GST103 Module 2
GST103 Module 2
· Hardware components – (the front, back and inside of the system unit)
Table of content
- Mother board
- Memory chips
- Types of memory
Primary memory
Read only memory (ROM)
Random access memory (RAM)
Secondary memory
Hard Disk
Tertiary memory
Floppy disk (diskette)
CDROM
1
1.0 Introduction
Your Personal Computer (PC) is really a collection of separate items working together as a
team-with you as the captain. Some of these components are essential; others simply make
working more pleasant or efficient. Adding extra items expands the variety of tasks you can
ii. Enable the student to appreciate the importance of each of the components to the
The system unit is the main unit of a PC. It is the Computer itself while other units attached to
it are regarded as peripherals. It could be viewed as the master conductor orchestrating your
PC’s operation. It is made up of several components like the Motherboard, Processor, Buses,
memory, power supply unit, etc. This unit (system unit) has been confused over the years by
novices as the CPU. This is not true. The CPU (Central Processing Unit) or simply processor
is a component within the system unit and it is not the only thing that makes up the system
unit. Hence, it will be wrong to equate the system unit with the CPU.
Lights
Your unit may display a variety of colored light on the front panel, including power and turbo
signals, and light to indicate if the Hard or Floppy disk are being read or written to.
2
Key Lock
You can stop intruders tampering with your PC by using the Lock on the front panel.
Turbo Button
Some PCs offer a choice of speeds at which they can run. A turbo switch is usually left so the
Reset Button
If your PC “freezes” and won’t respond to any comma nd, try starting it up again using the
reset button. Pressing the reset button loses all the work you have not saved in that session,
Power On/Off
All PCs have main power switch on the system unit. Sometimes this control is placed on the
Either, or both, of two standard types of floppy disk drive may be found at the front of the
system unit. Some systems also have internal CD-ROM or tape drives.
3
CD-ROM or DVD drive
Fan Housing
The electronic components in your PC generate a lot of heat. To prevent overheating, a fan
at the back of the unit removes hot air from the system.
Cables plugged into these sockets carry power from the electrical outlet to the system unit
Joystick Port
Using a joystick is often much better than pressing keys to control movements when playing
a computer game.
Serial Ports
Serial Ports often connect the PC to modem or mouse. Most PCs are fitted with two serial
ports that may be labeled “S101” and “S102”, “Serial 1” and “Serial 2”, or “COM 1” and
“COM 2”.
4
Sound Jacks
If you have a sound fitted inside your system unit, you will see a jack or jacks at the back.
These can be used to connect your PC to speakers, a microphone, or an eternal sound source.
Keyboard Port
The cable from your keyboards ends with a round connector, which plugs into the keyboard
port.
Network Adapter
If an expansion card is fitted to link your PC with other PCs in your office you will see a
Monitor Port
A cable from your monitor plugs into this port and carries display information to the monitor.
PCs are easily expanded-perhaps to provide a modem, sound or faster graphics. You can plug
cards into expansion slots inside the PC. The end of an expansion card shows at the back of
51
5
The brain behind everything that happens in your PC is contained within the system unit.
Inside the unit are the impressive electronics that run programs, handle instructions, and
determine the results. Most of the more important items are described below:
Battery
A small battery powers a clock to keep track of the time when the PC is turned off. It also
maintains low electricity to certain RAM chips that record which components are installed.
This card controls the PC’s disk drive motors and transfers data. The serial and parallel
ports at the back of the card link internal PC components with external devices such as
All the information your computer will display is stored in its memory. To be useful, you
need to see the information. The display adapter card is the link between the PC’s memory
Expansion Slots
These long narrow connectors allow you to plug in expansion cards (also known as adapter
ROM Chips
Read-only memory (ROM) chips have data written on them during manufacturing that tells
the CPU what to do when the PC is switched on. The data is always there, even when you
6
RAM Chips
When a computer is switched on and running a program, RAM (Random Access Memory)
is used for purposes such as holding the program and its data. But when the PC is switched
These slots let you expand your computer’s memory by adding extra RAM chips or
modules. Some PC’s work even faster because they come equipped with Cache Memory.
Cache Memory consists of expensive and very fast memory chips that store the data or
instructions that the CPU will look at next. Cache memory can speed up work on your
computer enormously.
RAM chip
Intel Processor
53
7
The Microprocessor, or Central Processing Unit (CPU), is the computer’s most important
single item. It does all the PC’s thinking and runs the programs (series of instructions) that
you request.
These chips help the CPU manage all the other parts of the computer.
A math coprocessor, present in some PCs, assists the CPU in its number-crunching
CPU fan
Speaker
All the components in a PC need electrical supply. Most need a 5-volt supply although the
floppy disk drive motors required 12 volts. If the components were connected to
54
8
normal household current, they would blow up, so the power supply unit converts high voltage
The hard disk is your computer’s main permanent storage unit, holding large amount of data
and programs. Unlike data held in RAM, the information on the hard disk is not affected when
the PC is turned off – it remains the re unless you instruct the PC to overwrite it or the hard
disk is damaged.
Motherboard
All the electronic components in a PC are mounted on a piece of fiberglass called the
motherboard. Fiberglass cannot conduct electricity, so each component is insulated from all
the others. Thin lines of metal on the surface of the fiberglass connect pins from one
55
9
Components of a motherboard
Intel CPUs
The earliest PCs were equipped with a CPU from Intel Corporation called the 8088. the next
generation of PCs used CPU known by the number “80286 and were called “PC/AT”
computers. Subsequently, PCs have been sup plied with more and more powerful CPUs – the
80386, the 80486, and the more recent and impressive of all, the Intel Pentium (I, II, III, IV&
M).
All these PC processors belong to a family called 80 x 86. In general, you can run the same
software on PCs containing different CPUs within this family. From the outside, the chips look
different only in sizes and number of pin-put inside, an 80486 has over one million components
to the 3,500 that were in the first 8088. Because of these differences, the latest Pentiums runs
56
10
What is CPU
The CPU is certainly the most important PC component. CPU stands for
CPU Speed
The speed of a CPU is measured in megahertz (MHz). A computer has central clock that keeps
all the components in time with each other; one hertz is similar to a clock tick and megahertz
is equal to one million ticks per second. If your PC runs at 333 or 400MHz, the central clock
ticks 333 or 400 million times every second. As you might imagine, the faster the clock ticks,
Without the CPU, there would be no PC. Like all other hardware components, the
CPUs are continually undergoing further development. You can see the explosive
newer and faster CPUs. The CPUs have for years doubled their performance about
every 18 months and there are no indications that this trend will stop.
When we now look at all the CPUs from a broader perspective, we can see that:
The CPU history is closely tied to the companies IBM and especially
Intel.
57
11
The CPUs have their roots back to Intel's chip 4004 from 1971.
Generations of CPUs
There are CPUs of many brand names (IBM, Texas, Cyrix, AMD), and often they
make models which overlap two generations. This can make it difficult to keep track
History of CPU
58
13
Generation Mobile Celeron 18,900,000
Pentium III 9,300,000
AMD K6-3 ?
Pentium III CuMine 28,000,000
Intel Processor
DISKS
Floppy Disks
Computers use disk to store information. Although there is a permanent hard disk that lives
inside the system unit, you can use floppy disks to store and move data easily from one PC to
another. Floppy disks come in two sizes, either 5¼ or 3½ inches in diameter. The smaller disks
are able to store more data and are also less easily damaged, because of their thicker plastic
cases. As both sizes can be either “high” or “low” capacity (or density), there are four main
varieties of disks available. High-capacity disks are more expensive, but they can store much
14
labeled DS/DD, which stands for “double sided/doubl e density”, while the high-capacity
Treat floppy disks carefully, and you can take them almost anywhere safely. Don’t leave the
disks in your PC when you finish a session. Also avoid putting anything heavy on top of your
disks or leaving them in extremes of hot or cold temperature. Try not to carry disks loose in
pockets or handbags where dust and dirt may get inside the containers. Take care to store them
vertically, preferably in a special storage box. Remember too that you should keep floppy disks
away from magnetic fields, including hidden magnets such as those in telephone, radio and
television speakers, amplifiers, desk fans, and photocopiers. If you do leave floppy disks near
magnetic field, your data may become corrupted and will no longer be usable.
Write – protecting a disk means that you prevent th e computer from erasing or writing over
important data or programs that are already there. However, the PC can still read a write-
protected disk.
4.0 Conclusion
The system unit is a box housing many components. It is in fact, the most important part of
the computer because it houses the processor (CPU) and other essential components that
5.0 Summary
In unit we studied the components of the system unit which include the components in the
60
15
6.0 Tutor Marked Assignment
a. Make a list of 5 components that could be found inside the computer systems unit.
Balogun, V.F., Daramola, O.A., Obe, O.O., Ojokoh, B.A., and Oluwadare S.A., (2006).
16
STUDY UNIT 2
Table of contents
Input devices
Computer keyboard
1.0 Introduction
The computer peripheral devices are those devices which are attached to the system unit.
The devices are necessary to ensure that the computer is able to accept input and display
the result for the user. This section therefore discusses the input unit and the output unit.
2.0 Objectives
i. Expose the students to those components that make up the input unit and the
output unit.
ii. Enable students get deeper understanding of the functions of the input and the
output unit.
iii. Guide the students on the type of input unit and output unit suitable to a
62
17
performing the routine functions characteristic of a typewriter keyboard, it can initiate a series
of actions for a computer to carry out by mere pressing a key or combination of two or more
keys. An intelligent computer keyboard has a set of keys and when one of them is pressed, the
computer can be made to carry out a specific function. For example, the pressing of a key may
cause the computer to display a menu list from which a human being may be prompted to
select one.
The intelligent computer keyboard has four major divisions, namely: Function keys,
Alphanumeric keys, Numeric keys and Control keys.
In addition to the four types of keys, there are some special or important keys such as the
following:
(a) Return or Enter key
(b) Escape key denoted by ESC
(c) Control key denoted by CTRL
(d) Alternate key denoted by ALT
(e) Delete key denoted by DEL
(f) Insert key denoted by INS
(g) Backspace key
(h) Shift key.
Function Keys
The effects of the functions keys are software package dependent. That is, they mean different
translations depending on which software package one is running on the computer. The
function keys are traditionally labeled F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11 and F12.
The function keys are often arranged to the left of the main keyboard in two columns or they
are arranged in a row above the main keyboard. In most software packages, the function key
F1 is used to run the HELP program. Word perfect, for example, uses F3 for HELP program
and F1 to cancel the last command issued on the computer. The function keys F7 and F12 are
used to save a text and block a section of a text respectively in word perfect. Function keys
can be programmed to carry out the functions desired by a programmer. For example the
function keys F10 may be programmed to display menus. Thus, the operations of the function
keys can be
63
18
determined by the user or programmed by the software package being used at any point
in time.
Alphanumeric Keys
The Alphanumeric keys can be likened with the conventional typewriter keys. They
contain alphabetic characters, numeric characters and special characters such as comma,
full stop, open bracket, close bracket, asterisk, semicolon, colon, question mark, and so
on. Usually, each key carries a character at the lower part and another character at the
upper part. The SHIFT key is used to switch on or off the lower and upper characters by
the programmer.
Move the cursor to the bottom left of a page or to the end of the current
END line in most text editors
Moves the cursor to the top of the next page in the document or text.
For
PGDN example, pressing this key while on page 5 of the text will place the
cursor at the top of the page 6 of the text.
PGUP Moves the cursor to the top of the previous page. For example, if you
are on page 3 of a document, pressing this key will place the cursor at
the top of page 2 of the document
Other cursor control keys are HOME, PAGE UP, PAGE DOWN, and END. These keys
19
may be part of the numeric keypad or separated from the numeric keypad. Moving the
64
20
cursor around on the screen is one of the most common tasks in an application program. In
fact, cursor movement is so important in an application such as word processing that it can
usually be accomplished by additional key-driven commands. The control keys and their
functions are documented in Table the above table.
Numeric Keypad
The numeric keypad contains a set of keys required for typing or entering number digits 0, 1,
2, 3, 4, 5, 6, 7, 8, and 9 into the computer store. A numeric key is often activated by pressing
the Numlock Key. The numeric keypad is also used in combination with Alternate (Alt) key
to produced extended characters. Extended characters are characters not normally found on
most keyboard. For example, to produced the character alpha data denoted ‘ ’, one holds
down the Alt key and press 224; to produce character beta denoted by ‘ ’, one holds down
the Alt key and press 255 and to produce pound sterling denoted by ‘ ₤’, one holds down the
Alt key and press 156.
Shift Key
When the Shift key is pressed, the capital letters on the alphanumeric keys are activated. It
also serves as the activator of characters that are at the upper part of each alphanumeric key.
The Shift key has no effects on itself; its effect are realized when some other keys are pressed.
Thus, if one presses the shift key and then ‘equal’ sign key, the ‘plus’ sign which is at the
upper part of the ‘equal’ sign is a ctivated and then it appears on the screen.
CapLock Key
The CapLock Shifts all alphabetic characters into upper case (capital letters). Thus all
characters typed are in lower case (small letters) when not pressed.
The Alternate key can be used in combination with numeric keys to generate characters not
shown on the keyboard, that is, extended characters. For example, holding the Alt key down
and pressing 228 produces the summation ( ) sign; holding the Alt key down and pressing
235 produce sign. To restart or reboot your computer, press Alt, Ctrl and Del keys
simultaneously.
65
21
NumLock Key
The Numlock key activates the numeric keypad. Neither NumLock nor CapLock affects the
function keys.
The Control key is often used in most text mode to perform block operations like mass
deletion, insertion and so on. For example, CTRL + Y deletes a line in most text documents.
It can also be used in combination with other keys to move the cursor to different locations in
a text or document. In some application packages, the Alt, Ctrl and Shift key are used in
combination with the function keys to perform several operations. For example, in Word
Perfect word processing package, to centre a text; press Shift and F6; to print a text, press Shift
and F7.
The Escape key cancels an operation in progress. For example, when one is editing a file or
issuing a command, ESC cancels any changes one might have made or terminates the
command.
The Return key serves as one of the most important keys on most keyboards. It is actually used
to inform the computer the end of an input or command. It performs two functions depending
on the program with which it is used. For example, suppose you are asked to respond to an
operating system command at the prompt or other entries, the operating system will wait until
the return key is pressed before continuing. Pressing the return key also positions the cursor at
the beginning of the next line ( in text mode), which is the equivalent of pressing the carriage
return on a typewriter.
Pressing the Insert key puts ones keyboard in insert mode, pressing it again returns to
overstrike (typeover) mode. In insert mode, the characters one types are inserted at the cursor
position, the character at the cursor position and all characters to the right, shift to make room
for them. In overstrike or typeover mode, newly typed characters overwrite the characters at
the current cursor position. In most application software insert mode is indicated by a symbol
in the status line.
66
22
Delete Key (Del)
The delete key deletes the character at the cursor position when pressed and the remaining text
moves to the left while the cursor remains at the same position.
The Back Space Key deletes the characters to the left of the cursor when pressed and all other
characters to the right of the cursor are shifted one space to the left.
Spacebar
The Spacebar is the longest key found on most keyboards. It erases characters at the cursor
position or gives blank space when pressed.
Tab Key
The Tab Key moves the cursor by five spaces to the right when pressed. The number of
positions moved depend on the software or the Tab Set by the operator. The Tab is normally
pressed to insert paragraphs during typing. In some programs, when this key is pressed in
combination with shift key, the same number of positions is moved backwards.
When the Print Screen key is pressed in combination with the Shift Key, whatever in is the
screen will be printed on a printer. The same effect can be achieved by pressing the key alone
on some keyboards.
Never spill liquids on your keyboard. Coffee, soda, and other beverage spills can ruin
your keyboard. Liquid spills on the keyboard have even been known to cause electrical
damage to the PC itself. With that in mind, though you may not stop drinking coffee
around your computer, you should at least get a spill-proof mug or keep the coffee on the
67
23
Another enemy of keyboards is static electricity. Static electricity can have the same
damaging effect on your keyboard as does liquid. If your keyboard doesn't respond
properly after a strong static charge, you may just need to turn off the PC and turn it back
on to reset the keyboard. In some cases, however, the static discharge can zap the
keyboard and even parts of the PC. If you shuffle your feet across carpet or your PC is in
a room with dry air, avoid touching the PC or the keyboard until you have touched
something metal to discharge any static. If you don't have a metal desk or bookcase in
your work area, consider buying an anti-static mat and keeping it where you can touch it
Dust, dirt, food crumbs, and hair are other enemies of keyboards. Try to avoid eating
over the keyboard and if your computer is in a dirty, dusty area, keep the keyboard
Some dirt and dust is unavoidable. To keep the keyboard working well, you should
A mouse looks like the electrical clipper in a barbing saloon. It consists of a pointing device
very sensitive to movements. It has a roller ball and two or more buttons which can be pressed
to make selection. By moving the mouse on a flat smooth surface and clicking one or
combination of two buttons on its upper surface, a computer to which it is connected can be
sensitized and commanded to carry out some specific tasks.
A mouse can be used to draw diagrams on computer screen more effectively and efficiently
than the computer keyboard. Generally, the keyboard and the mouse do complement each
other. For example, the mouse can be used to highlight an item in a menu list while the
keyboard Enter Key can be pressed to activate or evoke the command associated with the
highlighted item.
68
24
A mouse is the primary input device for modern computers that feature operating systems
with a graphical user interface, such as Windows 98 or Windows XP. While keyboards
obviously excel at entering text, numbers, and symbols, your mouse is the tool you'll use to
tell your computer what to do with all the data you've entered.
Joysticks are almost exclusively used with game software and help the user more effectively
All modern PC operating systems (Windows 98, Windows XP, and the Macintosh) rely on an
on-screen pointer to select and execute commands. A mouse is simply an input device built to
help the user control this on-screen pointer in as natural and efficient a manner as possible.
The pointer on the screen mimics the movements of your mouse. As you move your mouse, a
ball encased in the bottom of your mouse rolls on the desk and in turn sends signals to the
computer as to which direction to move the pointer on the screen. Move the mouse side to
side, or up and down, and the on-screen pointer moves in a similar manner.
Once you have the mouse positioned to select the command or data you want to act on, you
use the mouse buttons to execute the command. The mouse controls the on-screen pointer and
lets you select program icons, manipulate property sheets, and access data.
25
3.3 Output Device
3.3.1 Printers
A printer is the computer component that lets you create copies of the information stored in
your computer on paper. The printed material is often called hard copy, to differentiate it from
There are three basic types of printers available for use with personal computers:
Laser printers. These combine a magnetic roller with powdered ink called toner to transfer
Inkjet printers. These have small nozzles that actually spray fast-drying ink onto the page to
form characters or images. Inkjet printers spray a fine, quick-drying ink through small nozzles
to produce characters and images on paper. Although the results are not quite as sharp as those
of laser printers, inkjet printers provide very good quality output at a lower cost.Dot-matrix
printers.
These use a print head to strike an inked ribbon against paper, like a typewriter, creating
characters out of a series of dots. Dot-matrix printers are the cheapest printers available. They
create text and images on the page by hammering several small pins against an inked ribbon.
The more pins used, the better the image--9-pin and 24-pin are common options. The 24-pin
printers produce a better quality output, but are somewhat slower than the 9-pin printers.
Print quality for dot-matrix printers is often described in terms of mode: draft mode (low
resolution). The speed depends on the mode, with draft mode being the fastest.
70
26
The type of printer you choose depends on your budget and the type of output you need. For
example, if all you need to print are grocery lists, you may be happy with a dot-matrix printer.
In general, dot-matrix printers are noisier, slower, and produce a poorer-quality image than do
laser or inkjet printers, but they are also less expensive. If you need to print newsletters,
brochures, or illustrated reports, you will probably want a high-quality laser printer. Laser
printers cost more than other printers, but they may be worth the price because they are fast,
3.3.2 Monitors
. The monitor does not do any processing itself. The monitor only displays the information
Monitor Sizes
The two most common monitor sizes are 15-inch and 17-inch. If you have an older, hand-me-
down PC or a very inexpensive starter PC, you may have a smaller 14-inch monitor. 21-inch
The two most common acronyms you will see on current monitors are VGA or SVGA. Both
of these terms generally refer to how many dots (or pixels) in each direction the monitor can
display. VGA is 640x480 (width by height) and SVGA is 800x600. This measurement is called
the monitor's resolution, and more is better! Most new monitors are capable of displaying at
71
27
Almost any VGA or SGVA monitor made in the last few years is capable of displaying any of
these resolutions. However, it's actually the video card that determines what resolution your
monitor displays at any time. The monitor is capable of switching from one resolution to
3.3.3 Scanners
Scanners are peripheral devices used to digitize (convert to electronic format) artwork,
photographs, text, or other items from hard copy. In a sense, a scanner works as a pair of eyes
for your PC. Your eyes see an image and translate the image into electrical impulses that travel
to and are interpreted by your brain. Similarly, a scanner captures images and converts them
A scanner works by dividing an image into microscopic rows and columns and measuring,
like the film in a camera, how much light (or lack thereof) reflects from each individual
intersection of the rows and columns. Each reflection is recorded as a dot, or picture element
(pixel). After the scanner collects information from each dot, it compiles the result into a digital
There are a wide variety of scanners that work in a number of different ways, but the
technology behind them is essentially the same. The following sections discuss the more
Types of scanners
Flatbed Scanners
Flatbed scanners look and behave a lot like a photocopier. You lay the item to be scanned on
a glass plate and the scanning head passes below the glass.
72
28
Flatbed scanners are very versatile: you can scan objects in a variety of sizes and shapes,
including pages from a book, without damaging the original. While flatbed scanners are the
best choice for a wide variety of uses, if you plan to do a lot of text scanning (called OCR for
Optical Character Recognition) work, keep in mind that flatbeds only accommodate one page
at a time. Scanning multi-page documents can be a slow, tedious process, because you have to
Sheetfed Scanners
Sheetfed scanners look and act more like fax machines. The page or item is fed into the
machine, scanned, then spit out on the other end . A sheetfed scanner is a good choice for large
volumes of text, but not for handling delicate original photographs. Scanning directly from a
Hand Scanners
Hand scanners are a low-cost alternative to their larger, more sophisticated counterparts. As
their name implies, hand scanners are manual devices you move over a flat surface, just as you
The hand scanner's advantages are many, but so are its disadvantages. Generally, hand scanners
work best for small, uncomplicated images such as company logos or small black-and-white
photographs. You might want a hand scanner if you do not plan to use it on a regular basis,
because it usually does not require adding internal cards to your CPU, and it's easily
disconnected and stored away. Most hand scanners can only scan a four-inch wide image at
one time and require a steady hand. You're usually provided with software that helps you "sew
up" a series of these 4-inch, side-by-side scans into one image, but this is obviously not as
73
29
3.3.4 Speakers and Sound
The built-in speakers in most PC cases are used just for making system sounds, such as
warning beeps and action indicators. To play more sophisticated sounds on your PC, you need
a set of external speakers. Usually speakers come in pairs, and there is a plug that connects
them to your sound card. Arrange the speakers with one on the left and one on the right of your
Optionally, some speakers come with a subwoofer. This improves the bass (low notes) sound.
If you have a subwoofer with your speakers, it should go on the floor under your desk.
Sound is one of the favorite options on today's PCs. In fact, sound is a standard feature of most
new PCs.
Everyone has their own uses for sound. You may just want to play a few music CDs with your
CD-ROM drive while you are working, or you may use multimedia applications for
presentations or educational programs. You may just like the sound of your jet engines roaring
To produce sound on your PC, you need a sound card and speakers. The sound card is an
expansion card that plugs into one of the slots on your motherboard. This card processes all of
the instructions that have to do with sound, and then sends the sounds to the speakers to be
Sound Cards
Sound cards plug into an expansion slot in your PC. The card has a set of connectors that are
exposed on the back of the PC; you can plug a microphone and speakers into the
74
30
connectors. Some cards include an optional connector for a line input, which is used to connect
another input source such as the output from a tape player or portable CD player. Other
optional connectors can include a joystick connector and a MIDI connector (for connecting a
MIDI keyboard). The card may include a volume control, which controls the volume of the
4.0 Conclusion
The system unit cannot function without the peripheral devices. The input and the output units
are very important peripheral devices that must be taken care of in setting up a computer
system.
5.0 Summary
(a) the keyboard – ( the different categories of keys o n the keyboard and their
functions).
(a) monitor,
a. Justify the need for the input and the output units in a computer system.
b. Describe the functions of the following keys: the numeric keys, control keys, shift keys
75
31
c. In what situation will you recommend the laserjet printer and the dot matrix printer.
Balogun, V.F., Daramola, O.A., Obe, O.O., Ojokoh, B.A., and Oluwadare S.A., (2006).
Gray S. Popkin and Arthur H. Pike (1981). (1981). Introduction to Data Processing with
BASIC, 2nd edition, Houghton Mifflin Company, Boston.
32
STUDY UNIT 3: AUXILLARY EQUIPMENT
Table of content
Air conditioner
Voltage stabilizer
1.0 Introduction
The auxiliary equipment as their name suggests are not computers but are necessary in a
computing activities. In this module, we shall address in some details the importance of
equipment such as air conditioner, voltage stabilizer, uninterruptible power system and line
2.0 Objectives.
ii. Discuss the importance of the auxiliary equipment to the smooth running of a
computing centre.
temperature of the environment in which a computer is kept falls outside the specific range,
77
33
The free air is basically, dust laden. Dust is metallic in nature and, as such, capable of
circuits, the dust can bridge two circuits. The bridging of two electronic circuits may cause a
serous damage to the computer. Thus, air conditioners are needed in a computer environment
to:
b. Prevent dust.
A computer when switched on, takes off at a cold state, warms up and gradually gets to a hot
state. At a hot state, a computer is always roaming in an attempt to find something to do. In a
situation where the public electricity such as that of PHCN in Nigeria is cut suddenly, the
computer would suddenly be brought to a halt. The sudden power cut may cause the computer
to loose the memory of some basic house keeping operations when power eventually returns
and the computer is switched on. The sudden power cut may also cause irreparable damages
to the file the computer was processing at the time the power was suddenly cut.
We note that computers are built to operate within a specific range of voltages. In the United
State of America, computers are built to operate on 110V. A voltage transformer is a device
meant to step up or step down a voltage as the case may be. In Nigeria, for example, a 110V
computer requires a voltage transformer to step down the 240V to 110V. Similarly, in USA, a
2409V current is connected directly to a 110V computer, the computer power unit will blow
up almost immediately.
78
34
Today, the technology has improved tremendously such that if a 240V current is connected
directly to a 110V computer, only a fuse, rather than the power unit will blow up. It is worth
mentioning, too, that there is an advanced technology today which permits a computer to
operate effectively and efficiently with the power line voltage ranging between 110V and
240V. The technology supports an inbuilt switch which can be operated at two terminals
namely: the 110V terminus and 240V terminus. In recent times, the technology has been
improved upon such that computers are manufactured in such a way that they can sense the
voltage that is adequate. Thus, if one connects a 110V computer to a 240V current, the 110V
computer has an in-built line transformer which automatically steps down the 240V current to
110V.
(a) Converting the public electricity raw line into fine line, that is, conditioning the
(b) Storing electrical energy when the public electricity line is life
(c) Releasing the stored electrical energy to the computer when the public electricity
line is dead.
4.0 Conclusion
The computer is an expensive resource and as such requires adequate protection from electrical
damage. Similarly, the UPS is an expensive resource; hence there is the need for it to be
protected from electrical damage, too. Therefore, in practice, it is desirable that the UPS be
by the multiple levels of protection from electrical damage. This arrangement is desirable in a
79
35
5.0 Summary
ii. Voltage stabilizers help to protect computing equipment from damage due to power
surge.
iii. UPS protects the computing equipment and the software from power outage during
computing session. The UPS with the help of its internal battery stores electrical
energy while power is on and releases power stored to the computer whenever
power is off. This enables the user to end the working session and shut down
normally.
iv. A voltage transformer is a device meant to step up or step down a voltage as the
With the aid of annotated diagram, describe the arrangement of the following auxiliary
equipment: UPS, line voltage transformer and voltage stabilizer in relation to PHCN power
7.0 References
Balogun, V.F., Daramola, O.A., Obe, O.O., Ojokoh, B.A., and Oluwadare S.A., (2006).
Akure.
36
Study Unit 3: COMPUTER SOFTWARE (1)
Table of content
System software
-Operating System
Language translators
Assemblers
Interpreters
Compilers
Utility software
1.0 Introduction
The computer hardware are driven by the software. The usefulness of the computer depends
on the programs that are written to manipulate it. Computer software come in different forms:
the operating system, utility software, language translators and application software. This unit
81
37
2.0 Objectives
The physical components of the computer are called the hardware while all the other resources
or parts of the computer that are not hardware, are referred to as the Software. Software are
the set of programs that makes the computer system active. In essence, the software are the
Then, what is a program? A Program is a series of coded instructions showing the logical steps
The computer software could be divided into two major groups namely System Software
This is refers to the suits of programs that facilitates the optimal use of the hardware systems
and/or provide a suitable environment for the writing, editing, debugging, testing and running
of User Programs. Usually, every computer system comes with collection of these suits of
82
38
3.1.1.2 Operating System
An operating system is a program that acts as an interface between a user of a computer and
The operating system is the first component of the systems programs that interests us here.
Systems programs are programs written for direct execution on computer hardware in order to
make the power of the computer fully and efficiently accessible to applications programmers
and other computer users. Systems programming is different from application programming
because the requires an intimate knowledge of the computer hardware as well as the end users’
needs. Moreover, systems programs are often large and more complex than application
programs, although that is not always the case. Since systems programs provide the foundation
upon which application programs are built, it is most important that systems programs are
In a computer system the hardware provides the basic computing resources. The applications
programs define the way in which these resources are used to solve the computing problems
of the users. The operating system controls and coordinates the use of the hardware among the
various systems programs and application programs for the various users.
The basic resources of a computer system are provided by its hardware, software and data. The
operating system provides the means for the proper use of these resources in the operation of
the computer system. It simply provides an environment within which other programs can do
useful work.
83
39
We can view an operating system as a resource allocator. A computer system has many
resources ( hardware and software) that may be required to solve a problem: CPU time,
The operating system acts as the manager of these resources and allocates them to specific
programs and users as necessary for their tasks. Since there may be many, possibly conflicting,
requests for resources, the operating system must decide which requests are allocated resources
to operate the computer system fairly and efficiently. An operating system is a control
program. This program controls the execution of user programs to prevent errors and improper
Operating systems exist because they are a reasonable way to solve the problem of creating a
usable computing system. The fundamental goal of a computer system is to execute user
The primary goal of an operating system is a convenience for the user. Operating systems exit
because they are supposed to make it easier to compute with an operating system than without
an operating system. This is particularly clear when you look at operating system for small
personal computers.
A secondary goal is the efficient operation of an computer system. This goal is particularly
important for large, shared multi-user systems. Operating systems can solve this goal. It is
known that sometimes these two goals, convenience and efficiency, are contradictory.
While there is no universally agreed upon definition of the concept of an operating system, we
84
40
A computer’s operating system ( OS ) is a group of programs designed to serve two basic
purposes:
1. To control the allocation and use of the computing system’s resources among
that simplifies and makes feasible the creation, coding, debugging, and
Specifically, we can imagine that an effective operating system should accomplish all of the
following:
o Facilitate creation and modification of program and data files through an editor
program,
machine language,
o Assure that when there are several active processes in the computer, each will
get fair and noninterfering access to the central processing unit for execution,
o Provide for long term storage of user information in the form of files, and
85
41
Though systems programs such as editor and translators and the various utility programs (such
as sort and file transfer program) are not usually considered part of the operating system, the
Modern computer operating systems may be classified into three groups, which are
distinguished by the nature of interaction that takes place between the computer user and his
or her program during its processing. The three groups are called batch, time-shared and real
In a batch processing operating system environment users submit jobs to a central place where
these jobs are collected into a batch, and subsequently placed on an input queue at the computer
where they will be run. In this case, the user has no interaction with the job during its
processing, and the computer’s response time is the turnaround time-the time from submission
of the job until execution is complete, and the results are ready for return to the person who
Another mode for delivering computing services is provided by time sharing operating
systems. In this environment a computer provides computing services to several or many users
concurrently on-line. Here, the various users are sharing the central processor, the memory,
and other resources of the computer system in a manner facilitated, controlled, and monitored
by the operating system. The user, in this environment, has nearly full
86
42
interaction with the program during its execution, and the computer’s response time may be
The third class of operating systems, real time operating systems, are designed to service those
applications where response time is of the essence in order to prevent error, misrepresentation
or even disaster. Examples of real time operating systems are those which handle airlines
reservations, machine tool control, and monitoring of a nuclear power station. The systems, in
this case, are designed to be interrupted by external signal that require the immediate attention
In fact, many computer operating systems are hybrids, providing for more than one of these
batch system running in conjunction with one of the other two on the same computer.
A multiprogramming operating system is a system that allows more than one active user
Thus, it is evident that a time-sharing system is a multiprogramming system, but note that a
operating system could, and indeed usually does, have more than one active user
43
program simultaneously in main storage. Another important, and all too similar, term is
‘multiprocessing’.
A multiprocessing system is a computer hardware configuration that includes more than one
independent processing unit. The term multiprocessing is generally used to refer to large
operating system of each of the interconnected computers must contain, in addition to its own
stand-alone functionality, provisions for handing communication and transfer of program and
A distributed computing system consists of a number of computers that are connected and
managed so that they automatically share the job processing load among the constituent
computers, or separate the job load as appropriate particularly configured processors. Such a
system requires an operating system which, in addition to the typical stand-alone functionality,
provides coordination of the operations and information flow among the component
computers.
The networked and distributed computing environments and their respective operating systems
are designed with more complex functional capabilities. In a network operating system the
users are aware of the existence of multiple computers, and can log in to remote machines and
copy files from one machine to another. Each machine runs its own local operating system and
88
44
Distributed operating system
A distributed operating system, in contrast, is one that appears to its users as a traditional
distributed system, users should not be aware of where their programs are being run or where
their files are located; that should all be handled automatically and efficiently by the operating
system.
Network operating systems are not fundamentally different from single processor operating
systems. They obviously need a network interface controller and some low-level software to
drive it, as well as programs to achieve remote login and remote files access, but these
True distributed operating systems require more than just adding a little code to a uniprocessor
operating system, because distributed and centralized systems differ in critical ways.
Distributed systems, for example, often allow program to run on several processors at the same
time, thus requiring more complex processor scheduling algorithms in order to optimize the
An operating system provides the environment within which programs are executed. To
construct such an environment, the system is partitioned into small modules with a well-
defined interface. The design of a new operating system is a major task. It is very important
that the goals of the system be will defined before the design begins. The type of system desired
is the foundation for choices between various algorithms and strategies that will be necessary.
89
45
A system as large and complex as an operating system can only be created by partitioning it
into smaller pieces. Each of these pieces should be a well defined portion of the system with
carefully defined inputs, outputs, and function. Obviously, not all systems have the same
structure. However, many modern operating systems share the system components outlined
below.
Process Management
A process is the unit of work in a system. Such a system consists of a collection of processes,
some of which are operating system processes, those that execute system code, and the rest
being user processes, those that execute user code. All of those processes can potentially
execute concurrently.
The operating system is responsible for the following activities in connection with processes
managed.
Memory Management
Memory is central to the operation of a modern computer system. Memory is a large array of
words or bytes, each with its own address. Interaction is achieved through a sequence of reads
or writes of specific memory address. The CPU fetches from and stores in memory.
In order for a program to be executed it must be mapped to absolute addresses and loaded in
46
from memory by generating these absolute is declared available, and the next program may be
The operating system is responsible for the following activities in connection with memory
management.
o Keep track of which parts of memory are currently being used and by whom.
o Decide which processes are to be loaded into memory when memory space
becomes available.
The main purpose of a computer system is to execute programs. These programs, together with
the data they access, must be in main memory during execution. Since the main memory is too
small to permanently accommodate all data and program, the computer system must provide
secondary storage to backup main memory. Most modem computer systems use disks as the
primary on-line storage of information, of both programs and data. Most programs, like
compilers, assemblers, sort routines, editors, formatters, and so on, are stored on the disk until
loaded into memory, and then use the disk as both the source and destination of their
computer system.
The operating system is responsible for the following activities in connection with disk
management
o Storage allocation
91
47
o Disk scheduling.
I/O System
One of the purposes of an operating system is to hide the peculiarities of specific hardware
devices from the user. For example, in Unix, the peculiarities of I/O devices are hidden from
the bulk of the operating system itself by the I/O system. The I/O system consists of:
File Management
File management is one of the most visible services of an operating system. Computers can
store information in several different physical forms; magnetic tape, disk, and drum are the
most common forms. Each of these devices has it own characteristics and physical
organization.
For convenient use of the computer system, the operating system provides a uniform logical
view of information storage. The operating system abstracts from the physical properties of its
storage devices to define a logical storage unit, the file. Files are mapped, by the operating
A file is a collection of related information defined by its creator. Commonly, files represent
programs (both source and object forms) and data. Data files may be numeric, alphabetic or
92
48
formatted. In general a files is a sequence of bits, bytes, lines or records whose meaning is
The operating system is responsible for the following activities in connection with file
management:
Protection System
The various processes in an operating system must be protected from each other’s activities.
For that purpose, various mechanisms which can be used to ensure that the files, memory
segment, cpu and other resources can be operated on only by those processes that have gained
For example, memory addressing hardware ensure that a process can only execute within its
own address space. The timer ensure that no process can gain control of the CPU without
relinquishing it. Finally, no process is allowed to do it’s own I/O, to protect the integrity of the
Protection refers to a mechanism for controlling the access of programs, processes, or users to
the resources defined by a computer controls to be imposed, together with some means of
enforcement.
93
49
Protection can improve reliability by detecting latent errors at the interfaces between
component subsystems. Early detection of interface errors can often prevent contamination of
Networking
A distributed system is a collection of processors that do not share memory or a clock. Instead,
each processor has its own local memory, and the processors communicate with each other
through various communication lines, such as high speed buses or telephone lines. Distributed
systems vary in size and function. They may involve microprocessors, workstations,
The processors in the system are connected through a communication network, which can be
configured in the number of different ways. The network may be fully or partially connected.
The communication network design must consider routing and connection strategies, and the
A distributed system provides the user with access to the various resources the system
maintains. Access to a shared resource allows computation speed-up, data availability, and
reliability.
One of the most important component of an operating system is its command interpreter. The
command interpreter is the primary interface between the user and the rest of the system.
94
50
Many commands are given to the operating system by control statements. When a new job is
started in a batch system or when a user logs-in to a time-shared system, a program which
reads and interprets control statements is automatically executed. This program is variously
called (1) the control card interpreter, (2) the command line interpreter, (3) the shell (in Unix),
and so on. Its function is quite simple: get the next command statement, and execute it.
The command statement themselves deal with process management, I/O handling, secondary
storage management, main memory management, file system access, protection, and
networking.
Fig. 1: Relationship between operating system and other components of the computer
system.
4.0 Conclusion
Operating system occupies a central place in computer operations. It manages the hardware,
other software, the computer peripherals and the user. Operating systems have also evolved in
95
51
types of operating systems. This and other issues relating to operating system are discussed in
this unit.
5.0 Summary
system.
Balogun, V.F., Daramola, O.A., Obe, O.O., Ojokoh, B.A., and Oluwadare S.A., (2006).
Silberschatz, A., Galvin, P., and Gagyne, G. (2000). Applied Operating System
Concepts, First Edition. John Wiley and Sons Inc., New York, USA.
Harvey Katzan, Jr. (1986). Operating System: A Pragmatic Approach, 2nd Edition. CBS
Publishers and Distributors, New Delhi, India.
96
52
STUDY UNIT 4: COMPUTER SOFTWARE (2)
Table of Content
Language translator
Utility programs
Application programs
1.0 Introduction
In unit 7, we discussed in full details, the operating system as the executive manager of the
computer, its peripheral devices and the users. In this unit, we shall look at other types of
software such as the utility programs and the application programs.
2.0 Objectives
The objectives of this unit are to:
i. Conclude our discussion of system software with language translators.
ii. Discuss different categories of utility programs and application programs in greater
detail.
97
53
program or object code. Each machine has its own assembly language, meaning that
the assembly language of one machine cannot run on another machine.
2. Interpreter: An Interpreter is a program that accepts program fin a source
language, reads, translates and executes it, line by lone into machine language.
3. Compilers: A Compiler is a computer program that accepts a source program in
one high-level language, reads and translates the entire user’s
program into an equivalent program in machine language, called the object program
or object code.
The stages in compilation include:
· Lexical analysis
· Syntax analysis
· Semantic analysis
· Code generation
For each high-level language, there are different compilers. We can therefore talk of COBOL
Compilers, FORTRAN Compilers, BASIC Compilers, etc. A Compiler also detects syntax
errors, errors that arise from the use of the language. Compilers are portable i.e. a COBOL
Compiler on one machine can run on a different machine with minimum changes.
(i) File Conversion: This covers data transfer from any medium to another, making an
exact copy or simultaneously editing and validating. For example, copying from a
hard disk to a diskette.
(ii) File Copy: It makes an exact copy of a file from one medium to another or from an
area of a medium to another area of the same medium.
98
54
(iii) Housekeeping Operations: These include programs to clear areas of storage, writing
file labels and updating common data.
They are not involved in solving the problem at hand. They are operations that must be
performed before and after actual processing.
Under the Generalized software, we have as examples: Word Processing Programs e.g. Word
Perfect, Word Star, Microsoft word. Also, Desktop Publishing e.g. Ventura, PageMaker,
CorelDraw likewise the Spreadsheet program e.g. LOTUS 1,2,3, Excel, Super-Q while under
the User-defined, we could have some User-defined packages for a particular company or
organization, for accounting, payroll or some other specialized purposes.
(i) Word Processor: A Word Processor is used to create, edit, save and print
reports. It affords the opportunity to make amendments before printing is
done. During editing character, word sentence or a number of lines can be
removed or inserted as the case may be. Another facility possible is spell
checking. A document can be printed as many times as possible. Word
processors are mainly used to produce: Letters, Mailing lists, Label,
Greeting Cards, Business Cards, Reports, Manual, Newsletter. Examples
are: WordPerfect, WordStar, Display Writer, Professional Writer, LOTUS
Manuscript, Ms-Word, LOCO Script, MM Advantage II etc.
99
55
printing is done. Other features of spread sheets is the ability to use formulas
to calculate, use sum and average function, ability to perform automatic
recalculation and has the capacity to display reports in graphical modes.
Spreadsheet is used for Budget, Tables, Cost analysis, Financial reports. Tax
and Statistical analysis. Examples are: LOTUS 123, Supercalc, MS
Multiplan, MS-excel, VP Planner etc.
(iii) Integrated Packages: They are programs or packages that perform a variety
of different processing operations using data that is compatible with
whatever operation is being carried out. They perform a number of
operations like Word Processing, Data-base Management and Spread
sheeting. Examples are: Office writer, Logistic Symphony, Framework,
Enable, Ability, Smart ware II, Microsoft Work V2.
(iv) Graphic Packages: These are packages that enable you to bring out images,
diagrams and pictures. Examples are PM, PM Plus, Graphic Writer,
Photoshop.
(vi) Statistical Packages: These are packages that can be used to solve statistical
problems, e.g. Stat graphical, SPSS (Statistical Packages for Social
Scientists).
(vii) Desktop Publishing: These are packages that can be used to produce books
and documents in standard form. Examples are PageMaker, Ventura,
Publishers, Paints Brush, Xerox Form Base, News Master II, Dbase
Publisher.
(viii) Game Packages: These are packages that contain a lot of games for children
and adults. Examples are Chess, Scrabble, Monopoly, Tune
100
56
Trivia, Star Trek 2, California Game, Soccer Game, War Game, Spy Catcher
Dracula in London.
(ix) Communication Packages: Examples are Carbon Plus, Data talk V3.3,
Cross talk, SAGE Chit Chat, Data Soft.
There are so many packages around, virtually for every field of study but these are just to
mention a few of them. Advantages of these packages include quick and cheaper
implementation, time saving, minimum time for its design, they have been tested and proven
to be correct, they are usually accompanied by full documentation and are also very portable.
User Programs
This is a suit of programs written by programmers for computer users. They are required for
the operation of their individual business or tasks. Example is a payroll package developed for
salary operation of a particular company.
4.0 Conclusion
Apart from the operating systems, we need program translators for us to be able to
program and use the computer effectively. Since computers do not understand natural
languages, there is the need to have language translators such as assemblers, interpreters
and compilers. Utility programs such file conversion and scandisk on the other hand,
enable us to maintain and enhance the operations of the computer. Application and user
programs such as the word processors, spreadsheet and the like help us to perform
specific tasks on the computer. These are discussed in full details in this unit.
5.0 Summary
57
ii. Utility programs such as file conversion, file copy programs and house
packages.
You have just been appointed as a consultant to a firm that is about to procure
packages that would be necessary for the smooth operations of the firm. Justify the
Balogun, V.F., Daramola, O.A., Obe, O.O., Ojokoh, B.A., and Oluwadare S.A.,
Tunji and Dokun (1993). Data Processing, Principles and Concepts. Informatics
Books, Lagos.
58