Fundamentals of Ict Notes
Fundamentals of Ict Notes
INTRODUCTION;
Hardware - is tangible or physical parts of a computer e.g keyboards, mouses, screen, printer
Software - is intangible parts of a computer it refers to instructions that direct computer hardware on what
to do.
Random Read
Access Memory Only Memory
(RAM) 70% (ROM) 30%
-ROM cannot be altered. The contents of Rome are installed by the manufacturer (Firmware)
-It is non-volatile
COMPUTER
Hardware Software
C.P.U Peripheral
Horizontal Vertical
Market Market
Software Software
THE FLOW OF DATA, INSTRUCTIONS AND COMMANDS IN COMPUTER SYSTEMS
CONTROL UNIT
BACKING STORAGE
KEY:
Data/instruction flow.
Command flow.
-Data flows from input devices into the main memory. the main memory stores data temporarily before
forwarding it to the arithmetic and logic unit.arithmetic and logic unit performs arithmetic and logical
operations on data and Returns the results of processing to the main memory. The results of processing
can then be sent to the output device. results of processing can also be sent to the backing storage to be
output of a later time.
-Instructions flows from backing storage to the main memory. The main memory stores the instructions
temporarily before forwarding them the control unit. the control unit interprets the instructions in
sequence and issue commands to the element of computer systems.
UNITS OF STORAGE
BIT – Binary Digit i.e 0 or 1
INPUT DEVICES
a.) LAPTOP KEYBOARDS-it is a small version of the typical QWERTY keyboard. It has same case as
normal keyboard except for the fact that laptop keyboards condense the symbols into fewer buttons to
accommodate space. There are also extra keys e.g power buttons, volume buttons, play button, mute
button etc
b.) GAMING KEYBOARD
Are similar to normal keyboard except they generally contain extra features such as illuminated
keys, multimedia keys, an additional screen, palm rest
illuminated keyboards are useful for playing games during the night when it is too dark to see
keyboard normally
The multimedia keys are useful for adjusting the volume
c.)ERGONOMIC COMPUTER KEYBOARD
-it is a computer keyboard designed with ergonomic consideration to minimise muscle strain and a lot of
related problems
It is designed for making typing easier and lessen the Strain that your hand may suffer.
2. MOUSE -Used to move the cursor from one point to another, to make selection and clicking on the
object, to highlight and select a cell.
4. TOUCH SCREEN - An alternative to mouse or other screen related device. You can activate an object
by touching it with your finger. Can be used to activate menus and make a selection from the menu.
5. LIGHT PEN - Instead of using your finger you can use a special device with a light sensing mechanism
to touch the screen. Pointing with a light pen is more accurate because you can point at very small
objects. The light pen is connected to the computer by a cable.
6. OPTICAL CHARACTER READER (OCR) - Is used to read documents encoded in optical character
reader fonts. They recognise each character by the patterns of reflected light.
Uses of optical character reader
1. Public utility bills. The bill which is sent to a customer has returnable sleep on which it is printed
in optical character reader characters. Customer code and amount owing the sleep is returned with
payment and used for input.
2. Sales order form. This can be printed by the computer with standard data details of the order on
the forms and Returns it for the optical character reader processing.
3. Stocktaking sheet. the customer can print out stock sheet in optical character reader characters
and their stock checker enters the actual stock and quantities on the form in a careful handwriting.
the sheet can then be optically read into the computer for processing and amending stock file.
Turnaround document - It is a machine-readable document which is issued out to the customer ASDA
output document with the customer returns to the point of origin to be used as an input document e.g
optical character reader utility bills, micro bank cheque.
A B C D
A B C D
A B C D
A B C D
SCANNER - input devices which enables a document to be entered into a computer system without other
operations such as a keying being done. it works rather like a photocopier but instead of producing a copy
on paper a copy is input to the computer system. this allows the document to be used in standard
processing systems such as word processor.
Advantages
Data is already coded and hence easy processing.
No transcription error.
Disadvantages
Difficult to handle because they are small.
Store small volume of data.
Areas of use
Shoe shops
Garment or clothes shops
10. BARCODE READER
Barcoding is the representation of code numbers on the data by bars or lines printed or embossed on
a data carrier
Barcodes are readable by a barcode reader. They are used in supermarkets bookshops and libraries. The
advantages to shoppers are more efficient check out services itemized receipt identifying each item and its
price few items out of stock and possibly lower prices as a result of more efficient management of the
supermarket. There are few transcription errors first data input and therefore fewer cashiers needed. It is
more friendly using a keyboard.
NOTE:
Price is not barcorded.
*BADGES(PLASTIC CARDS)
Badges are stiff plastic cards measuring 3 inches by 2 inches.
Data is stored on magnetic strip at the back of the card.
Magnetic strip
USES
Used as aim cards, credit cards, debit cards, telephone cards, used to access paking and resort clubs.
Disadvantages
The magnetic strip cannot store much information
They can be easily duplicated and not very secure
Interference by Magnetic Fields
Smart cards - Irene appearance like credit card but Incorporate a microprocessor chip rather than a
segment of magnetic strip the smartcard contains more data and performs processing functions which
cannot be done by ordinary card.
question 1
State four pointing devices used in a computer system.
A. Mouse
B. Joystick
C. Touchscreen.
D. Light pen.
Question 2.
Explain two reasons for using auxiliary storage devices in computer system.
Auxiliary storage among peripheral equipment.
1. The trains lower access rates for Greater storage capacity and data stability.
2. They are used for mass storage of data.
3. They hold programs and data for future use and because it is non-volatile like Rob it is used to store in-
active programs.
Question 3.
Describe three components of the central processing unit of a computer.
1. Main memory is where data is stored for quick access by the computer‟s processor. we have
random access memory which is volatile and read-only memory is non-volatile.
2. Arithmetic and logic unit-used to perform arithmetic and logical operations.
3. Control unit-used to control and coordinate all the elements of a computer system.
Question 4.
Differentiate between hardware and software as used in computer systems.
1. hardware is the tangible parts of a computer such as a keyboard mouse screen and printer while
the software is the intangible parts of a computer. it refers to instructions that Direct computer
hardware on what to do.
Question 5.
name the functions of the following devices in information communication technology
Optical character reader-used to read documents and coded in the optical character reader phones. They
recognise each character by the patterns of reflected light.
Magnetic ink character reader. Documents are passed through a strong magnetic field causing the iron
oxide in the ink and coded character to become magnetized. Characters are recognised by magnetic
pattern the exhibit.
barcode reader-it is used to capture and read information contained in a barcode. Barcoding is
representation of code numbers on their data by bus or line printed. Used in supermarkets bookshops
and libraries.
Question 6.
using a well labelled diagram describe the flow of data instructions and commands in a computer system.
***
***
Question 7.
Distinguish between read-only memory and random access memory.
Read-only memory is non-volatile hands can store or hold data without power while random access
memory is volatile hands can store data only when power is on.
Question 8.
With the aid of three examples explain the term turn around document.
Turn around document-is a machine readable document which is used out to the customer as the output
document which the customers returns to the point of origin to be used as an input document such as
optical character reader, utility bills magnetic ink character reader.
Question 9 state the input device appropriate in the following services.
1. Wholesale shop-mouse and keyboard
2. Cheque processing-magnetic ink character reader.
3. Water filling-optical character reader.
4. Shoe or textile manufacturing-punched card reader.
5. Voice recording.
6. Processing of questionnaires.
7. Capturing the passport size photos of students during registration process.
Question 10.
Identify the benefit of an automated teller machine to
Bank-ATM offer the convenience of multiple locations. One can withdraw cash at any bank that
is part of the system to which your ATM card is linked.
The customer.
-ATM card is protected by a pin keeping your money safe.
-they are faster than going to the bank no long lines.
Question 11.
how many floppy disks will be required to store information in a compact disk if the storage capacity of
floppy is 1.44 MB and that of compact disc 650 MB?
***
****
OUTPUT DEVICES
Printers are output devices that produce hard copy output. Printers can be categorised as follows
1 a. Character printers which prints a character at a time.
B. Line printers which prints a line at a time.
C. Page printers which print a page at a time.
Printers can also be categorised as
Low-speed printers which prints up to 300 lines per minute.
High speed printers which print above 300 lines per minute
Appears as
7 x 5 print wheel
Inkjet printers uline they print characters by spraying small drops of ink having high iron content.
Droplets of ink are electrically charged after leaving a nozzle period the drops are then guided to a proper
position on the paper by electrically charged deflection plates.
Inkjet printers produce high-quality print because the characters are formed by dozen of ink dots and
inkjets and other in an impact printers cannot produce multiple print copies of a document on a single
printing which is possible with impact printers.
they are non-impact printers. They are not noisy. They have features for graphs. They are cheap. They are
character printers.
Laser printers.
Used as a series of monitors to reflect the document being printed onto a photosensitive drum which
attracts some powdered ink to form the document image on the drum.
the paper on which print is to be made vs underneath the drum and document image is developed onto it
by the use of heat and pressure.
Most laser printers have buffers for storing data prior to printing.
Laser printers are;
Non-impact printers
Page printers
A good print quality
Have features for graphs
Are expensive
Not noisy
High-speed printers
print a page at a time.
hard copy the output is on paper in soft copy the output is on screen
Hard copy is permanent while soft copy is temporary
Chain printers
They use rapidly-moving chain called a prayer chain. Each link of chain is a character font. Instead of a
chain some models of printers uses a metal and having raised rent characters on it
Magnetically controlledprint farmers strike the paper along with the inked ribbon against the proper
character on the chain as it passes. Speeds of up to 50 lines per second can be achieved.
Multiple copies can be produced using a carbon paper. They have no features for grabs. They are noisy.
Drum printers
a drum printer consist of a solid cylindrical drum that has raised characters invanz on its surface. There
are as many bands as our printing positions. Each band contains all the possible characters.
The drum rotates at a rapid speed for each possible print position that is opposite to each band of the drum
there is a print hammer located behind the paper. the hammer strike the paper along with inked ribbon.
Newsline's one revolution of the drum is required to print each Line. This means that all characters on the
line are not printed exactly at the same time but the time required to print the entire line.
They have no features for graphs. They are noisy. They can't produce multiple copy prints with the use of
carbon paper.
XXXXXXXXXXXXXX
MMMMMMMMMMMM
AAAAAAAAAAAAAA
QQQQQQQQQQQQQQ
Question 6
Describe the flow of data instructions and commands in a computer system.
Data flows from input devices into the main memory. The main memory stores data temporarily before
forwarding it to the arithmetic and logic unit which performs arithmetic and logical operations on data
and Returns the results of processing to the main memory. The results of processing can then be sent to
output device. Results of processing can also be sent to the backing storage to be output at a later time.
Instructions flows from backing storage to the main memory period the main memory stores the
instructions temporarily before forwarding them to the control unit period control unit interprets the
instructions in sequence and issue commands the element of computer system.
Command flows from main memory to the elements of computer system.
FLOPPY DISKS
Have double sided floppy disks and single sided floppy disk. Single-sided discs store information on both
sides. We have single density base and double density discs. The disk is prepared for recording using a
formality program.
Formatting means creating concentric tracks the invincible and subdividing them into tracks. the tracks
and sector are given electronic levels to make it possible to access data in the discs.
Floppy disks have low storage capacity of 1.44MBs
1. They're slow and have a high access time.
2. They have low data transfer rate.
3. Rotates at 360 revolutions per minute.
Concentric tracks
Sector
FIXED DISKS
I like other removable disks but they are not removed from the disk drive. Each surface is divided into
concentric trucks which are subdivided into sectors. The discs rotates at a very high speed of 3600
revolutions per minute.
They have high data transfer rate. They have large storage capacity of 640gb and more.
They have low access time.
ACCESS TIME
It is the time interval between the moment the command is given to transfer data from the disk to the main
memory and the moment that transfer is complete. It is made of three components.
Seek time - this is the time it takes the access mechanism to position itself at the appropriate.
Rotational delay-is the time taken for the sector to come around and position itself under the read-
write head.
Data transfer rate - is the total time taken to read the content of the septic into main memory.
TAPE CARTRIDGES-they are designed to overcome the border of loading and unloading tapes.
Cartridges just pops in a slot which is simpler then threaded tape onto reel.
It gives better protection against dust or dirt compared to reel-to-reel tape.
There is no interblock gap in tape cartridge.
They don't use vacuum Chambers.
Tape cartridges are used to backup data.
they are also used for distributing data or software for archival storage.
OPTICAL DISKS
1. COMPACT DISCS ONLY MEMORY CD-ROM. -CD-ROM is also known as write once read
many times. It's an optical Media ends not magnetic. Data is recorded on the CD-ROM using a
laser beam of high-intensity. Data is real from CD-ROM using low intensity laser beam. They
have large storage capacity of 650 MB. can be used for distributing software on a single disc
where normally many floppy disks would be needed. It's suitable for storing documents which
don't require frequent changes. It's cheap.
2. COMPACT DISC RECORDABLE CDR-CDR Drive has read write capability. They have large
storage capacity of 650m bills. Standard CDR Discs can be written to only once. you can keep
adding that until the disk is full but you cannot remove any data or use a full disc.
3. COMPACT DISC REWRITABLE CD-RW-cd-rw and like CDR have data burnt into them and
also arrest so that the disc can be reused. They have same storage capacity as CDR. Cd-rw are
more expensive than CDR.
4. DIGITAL VERSATILE DISC DVD-DVD-R similar to CD-ROM in that they look identical.
They can be used to store computer application software multimedia program and full-length
movies. Any application software that needs 627 CD ROMs for installation could be replaced by
a single dvd. This is because CD-ROM typically stop 650 MB of data whereas a DVD stores up
to 4.7 GB. DVDs are also used to store movies where they produce much better quality pictures
and sound compared to normal videotapes. A film stored on a DVD can even be made to offer the
viewer choice of several languages in which it can be played back.
5. DIGITAL VERSATILE DISC READ-ONLY MEMORY DVD ROM this allows data to be
recorded only ones. they behave like CD-ROM except that they have large storage capacity and
better data quality.
6. DVD-R DIGITAL VERSATILE DISC RECORDABLE -this is a DVD but behaves like CDR
except that has a large storage capacity and better data quality.
7. DIGITAL VERSATILE DISC REWRITABLE DVD RW-behaves like cd-rw except that it has a
large storage capacity and better data quality.
8. HIGH-DENSITY DIGITAL VERSATILE DISCS HD DVD-can hold around 15 GB of data.
Ahluwalia HD DVD can hold twice that 30gb. it's a random access storage device. They are used
to store high quality high-definition videos.
9. DVD RAM DISC-other type of rewritable DVD. They often come in a floppy disc style case to
protect the disc. DVD RAM disc have similar capacity to a no more DVD holding 4.7 GB of
data. Dvd-rom are used in many camcorders and video recording cameras. The discs are of much
higher quality than normal dvd-rw and can reliably store data for up to 30 years. They are very
suitable for backup and archiving.
10. BLU-RAY DISCS-there recent replacement for DVDs. It can hold 25 to 50 GB of data. A dual-
layer Blu-ray disk can hold twice that. they are used in the same way as DVD rooms but they can
hold more data. They are used to store very high quality and high definition video.
Buffers
Dr storage devices associated with input devices and output devices. They are used to balance the speed
of faster processor with those of slow peripheral devices. Nu-line they allow simultaneous operation of
devices and therefore increases the efficiency of computer systems.
Virtual memory
It is not a storage device but a concept or technique that allows the main memory of a computer to run
programs which are bigger than the capacity of main memory. This is accomplished by segment in a large
program into smaller equal programs and loading each program into memory one segment at a time.
Primary storage
Cache memory-it is a high-speed memory capable of keeping Up with the processor. It acts like a buffer
between a processor and the slow main memory. As the process is not delayed by memory access the
overall speed of processing is increased. Segments of programs and data are transferred from main
memory into the cache memory in operating system.
Random access memory RAM-it holds the programs and data being processed. It will also store
immediate results of processing awaiting transfer to the output devices.
It's volatile
Read-only memory ROM-all contents of ROM are permanently set during manufacture. Once instructions
are put there by the manufacturers they cannot be altered period the user can only read from the memory
but cannot change the content. It's used to store vital data and program which needs to be held within the
main memory at all times.
Programmable read-only memory PROM-this is a type of ROM that can be programmed by the user.
programmable read-only memory can be programmed on the user but the contents of the memory is held
permanently once the programmable read-only memory has been programmed.
Erasable programmable read-only memory EPROM-this may be programmed by the user that cannot be
erased and reprogrammed. There erasable programmable read-only memory is removed from the
computer in order to be a rest. Special devices called erasable programmable read-only memory addresses
are used to raise the memory.
Electrically alterable read-only memory-these memories can be read erased and rewritten without
removing them from the computer period however there racing entry writing process is very slow
compared with the reading which limits their use.
FILE
RECORD RECORD
CHARACTER CHARACTER
CHARACTER CHARACTER
Types of data
1. Integers and whole numbers.
2. Floating point numbers.
3. Alphanumeric.
4. Date or time.
5. Text.
6. Currency.
7. Memo.
8. Boolean.
DOC Word
XIS Excel
MDB Access
PPT Powerpoint
GPG Picture
GIF Picture
BMP Picture
WAV Audio
MP3 Audio
MPEG Video
AVI Video
JMP Temporary
Advantages
Programs that handle fixed-length records are easier to code
Disadvantages
There is a lot of wastage of storage space
Advantages.
Max maximum use of storage space and snowy stages.
Disadvantages.
Programs that handle variable length records are difficult to write.
File characteristics.
1. Volatility-is the frequency with which records are added to the file or deleted from it. If the
frequency is high the file is said to be volatile. A file that is not altered is static. If the frequency
is low the frequency is said to be semi static.
2. Size-this refers to the amount of data stored in a file. It may be expressed in terms of the number
of characters or number of records.
3. Growth-it is the rate at which records are added to a file. Suppose file has turned records and file
BS4 records. If 4 records are added to file a while 3 records are added to file be then :-
Note
Baby is growing at a faster rate although few records are added to it.
4. Hit rate-this is the rate of processing of master file in terms of active records. Heat rate is a measure of
the activity of a father. Suppose fillet has 20 records and 5B has 10 records if during the processing
run 15 records in the file are processed and 8 records in file be processed. We say:-
********
Definition
File update - is general process of adding new information to a file or deleting unwanted information from
a file to make a file current or timely.
File maintenance-is a special type of updating which involves changing only non transaction Fields or
static Fields. It may involve changing name marital status address and many more.
File update
File maintenance
File referencing. This is when a particular record is referred to ascertain what is contained within.
File searching-this is to look for a record using a particular key known as primary key.
File sorting-is arranging to records in a particular key field sequence
File merging-this is when two or more different files of similar records and in the same sequence
are joined together to become one file.
a.)Serial organisation.
R1 R2 R3 R4
In serial organisation records are recorded in the sequence in which they are presented and can only be
processed in this order.
-This Method of file organisation is suitable for temporary files for example transaction files. files which
are seriously organised can be stored in tapes and discs.
In sequential organisation records are recorded in a certain key field sequence. The sequence Colby
alphabetic or numeric sequential files are most suitable for master files.
Sequential files can be stored In tapes and discs
Records are placed on Discs at random. There is no relationship between records. records are normally
located discs and therefore easy to locate a specific record. direct access files are stored on different
access storage media such as disks and not tapes.
In this organisation records are held in given sequence butter addressable by means of an index.
Unindexed sequential file is a data file organised in such a manner that it can be used for either direct
access purposes or for form of sequential processing will the heat rate is high.
Relationship between interest method of file organisation and type of storage media.
Low Random Direct access storage media i.e Disks and not tapes
High and Low Indexed sequential Direct access storage media i.e Disks and not tapes.
Types of files
1. Master files it is a file used as a reference for particular computer application. it is the file which
holds data that is a relatively permanent nature. The used as reference it may be updated when
necessary.
2. Transaction or movement file-this is a file of temporary data which is been prepared in order to
carry out a processing operation with a data in the master file. Usually the transaction file is used
to update master files.
3. Backup file iPhone it's a copy of another file used to hold data for recovery and security purposes.
4. Work father it's a file created during an intermediate storage in processing.
5. Scratch file-is a file no longer needed which may be overwritten.
Definition
Line sequential organisation-line sequential files are like sequential files except the record can contain
only text as data.
Entity-it's an item about which information is stored. In a payroll system an employee is an entity.
DATABASE APPROACH
A database is a collection of related records stored with minimum redundancy that many users can share
simultaneously.
Product Dept.
TYPES OF DATABASES
A. Relational database.
STUDENT
COURSE
COURSE CODE COURSE LECTURER IN CHARGE
Question 1
Identify the name of lecturer who teaches Valentine Shiku
Dr Muugi
Question 2
Identify the telephone number of the lecturer in charge of marketing
0711317801
Relational database is a database structure where data is structured in a two-dimensional tables consisting
of rows and columns.
A row presents a record and a column represents an attribute of a record.
A relational database is of a 1:1 relationship.
Which separates the type of record has a separate table.
There is a unique key field in ascending sequence.
The link between various tables maintained by repeated Fields. This means that redundancy is necessary
as the repeated Fields are the only links between tables.
B. HIERARCHICAL DATABASE
Customer No.100
C. NETWORK DATABASE
Invoice Store
This represents many-to-many relationships between data. It allows a data element to be associated with
more than one element period.the hierarchial database has some limitations is not all relationships can be
expressed easily anahita q framework. It is obvious that we are not only interested in the relationship
between customers and invoices but we are also interested in the relationship between sales
representatives and invoices.
That's why we want to know all the invoices that a particular cells present active has produced so that we
can issue commission statements.
In hierarchial database a child could have only one parent but in the network database my child can have
two parents such as invoice that has two parents and sales rep as well as customer.
DATA BANK
it is a collection of a database usually for several users available to several organisations. Databank is is is
therefore a collection of databases.
Databases organisational while the databank is multi-organizational.
DATA DICTIONARY
this is an index of data held in the database. It describes the data in the database. Data dictionary provides
information about the data in the database.
Record locking
USER 1 USER 2
RECORD A
When Two users in the database try to express the same record at the same time the system gives access
to only one person to another person access.
The Denying of access to the record as a result of concurrent access is called Record locking.
Dead Lock
Locks are commonly used to control concurrent access but they can also be problematic. for example a
client may hold a lock and necessarily long causing other clients to wait too long.
A further problem called Deadlock can occur when two clients are each waiting for the others lock and
cannot finish the transaction and release their unlock until they get the other.
The Database management system mastertemp to manage Deadlock for example by aborting one of the
two Deadlocked transactions.
GENERATION OF COMPUTERS
Computer Vacuum tubes Transistors Small scale Large scale LSI Parallel
used for circuity SSI and MSI processing
Size Big in size Smaller in size Smaller in size Smaller in size Very small
Amount of A lot of heat Less heat than Less heat than Less heat than Less heat than
heat 1st 2nd 3rd 4th
generated
Amount of A lot of power Less power than Less power Minimal power Very minimal
power 1st than 2nd power
consumed
Cost Very costly Cheap Cheaper than Cheap Cheap
2nd
Size of storage Huge in size Smaller Small in size Large in size Large storage
capacity
Reliability Less reliable Less reliable More reliable More reliable More reliable
Analogue computer- heater computing device that works on a continuous range of values. the results
given by the analogue computer will only be approx since they deal with quantities that vary
continuously. it generally deals with physical variables such as voltage pressure temperature and speed.
Digital computer-operates on digital data such as numbers. it uses binary number system in which there
are only two digits 0 and 1 . each digit is a bit. digital computers can give more accurate and fast results.
digital computers are well-suited for solving complex problems In Engineering and Technology hands
digital computers have an increasing used in the field of design research and data processing.
TYPES OF COMPUTERS
HYBRID COMPUTERS - it combines the desirable features of analogue and digital computer. it's
normally used for automatic operations of complicated physical processes and machines for example in
hospital analogue devices might measure the patient's temperature blood pressure and other vital signs.
This measurements which are in analogue might then be converted into numbers and supplied to the
Digital component in the system.
GENERAL PURPOSE COMPUTERS- it's used for only type of applications. they can store different
programs and do the job as per the instructions specified on those programs. most of the computers that
use today are general purpose computers.
SUPERCOMPUTERS- they are very expensive. they are very fast in processing. they are the most
powerful computers we have in the world. they are used to wear very high speed of processing is
required. they are very large and can process billions of instructions per second. they are used in
applications which require intensive numerical computations such as stock analysis weather-forecasting
scientific simulations fluid dynamics calculations nuclear energy research analysis of geological data
such as petrochemical prospecting.
MAINFRAME COMPUTERS-the process data at a very high speed of hundred of million in instruction
per second. they are expensive but not as supercomputers. they are used in banking airline and railway for
their applications. they support hundreds of terminals. have large storage capacity.
MINI-COMPUTERS- they are loyal to mainframes in terms of Speed and storage capacity. they're also
less expensive than mainframe. summer features of mainframe will not be available in mini computer
hence their performance will be less than those supported by mainframe.
MICRO COMPUTERS-The Invention of microprocessors give birth to microcomputers. they are cheaper
than many computers. they support only one user at a time. they are referred to as a personal computer.
they are slower than many computers. they are intended for individual users and their application
requirements. they are user-friendly.
DESKTOP COMPUTERS-They are micro computers with support one user at a time. they are also called
personal computers. they are normally placed on a desk when being used. that's why they are called
desktop computers. they are cheap. they are user-friendly.
LAPTOP COMPUTERS -They are portable computers. They are lightweight computers with a thin
screen. they can operate on a charged battery and therefore are very popular with the Travelers. the
screen Folds on the keyboard when not in use period consumes minimal power period can be placed on
lapse.
PERSONAL DIGITAL ASSISTANTS-They are handheld computers. they are pen best and also battery
powered they are small and can be carried anywhere. They use a pen-like stylus and accept handwritten
input directly on the screen.
They are not as powerful as a desktop or laptop. they are used for scheduling appointments storing
addresses and playing games. they have a touchscreen which we use with a finger.
PALMTOP COMPUTERS-They are portable computers that can be placed on your palm.
PROGRAMMING LANGUAGES.
a.)Machine code language (1st generation language IGL)
Coding is done binary notation.
A program written in machine code is not need transaction.
Programs written in machine code executes very fast.
What is machine oriented or dependent set data program written in machine code cannot run on different
machines of different configuration. In your line programs need hardware knowledge.
It's very tedious code in machine code language.
It is error-prone hence there are too many errors.
It is not easy to modify a program written in machine code language.
d.) Fourth-generation languages crewline they are also referred to as very high-level programming
languages.
there are none procedural languages since the programmer or user is allowed to specify what the
computer is supposed to do without specifying how it's supposed to be done.
programs written in fourth-generation language are shorter than equivalent programs written in third
generation language.
they are easier to use than 3rd generation languages periodni line they allow young professionals to
develop computer application programs although very little training may be necessary.
They are easier to modify than high-level languages programmers productivity is increased since text a
shorter time to code in fourth generation language than third generation language.
There's lower than third generation languages.
They include:
Qbe -query by example
QQL - quick query language
Ap - application factory
TRANSLATORS.
They're also described as language processes and are used to convert source Code to the equivalent object
code.
source Code is a program written in other programming language other than the machine code and cannot
be understood on the computer directly.
object code is the already translated program which is in its executable form.
Translators can be categorised as:
1. Interpreters-translates high-level language into machine code. Translation is done statement by
statement. object program is not saved after the machine translation since translation takes place
everytime program is running period execution of the statement is done on the sport period
translates one instruction in high-level language to many machine code instructions. They are
slow.
2. Compilers-translates high-level language to machine code. Translation is done once for the whole
program. object program is served since compilation takes place once for a particular program.
Translates one instruction in high-level language to many machine code instructions. They are
faster in Translation. Not effective in statement by statement error correction.
3. Assemblers-translate assembly language to machine code. Translate one instruction in assembly
language 21 machine code instruction. Object program is saved.
OPERATING SYSTEM.
An operating system is a set of programs that takes over the operation of a computer to the extent being
able to allow a number of programs to be run on the computer without human intervention
B. Menu-driven interface-the menu-driven interface provides the user with a number of options and
a simple means of selecting between them. The user is presented with a choice and doesn't need to
remember any commands. interface is suitable for beginners and infrequent users. all our user has to do is
to make a choice period in the above example the user should type 1 or 2 or 3. If you type „I‟ this causes
the main menu to be replaced with the print menu.
C. Graphical user interface-it is a human computer interface best upon graphical displays. they are
icons that are displayed on a screen. they enable the user to click on them and perform a specific
task.Graphical user interface is easy-to-use. and like Command driven interface graphical user interface
doesn't require the user to have the knowledge of commands that are available. user is not required to
memorize commands. user is not required to know the format of commands.
D. Windows icons miles pull-down menus (WIMP) - a window is a rectangular area on a display
screen on which text or graphical images may be displayed. several windows may be displayed on the
screen at the same time. most workstations and some personal computers used software that handle all
screen display by means of Windows. windows are displayed on the screen in a manner assembling
rectangular piece of paper on a desktop.
a. Mice-are used to move the cursor from one point to another and selecting objects.
b. Icons-are graphical images that represent operation such as an image of a printer to represent
printing operations.
c. Pull-down menus-these are special Windows associated with the text headings displayed at the
top of the screen.
d. Pop-up windows-seducer Windows which appear after the user makes a selection such as a Lefty
save from the pull-down menu can cause a pop-up window to appear.****
e. voice user interface-accept input and provide output by generating voice prompts.
Types of Utilities.
1. Peripheral transfer programs-they are used for such things as making a copy of a file from one
storage device onto another such as printing a copy of a fired or reading a file from input device
onto a disc.
2. Editor's-used at a terminal and provide a series of commands which the user can use to look at a
program or better and make any alterations. if for example a source program needed correction
because it had failed to compile properly an editor may be used to make necessary changes to the
program.
3. Sort utilities-they are used to rearrange file records into a specified sequence such as an unsorted
transaction file may be converted into assorted file by utility before the file is processed.
4. System status Utilities-these programs are able to provide information about the current state of
use of files memory and peripherals EG it may be possible to use such a utility to show how
many files are waiting in a queue to be output onto a line printer.
5. File maintenance utilities iPhone they may be used to perform tasks such as organising files YG
every so often it may be necessary to reorganize and indexed sequential file on disk because of
changes which have occurred to the file as a result of a number of Records being inserted or
deleted.
6. Debuggers FM they are used as an aid to removing bugs or errors from programs. they provide
ways of examining and changing data values.
7. Dumb utilities hyphened dump means copy the contents of main memory into an output device.
damping sometimes refers to the copying of data from storage devices like disks. This software is
useful when errors have occurred during the running of a program.
8. Backup Utilities - are programs used to make a duplicate copy of information on your desk for
security purposes.
9. Data Recovery utility -used to restore data that has been physically damaged or corrupted. data
can be damaged by viruses bad software hardware failure and power fluctuations that occur while
data is being written or recorded.
10. Virus protection utility python antivirus software is a utility program that scans hard disks
desquites flash disks and detect viruses. this utilities destroy viruses on the spot . others notify of
possible viral behaviours.
11. Data compression Utilities-they remove redundant elements tabs and unnecessary data from
computer storage so that less storage space is used.
12. Merge Utilities-combine several documents into one document.
13. Formality utility-prepare the disk for recording by creating concentric trucks and subdividing
them into sectors and allocating them electronic labels.
Definition
Copyright is the exclusive legal right that prohibits copying of intellectual property without the
permission of the copyright holder. copyright law protects books articles pamphlets music drawings
arts movies and computer software.
Software privacy -is unauthorised copying of copyrighted software.
Plagiarism is the appropriation of another writers text finding an integration and presenting it as one's
own.
Close source software-is a software released or distributed without the corresponding Source Code users
are prohibited from making changes to it.
Open Source software.-is a computer software that is available in Source Code and uses are permitted to
study change improve and sometimes even to distribute the software.
Features of a spreadsheet
A spreadsheet is a computer program In which figures are arranged in a grid of rows and columns.
formula-if a value on a spreadsheet is changed formula makes sure that the change is updated
throughout the rest of the spreadsheet.
Goal seeker-this looks at the Endpoint and works backward e.g “ I want to make 100000 shillings
profit this month. how many times do I need to sell?” the goal seek too will give you that answer.
Graphs and charts-graphs and charts let you present the data in a visual or pictorial form. humans
find it easier to spot trends and analyse data in a graph rather than in a table of numbers.
Regression analysis I was using mathematical tools in the spreadsheet to look for trends. this can
help you see relationships between things such as a hot day you will sell more ice creams or when
it is wet umbrella sales Will Rise.
This can be used to help predict future profits best of the profits you have made.
Cell formatting - numbers strings currencies dates and times.
Cell margin-rows and columns.
Operation like deleting and inserting columns or rows.
Rename or delete the active file features.
What-if analysis.
Data communication
Communication is the process of transferring messages from one point to another.
Transmission Media
Wire pairs or twisted wires-made of copper. a pair of wires are twisted together to reduce interference by
adjacent wires. it's cheap. has low immunity to noise. has low data transmission rate period can only be
used over a short distance. they are thinly insulated.
A. Coaxial cable-made of copper. thickly insulated. has high immunity to noise. more costly than
twisted wires. have higher data transmission rate compared to twisted wires. can be used over a long
distance.
B. Optical fibres-made of fibres. very thin to the size of human hair. transmit data in form of light
waves. Transmit data at a very high speed. fibre optics transmission are not affected by electromagnetic
interference. have immunity to noise. they are expensive. can be used to communicate either analogue or
digital signals. Converters are needed at source to convert electrical signals to light waves and another
converter is needed that sync to convert light waves back to electrical signals.
C. Microwave communication-messages are transmitted through the atmosphere in the form of
waves called microwaves. microwave Towers and relay stations are used to transmit signals from one
point to another. Repeater stations are used to strengthen the signals over a long-distance. microwaves
moves in a straight line. this means the sending station and receiving station must be in the line-of-sight.
microbes can be locked by mountains and other structures and that's why relay stations are positioned on
buildings or Hills. it's easier to install than cables. have higher data transmission rate compared to coaxial
cables.
D. Communication satellite-microwaves are transmitted from transmitting station on earth to the
satellite in space high frequency of 6GHz. the satellite amplifies the weak incoming signal and retransmit
it back to Earth. any station within the radius of the satellite can receive the broadcast signal . satellite
communication signals cannot be blocked by structures because they are being broadcasted from above.
retransmision frequency is different from the transmission frequency to avoid the interference of the
powerful transmission signals with weak incoming signals. transmission and reception can be between
any two randomly chosen places. it's very suitable method of communication over a long distance. it's
costly to place satellite in its orbit. sensitive message may need to be encrypted to protect confidentiality.
Communication devices
Modulator-demodulator (modem)
Computer generated data is digital whereas the telephone line used for communication are usually meant
for carrying analogue signals. when digital data are transmitted over an analogue facility suggest
telephone line than digital signals must be converted to analogue signals.
This is called modulation. modem is used to convert digital signals to analogue signals at the source and
reconvert analogue signals back to digital signals at the sink (demodulation). when data is sent in digital
modem is not used.
Multiplexer
Multiplexer takes several data communication Lines or signals and convert them into one data
communication line or signal at the sending location.
in the above diagram the multiplexer takes the signal from for terminals and convert them into one large
signal which can be transmitted over the communication line.
Are they receiving location a multiplexer takes the one large signal and breaks it into the original four
signals.
The purpose of multiplexing is to serve the telecommunication cost by using few lines during
transmission.
Concentrators
A concentrator is an intelligent multiplexer. it can store and forward information at maximum lightspeed
eliminating idle time. they have the ability to reduce the number of signals such as hand signals from
different devices coming into the concentrator will leave as 10 turn signals are concentrated to form a few
number of signals.
Front-end processor is a separate processor designed specifically to handle the network processing tasks.
it is usually installed in the same location with the Host computer.
The primary purpose of front-end processor is to offload communication processing task from the Host
computer so that the Host computer can be dedicated for application of data processing jobs. it acts like
a secretary or reception is to the main computer.
Hub - Used in wired network to connect cables to a number of devices together. the Hub allows each
device to talk to one another.
Bridge - to the device that connects to local area networks with the same transmission protocol.
Gateway-is a communication device used to connect two networks whose communication protocols are
different.
Router-is a device that determine the most efficient route between networks. it may determine the
alternative route in case of congestion on a particular line.
Brouter- it is a bridging router. it is a device which combines the features of a bridge and router. it is
capable of routing packets of data across network and working as a bridge.
Switch-is a multi-port bridge with a buffer and a design that can boost its efficiency. it can perform error
checking.
11101101 → 1→
0→
1→
1→
0→
NETWORK TOPOLOGIES
A network is a connection of two or more computers for the purpose of communication sharing resources.
a network topology refers to the way in which the endpoints or station is over network linked together.
Star topology.
In startup ology a host computer is attached to a local computer through multiple communication
channels. the local computers are not linked directly to each other but communicate through the Host
computer.
Ring topology
There is no host computer or controlling computer. the node receives data from one of the adjacent
nodes.
The only decision a node has to take is whether the data is for its use or not.
If it is addressed to it it utilizes it otherwise it merely passes it on the next node. so that circulates around
the ring from the interface to the interface only one computer transmits a message at a time. this is done
by talking passing.
Each computer has a direct dedicated link with all other computers on the network.
The control is distributed with each computer deciding its communication priorities.
Bus topology
A single large computer controls all computer activity. however each or one of the computers connected
to the main computer in the first level of the star has a star network of devices connected to it.
Hybrid networks
The exact shape of a network depends on the need and overall organisational structure of the company
involved. The hybrid may have components of star ring and completely connected network.
Definitions
Stand-alone computers-it's a computer that is not connected to any other computer.
Workstation-it is an intelligent terminal. it is a computer connected to a network that has the ability to do
processing on its own.
Dumb terminal-it is the terminal connected to a network but has no processing ability. it relies on the
Host computer for processing.
Advantages of networking
Advantages of networking.
1. encourage sharing and Resources such as data software and expensive devices.
2. Facilitates communication.
3. Provision of local facilities without the loss of Central control.
4. Even distribution of work and processing laws.
5. Sharing risks and mutual support.
6. Encourage paperless office.
7. Minimise movements.
8. Easy to backup data.
9. Assist collaboration i.e ability to work on one task the several people simultaneously.
disadvantages of networking.
1. Expensive to install.
2. Encourages people to be dependent on computers.
3. If one station fails other stations are affected.
4. There is a need for highly skilled personnel because managing a large network is
complicated.
5. Security challenges such as viruses hacking and many more.
Challenges of internet
1. Security challenges such as viruses and hacking.
a. Jamming - it is to tie up computer hosting our website so that legitimate visitors
cannot access the website.
b. Sniffing - it is a form of eavesdropping. it involves placing a software to intercept
communication between a computer hosting a website and a terminal.
c. Spoofing-setting out counterfeit websites to collect confidential information from
unsuspecting visitors.
d. Spamming-this is sending of unsolicited mass mail for marketing purposes.
2. Network congestion.
3. Information overload-and enquiry often leads to more responses than the recipient can
handle.
4. Employees can spend a lot of time on the internet doing non job-related activities thus
reduction in productivity.
5. the quality of much of the information on the internet leaves much to be desired.
6. Cost is a major issue of the minimum hardware requirements can be obtained cheaply.
7. Can lead to Moral decay in society.
Intranet-is an internal private network based on internet and web technology. it allows only the
members of the organisation to access the information.
Wireless web
This is a web-based application enabling you to access digital information from the internet
using wireless mobile computing devices such as cellphones personal digital assistants laptops
and many more.
Advantages.
1. User is not tied to the office or office hours since you can make a decision anywhere
anytime because you have access to information.
2. there is timely decision-making. assault person can be able to complete a sales
transaction without having to go back to the office because he can be able to access the
office data when in the field and access the available stock.
3. Whenever a user is connected to the internet through a wireless device the transmission
technology can be traced to determine that person's location. Example; drivers could
use this capability to obtain local weather data and local traffic information along with
alternative route suggestion and description of a nearby restaurant.
Challenges.
1. mobile computing devices have insufficient bandwidth does slowing down internet
access.
2. It relies on battery power. a battery with low battery life is insufficient.
3. transmission of data is interfered with by weather and terrain.
4. Mobile devices for certain potential health hazards.
5. Screens of mobile devices are too tiny and may cause eye strain.
6. Keyboards are too tiny and may strain the fingers.
Network firewall
it is a hardware or software or a combination of the two that prevents unauthorised internet
users from gaining access to private networks while permitting authorised communication.
teleworking or telecommuting
This refers to situations whereby an employee can work from my location that is away from the
normal place of work and is linked to the main office through telecommunication links.
Protocol
It is an agreed-upon format for transmitting data between two devices. the protocol determines
1. the type of error checking to be used.
2. Data compression method if any.
3. How the sender device will indicate that it was finish sending the message.
4. How the receiving devices indicates it was received message or acknowledgement.
Internet protocol uline it is the method by which data is sent from one computer to another on
the network. Each computer on the internet has at least one IP address that uniquely identifies it
from all other computers in the internet.
Definitions
HTML-hypertext markup language. it is the predominant.
Www- World Wide Web well with one that may contain text image audio and other media to
navigate between them via hyperlink
Browser-it is a software application used to locate retrieve and also display content on the world
wide Web.
website-is a collection of series of web pages hosted on a computer that is connected to the
internet such as Amazon. Newlin homepage it is the opening front page of a website. This page
usually has some sort of table of contents and it often describes the purpose of the side.
Web server-refers to a hardware or the software that help to deliver web content that can be
accessed through the internet period the most common use of web server is to host websites.
URL uniform resource locator-it is a uniform resource identifier that specifies where an identified
resource is available and the mechanism for retrieving it searches HTTP www.google.com
Features of e-commerce.
No cash payments-the payments are goods or services in in electronic service availability.
Advertising or marketing-global research of customers.
Improved sales-sells can be generated anywhere anytime without any human intervention.
E-commerce otometz inventory-management. Reports get generated instantly when required.
Communication improvement-first efficient reliable communication with customers and Partners
Models of e-commerce.
Business-to-consumer e-commerce-this is the electronic retailing of products and services
directly to individual consumers or shoppers such as selling of books software music to
individual customers.
Business-to-business e-commerce-this involves sales of goods and services among businesses
such as selling of tools or grinding wheels and metalworking fluids to small machine in
businesses.
Consumer to consumer e-commerce this involves consumers selling directly to consumers such
as eBay.
Government to e-commerce-this is a form of e-commerce that involves transaction between
citizens and government the transaction may involve filling it runs renewal licence application of
passport etc
Limitations of e-commerce.
Lack of universally accepted standards for quality security and reliability
Insufficient bandwidth-congestion of network
Still evolving software development
Difficulties integrating e-commerce software with legacy systems
Extra cost of web-based service
Access to internet is expensive
Legal issues not standardized
Difficulties in measuring e-commerce benefits
Perception that e-commerce is expensive and insecure
Language barrier
Power failure since it cannot work without power and therefore the necessity for an alternative
power supply
Methods of electronic payment (e-payment)
Digital credit card-its payment system extended the functionality of credit card so that
they can be used for shopping online.
Digital wallet-this software stores credit card and owner identification information
Smartcard-is a plastic card that uses a microprocessor chip to store digital information
and can be used for electronic payments in place of cash
Accumulated balance digital payment system-it enables users to make micropayments
and purchase on the web accumulative a debit balance on their credit card
Stored value payment system-it enables customers to make instant online payment
based on the value stored in a digital account.
Electronic funds transfer-this is used to transfer money electronically from one bank
account to another. Funds transfer can be done using ATMs or computer.
Mobile money transfer.
Computer viruses
o Self-replicate
o Load and run automatically without user‟s request
o Destroy data and other programmes
Recovery procedures
o Back up
o Use of hardcopy output
o Use of source document
o Twin processing – This is running two systems in parallel. If one system fails, you can recover
from the other.
o Mirroring – Storing data in multiple disks
o Seek help from disaster recovery companies
o Use of cloud computing – storing data in remote servers hosted over the internet
o Use of grandfather, fathers son technique i.e retaining three generations of masterfiles with their
respective transaction files. If a file is costly, you can go back to the previous generation and
recreate lost file.
Users;
Operational Transaction
staff processing
Operational level
system (TPS)
Open system is the entire infrastructure that collects process store and transmit retrieve and display
information
Types of decisions
1. structured decisions-are programmable decisions that follow laid down rules and procedures.
They can be specified in advance e.g. stock control procedures selection of a product from
discount
2. Unstructured decisions-are non-programmable decisions that do not follow lay down procedures.
They are non-routine. They cannot be specified in advance. They rely on human judgement such
as acquisition model launching new products.
3. Semi-structured decisions-Falls somewhere between the two categories described. it is likely to
involve an element of human judgement and to have characteristics of standard procedures with
semi programmed elements such as selecting a new supplier, allocation of budget
Examples of TPS
o Market research
o Staff performance
o Budgeting
Tactical information
a) Is primarily generated from internal sources
b) Is summarised
c) Is relevant to the short and medium terms
d) Describes or analyses activities in departments
e) Is based on quantitative measure
Strategic information
a) Derived from both internal and external sources
b) Is highly summarized
c) Relevant long-term
d) Deals with the whole organization nu-line both qualitative and quantitative
e) Uncertain given the future cannot be accurately predicted
ESS
MIS DSS
KWS
TPS