Computer APPRECIATION
Computer APPRECIATION
COMPUTER
APPRECIATION
KONSEPTZ
1. INTRODUCTION TO COMPUTERS
Objectives:
Define a computer
Identify the different generations of computer
List the areas of application of a computer
Understand the different terms associated to computer
Identify and classify the various components of a computer
Discuss the advantages and disadvantages of computer
Understand the common mouse operations
Understand the keyboard orientation
What is Computer?
A Computer is an electronic device that works under a set of instructions
stored in it called programs, capable of accepting data as Input, processing the
data arithmetically, logically, according to the instruction given, produces the
result as output either for printing or modification.
1
The computer is an electronic machine capable of retrieving data (input),
processing, storing and giving out result (output) according to
order/commands of the user(operator).
2
This figure shows the data processing cycle, where the data is fed to the
processor for it to be processed into the output. Let’s understand the concept
by visiting our favourable place at home, the kitchen.
Do you like strawberry milk shake? Let’s see how it can be prepared;
DATA
Data are the raw facts which comprise of numbers, alphabets, or any other form
like picture, sound, videos etc that are put into the computer through the input
units and the computer transforms them into a form that could be processed by
the computer. The data which is put in through the input unit could either be
processed by the central processing unit or stored in the memory. Data can also
be referred to as input.
INFORMATION
This is the result of a processed data. When data has been acted upon to give it
more meaning, it is called information. It’s also called output. It is displayed in a
user readable form, or in a way that the user needed it. It could be either soft
copy (held by the monitor) or the hard copy(printed out from the printer.
PROCESSING
This is the ability of converting raw facts (data or input) captured by the input
units into something meaningful (information or output). The data are
manipulated, stored, classified and summarized to put them in usable forms. The
series of activities involved in the transformation of data into information is called
data-processing. Processing could be any mathematical or logical operation
done on the data. Example of mathematical calculations is addition, subtraction,
multiplication or division operations. Logical calculation could involve decision
making like comparisons. Operators used for comparison jobs are <,>, =, IF, OR,
etc
To put it in a nutshell, to get information from the computer one has to:
Input the correct data
Give in the instructions to the process and the computer gives the output.
3
Data and information are relative terms. The data for one group of people could
be information for the other group of people and vice versa. It depends on the
group’s requirements. Consider the following statement:
This statement is certainly an information for Okon as he come to know his score,
but the same statement could be a piece of data for the teacher, who could be
interested in further processing it to calculate his grade in the class.
STORAGE
This is the keeping of information for future use. There are two types of storage
namely; (i) temporary storage and (ii) permanent storage
Temporary storage: The temporary storage or primary or main storage, used
by the computer while data is processing is in progress is volatile, that is, when
electric power is switched off, its content disappears.
Permanent storage: The permanent storage or secondary storage makes safe
and reliable record of data, regardless of the system being on or off. Some
secondary storage devices are; Hard disk, Floppy disk or Diskette, Zip, CD-ROM
etc.
4
Tele Conference
Tele Communication
E-mailing Immigration
Traffic Control
Criminal Detection etc.
Educational Institutions
School Database Management
E-libraries/E- learning
Distant Education
Writing online exams like UTME(Unified Tertiary Matriculation
Examination)
Gathering examination marks for printing mark sheet
Broadcasting Services
Nigerian Television Authority (NTA)
Akwa Ibom State Broadcasting Cooperation (AKBC)
5
vii. Always put your computer on a dry desk or table.
viii. If there is power failure, switch off your computer and socket before
going out.
ix. Any fault should be reported to the computer engineer.
x. You must not enter the Bio-Setup for any reason if you are not an
engineer.
xi. For no reason should any cable be removed while the computer is on.
xii. The monitor, which is very fragile, should be handled with care while on
transit.
xiii. Computer should be sent for servicing after being used for a given
period.
xiv. Diskettes from other computers should be scanned for virus before any
document is opened or saved in them.
xv. Computers must be kept in an air-conditioned room.
6
1.5 LIMITATIONS OF COMPUTERS
Drawbacks related to computers are;
Failure to take decisions: they need inputs from the user for decision
making.
Inability to distinguish between valid and invalid data: computers
need to be given correct data in order to generate correct information.
Requires regular maintenance: computers are machine; hence regular
maintenance is requires to keep it in working conditions.
7
add, subtract, multiply and divide in automatic sequence at a rate of 60
additions per minutes. Babbage in 1835 designed the Analytical Engine
which is widely regarded as the mechanical forerunner of the modern
computer. Analytical Engine was self-controlled with two important parts,
the storage unit with memory device, and the arithmetic unit called mill.
8
1.6.2. CLASSIFICATION OF COMPUTERS
Computers are classified with respect to:
(i) Generations (ii) Mode of operation (iii) Purpose (iv) Size
9
The characteristics of the third generation computers were;
× It used less power
× It used germanium transistor (Integrated Circuit) instead of silicon
transistors
× It has improved storage method and capacity
× Increase in speed and efficiency of operation
× Much smaller in size than second generation computers.
× It cost less than the second generation computers.
× Integrated database management was introduced
10
(series of 0s and 1s or binary codes) to perform operations on data
represented in number form.
Microcomputer can be divided into two groups; (i) Personal computers and
(ii) Workstation.
11
Personal computers
o Desktop Computers: These are small computers that fit on top or
along the side of a desk and yet are too big to be carried around. They
are easy to use, since their keyboards can be moved and kept in a way
that is convenient to the user.
o Tower: The tower personal computers are similar to the desktop, but
the system unit cabinet sits as a tower on the (mini tower) or on the
floor, next to the desk (full tower).
Workstation
The most powerful type personal computer is sometimes called workstation. A
workstation is a personal computer for people who need very fast
computational capabilities, like scientists and engineers. Workstations are also
used to perform detailed simulations such as generating special effects for
movies. These same graphic capabilities are used by scientist to help visualize
and study complex phenomena.
Minicomputers
Minicomputers are computers that are smaller and cheaper than mainframe
computers. It was introduced in the late 1960s. The minicomputers today are
many times as powerful as the largest mainframes of the early 1970s.
In theory, minicomputer can be separated from other computers based
on physical size, processing capability, processor design, memory capacity,
and the number of people that can be serviced simultaneously,
environmental requirements (temperature and humidity), weigh and building
space requirements. But in practice, it is difficult to tell minicomputer from
microcomputer these days.
12
Mainframes Computers
Mainframes are room-sized, high performance computers, capable of running
complex programs that could be impractical or impossible on smaller
computer systems. They are designed for multiple users and process vast
amount of data quickly.
Installation of mainframe computers involves difficult and tedious tasks and it
is done by the suppliers. Companies like banks, insurance companies,
manufacturers, mail-order companies and airlines are typical users
mainframe computers. Examples of mainframes are IBM 360/370 systems,
NCR V-8800.
Super Computers
These are the most powerful, most expansive, fastest and high capacity
computers used by very large organizations. They are capable of processing
trillions of instructions per second. Super computers have the capacity to
process seismic data gather during crude oil-seeking exploration. Super
computers also enable simulation of airflow around an air plane at different
speed and altitudes. Auto manufacturers use super computer to simulate
auto accident on video screens. Physicists use super computer to study the
results of explosion of nuclear weapons. Meteorologists employ super
computers to study the formation of tornadoes. Film-making studios in U.S.A.
use advanced graphics to create special effects of movies and TV
commercials.
The greatest obstacle that designers of super computers faced was heat
buildup. Densely packed integrated circuits produce a tremendous amount of
heat.
COMPUTER HARDWARE
These are the physical and tangible parts of a computer system. A computer takes in
inputs, processes it and gives out information as an output. Hence, when it comes to
identifying parts of a computer, there should be components to:
Function Part
13
To process data -PROCESSOR
INPUT DEVICES
The devices used for taking the data from the user are termed as the input
devices. They convert data (raw materials) communicated by the user into a
form that the processor and memory can use. The most widely used input
devices are; keyboard, mouse, scanner, magnetic tape drive, magnetic disk
drive, Optical Character Recognition(OCR), Optical Mark Reader(OMR), Bar
Code Reader(BCR) and Magnetic Ink Character Reader(MICR) etc.
1 THE KEYBOARD
The computer keyboard is a piece of plastic board with several buttons
arranged on it. Theses buttons are called keys used for punching alphabets
(A-Z), numbers (0-9) and other special characters. It looks like an ordinary
typewriter and is an input device where data to be processed is typed into
the computer.
There are different keys on keyboard, which can be grouped under the
following categories;
Function keys
Alphanumeric keys
Numeric keys
14
Special keys
1) Standard keyboard
2) Enhanced keyboard
The difference lies in the number of function keys each has. The standard
keyboard has 10 function keys(F1 – F10) while the Enhanced Keyboard has
12 keys(F1 – F12).
Function keys Function keys are usually located horizontally across the top of
the keyboard, sets of functions keys labeled F1 through F12. They
….
F1 F12
are often use to enter commands; their specific meaning depends
on the software being used.
Alphanumeric The Alphanumeric keys occupy the middle of the keyboard. They
keys are used primarily to enter text and numbers. These keys consist
of the letters of the alphabet, number, a SPACEBAR and
punctuation marks.
The TAB key is used to move the cursor to a pre specified “next”
Tab data input location. The SHIFT +TAB combination moves the
cursor to the “previous’ location.
Lock 15
The CTRL (control) key is used as a shorthand way of entering
Ctrl
instructions or commands. Different programs use the CRTL key
in different ways. For instance, Microsoft Word uses the
CRTL+ENTER, key combination to signal the start of a new page
CRTL+B for bolding a letter etc.
The numeric keys are located right of the ENTER key and are
used to enter numbers and arithmetic operator like +, - , / , * and
Numeric Keys
= just like the calculator keypads.
These four key are called ARROW KEYS. They are inscribed with
arrows which indicate the direction in which the cursor will move
when arrow key is pressed. They are; UP ARROW, DOWN
ARROW, LEFT ARROW and RIGHT ARROW.
16
The HOME key moves the cursor to the beginning of a line,
Home
CRTL+HOME will move the cursor to the beginning of a page;
End END key moves the cursor to the end of a line, CRTL+END moves
the cursor to the end of a page.
Down
The INS (insert) key is used to toggle between “insert” and
Ins “overstrike” mode of typing. In insert mode, new text is inserted
between the existing texts; in overstrike mode new text replaces
existing text.
2 MOUSE: The mouse is an input device which points and promptly moves the
cursor or mouse pointer around the screen. It has two buttons (left button
and right button) on its upper surface and is kept resting on a flat surface on
a mouse pad. It can be used to plot images in defined location on a screen.
The mouse is a hand held point device that helps you use your application
more easily and effectively.
17
How to use the Mouse
The mouse is supported with the palm of our right hand (with the index
finger on the left button and the second finger on the right button) and
moved across the flat surface. The mouse pointer or cursor on the screen is
controlled by the movement of the mouse.
Some other input devices, which are very widely used today, are;
MICR: Magnetic Ink Character Reader, which is used mostly in banks for
scanning cheque numbers.
BCR: Bar Code Reader is used in places like supermarkets, etc. to read the
coded price tag on the items.
OCR: Optical Character Recognizer, which is used for validating examination
papers and application forms or for reading any, printed matter. A typical
desktop scanner that is used to scan any type of printed matter like the one
shown figure 1.5
18
Fig. 1.5: Scanner
SYSTEM UNIT
The System Unit (cabinet) houses or encloses other hardware devices such
as; motherboard, ports and central Processing Unit or Processor, Hard Disk
Drive, CD/DVD Rom Drive, Floppy Disk Drive etc.
a) Arithmetic/Logic Unit: This unit of the CPU takes care of all the
mathematical and logical operation using arithmetic operators such as; +, -,
/, *, ^ and logical operators such as; = ,< ,>, <=, >=, IF, OR, AND etc.
b) Control Unit: This unit controls the whole process of data transfer from one
place to the other while computations are going on.
c) CPU Registers: this unit is meant for storing any data that comes into the
CPU while processing.
Ports: These are connectors like sockets which serve as points where
peripherals are attached to the motherboard in the system unit. These
19
ports allow transmission of data and information between the motherboard
and the peripheral devices.
Parallel ports: In these types of ports, passage of more than one bit is
allowed like 8 bits or 16 bits at a time. Transfer of data through these
ports are faster because 8 or more bits can travel together (parallel to
each other) from one part of the computer to the another. Parallel ports
are therefore also referred to as printer ports or sometimes as the
centronics port.
Another type of port is the USB ports: USB stands for Universal Serial Bus.
Unlike other ports, the UBS is very unique as it uses Advance Technology
System; enhance speed of data transmission and support hot and warm
swapping. The USB port is gradually replacing other computer ports.
OUTPUT DEVICES
An output device is used to communicating information from the computer to
the user. It presents results of operations as a display through the
monitor(soft copy) or printed version (hard copy). There are various
examples of output devices such as printer, visual display unit etc.
1 PRINTER:
The printer is the only permanent form of output device. Unlike
monitors, printers produce hard copy. We use it to print on paper
the result of our calculations, letters and other data processing
Fig.1.8: PRINTER
jobs from the computer. There are many types of printer
available. Printers are classified based on their working principles; impact
printers and non-impact printers.
Impact printers: These are printers that create character by striking
an inked ribbon against the paper beneath. Impact printers are noisier
and slower than non-impact printers, but can be used to produce
carbon copies. These printers use inked ribbons. Their print head have
contact with paper.
20
Examples of impact printers are; dot matrix printer, daisywheel
printer and line printers.
Non-impact printers: These are printers that print without hitting on
the paper. The technology in this set of printers is quite different.
Examples of Non-impact printers are; Thermal printers, Laser
Printers, Ink-Jet Printers.
The size of the display screen: The screen size is measured diagonally
along the front of a monitor’s cathode ray tube (CRT). This diagonal
dimension of monitors varies from 5 to 25 inches, even though the most
common size is 14 inches.
21
V.G.A. – Video Graphic Array – with very high resolution
E.G.A. – Enhanced Graphic Array
A.V.G.A. – Advanced Visual Graphics Array
S.C.G.A. – Super Visual Graphics Array
COMPUTER MEMORY
Memory is use to store both data and information. Computer memory is the
storage area for data and information in a computer. The amount of data or
information the human brain can hold cannot be quantified because it varies
in different individuals. In computers, the amount of information it can hold
can be quantified depending on the size of its memory. We can logically
represent the computer memory as a number of rectangular cells and groups
of such cells form a block. Each cell can hold one English alphabet or a
numeric digit worth information. Figure 1.9 below shows the logical
representation of the computer’s memory.
C1 C2 --------------------------------------- C7
Cells
Figure 1.9 above shows that the computer memory holds information in cells as labeled C1
to C7 and so on to our convenience. The English alphabets or our numeric digits are the
smallest piece or data that can be stored into the memory. Basically, the computer can
understand only electrical signals that are “ON” or “OFF” and “YES” or “NO”. This same
signals are represented mathematically as “0” and “1”. Therefore all data are represented
only in the form of “1” and “0” hence binary representation of data. A sample piece of data
in binary representation looks like; 00001000. All numbers and alphabets we write in our
daily lives can be converted into this representation using binary mathematics.
Each digit of this binary representation is a binary digit or bit for short.
22
A group of 8 bits is known as a byte or character; this is the smallest unit of a computer
memory.
Therefore, when we talk about computer memory being measured, the scale is in byte.
However, since modern computers have very large memories, using the byte will require
very huge numbers; hence the concept of counting bytes in thousands and its multiples is
applied as shown below;
Having studied how data and information are being store in the computer memory, let’s look
at different type of computer memories that we have.
PRIMARY MEMORY
The primary memory is also called main memory or central memory. This memory is
resident on the motherboard. It is of two types; ROM and RAM
ROM-Read Only Memory
RAM-Random Access Memory
TYPES OF ROM
Random Access Memory: The Random Access Memory or RAM is the processor’s
temporary working area. It remains empty until the processor needs to use it- that
23
is, until data and programs are sent to it from an input device. It is also a temporary
(volatile) memory because its loses its contents when the power is turn off. The
bigger the RAM, the faster the computer. RAM storage frequently expressed in
Megabytes. The capacities of RAM commonly used are 32 MB, 64 MB, 128 MB, 256
MB and 512 MB.
TYPES OF RAM
SECONDARY MEMORY
Since the primary memory are pretty less; the RAM is volatile and the ROM is non-
writable, the alternative is use of secondary or external memory with which
read/write operations are both possible. Some common Secondary storage
devices;
i. Audio CD: Audio CD (Compact Disc Digital Audio CD, DA) stores about 72
minutes of uncompressed sound information.
24
ii. Data CD: Data CD (Compact Disc Read Only Memory, CD-ROM) usually can store
up to 650MB (two sides of 324MB each) of computer information. It is of two
types, namely:
III. Video CD: Video CD can store up to 74 minutes of VHS-quality digital video
(moving picture) with compressed stereo audio. This is achieved by using a data
compression algorithm (Computer program) designed by a body known as the
Moving Picture Expert Group (MPEG).
IV. Photo CD: Photo CD (Kodak Photo Compact Disc) can store up to 100
photographic-quality (35mm) images, with a maximum resolution of over 18
million pixels per image.
FLOPPY DISK
The floppy disk or diskette is a magnetic disc medium. Compared to the hard disk,
it is very small terms of capacity. Nevertheless, it assumes importance because of
its portability. They are ideally suitable for copying and carrying data from one
machine to another. All that needs to be done is, insert the disc in the drive(floppy
disc drive-FDD), copy the data from the hard disk to the floppy, and insert it in
the machine where the data is required. It is still one of easiest and cost effective
ways to exchange information or data between two computers.
The floppy is actually enclosed in a plastic jacket that protects it from heat, dust
and electric shocks. When the floppy is exposed to any of the above, either of
these two things can happen;
The floppy can be physically damaged, which can lead to the loss
of data present inside it.
The floppy may remain intact, but there may still be a data loss
Notch
25
Fig. 1.10: Floppy disks
Floppies have a very good feature known as write protect. Look at the
notch shown above, it can be pushed down to close the hole there. When
the notch closes, only then data writing can be done to the floppy, else it
can be only read from. Hence, the notch can be pushed up to keep it the
hole uncovered, so that nobody can accidentally change the data stored in
the floppy.
Floppies are commonly found in two sizes namely; 5 ¾” and 3.5”. This
refers to the diameter of the disk, which actually holds the data and is
present within the plastic jacket. A typical storage capability of floppies
ranges from 250KB to 1.44MB
COMPUTER MEMORY
PRIMARY SECONDARY
MEMORY MEMORY
26
COMPUTER SOFTWARE
Software is a collective name for the programs that control the hardware. A program is set
of command or an instruction that is given to a computer to affect some specific tasks.
Hardware is the visible part of a computer system; software is invisible. Software however
determines what tasks the computer system performs. The relationship between the three
concepts of command, program and software could be diagrammatically represented as:
Software
Program 1 Program 2
Commands
Commands Commands Commands
Fig. 1.10: Relationship between Commands, Program and Software
I. APPLICATION SOFTWARE
Application software is a program that enable user to solve a specific problem or
perform a useful task, based on need. It is designed to handle wide variety of tasks
that call for the same general capabilities. For example you can use a word processor
to write a term paper, a letter, a book, and a projection for a huge company.
Application software may be;
i. Packaged Application
ii. Custom programs
a. Packaged Application
These are software pre-written by professional programmers for general purpose
use. E.g.
i. Word Processing Package: Word processing software enables automated
manipulation of words in terms of entering, storage/ retrieval and printing of
text in various forms such as letters, reports, book and so on.
27
ii. Spreadsheet: Spreadsheets are software used in the presentation and
analysis of data. It allows users to create tables and financial schedules by
entering data and formulas into rows and columns arranged as grid on a
display screen. Example of spreadsheets are Lotus1-2-3, Microsoft Excel,
Apple works spreadsheets etc.
iii. Data Management Software: Data base software creates and maintains a
data base and extract information from it. It is a collection of interrelated
files. A database management system (DBMS) is a suite of programs that
controls the organization, storage and retrieval of data (fields, records and
files) in a database. Examples of database Microsoft Access, Oracle, Sybase,
Filmmaker etc.
iv. Graphics Software: Graphics software provides facilities that allow the user
to use various kinds of computer graphics. Prior to the introduction of
graphics software, it takes quite some time to manually produce graphics
display forms of tabulated data. But today, it is possible to use graphic
packages to produce perfectly proportioned, accurate and visually appealing
to our sense of sight.
These are these types of graphics software, these are;
Presentation graphics
Art and illustration graphics
Computer-Aided Design (CAD)
v. Desktop Publishing Packages
Desktop Publishing (DPP) is an extension of word processing. Desktop
publishing refers to the use of desktop microcomputers, other hardware, such
as LaserJet printer and page composition software to produce documents for
printing purposes. Examples of these softwares are Adobe PageMaker,
CorelDraw, and Microsoft Publisher.
b. Custom programs
These are programs tailored to the specific needs of particular kind of business or
professions. For example, doctors might find medical billing, accounting and patient-
tracking system more useful than a general-purpose spreadsheet and database.
28
II. SYSTEM SOFTWARE
The system software is special software meant for computer system. It is written by
computer manufacturers to facilitate the optimal use of the hardware systems. It
enables the application software to interact with the computer. The system software
consists of the following;
Operating system
Program language processor
Utility programs
a) Operating System(OS)
Operating system software is software that controls the operation and manages the
resources of a computer system. The operating system performs the following
functions;
× It conducts the process called booting (cold and warm booting)
× It loads user programs and data into the memory
× Interprets the program instruction one at a time
× It controls the computer hardware
× It allows the user to interact with the hardware to obtain results.
Based on the number of users, an OS can act as an interface for two types of computer
systems as identified below;
Operating system changes as computer becomes more and outgrows the older operating
systems. The following are the most popular operating systems;
a. DOS (Microsoft Disk Operating System): the Microsoft Disk Operating System
(DOS) is the processor to Microsoft Windows and is still widely used. Depending on
how your computer is configured, it may run DOS when it is turned on and then run
windows.
c. Windows ’95: This operating system supports multi processing similar to multi-
tasking except that applications can run independently at the same time.
d. Windows 98/2000: These operating systems are web integrated. It allows users
to access data on the internet easily.
29
e. Windows NT (Windows for New Technology): This is a network operating
system with graphical user interface that multi-tasking, multi-user and multi-
processing. It is designed for powerful microcomputers and workgroup.
h. Windows 8: This is the latest released version of the windows. It is absolutely good
in every task you need to perform.
30
o Windows Phone 8
o Windows 8.1 (based on Windows 8)
o Windows Server 2012 R2 (based on Windows 8.1)
Windows CE (OS for handhelds, embedded devices, and real-time applications
that is similar to other versions of Windows)
o Windows CE 3.0
o Windows CE 5.0
o Windows CE 6.0
o Windows Mobile (based on Windows CE, but for a smaller form factor)
o Windows Phone 7
g. UNIX: UNIX is a multi-tasking operating system for multi –users. It was developed
at AT & T Bell Laboratories in 1969 for use on microcomputers. UNIX is extensively
used for website management.
i. Macintosh Operating System: The most important thing about the Apple
Corporation’s Macintosh computer is that, it sets the standard for icon oriented
graphical user interfaces, which makes it easy to use. This is why Macintosh is
popular for desktop publishing.
PROGRAMMING LANGUAGES
Programming Language is a coded language used by programmers to write
instructions that a computer can understand to do what the programmer (or the
computer user) wants.
(a) Languages are grouped into generations based on when they were first
developed. It is generally accepted that there are five such generations to
computer professionals.
31
(b) Languages are grouped by levels based on how much they are like or unlike
the language the computer itself understands, called the Machine Language.
The lower the level of the language, the closer it is, to the language the
computer systems hardware understands.
5. Fifth Generation Languages (5GL): 5GLs are currently being used for
neural network. A neural network is a form of artificial intelligence that
attempts to imitate how the human mind works.
There are three (3) basic types of computer programming languages. They are
machine, assembly and high level. Each of these types of programming language is
described below;
32
1. MACHINE LANGUAGE “LOW LEVEL LANGUAGE” (LLL): Machine
language is the only language that the computer understands. Each
statement language program is a sequence of bits. Each bit may be set to 0
or 1. Series of bits represent instructions that a computer can understand. It
is easily understood by computers but difficult to read by people. This is why
people use higher level programming languages. Programs written in high
level languages are compiled and/or interpreted into machine language so
that computers can execute them.
3. HIGH LEVEL LANGUAGE (HLL): High Level Languages are what most
programmers use. They are very readable, portable and the statement in
these languages are English-like. Examples HLL include; Ada, BASIC, C, C++,
FORTRAN, LISP, PASCAL, Prolog, etc.
LANGUAGE CLASSIFICATION
S/N LANGUAGE GENERATION LEVEL
1. Machine Language First Generation Low Level
1GL
2. Assembly Language Second Generation Low Level
(Mnemonics) 2GL
3. Procedural Language Third Generation High Level
(FORTRAN, COBOL, JAVA) 3GL
4. Query Language (Prolog, SQL, Fourth Generation Very High Level
Focus) 4GL
33
TRANSLATORS
Regardless of what language used in programming, every other programming
language needs to be converted into machine language so that the computer can
understand it.
Translator An A An
Assembler Compiler Interpreter
Machine Language
UTILITY SOFTWARE (PROGRAMS)
Utility software is system software designed to help analyze, configure, optimize
or maintain a computer.
Utility software usually focuses on how the computer infrastructure (including the
computer hardware, operating system, application software and data storage)
operates. Due to this focus, utilities are often rather technical and targeted at people
with an advanced level of computer knowledge - in contrast to application software,
which allows users to do things like creating text documents, playing video games,
listening to music or viewing websites.
34
Utility software categories
35
System monitors for monitoring resources and performance in a computer system.
System profilers provide detailed information about the software installed and
hardware attached to the computer.
HUMAN ISSUES
The human issue is one of the basic components of the computer system also
known as the computer triangle. It is a very important component because without it
(humanware or peopleware or user), the computer cannot operate itself.
COMPUTER SPECIALISTS/PROFESSIONALS
Very many different people are involved in the aspect of computer designing,
operations and use. Most of these career fields in computer system can be divided
into four official positions;
(a) System Analyst
(b) Programmer or Computer Programmer
(c) Computer Engineer/Technician
(d) Computer Operator
SYSTEM ANALYST
A system analyst is a person who analyzes, designs and implements computer-based
information system.
FUNCTIONS
Systems Analysts look after the details of existing system in order to design
computer systems resources that meet user’s data processing need.
COMPUTER PROGRAMMERS
A programmer translates system design specifications produced by systems analysts
into instructions that can be read and interpreted by computers (programs). Develop
programs.
COMPUTER ENGINEERS/TECHNICIANS
A Computer Engineer/Technician is concerned with the architectural design of
computer components, installations, maintenance and general repairs of the
computer systems.
Architectural design is the work of computer engineers sometimes with the help of
technicians. We have computer hardware engineers who design, install, maintain
36
and repair computer hardware components and the computer software engineers
who ensure that they design software or program that meets the requirements of
the users and other stakeholders.
COMPUTER OPERATORS
The computer operators are the people who have constant communication with the
computer systems. A computer operator performs hardware-based activities that are
needed to keep the computer system running/operating smoothly.
If the computer system fails, the operator initiates checks/procedures to “bring the
system up”. Examples of computer operators include;
Data Entry operators
Control operators
Librarians, etc.
Operators except for data entry operators will need Technical School Diploma;
National Board on Technical Education (NBTE), Certificate and other Professional
Computer Certifications.
1. A good computer professional must have good communication skills; i.e must
be able to read and write.
2. A good computer professional must have appropriate qualification
3. A good computer professional must be trustworthy and have integrity as he
or she will be entrusted with sensitive and confidential information
4. He/she must be dynamic and ready to learn new things as the computer
industry is equally dynamic
5. He/she must know his/her job very well.
37
COMPUTER PROFESSIONAL BODIES IN NIGERIA
Computer Professional Bodies are computer professional organization that computer
professionals/specialists can join or belong.
Come professional bodies that computer professionals in Nigeria can join include;
1. The Nigeria Computer Society (NCS)
2. Computer Professional Registration Council of Nigeria (CPRN)
3. Information Technology Association of Nigeria (ITAN)
4. Institute for Management Information System (IMIS)
38
SUMMARY ON COMPONENTS OF COMPUTER SYSTEM
i. HAREWARE
ii. SOFTWARE
iii. USER OR HUMANWARE
39
WINDOWS
Windows, which was the first release in April 1990, allows the display of text and
graphics on the monitor screen. When running windows, all activities take place on
the desktop, (the screen of the monitor).
STARTING WINDOWS
WINDOWS DESKTOP
The first screen that displays when you start windows is called windows
desktop. Your desktop will have the same basic features but may not look
exactly the same.
icon
s
Taskbar
ICONS: icons are small graphical symbols on the desktop. After an application is started
(usually by double-clicking the mouse on its icon), it runs in an application window on the
desktop. One can reduce or minimize (temporarily closed) any open application icon. (See
fig A.2)
40
TASKBAR: The taskbar is a bar at the bottom of the desktop. It holds the start button. In
addition it holds the shortcuts Icons and the buttons for all the open windows.
Windows 98 comes with date and time icon on the task bar. If you have sound installed, the
speaker icon is displayed. The task bar stays visible always. You can use it to jump from one
program to another just by clicking on the desired program.
START BUTTON: Click on the start button to reveal all that you need to start using
windows as shown below;
All program
Documents
Control Panel
Search
Help and support
My computer
Run
Shut down
Etc.
41
BASIC CONCEPT OF THE OPERATING SYSTEM
DESKTOP: This is the area on the screen which displays the various components of the
system. It is always the starting screen to the operating system environment (see below)
COMPUTER VIRUS
A computer virus is a malicious computer program designed or written by obsessive
computer users or programmers in order to corrupt files or to perform tasks that are
detrimental to computer operations.
• It also destroys programs, files and disks
• If not checked, it may lead to total damage of the computer.
• Computer virus may corrupt files and negatively affect the memory of the
computer
42
CLASSES OF COMPUTER VIRUS
• Stealth virus: This class of virus performs a cautious and secretive action on
the computer system.
• Polymorphic virus: These are group of viruses are transitional in nature.
This simply means that it changes from one form to another.
• File virus –Direct Action File Virus (DAFV)
- Indirect Action File Virus (IAFV)
The file virus generally affects files, folders and briefcases.
• Boot sector virus: Since the operating system controls the process of
booting, the boot sector virus indirectly affects the operating system through
the boot sector/section of the computer system.
• Partition record virus: This class of virus affects the partitions of the Hard
Disk which is considered to be the workhorse of the computer system.
43
MODE OF VIRUS OPERATION
44
• As a new anti-virus is introduced, a computer system should be updated with
the new version.
• computer systems should be automatically scanned on regular basis
(automatically or manually)
• Scan any e-mail before opening
• Users and staff in general should be educated on the existence of virus and
how to avoid it.
45
LOGIC GATES
Logic gates are switching devices that control the flow of information. The
form the “building block” for other devices used
OR gate
OR gate is responding with a plus sign but called OR sign A + B
Distinctive shape of an OR gate
A A+B
B
Rectangle shape of an OR gate
A >I 1 A+B
B
AND gate
AND gate is represented with or without dot
Example: A B or A B
Distinctive shape of an AND gate
A
B A B
Rectangle shape of an AND gate
46
A AB
B
Truth Table of an AND gate
A B AB
0 0 0
0 1 0
1 0 0
1 1 1
NOT gate
NOT gate is commonly called INVERTER
Distinctive shape
A A
Rectangular symbol
B B
A A
0 1
1 0
NOR gate
NOR gate is the inverse of an OR gate A+B
Distinctive shape of a NOR gate
A A+B
B
47
0 0 0 1
0 1 1 0
1 0 1 0
1 1 1 0
NAND gate
NAND gate is the inverse of an AND gate A B
Distinctive symbol of a NAND gate
A A B
B
A AB AB
&
B
It is the same as the OR gate symbol except that it has a small circle on the
output. The small circle represents the inversion operation
48
The NOR gate can also be represent as;
A
X=A+B
B
INVERSION
Truth Table
A B A+B A+B
0 0 0 1
1 0 1 0
0 1 1 0
1 1 1 0
Example
A X=A+B+C X=A+B+C
B
C =A+B+C
NAND gate
The NANO gate operate like an AND gate followed by an INVERTER
AB AB
A
B
It can also be represented as the AND gate symbol except that it has a small
circle on the out.
A
B AB
Truth table
A B AB AB
0 0 0 1 C+D
1 0 0 1 C
0 1 0 1 D X=AB(C+D)
1 1 1 0 B
49