You are on page 1of 20

Computer notes

What is a computer?

 It is a programmable machine.
 It is a device that has ability to accept data, internally store and execute a program of
instructions, perform mathematical, logical and manipulative operations on the data
and reports on results.
 In other simple terms, it is a machine that accepts data (input) and processes it into
useful information (output).

Information Technology

It is an organized combination and use of hardware, software, telecommunications data


management and other information processing technologies used in a computer based
information system.

Information technology transforms data into a variety of useful information products


specifically by the use of a computer

Two principles of a computer are

 It responds to specific set of instructions in a well defined manner.


 It can execute a pre-recorded list of instructions (a program)

Categories of computers

These are sophisticated and powerful computers that are used in very large companies and
organisations. They are used to control huge networks of computers often located globally.
For example car manufacturers, government departments, large chain supermarkets, weather
forecasts, etc.

Advantages of mainframe computers

 Can process huge amounts of data from scientific experiments which would take long
with other types of computers.
 Data can be processed very quickly.
 Can run huge networks with hundreds terminals.

Disadvantages of mainframe

 Very expensive to purchase and run.


 Need to be placed in special room with air conditioning to reduce large amount of
heat produced.

Desktop computers/Personal computer

Personal computers can be desktops (i.e. full size computers0 designed to be used in one in
one place or laptops designed to be portable and carried and used in different places.

1
Advantages of desktop to Laptops

 Have better specification e.g. more RAM and ROM, higher capacity hard disk drive
etc.
 Keyboard is separate to screen and both can be adjusted hence user-friendly.
 Cheaper to buy and repair.
 Easier to use

Disadvantages of Desktops compared to Laptops

 They are not portable.


 There are lots of wires that need to be disconnected when moving the computers.

Laptops

These are designed to be portable. They use a touch pad instead of a mouse. There use Liquid
Crystal Displays (LCD) which use less power and light (rechargeable batteries).

Advantages of Laptops over Desktops

 Much smaller and lighter to transport.


 Can be used on your lap.
 Very convenient because of the battery.
 Can be used with multimedia systems such as data projectors
 No need to transfer data between work and home.
 Can access networks when signal is available.

Disadvantages of Laptops to Desktops

 Smaller keyboards which are difficulty to use.


 Base of laptops become hot becoming uncomfortable.
 They can be easily stolen.
 Have limited battery life.
 Pointing device is harder to use than a mouse.

Palmtops

These are handheld computers which are smaller than laptops. They can be held in palm of
one hand.

Personal digital assistant (PDA)

These are hand held computers that enable the user to keep track of meeting, appointments,
birthdays, names, addresses, telephone numbers, internet, send and receive mails.

2
Net book computers

These are smaller, lighter and less expensive compared to laptops.

Advantages of Netbook to Laptops

 Longer battery life.


 Much lighter than laptops
 Cheaper

Disadvantages of Netbooks to laptops

 Smaller keyboards make them more difficult to use.


 Difficult to read because of smaller screen.
 Hard to upgrade.
 Low performance on some task.
 Smaller hard disk hence less data to be stored.

Components of a computer

 Input devices.
 Output devices
 Secondary storage devices

The main components of a general- purpose computers

Input device-----Processor and Internal Memory devices----Output devices

Secondary storage devices

Computer hardware

These are physical components that make up a computer system which include:

Keyboard, mouse, printer, fixed hard disk, monitor, ROM/RAM, web cam, processor, circuit
board, speakers.

Input devices

These are devices used to get raw data into the computer ready for processing by the CPU.

Examples of input devices are:

The Visual Display Unit (VDU) Mouse, keyboard, touch screen, microphone etc.

3
The Visual Display Unit (VDU)

 This is sometimes referred to as the monitor.


 The screen allows the user to view and monitor data while input is being made from
another source such as keyboard, mouse etc.
 It allows the user to view the screen.
 It allows the user to scroll up and down on the screen.
 It is also regarded an output device since it displays processed data too.

Keyboard

 A keyboard is laid out like a typewriter.


 It allows data to be typed in by the pressing of the relevant keys.
 The pressed key or instruction is displayed or executed
 This is the most commonly used input devices.

Mouse

 It is a hand held pointing device electronically connected to the computer which is


used to control the cursor or a pointer on the screen through the rolling motion of ball
on a flat surface.
 The cursor or pointer on video screen moves in the same direction as the movement of
the mouse

Output Devices

These are capable of representing information from a computer.

Examples of output devices are display screens/monitors, printers, plotters, speakers etc

There are two forms of output devices which are:

 Those that produce hardcopy (permanent) e.g. printers


 Those that produce softcopy e.g. VDU

Printers

These can be used to produce

Hardcopies which are needed when copies are taken away from the computer to be sent to a
user of the information or to be filed away or even as legal document.

Documents which can be produced by a computer are reports, sales invoices payroll or
graphics.

4
Type of Printers

Printers can be classified in a number of ways

1 By print operation

 Character printers
 Line printers
 Page printers

2 By method of producing print

 Impact printers
 Non-Impact printers

3 By a page of printing

 Low speed printers


 High speed printers

Factors influencing the choice of a printer

 The cost of a printer.


 The volume of work to be printed.
 The environment in which the printer will work.
 Nature and desired quality of the document(s) to be produced.

Other forms of Computer Output

Speech Output (Sound Output

Some computers are capable of producing speech. A person voice can be stored and
reproduced later.

These methods of output are of great to blind or poor light environment.

Advanced forms of speech are used to answer telephones, answer some inquiries from an
organization’s callers etc.

Computer Output on Microforms (COM)

It is the recording of a computer output onto microfilm or microfiche (microforms) which can
be done on-line or via a magnetic tape. This is a way of data storage in which the computer
stores the data in are reduced (compacted) way on the film or fiche.

COM is most suitable where large amounts of data are processed but are to be used later e.g.
in a government registry departments (birth registration, important national statistics e.g.
population censuses.

5
Graph Plotters

These are used to plot graphs, maps and other forms of graphic onto a medium usually larger
than the size of a normal paper. They can print in different colours.

The Central Processing Unit (CPU)

It is the most important component of a computer system. It is the unit of the computer
system that includes the circuits that control the interpretation and execution of instructions

Functions of the Processor

 To control the use of the memory to store data and instructions.


 To control the sequence of operations.
 To give instruction to all parts of the computer to carry out processing

Two major subunits of the CPU are the Control Unit (CP) and the Arithmetic Logic Unit
(ALU).

The primary (main) memory is an extension of the CPU and assist the CPU in its operation

The Control Unit (CU)

 It is the nerve of the computer which controls and co-ordinates all the hardware
operations i.e. those peripheral units, main memory and the processor
 It also controls the sequence of the operation.
 The unit fetches (obtains) the instruction from the main memory.
 It then interprets it.
 It then executes the instruction by sending a command signal to the appropriate
hardware device in the computer system, ordering it to perform required operations.
 The control unit is driven by a ‘clock pulse’ the rate of the clock is called the speed.

The Arithmetic – logic Unit (ALU)

Functions

 Carries out arithmetic tasks e.g. division, addition etc.


 Performs logical operations e.g. comparing data items.

How the ALU operates

 Data items to be processed are fetched from the main memory as directed by the CU
into registers where they are stored.
 The ALU then performs the operations as directed by the CU.
 ALU leaves the result in a data register from where they are placed into the main
memory again under the direction of the CU.

6
The Main Memory

It is an extension of CPU which gives immediate access to data and programs. It can also be
known as Immediate Access Memory (IAS).

Three types of contents found in the main memory are:

 Program instructions to be executed or being executed.


 Data to be processed
 Results of processing

The Random Access Memory (RAM)

 This forms the largest part of the Main Memory and is often used to measure the
power of a computer.
 It is used for temporary storage of data and programs during processing
 It contains user data and application programmes being processed.
 Data may be read from RAM and data can also be written on RAM.
 RAM contents are volatile i.e. stored data is lost and the contents disappear if the
power is interrupted or when computer is switched off.

Storage Capacity on RAM

 The number of storage locations in RAM dictates the storage capacity or size of the
computer.
 Storage on computer is quoted in kilobytes (Kb) megabytes (Mb).

The Read Only Memory (ROM)

 It is used for the permanent storage.


 It holds the software programs such as operating systems.
 The programs are written as part of the manufacturing process and the user cannot
alter them.
 ROM cannot be written on.
 It only allows its contents to be read.
 It contains instructions that the computer needs all the time from the moment it is
switched on.
 ROM contents are non volatile i.e. they do not disappear or get lost when the
computer is switched off or when the power to the computer has been interrupted.

Other Types of ROM

 PROM - Programmable Read Only Memory- can be programmed by the user, the
data and instructions are held permanently once PROM is programmed.
 EPROM – Erasable Programmable Read Only Memory – it is like PROM but can
be erased thus reprogrammed. The EPROM must be removed from the computer
in order to be erased thus the complete program has to be reinserted.
 EAROM –Electrically Alterable Read Only Memory – It can be read, erased and
written on by electrical methods without removing it from the computer.
7
Secondary Storage Devices

These are devices that are used for storing programs and data that is not instantly needed by
the computer. They are also used for long term storage of programs as well as backup copies
in case the original data are lost. These are also called backing storage or auxiliary storage.
They are used to supplement the main memory. Backing storage is used to hold programs and
data files when they are not required in the main memory. The speed of accessing backing
storage is much slower than that for accessing in Immediate Access Memory.

Backing Disk Drive

 Portable hard disk


 Floppy Disk Drive.
 External hard drive.
 USB drive (flash).
 Memory card.
 Optical disks (CD ,DVD)
 Flash memory cards.
 Memory sticks.
 Magnetic tape.

Computer software

Software refers to computer programs that control the working of the computer hardware,
along with the program documentation used to explain the programs to the user or It is the
collective noun describing the programs that are used to give instructions to the computer.

Computer programs are set of instructions or statements to the computer that direct the
circuitry within the hardware to operate in a certain in a certain fashion

Three different categories

 System software
 Application software
 Development software

System Software

It is a collection of programs that interact with the computer hard ware and application soft
programmes creating a layer of insulation between the two. It contains instructions which:

 Manage a computer system’s hardware components to coordinate them so that they


work efficiently.
 Schedule the computer’s time to make the best use of that time.

Systems Software includes a variety of programmes such as:

 Operation systems database management systems


 Communication control programs.
 Services and utility programs
8
 Programming language translators.

Operating Systems

These are programs that allow the hardware to run properly e.g. windows 10

This forms the largest component of systems software

 It is the system of programs that run or control the execution of computer programs and acts
as an interface with application programs.
 It is an integrated system of programs that manage the operations of the CPU, controls the
input, output and storage resources and activities of a computer system.
 The primary purpose of the operation system is to maximise the productivity of a computer
system.
 It minimises the amount of user intervention required during the data entry and processing.
 It helps application programs perform common operations such as entering data, saving,
retrieving files, printing and displaying output.

Functions of Operation System

 User Interface
 Operating Environment Management.
 Resource Management.
 File management.
 Task management.

APPLICATION SOFTWARE

 Applications programs are designed to help the user carry out specific tasks for example to
manipulate figure or write texts.
 This also consists of programs written to solve particular user-oriented problems.
 It performs specific activities or tasks e.g. Accounts payable, accounts receivable, automatic
teller machines inventory control, library operations and control etc.

Categories of generic application

Programs that allow the user to do specific tasks e.g. spreadsheet

Word Processing

A word processing package is designed to enable text to be typed and manipulated

Popular Word-processing packages are Microsoft Word, Lotus Word, and Word Perfect etc.

9
Advantages

 It has ability to edit parts of the text without rewriting the whole document.
 Allows for spell checking.
 Allows for centering text, bold underline and use of variety of fonts.
 Allows for the production of multiple original copies from one softcopy.

Spreadsheet

 A spreadsheet package is used to perform calculations that have been entered onto a grid.
 Formulae are entered into the grid using the figure change; the results of the formulae are
updated automatically.
 It is also possible to filter (select only the required data), sort or perform other forms of data
manipulations.
 It is possible to produce graphs, charts and other forms of comparison using the entered
figures from the spreadsheet.
 Popular examples of spreadsheet packages are: Microsoft Excel, Lotus 1-2-3, Quattro Pro

Database

 A database is an organised store of information, for an example an address book, list of


employees, list of students, customers or items of assets.
 A database package is used to store records.
 Data can be sorted, filtered for separate viewing.
 Calculations and comparisons between data items can be done.
 Popular database packages are: Microsoft Excel, Lotus Approach, Paradox, dBase IV, Data
Ease

Graphics

 These are applications designed solely for designing graphs and text charts/posters
 They are often used to produce slides for use on overhead projectors, or presentations on
computer-projectors.
 Various types of charts are also produced
 Examples of graphics packages are: Microsoft PowerPoint, Lotus Freelance, Harvard
Graphics, Corel Draw.

Desktop Publishing

 Desktop Publishing (DTP) applications give users powerful and versatile page design
capabilities.
 The user can incorporate text and graphics on very exact page layouts.
 The applications produce magazines, catalogues, invitation cards, business cards and other
sophisticated documents.
 The application links up well with other applications as the user can import text and graphics
from the other applications.
 Examples of DTP packages are: Microsoft Publisher, PageMaker, Ventura and Frame maker.

10
Suites

Many applications are grouped together into suites which users can purchase as one product
containing, for example, word processing, a Spreadsheet, Graphics application, Desktop
Publishing, Database application.

The following is the criteria for selecting applications software:

 Accuracy – it must be from errors


 Flexibility – must be able to adapt to changing environment.
 Compatibility – it must be compatible with available hardware
 Recency- it must be current
 Cost – it must have reasonable cost
 Originality – it must be original
 Support – consider continued support from the supplier
 Ease of use – it must be user friendly
 Performance – it must have efficiency in both response time and run time

Sources of Applications Software

 Three main sources of applications are:


 In –house
 Off-the shelf
 From the contractor

In – house Developed software

This approach requires a development team from within the organisation. The team is usually
comprised of programmers and analysts. The team members should be highly trained and reliable.

Advantages

 Internal professionals understand operations better and therefore can produce an accurate
solution.
 The software usually meets user requirements.
 Management are in total control of the development process.
 More flexibility in making modification.
 Problems specificity- in-house developed software which can give an organisation software
programs that are easily tailored to a unique problem or task.

Disadvantages

 Time and cost of developing the program may be greater than other options.
 In- house staff may lack the expertise needed for the project.
 Reliability of the resultant software is highly questionable.
 In some cases the developers may attempt to gain fraudulently from the system.

11
Off- the shelf

This is software that can be purchased, leased, or rented from a software company that develops
programs and sells them to many computer users and organisations. Applications such as financial
accounting, business graphic and pay roll may be bought.

Advantages

 Cheaper – the software company is able to spread the software development cost over a large
number of customers, hence reducing the cost any one customer must pay.
 Less risky – the software is existing, hence you can analyse the features and performance of a
package.
 The programme is well –tried and tested product with few errors.
 Less time- Off-the –shelf software is often installed quickly and easily.
 The package is well documented.
 The packages require little maintenance.
 There is continued support from the supplier through upgrades.

Disadvantages

 The organisation might need to pay for the features that are not required and never used.
 The package may be for general needs and therefore not ideal for the user.
 The user has no direct control over the package.

Software from the contractor

This will involve contracting out software development to a software house- better known as
outsourcing especially where off-the-shelf are not available.

Advantages

 Software houses employ professionals and this may benefit the organisation.
 Transfer of skills to the existing professionals in an organisation.
 Organisation can get support from the contractor.

Disadvantages

 There could be breach of confidentiality.


 Contractor may go bankrupt and cease trading leaving the user with no support
 Contractor might not have sufficient experience or understanding of the problem thus the
solution might not be satisfactory.
 It takes time for the contractor to understand the user’s business and operations this makes the
approach expensive.

DEVELOPMENT SOFTWARE

 It allows the user to create software for various applications


 All software programs (systems and applications) are written in coding schemes called
programming languages.
 The primary function of a programming language is to provide instructions to the computer
system so that it can perform a processing activity to achieve an objective or solve a problem.
 Program code is the set of instructions that signal the CPU to perform circuit –switching
operation
12
There are categories of programming language which are

 Low-level languages.
 High-level languages.
 Fourth generation languages.

More details for each language

Computer network systems

A network is the number of computers connected through some channel so that they may share some
of the resources and allow access into them by users from other points.

Advantages of networking

 Resources can be shared e.g. printers, computer files and programmes.


 More even distribution of processing and other work by computers and users.
 More economic and fuller use of computers.
 Allow for the provision of local facilities without lost of central control.
 Mutual support and a spirit of cooperation exist.

Disadvantages of net working

 There could be congestion at the shared resources.


 Control of information and confidentiality may be lost.
 The cost of system may be considerable.
 Virus and other forms of corruption to programmes spread faster.

Wide Area Networks (WAN)

These are networks that spread over large geographical areas. It is a long distance network of
interconnected computer on separate sites, cities or even different countries such telephone system.

LAN Topologies

Topologies are ways in which a network can be structured or arranged depending on the resources, the
needs and the structure of given organisation.

Different types of topologies

Star Topology-There is a central node, the server (which could be a mini computer or microcomputer
to which all other computers are connected. All the processing and storage are done by the host
(central computer). There is no direct inter-terminal communication. The network is suitable for use
in offices and homes.

13
Advantages

 It is easy t trouble shoot.


 It is economic and offers intensive use of the terminal.
 Require a single intelligent computer; terminals could be dump thereby saving on the cost of
the network.
 Each terminal has direct and quicker access to the host

Disadvantages

 It is prone to failure – failure of the node mean loss and break down to the whole system.
 The cabling may be costly.
 Virus can be transmitted easily within the network.

Bus (Multi-drop) Topologies

All the computers are connected to a linear transmission medium called bus through the use of a tap.
The tap is used to create a link up to medium and to the network. This network handles higher traffic.

Advantages

 Cost of setting up and maintaining the network are low.


 Each terminal can communicate directly with any other on the network.

Disadvantages

 Risk of network malfunction.


 Are more troublesome than the star topology.
 Trouble shooting is more difficult.
 There is the risk of data collision.

Ring Topology

It is made up of nodes connected to each other to form a closed loop. Each loop can accept data
transmitted to it from an immediate neighbour and forward data not addressed to it to the next
neighbour. Messages are transmitted in packets or frames. Each node has an address and packet is
delivered to the node bearing the address required.

Advantages

 There is by-pass technology so that messages can be passed on from a failed workstation-
breakdown of workstation does not affect the network much.
 It is easy to install.
 There is less risk of packet collision.
 More accurate and reliable.

Disadvantages

 There is poor response time.


 There is risk of data interception so ther should be data encryption.
 Unwanted data may continue to circulate the network, thus reducing traffic carrying capacity
of the network.
14
Mesh Topology

This topology combines the ring and star topologies. Bi- directional links are established. This offers
better communication and reduces the risk of data collision because of the existence of alternative
routes. The network has quick response time and is very accurate however; the costs of cabling are
quite considerable.

Hierarchical (Tree) Topology

The nodes are connected to form a hierarchy. Messages are passed along the branches until they reach
their destinations. These networks do not need a centralised computer that controls communications.
These are also very easy to troubleshoot and repair because the branches can be separated and
serviced separately.

Mixed Topologies

Various topologies are combined into one network.

LAN concerns for the Manage

 Costs- of connection- cables and software.


 Compatibility of the hardware and software.
 Appointment of a network manager where necessary.

The Internet

The internet is a worldwide network of computer systems. There are many organisations that offer
internet service. These are called web browser is required Internet Service Providers (ISP). If you
want to explore the Internet, a web browser is required. A web browser contains programmes that
assist in surfing of the internet. The most used web browser is Microsoft Internet Explorer.

The following are necessary for internet

Web site, web address, facilities on the Internet.

Electronic Mail

It is commonly referred to as the e-mail. Every user of the e-mail has a unique address e.g.
memasawi@gmail.com. E-mail messages are sent from user to user on computer network with
message being stored in the recipient’s mailbox or inbox. E-mail allows for the sending of attachment.
These are files that contain greater detail. One can even send a CV, an assignment or other document
using e-mail. Internet provides many facilities and the e-mail is only one of them.

Advantages of e-mail

Speed

 Messages are received instantly.


 Provides certainty of delivery of mail.
 Reading, sending replies, redirecting massages is faster.

Cost

 Generally cheaper than ordinary mail.


 Less or no paper used.

15
Time

 Less time spent on the phone waiting to be put through, finding people, holding the line
because line is engaged and leaving messages and having to call again.

Flexibility

 Anyone with a PC at home can send and receive message out of office hours.
 Messages can be sent and received at any computer that is linked to the network.

Disadvantages of e-mail

Delay

 If a recipient takes long to log on, the speed advantage is lost.


 It there is a problem with the recipient’s server, one may not know immediately if the
message has been received or not.

Information Overload

 Some there may be too many messages.


 Some important or urgent messages are overlooked.

Junk mail

 There may be lots of unwanted messages received.

Breakdowns

 Often log on problems may result in messages not being sent or received.

Security

 There is the concern about security of confidential on that is sent and or received.

Intranet

It is the network of computer usually within a company that uses e-mail and browser software but is
not part of the internet. Employees can use the Internet to access information related to the company
such as training, social activities, job opportunities and product information.. it enables employees to
share information

E- Commerce

It involves the internet transaction of goods and service to businesses and consumer and can include:

 Retail- you can buy virtual anything on the Internet e.g. books.
 Banking there are online banking facilities that allow the payment of bills snd access of
balances
 Travel arrangement- airline and rail tickets can be bought and sold on the internet and
bookings made thereon.

Consumers connect to the online service and can then order goods and pay for these using a credit or
debit card

16
Computer and Health and Safety

Computers and computer have negative health effects on the user.

The main effects are

 Repetitive Strain Injury (RSI).


 Eye strain from VDU use.
 Bad posture.
 Risk of an accident.
 Exposure to radiation.

Repetitive Strain Injury

This refers to disorder that affect the hands, wrist, arms, shoulder or neck of computer operators. It is
inflammation of the joints and is caused by making the same small movements over and over again.
This can cause pain, numbness, swelling and the inability to lift or grip objects in some cases
operators have become permanently disables

To reduce RSI

 Make sure the desk and chair are at suitable heights.


 Sit at a comfortable distance from the keyboard.
 Make sure that lower arms are horizontal and wrists straight when using a keyboard or
mouse.
 Use a wrist rest if necessary so that you do not rest your wrist on the edge of the table or
keyboard.
 Take frequent breaks to stretch your arms and fingers

Eye Strain from VDU

Using the VDU for periods at a time may affect a user’s eye and in some instance cause headaches.

To reduce eye strain

 Desk and VDUs area arranged to avoid glare or bright reflections on the screen.
 Arrange desks so that user is not looking at windows or lights.
 Use curtains and window blinds.
 Sharply focus VDU so that characters don not move and flick.
 Have regular eye tests.
 Adjust screen brightness and contrast to suit lighting conditions.
 Adjust the angle of screen to your sitting height.
 Keep screen clean
 Take a break every 20-30 minutes.

Posture

Sitting incorrectly or without right support at a computer terminal for along periods may result in
back, neck and upper arm pains.

17
To reduce posture related problems

 Use adjustable chairs to adjust height.


 Use adjustable backrests.
 Use swivel chairs.
 Use footrest.
 Always sit well.
 Always sit well.
 Change sitting position regularly.
 Take frequent short breaks.

Risk of Accident

If it may be necessary to shift a computer, if not done properly may result in injury to the worker.
There may also be problems relating to power and failing over of computer equipment that is not put
up properly.

Risks of Exposure Radiation

Some computer equipment produces radiation that has long –tem effects on users or unborn babies.

Requirements of a Computer Environment (Computer Room)

Ventilation – a good room has to be adequately ventilated if ventilation is poor the computer may
over heat and thus fail to operate.

Power supply- power supply should be of the right voltage and supplied from safe socket outlet.
Power cables should not cross the room to avoid interfering with free movements.

Use of Uninterrupted Power Supplies (UPS) - in the event of unanticipated power loss there should
be some standby power alternative so that the users’ information is not lost.

Curtains- Curtains reduce the amount of light getting to the screen and other computer equipment.
Light damages screen.

Lockable doors- doors should be lockable to avoid unauthorized access to the computers or theft or
vandalism of the computer system. The key should be kept with some responsible person.

Attach computer permanently to desks using clamps to avoid theft of the computers.

Have all equipment serial numbers for use if equipment is stolen.

18
Data Security

This refers to measures taken to reduce unauthorized access to use and destruction of an
organisation’s data and data resources. Data itself is at risk of accidental or deliberate loss and theft.

Security of Data

Data itself is at risk of accidental or deliberate loss and theft

Accidental Loss

 Document is accidentally deleted.


 Computer breakdown or power fails.
 File or disk becomes corrupted.
 File is destroyed by fire or floods.

To reduce the risk of loss to accidental loss there is use of back up of data- there should be a saved
copy of the original file that is kept on a different medium and place.

Deliberate Damage

This is loss of data by viruses or hackers.

Viruses

A computer virus is a harmful program that copies itself onto other programmes and destroys the or
interferes with their proper functioning.

Presence of viruses can be noticed by:

 Displaying of messages.
 Deleting data and programme files.
 Failure of computer to detect peripherals.
 Display of irritating messages or images.
 Exaggerated file and document sizes.
 Unwanted formatting of hard disk.
 Playing music.
 Computer fails to boot up.

Viruses are transmitted from computer to computer. They copy themselves quickly. Effects of viruses
may be mild to severe. Some are viruses are harmless and computers may operate normally.

Characteristics of viruses

 Copies itself.
 Hide.
 Frequently spread by attachments in emails or by instant messaging messages.
 Can spread through downloads on the internet.

19
To reduce the risk of viral infection

 Use anti-virus software.


 Use genuine software.
 Write protect all software programs.

Database Concepts

A database is a single organized collection of structured data it is a collection of related files that are
stored in a uniformed way for ease of access. It can also be defined as a collection of logically related
records or files previously stored separately so that a common pool of data records is formed.

Advantages of Database

 Easier data sharing leading to economies of scale.


 Reduce data redundancy.
 Improved data consistency.
 Improved data independence.
 Increased application programmer productivity.
 Improved data administration.
 Increased emphasis on data as a resource.

Disadvantages of Databases

Concurrence problems- where more than one user access and attempt to update the same record at
the same time- there is file edit locking to prevent this.

Ownership problems- sometimes some individuals tend to own the data and thus refuse access by
other individuals or departments in the organisation.

Resource problems – with database extra resources are needed e.g. more work stations and other
devices.

Security problems- there is increased exposure to unauthorized entry into the data this could be
reduced by the use of regularly changed passwords and by physically denying access to unauthorized.

The database Management System (DBMS)

It is a complex system of software that constructs, expands and maintains the database. It provides a
controlled interface between the database and the user.

Functions of the DBMS

 Allocates storage space to data.


 It maintains indices to allow for easy access to data items.
 It allows for the addition, editing and deletion of files in the database.
 Provides an interface with user programmes which may be written in different programming
languages.
 Provides different ways of processing files.
 Provide security for the data in the database through denying unauthorized access to data,
preventing data corruption and proving data recovery in the case of failure
 Keeps a record of statistics of the use of data in the database, this assists in removal of
redundant ( duplicated) data, it also keeps frequently used data more accessible

20

You might also like