Computer Notes - ICT
Computer Notes - ICT
A computer is an electronic device, operating under the control of instructions stored in its
own memory, stores, and processes data to produce information
The forms of information processed
include:
▪ Data – e.g. invoices, payroll etc.
▪ Text – widely available in many offices
▪ Graphics – e.g. business graphs, symbols
▪ Images – e.g. pictures
▪ Voice – e.g. telephone
The following are the features that make a computer a good tool for
information processing.
b) Speed: It works at a very high speed in taking in data and outputting the
information.
f) Consistency – Given the same data and the same instructions, computers
will produce exactly the same answer every time that particular process is
repeated.
1. Job Displacement:
Use of computers mean atomization, which means loss of jobs especially
the ones involving routine tasks.
2. Workers health
Computer emits radioactive particles, which are very hazardous to human
health theory risking the lives of the users.
Computer VDU’s are not good for the eyes (eye strain). It is therefore
not advisable for a user to continuously stay in front of a computer for
more than two hours without stop.
Repetitive strain injury (RSI) – This is the disorder of the arms and wrists
caused by use of keyboard for long stretches of times without breaks.
COMPUTER VIRUSES
A computer virus is a program that has the ability to reproduce/replicate
itself without the user’s knowledge. For example, it may attach itself to
the program FORMAT and run every time you format a flash disk.
TYPES OF VIRUSES:
File viruses:
A file virus infects the executable program files on your computer
system. These usually, but not always, have COM or EXE file
extensions. When you run an infected program, your computer also runs
the attached virus instructions to replicate .
Boot Sector Viruses
These infect the system files your computer uses every time you turn it
on. The boot sector is the part of every hard disk, which is read by the
computer every time you start it up.
Companion Viruses
If you have a COM file and an EXE file of the same name, Dos always
runs the COM file in preference to the EXE file is not file extension is
given. Companion viruses make use of this fact by creating COM files
with the same name as the legitimate EXE files, thus ensuring they are
executed. They then pass control to the original EXE file which runs
normally.
Symptoms of the Viruses
Your computer displays annoying messages such as “Gotcha! Arf Arf!
“You are stoned”
Your computer develops unusual visual or sound effects. For example,
characters begin to disappear from your screen or the sound of a flushing
toilet comes for your computer’s speakers.
You have difficulty saving files.
Your computer suddenly seems to work very slowly.
Files are mysteriously missing.
Your computer reboots unexpectedly.
Your executable files unaccountably increases in size.
S T U D YT E X T
Some of the areas that computers are used include:
• Communication – digital communication using computers is
popular and is being adopted worldwide as opposed to
analogue communication using the telephony system. Computers
have also enhanced communication through email
communication, electronic data interchange, electronic funds
transfer, Internet etc.
History of Computers
Classification by processing
This is based on how the computer represents and processes the data:
S T U D Y
of graphs. Analogue computers process data represented by
physical variables and output physical magnitudes in the form
of smooth graphs.
Classification by purpose
This is a classification based on the use to which the computer is put.
Classification by generation
This is a time-based classification coinciding with technological advances.
The computers are categorised as First generation through to Fifth generation.
These are the physical or tangible components of a computer system. They perform five functions including;
input, output, storage, processing and communication.
INPUT DEVICES
Input is any data or instructions you enter into the memory of a computer. Once input is in memory, the
CPU can access it and process the input into output. Four types of input are data, programs, commands, and
user responses:
An input device is any hardware component that allows you to enter data, programs, commands, and user
responses into a computer. Input devices include the keyboard, pointing devices, scanners and reading
devices, digital cameras, audio and video input devices, and input devices for physically challenged users
THE KEYBOARD
You enter data into a computer by pressing the keys on the keyboard. Desktop computer keyboards usually
have from 101 to 105 keys, while keyboards for smaller computers such as laptops contain fewer keys. A
computer keyboard includes keys that allow you to type letters of the alphabet, numbers, spaces, punctuation
marks, and other symbols such as the dollar sign ($) and asterisk (*). A keyboard also contains special keys
that allow you to enter data and instructions into the computer.
Function keys are special keys programmed to issue commands and accomplish certain tasks. Keyboards also
contain keys that can be used to position the insertion point on the screen. The insertion point is a symbol
that indicates where on the screen the next character you type will display .Many of the newer keyboards
includes buttons that allow you to access your CD/DVD drive and adjust speaker volume.
POINTING DEVICES
A pointing device is an input device that allows you to control a pointer on the screen. In a graphical user
interface, a pointer is a small symbol on the display screen. A pointer often takes the shape of a block arrow,
an I-beam (T) or a pointing hand. Using a pointing device, you can position the pointer to move or select
items on the screen. For example, you can use a pointing device to move the insertion point; select text,
graphics, and other objects; and click buttons, icons, links, and menu commands.
Common pointing devices include the mouse, trackball, touchpad, pointing stick, joystick, touch screen, light
pen, and graphics tablet.
Trackball
Some users opt for alternative pointing devices other than a mouse, such as a trackball. Whereas a
mechanical mouse has a ball mechanism on the bottom, a trackball is a stationary pointing device with a ball
mechanism on its top.
Touchpad
A touchpad or trackpad is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
To move the pointer using a touchpad, you slide your fingertip across the surface of the pad. Some
touchpads have one or more buttons around the edge of the pad that work like mouse buttons; on others,
you tap the pad’s surface to simulate mouse operations such as clicking.
Stick
A pointing stick is a pressure-sensitive pointing device shaped like a pencil eraser that was first developed by
IBM for its laptop computers. Because of its small size, the pointing stick is positioned between keys on the
keyboard. To move the pointer using a pointing stick, you push the pointing stick with your finger. The
pointer on the screen moves in the direction that you push the pointing stick.
LIGHT PEN
A light pen is a handheld input device that contains a light source or can detect light. Some light pens
require a specially designed monitor, while others work with a standard monitor. Instead of touching the
screen with your finger to interact with the computer, you press the light pen against the surface of the
screen or point the light pen at the screen and then press a button on the pen. Light pens are used in
applications where desktop space is limited such as in the health-care field or when a wide variety of people
use the application, such as electronic voting.
GRAPHICS TABLET
A graphics tablet, also called a digitizer or digitizing tablet, consists of a flat, rectangular, electronic plastic
board used to input drawings, sketches, or other graphical data. Each location on the graphics tablet
corresponds to a specific location on the screen. When you draw on the tablet with either an electronic pen
or a puck, the tablet detects and converts the movements into digital signals that are sent into the computer.
Devices that capture data directly from source documents include optical scanners, optical character
recognition devices, optical mark recognition devices, bar code scanners, and magnetic-ink character
recognition readers. Examples of source documents used with these devices include advertisements,
brochures, photographs, inventory tags
Optical Scanner
An optical scanner, usually simply called a scanner, is a light-sensing input device that reads printed text and
graphics and then translates the results into a form the computer can use. The density of the dots, known as
the resolution, determines sharpness and clearness of the resulting image. Resolution typically is measured in
dots per inch (dpi), and is stated as the number of columns and rows of dots
OUTPUT DEVICES
Output is data that has been processed into a useful form called information. That is, a computer processes
input into output. Computers generate several types of output, depending on the hardware and software
being used and the requirements of the user. You may choose to display or view this output on a monitor,
print it on a printer, or listen to it through speakers or a headset. Four common types of output are text,
graphics, audio, and video.
An output device is any computer component capable of conveying information to a user. Commonly used
output devices include display devices, printers, speakers, headsets, data projectors, facsimile machines, and
multifunction devices
1. PRINTERS
A printer is an output device that produces text and graphics on a physical medium such as paper or
transparency film. Printed information is called hard copy because the information exists physically and is a
more permanent form of output than that presented on a display device (soft copy).Hard copy, also called a
printout, can be printed in portrait or landscape orientation.
Generally, printers can be grouped into two categories: impact and no impact. Printers in each of these
categories are discussed in the following sections.
I. Impact Printers
An impact printer forms characters and graphics on a piece of paper by striking a mechanism against an
ink ribbon that physically contacts the paper. Because of the striking activity, impact printers generally are
noisy. Many impact printers do not provide letter quality print.
Impact printers also are ideal for printing multipart forms because they easily can print through many layers
of paper. Finally, impact printers are used in many factories and at retail counters because they can
withstand dusty environments, vibrations, and extreme temperatures.
Two commonly used types of impact printers are dot-matrix printers and line printers. Each of these
printers is discussed in the following sections.
Dot-matrix printers
A dot-matrix printer is an impact printer that produces printed images when tiny wire pins on a print
head mechanism strike an inked ribbon. When the ribbon presses against the paper, it creates dots that form
characters and graphics. Most dot-matrix printers use continuous-form paper, in which each sheet of paper is
connected together. The pages generally have holes punched along two opposite sides so the paper can be fed
through the printer
Line Printer
A line printer is a high-speed impact printer that prints an entire line at a time. The speed of a line printer
is measured by the number of lines per minute (1pm) it can print. Capable of printing up to 3,000 lines per
minute (1pm), these printers often are used with mainframes, minicomputers, or with a network in
applications such as manufacturing, distribution, or shipping.
II. Non-impact Printers
A non-impact printer forms characters and graphics on a piece of paper without actually striking the
Three commonly used types of non-impact printers are ink-jet printers, laser printers, and thermal printers.
Each of these printers is discussed in the following sections.
Inkjet printers
An ink-jet printer is a type of non-impact printer that forms characters and graphics by spraying tiny drops
of liquid ink onto a piece of paper. Ink-jet printers usually use individual sheets of paper stored in a
removable or stationary tray. These printers can produce letter-quality text and graphics in both black-and-
white and color on various materials such as envelopes, labels.
Laser printers
A laser printer is a high-speed, high-quality no impact printer. Laser printers for personal computers usually
use individual sheets of paper stored in a removable tray that slides into the printer case. Some laser printers
have trays that can accommodate different sizes of paper, while others require separate trays for letter- and
legal-sized paper. Most laser printers have a manual feed slot where you can insert individual sheets and
envelopes. You also can print transparencies on a laser printer.
Laser printers can print text and graphics in very high quality resolutions, ranging from 600 dpi to 1,200 dpi.
While laser printers typically cost more than ink-jet printers, they also are much faster, printing text at
speeds of four to thirty pages per minute.
Thermal printers
A thermal printer generates images by pushing electrically heated pins against heat-sensitive paper. Standard
thermal printers are inexpensive, but the print quality is low and the images tend to fade over time. Thermal
printers are, however, ideal for use in small devices such as adding machines.
III. Portable Printers
A portable printer is a small, lightweight printer that allows a mobile user to print from a laptop or
handheld computer while travelling. Barely wider than the paper on which they print, portable printers
easily can fit in a briefcase alongside a laptop computer.
Two basic types of plotters are pen plotters and electrostatic plotters. A pen plotter uses one or more color
pen light beams, or a scribing device to draw on paper or transparencies. Pen plotters differ from other
printers in that they produce continuous lines, whereas most printers generate lines by printing a closely
spaced series of dots.
An electrostatic plotter uses a row of charged wires (called styli) to draw an electrostatic pattern on specially
coated paper and then fuses toner to the pattern. The printed image is composed of a series of very small
dots, which provide high-quality output.
2. DISPLAY DEVICES
CRT Monitors
A CRT monitor, or monitor, is a display device that consists of a screen housed in a plastic or metal case. A
color monitor displays text, graphics, and video information in color.
Monitors that display only one color are considered monochrome. A monochrome monitor displays text,
graphics, and video information in one color (usually white, amber, or green) on a black background
Monochrome monitors are less expensive than color monitors. Most monitors are referred to by their
viewable size, which is the diagonal measurement of the cathode ray tube inside the monitor and is larger
than the actual viewing area provided by the monitor.
LCD displays
LCD displays commonly are used in laptop computers, handheld computers, digital watches,’ and calculators
because they are thinner and more lightweight than CRT monitors.
MONITOR QUALITY
The quality of a monitor’s display depends largely on its resolution, dot pitch, and refresh rate. The
resolution, or sharpness and clarity, of a monitor is related directly to the number of pixels it can display.
Resolution is expressed as two separate numbers: the number of columns of pixels and the number of rows
of pixels a monitor can display. A monitor with a higher resolution displays a greater number of pixels, which
provides a smoother image.
Another factor that determines monitor quality is dot pitch, which is a measure of image clarity. The dot
pitch is the vertical distance between each pixel on a monitor. The smaller the distance between the pixels,
the sharper the displayed image. Text created with a smaller dot pitch is easier to read. To minimize eye
fatigue, you should use a monitor with a dot pitch of .28 millimeters or smaller.
3. AUDIO OUTPUT (speakers, headsets)
Audio is music, speech, or any other sound. Audio output devices are the components of a computer that
produce music, speech, or other sounds, such as beeps. Two commonly used audio output devices are
speakers and headsets
To boost the low bass sounds, you can add a woofer (also called a subwoofer). The stereo speakers and
woofer are connected to ports on the sound card. Most speakers have tone and volume controls so you can
adjust these settings.
4. DATA PROJECTORS
A data projector takes the image that displays on a computer screen and projects it onto a screen so that
an audience of people can see the image clearly. Data projectors can be large devices attached to a ceiling or
wall in an auditorium, or they can be small portable devices Two types of smaller, lower-cost units are LCD
projectors and DLP projectors.
LCD projector
A digital light processing (DLP) projector uses tiny mirrors to reflect light; producing crisp, bright, colorful
images that remain in focus and can be seen clearly even in a well-lit room.
5. FACSIMILE (FAX) MACHINE
A facsimile (fax) machine is a device that transmits and receives documents over telephone lines. The
documents can contain text, drawings, or photographs, or can be handwritten. When sent or received via a
fax machine, these documents are known as faxes. A stand-alone fax machine scans the original document,
converts the image into digitized data, and transmits the digitized image. A fax machine at the receiving end
reads the incoming data, converts the digitized data into an image, and prints or stores a copy of the original
image.
Fax capability also can be added to your computer using a fax modem. A fax modem is a communications
device that allows you to send (and sometimes receive) electronic documents as faxes. A fax modem
transmits computer-prepared documents, such as a word processing letter, or documents that have been
digitized with a scanner or digital camera. A fax modem is like a regular modem except that it is designed to
transmit documents to a fax machine or to another fax modem.
6. VIDEO CARDS
To display color, a color monitor works in combination with a video card, which is included with today’s
personal computers. A video card, also called a graphics card or video adapter, converts digital output into an
analog video signal that is sent through a cable to the monitor. The monitor separates the video signal into
red, green, and blue signals. Electron guns then fire the three color signals to the front of the monitor. These
three dots - one red, one green, and one blue are combined to make up each single pixel.
The number of colors that a video card can display is determined by the number of bits it uses to store
information about each pixel
REGISTERS
Used to hold information on a temporary basis
MAIN MEMORY
RAM and ROM
The system unit, sometimes referred to as the processor, interprets and carries out the basic instructions that
operate a computer. That is, most of the devices connected to the computer communicate with the CPU in
order to carry out a task. The CPU contains the control unit and the arithmetic/logic unit.
Arithmetic/Logic unit
The arithmetic/logic unit, another component of the CPU, performs the arithmetic, comparison, and logical
operations. Arithmetic operations include addition, subtraction, multiplication, and division. Comparison
operations involve comparing one data item to another to determine if the first item is greater than, equal to,
or less than the other item. Logical operations work with conditions and logical operators such as AND, OR,
and NOT
3. Registers
The CPU uses temporary storage locations called registers, to hold data and instructions. The function
include storing location of where instruction was fetched storing an instruction while it is being decoded,
storing data while the ALU processes it, and storing the results of a calculation.
4. Memory
In the system unit, a computer’s memory stores data, instructions, and information. Memory stores three
basic items: The operating system and other system software that control the usage of the computer
equipment; Application programs designed to carry out a specific task such as word processing; and The data
being processed by application programs.
RAM
RAM (random access memory) is a memory chip that the processor can read from and write to. RAM is
volatile memory, meaning that its contents are lost when the computer’s power is turned off. Multiple
programs can be loaded into RAM simultaneously, provided you have enough RAM to accommodate all the
programs. The program with which you are working currently displays on the screen. Basic types of RAM
include dynamic RAM and static RAM, RDRAM (Rambus DRAM), Synchronous DRAM (SDRAM)
Commonly used for storing of program instructions, that are not subjected to change. Generally, they are
provided by manufacturer. ROM chips that contain permanently written data, instruction, or information are
called firmware. Another type of ROM chip, called programmable read only memory (PROM) clip, is a blank
ROM chip on which you can permanently place items. The instructions used to program a PROM chip are
called micro-code. Once the micro-code is programmed into the PROM chip, it functions like a regular ROM
chip and cannot be erased or changed.
Flash memory
Another type of non-volatile memory is called flash memory or flash ROM. Unlike a PROM clip that can be
programmed only once, flash memory can be erased electronically and reprogrammed. Flash memory is used
to store programs on personal computers, as well as cellular telephones, printers, digital cameras, pagers, and
personal digital assistant. Flash memory is available in sizes ranging from 1 to 40 MB.
CMOS
Another of memory clip in the memory unit is complementary metal-oxide semiconductor (CMOS). CMOS
memory is non-volatile memory used to store configuration information about the computer, such as the
type of disk drives, keyboard, and monitor; the current date and time; and other start-up information needed
when the computer is turned off. CMOS use battery power to retain information even when the power to
the computer is turn off. Battery-backed CMOS memory thus keeps the calendar, date, and time current even
when the computer power is off. Unlike ROM, information stored in CMOS memory can be changed, such as
when you change from standard time to daylight saving time
Expansion Slots and Expansion Boards
An expansion slot is an opening, or socket, where a circuit board can be inserted into the motherboard.
These circuit boards, sometimes referred to as expansion boards or expansion cards, add new devices or
capabilities to the computer, such as a modem or more memory. Plug and Play refers to a computer’s
capability to automatically configure expansion boards and other devices as they are installed.
Port
A cable often attaches external devices to the system unit. The interface or point of attachment, to the system
unit is called a port. Ports have different types of connectors used to join a cable to a device.
i) Serial Port
A serial port is one types of interface used to connect a devices to the system unit. Because a serial port
transmits only one bit of data at a time, it usually is used to connect devices that do not require fast data
transmission rates, such as a mouse, keyboard, or modem
Many printers connect to the system unit using a parallel port with a 25-pin female connector. This parallel
port can transfer eight bits of data simultaneously through eight separate lines in a single cable
Types of Processors
Another goal of CPU designers was to optimize the usage of expensive memory, to achieve this they tried to
pack more instructions in the memory by introducing the concept of variable length instructions. CISC
processors possess many processing features whereby making the job of machine programmers easier. They
are complex and expensive to produce.
In early 1980 some CPU designers discovered that several of the instructions supported by CISC CPU’s are
rarely used hence came out with an idea that the complexity of the CPU design can be greatly reduced by
implementing only a bare minimum basic set of instructions plus some of the more frequently used
instructions in the hardware circuitry of the CPU. Other complex instruction did not need to be supported in
the instruction set in the CPU because they can always be implemented in software by using the basic set of
instructions.
The designers came up with the idea of making all instructions of uniform length so that the decoding and
execution of all instructions becomes simple and fast. This design resulted in producing a faster and less
expensive processor. They have a small instruction set thereby placing extra demand on programmers who
must consider how to implement complex computations by combining simple instructions. Due to a simple
design RISC processors are faster for most applications, less complex and less expensive to produce than
CISC processors.
The two basic types of memory are volatile and non-volatile. The contents of volatile memory, such as RAM,
are lost (erased) when the power to the computer is turned off. The contents of non-volatile memory,
however, are not lost when power is removed from the computer. For example, once instructions have been
recorded onto a non-volatile ROM chip, they usually cannot be erased or changed, and the contents of the
chip are not erased when power is turned off.
SECONDARY STORAGE
Storage, also called secondary storage, auxiliary storage, or mass storage, holds items such as data,
instructions, and information for future use. Think of storage a filing cabinet used to hold file folders, and
memory as the top of your desk. When you need to work with a file, you remove it from the filing cabinet
(storage) and place it on your desk (memory). When you are finished with the file, you return it to the filing
cabinet (storage).
Storage is non-volatile, which means that items in storage are retained even when power is removed from the
computer. A storage medium (media is the plural) is the physical material on which items are kept. One
commonly used storage medium is a disk, which is a round, flat piece of plastic or metal with a magnetic
coating on which items can be written. A storage device is the mechanism used to record and retrieve items
to and from a storage medium.
The speed of a storage device is defined by its access time, which is the minimum time it takes the device to
locate a single item on a disk. Compared to memory, storage devices are slow.
A hard disk usually consists of several inflexible, circular disks, called platters, on which items are stored
electronically.
3. COMPACT DISCS
A compact disc (CD) is a flat, round, portable, metal storage medium that usually is 4.75 inches in diameter
and less than one-twentieth of an inch thick (Figure 5-8). Compact disks store items such as data,
instructions, and information by using microscopic pits (indentations) and land (flat areas) that are in the
middle layer of the disc.
CD-ROMs
CD-ROM (pronounced SEE-DEE-Rom, is an abbreviation for compact disc read-only memory) The contents
of standard CD-ROMs are written, or recorded, by the manufacturer and only can be read and used. That is,
they cannot be erased or modified- hence, the name read-only. A CD-ROM can hold up to 700 MB of data,
instructions, and information, or about 450 times that which can be stored on a high-density 3.5-inch floppy
disk.
CD-R (compact disc-recordable)
Is a technology that allows you to write on a compact disc only once using your own computers? Once you
have recorded the CD-R, you can read from it as many times as you wish.
CD-RW (compact disc-rewriteable)
Is an erasable disc that you can write on multiple times CD-RW overcomes one of the disadvantages of CD-
R disks - that you can write on them only once.
DVD-ROMs
A DVD-ROM (digital video disc-ROM) is an extremely high capacity compact disc capable of storing from
4.7 GB to 17 GB - more than enough to hold a telephone book containing every resident in the United
States. Not only is the storage capacity of a DVD-ROM greater than a CD-ROM, a DVD-ROM’s quality also
far surpasses that of a CD-ROM.
4. MAGNETIC TAPES
One of the first storage media used with mainframe computers was magnetic tape, a magnetically coated
ribbon of plastic capable of storing large amounts of data and information at a low cost. Tape storage
requires sequential access, which refers to reading or writing data consecutively. Like a music tape, you must
forward or rewind the tape to a specific point to access a specific piece of data.
5. PC CARDS
Applications of microfilm and microfiche are widespread. Libraries use these media to store back issues of
newspapers, magazines, and genealogy records. Large organizations use microfilm and microfiche to archive
inactive files. Banks, for example, use it to store transactions and cancelled checks, and the U.S. Army uses it
to store personnel records. Using microfilm and microfiche provides a number of advantages: it greatly
reduces the amount of paper firms must handle; it is inexpensive; and it has the longest life of any storage
medium.
Relationship among the hardware, system software, application software and users of a computer system
HARDWARE
(Physical devices/ components of the
computer system)
SYSTEM SOFTWARE
(Software that constitute the operating and programming
Environment of the computer system)
APPLICATION SOFTWARE
(Software that do a specific task or solve a specific problem)
USERS
(Normally interact with the system via the user
Interface provided by the application software
@ COLLEGE OF HUMAN RESOURCE MANAGEMENT MR ATAMBO +254712613054
20
COMPUTER SOFTWARE
Software is a set of computer programs, procedures and associated documents which describe the programs
and how they are to be used. A computer program is a sequence of logical instructions, written in a
language, which can be understood by the computer which controls the activity of processing by the
computer.
System software
System software is a set of one or more programs, designed to control the operation and extend the
processing capability of a computer system. In general it performs the following functions:
Operating systems – it takes care of the effective and efficient utilization of all the hardware and
software components of the computer system e.g. Microsoft DOS, Windows, UNIX, LINUX
Communication software – they enable transfer of data and programs from one computer system to
another in a network environment
Utility programs – a set of programs which help user in system maintenance tasks and in performing
tasks of routine nature. E.g. formatting hard disks
Operating System
It’s an integrated set of programs that controls the resources (CPU, Memory, Input/output devices) of a
computer system and provides its users with an interface or virtual machine that is more convenient to use
than the bear machine.
(i) Making a computer system convenient to use i.e. hides details of Hardware resources from the
programmer and provides him with a convenient interface of using computer system. It acts as an
intermediary between hardware and software providing a high level interface to low level hardware
and making it easier for the software to access the use of those resources.
A process (job) is a program in execution. The main objective of the process management module of
operating system is to manage the process submission to the system in a manner to minimize the idle time
of various processors (CPU, I/O processors e.t.c) of the computer system.
It takes care of creation and deletion of processes, scheduling of various system resources to different
processes requesting them and providing mechanisms for synchronization and communication among
processes
Multiprogramming: This is the interleaved execution of two or more different and independent programs by
same computer. Two or more user programs are placed in the main memory and executed consecutively.
Note: The CPU is capable of conducting / executing only one instruction at a time.
Multiprocessing: Used to describe interconnected computer configurations or computers with two or more
CPUs which have the ability to simultaneously execute several programs. Multiprocessing systems have better
performance and reliability.
Its job is to keep tracks of which parts of memory are in use and which are not in use, to allocate memory to
processes when they need it and de allocate when they are done.
Virtual Memory – Extension of memory which allows execution of processes that might not be completely
loaded in memory. It is often described as hierarchy of two storage systems-one is a low cost, large capacity,
low speed system (hard disk) the other is a high cost, small capacity high speed system (RAM). The operating
system manages the two storage systems in such as a way that the users of the system feel that they have
access to a single, large, directly addressable and fast main memory.
A file is a collection of related information. Every file has a name, data and attributes. The name of a file
uniquely identifies it in the system and is used by its users to access it. The file management module of an
operating system takes care of file related activities such as accessing, naming, sharing and protection files.
To use information stored in a file, it must be accessed and read into computer memory. The two commonly
supported file access methods at operating system level are:
1. Sequential Access.
2. Random Access.
1. Sequential Access. A process can read the bytes or records in the file in the order in which they are
stored, starting at the beginning. A sequential file can however be rewound and read as often as needed.
2. Random Access. Information stored in a random access file can be accessed randomly, irrespective of the
order in which the bytes or records are stored.
File Operation
An operating system provides a set of operations to deal with files and their contents. A typical set of file
operations provided by an operating system may be as follows;
Security in a computer system deals with protecting the various resources and information of a computer
system against destruction and unauthorized access.
A total approach to computer security involves both external and internal security;
External security deals with securing the computer system against external factors such as fires, floods,
earthquakes, stolen disks, leaking out of stored information by a person who has access to the information.
For external security, the commonly used methods include; maintaining adequate backup copies of stored
information at places far away from the original, information using security guards to allow entry of only
authorized persons into the computer centre. Allowing access to sensitive information to only trusted users
etc.
(a) User Authorization – Once a user is allowed physical access to the computing facility, the users
identification must be checked by the system before he/she can actually use the facility. E.g. Voice
recognition systems, Finger prints, Eye scanning, ATMs.
(b) Access Control – Even when a user passes the authorization stage and is allowed to use the computing
facility, a way is needed to prohibit the user from accessing the system’s resources/information that he or
she is not authorized to access e.g. pin number, password.
(c) Cryptography – Even if a user manages to gain access to the information which he/she is not
authorized to access, a way is need to ensure that the user cannot make use of that information.
Cryptography works on the idea that if it is not possible to ensure access control, it is better to prevent
comprehension of information.
The command interpretation module of an operating system provides a set of commands using which the
user can give instructions to the computer for getting some job done by it. When a user gives instructions
to the computer, the interpreter takes care of interpreting the command and directing the system
resources to handle the request hence the command interpreter provides a user interface to hide the
hardware details of the system from the user. The two broad categories of user interface supported by
various operating systems are;
Command Line interface: This is a textual user interface in which the user gives instructions to a computer
by typing commands. To enter a command, the user uses the keyboard to key in words and symbols e.g.
UNIX and DOS.
Graphical user interface (GUI); It is much easier to learn and use than command line interface. A GUI
provides the screen full of graphical icons and menus and allows the user to make a rapid selection from
the displayed icons or menus to use instructions to the computer.
1. UNIX.
It is a multi- user, timesharing operating system. It was developed in the early 1970s at the Bell labs by
Ken Thompson and Dennis Ritchie for a small PDP- 11 computer. It was the first operating system to be
written in a high level language (C – Language) since UNIX was written in C- language moving it to a new
machine was much easier. This was an important reason for its large popularity and availability on a wide
variety of systems. It has multi- processing capability but is also used in single – processor computers.
Additionally, it has a command driven interface. It has been the most widely used multi-user network
Operating System. There are many versions that can run on many different designs of computer i.e.
mainframe computers, micro and mini- computers.
2. DOS
Stands for “Disk Operating System”. It is a single user operating and IBM compatible Pcs. It was
introduced in 1981 by Microsoft and IBM and was the most popular Operating System for personal
computers in the 1980s. Its popularity stared reducing in the 1990s with the launch of Ms Window
Operating System. It is a single user operating single tasking and command operating system.
3. Microsoft Windows:
Developed by Microsoft to overcome the limitation of its own Dos operating system was initially developed
as a graphical user interface for Dos not as an operating system. The first success version of this operating
System was Windows 3.00 released in1990. Other versions were Windows 95, 98, 2000, XP, Millennium,
NT, and Vista.
Windows is a single- user- multi- tasking operating system. Progress is represented by icons which provide
the user with ease of manipulating of file and programs i.e. clicking, double – clicking, drag, drop, etc.
4. LINUX
An open –source operating system enhanced and backed by thousands of programmers worldwide. Its
multitasking operating systems which was originally designed for Pcs.
The Linux is derived from its inventor called Linus Torvalds. He was a student at the University of
Helsinki, Finland in the early 1990s when he wrote the first version of Linux as a toy project. He later
posted the code on the internet and asked programmers to help him build it into a working system. The
result was Linux. Torvalds holds the copyright but permits free distribution of the source code. He oversees
the development of the Kernel and its own trademark. When someone submits a change or a feature,
torvalds and his core team of kernel developers review the merit of adding it to the source code
Application software
A set of one or more programs, designed to solve a specific problem or do a specific task. E.g.
Word processing – enables us to make use of a computer system for editing, viewing, formatting, storing,
retrieving, and printing documents e.g. Microsoft word, word perfect, word pro, WordStar.
Database software – a set of one or more programs, which enable us to create a database, maintain it,
organize its data in desired fashion and to selectively retrieve useful information from it. Microsoft access,
Quattro pro, VISIC ALC
Graphics software – enables us to use a computer system for creating, editing, viewing, storing, retrieving
and printing designs, drawings, pictures, graphs and anything else that can be draw in the traditional
manner.
Education software – allows a computer system to be used as a teaching and learning tool.
An organization can develop proprietary software that is unique, customized programs for a specific
application area and on the other hand a company can purchase and use an existing software package (off-
the –shelf software).
Customized/proprietary software
Programmers determine the type of software to be developed according to users specific problems/ needs.
The software can be developed by an in-house development team or by a contracted software company but
based on the specific user needs.
Advantages
i) You can get exactly what you need in terms of reports, features e.t.c
ii) Being involved in development offers a further level in control over results
iii) There’s more flexibility in making modifications that may be required due to changes in technology or
environment.
iv) You don’t pay for features which you won’t use
v) The user get in-house’s a competitive advantage
Disadvantages
i) The cost of developing the software is high/expensive
ii) It takes more time to develop
iii) It is vulnerable or prone to errors because it has not been thoroughly tested
They are readily available across the shops or from software vendors.
Advantages
i) They are cheap because development and maintenance costs are shared among many customers
ii) They take less time to develop
iii) A user can start using the software almost immediately he purchases it
iv) Possibility of errors is low because it has been properly tested
Disadvantages
i) The user pays for features he/ she may never use
the machine language of a computer is written as strings of binary (ones and zeros).the circuitry of a
computer is wired in a manner that it immediately recognizes the machine language instructions and
converts them in the electrical signals needed to execute them.
Advantages
1. it is machine dependent
2. difficult to program
3. it is error prone
4. it is difficult to modify
5. the programmer has to have expert knowledge of the computer
6. it is extremely difficult to learn and use
2nd Generation programming languages (Assembly Language)
They use symbols and codes to represent program instructions instead of binary digits. The resulting
program still directly instructs the computer hardware therefore not easily portable.
Advantages
They are easier to learn and use than were the earlier generations. While not directly manipulating specific
hardware components, they must still give the computer detailed instructions of how to reach the desired
results. They incorporate great use of english like instructions which are easier to learn and use. Examples
include COBOL, FORTRAN, C, and PASCAL.
Procedural programming languages offer very little control and flexibility. They are portable.
They are much easier to use and more English like than procedural languages. Its programs tell the computer
what it needs to accomplish but do not provide detailed instructions as to how to accomplish it. They
concentrate on the output and not procedural details. They can be used by people who are not computer
specialists.
OOP was first introduced in 1967 by developers of a programming language named SIMULA 67. The basic
idea behind OOP is that programming languages are used for simulating real world problems on computers.
OOP’s consist of objects that include descriptions of data relevant to the object as well as the operations that
can be done on that data.e.g query languages, report generators, application generators
Features of OOP’s
1. There is extensive use of graphical objects
2. There are features that allow easy program coding, error detection and correction
3. In order to write code, one double clicks on an object and selects the event for which they are writing
code.
Advantages
1. Program coding is made easier
2. Error correction is made easy
3. Writing a program or application takes less time compared to procedural.
4. It is easier to learn than procedural
5. They are portable
COMMUNICATIONS
When referring to computers, communications describes a process in which one computer transfers data,
instructions, and information to another computer(s). Communications requires: a device that initiates the
transfer (a sending device); a communications device (such as a modem) that converts the sent material into
signals capable of being carried by a communications channel; a communications channel over which the
signals are sent; a communications device that receives the signals and converts them into a form understood
by the receiving device; and a device that accepts the sent material (a receiving device).
COMMUNICATIONS CHANNELS
An important aspect of communications is the channel, which is the communications path between two
devices. A communications channel is composed of one or more transmission media. Transmission media
consists of materials or techniques capable of carrying one or more signals.
TRANSMISSION MEDIA
Transmission media are one of two types: physical or wireless. Physical transmission media use wire, cable,
and other tangible (touchable) materials to send communications signals; wireless transmission media send
communications signals through the air or space using radio, Microwave, and infrared signals.
1. Physical transmission media used in communications include twisted-pair cable, coaxial cable, and fibre-
optic cable. These cables typically are used within buildings or underground.
2. Wireless transmission media used in communications include broadcast radio, cellular radio, microwaves,
communications satellites, and infrared. Wireless transmission media are used when it is impractical or
impossible to install cables. Many wireless devices that access the Internet now use the WAP (Wireless
Application protocol), which is a standard set of communications specifications that help to ensure
successful communications.
TRANSMISSION CHARACTERISTICS
Any transmissions sent during communications can be categorized by a number of characteristics including
the signal type, transmission mode, transmission direction, and transmission rate.
Categories of channels
You have learned that several different types if communications media exist, including both physical (twisted-
pair cable, coaxial cable, fiber-optic cable) and wireless (broadcast radio, cellular radio, microwave, satellite,
infrared). Some types of these media can transmit only one signal at a time, called base-band transmission,
while others can transmit multiple signals simultaneously, called broad-band transmission. Media that use
broadband transmission transmits signals it a much faster speed than those that use baseband transmission.
Satellite is an example of a media that uses broadband transmission. Two other widespread applications of
broadband transmission are digital subscriber lines (DSL) and cable television networks.
Simplex transmission,
Data flows only in one direction - from the sending device to the receiving device. Simplex transmission is
used only when the sending device does not require a response from the receiving device. Security systems
and fire alarms that contain a sensor, for example, use simplex transmission.
Half-duplex transmission
In half-duplex transmission, data can flow in either direction - from sender to receiver and back - but only in
one direction at a time. Citizens band (CB) radio, for example, uses half-duplex transmission; you can talk or
listen, but you cannot do both at the same time. Many fax machines, credit card verification systems, and
automatic teller machines also use half-duplex transmission.
Full-duplex transmission
In full-duplex transmission, data can flow in both directions at the same time. A regular telephone line, for
example, supports full-duplex transmission, meaning both parties can talk at the same time. Full-duplex trans-
mission is used for applications with intensive computing requirements or those with heavy traffic.
Transfer Rates
The speed with which a transmission medium carries data is its transfer rate. Transfer rate usually is
expressed as bits per second (bps) - that is, the number of bits that can be transmitted in one second.
Today's transmission media transmit data at rates ranging from millions of bits per second (Mbps) to billions
of bits per second (Gbps).
For two computers to communicate, they must have compatible communications software. Some
communications devices are pre- programmed to accomplish communications tasks. Other communications
devices require a separate communications software program to ensure proper transmission of data.
Communications software helps you establish a connection to another computer and manage the
transmission of data between computers; it resides in the main memory of the sending and receiving
computers while the connection is established.
To help you establish a connection to another computer, communications software uses wizards, dialog
boxes, and other onscreen messages to prompt you for information and automate tasks where possible.
Communications software usually includes one or more of the following features: dialing, file transfer,
terminal emulation, and Internet access.
The Internet access feature allows you to use the computer to connect to the Internet to send entail,
participate in chat rooms, visit World Wide Web sites, and so on. When you purchase a modem, it usually
includes a basic communications software package so you can connect to other computers, such as ones used
for a bulletin board system. When you subscribe to an online service or Internet service provider, the
provider typically sends you a separate communications software package, which you must use to connect to
their computers so you can access the Internet, send e-mail, and use their other services.
Communications devices
A communications device is any type of hardware capable of transmitting data, instructions, and information
between a sending device (sender) and a receiving device (receiver). At the sending end, a communications
device converts the data, instructions, or information from the sender into signals understood by the
transmission media on the communications channel. At the receiving end, the communications device
receives the signals from the communications channel and converts the signals into a form understood by the
receiver.
Recall that sending and receiving devices include a variety of types of hardware such as handheld computers,
laptop computers, desktop computers, minicomputers, mainframes, digital cameras, and fax machines. The
type of communications device used in a communications system depends on the type of sending and/or
receiving devices, as well as the type of transmission media.
Some of the more common types of communications devices are modems, cable modems, multiplexers, and
network interface cards.
Today, thousands of computer networks exist, ranging from small networks operated by home users to global
networks operated by numerous telecommunications firms. To interconnect the many types of networks that
exist, various types of communications devices are used, including hubs, repeaters, bridges, gateways, and
routers.
Telnet
One of the ways that a person can access a remote computer over a network such as the internet. It’s often
used by network administrators to remotely control and/or troubleshoot the operation of a web server.
Telnet programs act as if your computer is a terminal that is connected to the remote computer.
Intranets
Intranets are internal networks that use Internet and Web technologies. Intranets make company information
accessible to employees and facilitate working in groups.
Extranet
Videoconferencing involves using video and computer technology to conduct a meeting between participants
at two or more geographically separate locations.
MAN
Metropolitan Area Networks or MANs are large computer networks usually spanning a campus or a
city. They typically use wireless infrastructure or optical fiber connections to link their sites.
For instance a university may have a MAN that joins together many of their campus local area
networks (LANs) around a city.
WAN
A wide area network or WAN is a computer network covering a wide geographical area, involving a
vast array of computers. The best example of a WAN is the Internet. WANs are used to connect local
area networks (LANs) together, so that users and computers in one location can communicate with
users and computers in other locations. Many WANs are built for one particular organization and are
private.
2. Connecting cables:-
The cables commonly used for interconnecting PCs are the twisted pair copper wires, either Category
5 (CAT 5) or Category 6 (CAT 6) cables. Or fiber optic conections.
Instead of using cables, some wireless networks use radio or infrared signals to transmit data from
one network device to another. The NIC on a wireless network contain the transmitting device
necessary to send data to other devices on the LAN.
3. Network Servers
These are different kinds of network servers.
Non-dedicated server (peer-to-peer capability) here a network computer performs a dual role as both
file server and workstation.
4. Print server – stores files in a print queue and sends each queued file to the network printer. A
print job is a file that has been sent to the printer.
Application server is a computer that runs application software and forwards the results of processing
to workstations as requested. It makes it possible to use the processing power of both the server and
the workstation.
5. Modem - These are devices that modulate and demodulate data. Modulation is the process of
conversion of the computer data into analog signals before being transferred over a standard
telephone line.
Demodulation refers to converting back the data to digital form. The quality of a modem is
determined by its transmission speed. It can be either internal or external.
Examples:
Network Operating Systems such as Novell Network, Banyan lines, and LANtastic are software
packages designed to control data flow.
Standalone Applications
Most applications designed for standalone computers can be installed on a network server, which
sends them to individual workstations as requested.
GroupWare
A workgroup is basically two or more people who work on the same project. GroupWare is
application software that support collaborative work, usually on a LAN.
NETWORK TOPOLOGIES
This refers to how devices on LAN are connected to each other.
PC PC PC PC
Advantages
Easy to implement and extend
Well suited for temporary networks (quick setup)
Typically the cheapest topology to implement
Failure of one station does not affect others
Disadvantages
Difficult to administer/troubleshoot
Limited cable length and number of stations
A cable break can disable the entire network
Maintenance costs may be higher in the long run
Performance degrades as additional computers are added
Ring topology
Here every node is connected to two other nodes. Movement of data on the ring is normally in one
direction to prevent signals from interfering with each other.
PC
PC
PC
PC
Advantages
Growth of the system has minimal impact on performance
All stations have equal access
Each node on the ring acts as a repeater, allowing ring networks to span greater distances than other
physical topologies.
Because data travels in one direction high speeds of transmission of data are possible
Disadvantages
Often the most expensive topology
Failure of one computer may impact others
Star topology
Here all the messages pass through a central switch/hub. It allows any node to communicate with
every other node by sending messages to the hub.
HUB
Advantages
Easy to implement and extend, even in large networks
Well suited for temporary networks (quick setup)
The failure of a non central node will not have major effects on the functionality of the network.
Disadvantages
Limited cable length and number of stations
Maintenance costs may be higher in the long run
Failure of the central node can disable the entire network.
Network Protocols:
A communication protocols is a set of rules that ensures the orderly and accurate transmission and
reception of data. The most widely used network communications protocol are:
TCP/IP (Transmission control protocol/Internet protocol) which is used on minicomputer, micro
computer and mainframe networks. It is frequently used in UNIX and Win. NT systems and is the
basis for a communication on the network.
IPx (Internet-work packet exchange) is the protocol used by Novell NetWare, the most popular
microcomputer network software.
INTERNET
Definitions
Internet
Is a global network of many computers connected via telecommunication networks? The computers
communicate using a set of protocols called TCP/IP (Transmission Control Protocol/Internet
Protocol).
Internet can be compared with a library. Like a like a library, the Internet is also a source of
enjoyable, important and varied information that can be obtained and used by millions of people
across the world. The Internet also, like our library contains different forms, like text sound and
graphics. Super library does not allow just anybody to browse books or cassettes; this facility is
available only for authorized members of the library. In a similar way only authorized users of the
Internet can access it to obtain information.
NETWORK
Network is a group of computers and associated devices connected by communications facilities
(both hardware and software) to share information and peripheral devices, such as printers and
modems.
ISP
ISP is a company that provides and sells physical Internet access to users. ISP is a company that
provides access to the Internet. ISP stands for Internet Service Provider.
Examples:-Africaonline, Simbanet, Raha, Cybertwiga, Datel, TTCL, Internet Africa
MODEM
PROTOCOL
Protocol is a standardized means of communication among machines across a network. Protocols
allow data to be taken apart for faster transmission, transmitted, and then reassembled at the
destination in the correct order.
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is the communications protocol that
connects your computer to the Internet.
FTP
FTP (File Transfer Protocol) - This is a way of transferring files over the Internet from one computer
to another.
HTTP
HTTP (Hyper Text Transfer Protocol) is the protocol used between a Web browser and a server to
request a document and transfer its contents. HTTP is the standard language that computers
connected to the World Wide Web use to communicate with each other.
HTML
HTML (HyperText Markup Language) is the coded format language used for creating hypertext
documents on the World Wide Web and controlling how Web pages appear.
DOMAIN NAME
This is the unique name that identifies an Internet site. Domain Names always have at least two parts,
which are separated by dots. The part on the left is specific whereas the part on the right is more
general.
Examples:- tanzanet.org
ippmedia.com
isidingo.co.za
netscape.net
whitehouse.gov
tanzania.go.tz
ccm.or.tz
harvard.edu
IP
Internet Protocol is the most basic protocol to communicate on the Internet. An IP number is a
numerical address consisting of four numbers seperated by periods. Each IP address uniquely
identifies a certain computer on the Internet. The domain name is used to make using them easier.
BROWSER (WEB BROWSER)
Web Browser or Browser is a program that allows a user to find, view, hear, and interact with
material on the World Wide Web. Web Browser or Browser is a software program that lets you
find, see, and hear material on the World Wide Web, including text, graphics, sound, and video.
Popular browsers are Netscape Navigator, Mosaic, Opera, Internet Explorer.
URL
URL (Uniform Resource Locator) is the World Wide Web address of a site on the Internet. The URL
for the Tanzania Revenue Authority, for example, is http://www.tra.go.tz/
HYPERTEXT
Hypertext is any text that contains links to other documents - words or phrases in the document that
can be chosen by a reader and which cause another document to be retrieved and displayed.
Hypertext usually refers to any text available on the World Wide Web that contains links to other
documents.
HYPERLINK
Hyperlink is a graphic or piece of text in a Web page that, when clicked with a mouse, causes
another file on the Web to be accessed.
WEBPAGE
WEBPAGE is an individual file that is made up of HTML code. A webpage is an HTML file that
has a specific URL and is accessible via the www. Sometimes referred to as a page, a document, or a
home page.
WEBSITE
Website is a group of Web Pages that collectively represent a company, or individual on the World
Wide Web. A group of web pages that have been developed together to present information on
specific subjects is also a Web Site. A website is a collection of pages designed to present
information over the World Wide Web.
WWW
WWW (World Wide Web) is the Internet facility that allows you to browse linked Web pages.
WWW is a collection of online documents on Internet servers worldwide. World Wide Web
documents are written in HTML. In order to use the World Wide Web, you must have a World Wide
Web browser.
E-MAIL
E-mail (Electronic Mail) is the mail system that is used on the Internet to pass messages from one
person or group of people to another. The systems also permits the transmission of pictures and
sounds. E-mail means Messages, usually text, sent from one person to another via computer. E-mail
can also be sent automatically to a large number of addresses (Mailing List).
E-MAIL ADDRESS
E-mail Address is the unique Internet address to which your e-mail is delivered. A complete E-mail
address is composed of the username, "@" and the name of the server where the user's mailbox
resides. For instance username@domain name.
USERNAME
PASSWORD
Password is a secret combination of characters used to access a secured resource such as a computer,
a program, a directory, or a file; often used in conjunction with a username.
ATTACHMENT
AN Attachment is a file that is sent along with an e-mail message. Examples Picture File, Microsoft
Excel file, Microsoft Word file, Microsoft Access file etc etc etc etc etc
DATA PROCESSING
Definitions
Data – Basic facts about the activities of the business. E.g. number of hours worked by an employee
on a particular machine.
Information – Data which is summarized in the way you want it, so that it is useful to you in your
work. It’s the end product of data processing. Must be accurate, timely, complete, concise and
relevant.
Data Processing – Collection and manipulation of items of data to produce meaningful information.
It’s the process of transforming raw data into meaningful output i.e. information.
Data processing can be done manually using pen and paper, mechanically using simple devices like
typewriters or electronically using modern data processing tools such as computers.
Electronic data processing has become so popular that the manual and mechanical methods are being
faced out.
b. Timing aspects.
b. Input of data
The collected data is converted from human readable to machine readable form. The conversion takes
place in the input device.
c. Processing
The transformation of input data by the C.P.U to a more meaningful output (information).
d. Output
The production of the end product. The information can then be distributed to the target group or
stored for future reference.
Data Collection
Data collection is getting the data from the point of its origin (source documents) to the computer in a
form suitable for processing. Also referred to as data gathering or fact finding.
Tools that help in data collection include source documents such as forms, data capture devices e.g.
digital camera e.t.c.
a. Data creation
It’s the process of putting together facts in an organized manner.
Source documents – A great deal of data still originate in the form of manually prepared documents.
Data capture – Data is produced in machine-sensible form at source and is read directly by a suitable
device e.g. a bar code reader.
b. Data transmission
This depends on the method and medium of data collection adopted:
If computer is located at a central place, the documents will be physically transmitted i.e. by the
postman or courier services.
It’s also possible for data to be transmitted by means of telephone lines to central computer. In this
case no source documents would be involved in the transmission process.
Data collected using devices that directly capture data in digital form don’t require transcription.
d. Data conversion
Data may need to be converted from one media to another e.g. from floppy disk to hard disk for input to
the computer.
e. Input validation
Data entered into the computer is subjected to validity checks by a computer program before being used
for processing.
f. Sorting
This stage is required to re-arrange the data into a sequence required for processing. It’s a practical
necessity for efficient processing of sequentially organized data in many commercial and financial
applications.
g. Control
It’s not really a stage because control is applied throughout the whole collection.
a. On-line transmission of data from source e.g. Data Direct Entry (DDE)
c. The source document itself prepared in machine-sensible form using character recognition techniques.
Controls
Objectives of controls
i. To ensure that all data is processed.
Importance of controls
They must be instituted early as possible in the system. The quality of input data is of vital importance to
the accuracy of output. Everything possible must be done to ensure that the data are complete and accurate
just before input to the computer.
i. Validation checks
These are attempts to build into the computer program powers of judgement so that incorrect items of data
are detected and reported.
Input– When data is first input into the computer, different checks can be applied to prevent errors
going forward for processing. For this reason, the first computer run is often referred to as validation or
data vet.
Updated – Further checking is possible when the data input are being processed.
The following are the main types of validation checks that may be used:
Presence - Data are checked to ensure that all fields are present.
Size - Fields are checked to ensure that they contain the right number of characters.
Range - Number of codes are checked to ensure that they are within the permissible range.
Character check - Fields are checked to ensure that they contain only characters of the correct type
e.g. no letters in numeric field.
Format - Fields are checked to ensure that they are of the correct format.
Reasonableness - Quantities are checked to ensure that they are not abnormally high or low.
Check digits – Use of a check digit enables a number to be self-checking. It’s a means of ensuring that
a number (e.g. a customer account number) maintains its validity.
Even in advance systems, considerable checking of the source documents is often necessary.
Scrutiny to detect:
i. Missing entries.
c. Transcription errors e.g. errors in copying data from one form to another.
d. Data preparation errors e.g. errors made when keying onto diskette.
e. Program faults.
Computer files – a collection of information initially created in memory and then stored with a file name on
a secondary storage.
- Text/data files - Contain standard alphanumeric information that has been entered into the file via an
application program such as word processor, spreadsheet, database e.t.c.
Types of files
Master file
Main file that contains permanent data against which transactions are processed.
Contain:
o Reference data- tends to be relatively permanent and which is processed by amending i.e. making
occasional changes in the form of insertion of new records, deletion or alteration of existing
records e.g. personnel details.
o Dynamic data – Changes frequently and is processed by updating i.e. changing values of various
fields e.g. earnings and deductions.
Transaction/movement files
Includes input and output files for holding temporary incoming and outgoing data. Used to update
dynamic data on master files.
Reference file
Report file
Set of records extracted from data in master file used to prepare report which can be printed at a later
date.
Stores relatively permanent records extracted from the master files or generated after processing.
Dump/work file
Used to hold data for security and recovery purposes or for temporary storage whilst other work is being
carried out e.g. total earnings and deductions calculations (payroll processing).
Sort file
1. Bit. The smallest item of data is a single binary digit (a bit), either 0 or 1.
2. Character. Multiple related bits are combined to form a character. A bit is the basic unit of primary and
secondary storage, and a character is the basic unit for human conception.
5. File. Multiple related records are combined to form a file. A file is a number of related records which
are treated as a unit. Every record in a file has the same set of fields. Each record in a file is identified,
for storage and retrieval purpose, by a key field whose contents are unique for each record in a file. In
case of an employee file, employee-code field may serve as the key. In case of an employee file,
employee-code field may serve as the key field.
6. Database. Multiple related files are integrated to form a database. A database is a collection of logically
related data elements from multiple files.
- File-oriented approach
File-oriented approach was the traditional method and has largely been replaced today by the database-
oriented approach.
File-oriented approach
In this method, an application’s data is organized into one or more files and the application program
processes the data stored in these files to generate the desired output.
This method of organizing data is simple, inexpensive and usually easy to use.
1. Limited query flexibility. In file-oriented approach, the records are organized according to a key field. As
long as we search records based on key field value, the query can be processed quickly.However, when the
key field is not relevant to the information needed, the entire field has to be searched.
2. Data redundancy. This is the repetition of the same data items in more than one file. In file-oriented
approach, the same data items are often included in many different files. This leads to increase in cost of
data entry and data storage. It also leads to data integrity problem.
3. Data integrity problem. Data integrity is the consistency of the data in all files, i.e. when some changes
occur in a data item, every file which contains that field, should be updated to reflect the change for
consistency. For example, when a data item changes, if all files are not updated correctly, there may be
frequent discrepancies among reports produced from different files, causing confusion.
4. Lack of program/data independence. In file-oriented approach, the application programs usually contain
data format statements that precisely define each data field to be processed. This often results in different
files having the same data item stored using different data formats. Data dependence occurs when the data
is dependent on the application. Due to data dependence problem, whenever there is need to add, delete, or
change data formats, the application program must also be changed. Data dependence problem also causes
incompatibility among data files from different applications due to which these data files cannot be linked,
if such a need arises.
5. Limited data security flexibility. A file-oriented approach normally offers file-level data security feature i.e.
data access restrictions can be enforced only for an entire file, not for a record or a record or a field of data
item.
Database-oriented approach
In this approach, data from multiple related files are integrated together in the form of a database, with the
following properties:
4. It makes data independent of the application programs i.e. fields can be added, changed and deleted from
the database without affecting existing programs.
File organization1
File organization is very important because it determines the methods of access efficiency and flexibility.
Records are stored and accessed in a particular order using a key field. Retrieval requires searching
sequentially through the entire file word for word from the beginning to the end. e.g. if the record required
is the twentieth record on the file, in order to get it into storage to process it the computer will first have to
read in all nineteen preceding records. The principle storage medium for sequential files is magnetic tapes.
Sequential file organization is the most efficient and economical file organization in case of application in
which there is a large number of file records to be updated at regular scheduled intervals.
Applications such as payroll processing and monthly bill processing are processed in this manner.
c. They need relatively inexpensive input- output media and devices for their storage and processing.
d. They are most efficient and economical to use in applications in which the activity ratio is high(most
records are changed during update runs)
1. They are very inefficient and uneconomical for applications in which the activity ratio is very low.
2. Since an entire sequential file may need to be read just to retrieve and update few records,
accumulation of transactions into batches is recommended before processing them. Hence, the use of
sequential files is limited to a batch-processing environment.
3. Because of the need to accumulate transactions into batches before processing them, sequential
processing precludes the possibility of up-to-the-minute data.
4. Sequential processing require the files to be sorted before processing i.e. both the transaction and
master files must be sorted and placed in the same sequence before processing.
5. Sequential processing often leads to data redundancy problem, since the same data may be stored in
several files sequenced on different keys.
Records are stored in the disk at random but are accessed directly.
Many applications require up-to-the-minute timeliness of data. The users of such applications cannot afford
to wait for the transactions to be accumulated to batches and then processed together. Such applications
require a transaction to be processed immediately as and when it occurs. Examples of such applications are
airlines or railway reservation systems, teller facility in banking applications, systems for enquiring whether a
certain item is in stock in a store e.t.c. For such applications, the use of random/direct file organization is
recommended, in which the desired record pertaining to the current transaction at hand can be directly
located by its key field value, without having to search through a sequence of other records.
Direct file organization uses an address generating function to convert a record key value into a storage
address on the disk on which the file is stored.
1. Given the key, any record can be quickly located and retrieved directly, without the need for a sequential
search of the file.
3. Accumulation of transactions into batches is not required before processing them. They may be processed
as and when generated.
4. It can support interactive online applications, which need to provide up-to-the-minute information in
response to inquiries from users.
5. If required, it’s also possible to process direct file records sequentially in a record key sequence.
1. They require relatively expensive hardware and software resources because they must be stored on a
direct-access storage device, such as a disk.
2. Due to address generation overhead involved, they are less efficient and economical than sequential files
for use in sequential applications with high activity ratio (The ratio of the total number of records in a
transaction file and the total number of records in the master file).
3. Special security measures are often necessary for online direct files, which are simultaneously accessible
from multiple online stations.
- The smaller index file which contains the key and disk address of each record stored in the data file.
The records of the file can be stored in a random sequence, but the index table is in sorted sequence on the
key value. This provides the user with a very powerful tool. Not only can the file be processed randomly, but
it can also be processed sequentially.
1. They can be quite efficiently used for sequential processing of high activity ratio applications.
2. They can also be used quite efficiently for direct access processing of low activity ratio appliances.
1. They require relatively expensive hardware and software resources because they must be stored on a direct-
access basis, such as a disk.
2. They require more storage space than other types of files because of the need for index file.
3. When used for direct access online applications, access to records may be slower than direct files.