Module 1 PDF
Module 1 PDF
n ternationa INTERNATIONAL
l
COMPUTER
Com p
IC
ce
DL
DRIVING
cen
ut
er Li
D riving ã LICENCE ã
MODULE 1
Basic Concepts of IT
TABLE OF CONTENTS
HARDWARE ................................................................................... 11
Central Processing Unit .......................................................... 11
Input Devices ......................................................................... 12
Output Devices ...................................................................... 17
STORAGE ...................................................................................... 21
Memory Storage Devices ........................................................ 21
Types of Memory .................................................................... 28
Measuring Memory ................................................................. 30
Computer Performance .......................................................... 32
SOFTWARE .................................................................................... 34
Types of Software ................................................................... 34
Operating System Software .................................................... 34
Application Software ............................................................... 37
Systems Development ............................................................ 40
GETTING STARTED
! Exchange information
! Transfer files from one computer to another
! Download software
! Access available information on any subject
! Collaborate interactively
! Communicate instantly via chat sessions
! Shop online
! Participate in subject group discussions.
Electronic Office
The electronic office (Paperless office) is a concept meant to reduce to a
minimum the amount of paper work kept in an office. Imagine how difficult
it could be to search for a client’s record which could have been mis-filed
by the last user! Now, using a computerised database, information is just
a mouse-click away.
Worse still, imagine losing all files by natural disaster such as fire or floods.
Using a computer all information can have backups kept at a remote place
and, if networked, information can be stored in another computer elsewhere.
Information can be transmitted more easily and faster by electronic mail,
than by using telex or facsimile.
These days there is no need to travel to other countries for a conference
because now one can sit in front of the computer and have a video
conference with someone abroad, meetings can be conducted whilst in
one’s office, with huge savings on time and money.
So, as you can appreciate, computers are being used everywhere, that is
in schools for administration and teaching, in banks, shops, companies,
homes, agriculture, medicine etc. Knowing how to work with a computer
then becomes a necessity.
WHAT IS HARDWARE?
This is the term given to the physical or tangible parts of a computer system.
For example, keyboard, mouse, central processing unit, screen, printer
and the speakers. These examples will be classified and explained in detail
later in this module.
For computer equipment to be functional it also needs something that is
not tangible. Hardware on its own is not functional, it needs software.
WHAT IS SOFTWARE?
Software is the term used for the programs that are used to give instructions
to the computer and the information that is obtained from the computer.
Examples of software are Windows 95, Windows 98, Microsoft Word,
Microsoft Excel, Lotus 1-2-3, Word Perfect, Microsoft PowerPoint. Types of
software will be discussed later in this module.
Software is not a “fixed” part of the computer but is loaded as and when
needed. The immense versatility of the computer comes from the fact that
the same computer can be used for many different applications, and this
is achieved by loading different software for each requirement.
This data-rate depends on the length and the quality of the line connecting
the end-user to the telephone company. On average download data flow is
between 1.5 to 9 (mbps) megabits per second while typical upstream data
flow is between 16 to 640 (kbps) kilobits per second speeds average.
ADSL carries analogue voice, digital data and video.
Client-server Model
This is a system in which software is split between server tasks and client
tasks. A client (user) sends requests to a server (according to a protocol to
allow communication) for information or the performing of an action which
the server responds to.
E-Commerce
It is important for us to realize that electronic commerce involves more than
buying or selling online. It involves the entire online process of developing,
marketing, selling, delivering, servicing and paying for products or services.
It has to be appreciated that paying online poses some challenges. For
one, online customers cannot pay by cash or by cheque.
Electronic means have to be used. One is to use your credit card. However
your information is vulnerable to interception by network sniffers, software
that recognizes credit card formats. Hence most companies use security
measures to counter this problem such as software that automatically
encrypts data passing between your browser and the merchant server.
I NFORMATION T ECHNOLOGY
This is a term used to refer to the procedures and equipment used by
people to improve the quality of gathering, processing, communicating
and storing information.
Because we are now living in an information society where there is more
and more information everyday, a mass of Information Technology has
been produced. This includes radios, televisions, telex, telephone, fax
machines, satellites and computers. It is also necessary to realise that a
ballpoint pen and a book are examples of Information Technology.
With the development of new methods of communicating, storing and
gathering information, this information is seen reaching almost every corner
of the world in a faster way with more people accessing it.
Long ago people depended on smoke signals and drums to transmit and
receive information over long distances but their use was affected by distance
and geographical locations. Now with satellite and radio link technology
everything is possible and information can be transmitted to remote areas.
With IT there is less paperwork involved and retrieval of information is fast
and easy. Storage of information has been enhanced, information can
now be carried in a small diskette and retrieved when needed.
Types of Computer
WHAT IS A COMPUTER ?
A computer is an electronic device capable of accepting data, processing
it, giving it out and storing it for later use.
Taking into consideration the definition above, all computers regardless of
their differences in size, capacity, speed, cost and number of users, have
to perform four basic functions.
These are:
Acceptance of data
Processing of data
Giving out processed data and
Storing data.
Laptop Computers/Notebook
Laptop computers have a screen inside the top flap
and the keyboard on the bottom flap. They are
designed for portability, using miniature electronic
circuitry, so are generally more expensive than the
desktop PC’s.
New developments are palm or pocket computers.
These can be connected to desktop or laptop
computers to download or upload data files.
HARDWARE
CPU stands for Central Processing Unit. It is the ‘box’ that contains, among
other things, the hard disk, CD ROM reader and diskette drives, and to
which all peripherals (screen, keyboard, mouse etc.) are connected. It
contains a functional unit (processor) that interprets and carries out
instructions. It may be likened to the Central Nervous System of an animal.
An instruction is made up of operations that specify the function to be
performed and operands that represent the data to be manipulated. For
example if the instruction is to perform the operation of multiplying two
numbers, there are two things that need to be taken into consideration that
is:
! What the two numbers are, and
! Where the two numbers are.
The job of the central processor is to retrieve instructions and data from
memory and to perform each operation.
Processor models were initially named in numbers for example 80286 or
simply 286. Some examples of the processors are 386dx, 386sx, 486DX2,
486DX4, 586 or Pentium 1, Pentium II, Pentium III. We now also have the
AMD K-6 Processors. The type of processor determines the speed and
efficiency of the computer. Generally the higher the processor model
number, the faster the processor.
PROCESSOR S PEED
The speed of the processor is measured in Megahertz (MHz) which means
million cycles or instructions every second. The speed of the computer is
actually given by the Clock of the computer which sends timed electrical
signals every second and provides the processor’s heartbeat.
A processor is made up of two functional units and a set of workspaces,
that is, Control Unit, Arithmetic Logic Unit (ALU) and Registers.
Input Devices
Input devices send data and instructions to the computers. There are many
input devices but the most common ones are the keyboard and the mouse.
This module will describe the following input devices.
Keyboard
Mouse
Trackball
Joystick
Light pen
Touch screen
Modem
Scanner
Microphone
Bar code reader
Digital camera
Video digitiser
Magnetic ink character recognition (MICR)
Magnetic strips or stripes
Storage devices can be used as input devices.
KEYBOARD
This is a human touch input device, which means it needs
the human hand to press the keys when entering data. It
mostly captures text data. There are four general areas of
the keyboard. These are the function keys that are labelled
from F1 to F12, the typewriter area in the QWERTY format;
the numeric keypad located on the far right side of the
keyboard and the cursor motion and control keys. To use
the keyboard, just press and release the keys.
THE MOUSE
The mouse is used for all “point and click” operations.
It is a powerful device in today’s graphical user interface type of
programs.
The mouse translates the movement of the hand to the movement
of an arrow, called the mouse pointer, on the screen. The mouse
usually has a ball underneath which rolls when the mouse is moved,
and this ball causes the two shafts to rotate. When the pointer is
over an icon the mouse buttons can be clicked or double-clicked,
or the mouse can be dragged to initiate an action.
TRACKBALL
A trackball is commonly used instead of a mouse on laptop and
notebook computers. The main part of this device is a ball built into
the keyboard. The ball has the same function as the ball built into the
bottom of a mouse. When you turn the ball the pointer moves.
J OYSTICK
The cursor movement on the screen is controlled by a vertical stick (hence
the name joystick). In some variations such as gamepads, cursor movement
is controlled by the gadget’s arrow buttons. An advantage it has over a
mouse is that more functions are available on the joystick.
SCANNER
This is used to capture graphical or image data. There are two types of
scanners, the hand and the table or flatbed scanner. When you want to
copy a printed picture into the computer you need a scanner to capture it.
The hand scanner is pulled over the image manually, whereas the table
scanner is like a photocopier, and automatically pulls the sensors over the
image.
LIGHT PEN
This is a device the size of a normal pen with a light at its end. The
light pen is connected to the computer by a cord. The user touches
the point of the light pen on the screen of a special pad then makes
writing or drawing motions. This is mostly used by Artists and
Designers.
TOUCH PAD
This also allows the user to sketch a design. It is a flat pad
that the user can write on using a pen like structure known
as a Stylus. All movements made on the pad by the stylus
are translated into writing or drawings on the screen,
because the pad is sensitive to the position of the stylus
and the stylus is sensitive to the pressure applied by the
user.
Most laptops that do not use a trackball, make use of a
touchpad.
TOUCH SCREEN
This device works in a similar way to the light pen. Signals are sent whenever
the user touches any position on the screen to execute a particular
instruction. A finger or pen can be used as with map kiosks in shopping
M ICROPHONE
A microphone is an input device that translates sound into electric current,
which the computer will then digitise. Initially this was designed as a special
device for the handicapped and required special software. However, more
and more Voice-Recognition software is becoming available, allowing users
to “speak” text rather than type it in. Voice Recognition applications usually
have to be “trained” to understand different voices.
Microphones are also becoming increasingly important as Internet tools,
and the Voice Over Internet Protocol is allowing verbal conversations and
Voice Messaging across computer networks.
Computers that are equipped with a microphone, sound card and speakers
can be used for telephone network switching, and this is becoming
increasingly important in large call centres.
D IGITAL C AMERA
This is a special device used to capture images in digital form. Instead
of storing the image like a conventional camera on a film for
subsequent chemical development, it stores the images on a floppy
disk or in a computer chip. These are later downloaded onto a
computer for editing and printing. The major advantage of digital
pictures is that they can be attached to electronic mail, and hence press
photographers on assignment in distant locations can send in their copy
quickly and easily. The other advantages are that the floppy disk or chip is
re-usable, whereas a normal photographic film is not.
It also has very powerful tools available for editing and enhancing digital
pictures. The digital camera can also take short video clips that can be
used for multimedia projects.
VIDEO D IGITISER
This is a special device used to display video signals from a video camera
or video recorder in a window on the computer screen. Still images can
also be captured. This is usually used by video editors because it allows
the user to select the best part or images of a tape. Once the video sequences
are on the screen they can be stored on to the hard disk as a video clip, but
remember if not properly compressed they can take a lot of disk space.
Output Devices
These are devices that display or output work which has been done by the
computer in a form readable to users. These include the following:
! Monitor
! Printer
! Plotters
! Speakers
! Actuators
M ONITOR
This is also called the screen or the VDU; it is the main way
of getting the processed data out of the computer. Monitors
come in different shapes and sizes. The most common size
is the 14-inch monitor and the size of the monitor is
measured diagonally. Although they come in different
capabilities in terms of colour output their function is still
the same – to display information to the user.
The normal PC monitor uses a Cathode Ray Tube (CRT)
which contains an electron gun. This shoots a stream of
electrons onto a screen coated with a phosphorescent
substance. There are control buttons on the monitor that
the user can use to adjust the size, brightness and position of the display
area. There is also a power button to turn the monitor on and off. There is
a light next to the power button to indicate the status of the monitor, whether
on or off.
You should note that switching off the monitor will not affect your
information.
Whenever you shut down your computer remember also to switch off the
monitor. The CPU can run continuously for days because it has got an in-
built fan but the monitor needs to be switched off because of the absence
of the in-built fan and it can become hot after some time.
Press the monitor power button to switch it off the same way
you turn off your television at home.
The light should go off and the screen become black, you have
turned it off
Press the monitor power button to switch it on.
You should see the same information that was displayed before
you switched off the monitor
PRINTERS
Printers produce ‘hard copies’ printed on permanent material. It is
called hard copy because it is tangible and cannot be easily changed.
There are two categories of printers, impact and non-impact printers.
The Dot matrix printer is an example of an impact printer because it
uses tiny dots to produce letters and graphics. They make a lot of
noise and are slow. Some examples of Dot matrix printers are the
Epson LX300, Epson LX780 and the Citizen Prodot 24.
Ink Jet printers are an example of a non-impact printer since they use
nozzles to spray characters on to the page. They are between the dot matrix
and laser printers in terms of speed and quality. Some examples are Canon
BJC 620, HP 610C, HP 590C, Epson Stylus Colour 300 and the HP 859Cix.
Laser Jet printers use the principle of a photocopier and use a laser beam
to print characters onto a page. They are faster and more expensive. They
are also an example of a non-impact printer. High quality text and graphics
are produced. Some examples are HP LaserJet 1100, HP LaserJet 2100,
HP LaserJet 4L, HP LaserJet 5L and the Epson EPL 5700.
Do the following activity after learning about the mouse and list the printers
that are installed on your computer.
PLOTTERS
Plotters are used in the scientific and engineering sectors for drawing
building plans, machines and machine parts. Plotters can take A3 and A2
paper and come in different sizes and types. Some of them are as big as a
small classroom!
Plotters use precision motors controlled by a computer. These motors move
an arm across the paper in the ‘X’ direction and a pen unit up and down
the arm in the ‘Y’ axis direction whilst an electromagnet lifts and drops the
pen onto the paper, by so doing drawing or plotting an object according to
instructions.
A CTUATORS
These are devices that can generate physical movements from signals
sent by computers. These signals can be sent through wireless (remote)
transmission or through cables. There are at least four types of actuators
and these are:
Motors
These are driven by the output of the computer and this output is displayed
by the turning of this motor. These motors are called stepper motors
because each electrical impulse from the computer rotates the motor shaft
by a very tiny amount such as 1.80. They give very precise movements
and they are used on devices such as flatbed plotters or on robotic arms.
A robot arm can be controlled by motors, hydraulics or pneumatics. The
type of the system used depends on the application.
S PEAKERS
Computers with sound cards are able to translate digital sound into audible
signals via speakers.
O THERS
Some devices such as a modem can be input or output devices. This is
used to receive and download mail but can also be used to send e-mail. A
touchscreen can display a menu system and accept input when the screen
is touched. Some digital cameras can be used to download pictures stored
in the memory and can also upload pictures previously downloaded to the
computer.
STORAGE
The types of memory storage devices are outlined below with their size
and uses
Device Speed Capacity Cost i.e. expensive
cheap
Internal Hard Very fast – speed is Average new hard Costs are falling rapidly
Drive often represented as drives are in the and normally represent
‘average access time’ region of 30 GB but the cheapest way of
measured in can be enormous storing data
milliseconds – the
smaller this number
the faster the disk
External Hard Normally slower than Same as internal More expensive than
Drive an internal drive but drives an internal drive
more expensive
versions can equal a
good internal drive
Zip and Both are slower than 100 or 250 mg for a As one has to buy both
Jaz drives normal hard drives Zip disk and a Jaz a drive and the disks –
but ideal for backups drive up to 2 GB this can be expensive
The Jaz drive can hold
more data
Magnetic Slower than a hard Can hold large Initially expensive but
tapes and data drive and normally amounts of data economical for large
cartridges used in backups backups as they can
(data cartridges be reused
are similar to
magnetic tapes
but enclosed)
Floppy disks Very slow – almost 360 kb was normal They were relatively
5.25 obsolete cheap – now almost
unobtainable
CD ROM drives Much slower than a Around 650 mg The recordable Cds
hard drive but are relatively cheap
quicker than a and the cost of a drive
diskette is becoming cheaper
DVD drives Slower than a hard Up to 17 Gbytes Both disks and drive
drive more expensive than
a CD
FLOPPY/STIFF DISKS
These are the removable part of secondary storage. They are used with
floppy drives and there are two types of floppy disks, the 3.5-inch and the
5.25-inch. The 5.25-inch disk is virtually obsolete and new computers are
being manufactured without this drive. The 3.5-inch diskette is more robust,
physically smaller, and can hold more information than the 5.25-inch floppy.
When both drives are present the 3.5-inch is usually called drive A and the
5.25-inch, Drive B. A drive is the unit into which the disk is inserted.
Density Size
3.5-inch 2S/2D 720Kb
2S/HD 1.44MB
5.25-inch 2S/2D 360Kb
2S/HD 1.2MB
The notations 2S/2D and 2S/HD stand for “double sided/double density”
and “double-sided/high density” respectively. The 5.25 floppy disk is pretty
much obsolete now. The 3.5 diskette is likely to follow the 5.25 diskette into
obsolescence when CD writers become a standard part of new PCs as
well as flash disks.
FORMATTING DISK
Floppy Disks should be formatted periodically and before being used for
the first time. The computer must keep track of where all the information is
stored so it uses an index system. It is possible for the index to become
corrupt and data to be lost. Diskettes can also be damaged (scratched).
There are two ways to format a diskette, the “quick” and “full” formats. A
quick format only erases the index so the data remains but cannot be
accessed. A full format erases both the index and the data and checks the
diskette for damage.
To format a diskette open Windows Explorer. Place the diskette in the drive
and right click on the diskette icon. Select “format” then select the type of
format required. Click OK.
(All disks must be formatted before they can be used for the first time.
Hard disks are formatted before any software is loaded. Never try to format
your hard disk because all information stored on it will be lost and your PC
will stop working!)
MAGNETIC TAPES
These are the same as those used by radios or tape
recorders. Data or information is stored on a tape in
a sequential way in blocks separated by interblock
gaps. The tape drives have magnetic heads, which
read or write information on to the tape as it moves.
Usually the tape drive is external and is connected to
the computer by a cable.
D ATA CARTRIDGES
Data cartridges are a special magnetic tape
contained in a sealed cartridge, which is opened
only when the cartridge is in the tape drive. These
are more robust than magnetic tapes.
C OMPACT DISKS
These are the common means of distributing software to PCs. They look
exactly like the musical CD’s that are played on your radio. They store
large amounts of information up to 650MB (which is equivalent to 325 000
pages) in the form of text, sound, still pictures, animation and video clips.
A laser beam reads the information. CDs can be found in four different
forms, that is the CD-ROMs, CD-Rs, CD-RWs and finally the DVDs
CD-ROMs
These letters stand for Compact Disk – Read Only Memory, which means
you can only read but cannot change anything either by deleting or adding
new information. Although it’s a storage device it cannot be considered to
be a backing store since the user cannot write onto it.
They are used to distribute programs, such as encyclopaedias, dictionaries,
bibles, multimedia programs, educational programs and games.
CD-Rs
These are blank CDs that the user can write on, once only, using a CD
writer which can be either external or internal.
CD-RWs
These are re-writable CDs which means the user can read and write many
times as if using a hard disk.
DVDs
Digital Video Disks use the same principle as CD-ROMs but store more
information. They store information on both sides and they can take up to
17 Gigabytes. DVDS are becoming widely used for distribution of films
and video material. They first appeared in 1996 with the concept of Videos
on CDs. To play DVDs you must have a DVD Drive or Player (which is
also able to play CD-ROMs).
Types of Memory
There are two types of Computer memory, namely Primary and Secondary
Memory.
Primary Memory is also known as Internal Memory or Main Memory.
Secondary Memory is held on the hard disk and is used when there is
insufficient Primary memory to hold all the data or instructions
(programme).
Primary Memory, made up of semi-conductor memory chips, is found in
the CPU on the motherboard. There are two types of Primary Memory,
that is, RAM and ROM, with ROM having other versions such as PROM,
EPROM and EAROM.
Features of RAM
! It holds the application programs and instructions in current use.
! Information in this memory can be read, written and changed.
! It is usually between 256 kilobytes and 512 Megabytes.
! It is the main part of primary memory.
! It is volatile
Features of ROM
! It is non-volatile and is used during start-up.
! It forms a small portion of the main memory
! It gives the CPU instructions during the start-up or booting process.
There are several subsets of ROM, which are:
! PROM (for Programmable Read Only Memory). This type of
memory can be programmed by the user and the programmed data
is held permanently once programmed.
! EPROM (for Erasable Programmable Read Only Memory). Just
the same as the PROM but this has an advantage in that it can be
erased and reprogrammed but for one to erase it, the EPROM must
be removed from the computer.
! EAROM (for Electrical Alterable Read Only Memory). This type
of memory can be erased, read and re-programmed without removing
the chip from the computer.
Measuring Memory
The table below outlines the relationship between measurement units and
what they represent:
Memory Size Relate to Additional information
type
Kilobyte 1024 bytes A short page In decimal systems, kilo stands for
of text 1,000, but in binary systems, a kilo is
1,024 (2 to the 10th power).
Technically, therefore, a kilobyte is
1,024 bytes, but it is often used loosely
as a synonym for 1,000 bytes. For
example, a computer that has 256K
main memory can store approximately
256,000 bytes (or characters) in memory
at one time.
Computer Performance
The performance of a computer in terms of processing speed is related to:
! Processor Chip type
! Primary Memory size, and
! Clock Pulse.
The amount of information a computer can hold is dependent on its
Secondary Memory (Hard Disk) size.
Usually the efficiency of a computer is related to the Processor Chip, with
more advanced chips giving improved performance. The early PC processor
chips were known as 8086, 286, 386 and 486. These are all now obsolete,
and have all been superseded by the Pentium chip. The Pentium chip is
available in a range of different speeds; e.g. there is the Pentium 166 and
Pentium 200. The Pentium 200 is faster than a Pentium 166.
It is also important that the computer has sufficient random access memory
i.e. RAM. If there is adequate RAM, the computer can be fast if configured
well, and will be able to run many programs concurrently without running
out of memory. A good office computer should have at least 32MB of
RAM.
Performance is also related to the speed of accessing the hard disk, for I-
O (input output) operations. Hard disks come in different speeds, some
IDEs are now faster, i.e. their rate of data transfer is greater. Improvements
in hard disk technology have enabled the development of very large and
very fast hard drives, at prices affordable for home and small office
computing. However accessing the hard disk is still slower than accessing
RAM and the size of the RAM determines how often the hard disk is
accessed.
The combination of a modern Processor chip, sufficient RAM and adequate
Hard Disk storage space will produce good performance.
However, it should be noted that an upgrade of the operating system or
application software may degrade computer performance, as the general
tendency is for each upgrade to require greater RAM and Hard Drive
Resources.
Another factor affecting performance is the number of programmes or
applications running at the same time. The amount of RAM available on
any computer is limited and has to be shared between applications, the
more programs loaded at one time the less RAM each programme has
available.
SOFTWARE
Types of Software
Software is the collective noun describing the programs that are used to
give instructions to the computer. The user will need a basic understanding
of software concepts to be able to interact with the computer. Knowing a
little about software types will help the user decide which program to use
when solving a particular problem. For example when there is a need for
financial analysis the user should know which software is best used for
financial analysis.
There are two types of software namely System Software and Application
Software. System software controls the operations of the computer, and
application software performs user-required functions. For a computer to
be functional it must have system software.
SYSTEM SOFTWARE
The basic component of system software is an Operating System. It is
the minimum software that the computer must have for it to be functional.
An Operating System is a program that runs first when you switch on your
computer and continues to run in the background. All other programs run
under the control of an Operating System. Some have even referred to the
Operating Systems as a Traffic Cop or Central Nervous System because
of its functions.
The process of loading the Operating System is known as Booting, which
is the process of switching on a computer. As electric power is detected the
computer runs a program which fetches the Operating System from the
HARD DISK and leaves it running in the computer memory to control all
other programs. The user does not participate during this process if the
Operating System is installed properly.
Examples of Operating Systems
MS-DOS
WINDOWS 95
WINDOWS 98
WINDOWS 98 SECOND EDITION
WINDOWS NT WORKSTATION
WINDOWS NT SERVER
UNIX
MACINTOSH
USER INTERFACE
The term User Interface refers to the way in which the computer presents
itself to the user and the way the user will communicate or interact with the
computer in terms of giving commands. It also determines how easily you
will open a program. A good interface should have the following
characteristics:
! It should be user friendly, allowing the user to do basic operations
without having to first read the computer manual.
! It should be attractive so that it encourages the user to use it.
! And finally it should be effective and easy to use.
There are two types of User Interface. These are the Command Line
Interface and the Graphical User Interface or GUI used with the newer
operating systems.
Advantages of GUI
! There is no need to enter commands by typing, so it is faster, more
reliable and there is no need to remember spelling or syntax.
! You use similar actions or procedures to do various different jobs.
! Almost all applications have the same appearance, that is, they contain
caption bars, menu bars, tool bars and status bars in general.
Application Software
The programs that are designed to solve specific problems are referred to
as Application Software. A wide range of programs have been created to
deal with a wide range of problems. These programs are user-oriented
whilst system software is computer-oriented. In this type of software we
have different sub types such as, word processors, desktop publishing,
database management, spreadsheets, graphics, multimedia and
communications.
S PREADSHEET P ROGRAMS
Also known as Financial Analysis programs, spreadsheets were designed
to perform money calculations. These programs can be used to
accumulate sales figures, calculate cash flow and expenses and profits,
for home budget. Calculations are done at high speeds. They are used to
calculate sums, averages, and other complex mathematical functions. A
spreadsheet may be made up of several worksheets, each containing rows
and columns. Where a row and column meet is what is known as a cell.
Each cell is given a reference or address starting with the column and then
the row. For example A1 means where column A meets with row 1. Columns
are indicated by alphabetical letters and rows by numbers. Examples of
Spreadsheet program are Microsoft Excel, Lotus 1-2-3, Quattro Pro and
SuperCal.
It is recommended that you study the ICDL Module 4 Study Guide for a
better understanding of Spreadsheet programs.
Systems Development
System Development can be divided into two areas. The one is when an
existing package or programme is chosen for a specific business application.
The other kind of system development is when no ready-made package
exists and new programme(s) must be written.
To develop a computer system from scratch is expensive and time
consuming, so is not usually undertaken except by large companies and
specialised computer companies. The following steps are given very briefly
because this is a very specialised field and one that the reader of this manual
is unlikely to become involved in.
! Analysis – This is the first step when the problem is examined and
defined. It is the Analysts job to decide what data has to be stored for
manipulation and the best way for a computer to be used. In other
words the Analyst analyses the problem and designs the computer
system.
! Programming – the Programmer writes the programmes according
to the Analysts instructions. It could be said that the programmer
translates the instructions from something you and I can understand
into something that the computer can understand.
! Once the programs have been written they must be tested. Without
testing no one can be sure that the programmer has done the
translating correctly or that the analyst hasn’t overlooked something.
! Implementation – the final step. The programs are ready for use with
‘live’ data. Implementation also involves training of the user etc. as
detailed below.
It should be remembered that the quality of the above product depends on
the abilities of the people involved and the available time. Even the best
team cannot think of every possibility. Although the product is tested before
being used in a live environment the real test comes with the live data and
errors and omissions will be found. In addition the users needs change
with time. Therefore computer programs need constant updating or
maintenance.
Operating systems (e.g. Windows) and programs (e.g. Excel) also need
updating to take advantage of technological advances. Each upgrade of
computer software is given a version number to allow both the supplier
and user to keep track of the changes. Often when a suite of programs is
completely revised a new name is used (e.g. Windows 3.1, Windows 98,
Windows 2000.) As far as possible the latest version should be used but
this is not always possible without upgrading the hardware. (Windows 2000
cannot be run on a 486 or a small Pentium PC due to the memory deficiency
of these machines).
Developing a system or deciding on the best available software for a
company’s needs may be described as follows. The System Development
involves the chain of events from the inception of the idea of using a computer
to the successful running of the computer system. The life cycle of a
computer system is dependent on how useful or successful it is, and on
the developments in the technologies used. Generally, system development
costs should be amortised over 3 to 5 years, and the system reviewed after
that period.
System Development includes the following phases:
Initiation Recognition of the problem and establishment of
project objectives, boundaries and terms of
reference
Feasibility Study Examination of feasibility of alternative solutions,
and decision as to which is most appropriate
INFORMATION NETWORKS
WHAT IS A NETWORK?
Networking is the linking together of computers either by wire cables, fibre
optic cables, microwave links or satellite. The networking of computers
introduced in the mid 1980s allowed users to link PCs on their desks together
via cables and a special network Operating System.
LAN
LAN means Local Area Network. This is a network which only connects
together computers in the same building for example an office or a house.
Each computer on a network is called a workstation or terminal. If the
workstation has processing ability it is known as an Intelligent Terminal
and if it does not have processing power it is known as a Dumb Terminal.
Most dumb terminals have a screen and a keyboard only.
WAN
With the advancement of telephone communication technology, WANs were
developed for Wide Area Networks, which connect computers in different
geographical locations. For example computers in a Harare office
connected to the organisation’s Bulawayo offices. Two or more LANs can
be connected together to form a Wide Area Network.
The wiring needed for both a WAN and a LAN to function is installed and
used specifically for that purpose.
PSDA
Short for packet-switched data network, a data communications network
that is based on the principles of packet switching, as opposed to circuit
switching that is used in public telephone networks. Packet-switched
networks do not establish physical communication channels between
communicating devices like circuit-switched networks do. Instead, signals
are formed into fixed-length packets that are affixed with a source and
destination address and packet ordering details. The packets then rely on
network routers to read the address data and route the packets through
the network to their destinations. When the packets arrive at the receiving
device, the packet ordering data is used to reassemble the original signal.
One advantage of packet-switched networks is that packets from different
sources going to different destinations can share common data pathways.
Also called a packet-switched network, or PSN.
PSTN
Short for Public Switched Telephone Network, which refers to the
international telephone system based on copper wires carrying analog voice
data. This is in contrast to newer telephone networks base on digital
technologies, such as ISDN.
Telephone service carried by the PSTN is often called plain old telephone
service (POTS).
ISDN
Abbreviation of integrated services digital network, an international
communications standard for sending voice, video, and data over digital
telephone lines or normal telephone wires. ISDN supports data transfer
rates of 64 Kbps (64,000 bits per second).
ADSL
Short for asymmetric digital subscriber line, a new technology that allows
more data to be sent over existing copper telephone lines (POTS). ADSL
supports data rates of from 1.5 to 9 Mbps when receiving data (known as
the downstream rate) and from 16 to 640 Kbps when sending data (known
as the upstream rate).
ADSL requires a special ADSL modem. ADSL is growing in popularity as
more areas around the world gain access.
DSL
Refers collectively to all types of digital subscriber lines, DSL technologies
use sophisticated modulation schemes to pack data onto copper wires.
They are sometimes referred to as last-mile technologies because they
are used only for connections from a telephone switching station to a home
or office, not between switching stations.
DSL is similar to ISDN inasmuch as both operate over existing copper
telephone lines (POTS) and both require the short runs to a central
telephone office (usually less than 20,000 feet). However, DSL offers much
higher speeds – up to 32 Mbps for upstream traffic, and from 32 Kbps to
over 1 Mbps for downstream traffic.
I NTRANET
An Intranet uses the existing telephone network (e.g. PABX) and works like
a private Internet. It is any network of interconnected computers belonging
to one organization, similar to but separate from or insulated from the
Internet. Intranets use the same protocols and software that are used on
the Internet. For instance, many organizations have special intranet web
sites that can only be viewed from a desktop in their offices, or when
connected to their Virtual Private Network (VPN).
EXTRANET
An extranet is a private network that uses the Internet protocol and the
public telecommunication system to securely share part of a business’s
information or operations with suppliers, vendors, partners, customers, or
other businesses. An extranet can be viewed as part of a company’s intranet
that is extended to users outside the company. An extranet requires a high
level of security including digital certificates and encryption of messages,
so that the company that owns the extranet can limit access.
Extranets have many uses for example to share product catalogs exclusively
with their distributors, provide or access services provided by one company
to a group of other companies, share news of common interest exclusively
with partner companies
WHAT IS FAX?
This is a technique used for transmitting text and black and white pictures
over the telephone in digital form, by scanning at the transmitter and printing
at the receiver.
The receiver receives a facsimile printed copy.
WHAT IS A M ODEM?
The term modem means Modulator-Demodulator. It is a device that
translates digital signals to analogue and visa versa. It modulates a
transmitted signal and demodulates a received signal at a data station.
This means that it understands both the languages of the computer and
the telephone. It is connected between the telephone and the computer. It
acts then as the go-between in establishing a communication relationship
between a computer and the phone. For example a digital signal from a
computer is converted into an analogue signal for transmission over the
telephone system and converts received signals back to digital form at the
receiving end. Note that a modem is necessary at each end of a
communication link. The modem is necessary for electronic mail and the
Internet.
Baud Rate
This is the speed at which modems transmit data, i.e. sending and receiving.
The baud rate is measured by the number of bits per second that are
transmitted. Modems now go as fast as 56Kb per second.
Electronic Mail
This is the transmission of written messages by electronic means via a
computer network. Messages can be sent locally or worldwide. Each user
of the e-mail has a mailbox address to which messages are sent. Messages
sent through e-mail may take only a few minutes to arrive.
Pictures, documents and sound files can be sent through e-mail as
attachments. These files are referred to as MIME attachments. MIME stands
for Multimedia Internet Mail Extension and was developed to help e-mail
software to handle a variety of file types.
A user can type a message using Word Processing Software and transfer
the message to a communication software package, or can simply type
the message directly in a window displayed by the communication software.
There are two types of e-mail accounts, there is the computer server based
e-mail account and the web based e-mail account. With a computer based
account there is an initial configuration needed to receive mail from a Service
provider. Once configured and the user has the required equipment one
can send and receive mail for the cost of a local telephone call.
Most web-based accounts are free, and one can access the mail anywhere,
at any time, as long as the computer is connected to the Internet. You can
get a free e-mail address from the following web sites:
www.yahoo.com
www.doramail.com
www.hotmail.com
www.ireland.com
The Internet
This is a huge international network made up of smaller networks that are
linked together like a spider web. The Internet started as an application for
self-healing of computers in the US government in case of nuclear disaster.
It later spread to the academic researchers for exchange of ideas and
study material. Now the Internet has taken the world by storm. Information
on almost anything can now be found on the Internet.
There is one important aspect to consider, there is the Internet and there is
also the World Wide Web (WWW). These concepts are different although
people use them interchangeably. The difference is that the Internet is the
term referring to the physical connection of the world-wide network whilst
the World Wide Web holds all the information which moves around the
Internet.
There is almost everything on the Internet. The Internet can offer you the
following just to mention a few:
! Electronic Mail. This is fast and efficient, and no matter where you
are, with access to a computer, you can still get in touch with others.
! File Transfer. You can enjoy sharing of files through FTP (File Transfer
Protocol)
! Current Information. You can use search engines to get information
on almost any subject.
! Discussion Groups. You can join discussion groups on any topic of
interest.
! Virtual Classroom. You can be part of the virtual classroom and gain
the benefit of expert lecturers, who can reach many more students
than could fit into a conventional physical classroom. If you have a
question on a particular subject, you can contact web mentors or
experts in your field and they will be able to help.
! Downloads. Teachers can get lesson plans and past exam papers on
the Internet.
! Collaborative Learning. You can share ideas and learn with others
virtually.
ELECTRONIC P UBLISHING
Whilst books and printed materials will never disappear, there are substantial
benefits to electronic publishing. This is the production of material on
electronic media, which can be distributed either via CD-ROM or via
electronic mail or the Internet. The material can include text, graphics,
sound and even video images.
COMPUTERS AT WORK
Computers offer a means for making employees more efficient, and so
the world of commerce computerises to gain competitive advantage. Job
seekers who know how to use a computer will have a distinct advantage
over computer-illiterates
! In many offices the typewriter has been displaced by the word
processor.
! Accounting packages e.g. Pastel, have been developed for accounting
purposes
! Payroll packages help in the administration of payrolls and annual
tax returns.
! Spreadsheets programs are now being used in most companies for
financial and what-if analysis.
! Database management systems have been developed to keep
company information, for example information about every employee.
! In industry Computer Aided Design has been introduced as a product
design tool, and robots are being used to do simple repetitive tasks,
e.g. the welding jobs on production lines that used to be done by
human beings. The robots are computer controlled and can work 24
hrs a day without losing concentration and hence boost company
production. A robotic arm can average one weld per second.
! Advertising can be featured on the Internet using advertising banners,
links and web sites – this is often a less expensive way to put forward
your product than conventional advertising in the media.
! In some hotels the use of ordinary keys is being phased out with the
introduction of plastic cards, which you just need to insert and remove
for the door to open. Some companies have also used the same
technique for their staff to enter and leave the company premises.
! E-business is “electronic business” using the Internet for both business
to business and business to consumer transactions. This will allow
organisations to communicate more efficiently with both suppliers
and customers, and facilitate improvements in supply chain
management and customer relationship management.
! Airline booking systems – the computer automation of airline booking
systems has improved the lives of travelers, airlines and travel agents.
An airline seat can now be booked for travel between Harare or any
other city and anywhere else in the world within minutes with seat
availability being almost instant. The system is often integrated with
automated ticketing processes and hotel and car hire availability and
booking facilities.
! Insurance claims processing – In many places throughout the world
the insurance industry relies upon computer based processing of
claims. They, often use large mainframe computers. Large amounts
have been invested in both computers and software so as to improve
insurance claim procedure and system saving money for the industry.
! Online banking – whether it be the use of ATMs, electronic transfers
or the managing of ones banking affairs computers now play an
indispensable role in the banking industry. Costs to the customer are
cut and the system is efficient and fast. The downside to this is that
there are, in many cases, losses of jobs in the industry due to the
automation of systems. A customer can pay for bills online and in
some countries can deal with all banking procedures without any
contact with any banking personnel. More information concerning
online banking will come later in this module.
COMPUTERS IN EDUCATION
In education computers are being used from kindergarten to university, in
both administrative and educational functions.
For administrative purposes school computers are being used as follows:
! Keeping student information and school staff information.
! Printing examination papers and assignments
! Printing levy and tuition invoices.
! Keeping records of school cash flow
! Printing school reports.
! For school documentation.
For teaching purposes computers have made a difference in instructional
methods:
! Students can now do collaborative learning with other students
anywhere in the world and can also have Internet group discussions.
! Distance learning is ideal in a third world environment where books
and even teachers may not be available to all schools. Books and
study materials can be made available to a number of schools on the
Internet and classes can be held with one teacher overseeing pupils in
a number of schools. Although the personal aspect of teaching may
be compromised the overall aspect means more education for more
pupils.
! The teacher may become a facilitator rather than the source of
information. New School versus Old School,
! There are now excellent software programs that can handle both
student registration and timetabling. The advantages of these systems
are that registration can be handled quickly and efficiently – often
using previously entered information instead of having to re-enter
already existing data and timetabling can be processed allowing for
sessions to be planned without overlapping.
! Using some educational software the teacher becomes a facilitator
rather than the source of information. New School versus Old School,
because in the old school teachers used to be the centre of all
knowledge but in the new school students can find information from
other sources like the Internet and share it with the teacher.
Computers have their limits and people can still be more appropriate to
certain jobs and in certain situations than computers.
Here are some examples of how people might be more appropriate than
computers
! When you are unwell and visit your doctor, it is often a person to
whom you want to talk In most of the caring professions, the same is
true, whether it be doctors, nurses or social workers. The human touch
is still important.
! Although e-commerce in the form of on-line banking, on-line buying
and selling is now part of most peoples lives there are many people
who still like to have the option of talking to a real person and not a
computer, whether it be the local bank manager or a real person on
the end of a telephone line.
IT AND SOCIETY
A Changing World
The introduction of IT in society has changed the way many people live.
Although not everyone has access to a computer, there are many different
types of communication equipment like radios, televisions, satellite dishes,
telephone and fax machines, which all use modern technology. All these
affect how information travels and it now takes only a few seconds to send
a letter abroad.
Although some people believe that the introduction of IT in the Society has
made life more complicated, others believe that it has made life easier and
now enjoy working at home using Tele working technology. All this is possible
because we live in an Information Society where access to information is
vital.
A Good Workspace
To create a good working environment one should practice good working
habits, such as:
! Frequent breaks away from the computer, this is necessary to refresh
the mind and to relax the hands.
! Appropriate position of the screen such that the screen is at the same
level with the eyes.
! It is advisable to have an adjustable chair and the chair must not be
too high or too low.
! The room should have adequate lighting so that you don’t strain your
eyes.
! It should be a clean and dust free environment.
! The room should have good ventilation, ideally, it should be air-
conditioned.
WHAT IS RSI?
RSI stands for Repetitive Strain Injury. This injury occurs when repeating
the same action numerous times. For example when playing a game or
doing work which only involves the use of the mouse. In this situation the
arm is held steady while the wrist and fingers repeat the same small
movements over and over. The muscles used to hold the arm steady are
particularly prone to strain. Hence the name Repetitive Strain Injury. The
continuous use of the keyboard can also cause RSI. Frequent breaks away
from the computer are necessary to avoid these repetitive motions. To
overcome this problem some organisations are using pads where the arms
or wrists can be rested.
EYESTRAIN
Continuous use of computer screens may cause eyestrain or damage
vision. The eyestrain problem can be made worse by using inferior monitors
with poor resolution. Some of the problems are caused by the reflection
from the screen, especially if the screen is facing the sunrays or when the
user is facing the window. To reduce eyestrain the screen should be at the
same level as the eyes, and not too close to the eyes. Anti-glare products
like screen filters are available to reduce screen glare.
ENVIRONMENTAL CONCERNS
As we use computers, we at thus accumulate a lot of printed documents
as well as use up toner cartridges in the process. If these are recycled, this
can help the environment.
If we employ the concept of a paperless office, by using electronic
documents more, this reduces the need for printed materials.
I is now common to find monitors being manufactured that consume less
power as a way to help the environment.
Security
There are different threats that can attack computer systems and it is
necessary to know about them and to know how to secure systems against
these threats. When working in an office without a networked computer it
is relatively easy to attain a high level of security. All you need to do is lock
the office each time you leave and ensure that important documents are
not left lying about for visitors to read. A networked computer is similar to
working in a general office where everyone uses the same cupboards and
filing cabinets. In addition a disk crash will result in the loss of all information
stored on that disk. The lost information can be impossible to recover if a
second copy has not been kept.
ACTS OF GOD
Fire, floods, hurricanes and earthquakes can destroy equipment. Computer
hardware should be secured by making good structures and good siting
of the computer location. The equipment should also be insured.
Back ups are vital, and are simply duplicate copies of the vital information
kept at a different place. The frequency of backups depends on how often
the data changes. A secretary who keeps a hard copy of all the letters she
types need never backup her data but a weekly or daily backup regime can
save a lot of retyping. A bank on the other hand, needs to duplicate all data
or have instant backups each time data is changed. Imagine your reaction
if they were to lose your salary because of a computer failure a few minutes
after it was deposited. It is certain that the hard disk will not run forever so
the user must assess the level of risk and act accordingly. Backups are
normally done on removable media such as tapes and zip drives, with the
capacity to back up all the necessary information on the hard drive. Back
up information should be kept at a separate location and in a fireproof
safe.
And don’t forget to save your work. A single copy on your hard disk is not
referred to as a backup but is an important part of working with a PC.
Don’t wait until the letter or spread sheet is perfect in every aspect before
saving it. Get into the habit of saving at least every 15 to 30 minutes.
Remember that what you see on your screen is stored in RAM and will be
lost if there is a power failure. Do not rely on a UPS (Uninterrupted Power
Supply). Although a UPS will help protect your disk and usually give you
time to save your data , you normally discover it is faulty when you need it
most.
U NAUTHORISED ACCESS
Information should be kept secure against unauthorised access, for example
hackers and co-workers. The managers work should not be available for
perusal by a clerk. Hackers are people who dial into a computer by breaking
be sure that the message contains your contact information, and a message
describing the contents as confidential, with instructions for what to do if
the recipient has received the message in error. Logs should be kept of all
faxes and emails sent and received. Sensitive printed materials should be
clearly marked, maybe with a watermark saying CONFIDENTIAL or
DRAFT ONLY.
! You could issue electronic badges to visitors. This often allows the
movement of visitors to be monitored electronically by your security
staff. It can also be used to allow access to certain areas of the building,
but deny access to more sensitive areas.
! Electronic passes can also be used to control which members of staff
have access to which area of your building. Equipment should also
be logged in and out to decrease the possibility of theft.
Computer Viruses
Software suppliers plug holes and supply updates. A virus must be able to
replicate itself so the writers look for ‘holes’ in the software. A virus writer
probably knows more about a product like Outlook Express than the authors.
When he discovers something the author overlooked he has a way to get his
virus into the programme. But as soon as he releases the virus the authors
get working to plug the hole. Then they release a new version of the software.
It is a bit like securing your home. You can add burglar bars, a gate and
razor wire but if you overlook something the thief will find it and all you can
do is to plug the hole so he cannot get in that way again.
Keep your software up-to-date.
Copyright
Computer software can be copied very easily, without it affecting the original
software in any way. This gives rise to what is called software piracy, i.e.
the illegal use of software which has been copied rather than purchased.
Correct purchasing of software will ensure that the developers of the
software or copyright holders receive the required license fee. Piracy of
software is the illegal use, WITHOUT the payment of the license fee.
There are a lot of people who share programs or rather software on a
social basis without realising that this is a crime. People should be aware
of copyrights. Please don’t use software that has no license because this is
a serious offence.
You should know that copying software or software piracy is illegal and is
a criminal offence. Also using illegally copied software and manuals and
running purchased software on two or more machines at the same time
without a valid license for each machine is a criminal offence.
There are also legal penalties for breaking copyright law, which can be a
fine or prison sentence.
Most text which you will find on the Internet is copyrighted. Never copy any
text without authority to do so and always quote your sources. Using text
which someone else had written is theft.. Graphics and clipart are also
available for download on the internet and unless they are noted as ‘free
for use’ should be considered as copyrighted. Music clips are also available
but even those that might be used to replace your operating software sounds
could be illegal to download. Be careful and download only material that
you know is free to use.
Whole movies are sometimes offered for download – one can almost
certainly be sure that these are illegal. Be wise – if in doubt – don’t download
any material that might be illegal.
Shareware is software that you are allowed to use on your machine for a
limited evaluation period. The idea is that if you find the product useful and
you wish to continue using it beyond the evaluation period, you then make
a registration payment which will then entitle you further benefits of the full
version of the software. Some shareware programs are automatically
programmed to stop working after the evaluation period.
Freeware is any software that is free of any obligation to the end user.
That is one is free to use it indefinitely as well as distribute it to others.
However no technical support is available. Examples of freeware include
demonstration disks and educational software. However some freeware
may come with license information that you have to read and abide by.
User Licences
This license is the official or legal permission about the particular software.
You need to read carefully the license information so that you do not misuse
the software. For example if your user license may be said to accommodate
10 users, if you exceed this you are violating the manufacturer’s rights.
because they protect our personal data from being misused. Privacy is all
that we look forward to. Imagine yourself not being able to get insurance
or a credit facility because some company which was holding your personal
data decided to disclose it to some other company. Imagine yourself losing
compensation because a company had wrong information.
In order to ensure that data which is held by a company is not misused
Data Protection Acts have come into force in many countries. It is important
that you know your rights when it comes to information stored about you
and your affairs in electronic format.
In some countries there is no data protection act and therefore personal
information is open to misuse. There is no specific data protection act for
Zimbabwe. We are outlining the data protection act as used in the European
Union for the basic of this study guide.
The points below will try to protect you from all these risks.
! Personal data should be obtained and processed fairly and lawfully
! Data obtained for personal use should be held only for specified
purposes
! Personal data should not be used for any reason incompatible with
its original purpose.
! Personal data should be relevant and adequate for the purpose
! The personal data should be accurate and up to date
! Personal data should not be kept longer than necessary
! It should be made available to the individual concerned and provision
made for correction.
! Personal data should be kept secure.
It is also necessary to point out that this Act does not apply to some areas
like:
! Data relating to crime detection
! Immigration data
! Data relating to income tax assessment and collection.
! Data not held on computers
! Data that is required by law to be made public.