Professional Documents
Culture Documents
What is a computer?
It is a programmable machine.
It is a device that has ability to accept data, internally store and execute a program of
instructions, perform mathematical, logical and manipulative operations on the data
and reports on results.
In other simple terms, it is a machine that accepts data (input) and processes it into
useful information (output).
Information Technology
Categories of computers
These are sophisticated and powerful computers that are used in very large companies and
organisations. They are used to control huge networks of computers often located globally.
For example car manufacturers, government departments, large chain supermarkets, weather
forecasts, etc.
Can process huge amounts of data from scientific experiments which would take long
with other types of computers.
Data can be processed very quickly.
Can run huge networks with hundreds terminals.
Disadvantages of mainframe
Personal computers can be desktops (i.e. full size computers0 designed to be used in one in
one place or laptops designed to be portable and carried and used in different places.
1
Advantages of desktop to Laptops
Have better specification e.g. more RAM and ROM, higher capacity hard disk drive
etc.
Keyboard is separate to screen and both can be adjusted hence user-friendly.
Cheaper to buy and repair.
Easier to use
Laptops
These are designed to be portable. They use a touch pad instead of a mouse. There use Liquid
Crystal Displays (LCD) which use less power and light (rechargeable batteries).
Palmtops
These are handheld computers which are smaller than laptops. They can be held in palm of
one hand.
These are hand held computers that enable the user to keep track of meeting, appointments,
birthdays, names, addresses, telephone numbers, internet, send and receive mails.
2
Net book computers
Components of a computer
Input devices.
Output devices
Secondary storage devices
Computer hardware
These are physical components that make up a computer system which include:
Keyboard, mouse, printer, fixed hard disk, monitor, ROM/RAM, web cam, processor, circuit
board, speakers.
Input devices
These are devices used to get raw data into the computer ready for processing by the CPU.
The Visual Display Unit (VDU) Mouse, keyboard, touch screen, microphone etc.
3
The Visual Display Unit (VDU)
Keyboard
Mouse
Output Devices
Examples of output devices are display screens/monitors, printers, plotters, speakers etc
Printers
Hardcopies which are needed when copies are taken away from the computer to be sent to a
user of the information or to be filed away or even as legal document.
Documents which can be produced by a computer are reports, sales invoices payroll or
graphics.
4
Type of Printers
1 By print operation
Character printers
Line printers
Page printers
Impact printers
Non-Impact printers
3 By a page of printing
Some computers are capable of producing speech. A person voice can be stored and
reproduced later.
Advanced forms of speech are used to answer telephones, answer some inquiries from an
organization’s callers etc.
It is the recording of a computer output onto microfilm or microfiche (microforms) which can
be done on-line or via a magnetic tape. This is a way of data storage in which the computer
stores the data in are reduced (compacted) way on the film or fiche.
COM is most suitable where large amounts of data are processed but are to be used later e.g.
in a government registry departments (birth registration, important national statistics e.g.
population censuses.
5
Graph Plotters
These are used to plot graphs, maps and other forms of graphic onto a medium usually larger
than the size of a normal paper. They can print in different colours.
It is the most important component of a computer system. It is the unit of the computer
system that includes the circuits that control the interpretation and execution of instructions
Two major subunits of the CPU are the Control Unit (CP) and the Arithmetic Logic Unit
(ALU).
The primary (main) memory is an extension of the CPU and assist the CPU in its operation
It is the nerve of the computer which controls and co-ordinates all the hardware
operations i.e. those peripheral units, main memory and the processor
It also controls the sequence of the operation.
The unit fetches (obtains) the instruction from the main memory.
It then interprets it.
It then executes the instruction by sending a command signal to the appropriate
hardware device in the computer system, ordering it to perform required operations.
The control unit is driven by a ‘clock pulse’ the rate of the clock is called the speed.
Functions
Data items to be processed are fetched from the main memory as directed by the CU
into registers where they are stored.
The ALU then performs the operations as directed by the CU.
ALU leaves the result in a data register from where they are placed into the main
memory again under the direction of the CU.
6
The Main Memory
It is an extension of CPU which gives immediate access to data and programs. It can also be
known as Immediate Access Memory (IAS).
This forms the largest part of the Main Memory and is often used to measure the
power of a computer.
It is used for temporary storage of data and programs during processing
It contains user data and application programmes being processed.
Data may be read from RAM and data can also be written on RAM.
RAM contents are volatile i.e. stored data is lost and the contents disappear if the
power is interrupted or when computer is switched off.
The number of storage locations in RAM dictates the storage capacity or size of the
computer.
Storage on computer is quoted in kilobytes (Kb) megabytes (Mb).
PROM - Programmable Read Only Memory- can be programmed by the user, the
data and instructions are held permanently once PROM is programmed.
EPROM – Erasable Programmable Read Only Memory – it is like PROM but can
be erased thus reprogrammed. The EPROM must be removed from the computer
in order to be erased thus the complete program has to be reinserted.
EAROM –Electrically Alterable Read Only Memory – It can be read, erased and
written on by electrical methods without removing it from the computer.
7
Secondary Storage Devices
These are devices that are used for storing programs and data that is not instantly needed by
the computer. They are also used for long term storage of programs as well as backup copies
in case the original data are lost. These are also called backing storage or auxiliary storage.
They are used to supplement the main memory. Backing storage is used to hold programs and
data files when they are not required in the main memory. The speed of accessing backing
storage is much slower than that for accessing in Immediate Access Memory.
Computer software
Software refers to computer programs that control the working of the computer hardware,
along with the program documentation used to explain the programs to the user or It is the
collective noun describing the programs that are used to give instructions to the computer.
Computer programs are set of instructions or statements to the computer that direct the
circuitry within the hardware to operate in a certain in a certain fashion
System software
Application software
Development software
System Software
It is a collection of programs that interact with the computer hard ware and application soft
programmes creating a layer of insulation between the two. It contains instructions which:
Operating Systems
These are programs that allow the hardware to run properly e.g. windows 10
It is the system of programs that run or control the execution of computer programs and acts
as an interface with application programs.
It is an integrated system of programs that manage the operations of the CPU, controls the
input, output and storage resources and activities of a computer system.
The primary purpose of the operation system is to maximise the productivity of a computer
system.
It minimises the amount of user intervention required during the data entry and processing.
It helps application programs perform common operations such as entering data, saving,
retrieving files, printing and displaying output.
User Interface
Operating Environment Management.
Resource Management.
File management.
Task management.
APPLICATION SOFTWARE
Applications programs are designed to help the user carry out specific tasks for example to
manipulate figure or write texts.
This also consists of programs written to solve particular user-oriented problems.
It performs specific activities or tasks e.g. Accounts payable, accounts receivable, automatic
teller machines inventory control, library operations and control etc.
Word Processing
Popular Word-processing packages are Microsoft Word, Lotus Word, and Word Perfect etc.
9
Advantages
It has ability to edit parts of the text without rewriting the whole document.
Allows for spell checking.
Allows for centering text, bold underline and use of variety of fonts.
Allows for the production of multiple original copies from one softcopy.
Spreadsheet
A spreadsheet package is used to perform calculations that have been entered onto a grid.
Formulae are entered into the grid using the figure change; the results of the formulae are
updated automatically.
It is also possible to filter (select only the required data), sort or perform other forms of data
manipulations.
It is possible to produce graphs, charts and other forms of comparison using the entered
figures from the spreadsheet.
Popular examples of spreadsheet packages are: Microsoft Excel, Lotus 1-2-3, Quattro Pro
Database
Graphics
These are applications designed solely for designing graphs and text charts/posters
They are often used to produce slides for use on overhead projectors, or presentations on
computer-projectors.
Various types of charts are also produced
Examples of graphics packages are: Microsoft PowerPoint, Lotus Freelance, Harvard
Graphics, Corel Draw.
Desktop Publishing
Desktop Publishing (DTP) applications give users powerful and versatile page design
capabilities.
The user can incorporate text and graphics on very exact page layouts.
The applications produce magazines, catalogues, invitation cards, business cards and other
sophisticated documents.
The application links up well with other applications as the user can import text and graphics
from the other applications.
Examples of DTP packages are: Microsoft Publisher, PageMaker, Ventura and Frame maker.
10
Suites
Many applications are grouped together into suites which users can purchase as one product
containing, for example, word processing, a Spreadsheet, Graphics application, Desktop
Publishing, Database application.
This approach requires a development team from within the organisation. The team is usually
comprised of programmers and analysts. The team members should be highly trained and reliable.
Advantages
Internal professionals understand operations better and therefore can produce an accurate
solution.
The software usually meets user requirements.
Management are in total control of the development process.
More flexibility in making modification.
Problems specificity- in-house developed software which can give an organisation software
programs that are easily tailored to a unique problem or task.
Disadvantages
Time and cost of developing the program may be greater than other options.
In- house staff may lack the expertise needed for the project.
Reliability of the resultant software is highly questionable.
In some cases the developers may attempt to gain fraudulently from the system.
11
Off- the shelf
This is software that can be purchased, leased, or rented from a software company that develops
programs and sells them to many computer users and organisations. Applications such as financial
accounting, business graphic and pay roll may be bought.
Advantages
Cheaper – the software company is able to spread the software development cost over a large
number of customers, hence reducing the cost any one customer must pay.
Less risky – the software is existing, hence you can analyse the features and performance of a
package.
The programme is well –tried and tested product with few errors.
Less time- Off-the –shelf software is often installed quickly and easily.
The package is well documented.
The packages require little maintenance.
There is continued support from the supplier through upgrades.
Disadvantages
The organisation might need to pay for the features that are not required and never used.
The package may be for general needs and therefore not ideal for the user.
The user has no direct control over the package.
This will involve contracting out software development to a software house- better known as
outsourcing especially where off-the-shelf are not available.
Advantages
Software houses employ professionals and this may benefit the organisation.
Transfer of skills to the existing professionals in an organisation.
Organisation can get support from the contractor.
Disadvantages
DEVELOPMENT SOFTWARE
Low-level languages.
High-level languages.
Fourth generation languages.
A network is the number of computers connected through some channel so that they may share some
of the resources and allow access into them by users from other points.
Advantages of networking
These are networks that spread over large geographical areas. It is a long distance network of
interconnected computer on separate sites, cities or even different countries such telephone system.
LAN Topologies
Topologies are ways in which a network can be structured or arranged depending on the resources, the
needs and the structure of given organisation.
Star Topology-There is a central node, the server (which could be a mini computer or microcomputer
to which all other computers are connected. All the processing and storage are done by the host
(central computer). There is no direct inter-terminal communication. The network is suitable for use
in offices and homes.
13
Advantages
Disadvantages
It is prone to failure – failure of the node mean loss and break down to the whole system.
The cabling may be costly.
Virus can be transmitted easily within the network.
All the computers are connected to a linear transmission medium called bus through the use of a tap.
The tap is used to create a link up to medium and to the network. This network handles higher traffic.
Advantages
Disadvantages
Ring Topology
It is made up of nodes connected to each other to form a closed loop. Each loop can accept data
transmitted to it from an immediate neighbour and forward data not addressed to it to the next
neighbour. Messages are transmitted in packets or frames. Each node has an address and packet is
delivered to the node bearing the address required.
Advantages
There is by-pass technology so that messages can be passed on from a failed workstation-
breakdown of workstation does not affect the network much.
It is easy to install.
There is less risk of packet collision.
More accurate and reliable.
Disadvantages
This topology combines the ring and star topologies. Bi- directional links are established. This offers
better communication and reduces the risk of data collision because of the existence of alternative
routes. The network has quick response time and is very accurate however; the costs of cabling are
quite considerable.
The nodes are connected to form a hierarchy. Messages are passed along the branches until they reach
their destinations. These networks do not need a centralised computer that controls communications.
These are also very easy to troubleshoot and repair because the branches can be separated and
serviced separately.
Mixed Topologies
The Internet
The internet is a worldwide network of computer systems. There are many organisations that offer
internet service. These are called web browser is required Internet Service Providers (ISP). If you
want to explore the Internet, a web browser is required. A web browser contains programmes that
assist in surfing of the internet. The most used web browser is Microsoft Internet Explorer.
Electronic Mail
It is commonly referred to as the e-mail. Every user of the e-mail has a unique address e.g.
memasawi@gmail.com. E-mail messages are sent from user to user on computer network with
message being stored in the recipient’s mailbox or inbox. E-mail allows for the sending of attachment.
These are files that contain greater detail. One can even send a CV, an assignment or other document
using e-mail. Internet provides many facilities and the e-mail is only one of them.
Advantages of e-mail
Speed
Cost
15
Time
Less time spent on the phone waiting to be put through, finding people, holding the line
because line is engaged and leaving messages and having to call again.
Flexibility
Anyone with a PC at home can send and receive message out of office hours.
Messages can be sent and received at any computer that is linked to the network.
Disadvantages of e-mail
Delay
Information Overload
Junk mail
Breakdowns
Often log on problems may result in messages not being sent or received.
Security
There is the concern about security of confidential on that is sent and or received.
Intranet
It is the network of computer usually within a company that uses e-mail and browser software but is
not part of the internet. Employees can use the Internet to access information related to the company
such as training, social activities, job opportunities and product information.. it enables employees to
share information
E- Commerce
It involves the internet transaction of goods and service to businesses and consumer and can include:
Retail- you can buy virtual anything on the Internet e.g. books.
Banking there are online banking facilities that allow the payment of bills snd access of
balances
Travel arrangement- airline and rail tickets can be bought and sold on the internet and
bookings made thereon.
Consumers connect to the online service and can then order goods and pay for these using a credit or
debit card
16
Computer and Health and Safety
This refers to disorder that affect the hands, wrist, arms, shoulder or neck of computer operators. It is
inflammation of the joints and is caused by making the same small movements over and over again.
This can cause pain, numbness, swelling and the inability to lift or grip objects in some cases
operators have become permanently disables
To reduce RSI
Using the VDU for periods at a time may affect a user’s eye and in some instance cause headaches.
Desk and VDUs area arranged to avoid glare or bright reflections on the screen.
Arrange desks so that user is not looking at windows or lights.
Use curtains and window blinds.
Sharply focus VDU so that characters don not move and flick.
Have regular eye tests.
Adjust screen brightness and contrast to suit lighting conditions.
Adjust the angle of screen to your sitting height.
Keep screen clean
Take a break every 20-30 minutes.
Posture
Sitting incorrectly or without right support at a computer terminal for along periods may result in
back, neck and upper arm pains.
17
To reduce posture related problems
Risk of Accident
If it may be necessary to shift a computer, if not done properly may result in injury to the worker.
There may also be problems relating to power and failing over of computer equipment that is not put
up properly.
Some computer equipment produces radiation that has long –tem effects on users or unborn babies.
Ventilation – a good room has to be adequately ventilated if ventilation is poor the computer may
over heat and thus fail to operate.
Power supply- power supply should be of the right voltage and supplied from safe socket outlet.
Power cables should not cross the room to avoid interfering with free movements.
Use of Uninterrupted Power Supplies (UPS) - in the event of unanticipated power loss there should
be some standby power alternative so that the users’ information is not lost.
Curtains- Curtains reduce the amount of light getting to the screen and other computer equipment.
Light damages screen.
Lockable doors- doors should be lockable to avoid unauthorized access to the computers or theft or
vandalism of the computer system. The key should be kept with some responsible person.
Attach computer permanently to desks using clamps to avoid theft of the computers.
18
Data Security
This refers to measures taken to reduce unauthorized access to use and destruction of an
organisation’s data and data resources. Data itself is at risk of accidental or deliberate loss and theft.
Security of Data
Accidental Loss
To reduce the risk of loss to accidental loss there is use of back up of data- there should be a saved
copy of the original file that is kept on a different medium and place.
Deliberate Damage
Viruses
A computer virus is a harmful program that copies itself onto other programmes and destroys the or
interferes with their proper functioning.
Displaying of messages.
Deleting data and programme files.
Failure of computer to detect peripherals.
Display of irritating messages or images.
Exaggerated file and document sizes.
Unwanted formatting of hard disk.
Playing music.
Computer fails to boot up.
Viruses are transmitted from computer to computer. They copy themselves quickly. Effects of viruses
may be mild to severe. Some are viruses are harmless and computers may operate normally.
Characteristics of viruses
Copies itself.
Hide.
Frequently spread by attachments in emails or by instant messaging messages.
Can spread through downloads on the internet.
19
To reduce the risk of viral infection
Database Concepts
A database is a single organized collection of structured data it is a collection of related files that are
stored in a uniformed way for ease of access. It can also be defined as a collection of logically related
records or files previously stored separately so that a common pool of data records is formed.
Advantages of Database
Disadvantages of Databases
Concurrence problems- where more than one user access and attempt to update the same record at
the same time- there is file edit locking to prevent this.
Ownership problems- sometimes some individuals tend to own the data and thus refuse access by
other individuals or departments in the organisation.
Resource problems – with database extra resources are needed e.g. more work stations and other
devices.
Security problems- there is increased exposure to unauthorized entry into the data this could be
reduced by the use of regularly changed passwords and by physically denying access to unauthorized.
It is a complex system of software that constructs, expands and maintains the database. It provides a
controlled interface between the database and the user.
20