper maintenance of a network which leads to
additional cost.
Time can be wasted on social networks instead of
doing meaningful work.
Break in the communication channel affects the
entire network.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
934
The entire networker fails if the server
crashes, When this happens, the entire
organization loses access to necessary
programs and files.
There is increased risk of data corruption,
since many users will be using the system to
access the same documents, some of whom
may be careless or deliberately tamper with it.
Increased exposure to hackers which puts
private data at risk
Greater risks of viruses A LEVEL ICT
June 21
© , MR. KASULE KALULE JOHN MADIBA 2021 935
29(a) Benefits of networking computers
in school (UNEB 2016)
It lowers expenses on hardware and software
eg printer, anti-virus
Software is easily upgraded via the server
Allow multiple access to the school database or
internet
Easy sharing of files and file transfer
Allow flexible access to the as students and
teachers can logon and access their work from
any work station
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
936
Benefits of networking computers in school
(UNEB 2016)
Collaborative learning is made possible
It enables easy and faster communication
It enables easy access to the internet resources
by many students at the same time
Improved security through centralized
administration via the server
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
937
Benefits of a school having
a LAN
Collaborative learning is made possible
It enables easy and faster communication
It enables easy access to the internet resources
by many students at the same time
Improved security through centralized
administration via the server
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
938
Network Models
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
940
A client computer is a computer that can
access the resources on a network.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
942
Advantages of Client-Server
Model.
All Resources are centralized and easier to
access.
Easy management and administration of the
network.
More data security since all network access is
controlled through the server.
The network is flexible, because changes and
new technology can be easily included into
system.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
943
Disadvantages
It is expensive to set up as compared to a P2P
network.
It requires an extra computer to serve as a
dedicated server.
Maintenance – large networks will require an
administrator staff to ensure efficient operation
Dependence – When the server goes down,
operations will cease across the network
Server can get overloaded since all the
processing is controlled at one point.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
944
Peer to Peer
Peer-to-peer network: A type of network in
which each workstation has equivalent
capabilities and responsibilities
Peer-to-peer networks simply link a number of
PCs together with no network server.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
945
Advantages of Peer – Peer
network
A peer-to-peer network is simple to setup i.e. does
not require too much configuring
It is not expensive to set up
It does not require a dedicated server to control the
network
It is perfect for home and small business users.
The right choice for small companies that don't
expect future growth
Setting up a peer-to-peer resource model simply
because it is cheap and easy to install could be a
costly mistake
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
946
Disadvantages of Peer-Peer
Network
No centralized administration or control
Every station has unique control over the
resources the computer owns
Lack of centralized control can make it difficult
to administer the network
The network isn't very secure
May not be easy to locate resources
Users need more training
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
947
NETWORK TOPOLOGIES
This refers to the physical or logical layout of
computers (nodes) in a communication network.
Or
A network topology is the physical arrangement
of the devices in a communications network.
Bus or linear network topology,
Ring network topology,
Star network topology
Mesh Topology - Tree Topology/ hierarchical network
topology
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 948
Bus topology
A bus or linear network topology consists of a
single central cable that connects all computers
and devices together.
The physical cable that connects the computers
and other devices is known as the bus or the
backbone.
A LEVEL ICT
June 21 © , MR. KASULE KALULE JOHN MADIBA 2021 949
Merits of BUS Topology
Easy to implement and extend (quick setup)
Cheaper than other topologies.
Computers and devices can be attached and detached at any
point on the bus without disturbing the rest of the network.
Failure of one device usually does not affect the rest of the
bus network.
Data, instructions, and information in a bus network can be
transmitted in both directions.
Cable faults are easily identified.
Weight reduction due to less wires
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
950
Demerits of
BUS Topology
If there is a problem with the cable, the entire network goes
down.
There is no central host computer to control the network.
Only one device can transfer items at a time.
If many computers are attached, the amount of data flowing
along the cable increases, data collisions occur and the
network slows down.
Limited cable length and number of stations.
Performance degrades as additional computers are added or
on heavy traffic.(shared bandwidth)
It is slower than the other topologies.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
951
Ring Topology
This is a network topology
connects each node to
exactly two other nodes,
forming a circular pathway Cable
every packet.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
952
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 953
Advantages
of Ring Topology
Ring topology Can cover a larger distance as
compared to a bus network and is commonly used
in wide area networks (WAN)
No collisions occur because data takes one
direction only
Very orderly network where every device has
access to the token and the opportunity to transmit
The speed of data transmission is faster than in a
bus topology.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
954
Demerits
of a Ring Topology
Ring Topology Network is More difficult to establish.
If the cable fails, the whole network goes down.
Data messages travel in only one direction from device
to device around the entire ring
If a node on a ring network fails, all nodes after the
failed nodes cannot function.
There is no central host computer to control the
network.
Moves, adds and changes of devices can affect the
network
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
955
Star Topology
This is a network
topology where all of the
computers and devices
(nodes) on the network
connect to a central hub
or switch.
All data that is transferred
from one computer to
another passes through
the hub. A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
956
Merits of a Star Topology
Easy to install and maintain.
Better performance: The star topology prevents the
passing of data packets through an excessive
number of nodes.
Computers and devices can be added to or
removed from the network with little or no
disruption to the network.
Reliable because each device connects directly to
the hub, if one device fails, only that device is
affected. A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
957
Demerits of a Star Topology
If the hub fails, the entire network fails
Lots of cable required so that the installation
cost is expensive.
Network size is limited by the number of
connections that can be made to the hub.
Performance for the entire network depends on
the capabilities of the hub.
Set up of the system can be very complex.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
958
Mesh Topology
A network topology in which at least each node
has two or more paths between them.
Cable
Workstation
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
959
Merits of Mesh Topology
Data will always be delivered.
All of the data that is transmitted between
nodes in the network takes the shortest path
between nodes.
In the case of a failure or break in one of the
links, the data takes an alternate path to the
destination.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
960
Demerits of Mesh Topology
Mesh topology is generally too costly and complex
for practical networks, and very hard to setup.
Lots of cable required so that the installation cost is
expensive.
Network size is limited by the number of
interconnections that can be made between the
computers.
It requires that the nodes of the network possess
some type of logical 'routing' algorithm to determine
the correct path to use at any particular time.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
961
Tree Topology
Tree network
topology is also
known as a the
hierarchical
network topology.
This is because it
contains different
levels of
hierarchy.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
962
Tree Topology
The type of network topology in which a central 'root' node (the
top level of the hierarchy) is connected to one or more other
nodes that are one level lower in the hierarchy (i.e., the second
level),
Each of the second level nodes will also have one or more other
nodes that are one level lower in the hierarchy (i.e., the third
level) connected to it.
The hierarchy of the tree is symmetrical - Each node in the
network having a specific fixed number, of nodes connected to
it at the next lower level in the hierarchy.
It usually has three layers: the core layer, the distribution layer
and the Access layer.
A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 June 21
963
Hybrid Topology
Hybrid Topology is a network that has two or
more different types of physical topologies
connected to each other to form a complete
network. There are many different
combinations that can be created such as bus
plus Star(tree).
A hybrid topology is easier to connect to other
computers than some other topologies. Also
the hybrid topology has a faster connection.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 964
Hybrid Topology
2. MORE CHOICE
Digital signals take up much less bandwidth than the
analogue signals. That means we can broadcast up to
10 TV channels in the space currently used to carry one
-6/28/2021 A LEVEL ICT
1004
© , MR. KASULE KALULE JOHN MADIBA 2021
3. MORE ACCESS
Digital broadcasting will ensure TV viewers in Uganda
have improved television reception, particularly in
areas with poor signal strength.
4. MORE SERVICES
Because digital signals use less bandwidth than
analogue signals, digital TV broadcasting will free up
spectrum for other uses that will ultimately benefit
Ugandans, e.g. wireless broadband, telephony, etc
7. JOB CREATION
Digital Migration will allow new business opportunities and more
players in the market, and in turn provide more jobs for Ugandans in
broadcasting and digital content-generation.
6/28/2021 A LEVEL ICT
© , MR. KASULE KALULE JOHN MADIBA 2021 1006
END: WISH YOU SUCCESS