You are on page 1of 144

Introduction to Information

Technology
Topics
• Definition
• Data and Information
• Information Systems
• Characteristics of a Computer
• History of Computers
• Classification of Computers
Definition
• Information Technology (IT) also known as
Information and Communication(s) Technology (ICT) is
concerned with the use of technology in managing
information, especially in large organizations.
• In particular, IT deals with the use of electronic
computer system to convert, store, protect, process,
transmit, and retrieve information
• Computer is an electronic device used to input,
process, store and output data.
• Computer mimics human intelligence hence it is used
to enhance and ease human operations including
complex operations. But what is data
Data and Information
• Data is raw collection of values stored in the
computer that carry no meaning to the user. They
include
– Numbers (e.g. 1, 3.142, 0, 1001)
– Text (e.g. word, go home,!*~)`)
– Graphics (e.g. drawings, graphs, pictures, images,)
– Video (pictures in motion)
– Audio (sound)
– Program Instructions (deleting, opening, formatting)
• Processed data is called information. That is, when
data has been sorted, formatted, arranged in an
order, summed, averaged etc for inferences and
Analog Data
• Data and information is stored either as analog or
digital type.
• Analogue data is data that is continues in nature
• Time, length, mass, temperature and electric current
or music on a cassette tape are examples of analogue
data. Age for instance could be 27 years, 7 months, 2
days 12 hours, 33 minutes, 20 seconds, 99
microseconds, 60 nanoseconds and so forth and so
on.
• Non-electronic machines like watches, microwaves
and volume buttons are analogue machines.
• Computers that manage analogue data are called
Digital Data
• Digital data are discrete values that assume
precise values only. Number of objects (people,
trees and cars) is discrete.
• Electronic machines (e.g. watches and electronic
key pads or knops) present values digitally.
• Computers by default accept and process data
digitally through millions of tiny electrical
circuits. This makes of data to be presented in
an on and off (1 and 0) state. The 1 or 0 state
presentation is called binary numbers.
Information Systems (IS)
• Information systems are systems that help users obtain certain
type of value from the information
• They can be put into five categories
Office automation systems (OAS)
are used to automate routine office tasks such as creation of
documents, billing etc. The systems can built from off-the-shelf
applications, standard productivity software that most users are
familiar with. In some office systems, commercial software may
be customized to perform specific tasks but this is not always
necessary.
Transactions processing systems(TPS)
are used to handle the processing and tracking of transactions. A
transaction is an event that can occur as series of steps such as
taking and fulfilling an order for a customer, manufacturing sector.
Information Systems (IS)
Decision support systems(DSS)
are systems that collect various types of business data and are
used to generate special reports that help managers make
decisions. It may use data from a company’s transactions
processing system and from external sources such as stock
market reports, information about competitors etc.
Management information systems (MIS)
are systems designed for use by different types of managers
at different levels e.g senior, mid or low-level managers.
Expert Systems
are specialized IS that perform tasks normally done people e.g
decision making. They can approve bank loans, make large-
scale purchasing decisions and assist with medical diagnosis.
IT
IS

MIS
Characteristics of a Computer
All computers have certain common
characteristics irrespective of their type and
sizes. They can be programmed to do complex,
tedious and monotonous tasks. Computers are
what they are because of the following
characteristics
1. Word length (Capacity)
• A digital computer operates on binary digits 0s and
1s. It can understand information only in terms of 0s
and 1s. a binary digit is called a bit.
• Eight bits form a byte (also called a character). A
character include
• A digit (e.g. 9, 4 and 0),
• A letter of the alphabet (e.g. a, B and Z),
• A symbol (µ, b and p)
• Special characters (~, - and %)
• And the spaces included. The first line of this
page has 95 characters
1. Word length (Capacity)
• 1000 (precisely 1024 bytes) bytes form 1 kilobyte (KB) e.g. a page of
this manual contain approximately 4.28 KB of data
• 1000000 ((1,048,576) or 1024 KB) bytes form a megabyte (MB). A
floppy disk has 1.44 MB of data.
• Gigabyte: (G, GB) is about 1 billion bytes (1,073,741,824 bytes) or
1024 MB
• Terabyte: A terabyte (T, TB) represents about 1 trillion bytes (1,
009,511,627,776 bytes) or 1024GB
• Each other character is formed by a combination of on/off circuits. A
character like H can be represented binary by 01001000 (off, on, of,
of, on, of, off, off) circuits according to ASCII (American Standard
Code for Information Interchange) binary coding system
• The number of bits that a computer can process at a time in parallel
is called its word length. Commonly used word lengths are 8, 16, 32
or 64 bits. World length is the measure of the computing power of a
Characteristics of a Computer
2. Speed
Computers can calculate at very high speeds. A microcomputer, for
example, can execute millions of instructions per second over and over
again without any mistake. As the power of a computer increases, the
speed also increases.
3. Storage
Computers have their main memory and auxiliary memory systems. A
computer can store a large amount of data. With more and more
auxiliary storage devices, which are capable of storing huge amounts of
data, the storage capacity of a computer is virtually unlimited.
4. Accuracy
The accuracy of a computer is very high. Errors in hardware can occur,
but error detecting and correcting techniques will prevent false results.
In most cases, the errors are due to the human factors rather than the
technological.
Characteristics of a Computer
5. Versatility
Computers are versatile machines. They can perform activities ranging from simple
calculations to performing complex CAD modeling and simulation to navigating
missiles and satellites. In other words, they are capable of performing almost any task,
provided the task can be reduced to a series of logical steps.
6. Automation
The level of automation achieved in a computer is phenomenal. Once a task is
initiated, computers can proceed on its own till its completion. Computers are capable
of these levels of automation, provided they are programmed correctly.
7. Diligence
Diligence means being constant and earnest in effort and application. Human beings
suffer from weaknesses like tiredness, lack of concentration, etc. Human beings have
feelings, they become sad, dressed, bored, and negligent and it will reflect on the work
they do.
Moreover human beings cannot perform the same task over and over again with the
same precision, accuracy and enthusiasm as the first time.
Where Computers are used
Computers are virtually used in all day-to-day human
activities. The fundamental application is the keeping and
updating of records. The following are just but few selected
areas where computers have proved useful.
• In supermarkets for stock control and barcode reading to
price items.
• In hospitals for live support machines.
• In hotels and travelling agents for bookings and reservation.
• In banks for facilitating monetary transactions.
• In industry for control and monitoring manufacturing
processes.
• In police stations for matching fingerprints.
• At homes for entertainments.
Brief Computer History
The term computer originate from computing which
translates to counting or calculations. This then
implies that the history of computer development
could be dated as back to as when human beings
started computing inventions. For convenience
sake, this session narrows computing development
to start as from 1944 when significant advancement
in computing was realized. There are five major
developments from then, up date, that were made.
The stages, referred to as computer generations, are
such that the succeeding stage is actually an
improvement from the previous one.
First Generation (1944-1958)
• These are computers manufactured between 1944 and
1958
• They were designed to run one program at a time.
• Electric valves (vacuum tubes) were used to manufacture
them.
• If one were to display a character e.g 8, then 7 circuits were
needed and operated physically as;
1 1 2 3 4 5 6 7
2 3 on on on on on on on
4
8= 1 1 1 1 1 1 1
5 6
7
1
2 3 5= 1 1 0 1 0 1 1
4
5 6
7
Topics
• Decimal Numbers
• Binary Numbers
• Octal Numbers
• Hexadecimal Numbers
i. Decimal Numbers
• Are numbers composed of digits from digit 0 to digit 9.
• They are also referred to as numbers to base 10 (there
are ten digits in number). E.g 462.15 or 462.15 10.
• These are numbers that people use in measurements
and calculations
ii. Binary Numbers
• Use a combination of only two digits; 1 and 0 to
represent data, hence referred to as numbers to base 2.
• Computers use binary number system to process and
perform computations due their 1/0(on/off) electrical
circuit states they use. Eg is 110.112
Binary Number Addition and Subtraction
Binary and decimal
Decimal No. 0-3 and number Addition and
Binary Equivalence subtraction examples

Binary Decimal Binary


Number Decimal Numbers Numbers

00 Number 1+1+1=3 1+1+1=11


01 0 3-1=2 11-1=10
10 1 NB: Binary numbers are expresses as
2 (2, 4, 8, 6, 32, 64, 128 etc) E.g 2 can be
n

11 2 expressed as 10, 0010, 00000010 etc


Key Addition and Subtraction Results

Addition Subtraction

1+0=1 1-0=1
1+1=10 10-1=1
1+1+1=11 11-1=10
Addition/Subtraction
Subtraction
Examples
Addition
111
1111 -101
+ 100 10
10 11

11
1 11111
010 1
1 1 10 10
+111
10110 - 1 0 1
1 1 1
Decimal to Binary conversions
• Example. Convert 462.15 to binary
number
• The whole number part is divided
continuously by 2 to write digit 0 if
there is no remainder and write digit 1
if there is a remainder.
• The series of binary numbers are
recorded from last to first obtained
numbers.
462÷2=231 R 0
231÷2=115 R 1
115÷2=57 R 1
57 ÷2=28 R 1
28 ÷2=14 R 0
14 ÷2=7 R 0
7 ÷2=3 R 1
3 ÷2=1 R 1
1 ÷2=0 R 1
46210=111001110
The decimal part is successfully
multiplied by 2 to write digit 1 for
whole part result and digit 0 for
decimal result. Digits are listed from
the first to last
i.e 0 .15×2=0.3 R 0
0.3×2=0.6 R 0
0.6×2=1.2 R 1 etc
 0.1510=001 to three binary numbers
462.15 =111001110.001
Binary to Decimal Conversions
• In order to convert between binary and decimal numbers, we need
to understand the relationship between the digits of a given number,
the position of those digits, and the base of the number system.
• e.g convert 110.012 to base 10

Value 4 2 0 0.5 0.25


Position 22 21 20 2-1 2-2 ×
Binary 1 1 0 0 1
Product 4 2 0 0 0.25

Decimal number =sum product of value and the binary numbers


 110.012=4+2+0+0+0.25
=6.2510
iii#&iv. Hexadecimal and Octal Numbers
• Hexadecimal is a base 16
number system that uses Binary Octal Decimal Hexadecimal
digits 0-9 alongside letters 0000
0001
0
1
0
1
0
1
A-F of the alphabet. 0010 2 2 2
0011 3 3 3
• Octal number system is a 0100 4 4 4
0101 5 5 5
base 8 number system 0110 6 6 6
and uses digit 0 to 7 to 0111
1000
7
10
7
8
7
8
represent numbers 1001 11 9 9
1010 12 10 A
• They are used when 1011 13 11 B
1100 14 12 C
representing large binary 1101 15 13 D
numbers E.g 1110 16 14 E
1111 17 15 F
Blue=0000000000110011 Base-2 Base-8 Base-10 Base-16
110011002(0033CC16)
Examples of Number Conversions
Convert 1473.28 to decimal
Value 512 64 8 1 0.125
Base 83 82 81 80 8-1
value
Octal 1 4 7 3 2
Product 512 256 56 3 0.25

1473.28=512+256+56+3+0.25
=827.2510
Convert 33B.416 to base 10

Value 256 16 1 0.0625


Base value 162 161 160 16-1
Hexadecimal 3 3 B (11) 4
Product 768 48 11 0.25

33B.416=768+48+11+0.25
=827.2510
Comparing Number Systems
Consider the decimal number 827.25. The
table below gives the value of this number in
binary, octal, decimal and hexadecimal
System Number Base Length of digits
Binary 1100111011.01 2 12
Octal 1473.2 8 4
Decimal 827.25 10 5
Hexadecimal 33B.4 16 4

Note i. The smaller the base, the more the


digits
ii. Binary, octal and hexadecimal numbers all
have 2 as a common base factors. This allows
easy conversions between these numbers
Examples of Number Conversions
Example: Convert 1473.28 to base 2
Replace each digit with an equivalent 3-bit binary
number for octal numbers (8=23)

1473.2
Octal 1 4 7 3 2
Binary 001 100 111 011 010
001100111011.010

Or 4-bit binary numbers for hexadecimal numbers


(16=24)
Hexadec 33B.4
imal 3 3 B 4

0011 0011 1011 0100


Binary 001100111011.0100
Other Binary coding systems
Include
• Binary coded decimal (BCD) codes each digit using four binary
numbers into binary number rather the whole number
• e.g 3710= 3 7 =00110111
0011 0111
• Letters and other characters use 6-bit coding instead of the 4-bit
coding in numbers because there are more many number of
characters to be coded.
• Extended binary-coded decimal interchange code (EBCDIC)
extends the 6-bit binary (26=64), which can only accommodate a
maximum of 64 characters, to 8-bit binary representation (2 8=256)
to accommodate the many more types of characters that exists.
• American standard code for information interchange (ASCII) is a
widely used coding system and common in data communication. It
also uses 8-bit binary representation for each character
Example of ASCII and EBCDIC character
representation

Character ASCII EBCDIC


A 01000001 11000001
B 01000010 11000010
1 00110001 11110001
2 00110010 11110010
Assignment
1. Perform the following binary number
operations
i. 10101111+11010101,
ii. 11010001-10011111
2. Perform the following number systems
conversions
iii. 191.75 base 10 to base 2,
iv. 1100101 base 2 to base 8,
v. 1101.1010 base 2 to base 10 ,
vi. 44C.7 base 16 to base 8
First Generation
• As a result, they were bulky, extremely slow, expensive,
produced enormous heat, required physical switches
and air conditioning.
• Storage media were mainly punched cards and
magnetic tapes.
• They were used for payroll and billing processing
• 1st generation computers included IBM 650, EDVAC,
EDSAC, UNIVAC and ENIAC (Electronic Numerical
Integrator and Calculator)
• ENIAC, the first large-scale electronic computer
weighted 30 tones, filled 18000 square feet of area,
had 18000 vacuum tubes and failed after every seven
Second Generation (1959-1963)
• Used transistors (an electronic switch
that alternatively allow and disallow
passage of electric current)
• Used stacks of removable magnetic disks
as storage media
• Hence, they were smaller, more reliable
and faster but still generated lots of heat
• Examples include IBM 7000 series, LEO
mark III and ATLAS
Third Generation (1964-1970)
• Used integrated circuits-ICs (a complete
electronic circuit that packages
transistors, resistors and other electronic
components on a silicon chip)
• Used magnetic disks as storage devices
• Hence, were more powerful, compact
and reliable
• Examples include ICL 1900 series and
IBM 360 series
Fourth Generation (1971-date)
• These are computers in use today
• Use large-scale integration (LSIs) or very
large-scale integration (VLSIs) complex
ICs that put the CPU in one chip.
• Process of miniaturarization (as
manufacture of hardware size and prices
reduce, memory and disk capacity
increase) is being realized.
• Introduction of commercialized software
Fifth Generation
• Most are for future anticipation
• Expected to recognize human voice
and mimic human senses (artificial
intelligence)
• Be based on logical inferences
operations
Types of Computers
Here, computers are classified according to its
physical size, functionality and purpose
Classification According to Size
1. Super Computers
• Are the topmost types in the computer hierarchy in
terms of size and power.
• They are very large, expensive, powerful and
processes billions of instructions per second
• Are usually maintained in special environments
• Used for operations that involve enormous amounts
of data e.g. in world wide weather forecasting and
in military operations
2. Mainframe Computers
• Also housed in special environment
• Are large, powerful and process millions
of instructions per second
• Are servers support several users
simultaneously at different workstations
• Used by large corporations and
government agencies, which have
enormous and complex, data to be
processed e.g. airlines, banks and oil
companies.
3. Minicomputers
• Are general-purpose computers that support up to 100
users
• Large, less expensive and powerful next to mainframe in
the hierarchy
• Basic functional components like input/output (I/O) are
separate from the CPU
• Used in medium to small size organizations as servers
4. Microcomputers
• Smaller in size and hardware components are in one box
called the system unit
• Come in different sizes and shapes, hence referred as
personal computers (PCs)
• They include the laptop, desktop and the palmtop
Desktop
• Are placed on the desktop, therefore need neither an
elaborate environment nor air conditioning
• Can be made as a workstation in networked
environment
Laptop (notebook computer)
• Small, portable and can be placed on the lap of the user
• Generally more expensive than a desktop but perform
the same tasks as a desktop computer
Palmtop (tablet PC)
• Very small computers that fit on the palm of the user
• Allows one to write on the screen using a digital pen
• Especially useful for taking notes
Classification According to Functionality
a. Digital Computers
• Are computers that process data digitally. Most computers are
digital

b. Analog computers
• Are Computers that process analog data. Most of them are used in
worldwide weather forecasting stations.

c. Hybrid Computers
• It is a combination of computers using all quantities of both analog
and digital computers. In such computers, some calculations are
done in the analog portion of the computer and others done on the
digital portion of the same computer. Then it utilizes the services of
the devices which convert analog signals into digital and digital
signals into analog. Such units are called modems.
Classification According to Purpose
a. General Purpose are computers that are used to perform any
purpose as long as they are installed with the right software. They
perform tasks such as processing documents, calculations, accounting,
data and information management etc

b. Special purpose computers are the computers designed for specific


purpose and for a particular task e.g. robots, mobile computers/hand
held computers (small enough to fit in one hand and are used by
employees such as meter readers and delivery people), cell
phones/smart phones (PDA-personal assistant) for communications,
smart watches (an internet enabled watch that automatically adjusts to
time zone changes and store personal information) and embedded
computer that functions as a component in a larger product. They are
quick and efficient.
Computer Hardware Components
Topics
• Input
• Processing
• Storage
• Output
• Cabling devices
Computer System
• A system generally is an organized collection of parts
(or subsystems) that are highly integrated to
accomplish an overall goal.
• A computer system has three main components; the
hardware, software and Liveware.
• The hardware components are the physical items,
the software components are the programs that
instructs the hardware components to perform a
particular task and the Liveware is the user of
the computer without which the computer cannot
function
User

Software

Hardware
Computer Hardware Components

Computer hardware is the physical,


tangible parts of a computer.
It includes the keyboard, monitor, disks
wires and chips.
These can be put into five categories
namely input, processing, storage, output
and cabling devices as illustrated in the
figure below
Computer Hardware Structure

CPU
Control Unit
unit

Input Output
Input unit Arithmetic-logical Output
Bus bus
unit unit

Data bus

Memory Main
memory
Secondary
storage
Input devices
• Input devices are used to input data. They are further
classified as keying, pointing, scanning speech recognition
and other input devices.
i. Keying Devices
• Apart from keypad (a miniature keyboard used by small
computers like calculators, palm notes, mobile phone, etc)
and numeric keypad (used specifically for numbers 0-9 and
mathematical operations) and the keyboard.
ii. Pointing Devices
• Pointing devices are devices that input data by controlling a
pointer on the screen. They include the trackball (used in
laptops), joystick (commonly in video games), light pen(find
use in palmtops) and the mouse (commonly used)
The Mouse
The mouse comes with either two or three buttons with a long data cable as
shown in the figure
Gentle movement of the mouse over the mouse pad rolls the roller beneath
the mouse causing a corresponding movement of the mouse pointer to the
desired location on the screen. You will come across the following
terminologies when using the mouse
Left button
Data cable

Roller

Centre button

Right button

i.Point: move the mouse pointer to the desired location.


ii.Click: press and quickly release the left mouse button. A click often selects
an item on the screen or opens a program.
iii.Double click: two quick successive clicks. It is used as shortcuts to open
a document.
iv.Drag: click and hold while moving the pointer to a desired location
v.Drop: release the mouse button after dragging.
vi.Right-click: press and release the right mouse button. Used as short cuts
Input devices
iii. Scanners
Scanners devices that read data in the form of text,
drawings, images and pictures into digital form to be
processed and be manipulated by a computer. These
include optical (mark-end character recognition,
imaging systems and bar-code readers) and magnetic
scanners (magnetic ink character recognition-cheques
and magnetic stripe recognition-ATMs and credit cards)
iv. Voice input. Data in the form of spoken words are
input into the computer using a microphone.
v. Other Input Devices include touch screen, digitizers
and digital cameras
Central Processing Unit (CPU)
The CPU is the brain of the computer where all the
computer processing and operations take place. There are
three main parts
i. Control Unit (CU) controls the operations of the CPU by
directing all the activities in the CPU.
ii. Arithmetic and Logic Unit (ALU) does all the arithmetic
and logic operations such as calculations and comparisons.
ALU has temporary locations called registers that hold data
just before processing and results after processing. They
include storage, accumulators, instructor and address
registers.
iii. Memory: Though not exactly part of the CPU, it stores
all programs and files that are currently in use by the CPU.
Memory
Read Only Memory (ROM) is the permanent memory written by
the manufacturer and can only be read but not written by the
computer. It contains the programs that start the computer
Examples are MROM, PROM, EPROM, EEPROM, Flash
Random Access Memory (RAM) also referred to as the main
memory holds data for processing, instructions for processing
data and processed data temporarily (volatile data-data that
get lost when the computer is turned off hence need to save
it elsewhere). There are two types of RAM:
– Static RAM (SRAM) that is fast and holds data as long as there
is power and
– Dynamic RAM (DRAM) that holds power temporary even
when power is off but relatively slow
Special Purpose Memories
These are memories that increase the overall
performance of the CPU. They include buffers, registers
and cache.
• Buffers are inbuilt to the CPU and the other input/out
devices to provide temporary storage space for input
and output data to free the CPU for other processes.
• Registers are high-speed areas inside the CPU that
store data serially temporarily just before and after
processing.
• Cache memory is used in high speed processors to
store copies of frequently used instructions for the
CPU to access them there, instead of accessing the
programs from the slow DRAM or Hard disk.
Out put Devices
• The output devices receive processed data from the CPU and
produce them using suitable devices. The devices can be a
printer (produce hard copy) or a monitor (soft copy)
– Soft copy
i. Visual Display Unit (VDU)/Monitor
• Also called video display unit, monitors display interpreted
instructions input into the keyboard.
• Colour and screen resolution (picture clarity) depends on adapter
card plugged on the expansion slot
• Example of cards include Monochrome display adapter (MDA),
Hercules graphics card (HGC), colour graphic adapter (CGA) and
super video graphics adapter (SVGA)
• Most monitors are cathode ray tubes (CRTs) though flat panel
displays e.g. liquid crystal display (LCD), gas plasma and thin film
transistor (TFT) are gaining recognition in the present market.
Soft Copy Devices
ii. Sound. Sound out put come in the form
background computer processing, warning, music,
video, or interactive communication with the
computer through either and inbuilt or external
speakers.
iii. Light Emitting Diodes (LED). Diodes emit different
light colours to pass a message to the user. Some
examples include when the computer is busy saving a
document to a disk, background music is on, caps lock
on and a red for warning the user.
Hard Copy Devices
i. Printers
• Printers produce a hard copy. The information is printed on
paper and can be used when the device is off. It is also
called a printout
(a). Impact Printers
• Use ribbon just like the typewriter. Examples include dot
matrix and daisy wheel printers
Dot-matrix printers
• Uses metal pins to strike an inked ribbon to make dots on a
piece of paper. One can see the dots that make up the
letters or images. It has the lowest print quality of all of the
printers. It is rarely used today because of the poor print
quality, but still used in business to print multi-part forms.
(b) Non-Impact printers
• Use cartridges to map data onto papers. They include inkjets, laser,
and thermal printers
Ink jet printers (non-impact printer)
• Use drops of magnetic ink to produce dots on a page to produce text
or images. The print quality is almost the same as a laser printer's.
The only Problem is with the ink; it is very expensive. The ink is water
soluble and will run if the paper gets wet. For producing color
documents, it has the highest quality at a reasonable price.
Laser printers (non-impact printer)
• How the laser printer produces an image:
• A laser or LEDs make dots on a light sensitive drum. Toner (very tiny
particles of plastic) stick to the drum where the dots are made. Paper
is pressed against the drum and the toner is placed on the paper. The
paper is heated and the toner melts into the paper. Produces the
highest quality printouts. Printout is permanent, Color laser printers
are still fairly expensive
ii. Plotters are used to produce big charts, pictures and drawings.
Storage (Auxiliary) Devices/Secondary
Memory
• Are used to store information that is not immediately needed by the
CPU.
• Storage media such as magnetic tapes (absolute), punched cards
(also absolute), magnetic disk (e.g. floppy (drive A:), jazz and zip
disks), optical disk (e.g. Compact disk-CD, Digital versatile disks-
DVDs), come with separate disk drives are referred to as removable
media.
• The hard disk (drive C:) is embedded in its drive thus referred to as
non-removable media.
• CDs can store large volume (GB, MB) of data hence good in storing
music, video clips or software. They are CD-ROM (read only), CD-R
(recordable) or CD-RW (re-writeable).
• CD-ROMs and CD-Rs are called WORM (write once read many)
• Flash disks that can hold up to or more than 2GB of data are small,
portable and use laser technology to store data
Cabling Devices
Cabling devices are the physical connections of the computer
parts and its peripherals. The computer linkage is to transfer
either power through power cables or transfer information (data
cables)
i. Power Cables
This refers to the cables that power the computer devices and
drives. They come in differences size depending on the
connecting device. Flash disks for instance need less power than
hard disk drive, hence its power cable is thinner.
ii. Data Cables
Or sometimes referred to as interface cables are cables that
transmit data.
(a). Ports A port is a socket usually at the back of the system unit
that is used to con connect data cable between peripherals and
(a) Ports
• Serial Ports transmit data bit by bit over relatively longer cables,
therefore are slow but are reliable. Used by communication
devices hence labeled COM1, mouse and sometimes printers.
• Parallel Ports transmit a number (e.g 2, 4, 8, 16, 32, 64, etc) of
data bits simultaneously faster over short distances. They are
used by removable storage devices e.g. a CD and printers.
• Universal Serial Bus (USB) serial but set to replace both parallel
and serial ports. Used for wide range of peripherals and
transmit data at exceptionally high speed.
• Small Computer System Interface (SCSI) transmits data in
parallel but faster that parallel ports. It can be connected up to
eight peripherals in what is referred to as daisy chain.
• Other ports include game ports (allow game playing devices like
joystick), video adapter (for external monitors), and infrared
ports (wireless connection to devices)
(b) Expansion Slots and Cards
• Expansion slots are sockets on the motherboard where expansion cards
(add-ons/add on boards-circuit boards that provide more memory or
control peripheral devices) are plugged into in microcomputers that
have open architecture (computers that can easily be opened, and users
add and upgrade on new devices) design.
• Example of such cards are memory cards for memory modules, video
adapter cards to adapt different colour display on the monitor, graphics
accelerator cards
• Examples of expansion slots include ISA (Industry Standard
Architecture) designed for 16-bit data bus, PCI (Peripheral Computer
Interconnect) that has 32-bit data bus, AGP (Accelerated Graphics Port)
for 64-bit data bus PCMCIA (Personal Computer Memory Card
International Association) also referred to as PC cards are small memory
cards used in personal computers, USB (Universal Serial Bus) both a bus
and a port that can work without the installation of adapter cards.
• Other add-ons include modems, fax, sound, video capture, networking,
television, and coprocessor chip.
(c) Buses
Bus line or simply bus is a hardware pathway of a number of
parallel wires through which bits/data is transmitted within
the processor or from the processor to computer
peripherals. Just like lanes in highways, buses come as 8-bit
(cable that allows 8 instructions/bits simultaneously), 16-
bit, 32-bit, 64-bit, 128-bit or 256-bit and so forth.
External bus moves data between the I/O devices and the
motherboard: they include
• Control lines indicate the direction of information flow
and coordinate the timing of events as well,
• address lines specify the location of data in memory or
device and
• Data lines are used to transmit data. There are further
(c) Buses
• Internal bus moves data around the processor
(between CU, CPU and registers),
• expansion bus move data between expansion slots
and CPU via the RAM and
• local bus transmit data between expansion slots
and the CPU directly, without passing over the RAM.
• USB bus is referred to as plug and play (PnP)(once
plugged in, it is configured automatically). It is also
hot plugging (can plug in a device without re-
starting a computer). USB is therefore faster and
reliable.
Communication Networks
Topics
• Communication System
• Networking Terminologies
• Types and Categories of Networks
• Benefits and Drawback of Networks
Communication System
• A network or communication network is a system of interconnected
computers, telephones or other communication devices with the main
purpose of communication and of sharing of computer resources
• It constitutes the source, transmitter, transmission, receiver and
destination systems

• Examples of source and destination systems include computers,


phones, printers, scanners, radio, tv
• Examples of transmitters/receivers include modems, routers, switches,
bridges, hubs,
• Examples of transmission media include twisted pair, coaxial, fibre
optic cables, infra red, micro and radio waves
Some Network terminologies
• Node: any device that is attached to a network e.g. computer,
printer, scanner etc.
• Packet: Fixed length block of data for transmission. It contains
instructions about the destination of the packet.
• Internet: is a network consisting of a worldwide interconnection of
governmental, academic, public and private based networks.
• Intranet: It is a network that is accessible within a company
(corporate network) that uses the infrastructure of the internet and
World Wide Web.
• Extranet: An extension of internal network (intranet) to connect not
only internal personnel but also selected customers, suppliers, and
other strategic offices.
• Uploading: To send files from a user’s computer to another
computer.
• Downloading: To retrieve files online from another computer and
direction of signal travel
Simplex transmits a signal in one direction only
e.g from broadcasting station to an antennae
Half duplex transmits a signal in both directions
but one at a time e.g in radio calls
Full diplex transmits a signal in both directions
simultaneously for interaction as in computers
Multiplex is the transmission of many signals in
both directions simultaneously using one
channel through either frequency, time,
wavelength and code division multiplexing
techniques
Types of Networks
There are several types that include PAN, CAN, MAN,
WAN, LAN, but we look at three types:

Local Area Networks (LANs)


• Network of computers and other devices confined
in relatively small area e.g. a room or in a building.
• Connected by dedicated circuits (made of limited
types of network technologies and transmission
media)
• A private network
Metropolitan Area Networks (MAN).
• Network of computers and other device
within a confined geographical region e.g
urban region of urban centre or town
• Larger than LAN and connects clients and
servers.
• Uses different transmission media and
technology than LAN.
• normally belong to the same organization
Wide area network
• Covers a wide geographical area (sites).
• Usually connected by non-dedicated
circuits.
• Use greater varieties of transmission
technology and media.
• E.g. telephones network, satellite links
and internet.
• Involves LANs, MANs
Categories of Computer Networks
Peer – to-peer (P2P)
• No one computer in the network has higher
capabilities that the other (e.g bluetooth).
• Used for communication and not administration.
• Can have same OS or different OS.
• OS in each computer considers itself more
authoritative than the other.
• They are easy to manage; do not require expertise,
less expensive.
• Not flexible (expand), unsecure and not practical:
not centralized
Client/server – (Client based servers)
• One superior computer serves the other computer (clients /
workstations).
• Server must be installed with NOS to function.
• Examples of NOS include MS windows server 2000, 2003, Novell,
NetWare, UNIX and Linux, Windows NT.
Advantage
• Easy to manage and control other computers from the server.
• More secure: use passwords and log ins.
• Allow filtered information e.g. (for exams, accords, personnel etc.)
Disadvantage
• Slow use of resources
• Failure of the server crumbles the organizations operations; need
– backups
– Several servers (secondary domain controllers).
• May be complex: server software configuration to server the other
Advantages of Computer Networks
1. Share resources
• Software
• Hardware, scanners, printers CD-writers and backups devices.
2. Less running cost
• Files are all on servers
• Diskless workstations are possible –thin client
3. More efficiency
• Against system failure
– Failing nodes can be by passed
– Additional backup servers.
• Group working
– Single online project: multiple participants for same free space
• Distributed processing
– Some heavy tasks can on some systems share out workload to idle nodes
on the network.
Advantages of Computer Networks
4. Faster
• 10,100 or even higher mbps as compared to ordinary
telecommunicating modems at 56k.
5. Facilitate communication
• Same information and files can be sent to multiple
workstations.
• Faxes and internet or ISDN lines e-mail.
6. Flexible working
• -Tele-working and data logging using portable computers.
7. Security
• Centralized control via servers
8. Data integrity
• No duplicates of same documents in different files.
Disadvantages
• Errors can be propagated: hard to eradicate.
• Virus can spread across the entire system
• Costly to manage: extra staff without
adequate safeguards in place.
• Less secure than standalone.
• Complex network software.
• Not simple to install.
Communication Networks
Topics
• Communication System
• Networking Terminologies
• Types and Categories of Networks
• Benefits and Drawback of Networks
Communication System
• A network or communication network is a system of interconnected
computers, telephones or other communication devices with the main
purpose of communication and of sharing of computer resources
• It constitutes the source, transmitter, transmission, receiver and
destination systems

• Examples of source and destination systems include computers,


phones, printers, scanners, radio, tv
• Examples of transmitters/receivers include modems, routers, switches,
bridges, hubs,
• Examples of transmission media include twisted pair, coaxial, fibre
optic cables, infra red, micro and radio waves
Some Network terminologies
• Node: any device that is attached to a network e.g. computer,
printer, scanner etc.
• Packet: Fixed length block of data for transmission. It contains
instructions about the destination of the packet.
• Internet: is a network consisting of a worldwide interconnection of
governmental, academic, public and private based networks.
• Intranet: It is a network that is accessible within a company
(corporate network) that uses the infrastructure of the internet and
World Wide Web.
• Extranet: An extension of internal network (intranet) to connect not
only internal personnel but also selected customers, suppliers, and
other strategic offices.
• Uploading: To send files from a user’s computer to another
computer.
• Downloading: To retrieve files online from another computer and
direction of signal travel
Simplex transmits a signal in one direction only
e.g from broadcasting station to an antennae
Half duplex transmits a signal in both directions
but one at a time e.g in radio calls
Full diplex transmits a signal in both directions
simultaneously for interaction as in computers
Multiplex is the transmission of many signals in
both directions simultaneously using one
channel through either frequency, time,
wavelength and code division multiplexing
techniques
Types of Networks
There are several types that include PAN, CAN, MAN,
WAN, LAN, but we look at three types:

Local Area Networks (LANs)


• Network of computers and other devices confined
in relatively small area e.g. a room or in a building.
• Connected by dedicated circuits (made of limited
types of network technologies and transmission
media)
• A private network
Metropolitan Area Networks (MAN).
• Network of computers and other device
within a confined geographical region e.g
urban region of urban centre or town
• Larger than LAN and connects clients and
servers.
• Uses different transmission media and
technology than LAN.
• normally belong to the same organization
Wide area network
• Covers a wide geographical area (sites).
• Usually connected by non-dedicated
circuits.
• Use greater varieties of transmission
technology and media.
• E.g. telephones network, satellite links
and internet.
• Involves LANs, MANs
Categories of Computer Networks
Peer – to-peer (P2P)
• No one computer in the network has higher
capabilities that the other (e.g bluetooth).
• Used for communication and not administration.
• Can have same OS or different OS.
• OS in each computer considers itself more
authoritative than the other.
• They are easy to manage; do not require expertise,
less expensive.
• Not flexible (expand), unsecure and not practical:
not centralized
Client/server – (Client based servers)
• One superior computer serves the other computer (clients /
workstations).
• Server must be installed with NOS to function.
• Examples of NOS include MS windows server 2000, 2003, Novell,
NetWare, UNIX and Linux, Windows NT.
Advantage
• Easy to manage and control other computers from the server.
• More secure: use passwords and log ins.
• Allow filtered information e.g. (for exams, accords, personnel etc.)
Disadvantage
• Slow use of resources
• Failure of the server crumbles the organizations operations; need
– backups
– Several servers (secondary domain controllers).
• May be complex: server software configuration to server the other
Advantages of Computer Networks
1. Share resources
• Software
• Hardware, scanners, printers CD-writers and backups devices.
2. Less running cost
• Files are all on servers
• Diskless workstations are possible –thin client
3. More efficiency
• Against system failure
– Failing nodes can be by passed
– Additional backup servers.
• Group working
– Single online project: multiple participants for same free space
• Distributed processing
– Some heavy tasks can on some systems share out workload to idle nodes
on the network.
Advantages of Computer Networks
4. Faster
• 10,100 or even higher mbps as compared to ordinary
telecommunicating modems at 56k.
5. Facilitate communication
• Same information and files can be sent to multiple
workstations.
• Faxes and internet or ISDN lines e-mail.
6. Flexible working
• -Tele-working and data logging using portable computers.
7. Security
• Centralized control via servers
8. Data integrity
• No duplicates of same documents in different files.
Disadvantages
• Errors can be propagated: hard to eradicate.
• Virus can spread across the entire system
• Costly to manage: extra staff without
adequate safeguards in place.
• Less secure than standalone.
• Complex network software.
• Not simple to install.
Introduction to the internet

Internet is an internetwork consisting of a world wide


interconnection of governmental, academic, public
and private based networks
Topics
• Common Uses and mis-use of the Internet
• Internet Termonologies
Common Uses (Advantages) of the Internet

i. E-mails enables the sending and receiving of


electronic mails using programs such as Eudora,
Netscape Messenger and Outlook Express. A
complete address looks like this: w@x.y.z Let's
take a look at the different elements that
comprise the address
Parts of an Email Address
• An e-mail address has three parts.
1. The first part is your username. You set up the username with your Internet
provider or e-mail service. It might be a form of your name. It is at this point that
your provider or service makes sure no one else on their system already has that
name.
2. The second part of your e-mail address is the @ (at) symbol that divides the
username from the third part
3. The third part is the name of the computer that handles your mail. The computer
is also called a mail server. Your Internet Service Provider (ISP) or e-mail service has
a particular name for their server - like aol.com for America Online or yahoo.com for
those who go through the Yahoo service. Hotmail.com is an example of a free web-
based e-mail service.
• E-mail addresses typically end with a three-letter abbreviation like com or edu.
Originally, several different types of Internet domains existed: commercial (which
use com), educational (which use edu), government (which use gov) and
networks (which use net). However, this restriction is falling into disuse.
• Files/documents like pictures, formatted documents, graphics, movies, sounds
and all the other kinds of files that are found on your computer and not support
Advantages of Email
1. E-mail, unlike postal or "snail mail" can be
delivered at any time.
2. Incoming mail can be immediately printed, saved
to disk, replied to, forwarded or deleted.
3. Outgoing messages can be carefully composed,
delivered instantly, and even sent at a specific
time.
4. An E-mail message can be delivered at any time,
without long distance charges.
5. Messages can be sent out to dozens or even
thousands of people at once.
Advantages of Email
6. It's faster. Email is received almost immediately after it
is sent, usually within minutes.
7. It's more conversational. Because of its immediacy, a
whole series of e-mail messages may be exchanged
within a very short time. As a result, email messages
tend to be less formal and they are also usually shorter
and more to the point.
8. It's easier to reference. The text of a previous email
message can easily be included as part of a reply to that
message. Thus, e-mail correspondents are able to keep
the replies in context for each message. Including this
context is not only polite, but also makes an email
message more accurate and understandable.
Disadvantages of E-mail
1. Less social contact with people (social skills won't be
as well developed)
2. Less hand-writing practice
3. Can be bad for your eyes if you spend too long
sending e-mails on your computer
4. Messages may be misinterpreted easily
5. Abbreviated language may become common
practice for some people
6. Can provide an easy way to spread viruses to
computers
7. Can be easy to make a "typo" and say the wrong
Disadvantages of E-mail
8. Access to a computer and the internet is necessary,
and this may not be convenient for all people
9. Email can become time consuming for answering
complicated questions and misunderstandings can
arise because cultural differences in the
interpretation of certain words. The telephone, is
much better for providing detailed answers or if you
feel that the question is not absolutely clear.
10. Email can compromise the security of an
organization because sensitive information can be
easily distributed accidentally or deliberately. Email
should be entrusted to well trained and trusted staff
Common Uses (Advantages) of the
Internet
ii. Browsing to obtain information about anything by using a Uniform
Resource Location (URL) if the address is known or search engines
(e.g yahoo, Google, Excite, Dogpile etc) if searching for a subject.
The source however must be reliable and quality of information.
• The browser uses World Wide Web facility as part of the internet
that supports hypertext documents to allow users view and
navigate different types of data using the URL address to web
pages. An example of a URL is http://www.x.y/z.php. It mainly
contains three parts:
• http:// is the URL internet protocol using hypertext mark up
language
• www.x.y is the organizational server domain
• z.php is the web page created using PHP language. Other
languages that can be used include HTML, XML etc
Common Uses (Advantages) of the
Internet
iii. Chat rooms and news groups for live communication
with people who share common interest. They can send
an receive quick instant messages
iv. streaming media and broadband video and audio
files that can play while they are being downloaded of
course using broadband media
v. File sharing of files by transferring them from one
computer to another using FTP protocol. With FTP, one
can upload and download documents/files. Large files
are usually compressed using software such as ZIP of RAR
before they are send
Common Uses (Advantages) of the
Internet
vi. Online connection of a node to the internet for internet services access. A
special device called the MODEM is used to connect a node to the internet.
MODEMs are either Digital Subscriber Line (DSL) that sends a true digital signal
using the ordinary copper phone lines . It is fast, but covers short distance and
mostly unavailable
Cable MODEMs send data over coaxial cable with greater bandwidth to connect
nodes to ISPs. It converts digital signals to analog signals and vice versa. They
enable many users to use it but they are not secure because many people use
it.
Wireless MODEM connects to wireless network instead of via telephone
systems. It attached directly to the ISP to access the internet. Such MODEMs
are good for convenience, mobility and productivity but are costly and slower
than cable MODEMs
vi. VoIP (Voice over internet) can be free and cost less than normal telephone
conversations
vi. Online services such as online trading (e-commerce), banking, dating,
Common Misuse (Disadvantages) of the Internet
i. Virus threat. Internet is the main source of virus infection. They are
transferred during file downloads or through e-mails
ii. Information theft. Hackers and crackers intrude into systems and can
steal information or damage systems. Users names, addresses, credit
card number and other information can be accessed and be used
inappropriately thereby putting the user in danger
iii. Spamming refers to sending of unwanted e-mails in bulk which
provides no purpose at all and needlessly obstruct the system. They are
a nuisance and frustrating to users
iv. Pornography. There are many pornographic sites that are easily
accessible and can be detrimental to mental and social healthy of
persons viewing them especially children. In most cases it leads to
moral decay in the society.
v. Accuracy of information. Information stored on websites may be
incorrect or not authentic. Internet sources usually must be known and
reputable
Common Ways of Spreading a Virus

• Opening attachments or links from unknown


or spoofed emails
• Downloading software from malicious sites
• Online Ads
• Social media
• Unpatched software: Security holes unknown
to software maker
Internet/Web Terms:
• Hyperlinks are links that can go between different documents. The documents on the
Web are called pages each page can have links that connect to other pages, anywhere on
the web (including across the world).
• Http stands for hypertext transfer protocol - the protocol used to send hypertext
documents between different computers.
• Html-stands for hypertext markup language – It is a set of instructions called tags or
markups, that are used for the documents on the web to specify document structure,
formatting, and link the document
• Web browser: Software that translates HTML documents and allows a user to view a
remote web page e.g. Internet explorer, Netscape navigator etc
• WWW-It is an interconnected system of sites or servers of the internet that store
information in multimedia form and share in hypertext form that link to similar word or
phrases between sites. It is a hypertext system that allows documents to be shared over
the internet.
• Protocol: A protocol is a set of rules for the exchange of data between a terminal and a
computer or between two computers. The Internet uses the TCP/IP protocol (Transmission
Control Protocol/ Internet Protocol).
• Web page: Document in hypertext markup language (HTML), that is a computer
connected to the internet.
Internet/Web Terms:
• Home page: It is the first screen of a web site.
• Web Directories: They are lists of web sites classified by topic.
They are created by people submitting web pages to a group of
other people who classify and index them.
• Bookmarks, also known as favorite places, consist of titles and
URLs of web pages that you choose to add to your bookmark
list because you think you will visit them in the future.
• History list: The browser records the web pages you have
viewed during a particular connection session.
• Web site-Internet location of a computer or server on which a
hyperlinked document (web page) is stored
• Web-surfing-A user’s action of moving from one web page to
another by using the computer mouse to click on the hypertext
links.
Internet/Web Terms:
• Electronic Mail- System in which computer users linked by
wired or wireless communication lines may user their keyboard
to post n messages and their display screens to read responses.
• Internet Service providers (ISP):-Local or national company
that provides unlimited public access to the internet and the
web.
• Intranet: A network that is accessible within a company that
uses the infrastructure of internet and World Wide Web
• Extranet: An extension of internal network (intranet) to
connect not only internal personnel but also selected
customers, suppliers and other strategic offices
• Downloading: To retrieve files online from another computer
and store them on the memory of one’s computer
• Uploading: To send files from a user’s computer to another
Course Code: INTE 111

Course Name: Introduction to Technology

Lecture No 1: Computer Software

Cleophas Mochoge
Devotional Meditation

Proverbs 1:7
The fear of the LORD is the beginning of
knowledge, but fools despise wisdom and
instruction.
Lecture Outline
1. Definition
2. System software
3. Types of Operating System
4. Functions of Operating System
5. User Interfaces
6. Specification Software
7. Application Software
8. Features common to most Applications
9. Software Intellectual Property
Computer Software
Computer software are programs (a series of instructions) and data
used in the computer.
There are two categories of computer software namely system and
application software
Software

System Application

Translat
OS Utility Custom Packaged
ors
System Software

• System software are programs used to run the computer. They


include operating system, utility programs, and translators.
• Operating System (OS) is a program that manages the hardware and
executes application software to the user. They include Windows OS
(Win95, 98, 2000, millennium , XP, 8, 10), Disk OS (DOS), OS/2, Unix
and Linux
• Utility programs are special programs that either enhance existing
functions or provide services not provided by other system software
programs e.g backup, data recovery, file defragmentation, disk
repair, antivirus, data compression and disk scanner
• Translators transform instructions written in humanly convenient
form to machine language form required by computers. They are
loaded into the computer where they control the translation process
e.g assemblers, compilers, interpreters, linkers, loaders and locators
Types of Operating Systems
1. Single user system are systems that support only one user at a time.
Examples include DOS, Windows XP, Windows 10

2. Multi-user - A multi-user operating system allows for multiple users to


use the same computer at the same time and/or different times.
Below are some examples of multi-user operating systems. Most of
them are network based systems e.g Linux, UNIX and Windows Server
2000

3. Multiprocessing - An operating system capable of supporting and


utilizing more than one computer processor. Below are some
examples of multiprocessing operating systems. Linux , Unix and
Windows 2000
Types of Operating Systems
• 4. Multitasking - An operating system that is capable of allowing
multiple software processes to run at the same time using one
processor. E.g UNIX and Windows 10
• 5. Multithreading - Operating systems that allow different parts of a
software program to run concurrently. Operating systems that would
fall into this category are: Linux, Unix, and Windows 10
Functions of Operating System
• Booting
Booting refers to loading an operating system, programs and
subprograms from the disk into the computer’s main memory. Loading
of the OS is accomplished by a program known as bootstrap loader or
boot routine that is stored permanently in the computer’s electronic
circuitry (ROM).
• Memory management
The main memory (RAM) is divided into two parts; the upper RAM for
storing the OS and the lower part to store other programs and
processes. The lower memory is partitioned by the OS to
accommodate and manage a number of processes using some
algorithms.
Functions of Operating System
• CPU management(Scheduling)
Most processor are atomic thus can only process one program at a time.
Processes have therefore to be managed by the OS to allow
multitasking and multiprocessing. The OS achieves this by using
algorithms such FCFS, time slicing and priority index.
• Disk management
The OS provides file systems such as FAT, FAT 32 and NTFS during disk
formatting. File systems provides disk infrastructures like tracks, sectors
and blocks for easy data storage and retrieval as well as allowing data to
grow and shrink.
Functions of Operating System
• Input/output (I/O)Management
The computer you are using might be are attached to peripheral devices
like Keyboard, printer, modem, mouse etc. Each one handling
communication with the computer for getting its job done, this is
monitored by the operating system.
• Managing files
Files of data and programs are located in many places on your hard disk
and other secondary devices. The operating system helps you to find
them. If you move, rename, or delete a file the operating system
manages such changes and helps you locate and gain access to it.
Functions of Operating System
• Error handling and security
The OS detects errors and recover from it or give a warning to the user
• System security and protection
An OS controls access to the system resources (e.g. files or storage
devices) to prevent accidental or unauthorized access.
• User interface provision
The user interface is the user controlled part of the operating system
that allows you to communicate, or interact with it. The gap between
the user and the machine readable language is bridged by the OS’s
command interpreter. There are four types of interfaces; command
driven, menu driven, graphical, and network
User Interfaces
i) Command driven
A command driven interface requires you to enter a command by typing
in codes or words. An Example is DIR,(directory)You type the command
at the point on the screen where the cursor follows the prompt, such
as “C\>”.In general C:\.> refers to the hard disk .> is a system
prompt ,asking you for the command. It is found on PCs with DOS
operating system.
ii) Menu Driven
Menu driven allows you to user cursor movement (arrow) keys to
choose a command from a menu; A menu offers you options to choose
from, e.g. Edit, Format etc
User Interfaces
iii) Graphical user interface
The graphical user interface allows you to use graphics (images) and
menus as well as keystrokes to choose the commands, start programs,
and use lists of files and other options. They take the form of icons;
icons are small pictorial figures that represent tasks, procedures, and
programs. E.g you can use a picture of a trash can to delete a file, Dove
for sending mails, etc.
Computer specification
A computer is specified by its processing power, storage capacity, type
of VDU and other specification of interest: e.g
• Intel Celeron duo core @ 2.16GHz/2GB RAM/500GB Hard
Disk/17”SVGA TFT/Multi media

• What does all these mean?


Computer specification
• Intel Celeron duo core @ 2.16GHz-The processors are two Intel
Celeron with a clock speed of 2.16 GHz each (fast)

• 2GB RAM-The capacity/size of the main memory is 2GB


• 500GB Hard Disk-The disk capacity is 500GB
• 17”SVGA TFT-The VDU is of thin film transistor type with SVGA
adapter and it is 17” in size.

• Multi media-The computer comes with a drive D: (CD/DVD), sound


card, speakers, SVGA monitor and the corresponding multi media
software.
Computer specification
• Intel Celeron duo core @ 2.16GHz-The processors are two Intel
Celeron with a clock speed of 2.16 GHz each (fast)

• 2GB RAM-The capacity/size of the main memory is 2GB


• 500GB Hard Disk-The disk capacity is 500GB
• 17”SVGA TFT-The VDU is of thin film transistor type with SVGA
adapter and it is 17” in size.

• Multi media-The computer comes with a drive D: (CD/DVD), sound


card, speakers, SVGA monitor and the corresponding multi media
software.
Application Software
This is software that has been developed to perform useful work on
specific tasks or to solve a particular problem. Application software
maybe either custom or packaged:
Application Software
Custom
• This is software designed and developed for a particular customer.
This is a kind of software that you could hire a computer programmer
or software creator to develop for you.
• Such software would not be readily done with the standard off the
shelf packaged software available from a computer store. E.g
reservation, registration and ERP systems
Packaged
• This is the kind of off-the shelf program designed for sale to the
general public; examples include word processing programs,
spreadsheets, game software, music
Features Common to Most Applications
Features Common to Most
Applications
Insertion point (cursor)
Is the blinking moveable line on the screen that shows the point
where text is to be entered. The cursor is moved around the
screen using mouse clicks or navigation keys on the keyboard
Scrolling
Is the activity of moving up and down or sideways over text or
screen to expose hidden data. Scrolling is done using mouse
roller button, clicking and tracking is simply clicking scroll bars or
still using navigation keys on the keyboard.
Features Common to Most
Applications
Windows
Is a rectangular section of screen display usually with a title bar
at the top and any other information. Windows is a common
feature especially in GUI programs
Menu bar
A row of list options displayed across the top or bottom of the
screen. Each menu has a list of commands that can as well be
displayed on the tool bar menu (shortcut to menu bar)
Pull-down menu
List of commands when a menu option is selected. Can pulled
down by a mouse click or keyboard shortcut keys
Features Common to Most
Applications
Help menu and screens
Offers choice of help screens specific to specification. Is
obtained by clicking on Help menu on using an assistant wizard
Buttons
Iconic representation of commands usually found in GUI
environments. Mostly found toolbar menu or other position on
the screen to execute a particular command.
Features Common to Most
Applications
Toolbars
A row of onscreen buttons, usually appear after the menu bar
and used as a shortcut to executing menu commands. They can
be customized by moving around the screen.
Dialog box
An interactive box that appears on the screen in a way of
feedback to some commands. It displays messages for
confirmation or to be acted upon.
Default values
Standard settings employed by the computer when the user
does not specify an alternative.
Features Common to Most
Applications
Macros
A feature that allows the use of one keystroke , command or
toolbar to perform series of commands. They are useful if one is
to continually repeat complicated patterns of commands.
OLE (object linking and embedding)
Feature that allows objects created from one application like
graphics to be embedded into another application like word
processor. The objects are usually obtained through linking
Features Common to Most
Applications
Clipboard
Is the area where copied item is held before it is pasted.
Tutorials and documentation
Tutorial is an instructional book or program to follow while
documentation is a user manual that usually accompany a
released product.
Drawbacks of Packaged
• Bloatware or featuritis:-It means software that has a lot of
features that computer users don’t understand how to use
them /It is software that is crowded with features. E.g. when
Ms Office 1997 came in the market, Supplanting office 1995, it
contained 4500 commands, far more than the few dozen or
even few hundred that most people use.

• Shovelware:-This is where the software is full of flaws due to


incompatibility standards with the other parts of the
computer system.
Other Kinds of Software and
Intellectual Property
Public Domain Software
• Has no copyright – free to use software
Freeware
• Has a copyright - someone owns the right to determine who
can make copies of the software. Free to use and make copies
of. Can only give away exact copies of the software. Can not
be changed or used in another program without the copyright
holder's permission.
Other Kinds of Software and
Intellectual Property
Shareware
• Has a copyright. Allowed to use the software before paying
for it. Can be a demo - which limits some major features like
the Save command. Can set an amount of time you can use
the software. Can trust that you will pay for it if you like the
software. Can only give away exact copies of the software.
Can not be changed or used in another program without the
copyright holder's permission.
world.
Other Kinds of Software and
Intellectual Property
Commercial Software
• Has the most resistive copyright. Have to buy the software
before you can use it.
• Can usually make one copy of the software as a backup copy.
A backup copy is used in case something goes wrong with the
original software. Can not give away or sell the backup copy.
Cannot copy, look at the program's code, change, or use the
software in another program without the copyright holder's
permission. Commercial Software is the best software in the
world.
Review Quizzes

4.Which one of the following types of computers


is an example of an application software
(a) Ms Office word (b) Linux (c) Windows NT(d)
Anti-virus
5.What is the meaning of intellectual property?
6. Distinguish between freeware and shareware.
Give examples in each case
Review Quizzes

1. Software can be broadly classified into ---------


and --------
2. Distinguish between multiprocessing and
multitasking types of operating systems
3. Explain any five functions of an Operating
systems

You might also like