Full Ict Notes
Full Ict Notes
Table of Contents
1.0 INTRODUCTION TO COMPUTERS.......................................................................................3
1.1 Definition of terms.................................................................................................................3
1.2 Physical Parts of a Computer.................................................................................................4
1.3 Classification of Computers...................................................................................................5
1.4 Development of Computers....................................................................................................2
First Generation (1940-1956) Vacuum Tubes...............................................................................2
Second Generation (1956-1963) Transistors.................................................................................2
Third Generation (1964-1971) Integrated Circuits......................................................................2
Fourth Generation (1971-Present) Microprocessors....................................................................2
Fifth Generation (Present and Beyond) Artificial Intelligence....................................................3
1. 5 Areas Where Computers Are Used........................................................................................3
1.6 The Computer Laboratory......................................................................................................5
1.7 Practical Hands on Skills........................................................................................................6
2.0 COMPUTER SYSTEMS..........................................................................................................12
2.1 Components of Computer System........................................................................................12
2.2 Input devices........................................................................................................................12
2.3 The Central Processing Unit (CPU).....................................................................................23
What is virtual memory?................................................................................................................29
Virtual memory and error messages...........................................................................................29
2.4 Output Devices.....................................................................................................................32
Hardcopy Output Devices..........................................................................................................34
Plotters.......................................................................................................................................37
2.5 Secondary (Auxiliary) Storage and Media...........................................................................38
Classification of Secondary Storage Devices.............................................................................38
Magnetic Disks..........................................................................................................................38
Tape Drives..................................................................................................................................2
Removable Magneto-Optical Storage..........................................................................................4
Hard Drives..................................................................................................................................5
Care for magnetic and magneto-optical media.............................................................................5
Optical Disc Drives......................................................................................................................6
Laser disks...................................................................................................................................6
Optical tape..................................................................................................................................7
Advantages and disadvantages..................................................................................................2
Advantages.............................................................................................................................2
Disadvantages.........................................................................................................................3
2.6 Power supply and peripheral device Interface........................................................................4
2.7 Basic Computer Setup and Cabling........................................................................................8
Page 1 of 288
Computer Software......................................................................................................................9
3.0 OPERATING SYSTEM...........................................................................................................14
3.1 Definition:............................................................................................................................14
3.2 Devices under the control of an operating system..................................................................2
3.3 Functions of Operating System..............................................................................................2
3.4 Types of Operating Systems...................................................................................................4
3.5 Factors to consider when choosing an operating system........................................................5
3.6 How an Operating System Organises Information using........................................................5
3.7 Getting started with Microsoft Windows................................................................................7
3.8 Managing Files and Folders...................................................................................................8
3.9 Disk Management..................................................................................................................5
3. 9 Installing Windows Operating System..................................................................................7
Answers to Review Questions..........................................................................................................9
1.0 INTRODUCTION TO COMPUTERS...................................................................................9
2.0 COMPUTER SYSTEM.......................................................................................................10
3.0 OPERATING SYSTEM.......................................................................................................13
Page 2 of 288
1.0 INTRODUCTION TO COMPUTERS
Specific objectives
By the end of the topic you should be able to:-
a). Define a computer
b). State the different parts that make up a computer
c). Explain how computers have developed
d). Classify the various types of computers
e). Identify areas where computers are stored used
f). State the safety precautions and practices in a computer laboratory
g). Demonstrate basic hands-on skills on the use of a computer
The three key terms that define a computer are:- input, process and output.
Programs
Set of instructions written in computer language that directs the computer what task to perform and
how to perform it.
Data
Raw facts that do not have much meaning to the user. Includes alphabets, numbers and symbols.
Data processing
The varied activities performed to convert data into useful information.
Information
Processed data that is meaningful to the user and which can form a basis for decision making.
Page 3 of 288
Memory capability – A computer has the ability to store and access large volumes of data.
Processing capability – A computer has the ability to execute millions of instructions per
second.
Disadvantages of a computer
- Computer are relatively expensive
- Computer technology changes too often
- Computer can break down
- Computer does not have its own intelligence
Page 4 of 288
Some peripheral devices are:-
Keyboard
Is a device that enables the user to enter data and instructions in the computer by pressing its keys.
The mouse
Is a hand held device that enables the user to issue instructions to the computer and move items on
the screen by controlling a special mouse pointer displayed on the screen.
The monitor
Is a TV like device that displays output. it is a called a monitor because it enables the user to
monitor or see what is going on in the computer.
c). Minicomputers
Also referred small scale mainframes. Slightly smaller, low memory, cheaper, and low processing
power than mainframe. Supports fewer peripheral devices and not as powerful and fast as the
mainframe. It was developed as a cheaper alternative to the mainframes for smaller organizations.
They are used in research institutions, scientific laboratories, manufacturing industries,
engineering plants, etc.
d). Microcomputers
Page 5 of 288
Also called personal computers (PCs). Is the smallest, cheapest, slowest and least powerful type of
computers compared to supercomputer, mainframes and minicomputer. They are called
Microcomputers because their processor is very tiny (size of a thumbnail). They are mainly used in
training and learning institutions, small business enterprises, communication centres, etc. Today
powerful microcomputers have grown tremendously closing the gap that formerly existed and
reserved for minicomputers and mainframes.
Types of microcomputers
Non-portable: Desktop computer which is not portable and designed to be placed on top of an
office desk.
Portable
Laptop: Are small enough to rest on persons lap when using. Weigh about 1 to 3 kg each.
Advantages of laptops
o They are portable
o Are convenient to travel with
o Their screen show sharper and clear images which prevent eye strain.
o Laptops have power batteries which serve as inbuilt UPS
Note books: are even smaller and lighter than laptops. Small enough to fit in the pocket of a coat.
Cheaper than laptops and just as useful. When very small are called sub-notebooks.
Palmtops: A small computer that literally fits in your palm. Compared to full-size computers,
palmtops are severely limited, but they are practical for certain functions such as phone books and
calendars. Palmtops that use a pen rather than a keyboard for input are often called hand-held
computers or PDAs.
Because of their small size, most palmtop computers do not include disk drives. However, many
contain PCMCIA slots in which you can insert disk drives, modems, memory, and other devices.
Palmtops are also called PDAs, hand-held computers and pocket computers
Examples are: Personal Digital Assistants (PDAs), personal organizers or pen computers.
2) Purpose (Use)
All computers falls into two broad groups according to the tasks they perform namely special and
general purpose.
(a) Special purpose computers
They are designed to serve/ perform only one specialized task. These computers cannot perform
other task except the one they were meant to do. The set of instructions which drive a special
purpose computer are limited in number at the time of manufacturer. Examples are: robots used in
manufacturing industry, mobile phones for communication, electronic calculators for calculations,
watches, oven etc. they can perform the task very fast and very efficiently since they are dedicated
to a single task. Are relatively cheap.
Page 6 of 288
3) Functionality
In this class computers are classified according to the type of data they can process.
o Analog computers
Process data that is analog in nature which is continuous. They solve mathematical operations and
logical comparison by measuring the amount of change in physical magnitude e.g. speed,
temperature, etc. are dedicated to a single task. Are used in manufacturing process control like
monitoring and regulating furnace temperatures, speed, pressures, weather, etc, stations to record
and process physical quantities e.g. wind, cloud speed, temperature, etc. in addition to PCs, most
modern home appliances such as digitals TVs, microwaves, wall clocks are digital in nature.
Continuous data is represented using a continuous waveform.
+
o Digital computers
They process digital data only which is discrete in nature and their operations are based on two
states namely “on” and “off” or “1” and “0”.
o Hybrid computers
`They are computers build with the characteristics of both analog and digital, thus process both
analog and digital data.
Page 7 of 288
c) A pointing device that controls a 15. Why is a mobile phone regarded to
pointer on the screen. be a computer?.
d) A device used in typing. a. It is electronic, has a screen, keypad,
12. Why the screen is also called a memory and is programmable.
monitor. b. It looks like a palmtop.
a. It displays the monitor lizard. c. It is portable.
b. It helps the user to track what is d. It produces tones.
going on in the computer. 16. What is meant by analog data.
c. It monitors system performance. a. Data that never stops.
d. It is a television. b. Discrete data .
13. Pick the old one out in the list below c. Large data.
a) Calculator d. Continuous data.
b) Mobile phone 17. Which of the following are analog
c) Robot devices?
d) laptop a. A monitor with knobs that are rotated
to increase brightness.
13. Pick the old one out in the list below. b. A monitor with buttons that one
a. Mainframe. presses to increase brightness.
b. Microcomputer. c. A radio with a knob that slides in a
c. Minicomputer. slot to increase volume.
d. Digital computer. d. A thermometer.
14. Which of the following would be most 18. Which of the following is called a
suitable for travelers?. microprocessor?
a. Supercomputer . a. The CPU of a mainframe.
b. Mainframe computer. b. The CPU of a computer.
c. Palmtop computer. c. The CPU of a micro computer.
d. Minicomputer. d. The CPU of a supercomputer.
The history of computer development is often referred to in reference to the different generations
of computing devices. Each generation of computer is characterized by a major technological
development that fundamentally changed the way computers operate, resulting in increasingly
smaller, cheaper, more powerful and more efficient and reliable devices. Read about each
generation and the developments that led to the current devices that we use today.
Page 8 of 288
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were
often enormous, taking up entire rooms. They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions.
First generation computers relied on machine language, the lowest-level programming language
understood by computers, to perform operations, and they could only solve one problem at a time.
Input was based on punched cards and paper tape, and output was displayed on printouts.
The UNIVAC and ENIAC computers are examples of first-generation computing devices. The
UNIVAC was the first commercial computer delivered to a business client, the U.S. Census
Bureau in 1951.
Transistors replaced vacuum tubes and ushered in the second generation of computers. The
transistor was invented in 1947 but did not see widespread use in computers until the late 1950s.
The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster,
cheaper, more energy-efficient and more reliable than their first-generation predecessors. Though
the transistor still generated a great deal of heat that subjected the computer to damage, it was a
vast improvement over the vacuum tube. Second-generation computers still relied on punched
cards for input and printouts for output.
The first computers of this generation were developed for the atomic energy industry.
The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers through
keyboards and monitors and interfaced with an operating system, which allowed the device to run
many different applications at one time with a central program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were smaller and
cheaper than their predecessors.
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits
were built onto a single silicon chip. What in the first generation filled an entire room could now
fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of
the computer—from the central processing unit and memory to input/output controls—on a single
chip.
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the
Macintosh. Microprocessors also moved out of the realm of desktop computers and into many
areas of life as more and more everyday products began to use microprocessors.
Page 9 of 288
As these small computers became more powerful, they could be linked together to form networks,
which eventually led to the development of the Internet. Fourth generation computers also saw the
development of GUIs, the mouse and handheld devices.
Fifth generation computing devices, based on artificial intelligence, are still in development,
though there are some applications, such as voice recognition, that are being used today. The use
of parallel processing and superconductors is helping to make artificial intelligence a reality.
Quantum computation and molecular and nanotechnology will radically change the face of
computers in years to come. The goal of fifth-generation computing is to develop devices that
respond to natural language input and are capable of learning and self-organization.
NB: Internet refers to global interconnection of computer networks for the purpose of
communication and resource sharing.
Computer Network is collection of computers linked together using transmission media for the
purpose of communication and resource sharing.
Intranet – is a private network.
An integrated circuit (IC) is a small electronic device made out of a semiconductor material.
The first integrated circuit was developed in the 1950s by Jack Kilby of Texas Instruments
and Robert Noyce of Fairchild Semiconductor.
Banks
- Manage financial transactions through the use of special cash dispensing machines called
ATMs used for cash deposit and withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping and processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer games
Page 10 of 288
- For storing personal information / documents
- For calculating and keeping home budgets
Industries
- To monitor and control industrial processes through the use of robots
- For management control i.e. to keep track of orders, bills and transactions
- For advertisement purposes, which enable an industry to attract more customers
- CAD {Computer Aided Design} allows accurate, quick and easy designs of products on
computer screen.
Transport industry
- Airports; to control the movement of aircrafts, their take off and landing using radar equipment
- For making reservations (Booking purposes)
- Storing flight information
- Automobile traffic control i.e. monitoring vehicle traffic in busy towns
- In Railway corporations to coordinate the movement of goods and wagons
- In shipping control for efficient management of fleets, cargo handling and communication
Offices
- For receiving and sending of information through e-mails, fax, etc
- Production of documents
- Keeping records
Hospitals
- For keeping patient records
- Keeping records of purchases and stock of medicine
- Analysis data obtained from X-rays
- Maintaining the booking system of scarce resources such as operation theaters.
- Control of life support machines in intensive care unit
- Used by physicians to get proper diagnosis of the affected part of body through cross sectional
view
Education
- Access internet through email to link different schools and to exchange knowledge
- Communication through email to link different schools and exchange knowledge
- For teaching and learning purposes e.g. computer practical
- Administration –storing information about students, processing grades and teachers salaries.
Library services
- Enables library personnel to easily access and keep updated records of books and other library
materials i.e. to keep electronic catalogues and track book circulation.
- Library users can also use computers to search for titles instead of using the manual card
catalogue
Entertainment industry – to generate and edit computer graphics in movies and games.
Military to design weapons and control flight.
Research institutions to process and analyze data.
Impaired persons
- converts speech to text for the deaf
- converts spoken language to sign language for the deaf.
- Converts text to speech for the blind using speech synthesizers.
Review questions 1.2
Page 11 of 288
1) Match the following generations of computers with the technology used to develop them.
1. First Generation A .Very Large Integrated Circuit
2. Second Generation B. Thermionic Valves
3. Third Generation C. Transistors
4. Fourth Generation D. Integrated Circuits
Page 12 of 288
- When in doubt ask. Students should always remember the principle of: “It is not stupid to ask
a sincere question”, to ensure that no damage is caused due to lack of proper knowledge. If
you are not sure of how to handle or operate any piece of equipment in the laboratory please
ask for assistance.
Burglar proofing
Computer equipment is expensive and it is therefore important to protect the investment against
theft by implementing the following controls:
i). Fit strong metallic grills and locks on doors, windows
ii). Do not welcome strangers to computer room
iii). Install intrusion detection alarm system at strategic access points to alert security personnel
incase of break in.
Cables and power sockets should be well insulated to avoid short circuits that can cause
damage to computer components.
Page 13 of 288
Function of UPS
- It regulates power from unstable power source to the required clean stable voltage
- It temporarily provides power to the computer incase of a sudden power failure.
- It beeps to alert the user when the main Power goes off.
In summary stable power supply must be applied and adhered to by installing surge protectors,
power extension cables, for each computer and a power backup generator.
Types of UPS
Standby Ups – which is a power conditioner with the ability to generate its own power when there
is a power failure
- The room should be well laid out with enough space for movement.
- Providing antiglare screens (light filters and adjustable screens to avoid eye strain and fatigue
caused by over bright CRT monitors.
Cables insulation
All power cables must be properly insulated and laid away from busy pathways in the computer
laboratory. They can be laid along the wall in trunks or use special computer tables designed to
hide all the cables by running under.
Page 14 of 288
Standard furniture
The table on which a computer is placed must be strong and wide enough to hold the weight and
accommodate all peripheral devices. The user’s seat must be comfortable and have a straight back
rest that allows someone to sit upright to avoid muscle pains and back aches. The sit must be high
enough relative to the table to enable comfortable use of hands on the keyboard as shown in the
diagram below:
The eye must be at the same level as the top of the screen (monitor) when user is seated upright as
show in the figure below:
Providing antiglare screens like Light filters and adjustable screens to avoid eye strain and
fatigue caused by over bright CTR monitors. Alternatively you use LCD monitors.
Ventilation
There must be good air circulation to avoid suffocation or dizziness caused by lack of oxygen and
to allow computers to cool hence avoid damage to electronic parts. A computer laboratory should
be fitted with a HVAC (Heating, Ventilation, and Air Conditioning) system. This system controls
the temperature, air flow and humidity within a room, ensuring that the computer equipment does
not get over-heated, and the occupants of the laboratory are comfortable.
Overcrowding in the computer laboratory should be avoided others users will suffocate.
Lighting: Computer room should be well lit to avoid eyestrain that leads to headaches, stress
and fatigue. The monitor should be positioned such that glare or bright reflections on the
display are minimized. Radiation filter screens may be fitted as shown below:.
Computer layout
- Should be such that an instructor (tutor) can teach from the front. There should be enough
room between rows so that a person can easily move about the room. This can be attained by
using the two popular patterns for laying desks in a computer laboratory namely classroom
pattern and conference pattern. Figures below shows these layouts.
Page 15 of 288
Whiteboard
White board
Page 16 of 288
b) It supplies power to the computer during blackouts and brownouts
c) It provides stable power supply (clean power)
d) It can be used as the main power source for computers
8) Which of the following reasons are likely to cause eye strain in the computer room.
a) Poor lighting
b) Bright monitor
c) Poor ventilation
d) Ant radiation screen
9) All the following are proper sitting postures while using the computer except one. Which on is
it?
a) Straight back position
b) Feet firmly on the floor
c) High enough allowing eyes to be level with top of monitor
d) Bending the back backwards on a relaxed chair
10) What can be done to deter illegal access to a computer room by unauthorized persons?
a) Burglar proof the room by reinforcing doors and weak access points
b) Welcome strangers to the room
c) Leave the room open when nobody is using it.
d) Switch off the security alarm when leaving the room.
Types of booting
i) Cold booting {bootup}
Process of switching on a computer that has been off completely by pressing the power button.
Page 17 of 288
Shutting down a computer
Turning a PC on and off several times a day is harmful. If the correct procedure is not followed
then loss of data, damage of programs and computer components may occur. It is therefore
advisable to shutdown the computer only after the sessions for the day.
NB: Pressing the Power key on the keyboard shuts down the computer.
5. Switch off your printer / or any other output devices.
Keyboarding ands mouse skills
Keyboard layout
Page 18 of 288
Activity: Identify keys on the keyboard that could be used for entering
- Alphabetic characters
- Numbers and arithmetic operators
Keys on the keyboard can be categorized into five groups as follows:
1. Alphanumeric (typing) keys
2. Function keys
3. Cursor movement and editing keys
4. Special PC operation keys
5. Numeric keypad keys
2) Function keys
These keys are located on top of the keyboard. They are labeled F1, F2 …. F12. each of these keys
is used for a special function or job. Example pressing F1 invokes the on-line help, Pressing F7
starts Spelling and Grammar Checker
Editing keys
Editing keys are used to erase (delete) or insert characters in a document.
Page 19 of 288
These are:
Insert key
Helps the user to insert or replace a character at the cursor position i.e. switch between I nsert and
Typeover (Overwrite) mode.
Delete (Del) key
Is used to delete the text or any part therefore from the right of the cursor position
Shift Key
- used for typing alternative characters for keys that represent more than one character e.g. Shift
+ 5 types operator %.
- Changing cases i.e. if the Caps Lock light is not illuminated and you hold down the shift key
and press a letter key, the upper case version of the character will be generated. The opposite
will happen if the Caps Lock light is illuminated.
- If you hold down Shift key as you delete folders/files from hard disk they will bypass recycle
bin folder and get deleted (discarded) completed.
5) Numeric keypad keys
They are located on the rightmost part on the keyboard. They have digits marked on the in rows
from bottom upwards. They have numbers in compact form and helps in rapid entry of numeric
data. Apart from the digits the numeric keypad has some mathematical symbols also marked on its
key e.g /, +,\, -, *.
Note: that the numbers on the numeric keypad can only be used when the Num Lock key is turned
on. The key is situated on the numeric pad.
They can also be used as cursor movement keys and editing keys when Num Lock key is turned
off. Some portable computers lack numeric keypad due to size limitations.
The Num Lock used to switch between numbers, editing and navigation keys on the numeric
keypad.
NB: Caps Lock, Num Lock and Scroll Lock act in ON and OFF states.
Practical Keyboard Skills
The following typing rules should be observed when using keyboard:
I. Sit upright with both feet firmly on the ground maintaining an alert posture
II. Place the material to be typed on your right in a position you can read without strain if possible
using copy holder as shown in diagram below:
III. Rest both hands on the keyboard with fingers resting on the home keys. Home keys are keys on
which fingers rest during typing in readiness to press other keys. Home keys for the hand
are: A, S, D, F with the thumb on the Spacebar. For the right hand are: semicolon (;), L, K,
J with the thumb on spacebar. NB: Some authors state Home keys for right hand starting
with apostrophe i.e. ‘,(;), L, K and Space bar.
IV. Start typing text slowly, making sure you are using all the 10 fingers and you press the key
nearest to the home keys with the closest finger e.g. to press Q, use the small finger on the
left hand while to J, use the index finger on the right hand.
Mouse skills
The mouse got its name from shape and long interface cable which makes it look like the
biological mouse, although this is vanishing because of wireless technology.
The mouse is an input device with sensor buttons and a ball that slides it on a flat surface. When it
is made to slide, it controls a pointer on the screen, which is called a mouse pointer or a cursor.
The movement of a mouse is mirrored by a pointer on the screen. To make a selection the pointer
should be on the item that is to be selected, then manipulate the item by pressing the mouse button.
A typical mouse has a ball at its bottom that rotates when the mouse is moved.
Page 20 of 288
Mouse come in various shapes, colours and sizes even there are cordless mouse this is does not
have a connection cable. A mouse has two buttons at the top and an optional scroll wheel which
can be used to scroll up the screen in an application.
Terminology Meaning
Point Move the mouse until the mouse pointer on the screen points on the item
Click Position tip of the mouse pointer over specified element, then press and
release the left mouse button once. Selects an object/icons, files in a list and
dialog box options.
Double clicking Pressing the left mouse button twice in quick/rapid succession. Expands
icons, starts applications, opens a file and chooses items from a list .
Right clicking Pressing the right hand side mouse button once. It displays a shortcut menu
or context sensitive menu, which apply to the right clicked text / item.
Drag and Drop Press and hold down the mouse button as the mouse is moved. Release once
the destination is reached. Through drag and drop, user drags an item from
one location on the screen to another, move windows, icons and resizes
windows.
Page 21 of 288
The figure below emphasizes on mouse terminologies and actions:
Revision questions
1. Explain why smoke and dust particles are harmful to a computer
2. Explain the emerging trends in a microcomputer technology in relation to size.
3. describe the ideal environment for a computer to work properly
4. Explain the term system unit and name some of the components found in the system unit
5. What is booting? Explain what happens in the computer during the booting process.
6. State on reason why a computer needs to be connected to a stable power source.
7. Give two examples of special purpose computers
8. Why would it not be good to install water based fire extinguishers in the computer room?
9. Explain the following terms: clicking the mouse, right clicking the mouse, double clicking
the mouse
10. What precaution would you take in the computer room in case:
a) The humidity falls below normal for prolonged periods due to weather change.
b) Users complain of backaches after long periods of using the computer.
11. Classify the following keyboard characters
a) A, B, C, …Z
b) 0,1,2,…9
c) F1, F2, …F12
d) Del, Insert
e) Home, End, Page UP, arrow key
Page 22 of 288
f) Ctrl, shift, Alt
Specific objectives
By the end of the topic, the learner should be able to;
a) Describe a computer system
b) Explain the functional organization of the elements of a computer system
c) Describe input devices of a computer system
d) Describe the Central Processing Unit (CPU)
e) Describe the output devices of a computer system
f) Describe the types of secondary storage devices and media
g) Distinguish between power and interface cables
h) Explain basic computer setup and cabling
i) Distinguish between system software and application software
j) Evaluate the criteria for selecting a computer system.
Introduction
Computer systems will include the computer along with any software and peripheral devices that
are necessary to make the computer function. A computer is made up of two main components
Hardware and Software while a computer system has three namely: Hardware, software and
liveware (computer user).A system is a collection of different entities that collectively work
together to achieve a desired goal. Examples of systems are human body, social system, school
system etc.
A computer system is a collection of three components namely hardware, software and liveware
entities that work together to receive, process, manage and present information in a meaningful
format using computers.
Input devices are classified according to how they are used to enter data as follows:
1) Keying devices i.e. keyboard, keypad
Page 23 of 288
2) Pointing devices i.e. mouse, joy stick, light pen, track ball.
3) Scanning and other data capture devices
4) Speech recognition or voice input devices
5) Touch screen, digitizer and digital cameras
Keying devices
Keying or typing is the most common way to input data. A keying device converts typed numbers,
letters and special characters into machine readable form before processing takes place.
Keyboard and keypad
They enter into a computer by typing (pressing its keys). A keypad is a tiny keyboard which is
mostly used on small portable computers, calculators, mobile phones etc.
Common types of keying devices include:
Traditional keyboard : It is a full sized rigid keyboard as discussed in Chapter 1 of the
Handout.
Flexible / Rollup Keyboard: It is a more portable type of keyboard that can be folded and
packed into a bag. Rollup computer keyboards are extremely
good for traveling. Simply roll them up and then unroll them
when you need them again. Typically the material is either
silicone or polyurethane. These devices are meant to be rolled
up, rather than folded, as folding can damage the circuitry.
Page 24 of 288
Many laptop computers have special function keys which turn part of the alphabetical keyboard
into a numerical keypad as there is insufficient space to allow a separate keypad to be built into the
laptop's chassis. Separate external plug-in keypads can be purchased. [1]
Braille keyboard: is an accessibility option for the blind. It consists of keys identified by
raised dots.
Advantages of keyboard
- Its very reliable compared to other methods of text input (voice input)
- Is very cost effective, since every computer comes with a keyboard and there are no additional
costs .
Pointing devices
Enter data or instructions by controlling a pointer or cursor on the screen. Some examples pointing
devices include:- mouse, trackball, joystick, light pen, and stylus.
i). A mouse
Enter data or instructions by controlling a pointer on the screen. Generally there are three types of
mice available in the market today namely mechanical, optical and cordless.
Mechanical mouse
It has a ball underneath, two buttons and an optional scroll wheel located between the left and right
buttons.
An optical mouse uses a light-emitting diode and photodiodes to detect movement relative to the
underlying surface, unlike wheeled mice which use a set of one
rolling ball and two chopper wheels for motion detection. It does
not have any moving parts.
Laser mouse
A laser mouse is a type of computer mousing device that uses a
laser beam rather than a ball to track the movement of the user's
hand. Laser mice are becoming increasingly common because
they are perceived to have better tracking ability
Page 25 of 288
Optical mice make use of one or more light-emitting diodes (LEDs) and an imaging array of
photodiodes to detect movement relative to the underlying surface, rather than internal moving
parts as does a mechanical mouse. A Laser mouse is an optical mouse that uses coherent (Laser)
light.
The difference between a regular optical mouse and a laser mouse is the light used to track
movement. A regular optical mouse uses an LED light in the optical engine, while a laser mouse
uses a laser to track movement. The more dots per inch (dpi) a mouse can track, the more sensitive
and accurate it is. A typical optical mouse tracks between 400dpi and 800dpi, while laser mice
track more than 2,000dpi.
Neither is really better; it all depends on your needs and preferences. Unless you're a gamer or a
graphic artist with a need for precise movement, you'll probably find a 2,000dpi laser mouse too
sensitive. Many gaming mice, however, allow you to switch sensitivity levels so that you have
precision when you need it but can revert to 400dpi or 800dpi for regular mousing.
Besides their tracking speeds, laser mice work on nearly every surface, whereas optical mice may
experience trouble tracking on black or shiny surfaces.
Cordless (wireless) mouse
Cordless or wireless mouse is a battery powered mouse that uses radio or infrared waves instead of
being physically connected to the system unit.
Uses of a mouse
- To select options from menus or from a set of icons by clicking the mouse button.
- To position the cursor when editing text or using design package
- To select an object in a drawing or a piece of text to be copied, moved or deleted.
Advantages of using a mouse
- Is easy and convenient to use
- It is inexpensive
- Most modern software includes an option to use it
- It selects a position on screen much more quickly than a keyboard
Disadvantages
- Cannot be used to input text easily, you need a keyboard to do that.
- It is relatively slow for selecting menu options
- Requires a flat surface to operate
- It is not accurate for drawing purposes
ii). Track ball
A track ball is like a mouse that has been turned upside down. The ball is on top, and the user
moves the ball without moving the mouse. The track ball does not require a flat surface to operate.
Question: State one advantage of using a track ball over a mouse. Answer: It does not require flat
surface or extra space to operate.
Page 26 of 288
ii). Joystick
Is a hand held device used for playing computer games and video games. It allows the fast
interaction needed in games. The user controls game actions by varying the pressure, speed and
direction of the joystick. Just like mouse, it has a button
which is used for selecting an item, issue commands or
trigger actions.
Page 27 of 288
Scanning devices (Document readers)
Scanning means capturing data from an object and converting it into digital format. Scanning
devices are devices that capture data into the computer directly and are classified according to the
technology they use to capture data namely optical and magnetic scanners.
A). Optical scanners
Capture data using optical or light technology. A light beam passes over an object and the image is
analysed by a specialized software.
Advantages
- Has low error rate
- Conspicuous errors are easily corrected
- Economical where the volume of data is large
- Data captured at source, hence no data entry errors
ii. Optical Bar Reader (OBR)
These scanners are used to capture data coded as lines of varying
thickness known as bar codes or universal product code (UPC).
Scan and translate a bar code into machine understandable mode.
Bar codes are lines of different thickness and are common on
consumer products and contain item information such as country
Page 28 of 288
of manufacture, manufacturer and the product code. Bar codes do not have the price details
because prices vary from one place to another.
The two types of bar code scanners are the hand-held wand and desktop bar code reader.
Uses
- On labels and on shelves for stock taking
- Printed on shop goods e.g. supermarkets
- In libraries
iii. Optical Character Reader (OCR) or Image scanners
Is the most advanced type of scanner that works like the
human eye. It is used to read typewritten, computer printed,
or handwritten characters and transforms the images into a
softcopy that can be manipulated using a word processor.
Today OCR comes as integrated feature of more advanced
scanners called flat-bed scanners. Flat- bed scanners are
used to capture pictures and real objects.
Advantages
i). Data is captured at source hence errors are limited
ii). Its an easier method to use
iii). Document design is less complicated
iv). Characters can be read by people
Disadvantages of OCR
- Some optical scanners are expensive
- Handling precaution necessary e.g. document should not be folded or creased for accurate
reading.
Uses
- Sale order forms
- Stock taking sheets
B). Magnetic Scanners
These scanners use the principle of magnetism to sense the document characters that have been
written using magnetized ink or coded onto magnetic strip. They can also be said to use magnetic
technology to capture data.
Examples of magnetic scanners are:-
i). Magnetic-Ink Character Reader (MICR)
The MICR is also known as magnetic reader. MICR
recognizes characters formed from magnetic ink. The
document characters are typed or printed in ink containing
Iron II Oxide that gives them magnetic property. MICR is
used in banks to read cheques, credit cards etc.
Advantages of MICR
- Its fast, accurate and automatic
- The codes are both machine and human readable.
- Reduces forgery i.e. its difficult to forge
Disadvantages
- MICR system is limited to only 14 characters
- MICR system is based on magnetism and can easily be damaged.
ii). Magnetic stripe recognition (magnetic card reader)
A magnetic card reader is used to read data coded on a magnetic strip on a plastic card such as the
one used on an automated teller machine (ATM) and credit card reader.
A magnetic stripe is a thin magnetic tape, often at the back of a plastic card e.g. ATM card. The
stripe contains coded information of the holder.
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of
tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe,
sometimes called swipe card or magstripe, is read by physical contact and swiping past a
magnetic reading head.
Page 29 of 288
Applications
- On credit cards
- On bank cards e.g. ATM
- As tags on clothes
- As a phone card
- Production control where punched cards holds data in a factory like employee’s details
- Access control for security reasons in many offices to control access to buildings or rooms
- Car parks where badges are used to raise car barriers, allowing entry or exit from a car park.
Advantages
- Simple to produce
- Not easily damaged
- Stores fairly large number of characters
- Disadvantage
- Data can be changed or erased by magnetic fields
4) Speech Recognition devices
Data is entered directly into a computer using voice input devices such as microphones. A
microphone is attached to a sound card which has an analog-digital converter. Speech recognition
software allows the user to issue commands using
natural language. The device recognize a limited
standard of spoken words via a microphone linked to a
computer system. A user must train the system to
recognize his/her voice by repeating each word in the
vocabulary several times. An emerging trend in voice
input is the inclusion of voice tag in cell phones that
allows the user to simply store and dial contacts.
Page 30 of 288
- Limited vocabularies
- Background noise can disrupt the data entered
Other input technologies
a). Touch screen
A touch screen is an electronic visual display that can detect the presence and location of a touch
within the display area. The term generally refers to touching the display of the device with a
finger or hand in order write or select an item. The screen consists of infrared light crisscrossing
behind it. When the user touches a location on the screen, the finger interrupts the infrared light
and the command touched is executed.
Touch screens can also sense other passive objects, such as a stylus. Touchscreens are common in
devices such as all-in-one computers, tablet computers, and smartphones.
The touchscreen has two main attributes. First, it enables one to interact directly with what is
displayed, rather than indirectly with a pointer controlled by a mouse or touchpad. Secondly, it lets
one do so without requiring any intermediate device that would need to be held in the hand. Such
displays can be attached to computers, or to networks as terminals. They also play a prominent
role in the design of digital appliances such as the personal digital assistant (PDA), satellite
navigation devices, mobile phones, and video games.
Digital cameras can do things film cameras cannot: displaying images on a screen immediately
after they are recorded, storing thousands of images on a single small memory device, and deleting
images to free storage space. The majority, including most compact cameras, can record moving
video with sound as well as still photographs. Some can crop and stitch pictures and perform other
elementary image editing. Some have a GPS receiver built in, and can produce Geotagged
photographs.
Capture the same way as other cameras do but stores image in digital form. Pictures are stored on a
memory card instead of a film. The digital image taken can be streamed directly into a computer,
Page 31 of 288
uploaded to internet using a webcam or directly printed using a special photo printer. Are used to
take electronic pictures of an object. They are of two types:
1. still digital camera one that can take still images i.e. photographs and another
2. a video digital camera that takes motion pictures.
c). Digitizers
A graphics tablet (or digitizer, digitizing tablet, graphics pad, drawing tablet) is a computer
input device that allows one to hand-draw images and graphics, similar to the way one draws
images with a pencil and paper. These tablets may also be used to capture data or handwritten
signatures. It can also be used to trace an image from a piece of paper which is taped or otherwise
secured to the surface. Capturing data in this way, either by tracing or entering the corners of linear
poly-lines or shapes is called digitizing.
Pen-like input devices which are larger than a stylus, and offer increased functionality such as
programmable buttons, pressure sensitivity and electronic erasers, are often known as digital pens.
[1]
]The image generally does not appear on the tablet itself but, rather, is displayed on the computer
monitor. Some tablets, however, come as a functioning secondary computer screen [1] that you can
interact with images[2] directly by using the stylus
Page 32 of 288
A digitizer also known as graphic tablet, is made up of a flat surface and allows the user to draw an
image using a stylus. The image drawn does not
appear on the tablet but on the computer screen.
The stylus moves on the tablet and the drawing
is directly reflected on the screen. Digitizers are
used for tracing highly detailed engineering and
architectural drawings and designs.
Page 33 of 288
9. Describe two situations in which speech recognition devices may be useful as a method of data
entry.
10.Optical scanning of the Universal Product Code is now widely used as input method. Give an
example of a place where it is used and explain how it is used.
In microcomputers, the CPU is housed inside the system unit where its mounted on a circuit board
called the motherboard or the system board.
Control unit
CU controls / coordinates all processing activities in the CPU using a system clock, which sends
electrical signals. The CU interprets instruction fetched from the Main Memory and sends control
signals to the ALU instructing it on how to execute instructions, issue control instructions to the
operating system, determines the operation to be performed by the instruction, where the results
are to be stored, and where the next instruction is located. The CU fetches data from the main
memory and puts it in the proper order for the processor. It also sends the processed results back to
the main memory. The CU also locates any data needed by the instruction and sees that the
instruction is followed.
Page 34 of 288
Arithmetic and Logic Unit (ALU)
ALU performs arithmetic and logical operations (the basic data transformation in a
microprocessor). Arithmetic operations include addition, multiplication and division. Logical
operations includes comparing two quantities or more numbers to determine which is greater or
equal to or less than the other. It also involves testing for existence of a condition encountered
during the processing of an application. The ALU carries out all the logical and arithmetic
processing on data as directed by Control Unit. It decodes the instructions and then processes the
data. Data to be executed by ALU is temporarily held registers inside the processor.
Main memory
It is also called primary memory storage. It provides storage location for data and instructions
accessed by the control unit. The primary memory or the main memory is part of the main
computer system. The processor or the CPU directly stores and retrieves information from it. This
memory is accessed by CPU, in random fashion. That means any location of this memory can be
accessed by the CPU to either read information from it, or to store information in it.
o The primary memory itself is implemented by two types of memory technologies. The first is
called Random Access Memory (RAM) and the other is read only memory (ROM). A more
appropriate name for RAM is RWM (Read Write Memory), the CPU can write and read
information from any primary memory location implemented using RAM. The other part of
primary memory is implemented using ROM which stands for Read Only Memory.
The primary memory is used for temporarily holding data and instructions required immediately
by the CPU and contents are lost once the power is switched off. Secondary storage is used for
permanently storing information by the CPU and is not lost when power is switched off.
Primary memory
Is of two types Read Only Memory (ROM) and Random Access Memory (RAM).
Page 35 of 288
closely tied to specific hardware, and unlikely to need frequent updates). ROMs are used in
computers for permanent storage of instructions such as
- Power On Self Test (POST)
- The Basic Input Output System (BIOS)
- The bootstrap loader (the automatic program that finds and loads the operating system
program from disk) so that the computer has something to do when power is first applied.
NB: Ordinary users can’t change ROM.
Types of ROM
Characteristics of ROM
- Can only be read and cannot be written to unless it’s a special ROM e.g EAROM
- Its non-volatile
- High bit density
- Stores permanent or semi permanent instructions from manufacture although some can be
programmed according to users specification.
- Are intended for large production volumes
Disadvantages of ROM
- Are not cost effective because of large production volumes
- A ROM cannot be changed, once manufactured.
- Delay in production of the ROM.
Page 36 of 288
Random Access Memory (RAM)
RAM is mostly referred to as working storage. RAM holds the programs being run and the data
being used by the CPU at the current time. Its contents can be read directly regardless of the
sequence in which it was stored. RAM can be written to and retrieved from. RAM is the memory
used in large quantities in Main Memory and every computer must specify its size. Ram holds the
programs being run and the data being used by the CPU at the current time.
Characteristics of RAM
- Data can be read and written in it.
- It’s temporary (volatile) storage , its contents are lost/ disappears when the computer is
switched off.
- It’s contents is user defined.
Types of RAM
There are two types of RAM namely Static RAM (SRAM) and Dynamic RAM (DRAM)
i). Static RAM (SRAM)
SRAM is a fast type of memory found inside a microprocessor.
Characteristics
- Stores a bit of information within a flip-flop
- It’s a very fast memory and holds its contents as long as there is power.
- Its content does not require refreshment
- Its expensive
- Its very fast compared to DRAM
- Its mostly used to make special types of memories known as Cache memory
- Used for smaller memories
- Has low packing density
Disadvantages of RAM
- It is expensive Computer Memory
- It loses its mind when you turn the power off
- It is very difficult to archive information or pass it along to someone else, if everything is
kept in RAM.
Primary Memory Secondary Memory
Summary of Computer memory
RAM ROM
MROM
SRAM PROM
DRAM Page 37 of 288
EPROM
EEPROM
EAROM
Special purpose memories
Are memories embedded in a microprocessor in order to enhance its processing speed and are
found inside the CPU or in the input and output devices. These memories increase the overall
performance of data and instructions moving in and out of the CPU. They increase the hit ratio
(the availability of data and information when required) and reducing the wait time when the CPU
searches for data and instructions from memory. Slower memories like DRAM make the CPU to
wait longer when it needs data stored in them.
{a buffer is a region of memory used to temporarily hold data while it is being moved from one
place to another. Typically, the data is stored in a buffer as it is retrieved from an input device
(such as a Mouse) or just before it is sent to an output device (such as Speakers). However, a
buffer may be used when moving data between processes within a computer. This is comparable to
buffers in telecommunication. Buffers can be implemented in either hardware or software, but the
vast majority of buffers are implemented in software. Buffers are typically used when there is a
difference between the rate at which data is received and the rate at which it can be processed, or
in the case that these rates are variable, for example in a printer spooler or in online video
streaming.}
ii) Registers
Are high speed temporary memory locations within the CPU that holds data and instructions just
before and after processing in the ALU. They hold one piece of data a time and are located inside
the CPU. Registers are temporary memory units that store words. The registers are located in the
processor, instead of in RAM, so data can be accessed and stored faster.
Types of registers
Program counter (PC)
Holds the memory address of the instruction to be fetched next.
Page 38 of 288
Instruction register (IR)
Temporarily holds an instruction just before it is interpreted into a form that CPU can understand
it.
An accumulator (AC)
Temporarily holds the results of the last processing step of the ALU e.g 3 + 4 = 7 is held in the
accumulator.
An address register (AR)
Temporarily holds the address of the next piece of data to be fetched for processing.
Storage register (SR)
Temporarily holds a piece of data that is on its way to and from the CPU and
main memory.
In addition to cache memory, one can think of RAM itself as a cache of memory for hard disk
storage since all of RAM's contents come from the hard disk initially when you turn your
computer on and load the operating system (you are loading it into RAM) and later as you start
new applications and access new data. RAM can also contain a special area called a disk cache that
contains the data most recently read in from the hard disk.
Cache memory (pronounced as cash) is a very high speed type of SRAM whose purpose is to
allow the processor to access data and instructions faster i.e. speeds up processing (fetch cycle).
There are three types of cache memory namely:
Level one cache memory (called L1 Cache, for Level 1 Cache) is directly integrated into
the processor. It is subdivided into two parts:
o the first part is the instruction cache, which contains instructions from the RAM
that have been decoded as they came across the pipelines.
o the second part is the data cache, which contains data from the RAM and data
recently used during processor operations.
Level 1 caches can be accessed very rapidly. Access waiting time approaches that
of internal processor registers.
Page 39 of 288
Level two cache memory (called L2 Cache, for Level 2 Cache) is located in the case
along with the processor (in the chip). The level two cache is an intermediary between the
processor, with its internal cache, and the RAM. It can be accessed more rapidly than the
RAM, but less rapidly than the level one cache.
Level three cache memory (called L3 Cache, for Level 3 Cache) is located on the
motherboard.
All these levels of cache reduce the latency time of various memory types when processing or
transferring information. While the processor works, the level one cache controller can interface
with the level two controller to transfer information without impeding the processor. As well, the
level two cache interfaces with the RAM (level three cache) to allow transfers without impeding
normal processor operation.
If you have limited memory or you have many programs open, your computer may need to use
part of the hard drive to simulate more memory. This simulated more memory is called virtual
memory and allows the computer to continue operating but at much slower speed. Therefore a
virtual memory is simulated memory from hard drive which makes the computer operate at a much
slower speed.
If your computer lacks the random access memory (RAM) needed to run a program or operation,
Windows uses virtual memory to compensate.
Virtual memory combines your computer’s RAM with temporary space on your hard disk. When
RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving
data to and from the paging file frees up RAM to complete its work.
The more RAM your computer has, the faster your programs will generally run. If a lack of RAM
is slowing your computer, you might be tempted to increase virtual memory to compensate.
However, your computer can read data from RAM much more quickly than from a hard disk, so
adding RAM is a better solution.
If you receive error messages that warn of low virtual memory, you need to either add more RAM
or increase the size of your paging file so that you can run the programs on your computer.
Windows usually manages the size automatically, but you can manually change the size of virtual
memory if the default size is not enough for your needs.
Memory capacities
Memory and storage capacity is measured in special units called bytes. A byte is equivalent to a
single character, which can be numbers 0 – 9, letters A – Z or a special symbol e.g. a number 2341
has 4 bytes, while words ‘My school’ has 9 bytes.
Page 40 of 288
Overall organization of the CPU
The ALU, CU and Main Memory use electrical pathways or links called buses. A bus is an
electrical path for signal to flow from one point to another in a circuit. There are three types of
computer buses namely:
control unit fetches data and instructions from the main memory then sends to ALU for execution
in a process called fetch execute cycle. The program counter (PC) holds the address of the
instruction to be fetched next. The fetched instruction is loaded into instruction register (IR). The
control unit interprets the instruction and directs the ALU to perform the necessary execution.
Processors
A processor consists of an inbuilt set of instructions called instruction set.
Types of processors
A microprocessor is a complete CPU where ALU and Control unit has been combined into tiny
single processor. The microprocessor chips use many different internal designs, and the chips vary
in appearance and capability.
Page 41 of 288
Clock speed or Clock Rate: Which is the speed of the internal timer that determines how
many instructions per second the processor can execute. The internal clock regulates the rate at
which instructions are executed and synchronizes all the various computer components. The faster
the clock, the more instructions the CPU can execute.
Instruction set: is an inbuilt set of instructions that the microprocessor can execute.
- Complex Instruction Set Computer (CISC) is the name given to types of processors that use a
large number of complicated instructions microcoded into the processor, to try to do more
work.
- Reduced Instruction Set Computer (RISC) is the name given to processors that use a small
number of simple instructions meant to do less work with each instruction but execute them
faster.
Page 42 of 288
Review questions 2.2
1. What is the meaning of CPU.
2. Describe three functions performed by CPU.
3. What is a microprocessor
4. Explain the functions performed by :
a) the Control Unit
b) the Arithmetic and Logic Unit
c) the Main Memory
5. Define the terms: volatile memory and non-volatile memory
6. Define and explain the difference between RAM and ROM.
7. How many characters (Bytes) of data are held in each of the following memories? 4KB,
640KB, 16MB and 20BG.
8. Name three special purpose memories found either inside or outside the microprocessor, and
explain what each does.
9. In reference to arithmetic and logic unit, explain the meaning of logic operations and give an
example of this processing operation.
10. What is the difference between mainframe computers CPU and that of a microcomputer?
11. Explain the purpose of the system clock.
12. What is the meaning of BIOS, and what role does it play in a computer?
13. List three buses found in the CPU.
Practical activity
With the help of the teacher, find out the following:
1. The type of processor in one of the computers in your computer laboratory.
2. The clock speeds of all the computers in the computer laboratory.
3. What is the size of RAM in MB of the computer you are currently using?
Softcopy
Refers to intangible output displayed on the screen or listened to through devices like speakers.
Softcopy output devices include monitors, speakers, LCD Projectors and light emitting diodes.
Example of softcopy output devices:
Types of monitors
There are three namely Cathode Ray Tube (CRT), Liquid Crystal Display (LCD) and Gas Plasma
Display(GPD). Monitors that display sharp clear images are said to have high resolution.
CTR monitor
Page 43 of 288
The screen is curved slightly outward forming a convex shape. A CRT monitor consists of a long
glass tube with an electron gun on one end and a screen on the other end. The screen is coated with
tiny phosphorus dots that illuminate red, green and blue to make a pixel. The CRTs are too bulky
to carry around, consume a lot of power and are cheap to buy.
Pixel: Picture elements are tiny dots which are used to form the images displayed on the screen. In
colour monitor, a pixel has three primary colours namely red, green and blue.
Colour depth: refers to number of colours which can be displayed by a pixel. It is measured in
bits.
Resolution: is the number of pixels per inch on the screen usually given in dots per inch (dpi) or
bits. The higher the resolution, the more the number of pixels per inch, hence the clearer the
Page 44 of 288
images.
Refresh rate
Since the CRTs cannot hold an image for a long time, image in the video RAM is used to refresh
the one on the screen as long as necessary. If a screen has a low fresh rate, images tend to flicker
hence causing eyestrain.
Display size: is measured in inches as the diagonal length of the screen measured from top to
bottom left.
Video adapter
Disadvantage
Not suitable for noisy situations
Inappropriate for lengthy or permanent information.
Page 45 of 288
B). LCD Projectors (Data Projectors)
An LCD projector is a type of video projector for
displaying video, images or computer data on a screen
or other flat surface. It is a modern equivalent of the
slide projector or overhead projector. Are used to
display output from a computer on plain white paper
screen like a wall or whiteboard. It’s actually a creative
and interesting technology way of presenting computer
output to an audience unlike traditional overhead
projectors.
1. Printers
Produce a hard copy of information on papers. The printing mechanism determines the quality of
hardcopy. They are two types of printers namely impact and non-impact.
Impact printers
Impact printers print using striking mechanism, they strike the paper in order to form an imprint on
it. Impact printers are cheap to run, slow, use inked ribbons, produces multiple copies, uses cheap
technology, are noisy because of impact, produce low quality printout and print for long periods
without breaking down. They produce characters by using special light hammers with characters or
pins held on the printing head. When the hammer strikes on the head, character mark is stamped.
In impact printing, the printing head comes into physical contact with the stationery. An inked
ribbon placed between the stationery and the printing head element creates the imprints when the
printing head strikes.
Page 46 of 288
The character images are incorporated on the surface of a gold ball like Print head, which is either
rotating or pivoted.
iv) Drum printer
It provides one whole line print at a time. The characters are incorporated on circular bands that
move round the surface of the drum.
v) Chain printer
It’s an impact line printer that incorporates engraved characters printing slugs on a moving chain
or belt. The chain moves the character printing slugs at high constant speed past printing positions.
Non-impact printers
Are fast, use thermal and electrostatic principles, produces single copies, are costly due to
technology involved and quiet because of non-impact. They print using ink, toner catridge ,
thermal or laser mechanisms. In non-impact the printing head does not come into physical contact
with the stationery but by other means like thermal or electrostatic.
ii).
Inkjet printer
Use the concept of spraying ink onto the paper, from tiny holes on the ink cartridge onto the paper.
A color inkjet printer may have two cartridges, one for
black and a tricolor that contains cyan, magenta and
yellow (CMY) compartments. The cartridge has nozzles
that do the actual spraying of ink on the paper
Advantages
- Are cheaper and produce better quality printouts
- Inkjets printers use smaller mechanical parts than
laser printers
- Provide inexpensive way to print full-colour
document.
Weaknesses
- Are slow
- Expensive to run because they require special type of ink
- An inkjet printout is easily gets smudged when water drops on it.
iv). Photo printers are special purpose printers designed to print photographs.
Page 47 of 288
v). Laser printer
Prints by passing laser beam back and forth over a rotating drum, just the same technology as
photocopy machine. As the beam hits the drum, it ionizes some regions which attract ink toner
particles. They are cheaper to run, faster, produce high quality printouts but are expensive to buy
than inkjets.
Impact Non-impact
- Slow - Fast
- Cheaper - Costly
- Use striking mechanism - Use thermal or electrostatic
principles
- Noisy - Quiet
- Multiple copy production - Multiple copy production almost
possible impossible
- Use inked ribbon - Use ink cartridge or toner cartridge,
resin or wax.
Factors to consider when selecting a printer
- Initial cost and subsequent costs of maintenance
- Volume of printing expected
- Color printing colored laser printers are very expensive, so depending with the volume of
print one can decide to buy Laser or Inkjet.
- Nature of reports to be generated
- Range of capability for selected printers e.g. multiple copier, print styles etc.
- Interface with the computer system
- Speed: the speed of a printer is measured in Pages per minute
Page 48 of 288
- Quality of prints (print quality).
Plotters
These are output devices that are mostly used in engineering and architecture field for production
of graphical outputs e.g. diagrams, photographs, maps, architectural designs and such outputs. The
most common commercially available graph plotters are the Flatbed Plotter and Drum Plotter.
What is a drive ?
A computer device for reading data from or writing data into a storage media e.g. a tape, or disk.
Types / examples of computer drives
- Hard disk drive (HDD) - Floppy disk drive (FDD)
- CD-ROM drive - DVD – ROM drive
- USB Port - Zip drive
- USB Port
Device driver
A device driver is a program that controls a particular type of device that is attached to your
computer. There are device drivers for printers, displays, CD-ROM readers, diskette drives, and so
on. When you buy an operating system, many device drivers are built into the product. However, if
Page 49 of 288
you later buy a new type of device that the operating system didn't anticipate, you'll have to install
the new device driver. A device driver essentially converts the more general input/output
instructions of the operating system to messages that the device type can understand.
Examples of computer auxiliary storage devices
Magnetic tapes, floppy disks, cassette tapes, Hard disks, zip disks, jaz , Flash disks, video compact
disks (VCD), digital video disks (DVD’s), Punched cards, optical disks e.g CDs, LS-120 Super
Disks, optical card, optical tape.
It is important to have a backing storage for long – term storage of data and programs and also
when there is limited storage capacity in the main memory. Backing store is a non-volatile
(permanent) memory outside the CPU such as floppy disks, CDs and USB flash Disks.
REMOVABLE STORAGE
Magnetic Disks
Magnetic storage media use magnetic technology to store data.
Tape Drives
Tape drives are another type of magnetic computer storage device. Instead of platters, the tape
drives use magnetic tape to record data. Tape drives are not commonly used in consumer
computers, but the low cost and reliability of tape drives allows them to be used by companies
making long-term backups. One major difference between tape drives and hard disk drives is that a
hard disk drive can read data from any part of its platters. A tape drive must read through the data
from start to finish, as the read/write heads cannot move to a specific part of the tape. Once the
tape drive reaches the data point, read speeds are faster than the average hard disk drive.
Advantages
- Store large amount of data
- Light and easy to carry
- Effective when to store sequential files for batch applications
- High capacity and backup storage at relatively low cost
Disadvantages
- Slow due to sequential reading of data
- Wastage of recording surface because of Inter-block gaps left for stopping purposes.
- Easily distorted by environmental factors such as dust, moisture, humidity etc.
Page 50 of 288
ii). Floppy disks
Developed by IBM, floppy disks in 3.5-inch (89 mm), 5.25-inch (133 mm) and 8-inch (200 mm)
forms were a ubiquitous form of data storage and exchange from the mid-1970s to the 2000s. [1]
While floppy disk drives still have some limited uses, especially with legacy industrial computer
equipment, they have been superseded by data storage methods with much greater capacity, such
as USB flash drives, portable external hard disk drives, optical discs, memory cards, and computer
networks.
Are made of a
thin plastic disc
with a
magnetisable iron
oxide coating and
enclosed in a
plastic case.
Inscription of
data is done on
the magnetic
coating around the plastic. The floppy disk is inserted inside a floppy drive which has a read /write
that runs over the magnetized spots.
There are two types of disks:
3 ½ inch has storage capacity of 1.44MB and 5 ¼ inch which has a storage capacity of
1.2MB.
3 ½ inch floppy store more data and are better protected as opposed to 5 ¼ inch floppy.
A block
Tracks
The surface is divided into tiny invisible concentric circles called tracks that store data. The tracks
are further divided into units called sectors. The area within the same track bound by the two
Page 51 of 288
edges of a sector forms a block which forms the unit for the read/write operations. Data can be
written to and read from the disk.
Note:
To write data means to move it or copy it from the main memory to backing storage.
To read data means to move it or copy it from the backing store to the main memory.
Disks are direct access storage media.
iii). High capacity floppy disk: simply known as HiFD disk stores upto 200MB of data. HiFD
drive can also read the 1.44MB floppy disk.
Page 52 of 288
iv). Laser Servo 120 SuperDisks
Laser Servo 120 SuperDisks simply known as LS-120 Super disk. It resembles 3 ½ floppy disk
but uses optical technology instead magnetic technology to read data. It has a greater storage
capacity of 120MB and greater speed of data retrieval.
Fixed storage
Refers to storage devices that are housed inside the system unit. E.g. Hard disk.
NB: Some hard disks especially those in small computers such as laptops are removable.
Hard Drives
Hard disk drives are magnetic, non-volatile computer storage devices. A hard disk drive
stores data on two spinning platters inside the drive. The data is read with a read/write
head that uses magnetic technology to write the data. The non-volatile nature of a hard
disk drive means the data does not get erased when the drive loses power, as is the case
with random access memory. Desktop hard drives are 3.5 inches in width and the
equivalent laptop hard drive is 2.5 inches. Common hard drive speeds are 4200 RPM to
7200 RPM. Faster 10,000 RPM drives are available but not as common. Consumer drives
with capacities of one terabyte (1,000 gigabytes) are becoming more common as of 2010.
Page 53 of 288
- Keep them away from excessive heat because heat energy weakness magnetic media’s
ability to store data
- Do not drop magnetic media on the ground.
- Do not bend or fold magnetic media or put heavy weights on the to avoid breaking or
damaging them
- Do not touch the magnetic surfaces
- Do not remove media from drive when it sis still being accessible by the computer because
this may result in data loss.
Optical disc drives are storage devices that use lasers to read or write discs. Optical disc
drives include CD, DVD, and Blu-ray. When a disc is inserted into an optical drive, the
drive's laser is focused on the disc by the lens on the drive. The laser reads the pits burned
into the disc and sends that data to the computer. Optical drives that can also write data
have a laser that adjusts the calibration of the beam to switch between reading and writing
functions.
Laser disks
Data is recorded using a very concentrated light (laser beam). They store very large volumes of
data. Data stored in them is more stable and permanent than the magnetic media. Examples are:
Compact disks (CD), Digital Versatile Disk (DVD), Optical Card and Optical tape.
Forms of CDs:
a). Compact Disk – Read Only Memory (CD-ROM)
When data is recorded on them one cannot change or add anything on them. Mostly used to store
music recordings.
b). Compact Disk – Recordable (CD-R)
They are initially blank but with a CD- Writer (Drive), the user can record data, programs or
information on it. Once data has been written on it, one can only read but not change it i.e. it
becomes read only. Are coated with special dye which changes color to represent data when
burned using a laser beam.
Both CD-ROMs and CD-Rs are referred to as WORM (Write Once Read Many) because they
allow the use to write (record) data on them once but read them many times.
Page 54 of 288
Digital Versatile Disk / Digital Video Disk (DVD)
Resemble CDs but have higher storage capacity of upto 17GB, approximately 26 CDs of capacity
640MB! Are suitable for recoding motion pictures like videos because of they offer better sound
and quality pictures. There are three common types of DVDs namely read only, recordable and
rewriteable DVDs.
Optical tape
An instrument used for video or computer data storage in which a laser optical head is used to
write digital information onto a tape. Depending on the size of the reel, the tape may be capable of
storing more information than an optical disc but has a much slower access time.
Similar to magnetic tape, but data is stored on it using optical technology.
Advantages of optical storage
- Have massive capacity - Secured i.e. it’s hard to copy
- Stores data permanently - High quality pictures and sound
- Accessing of data is fast - Portable
Disadvantage
- Expensive
- Costly hardware and software for reading
- It can break easily
- Very sensitive to things like dust, water, heat, scratches which easily damage them.
Is a kind of non-volatile storage media that employs integrated circuits rather than mechanical,
magnetic or optical technology. They are regarded as solid state because they do not have moving
Page 55 of 288
parts but everything is electronic as the case of RAM or EEPROM. Examples include flash disks,
Flash pen drives and memory cards.
Memory cards
A memory card or flash card is an electronic flash memory data storage device used for storing
digital information. They are commonly used in many electronic devices, including digital
cameras, mobile phones, laptop computers, MP3 players, and video game consoles. They are
small, re-recordable, and able to retain data without power.Memory Stick is a removable flash
memory card format
A memory stick
Flash disk
It is small in size but with massive storage capacity of as much as 32GB. Its more portable and
convenient to carry around than other secondary storage medias.
Page 56 of 288
- Are very small hence more portable
Advantages
- Data stored on flash drives is impervious to scratches and dust, and flash drives are
mechanically very robust making them suitable for transporting data from place to place and
keeping it readily at hand. Most personal computers support USB as of 2010.
- Flash drives also store data densely compared to many removable media. In mid-2009, 256
GB drives became available, with the ability to hold many times more data than a DVD or
even a Blu-ray disc.
- Compared to hard drives, flash drives use little power, have no fragile moving parts, and for
most capacities are small and light.
- Flash drives implement the USB mass storage device class so that most modern operating
systems can read and write to them without installing device drivers. The flash drives
present a simple block-structured logical unit to the host operating system, hiding the
individual complex implementation details of the various underlying flash memory devices.
The operating system can use any file system or block addressing scheme. Some computers
can boot up from flash drives.
- Specially manufactured flash drives are available that have a tough rubber or metal casing
designed to be waterproof and virtually "unbreakable". These flash drives retain their
memory after being submerged in water, and even through a machine wash. Leaving such a
flash drive out to dry completely before allowing current to run through it has been known
to result in a working drive with no future problems. Channel Five's Gadget Show cooked
one of these flash drives with propane, froze it with dry ice, submerged it in various acidic
liquids, ran over it with a jeep and fired it against a wall with a mortar. A company
specializing in recovering lost data from computer drives managed to recover all the data on
the drive.[38] All data on the other removable storage devices tested, using optical or
magnetic technologies, were destroyed.
Disadvantages
Page 57 of 288
capacity is increasing with time, but is less than larger hard drives. This balance is changing,
but the rate of change is slowing.
Computer Port
Is a special kind of connector (socket) on the system unit usually at the back which a cable from an
external peripheral device e.g. mouse, keyboard etc is plugged to facilitate transfer of information.
Power cable
They supply power to the device. Power cables connect the computers power supply unit to mains
outlet.
Power supply unit is a special unit inside the system unit that
supplies power to the motherboard and other internal devices.
Computers are connected to AC power while internal components
require DC power. The work of a power supply unit and adapter is to
convert AC to DC.
Interface cables: Transmit data signals. Connect the device on one end, and to the motherboard
via ports on the other end.
Page 58 of 288
Parallel interface
The serial port is also called COM1 or COM2 and sometimes COM3 and COM4. Can also be
referred as RS-232 port. Serial interfaces have 9-pins.
Serial cables transmit data 1-bit at a time. Are generally
slower than parallel cables. Allow for two way
communication ( i.e. communication to and from the
computer and the device connected to it), whereas parallel
cables offer one-way communication. Serial interface is
widely used for many interconnections like connecting of
computers to external modems and some mice. Serial ports
are more reliable than parallel ports for long distances.
VGA port
Page 59 of 288
This is where monitor is connected to LCD projectors. It is shaped like a letter D with 15 holes and
colour coded in blue.
They transmit only 1-bit of information at a time at a very high speed than parallel cables.
Provides quality data transmission over long distance. It has become the standard connectivity for
most of the peripheral devices from printers to mobile phones. It can be used to connect as many
as 127 peripheral devices to a computer. To use USB port, the devices should be specifically made
to work with the USB. There are two types of USBs namely low speed USB 1.1 and a relatively
faster high speed USB 2.0
Firewire ports
Firewire or IEEE 1394 has the same features as the USB but transmits data faster than USB. It is
mostly used for streaming video from a digital video camera.
- They transmit data in parallel but are faster than parallel cables. Its ports allows connection
upto 7 peripheral devices. Small Computer System Interface (SCSI, is a set of standards
for physically connecting and transferring data between
Page 60 of 288
computers and peripheral devices. The SCSI standards define commands, protocols, and
electrical and optical interfaces. SCSI is most commonly used for hard disks and tape drives,
but it can connect a wide range of other devices, including scanners and CD drives. The SCSI
standard defines command sets for specific peripheral device types; the presence of "unknown"
as one of these types means that in theory it can be used as an interface to almost any device,
but the standard is highly pragmatic and addressed toward commercial requirements.
Infrared is a wireless interface that uses infrared to connect to infrared-enabled devices. Used for
wireless communication between the CPU and a device which is infrared –
capable e.g. cordless mouse as shown in the diagram below. Infrared, also
to as infrared data association (IrDA), uses the infrared waves to transmit
data. Infrared-enabled devices must be at a line of sight of infrared rays in
order to transmit data.
Bluetooth is a wireless interface that uses short range radio broadcast to
connect any Bluetooth-enabled device. It just broadcasts a radio signal
within the surrounding. Any Bluetooth device when turned on will be
detected.
Centronic ports
This is a parallel port that uses metal clips mounted into cells in place of pins.
Page 61 of 288
Are jack plugs used to connect speakers, microphone and other portable audio equipment.
Modem port
Used for plugging an external modem into the computer.
Each of the components will have a cable attached with a connector at the end that will plug into
the appropriate port on the back of the computer. The mouse, keyboard and optionally the monitor
are powered by the power unit within the system box. The monitor may have its own power
source, in which case it will plug directly into the mains power supply. Check the power ratings at
the back of the computer before connecting to power supply. In Kenya it should be 250 volts. The
system unit may connect to UPS.
(i) Gently and carefully connect the interface cable of each devices to the correct port and to
the device if it is not fixed permanently.
(ii) Connect the computer to the power source and switch it on.
(iii) Observe boot up information on the screen to see whether Power On-Self – Test (POST)
displays any error message.
(iv) A successful boot means that the computer was properly set.
Page 62 of 288
Though computers are connected to AC power outlet, internal components require DC power.
Desktop PCs use Power Supply Unit while portable computers use adapters to convert AC to DC
The basic microcomputer system consists of the motherboard, the power supply unit, hard
disk drive, floppy disk drive, I/O interface card, optional CD-ROM drive, disk controller card,
video card, and optional sound and network interface cards. These components are housed in the
system unit (case).
While external devices are connected to the motherboard through ports, internal devices are
connected through slots and sockets.
SATA and EIDE are more efficient and supports hot – swapping,. Hot-swapping means that a
drive can be removed or inserted while the computer is still on. EIDE controller supports up to two
drives on a single ribbon cable attaining a master/slave configuration because the controller directs
activities of both drives.
There is no master/slave configuration for a floppy drive, you can attach two floppy drives in the
same ribbon cable. One floppy drive will be automatically assigned A while the other drive will
be B.
Computer Software
Computer software refers to a set of instructions that direct a computer on what to do. The
computer software can be classified into three ways according to purpose, acquisition and End–
user – License (EUL).
Page 63 of 288
1) System software
Manages the operation of the computer itself, and makes sure that the computer works efficiently.
It enables the user to communicate with the computer and its hardware e.g. mouse.
ii). Firmware: also referred to as stored logic, It’s a combination of both hardware and software
etched on a single silicon chip which accepts and interprets external commands from the user.
iii). Utility software: also called service programs, is software that provides support to the
application software. It performs commonly used services that make certain aspects of computing
to go on more smoothly. Can also be defined as special programs used to enhance performance of
the system.
iv). Networking software: It’s used to establish communication between two or more computers by
linking them using a communication channel e.g cables to create network. Also it enables
computers and other peripheral devices connected on a network to communicate and share
resources. Examples: Novel Netware and Linux
Page 64 of 288
Summary of computer software
COMPUTER SOFTWARE
Application Software
System Software
Word processor
Operating system Spreadsheets
Firmware Database
Utility software Desktop Publishing Computer
Networking software aided design
Graphics software
Disadvantages
May not meet special needs
They are not as efficient as user made programs
When changes occur extra costs is usually needed from user
Not all packages are compatible with all computer system
They may have some features not needed by user which may take extra storage
c). General purpose software – are not written to solve any particular problem, and can be used
in different ways depending on the problem to be solved
Page 65 of 288
Freeware are software products that are freely made available to the user. Some may be malicious
software.
Hardware considerations
i). Processor type and speed
The price of a computer is dictated by the type of microprocessor installed and its clock speed. A
good computer must have high processor speed of over 4GHz
iii). Warranty
The hardware bought must have a warranty cover and must be guaranteed for a specific period of
time. Warranty is an agreement between the buyer and the seller that spells out terms and
conditions of, after selling a product in case of failure or malfunction
A good warranty should cover the following:
o Duration e.g. six months, one year, etc. the least warrant period should be at least 1 year.
In most cases, the longer the warranty the better the hardware.
o How comprehensive is the warranty? Does it cover all the parts of a computer?
o Whether the warranty offer onsite support, so that you don’t need to take the computer
back to the seller / manufacturer in case something goes wrong.
o Call-out response and liability agreement e.g. how long should the supplier take to repair a
fault or replace the product and if he/she delays who bears the cost.
o Preventive maintenance for example regularity of service at intervals etc.
iv). Cost
The cost of computers is related to the size and additional components that may come with the
computer. The cost depends on:
- Its processing capability
- Whether it is branded or a clone. Branded computers are more expensive than their
equivalent clones because of the reliability and good after sale services
- Its size – portable computers are more expensive than desktops because of the superior
technology involved to manufacture smaller computer components without losing
performance abilities.
Do market survey from magazines, newspapers and electronic media or visit a number of vendors
to compare prices to enable you purchase genuine components at a reasonable cost.
Page 66 of 288
v). Upgradeability and compatibility
Buy a computer than can easily be upgraded to accommodate emergent technologies. NB: You
upgrade an existing computer when you either add to it a new device or memory or when you
replace one or more of the computers processor or peripheral device with its faster equivalent.
E.g.
- Replacing a 1GHz processor with a 2.4 GHz processor, a 1oPPM laser printer with a
16PPM laser printer
- Increasing RAM from 64MB to 128MB, 10GB hard disk drive with 20GB.
Some older computers cannot support large had disks or USB devices (USB and firewire) in the
market today, hence difficulty in upgrading them because smaller hard disks are no longer in
circulation.
vi). Portability
Look for a computer that you carry with you incase you wish to access your computer and files
wherever you are. Smaller devices enhance portability.
Other considerations
- Monitor
Your choice of monitor may depend on size, resolution and technology used to make it. Currently
flat panel displays are replacing CRTs.
- Multimedia capability
Refers to the ability for as computer to process and output text, sound, video and pictures.
Multimedia system consists of speakers, CD/DVD drive, sounds card and SVGA monitor. Also a
software that supports multimedia capability.
Other considerations include available ports, wireless connectivity, and the system unit form factor
(whether tower type or desktop).
Software Considerations
Authenticity
This is genuineness, validity or legitimacy of an item. Software is an intangible product, and its
quite easy to pirate software (make illegal copies of software). When purchasing software, get the
original software that will be supported by the developer’s license and certificate of authenticity.
This is because some people illegally produce pirated copies which are an offense.
Documentation
It includes user manuals, trouble shooting and installation guides as well as on-line help. A good
software product must be accompanied with these documentations.
User needs
It must meet users need e.g. if the user needs to type documents most often would go for a word
processor.
User friendliness
This is how easy the users can be able to operate the computer. The ease of use of a program will
(most likely) influence whether the user will prefer it or not.
System requirements
Page 67 of 288
Are basically the hardware specifications required to run a particular program and are usually
indicated on the package e.g. you need a minimum of 16MB of RAM to run an Access Dbase, but
32MB is recommended. The system requirements will usually include the amount of Ram, Hard
disk space, monitor type, processor type and peripheral.
Cost
Software tend to be more expensive than the hardware. The cost of acquiring software product
must be carefully considered before acquiring it against the benefits that it is likely to bring. The
cost of software is a major contributing factor in deciding whether to purchase it or not. It is
usually cheaper to purchase general purpose software if it can meet the users need.
Portability
Software portability refers to ability of a program to be copied or installed in more than one
computer. Data is said to be portable if it can be transferred from one application to another in
electronic form. Most software’s in the market are portable.
Reliability
Good software must be reliable and secure.
Page 68 of 288
4. Describe the various video cards used in 8. Describe the structure of a hard disk in
computers. reference to cylinders, tracks and sectors.
5. Differentiate between MICR and OCR 9. What are pixels? What role do they play
scanners. in screen display?
6. What is the market name given the most 10. Explain the steps you would follow to
recent types of processors? set up a new computer
7. Explain the internal mechanism of the
hard disk in reference to disk platters and the
read/writer head.
3.1 Definition:
What is an operating system? An operating system (sometimes abbreviated as "OS") is the
program that, after being initially loaded into the computer by a boot program, manages all
the other programs in a computer.An operating system (OS) is a set of programs that
manage computer hardware resources and provide common services for application software.
Is a group of programs that manage all activities on the computer.
Main program that controls the execution of user applications and enables the user to access
the hardware and software resources of a computer.
A program that controls the execution of an application programs and acts as an interface
between the user of a computer and the computer hardware.
The operating system provides a software platform on top of which other programs (application
programs), can run. Examples of Operating Systems: Microsoft Windows
95/98/2000/XP/Vista/NT, Macintosh OS, OS/2, CP/M, VMS, UNIX, MS-DOS
Page 69 of 288
3.3 Functions of Operating System
Operating system basically consists of two main parts namely;
Shell – the outer part of an operating system used to interact with operating system
Shell is a computer program that simplifies the interface between a user and the operating system
by allowing the user to pick from a set of menus instead of entering commands
Kernel – (the key portion of operating system). kernel is the core of a computer's operating
system that resides in the memory and performs essential functions such as managing and
controlling the processor, main memory, storage devices, input devices, output devices,
communication devices, files and allocating system resources
Page 70 of 288
The operating system alerts the user of errors that may arise out of illegal operations, hardware or
software failure. The OS deals with errors produced during program execution by expressing what
the error is and provides the error correction routines to ensure smooth operations within the CPU.
vii). Security
Modern operating systems implement security policies such that unauthorized users cannot get
access to a computer or network resource.
Page 71 of 288
3.4 Types of Operating Systems
Operating system can be classified according to:
a) Number of users
i). Single user OS
Used only by one person and runs one user application at a time.
ii). Multi-user OS (multiprogramming)
Enables two or more users to run a program simultaneously. Examples are UNIX, Linux ,
Windows XP, Novell, OS/2, Windows 3.11, Windows NT & Windows 2000.
b) Number of tasks
i). Single program/tasking OS
Allows processing of only one program in the main memory at a time e.g Ms – DOS.
ii). Multitasking OS
The OS allows a single CPU to execute more than one program at a time e.g. Windows Vista, XP,
etc.
c) Interface
i). Command line
User interacts with a computer by typing a command at the dot prompt found on a command line.
The computer reads the typed command at the command line and executes it. Examples of
command line OS are Ms-Dos, UNIX and OS/2. To apply: Click Start menu>All
Programs>Accessories>Command Prompt.
For example you can copy a file called Fruits.Dat from a hard disk C to floppy disk A type the
following at the command prompt:
COPY C:\ FRUITS.DatA:\
This interface is hard to learn or remember the commands, they cannot process complex graphics
and they hardly make use of emerging hardware and software technologies.
Page 72 of 288
ii). Menu driven
Allows the user to select commands / options from a list or menu using keyboard or pointing
device e.g. mouse. The use needs not to remember commands since is represented with choices.
Page 73 of 288
1. File
It’s a collection of related data or information given a unique name for ease of access,
manipulation and storage on a backing storage and stored in one location a. A file has details that
indicate:
- A unique name and an optional extension
- Its size, date and time the file was created or modified.
Types of files
There are three are types namely; system, application and data files.
System files : contain information that is critical for the operation of the computer.
Application files: these files hold programs or application files that are executable.
Data files contain user specific data.
The are some file extension;
Extension File type Description
.doc Data A Microsoft Word document file
.txt Data A plain text file created using note pad or DOS editor.
.exe Application file The file that launches a particular application e.g. PM
7.0 .exe, Winword.exe, etc
.bat System files File containing a series of commands loaded during boot
up.
.sys System files System files that perform fundamental operation in a
computer.
Function of file
- Storage of data
- Organization of information
2. Folder / Directory
It’s a named storage area where the user can store related files for easy access. All folders or
directories originate from a special directory called the root directory or folder. The root directory
is represented by a back slash (\).
Sub-folder is a folder or directory within another folder/directory. In Windows folders and sub-
folders icon appear in yellow colour while file icons are mostly white with a fold at the top right
hand corner.
File icon
Folder icon
All folders or directories originate from a special directory called the root directory or folder. The
root directory is represented by a back slash ( \ ).
3. Drives
The Operating System views storage media or devices as drives. When creating folder or saving a
file identify a storage location which is more reliable e.g Floppy disk, Compact Disk, Hard disk,
Flash disk etc. Drives may be given labels such as letters A-Z to identify them.
Storage location Drive Remarks
Floppy drive A and B If a computer has two drives, one will be assigned letter A the
other B.
Hard disk C, D, E, F If a computer has 4 hard drives, they may be assigned letters C
– F.
Optical drives D, E, F, G If a computer has one hard disk and three or more CD/DVD
Page 74 of 288
drives, may take any number between D and Z
Other Removables D, E, …Z If a computer does not have an optional drive, any removable
drive attached to the computer can take any letter between D
and Z.
Network drive Logical Network drives takes D – Z depending on the number of
physical drives installed or attached.
Windows Desktop
Desktop is mostly an empty screen that appears when windows starts, and has some standard icons
that show that the computer is ready for use.
Desktop features
Icons – are small images representing objects such as files, application programs, peripheral
devices, operator tools in programs, etc. Are manipulated using pointing devices. Examples icons
on the desktop are My Computer, Recycle bin, Internet Explorer, My Documents, Antivirus, etc.
Task manager: Plain stripe that displays buttons of all currently running tasks.
System tray: Right most part of the taskbar. It has icons of the tasks running in the background
but are not displayed on the screen e.g. Time and Calendar etc. To display the task simply double
click its icon.
Sidekick
menu
Page 75 of 288
Start Menu
Common Start Menu Items:
All Programs – which displays a list of all programs installed in the computer.
My Recent Documents – which lists the last 15 recently accessed files.
Control Panel – provides tools which user can use to maintain and make changes to the computer
setup.
Control panel – provides options for you to customize the appearance and functionality of your
computer, add or remove programs, and setup network connections and user accounts.
My computer – give access to, and information about, the disk drives, cameras, scanners and
other hardware connected to your computer.
Search –opens a window where you can pick search options and work with search results incase
the user forgets file or folder name or its location.
Help and support – opens a central location for help topics, tutorials, troubleshooting and other
support services..
Run – enables the user to: Install programs on the hard disk, open files and folders from a storage
location, and Run programs from removable media. It also opens a program, folder document or a
web site.
Log on / log off: Log on is a security measure that restricts unauthorized users from accessing
computer resources. It prompts the user for a User name and Password in order to gain access.
After using the computer Log off the computer before leaving.
The left pane displays a tree of drives and folders while the right pane displays a list of files and
subfolders contained in a particular open drive or folder.
To display Windows Explorer, Right click Start button then click Explore from short cut menu or
Right click My Computer icon then select Explore.
Creating a folder
1. Display the Explorer window
2. From the folder tree on the left pane, select the location in which you want to create a new
folder e.g Local C
Page 76 of 288
3. From File menu, click New then select Folder. A new folder with a temporary name
Newfolder appears on the right pane.
4. Type a new name for the folder to replace the temporary name then press enter key.
Note: To create a subfolder, follow the steps above but select a folder as the location.
Title bar
Menu bar
Toolbar
Work area
Status bar
d. Type a new name for the file to replace the temporary name then press enter. To work in the
file double click and the application program opens, as shown in the figure below.
Page 77 of 288
NB: A file can be contained in a folder or subfolder and subfolder and a file can be contained in
the same folder.
Page 78 of 288
To empty the recycle bin
- In the folder tree or on the desktop select the Recycle Bin icon
- Right click then select empty option from the shortcut menu
- click Yes if prompted to confirm deletion of the files
Page 79 of 288
3.9 Disk Management
Formatting a disk
It is the creation of tracks and sectors in a new disk in preparation for use. It can also be referred to
as writing tracks and sectors on a disk to make it ready for data storage. Other devices which are
not disks can also be formatted to create a file system. Formatting a new disk enables the OS to
recognize it for reading and writing data.
Formatting process of 3 ½ floppy
- Insert the unformatted disk into floppy drive
- Double click my computer icon
- Right click the icon 3 ½ floppy
- Select the capacity 1.44MB
- Give label and click start to begin formatting
- Click close once the process is over
Partitioning
Process of dividing the physical disk into two or more logical drives. Each partition is treated as a
separate drive installed on its own partition.
Reasons: to install more than one Operating System and for the purpose of backup. Windows
2000/XP allow up to 4 partitions on a single physical drive while Ms Windows 98/Me Operating
System allows a maximum of one primary and one extended partition .
To partition a disk:
(i). Reboot the computer using a start up disk
(ii). Type FDISK at the command prompt. Select yes to partition the drive using the FAT32. the
FDISK screen is displayed.
(iii). Choose ‘create a DOS Partition or logical DOS Drive.”
(iv). Restart the computer once more using the startup disk
(v). Format each partition by typing Format <drive letter>
Note: partitioning a disk in Windows 2000, XP, 2003 and Vista is done during installation
process.
To compress a disk:
In My Computer window, right-click the drive
Click Properties, then the General Tab
Check “Compress drive to save disk space”.
Click OK. Another dialog box is displayed.
Page 80 of 288
Click OK to apply changes.
Defragmentation
Arranging of scattered folders and files on a storage media for easy access. Disk Defragmentation
can also be referred as the process removing the unused spaces on the disk caused by repeated
deletion of small file or insertion of large files onto the disk.
To defragment a disk:
In My Computer window, right click the drive
From the Shortcut menu, click Properties.
In the Properties dialog box, click Tools Tab
Click Defragment Now. Disk defragmenter window is displayed
Select the volume to defragment
Fragmentation is the condition of a disk in which the files and folders are scattered.
Disk clean up
Is the process of detecting and removing files on the hard disk drive that may no longer be needed.
Disk cleanup frees and improve the system performance.
Backing up data
Creating copies of data and programs on separate storage areas to avoid losing of data and
programs incase the storage device fails, gets lost or crashes (permanent destroyed).
Page 81 of 288
Review questions 3.4
1. Define the following terms as used in disk management
a) Formatting b) Partitioning c) Compressing
d). Defragmenting
2. Explain how you would format a used disk in Windows.
3. You have realized that your floppy disk is limited in storage space and you would wish to
create more space.
a) Which tool in Windows would you use.
b) Write down the procedure of doing (a) above.
4. Explain how you would create backup using Windows back-up using utility.
5. When you switch on your computer, and realize that it is not loading the Operating System.
This means that you have to boot up your computer using a startup disk.
a). What is a startup disk
b). using a new diskette, create a Windows Startup disk and label it Windows –System Disk. (the
dashes represent the version of Windows you are using).
6. Why is hard disk partitioned?
7. Explain how you can partition a 30GB hard disk into 2GB partitions.
Definition of installation: Process of copying program files onto the hard disk.
Installation differs from copy paste process in that it is specifically meant to copy executable files
in a format that allows the computer to run the program.
Some problems may crop up after installing Windows Operating system like failure to boot or
function properly due to hardware, malware, improper installation or missing system files,
computer hangs now and then, abnormal restarting, etc.
Page 82 of 288
The problem may be due to one of the following:
1. Invalid system disk: this error may occur if the drive configured as the active partition no
longer contains essential systems files required to load the operating system.
2. Missing operating system files such as CONFIG.SYS, HIMEM.SYS AND Autoexec.bat
may result in boot failure. If the files have been deleted reinstall the OS or start up a
computer using startup disk.
3. Corrupted system registry – registry is the Windows database that keeps details about all
system and application programs installed in the computer. If the registry is corrupted, the
computer may fail to boot. Repair the registry using emergency repair disk or restore the
registry backup if you created one or reinstall the OS.
4. Failure to load the GUI desktop – may be due to infection by malware, missing or corrupted
display drivers. If the system can start in Safe Mode, scan for viruses or locate the
malfunctioning device in the Device Manager and disable it.
5. Windows protection error – is displayed during startup before GUI is loaded. It occurs when
the 32-bit virtual driver fails to load. Restart the computer in safe mode. If the OS loads
properly, use the Device Manager to reinstall corrupted or missing drivers.
6. Runtime problems – may be characterized by the system’s failure to respond to command,
behaviour commonly referred to as hanging. Use the restart keys Ctrl + Alt + Del to display
the Task Manager and try to close the non-responding applications. If this fails, shutdown
the computer and turn it on again.
7. Insufficient system memory
8. Problem with hard disk boot sector, may be due to virus attack/infection. Scan with the
latest antivirus software
NB:- You can read more information on troubleshooting and fixing an operating system related
problems by reading the online help and support utility.
Page 83 of 288
Answers to Review Questions
Review exercises
1. Dust and smoke settles on storage devices scratching them during read/write operation.
2. PCs are becoming small and portable e.g. Personal Digital Assistant (PDA).
3. Free from dust, water, magnets, well ventilated rooms, medium humidity, etc.
Page 84 of 288
4. This is the casing that houses the CPU and storage devices. Components in the system unit
includes CPU, Motherboard and storage devices.
5. Starting up a computer. Internally it first checks whether all the components are in good
working condition then loads the operating system.
6. To avoid damage and loss of data.
7. Mobile phones, calculators, robots etc.
8. Water causes rusting of metallic parts and short circuits if used.
9. Clicking-pressing and releasing the left mouse button once.
Double clicking-pressing the left mouse button twice in a quick succession. Double clicking
usually opens a file or starts a program.
Right clicking-pressing the right mouse button once displays a list of commands from which
the user can make a selection. This list of commands is called a shortcut menu or context
sensitive menu. It is called a context sensitive menu because the commands on it apply to the
right-clicked item.
10. (a) Install humidifiers in the room,
(b)Improve furniture to avoid bending when using the computer.
Page 85 of 288
7. 4KB – Approximately 4000 characters
640KB –approximately 640,000 characters
16MB –approximately 16 million characters
20GB –approximately 20 billion characters
8. Cache memory – speeds up processing (fetch cycle)
Buffer – acts as interface between very fast and processor and slow I/O devices.
Register – temporarily holds data / instructions just before and after processing.
9. Comparison include: =,<, >, and < >
10. The CPU of a microcomputer is smaller and less powerful than that of a mainframe
11. Determines the processing speed of the CPU
12. Basic Input Output System – holds hardware setup and configuration information.
13. Data bus, address bus and control bus.
Page 86 of 288
12. a). Do not drop the disk drive
b). Do not expose it to strong heat
c). do not expose it to dust/smoke particles
d). Do not unprocedurally switch off the computer.
Page 87 of 288
3. Yes, in order to compare quality and prices.
Revision questions
1. a). Central Processing Unit
b). Arithmetic logic unit
c). Control unit
d). Read only memory
e) Random access memory
2. Cache, registers
3. a). Kilobyte b). Megabyte c). Gigabyte
4. MDA, HGA, EGA, VGA and SVGA
5. MICR uses magnetic technology to read magnetic characters while OCR uses laser technology
to read characters.
6. Pentium processor
7. The drive is made up of several disks platters that are mounted on a common axis with
read/write heads on both sides of the platters. The heads move in and out as they write/read data.
The outer case is hard and metallic.
8. The hard disk is divided into concentric circles called tracks. Parallel tracks on several platters
are called cylinders. The tracks are further subdivided into sectors. Several sectors can be grouped
to form clusters.
9. Pixels (picture elements) are dots on the screen that form characters and images. They
determine the clarity of image.
10.a). Gently and carefully connect the interface cable of each device to the correct port and to the
device,
b). connect the computer to the power source and switch it on,
c). Observe boot up information to see whether Power On-Self Test (POST) displays any error
massage. A successful boot means that the computer was properly setup.
Page 88 of 288
(c) Availability
(d) Portability.
(e) Hardware configuration/compatibility
(f) User need.
Page 89 of 288
b). creating volumes by subdividing a large physical disk.
c). creating more space on a disk by squeezing files into a smaller storage location on a disk.
d). Consolidating files into one area on the disk.
2) Right click its icon on the screen then select format command.
3) A). Compression agent or Drive space.
b). The teacher to give appropriate answer depending on the version of Windows.
4) Right click My Computer icon then properties. Click tools tab than click Backup now button.
5) a). A special disk that has boot up files.
b). teacher to help pupil to create startup disk.
6) a). To install more than one operating system
b). For backup purposes
7) boot in MS – DOS mode using a startup disk then at the prompt type FDISK and follow the on-
screen instructions.
Revision questions
1) It stores related data and information records into files and related files into folders and
subfolders
2) Because it does the basic functions of enabling other programs access the hardware resources.
3) Compressing – squeezing files to create more space while defragmenting consolidates files and
folders in a contiguous space or location on the disk. .
4) When one partition fails, the other can still be used.
5) To create tracks and sectors that can be recognized by a particular operating system
6) a). Processor
b). Memory
c). I/O devices and ports.
d). Communication devise and ports secondary storage devices
7) Read the manufacturers manual or Readme.text file form Windows folder.
8) Scheduling determines which task will be processed first , while sequencing arranges the task
and keeps a list of currently running tasks.
Page 90 of 288
1. WORD PROCESSORS
Objectives
By the end of the topic, the learners should be able to:
a. Define a word processor
b. State the purpose of word processing
c. Use a word processing package
d. Format and edit a document
e. Create and edit a table
f. Create and update a mail-merge document
g. Print a document
h. Insert and edit objects
Page 91 of 288
o Availability of different font types, character (font) sizes and styles e.g. bold, italic and
underline.
2. Paragraph editing features
- Alignment where text is aligned to the left, center, right or justified.
- Paragraph numbering
- Indenting and tab to align text
- Word wrap, feature that automatically moves a word or cursor to the beginning of the next
line if it does not fit at the end of the current line.
3. Page editing features such as :
- Page numbering
- Insertion of headers and footers
4. Printing of documents: In single or multiple copies, full, all or part of a document.
5. Tables which can be used to align text in columns and perform certain sorting and calculations
on the text.
6. Tools such as spell checkers, Thesaurus and Bookmarks, footnotes.
7. Use of document templates which can be used to quickly create the most frequently used
documents once the format has been set.
8. Mail-merge which is very useful when similar letters have to be sent to several people.
9. Creating and manipulating column text, such as newspapers layouts.
10. Ability to add graphics within documents
11. File protection using passwords.
12. Scrolling which is the movement of text documents and graphics smoothly up, down
(vertically) and across (horizontally) on screen using a mouse or the arrows keys, PageUp and
PageDown keys.
Page 92 of 288
Ms Word is a member of Microsoft Office suite that consist of several integrated programs like
Microsoft Excel, Microsoft Access, Microsoft Outlook, Microsoft PowerPoint and Microsoft
Publisher. Currently five Office suites are Office 97, 2000, XP, 2003 and 2007.
NB: Documents saved in Word 2007 format cannot be opened in the previous versions unless
saved in compatibility mode.
Starting Ms Word
Word 2003 runs in the Microsoft Windows XP environment and to use Word 2003 the program
should be loaded from the hard disk to computer’s memory. Switch on your computer to start
using word if it’s properly installed.
Programs menu
Start Menu
Page 93 of 288
4. Select a template by double clicking its icon, and then replace the general content with your
content.
Scroll arrow
Formatting toolbar
Work area
Vertical scroll bar
Vertical ruler
Text cursor
Previous page
View Buttons
Browse
Horizontal scroll arrow
selector
Next page
Title bar
Located across the top of the window, it displays the title of the currently running application or
task and the name of the document. It also enables user to move the application window around
Page 94 of 288
the desktop. On the right of the title bar are three tiny buttons called Minimize, restore/maximize
and close button.
Maximize / Restore button – stretches the window to cover the entire desktop or restore it to its
original size if was reduced to a button on the task bar.
Close button – used to close and exit a window. NB: Below the close button there is close window
button (x), it closes the current active window.
Menu bar
Located below the title bar, provides the user with group of commands. Each command has a drop
down list of commands used to create or manipulate a document. The menu options show the
name of the menu option, the button equivalent and where applicable the shortcut command.
For instance to Save click File>Save or Hold down Ctrl + S or Click the Save icon.
Examples are File, Edit, Format, Help.
Toolbars
Located below the menu bar. They are rows of buttons or icons that represent commands available
in the menu bar. They provide quick access (shortcuts) to some of the most frequently used
commands from menu bar. The most common are standard toolbar and formatting toolbar.
Standard toolbar {has buttons that act as short cut to commonly used menu commands.}
Has buttons that act as short cut to commonly used menu commands. Shows the most commonly
used tools for word processing tasks such as Open, save, copy, paste, spelling and grammar, etc
Page 95 of 288
Style Font Type Font Size Bold Italic Underline Numbering
Increase indent
Align Right Justify Bullets
Shows commonly used tools for text formatting such as font type, text alignment, bullets and
numbering, bold face, etc.
Ruler
Ms word has onscreen rules that is vertical ruler located on the left margin and horizontal located
below the toolbars placed, that helps the user to position text or objects in the right position, set tab
stops indents. The horizontal ruler also helps to set tab stops and indents.
Work area
Is the blank area where you can enter text or graphical objects. A cursor always blinks.
Task pane
A Task Pane is automatically displayed docked on the right of the window. It contains shortcuts to
commonly performed tasks e.g. opening recently used documents.
View buttons – located directly above the status bar, they provide a quick way to move between
various page views e.g. normal view, outline view etc.
Page 96 of 288
Status bar
A strip located across the bottom of the window that acts as a communication link between the
user and the program. It displays information about the active document or such as current page
number, cursor position, section etc. or selected command.
Navigating Word
Scroll arrows: Are arrows at the end of the scroll bars that user clicks to move in small steps
across and vertically the screen. Scrolling a document
You can also navigate through the Word document using the Browse object selector below the
Vertical Down arrow as shown in the figure below.
Previous page
Browse selector
Go to
Next page Type page number here then click
Go to button
Page 97 of 288
Running the program
Creating a Document
When a new document is started there is a blinking vertical bar called insertion pointer, which can
be moved using the arrows keys or the mouse.
End of document mark – is the horizontal line that indicates the end of the document in a normal
view
Observing the mouse pointer – the mouse pointer is the I-beam when it is in the text area (work
area). When it is moved to the left it becomes a right slanted pointer, which when clicked selects
the line.
Although the Save and Save As when saving for the first both give the Save As dialog box, Save
As command can be used in the following situation:
To save a document under a new file name.
Save a document in different location, such as folder or disk.
2. In the File Name, type a unique name descriptive of the files contents for the document so that
you can remember with ease. Note: when you are saving a document for the first time, word
automatically uses the first paragraph as the new documents name. Overtype using a different
name. a file name cannot contain any of the following characters / , : ; * ? . < >
3. Select the location or drive to save in, by clicking the down arrow on the right of Save In list
box.
Page 98 of 288
4. To save file in a different format or an older version of Word, select the type from the Save as
type drop-down list.
5. Click Save button or press Enter key. The document will be automatically saved as Ms word
document and file extension .doc added.
Page 99 of 288
2. Select a drive or folder where the file is saved in the Look in box.
3. In the Name list, scroll and select the name of the document you want to open or select the file
and click open button.
4. Double – click the document you want to open or select the File and Click on Open button.
i). From Windows Desktop click Start button>>My Recent Documents and then click the
shortcut links of recently operated files
document you want to open from the list of recent documents. My Recent Documents
displays the 15 recently operated files from any application .
ii). Or from the File Word, click File>>Open and in the Open dialog box click My Recent
Documents button.
If the list of recently used documents is not displayed, configure Ms Word to be displaying by
Clicking the tools option command. In the options dialog box displayed on the general tab,
select the Recently used file list check box as shown in the options dialog box below.
4) Type in a password to modify; this prevents the user from making changes unless the user
enters the correct password.
5) Click OK or press Enter key.
NB: A password is case sensitive always note the combination of characters used.
Closing a document
This is unloading the current active document from memory so that the user can create or open
another without necessary exiting from Word.
To close, on File menu, click Close. If the document has changed since the last Save you will be
prompted to save the changes. To close al open documents without exiting the program, hold down
SHIFT key and click Close All on the File menu.
Block Operations
Blocking text refers to selecting a string of text in order to work with it as a whole.
Deleting Text
Deleting means to erase text. The two frequently used keys for deleting text and objects are Delete
and Backspace . You can also erased text only using Enter key, Spacebar and Type over mode.
To delete a block of text highlight the text to be deleted then press the delete key (i.e. Backspace,
delete or Space bar)
The Backspace key – deletes (erases) characters to the left, while the DELETE key deletes
characters to the right of the Insertion Point.
Spacebar – highlight a block of text then press the spacebar. All selected text will be deleted.
Enter - highlight a block of text then press the enter key, all selected text will be deleted
Overtype : Delete can also be done by overtype option when active. You can activate by double
clicking the ‘OVR’ label on the status toolbar or pressing the Insert key on the keyboard. After the
Typing Modes
There are two typing modes: 1). Insert Mode and 2). Typeover /Overwrite mode
1). Insert mode
By default Word operates in insert mode. New text does not replace existing text in the typing
position, instead the text is pushed to the right as you type. To insert text , place the cursor where
you want to add text and continue typing.
2). Typeover / Overwrite mode
This mode replaces characters at the cursor position as you type. Activate the option by either
double clicking OVR label on the status bar or pressing the Insert key on the keyboard. You will
notice that the OVR on the status bar is now active (highlighted).
OVR label active after double clicking or
OVR label inactive on status bar pressing Insert key
To switch back to Insert mode press Insert key again or double click OVR label on the status bar.
iii).When the word is encountered it is highlighted. Click Find Next button to locate other
occurrences of the same text. You can check Highlight all items found in check box and
select Main document in the drop down list, so that the all the searched words are
highlighted. Once the search is completed, a dialog box appears stating that the search has
been completed.
NB: To cancel a search in progress, click Cancel button or press ESC
Search Options
Click the more buttons on the Find and Replace dialog box, to specify search options.
They include:
Match case: - It identifies only text that
match in case e.g. it will not find ‘late’ if you
typed ‘LATE’.
Whole word: - Searches for a word that is
whole but not part of another word e.g word
like ever will not be found in words like
whoever, however etc.
Wildcards: - A special character e.g.? or *
that is used to represent a set of words with
similar characteristics for example to find
words that starts with F, like Fur, father, Francis can be represented using a wildcard as F* which
finds all words starting with F. The wildcard ? finds any single character e.g. a search for ‘s?t’
finds ‘sit’, ‘set’, etc.
Like : - Searches for a word with similar pronunciation like Fare and Fair, seek and sick, etc.
Replace Command
This feature is used to find and replace words or phrases.
Choose Replace from Edit menu, or press Ctrl + H from the keyboard. A Find and replace dialog
box appears.
Proofreading
This is checking whether the document has typographical or grammatical errors.
Proofreading tools
a). Spelling and grammar checker
Is an inbuilt tool that helps the user to correct spelling errors and incorrect grammar structures.
The spell checker also checks for such common typing mistakes as repeated words (the the),
irregular capitalization (‘tHe’). The checker can only recognize errors of those words whose
correct spelling is in its dictionaries. The spell checker has two types of dictionaries:
i). Standard (main) dictionary which is in-built
ii). Custom which is user-defined.
Spelling errors are underlined in red while grammatical errors are underlined in green.
To run the spelling and grammar checker do the following:
1. To check an entire document, first ensure that no text is selected. Place the cursor at the top of
the document before starting the spell checker.
2. Choose Tools>Spelling and grammar menu or click the spelling and Grammar icon or
press F7 key on the keyboard. A spelling and Grammar dialog box appears as shown in the
figure below.
b). Thesaurus
Is used to find words or phrases with similar meaning (synonyms) or
opposite meaning (antonyms) to the one selected. To use thesaurus:
1. Select a word in the document
d). Autocorrect
Detects automatically wrongly spelled or capitalized words and replaces them with the correct
word. The settings of autocorrect are user defined e.g. if you keep on typing cetrain instead of
certain you can set the autocorrect feature to replace the
former with the later. Type cetrain (incorrect word) in
Replace box and certain (correct) in With box, as shown
in the figure.
e). Undo
It reverses the most recently executed command that was issued in order to revert back to the
previous state. In summary undo command is used to cancel previous command or action and
restore deleted text.
To Undo click Edit > Undo command or Click Undo button on the standard toolbar or Press Ctrl
+ Z.
3.
To change font type (typeface) and size, scroll the
Font list box then click the font required such as:
Arial, Broadway, Comic Sans serif, monotype
corsiva, etc. To change the font size scroll down the
size list box and select points required e.g. 14 points.
To apply font size like 13.5 type the points in size
box then press enter or click OK button. Font size is
measured in Pts (points) where 1 point equals 1/72
of an inch. The standard size for document is 12
points. Font style includes regular, italic, bold, bold
italic.
4.
Bolding text: This feature makes the selected text
appear thick and darker than the rest of the text. To bold, select Bold in the dialog box or
press Ctrl + B or click bold button B from formatting toolbar.
5. Underline text: is placing any line style under text. Under underline style list box there are
several underline styles e.g. words only, single, double, dashed. Dotted, etc.
6. Italicizing text: This is making text slant forward. To italicize click Italic under font style or
press Crtl + I or Italic button on formatting toolbar.
7. Changing font color: By default the font color is black. You can change the font color by
clicking the font color which display a color chart as well as more color options including
standard and custom.
NB: The font dialog box contains additional formats that are not available on the formatting
toolbar such as Double underline, Small Caps, Superscript, subscript, emboss, engrave, Hidden,
etc. You can also change the character spacing by expanding the text or condensing it using
character spacing Tab as well as text effects to animate text using text Effects Tab. Scroll down
animations list box to select your choice. Animations appear on screen but are not are printed.
Subscript describes text that is slightly lower than other text on a line and is usually used in scientific
formulas. e.g. O2
Subscript
To make text subscript or superscript
1. Select text format subscript or superscript
2. Click on the Format >Font option and select the Font tab.
3. Under Effects select the superscript or subscript check box as required.
4. Click OK.
Format Painter
Format painter copies the format from a selected object or text and applies it to the object or text
you click on. To copy the format, select the text with the format you want and click on the Format
Painter button on left of Undo command on the Standard toolbar. To
copy the formatting to more than one item, double click the Format
Painter button and then click on each item you want to format. When
you finish copying, press Esc or click Format Painter button again.
Text alignment:
Refers to how text is lined up on the page relative to the left, Right or Center of the page
Types of alignment
There are five major alignment options namely
Left, Center, Right, Justified and Distributed
(force justified).
To align text, select first then click the appropriate alignment button on the formatting toolbar or
click Format>Paragraph and select the appropriate alignment form the alignment list box, then
click OK.
Also alignment can be achieved by means of special function keys on the computer keyboard as
follows:
Ctrl + L : Aligns text to left Ctrl + E : Centers text
Ctrl + R : align text to Right Ctrl + J : Justify text
Changing Case
This refers to switching between different cases provided by the Microsoft Word. Once you have
typed text, you can change the case automatically without having to go to each individual word.
Changing case helps to create contrast within the text.
To change case:
Choose Change Case from the Format menu. From the Change Case dialog box, select one of the
following options:
Sentence case – which capitalizes
the first letter of the first word of
every sentence in the selected text.
Lower case – changes selected text
to all lower case (small) letters.
UPPER CASE – changes selected
text to all uppercase (capital) letters
Title Case – capitalizes the first
letter of each word in the selected
text.
Drop Caps
Drop capping is making the first character in a sentence large, taking more space in the next line.
The Drop Cap is often used when starting a paragraph.
4. For the Drop Cap letter, select the font to use incase you
wish to apply.
5. Specify the number of lines to drop and the distance from
text.
6. Click OK.
Paragraphs below shows Dropped position and In Margin positing all dropped 4 lines and
distances from text is 0.2 inches
I
t is not entirely far-fetched to draw parallels between a Kenyan MP and a hyena. You see
that same greedy eye in search of a free meal, and the total lack of table manners when
Dropped
figuratively, it becomes to eating in excess. MPs are no longer just a menace. They have
become scavengers. They are now busy spinning the fiction that they pay for our
weddings, our school fees, our medical bills and our funerals. Even if they do, so what? They are
not under some constitutional obligation to do so. It’s bad manners to demand favours on the claim
that you operate as a charitable enterprise. Who required you to do so?
I
t is not entirely far-fetched to draw parallels between a Kenyan MP and a hyena. You see
that same greedy eye in search of a free meal, and the total lack of table manners when
In Margin
figuratively, it becomes to eating in excess. MPs are no longer just a menace. They have
become scavengers. They are now busy spinning the fiction that they pay for our
weddings, our school fees, our medical bills and our funerals. Even if they do, so what? They are
not under some constitutional obligation to do so. It’s bad manners to demand favours on the claim
that you operate as a charitable enterprise. Who required you to do so?
Indenting paragraph
Indentation is moving the text from the left margin. Text paragraphs usually extends from the left
margin to the right margin. There are three types of paragraph indentation: first line, hanging, and
full indent.
The paragraph below shows a first line indent indented by 0.8 inches.
The ideal word processor operator should be self-motivated and able to cope with
pressure. She should have an excellent memory, a methodical approach, an ability to work
unsupervised, and willingness to stay with the work until a problem has been solved.
b). Hanging indent
The first line extends to the left of the paragraph, with the rest of the paragraph “hanging”
below it. To apply:
1. Follow ALL the above steps for first line indent but under special select Hanging ng indent
from the drop down list
The paragraph below shows hanging indent indented by 1.02 inches.
The ideal word processor operator should be self-motivated and able to cope with pressure. She
should have an excellent memory, a methodical approach, an ability to work
unsupervised, and willingness to stay with the work until a problem has been
solved.
c). Full indent
The entire paragraph is indented as whole. To apply:
1. Select or position the cursor the paragraph to be indented
2. Click indent buttons from the formatting toolbar.
To indent a paragraph towards the right click the Increase Indent button. The selected
paragraph each time you click on the Increase Indent button indents by ½ inch.
To indent a paragraph towards the left click the Decrease Indent button.
columns.
To set tab stops follow the steps below;
1. Select the paragraphs in which you want
to set Tab stops.
1. Click the Tab stop selector button at the far left of the horizontal ruler until it changes to the
type of Tab you want.
Left tab Centre tab Right tab Decimal tab Bar tab
2. Click on the horizontal ruler at the position where you want to set a Tab stop. You can hold
and drag the Tab to the exact position you want.; as shown in the example below:
Formatting pages
When you fill a page with text or graphics, Word inserts an automatic page break and starts a new
page. This page is called a soft page break. A page break identifies the end of one page and the
beginning of the next page. If a page break is forced before the end of the page, this is called a
hard page break. To insert a manual Page Break follow the steps below:
1. Click at the point where you want to start a new page
2. On the Insert menu, click Break
3. Click Page Break then OK.
Creating columns
Page Margin
Margins are blank spaces around the edges of the page. Are used to restrict the printable area of
the page, therefore only text and objects inside the margins are printed.
To set margins:
1. From File menu click Page Setup.
2. Click Margins tab.
3. Enter values for the Left, Right, Top and Bottom margins in
the respective boxes.
Top Margin: Is the distance of the first line of the text from
top edge of the page
Left Margin: Is is the distance of the left side of text lines
from the left edge of the page
Bottom Margin: Is the distance of the last line of the text
from the bottom edge of the page.
Right Margin: Is the distance of the right side of text lines
from the right edge of the page.
Gutter (Binding offset): Is the extra space added to the left
margin for binding e.g. Setting to 0.2 etc.
4. To change margins for part of a document, select the text and then set margins on the on the
Margins tab of the File Menu Page Setup. In the Apply to box, click selected Text.
5. Word automatically inserts section breaks before and after the text with the new margin
settings. If your document is already divided into sections, you can click in a section or select
multiple sections, and then change the margins.
Portrait
Landscape orientation
orientation
Page Layout
It lets the user specify how text will be placed on the page from the margins. By default text starts
from the top margins but can change this either to Centre,
Justified or Bottom as follows:
a. File menu >Page setup>Layout tab.
b. From the vertical alignment tab, select the alignment
required then click OK.
NB:
To have different layout in your document, select some text e.g. a
paragraph in a page then do the following;
a. File menu>Page setup>Layout tab.
b. Under Page Select alignment required from Vertical
alignment options , then under Apply to select Selected
text.
c. Click OK.
Headers can be defined as few words that appear at the top margin of each page, while Footers are
a few words that appear at the bottom of every page in a document.
To insert Headers and Footers:
1. On View menu click Headers and Footers. The Headers and Footer toolbar is displayed.
2. To create Header enter text or graphics in the Header area.
3. Click the Header and footer toolbar buttons to insert a date, page number etc.
4. You can also click Insert Autotext to pick an Autotext such as ‘Page x of y’, the file’s name,
etc.
Format page Switch between
number Insert time Header and Footer
Insert page number
Text and graphics you enter can be formatted in the same way as with the main document. To
center an item press TAB once ; to right align an item press TAB twice
4.In the Number Format box, click the format you want
-Word inserts the note number and places the insertion point next to the note number.
2.Type the note text.
3.Scroll to your place in the document and continue typing.
-As you insert
correct number format.
3. In the Alignment box, specify where the page number is to be inserted e.g. Center, Right,
Left, Inside or Outside.
4. check show number on first page to display number on page 1, uncheck not to display number
on page 1.
5. Click Format tab to choose the number format i.e. 1, 2,3, or i, ii, iii, or A, B, C etc.
6. Click OK.
In order to generate a TOC you must first mark entries by defining styles.
Creating a table
A table can be created using two methods:
(i). By using the Insert table command from Tables menu.
(ii). Using Insert button then select the number of rows and
columns you want.
Definition of terms
Cell – intersection between row and column
Row – horizontal arrangement of cells
Column – vertical arrangement of cells.
To insert a row:
1. Place the cursor anywhere you want to insert a row, it can be in a cell or just above or below a
table.
2. From Table click Insert. Select either Rows Above or Rows Below. You can insert rows
above or below the current row.
Inserting Header Rows
When you have a table that is likely to span more than one page, insert one or more header-rows so
that on each table the same headings appear. To Insert,
1. Select the row containing the heading.
2. From Table menu, select Headings Rows Repeat.
To split cells:
Select the cell(s) and click on Split cells on the Table and Borders toolbar or Table / Split cells
menu option.
Shading
1. To add shading to a table, click anywhere in the table or to add shading to specific cells, select
the cells.
2. On the Format menu, click Borders and Shading, and then click the shading tab.
3. Select the options you want
4. Under Apply to, select cell to apply the shading to otherwise the shading will be applied to the
entire table.
To format Table with advanced features use Tables and Boarder toolbar. To display from View
menu>Toolbars>Table and Borders. It has a variety of buttons to achieve the following:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Table and borders toolbar
Importing table
Word lets you import tables from other applications or an existing file.
1. Click Insert menu then objects. A dialog box is displayed.
2. From the object the type select the type of object to insert e.g. Excel worksheet, Adobe table.
3. Click Create from file. This lets you browse for a file that contains the table you wish to insert.
4. Click OK to insert the table.
The word (BELOW) / (ABOVE) / (LEFT) / (RIGHT) in brackets is called the argument for the
formula and it tells Ms Word which cells in the table are to be worked on. The same can be achieved
using cell referencing e.g. to get total for Eng =SUM(C2:C5) it gives same result as =SUM(ABOVE)
Sorting
You can sort text, numbers or dates within a table or list in ascending or descending order. To sort
follow the steps below:
1. Highlight the text list or table you want to sort by placing the cursor in cell.
2. On Table menu click Sort
NB: you can reduce the size of a file by Linking the picture instead of Inserting by clicking the drop-
down button and selecting Link to file in the Insert Picture dialog box. You cannot edit the picture
but can see it and print in your document.
To scan:
(a) Position the insertion pointer where you want your picture to appear.
(b) From the Insert menu, select Picture and then click from Scanner or Camera.
(c) To scan follow the instructions that come with the scanner model.
(d) When the image appears on the screen you can edit and format just like Clip Arts.
….’;;;p[
To format or edit a pict”?:[‘[
is is done using the picture toolbar shown below, which let you to adjust brightness, contrast, change
color to black & white or Gray scale, Crop, rotate, wrap text, etc.
Cropping
Cropping is hiding the unwanted details so that they do not come out when printing (trimming the
unwanted edges of picture).
To crop a picture follow the steps below:
1. Click on the picture to be cropped
2. If the Picture Toolbar is not displayed right click the object and click Show Picture Toolbar
option.
3. On the Crop option, increase or decrease the trim for the Left, Right, Bottom and top by the
required magnitude.
Or Click the picture go to Format menu >picture >on picture Tab select Crop option, increase or
decrease (negative magnitude adds a margin between the picture and its frame)
Wrap text around the picture, Vary contrast, colour and brightness of the picture by selecting and
clicking those icons on the picture toolbar.
You must use the Drawing toolbar to draw. To display the Drawing toolbar click Drawing on either
the Standard Toolbar or from View menu >>Toolbars >>Drawing.
The Drawing toolbar allows you to draw Boxes, Lines, Circles, Autoshapes, Arrows, callouts,
polygons, stars, lines, etc. It also allows you to format and transform the objects.
Drawing toolbar
1. To draw click at the appropriate shape button or Autoshapes. The pointer changes to a plus
sign. (Press ESC key when Create your Drawing here box appears)
2. Place the pointer anywhere you want to draw that shape and drag to the required size.
3. to Draw from the Autoshapes click Drop down arrow and select your choice category
To fill the object with color, fill effects and style (Shadow style & 3_D style)
1. Click on the object to select.
2. Click the down arrow of Fill color button, which looks like a bucket pouring ink.
3. Select the color you want applied. To fill the drawing with texture, gradient or pattern, click the
Effects button. From the resulting dialog box, select the appropriate fill effect.
4. to apply style select the object click style buttons to select style of your choice.
3. In the symbol dialog box select the appropriate symbol and click the Insert button.
4. To insert a special character e.g ® click special character tab and click the
appropriate special character then the Insert button.You can also insert ® by pressing
key combination Ctrl + Alt +R, © by pressing Ctrl + Alt +C, etc.
5. Click close button.
Word Art
You can add special effects to text by using the Word Art button on the Drawing toolbar. In WordArt,
you can create shadowed, skewed, rotated, and stretched text, as well that has been fitted to
predefined shapes.
You can select normal text usually a short phrase and change it to Word art by clicking the Word Art
of your choice.
Too you can edit a WordArt by clicking it the use Edit option on the WordArt toolbar.
b. Printing a document
Printing allows you to create a hard copy or paper output of your document using a printer. It is
important to print Preview your document before printing because WYSIWYG (What-You-See-Is-
What-You-Get), meaning what you see on screen of the document is exactly what will be printed. We
print preview to do the following:
(a). Confirm that no details are outside the printable area
(b). Adjust the layout of your document or to ascertain the document layout is Okay before
printing .
To print Preview click Print Preview on the Standard toolbar or From File menu select Print
Preview option
To print
From File menu select Print or Press CTRL + P or click the Print icon on the Standard toolbar. A
print dialog appears.
2. If you choose Pages enter the page numbers and ranges you want to include e.g. to print pages 1,
2 ,5 through 9, and page 1, type 1,2,5-9,12 in the Pages box.
3. If you have highlighted some text in the document to be printed, then click on the Selection button
in the Print Range box. When you select for example some text like a paragraph the selection
option under Page Range becomes active.
*Read the manual that comes with the printer to solve printing problems.
Revision questions
1. Define the term graphic and give one example
2. Explain how to achieve the following
(a). to move a graphic from one place on the page to another
(b). to change the brightness of a graphic
Types of Spreadsheets
Are tow namely
a). Manual Spreadsheet
it consists of a book like ledge with many sheets of papers divided into rows and columns on which
data elements are entered manually using a pen or pencil.
i). Accounting
Spreadsheet comes with inbuilt functions that make accounting task easier .sales can be recorded,
invoices produced and statements compiled by accountants and business people.
Formatting
Standard toolbar Formular bar toolbar Title bar
Menu bar
Column
header
ACTIVE CELL
Vertical
Scroll bar
Row
Horizontal
scrollbar
Worksheet
Browsers Worksheet tab
Status bar
Worksheets – is a one sheet in workbook. The worksheet is a grid made up of rows and columns
containing information.
Column
Columns are vertical divisions of worksheet that are identified by letters across the top edge. Columns
represent a field in spreadsheet table. There are 256 columns in a worksheet, which are labeled A, B,
C …Z, then AA, AB through to IV. For example the first column is A, the 27 th column is AA and the
256th column is IV (ascertain practically on screen).
Row
Rows are the horizontal divisions of a worksheet and are identified by numbers on the left edge of the
worksheet. There are 65,536 rows in a worksheet which are numbered 1,2,3, through to 65,536. A row
represents a record in a spreadsheet table.
Cell
Cells are boxes created by intersection of Row and a Column, which contain the Worksheet’s data
and formulae. There are 16,777,216 (i.e. 256*65,536) cells in one worksheet. The current cell
(highlighted by a thick border) is called the Active Cell, and is the location for typing in the
worksheet. Each cell can contain different type of information. Excel data comes into two types:
labels and values.
Elements of Excel window
Element Description
Title bar The name of the workbook plus the minimize, maximize and close buttons
appears here.
Menu bar Shows available options for working with data in spreadsheet.
Standard toolbar Has shortcut commands for mostly used menu commands
Formatting toolbar It contains common commands for text formatting found on the format
menu.
Formula bar Enables the user to enter or edit a formula or data cell. It has equal sign (or
fx). To the left of the Formula bar is Name box that displays the position of
the cell in which data or formula is being entered, its also called the current
cell. To display Formula bar click View menu then Formula bar.
Column labels The letters across the top of the worksheet, which identify the columns in
the worksheet.
Row numbers The numbers down the side of the rows in the worksheet
Cell pointer A special cursor that is rectangular in shape. It marks the position of the
current cell or the insertion point.
Selecting a Range
When working with a large amount of data using a range saves time. A Range is a rectangular
arrangement of cells specified by the address of its top left and bottom right cells, separated by a
colon (:) e.g. Range A1:C10. A Range can also be a single column or row.
Entering data
1. Point the mouse pointer at the cell and click the left mouse button. The cell pointer moves to the
cell in which you want to enter data.
2. Type in the data using the keyboard.
3. Press Enter.
Numbers
Numbers are constant values consisting of the following characters: 0 1 2 3 4 5 6 7 8 9 , + - ( ) / $ % E
(E is the scientific notation for power of 10). You can enter decimal fraction such as 3 ¼ or 2/3 ; or
scientific notation such as 5.871E+3 (meaning 5.871 x 103). To enter a number
1. Click the cell in which you want to enter the number
2. Type the number into the cell. Precede a negative number with a minus sign (-).
3. Press Enter or Tab key to accept the entry.
4. To enter a fraction, type a number - even if it is zero, then space, and then the fraction ( a
numerator, the slash sign / and a denominator). If you omit the zero, the fraction will be
interpreted as a short date. Examples are 4 1/3, 27 2/7 and 0 3/8 (4 1/4 , 272/7 and 3/8). Excel
simplifies fractions when you enter them, if you enter 0 4/8, for example, Excel converts the entry
to 1/2 .
NB: a cell filled with # symbol indicates that the column is not wide enough to display the number.
You can change the number format or widen the column to display the number.
Text
Text entries include a combination of alphabets, numbers and symbols up to a maximum of 255
characters in a cell. To type a number as text, for example 0755296328, precede the number with an
apostrophe (‘), for example ‘0755296328.
1. Select the cell in which you want to enter text. Then, type the text into the cell, and press Enter.
2. If the current cell is not wide enough and the cell to its right contains data, then the text you enter
will appear to be truncated. To automatically fit the column to its widest text entry, double click
the right boundary of the column.
3. To enter a “Hard Return” in a cell, press Alt + Enter. A Hard Return is a new line contained
within the cell.
Saving a Workbook
To save a worksheet, one has to save the workbook in which it belongs using a unique name, on the
disk. When you save the workbook for the first time, you are prompted to specify the file name and
the location on disk in which to store it.
Use the following steps to save
1. Click the Save button or choose File/Save menu.
2. Specify a file name in the File Name box in the resulting dialog window.
3. Select the drive and folder where you want to save the file and click save
4. If it is an existing workbook, a Save message box prompts you to save the Workbook. Click Yes
to save the changes and close the file; or No to cancel changes and close the file; or Cancel to
return to the Workbook without saving.
Saving Automatically
Excel can save your Workbooks automatically, as you work on them by using the AutoSave feature.
You determine how often to Save and whether the setting is for the active Workbook or all open
Workbooks option.
1. With Excel Open, choose Tools/Options menu.
2. In the Autosave dialog box, check mark the Automatic Save Every check box and in the
Minutes text box enter the time interval for saving.
3. To Save all open Workbooks automatically, select the Save All Open Workbooks option,
otherwise, select the Save Active Workbook only option.
4. If you want to be prompted to save the Workbook, check –mark the Prompt Before Saving box
and click OK.
Closing a worksheet
Once you have finished working with a Workbook, close the file to clear it from memory. You can
close just the active Workbook or All open Workbooks at once.
1. To close just one Workbook, select it from Window menu and click File/Close menu.
Alternatively, click the close button of the Worksheet window.
2. To close all open Workbooks, hold the Shift key and click File / Close All menu.
i). Label
Any text or alphanumeric characters entered in a cell. Labels provides descriptive information and are
used as row and column headings to describe the contents of a row or column. A label has no
numerical significance in Excel and are aligned to the left of the cell.
ii). Values
Is a data that has numerical significance. Values includes numbers, date and time that you enter in
your worksheet. Values can be acted on by formulas and functions.
iii). Formulae
They are user designed mathematical expressions that create a relationship between cells and return a
value in a chosen cell. They perform simple calculations such as Addition, Subtraction, Multiplication
and division.
Note that a formula begins with equal sign (=) which tells Excel that the information you are about to
place in the cell is a calculation. E.g. To add the contents of two cells such as A1 and B1, and multiply
the results by 2,, the formula to use in cell C1 would be:
=(A1+B1)*2
Creating appropriate formulas requires the an understanding of the rules of precedence.
Entering a formula.
When typing formulas that have Cell References, you can either type out the cell address or click to
select the Cells. The formula also appears in the Formula bar as you type it. The cells that are referred
to in the Formula bar are highlighted with different color borders.
Spreadsheet formulas follow the same rules and logic used in ordinary mathematical formulas, the
only differences are in use of symbols and that in spreadsheet you start with an = sign.
To type a formula:
1. select the cell where you will place the formula
2. Type the equal sign (=) into the cell to begin the formula.
3. Enter the appropriate values, cell references and operators for the formula.
4. To enter a cell address you can either type the address or click on the specific cell or range.
5. When you finish typing the formula, press Enter to calculate the result.
ii). Functions
- Functions are inbuilt predefined formulae that the user can quickly use instead of having to create
a new one each time a calculation is to be done. OR
- Functions are ready-made formulas, built into the Spreadsheet, to perform a series of operations on
a specified range.
For example to determine the average of a series of numbers from A1 to A10, you can enter the
Function =Average(A1:A10).
Cell referredA B C D
to by1 B2
2 25 =A2*10
3 100
4
Fig. shows relative cell reference in a formula
When you copy the formula that uses a Relative Reference, the pasted formula will refer to a different
cell, but with the same relative position as with the original formula. E.g from the above worksheet,
when you copy the formula in cell B2 to cell B3, the formula changes from =A2 to =A3. in relative
terms, A3 is still one column to the left and one row above Cell B4. See below worksheet.
A B C D
1
2 25 =A2*10
3 100 =A3*10
4
To enter Functions into the Worksheet type the Function and Arguments in the Formula Bar or click
Insert Function menu then Function or Click Insert button, in the standard toolbar which walks you
through the process of creating a Function.
NB: When working with a huge range of value, you can paste upto a maximums of 7 IF Functions,
then command it to switch to place the condition in the next column. Also you can use Lookup
function for the same to paste more without breaking especially when grading.
(Attempt KCSE 2005 Qs.4)
The cells K3 to K10 of a worksheet contain remarks on students performance such as very good,
good, fair and fail depending on the average mark. Write a formula that can be used to count all
students who have the remark “very good”. (2 marks)
Countif: Counts the number of cells within a specified range that meets the given condition or
criteria. E.g. If B2:F2 contains Eggs, Beans, Beans, Eggs, Eggs: =Countif(B2:F2, “Beans”) will
return 2.
Sumif: It adds values in the cells specified by a given condition or criteria. E.g. If A10 to E10
contains values 40,20,60,85,50, to sum all values greater than 50 =SumIf(A10:E10, “>50”). This
returns 145.
ROUND ()
Rounds a number to a specified number of decimal places. Zero rounds off the number to the
nearest integer. E.g. =ROUND(46.678,1) returns 46.7 while =ROUND(D4,2) rounds the value in
cell D4 to two decimal places while =ROUND(49.768,0) return 50.
Product E.g. =Product(A1:B1). Multiplies the values in the cells.
Exponentiation (^): E.g. =A1^3
Enters the result of raising the value in cell A1 to power of 3.
SQTR(D3) – calculates the square root of the cell specified.
Division (/) e.g. =A1/B1
Divides the value in cell A1 by the value in cell B1
Subtraction E.g. =B1-B2
Minus (Subtracts) the value in cell B2 from the value in cell B1
Operator Function
+ (Plus) Adds values as specified
- (minus) Subtracts values as specified
* (multiplication) Multiplies values
/ (Division) Divides values
^ (Exponentiation) Raises a values in a cell to a specified
power.
( ) Parenthesis Encloses arguments to be calculated
first.
Order of execution
Operator Name Precedence
1. - Negation as in -1 1
2. % Percent 2
3. ^ Exponentiation 3
4. * and / Multiplication and division 4
5. + and - Addition and subtraction 5
6. =, <>, >, <, <=, >= Relational 6
Moving data
Unlike Copy command where a duplicate is created, the Move
(Cut) command transfers the contents of the original cell(s) to a
new location.
To move (cut) a range of cells:
1. highlight the range you want to move
2. From the Edit menu select Cut or click on Cut button or press Ctrl + X.
3. Specify the location you want to move the contents to.
4. Click Paste command.
Formatting text
You can format font face, size, color, style and apply
effects using Format/Cell menu then click Font tab.
Format font dialog box appears, which you use.
Text alignment
Excel automatically aligns Text to the left and Numbers to the right. You can override this automatic
alignment and specify how you want data aligned within the cell: to the Left, Right, Center, Justified,
or Centered across a Range of cells. By using Format/Cells command and click Alignment tab.
Select one of the alignment options in the horizontal or vertical drop-down list and click OK.
Rotating text
You can also align text so that the letters are stacked,
rotated counter-clockwise between 0 0 and 900
(reading downwards)., or rotated clockwise between
00 and -900 (reading downwards). To do this:
1. Select the cell or range containing data you want
to rotate.
2. Choose Format/Cells menu, and click Alignment
tab.
3. In the Orientation box, drag the red-tipped
pointer up or down to change the orientation; or,
specify a value between 90 and -90 degrees in the
Degrees box. Click OK.
To do this;
1. Select the cell or range containing data you want to format
2. Choose Format/Cells menu, and click Alignment tab.
3. In the Text Control area, select the Shrink to Fit check box. Then click OK.
Formatting Numbers
The formatting toolbar contains buttons to format numbers. To use these Tolls, select the cells, and
click the desired button.
Increase Decimal
Decrease Decimal
Number formatting options
Excel’s Format Cells menu offers a wide range of Number Formats and even allows you to create
Custom Number Formats. To use the Number Format in a worksheet, follow the steps below:
1.
Select the cell that contains the values you want to format.
2.
Select Format/Cells menu and click the Number tab.
3.
Select the required Number Format category you want to
use.
4.
For each listed category, the available types of format are
listed. Select the type you want to use. The sample box
displays the Format for the selected type.
5.
Click OK to assign Number Format to the selected cells.
Format Description
General Cells have no specific number format. Displays the value as you enter. It only
displays currency or percentage signs if you enter them yourself.
Number The default number format has two decimal places. Negative numbers are preceded
by a minus sign, may appear in red, or may be enclosed in parentheses.
Currency The default currency format has two decimal places and a dollar sign. Negative
numbers appear with a minus sign or may appear in red and/or parentheses.
Accounting This format is used to align dollar signs and decimal points in a column. The
default accounting format has two decimal places and a dollar sign.
Date The default Date format is Month, Day and Year, separated by slash. There are a
number of Date Formats.
Time The default time format is Hours and minutes separated by a colon. However, you
can opt to display Seconds, and am/pm (12-hour) or a 24-hour clock format.
Percentage The default Percentage format is two decimal places and a % sign. To display in
percentage, the value is multiplied by 100 and the results displayed with a
percentage sign.
Fraction The default Fraction Format is Up-To-One Digit type, but you can change it to Up-
To-Three Digit Format, or to one the common fraction formats.
Scientific e.g. 3.84E+12. The default Scientific format is one digit number with two decimal
places followed by the letter “E” (Exponent or Base 10), the plus or minus sign and
the exponent (power of) value.
Text The Text format is used to display both text and numbers in a cell as text. The cell
is displayed exactly as keyed in.
Special e.g. 000-00-0384 (Social Security Number). This format is especially designed to
display Zip codes, phone numbers and Social Security numbers according to the
country in which they are used. You do not have to enter special characters such as
leading zeros and hyphens.
Custom Use Custom format to create your own number format. You can use any of the
format codes in the Type list and then make changes to those codes. The # symbol
represents a number placeholder, and 0 represents a zero placeholder.
Worksheet borders
Placing Borders around cells adds emphasis, define data entry areas, or mark totals and subtotals.
To do this:
1.Select the cell or range where you want to add a border.
2.Choose Format/Cells menu and click the Border tab.
3.Select the Border
option.
4.If you want to
and select a color from the palate.
5.Click OK.
If you want to insert or delete multiple columns, select the same number of columns you want to
insert or delete, and Insert or Delete as explained above.
Using Autoformat
It allows applying one of the Sixteen sets of formatting to a
selected range on the worksheet. It creates tables that are easy
to read and are attractive to the eye. To apply:
1. Select a range e.g. A1:A10
2. Click Format menu then select the Autoformat
3. Select a format from the autoformat dialog box. Click OK to apply the format.
Data Management
Sorting: Is arranging data values in a particular order. To sort proceed as follows:
1. Highlight the Range you wish to sort
2. Click Data then Sort to display the dialog box. The sort by field is already reading the field that
you selected i.e. Criteria field.
3. Select the column you want to sort as either Ascending or Descending then click OK.
Filtering Data
You can use filters to display ONLY data that meets certain criteria. Its useful when you have a large
worksheet and you are only interested in a small portion. You can only apply filters to one list on a
worksheet at a time.
To autofilter data follow the steps below:
1. Click a cell in the list you want to filter
2. Select Data / Filter /Autofilter menu.
3. Drop –down arrows appear on each column heading. Click the drop-down arrow in the column
that contains the data you want to filter.
4. Click the value or range you want to use OR
5. click (Custom …) to filter by a condition, for example,
COMP/STUDIES is greater than or equal to 65 (See in the Fig)
6. to apply an additional condition in custom click And or Or option, for example, And
COMP/STUDIES does not equal 70
7. To apply additional sorting on other columns, repeat from step 3.
Example:
To filter the Form 2 student spreadsheet and show only data, where the mark for COMP/STUDIES is
greater than or equal to 65 And does not equal 70 then:
1. Select Data/Filter/Autofilter.
2. Click on the drop=down list arrow of COMP/STUDIES column.
3. Choose (Custom …) to define your conditions. The Custom Autofilter dialog box opens as
illustrated in fig. above.
4. Choose the criteria to use, for example;
After you specify the criteria illustrated above, the results are as shown on the left. Rows which do
not meet the filter conditions are hidden.
Summarizing Data
Subtotal function
In a long list you can use subtotal to automatically outline the information on a Worksheet.
To insert subtotals in a list, follow the steps below:
1. SORT the list by the column for which you want to calculate subtotals. For example, sort the
student marks by CLASS.
2. Click a cell in the list.
Total function:
You can use the Autocalculate feature in Ms Excel to automatically show the total of a selected range.
To find the total of a range, highlight it ten click the Autosum Icon on the standard toolbar.
Forms
This is a specially prepared template that can be used to enter data in a Worksheet. It is specially
formatted to enable users to enter data in a format that is more
convenient to them.
To display a form:
Click Data, then Form. A form sample of Form 2 spreadsheet is
shown on the right.
Input Validation
To ensure that a user does not enter invalid data, set the validation criteria. An error message is
displayed when data that violates this rule is entered.
To set data validation:
1. highlight the range of cells to validate
2. On the Data menu, click Validation.
3. Click the Settings tab and select a validation criterion.
4. To display an input message when cell is selected, click the Input Message tab, type the
message to be displayed and check “show input message when cell is selected”.
5. Set the Error alert then click OK cell.
Importance of charts
- Enable one to present Worksheet data in graphical form.
- It helps the reader to quickly see trends in data and to be able to compare and contrast aspects of
data.
Charting Terminologies
Term Description
Gridlines Typically gridlines appear along the y-axis of the Chart and is where your values
are displayed, although they can emanate from the X-axis as well. Gridlines help
you determine a point’s exact value.
Data series The bars, pie wedges, lines, or other elements that represent plotted values in a
chart. Often data series correspond to rows of data in your in your worksheet.
However they can correspond to columns of data if that is how you have arranged
your data.
Categories Categories reflect the number of elements in a series .Categories normally
correspond to the columns in your worksheet, with the Category labels coming
from the column headings.
Axis One side of a Chart. A two-dimensional Chart has an x-axis (horizontal) and a y-
axis (vertical). The x-axis contains the data series and categories in the chart. If
you have more than one category, the x-axis often contains labels that define what
each category represents. The y-axis reflects the values of the bars, lines or plot
points.
Legend Legend defines the separate series of a Chart. For example, the legend for a pie
Chart shows what each piece of the pie represents.
Types of Charts
The Chart type you choose depends on the kind of data you are trying to chart and how you want to
present that data. The various standard types include: Column, Bar, Line, Pie, XY (Scatter), Area,
Doughnut, Radar, Surface, Bubble, Stock, Cylinder, Cone and Pyramid. The following are the major
Chart types and their purposes:
CHART Description
PIE It displays the contribution of each value to a grand total; or shows the
relationship among parts of a whole, so that the reader can assess and
compare items readily.
COLUMN Represents data as a cluster of columns comparing values across
categories. Column chart is suitable for any data type, particularly side-
by-side comparisons of numerous data values. Is used to emphasize the
deference between items.
BAR It is similar to a column chart, but displays bars horizontally rather than
vertically. Used to compare values at a given point in time.
LINE Illustrates linear or unbroken changes in a large number of values. Data
is represented as lines with markers at each data value in the x-y plane.
This chart emphasizes trends and the change of values over time.
XY (SCATTER) It is similar to the line Chart. XY (Scatter) plots two groups of numbers
as one series of XY co-ordinates. It is useful as a diagnostic tool when
looking for heavy occurrences or absences of data. It is commonly used
in scientific applications.
AREA It shows how volume changes over time and emphasizes the amount of
change. It is useful for giving a bigger sense of “mass” of a change or
concept.
7. Finally, Excel asks whether you want to embed (incorporate within) the Chart (as an object) in the
current Worksheet (or any other existing
Worksheet in the workbook) or if you want to
create a new Worksheet for it. Make your
selection as shown, and click Finish. The
completed Chart appears.
Chart Title
Y - Axis title
Legend
X – axis title
The Charts are part of the current Workbook and are automatically saved when you save the
Workbook.
Data Ranges
A data range is a rectangular block of cells that provides the base data that is used to create the chart.
The data has to be absolute.
To see the data range of a chart, right click it then select the Source Data command
Labels
Refers to each data representation on a chart which can either be labeled by a value or text label.
To label:
1. Right click the chart, select Chart Options command from the shortcut menu.
2. Click Labels Tab and choose whether you want Value or Text labels. Click OK.
Printing a Chart
An embedded Chart is printed when you print the Worksheet that contains sit. If you want just the
embedded Chart, click the Chart to select it, and choose File/Print menu. Click Ok to print.
Changing the Page Setup
Page Setup can be used to change the page settings of the Worksheet within a Workbook through the
Page Setup dialog box
Setting Margins
By default, Excel prints a Worksheet with 1 inch margins at the top and bottom, and ¾ inch margins
on the left and right sides of the worksheet. You can change these margins by using the Page Setup
dialog box. Follow the steps below to do this:
1. With the Worksheet open, choose File/Page Setup and click Margins tab.
2. Specify the margins you want in the Top, Left, Bottom and Right text boxes.
3. To Center the Worksheet on the printed page, under Center on page select Horizontally and /or
Vertically option.
2. Click the drop-down arrow of the Header / Footer list boxes to see the Predefined options and
choose the desired one and click OK.
Print options
1. To print click File then Print command.
Review question
1. Describe two ways to complete an entry into a cell.
2. How does Microsoft Excel determine that an entry is a text or a formula?
3. How do you clear (erase) the contents of as cell?
4. How can you copy a formula?
5. Explain how you can print a worksheet in a landscape orientation.
6. How can you insert rows in a Microsoft Excel worksheet?
7. Differentiate between copying and moving data in a worksheet.
8. What is the autoformat feature?
9. Explain the term filter. How is a filter different from a hide command?
10. Why forms are needed in Microsoft Excel.
11. Give two examples of charts that you know.
12. Why are charts important in a spreadsheet?
13. Explain the concept of subtotals.
14. What is sorting? Explain how you can sort data in ascending order.
15. Give three number formats in Microsoft Excel.
16. What are worksheet borders? Explain how to implement them in the worksheet.
17. What is the difference between printing a range and whole workbook?
18. Explain two ways of changing the font size in Microsoft Excel.
19. What is a legend?
20. Which chart type will be suitable to show trends?
3.0 DATABASES
Objectives
By the end of the chapter, you should be able to:
a). Define a database
b). Explain the concepts of database
c). Explain data organization in a database
d). Create a data base
e). Edit a database
f). Design a form
g). Apply basic concepts of queries
h). Create report and labels
i). Print queries, forms and reports
1.0 DATABASES
1.1 Introduction
Traditionally people used to manage data and information using physical files indexed on one type of
information usually alphabetically or chronologically. These traditional databases had a number of
disadvantages which included:
i). Unnecessary duplication of data
ii). Boredom and time wasting while searching for a record
iii). Misleading reports due to poor data entry
iv). Poor update of records
Today, as organizations became larger and complex electronic (Computerized) database are used to
manage information, by use of special program called Database Management System (DBMS).
o Hierarchical
Data items are arranged in a hierarchy (tree) form.
Access is through levels e.g. to access level 2 data items, you have to first access level one data
items. It is said to have a Parent-Child relationship and the model represents One – to - Many
relationship.
Path
Disadvantages:
- It is not possible to insert a new level in the table without altering the structure.
- Does not support Many-to-Many relationship.
o Network
Links are used to express the relationship between different data items. Access is through multiple
paths and from any item.
Disadvantages
Incase of large volumes of data, it is very difficult to locate the item because it will increase the
complexity of the search
Note: All the three above models are rarely used in modern database system.
o Relational
Allows data to be represented in a simple row-column (Tabular) format. Each data field is
considered as a column and each record is considered as a row of a table. Related data items are
stored together in structures called relations or tables.. Links and relationships between items of
data are included during its creation, thus allowing faster and more efficient retrieval by the user.
4. In the grid displayed enter a unique name for each field in the table. A field must start with a letter
and can be upto a maximum of 64 characters including letters, numbers, spaces and punctuation.
5. Choose the correct data type before adding the next field. By default, Ms Access inserts Text as a
data type.
6. Save the table by clicking the Save button on the Standard toolbar or Save command from the File
menu.
7. Access will ask you whether you want to create a Primary Key. Click Yes/No
8. You can provide a brief description of the field and its contents in the Description section.
Field properties
This allows one to specify finer details related to fields and the table entries.
General Tab
To display the General Tab, the table should be open, then click View and select Design view or click
a button on the toolbar which look like a setsquare, pencil and a ruler. Click on Genaral Tab which is
located in the lower left corner of the Design view Window.
The various properties are:
Field Size – allows the user to set the number of characters in a field instead of the default 50 for
text fields. For numeric fields integer, bytes, single, double or long integer is used.
Format – used to define how data will be displayed or printed.
Decimal places – appears in currency and number data types to define the number of decimal
places to display.
Input mask – automatically format the field entry into a specialized format. Its limited to text ,
number, date/Time and currency data types.
Caption – is a more descriptive field used in form labels and report heading. E.g Adm/No could
be Admission Number.
Default value – is a value that appears automatically in the data sheet form if nothing is entered is
entered or defined otherwise.
Validation rule – is a logical expression used to ensure that data entered is within the required
specifications. For examples if a numerical value should always be greater than zero, then type >0;
or if you want to restrict marks entered in a filed to value between zero and a hundred, type >=0
and <=100.
Validation Text – this is a message that appears once the validation rule is violated. For example
for the above validation rules you may create a validation text to display “You MUST enter a
value greater than 0; “Enter a number between 1 and 100” whenever the user enters a value
outside this range.
Allow zero length – allows the user to proceed without making any entry in the field set as zero
length and it limited to Text ands Memo fields.
Required – determines if any entry must be made in the field before you proceed to the next
record or field.
Indexed – facilitates the organization of records for easy search. A primary key is an example of
an index set to No duplicates to control double entry (redundancy).
To reorder fields
Select the column of the field you want to move by pointing to the desired field name.
Drag the column upwards to the left to the top of the field where you want the field to appear then
drop.
Fig. 3.6
3. Choose the table or Query that contains the data that your new form will reference and click OK
4. From the fields list window, select the fields to add into the form by clicking the > button or click
>> to add all fields then Click Next. See fig. 3.6
5. From the layout dialog box, select the layout you
wish to use then click Next.
6. In the form title dialog box, type the name of the
form then click Finish.
Fig.3.7
NB: Use Labels Aa to type form header or information that does not need calculation. And text box
ab to type formulas (i.e calculations). Command buttons are mostly used in Forms. Drag it on the
grid. In the command button wizard that appears, it lets you to specify by selection the action you
want to happen when the button is pressed.
Removing controls
Use the following steps to remove a control:
1. Open the form to edit in Design View and display the toolbox.
2. Select the control you would like to remove and press the Delete key.
NB: Access dies not prompt you to verify the removal of some controls, be careful when removing
controls.
Formatting controls
The formatting toolbar has options that can be used to create professional forms.
To format a control follow the steps below:
1. Display the form in Design View.
2. Select the control you would like to format.
3. Click on the formatting button you require, for example to, if you want the field to appear in
Bold, click the Bold button on the Formatting toolbar.
Form layout
All forms must have a Detail section. This may include Page Header, Page Footer, Form Header and
Form Footer sections.
Form Header Displays information that remains the same for every record, such as a title for the
Form. A form Header appears at the top the section in Form View and at the top of
the first page when printed.
Page Header Displays information, such as a title or column headings, at the top of every printed
page. Page headers appear only on printed forms.
Page Footer Displays information, such as the date or page number at the bottom of every
printed page. Page footers appear only on printed forms.
Form Footer Displays information that remains the same for every record, such as command
buttons or instructions for using the form. A form footer appears at the bottom of
the screen in Form View or after the last detail section on the last page when
printed.
Creating Subforms
Subforms are used to display data from several tables that have a one - to – many relationship.
Using queries
A query is a tool used to search for or question a database on specific records and perform
calculations on fields from one or multiple tables. Queries are the fastest way to search for
information in a database.
Types of queries
They are two namely: action query and Select query
a) Action Query: Used to make changes to many records once. The four types of action queries
are:
Update – updates data in a table
Append query – adds data in a table from one or more tables.
Make table query – creates a new table from a dynaset.
Delete query – deletes specified records from one or more tables.
b) Select query
Most commonly used. It is used for searching and analyzing data in one or more tables based
on user defined criteria. It lets the user specify the search criteria.
Parts of a query
Field row: Fields from a table(s) to be use are arranged in this row and each field should occupy its
column.
Sort row: Used to specify the sort order i.e. ascending or descending or no sort by clicking the down
arrow.
Show row: You specify whether to display the field in the query by clicking. When the box is not
checked, the field will not be displayed.
Criteria row: you type conditional statement here that will be used by query to display specific
records.
Or row: Used to specify an alternative condition e.g. if you want to display records with a field called
City with items Nairobi or Embu, type Nairobi in the Criteria cell and Embu in the Or cell.
Specifying the search criteria
To search for a particular set of records, enter a conditional statement in the criteria row using either
relational or logical operators.
Relational operators include:
< - Less than
> - Greater than
>= - Greater than or equal to
<= - Less than or equal to
<> - Not equal to
Wildcards
Wildcards are characters used as placeholders for other characters when you don’t know
exactly what you are looking for, but know a part of the value, or you want to find values
that start/end with a letter or match a certain pattern. Wildcard characters work with text
and date types.
Character Description
* Matches any number of characters. It can be used as the first or last
character in the character string e.g Wh* finds what, when, while, why
? Matches any single alphabetic character E.g. B? finds ball, boy, bell, bull
[] Matches any single character within the brackets e.g. T[eo]ll finds tell,
toll but tall
! Matches any character not in the brackets E.g. b[!ae]ll finds bill and bull
but not bell or ball
# Matches any single numeric character E.g: 1#3 finds 103, 113, 123, 133,
143
Note: when using wildcard characters to search for an asterisk (*), question mark (?), number sigh
(#), opening bracket ( [ ), you must enclose the item you’re searching for in brackets.
Printing query
1. Open the database window of the Database containing the query you want to print.
2. Click query tab, then the query you want to print.
3. From the File menu, click Print. Set the printing options then click OK button.
Parts of a Report
Report Header: Contains un bound controls that displays title of the report
Page Header Contains headings or labels of data items to be displayed in every column
Detail section Displays data items or records from an underlying table or query
Page Footer Holds a control that is to be displayed on every page such as the page number
and date. For example =Now() displays the current date and time as set in the
system clock.
Report footer Display summary from a report such as the grand total for numerical data in a
particular field column. For example to get the Grand Total of Salary Paid or
Amount; in the Report Footer use Textbox control and type the following in the
formula.
=Sum [Salary Paid]) it will give you the sum of all records in that field name.
Modifying a report
To modify headers and footers
1. Open the report in design view
2. Click the report header or footer you want to modify
3. Make the necessary changes and then click Save button.
4. Click the print preview button to view the changes.
Modifying Labels
1. Change to design view. The label design grid is displayed. Edit the layout as desired like
changing font type, size and color, applying fill, alignment etc.
2. To view the modified label, click the Preview button from the database window.
Revision questions
1. What is the importance of a report generated from a database?
2. What is the difference between a report and a label?
3. Explain how you would create a report that displays subtotals and grand totals.
4. Dr. Garaya is a pharmacist. She wants to generate labels that she can use to stick to medicine
bottles. Explain to her how she can generate labels of different sizes using Microsoft Access
database.
5. What Microsoft Access objects would you use to automate your database?
6. Assuming you have been appointed as the sales representative of an Insurance Company. Explain
how you would create annual reports that would include the company logo at the top of every
page.
4.0 Definition
Publishing is a way in which information and experiences are shared by individuals, groups or
broadcast to a wide audience.
Publishing can also be defined as the process of producing publications like newspapers, cards,
pamphlets, pictures, calendars, etc that have special text and graphical layouts and designs.
Some examples of publishing media are:
Printed material like books, magazines
Radio, tape and digital music
Television , satellite TV, Cable TV, teletext
Cinema and video
Telephones, mobile phones, and pagers
Computers, laptops, palmtops, and handheld devices
The internet and other networked information systems
Compared to a Word Processor, DTP software gives the user more tools and control of the page
layout, text manipulation and graphic design than a Word Processor.
Page layout
Involves placement and arrangement of text and graphics on the page to produce documents
such as newsletters, brochures, books, etc. Also the user can design a page layout by setting
consistent picture and objects locations dividing page in a number of columns and creating
layer.
Printing
The main purpose of desktop publisher is to produce publications, therefore it helps the user
prepare what is refereed an artwork in commercial circles for printing.
Types of publications
- Flyers and posters
- Newspapers
- Newsletters
- Business cards
- Announcements and invitation cards
- Certificates
- Books
- Magazines, pamphlets and journals
- Calendars
- Brochures
A brochure is a small booklet used for advertisement. They are displayed in racks, on coffee tables
of waiting rooms, at product shows, and through direct mailings. Brochures are the most
frequently used advertising media, and are used to give information on specific product, event,
service or organization. Dated information and employee names are usually not printed in
brochures in order to extend its life span.
Horizontal ruler
Publication will appear.
NB: For examination purposes, strictly use Blank Print Publication to design your publication
and NOT templates.
To design your publication competently marry skills from Ms Word because this DTP package is an
advancement of some features from Microsoft Word.
Vertical ruler
Just like MS Word screen layout the Ms Publisher has menu bar, standard and formatting toolbar. In
addition it has Object toolbar.
Layout guides comprise margin, column, row, and baseline guides. They are used to create a grid on a
master page. This grid appears on every page in your publication where that master page is used. Use
layout guides to organize text, pictures, and other objects into columns and rows so that your
publication will have an ordered, consistent look. Set layout guides in the Layout Guides dialog box
(Arrange menu).
Margin guides (margin guides: Guides on the top, bottom, left, and right sides of a page that are used
to define its margins. Most contents of a page are within the margin guides.), column guides (column
guides: Vertical guides that are used to divide a publication page into two or more columns.) , and row
guides (row guides: Horizontal guides that are used to divide a page into two or more sections to help
structure the layout of the page.) are represented by blue dotted lines; baseline guides (baseline
guides: Guides to which lines of text can be aligned to provide a uniform appearance between
columns of text.) are represented by gold dotted guides; and ruler guides are represented by green
dotted lines.
Ruler guides
Are used to mark precise positioning of objects – a very important aspect of publishing.
Note Only 40 characters will display in the Edit Master Pages task pane.
o If you want your new master page to be a two-page spread, select Two-page master.
4. Click OK.
Every publication has one master page by default and must always have at least one master page. As
long as you have more than one master page, you can delete any master page you want. If you delete a
master page that is used by any publication pages, Publisher will apply in its place the first master
page listed in the Edit Master Pages task pane.
Margin Guides
To set margin guides click the Margin Guides tab then
specify Left, Right, Top and Bottom margins as well as
Spacing between the columns. Click OK.
Columns guides
To set column guides click the Grid Guides tab. Under Column Guides box, specify the number of
columns and spacing between them. If necessary Under Guides specify the number of columns and
spacing. Row guides are important if you were to design a publication and paste several copies e.g 4
or 6 instead of using ruler guides to partition. See figures below
4.6 Working with text
To add text using text frame tool in Publisher:
1. Click tool Marked A on the toolbox.
2. On the empty area on the pasteboard or printable area, drag to define the text block.
3. Type the text.
Text hyphenation
What is Hyphen?
dash showing word break: a punctuation mark (-) used at the end of a line when a word must be
divided or to link the parts of a compound word or phrase
Click in the text box or table frame that contains the text you want to hyphenate.
On the Tools menu, point to Language, and then click Hyphenation.
Click the Automatically hyphenate this story check box.
Note If you select a text box that is part of a story, the text in all the connected text boxes becomes
hyphenated as well.
You may want to control where hyphens occur in a word, especially if the word is long.
1. Select the word that contains the hyphen you want to change.
2. On the Tools menu, point to Language, and then click Hyphenation.
3. Clear the Automatically hyphenate this story box.
4. Click Manual.
5. In the Hyphenate at: box, do one of the following:
o To add a hyphen, click where you want to place the hyphen, and then click Yes.
o To remove a hyphen, select the hyphen, and then click No.
For a word that is always hyphenated and can be separated onto two lines, such as "two-
thirds," press hyphen (-).
For a word that is always hyphenated and can't be separated on two lines, such as "Lydia
Brown-Smith," press CTRL+SHIFT+hyphen (-).
For a word that can be hyphenated, but only when it's necessary to split the word onto two
lines, press CTRL+hyphen (-).
(overflow: Text that does not fit within a text box. The text is hidden until it can be flowed into a new
text box, or until the text box it overflows is resized to include it.),
If you type or import more text than the text box can hold, Publisher stores the extra text in overflow,
where you can't see it. Here are some ways to make the text fit into the text box.
1. Click the text box (text box: A movable, resizable container for text or graphics. Use text
boxes to position several blocks of text on a page or to give text a different orientation from
other text in the document.), table frame (frame: A space, shown onscreen as a box, that
contains a particular element of your publication. Types of frames include text boxes, table
frames, and picture frames.), or AutoShape (AutoShapes: A group of ready-made shapes that
includes basic shapes, such as rectangles and circles, plus a variety of lines and connectors,
block arrows, flowchart symbols, stars and banners, and callouts.) that you want to check.
2. On the Tools menu, point to Spelling, and then click Spelling.
3. In the Check Spelling dialog box, click the option you want for each word that appears in the
Not in dictionary box.
You can leave the spelling of the word as it is, change it, or add the word to the dictionary so
that Publisher ignores it when you use the Spelling feature again. You can ignore or delete
repeated words.
4. To check the spelling in every text box, table frame, and AutoShape in the current
publication, select the Check all stories check box.
5. To stop the spelling checker before it has finished, click Close.
Note Publisher can check for misspelled or repeated words in text boxes, table frames, and
AutoShapes, but cannot check Mail Merge fields or WordArt. For form controls, Publisher can
check text in option button and check box labels but cannot check the default text (default text:
Sample text for Web page visitors. This text will appear in the Web form control, assisting visitors in
entering information.) for command buttons, text boxes, or list boxes.
Tip
The default value for space before or after paragraphs is displayed in points. You can specify
other measurement units by typing the abbreviation for them after the numerical value: inches
(in), centimeters (cm), picas (pi), points (pt), or pixels (px). When you specify a unit other
than points, Publisher converts the measurement to points.
3. Under Line spacing, in the Between lines box, type or select the amount of spacing you want
between lines of text.
Tip
The default value for space between lines is displayed in spaces (sp). If you type a whole number,
Publisher interprets it as a number of spaces. You can specify other measurement units by typing the
abbreviation for them after the numerical value: inches (in), centimeters (cm), picas (pi), points (pt),
or pixels (px). When you specify a unit other than spaces, Publisher converts the measurement to
points.
Paragraph Indent
Tip
The default measurement units for indents are displayed in inches. You can specify other
measurement units by typing the abbreviation for them after the numerical value: inches (in),
centimeters (cm), picas (pi), points (pt), or pixels (px). When you specify a unit other than inches,
Microsoft Publisher converts the measurement to its equivalent in inches.
Adjust tracking
To change the spacing between all text characters, you need to adjust tracking. Tracking is available
only if you are working on a print publication.
1. Select the paragraphs you want to change.
2. On the Format menu, click Character Spacing.
3. Under Tracking, do one of the following:
o To adjust tracking automatically, click one of the preset spacing options.
o To adjust tracking manually, click Custom, and then enter a percentage between
0.1% and 600% in the By this amount box.
Adjust kerning
To change the spacing between two specific text characters, you need to adjust kerning.
Scaling is shrinking or stretching the width of a text characters to take the size you want and is only
available only if you are working on a print publication.
You can view an example in the Sample box at the bottom of the dialog box.
4.11 Creating and formatting a Table in Ms Publisher
You can add patterned borders and border art or transparent, gradient, texture, or pattern fill effects to
tables only if you are working on a print publication. If you are working on a Web publication, you
can apply solid borders and solid fills.
Under Line, select the options you want, and then click OK.
To add fills or fill effects to cells, rows, or columns, click the arrow next to the Color box and
then select the options you want.
Under Fill, move the Transparency slider to get the percentage of transparency you want
For example, to change the margins in a cell, click the Cell Properties tab, and then select the
options you want under Text Box Margins.
Rotating Objects
Select the object then hold down Ctrl key and rotate the green handle clockwise or anticlockwise.
NB: When you select the object, hold down the control key and drag the green rotation handle, it
creates a copy.
If the object is hidden, select any object, and then press TAB or SHIFT+TAB until the object
you want is selected.
It is crucial if you have several objects in a publication to be grouped together. To group use either of
the two approaches;
1). Hold down shift as you click each object
2). From Arrange menu select Group or press Shift + Ctrl + G in the keyboard.
Or
Revision questions
1. Define the term artwork.
2. What is publishing? Howe is desktop publishing a unique form of publishing?
3. List any four application window layout components found in a typical desktop publisher.
4. Explain the function of each of the following tools:
a). pointer tool
b). rectangle
c). text tool
d). rotate tool
5. Why are master pages important in a publication.
6. Differentiate between margins and columns guides.
7. How can you caliberate rulers to measure in millimeters?
8. Explain how you can draw a triangle of height 5cm and base 6 cm.
9. Why do you need to lock margins or objects in a publication.
10. Explain the following:
a). font type style
b). line stroke
11. How can you import a graphic into the publication
12. To change the page orientation to wide, click _______________ then __________________
and select _________ from the _______________________ dialog box.
13. To fill a polygon, click ______________ then select ________________ and ____________
from the dialog box.
14. Rotating means changing the __________ of an object.
15. The _________ tool is used to change the zoom settings of the application window.
16. _______ means cutting off the unwanted edges of a graphic object.
17. The small black objects that appear around a selected graphic are called ________________.
18. Expert tracking means _____________ while Kerning means __________________.
19. How can you change the boldface and font size of selected text at once?
5.0 INTERNET AND E-MAIL
Objectives
By the end of the chapter, be able to:
a). Define internet
b). Explain the development of internet
c). Explain the importance of internet
d). Describe internet connectivity
e). Identify internet services
f). Access internet
g). Use e-mail facilities
h). State the moral, social and spiritual issues that may emerge through access to the internet
e). Satellite transmission – is used for intercontinental transfer of data by having satellite base
stations transmitting the data through a wireless uplink channel to the satellite. The satellite then
sends the data signal to the base station on another continent where it is picked up and sent to
telephone exchanges for transfer to the destination computer.
f). Internet Service Providers (ISP’s)
ISP’s are companies that offers Internet services to end users through dial-up connections as well
as broadband services at a fee. There are several ISP services from which a user specifies the one
he/she needs. These include:
i). Limited access – this offer is for those who doesn’t need the service all the time. the user
sub-scribes for only the number of hours he/she needs the service per day.
ii). Unlimited Access - this is meant for those users who need to be connected to the Internet all
the time (24 hours).
Internet protocol
To achieve communication between computers and telecommunication devices that have
different hardware and software configuration a special software called Protocol is needed. A
protocol is a set of rules that governs how two computers can send and receive data on the
network.
There two types of protocols used with Internet:
i. Transmission control protocol (TCP)
It governs how data is transferred from one computer to the next.
ii. Internet Protocol (IP)
It determines the addressing system on the Internet.
Browsers
Is a special program that lets the user surf or browse the internet
A web browser can also be defined as a program used for displaying and viewing pages on
the World Wide Web. The most common Web Browser are:
Netscape Navigator
Internet Explorer
Mozilla browser
Before accessing the Internet, a person must start the Browser software.
E-mail software
E-Mail software is a communication software specifically designed and developed to help a person to
compose, send and receive (read) text documents on the internet. Both the sender and the receiver
MUST have an e-mail address. Examples of e-mail software:
Microsoft Outlook Express, Eudora, Yahoo mail, GMail, etc.
A website
Is a collection of web pages, or other resources located on a web server. The first page on a website is
called a home page.
Individuals and organizations establish Websites where their web documents can be placed for easy
access by external world. These sites are a special address called Uniform Resource Allocation (URL)
is used to access them.
Web portals – offer specialized services such as searching, e-mail, sports updates, financial, news
and links to selected websites.
A blog – a website that contains personal information which can easily be updated.
Multimedia sites contain photos, movies, music, web TV and internet radio. They are meant for
entertainment.
Examples of WWW Client programs are:
(i). Internet Explorer
(ii). Netscape
(iii). Mosaic
(iv). Lynx
(v). Charlotte
Links
To get from one Web page to another within a website, or another Web sites altogether, you have to
find Hypertext or Hypermedia on the Page you are viewing.
Hypertext - a system of storing images, text, and other computer files that allows direct links to
related text, images, sound, and other data
Hypermedia – (multi-media hypertext system): a hypertext system that supports the linking of
graphics, audio and video elements, and text. The World Wide Web has many aspects of a complete
hypermedia system.
Multi-threaded search engines are search engines that allow the user to search multiple
databases simultaneously via a single interface.
a) Log-in / Sign – in
Before you can have access to any mail box, the process of authentication must be done. This is
done by providing the correct user name and password for that account.
Logging-in/signing-in: is the process of authenticating yourself to the computer so as to be
allowed to check the contents (mails) in a mail box.
You will only be allowed entry after provision of the correct username and password. This is
normally for ensuring that there is enough security in storing mails in the internet.
To access the Website, type the full address of the website in the address bar then press enter key
or go icon. Some websites allow free access to all their pages by visitors while others require
people to be members hence a new visitor has to register (sign up).
b) Browsing / surfing
Browsing / surfing is the process of accessing Internet resources like web pages and websites,
using URL address or Hyperlinks.
c) Hyperlinks URLs and Search engine
Hyperlink are used to navigate from one web page to another. Cal also be explained as a text or
picture on an electronic document, especially web page that causes web pages to open when the
link is clicked.
Uniform Resource Locators (URLs) – is the Internet address of a particular Web page, it
connects the user to a particular website.
Downloading procedure
1. Right click the hyperlink to the file
2. On the shortcut menu, click the Save target as command.
3. After some searching the Browser displays the Save As dialog box. Specify the folder or drive
where the file is to be saved then type a unique name for the file in the name box.
4. Click the Save button and the download progress dialog appears on the screen. Unless
otherwise selected, the download will notify the user at the down load process.
5. Open the file in its application to view it.
Printing
To print a file, open it in the application in which it was created then send it to the printer for printing.
You can also print a web page directly from the browser window by clicking File then Print.
E-mail software
E-Mail software falls under special application packages communication software specifically
designed and developed to help a person to compose, send and receive (read) text documents on the
internet. Both the sender and the receiver MUST have an e-mail address.
The e-mails are usually stored in separate folders as described below:
Inbox – all incoming e-mails are stored here.
Outbox – contains e-mails that are waiting to be sent.
Sent – contains the e-mails that have already been sent.
Drafts – contains e-mails that have being worked on, and are not yet ready been sent.
Deleted items – contains e-mails that have been deleted. You can recover a deleted e-mail as long as
you have not emptied this folder.
Spam – contains mails from suspected sites e.g. may contain computer viruses.
An e-mail address directs the computers on the Internet on where to deliver the e-mail messages. A
typical e-mail format is described below:
Format: Username@Internat_address
Example: [email protected]
[email protected]
Each user ID is made up of two components: Username and Internet domain separated by an @ sign.
1) fauzifa – is the User name/ personal identifier and is usually coined by the user during e-mail
account registration.
2) @ is the symbol for ‘at’ which separates the username from the rest of the address.
3) Yahoo.com – is the name of the Host computer in the network i.e. the computer on which the
e-mail account is hosted.
4) The period “.” Is read as dot and is used to separate different parts of the e-mail address.
5) Com identifies the type of institution offering a particular service(s) and is called the domain
name.
6) .ke - is the country indicator.
E-mail facilities
1). Mails
a) Checking mails
In order to check mail the user has to open the e-mail account by providing the correct user name
and password. In e-mail account, click the inbox folder command to view link list of all received
mails.
b) Compose e-mail
Composing implies writing. To compose click the compose command. The command header
element in the new e-mail window are:
To: here, you enter the e-mail address of the recipient.
From: here, your e-mail software will enter your address automatically.
Subject: should contain a few words outlining the nature of your message. It is not mandatory to
enter something here, but it generally helps the recipient to know what is contained in the e-mail.
Cc: stands for Carbon Copy, and is used to copy an e-mail to other recipients. The main recipient
is able to see who the e-mail has been copied to.
BCC: stands for blind Carbon Copy, meaning that a copy of your message is sent to an extra
address, without any indication of that action appearing in the main recipients copy of the
message.
Date: the date and time the message is sent are indicated automatically from e-mail software.
Attachments – the name and location of any file you may be sending along with the e-mail.
c) Sending e-mail
To send mail, type the correct e-mail address of the recipient in To: text box, type your letter
then click Send command.
d) Forward e-mail – a received mail can be forwarded to another recipient. After reading click
Forward command and then provide the address of the recipient.
Revision questions
1. Define the term Internet
2. What is the difference between internet and Internet?
3. Explain the concept of web page.
4. Explain the following internet address http:// ww.google.com in reference to the structure of a
URL.
5. What is Internet telephony?
6. Describe the history of the Internet.
7. What is the world wide web (www)?
8. What is a browser software?
9. Draw a sketch of a simple browser toolbar and label its shortcut commands or icons.
10. Explain the process of loading a website in your browser.
11. List four e-mail services.
12. What is file download? Explain the procedure.
13. Explain the meaning of the word hyperlink.
14. Give three steps that you would follow to search for information on the web.
15. What would you do if a website refuses to load in the browser with the first attempt?
16. What is a search engine?
17. Explain the meaning of the term Internet Service Provider (ISP)
18. What three things apart from the computer itself are needed to connect to the Internet.
19. Explain the term modem.
20. What is a protocol? Write the following in full: TCP/IP, HTML,
It involves:
- Protection of data and information against access or modification
- Denial of data and information to unauthorized users
- Provision of data and information to authorized users.
Data control is the measure taken to enforce the security of programs and data.
Data and information privacy
Private data or information is that which belongs to an individual and must not be accessed or
disclosed to any other person unless with direct permission from the owner.
Confidential data – data or information held by a government or organization about people ,
must be protected against unauthorized access or disclosure.
Confidentiality
Sensitive data or information like employees details, business financial ,etc belonging to the
organization or government should not be accessed by or disclosed to unauthorized people.
Integrity
Means that data should not be modified with without owners authority.
Availability
Information must be available on demand.
6.5 Laws governing protection of information
Computer Ethics – are the moral principles and values that govern the actions and decisions of an
individual or group. They serve as guidelines on how to act rightly and justly when faced with
moral dilemmas.
ICT Legislation – these are laws that govern what information can be kept about an individual
and how that information may be used. Any activity that contravenes these laws is considered
illegal.
Viruses
The term virus stands for: Vital Information Resource Under Siege
A virus is a program that will change the operation of the computer without the user’s
information. Viruses attach themselves to computer files called executable files such that any
time such programs are run a copy of the virus is sent out. So it duplicates itself continuously.
Therefore a computer virus can be defined as:
- A self -replicating segment of computer code designed to spread to other computers by sharing
“infected” software.
- A destructive program that attaches itself to other files and installs itself without permission on
the computer when the files are opened for use.
- A program that can pass a malicious code to other non-malicious programs by modifying
them.
- A program or code that replicates itself and infects other programs, boot and partition sectors
or documents inserting itself or attaching itself to the medium.
Note: The main difference between a virus and a worm is that a viruses attaches themselves to
computer executable files while a worm attaches it self on non-executable files in the computer.
Control measures
Use surge protectors and UPS to protect computer systems against brownout or black out which
causes physical damage or data loss.
Install a Fault Tolerant system which has the ability to preserve the integrity electronic data
during hardware or software malfunction.
Disaster recovery plans by establishing offsite storage of an organizations databases so that incase
of disaster or fire accidents, the backed up copies are used to reconstruct lost data.
Unauthorized access
Physical access to computer system should be restricted to ensure that no unauthorized person gets
access to the system.
Form of unauthorized access:
(i). Eaves dropping / wire tapping
This is tapping into communication channels to get information packet sniffers can eavesdrop on
all transmissions and activities on the system
(ii). Surveillance (monitoring)
This involves where a person may keep a profile of all computer activities done by another person
or people. The gathered information is used for other illegal works. Special programs called
cookies are used by many websites to keep track of your activities.
(iii). Industrial espionage
Spying on your competitor to get information that you can use to counter or finish the competitor.
(iv). An employee who is not supposed to see sensitive data by mistake or design gets it.
(v). Strangers straying into the computer room when nobody is using the computers.
(vi). Network access in case the computers are networked and connected to the external world.
Control measures
1. Set up a comprehensive error recovery strategy in the organization.
2. Deny access permissions to certain groups of users for certain files and computers.
Physical theft
This involves the theft of computer hardware and software. It involves breaking into an office or firm
and stealing computers, hard disks, data and other valuable computer accessories by being taken away
by either an insider or an intruder. Most cases of theft are done within an organization by
untrustworthy employees of the firm {Inside job} or by an intruders (outsiders) for commercial,
destruction to sensitive information or sabotage resources.
Control measures
- Employ guards to keep watch over data and information centres and backup.
- Burglar proof the computer room.
- Reinforce weak access points
- Create backups in locations away from main computing centre.
- Motivate workers to feel sense of belonging in order to make them proud and trusted custodians of
the company resources.
- Insure the hardware resources with a reputable firm.
Trespass
This is the act of gaining access or entering into a computer system without legal permission.
Cracking
Refers to the use of guess work over and over again, by a person until he/she finally discovers a weak
in the security policies or codes of software. Alternatively refers to someone using his / her
knowledge of information systems to illegally or unethically penetrate computers systems for personal
gain.
Hacking
Refers to when an individual intentionally breaks codes and passwords top gain unauthorized access
into a computer system, but without intent of causing damage.
Tapping
Tapping is when someone gains access to information that is being transmitted via communication
links. Any information that is transmitted across a network is at risk of being intercepted, if
appropriate security measures are not put in place.
Piracy
Is the act of making illegal copies of copyrighted software, information or data.
To eliminate piracy
- Make software cheap, enough to increase affordability
- Use licenses and certificate to identify originals
- Set installation password to deter illegal installation of software
- Enforce laws that protect the owners of data and information against piracy.
Fraud
Refers to leaking personal or organizational information using a computer with the intention of
gaining money or information.
Example of fraud is where one person created an intelligent program in the tax department that could
credit his account with cents from all the tax payers. He ended up becoming very rich before he was
discovered.
Alteration
Refers to illegal changing of data and information with the aim of gaining or misinforming the
authorized users. When a system is compromised the data lacks reliability, relevance and integrity.
Example of data alteration are when students break into system to alter exam results, or someone
breaks into a banking system to change account details or divert money.
Spam
A spam is unsolicited electronic junk mail, often commercial, message transmitted through the
Internet as a mass mailing to a large number of recipients. Is send by a person gaining access to a list
of e-mail addresses and redirecting the e-mail through the Mail Server of an unsuspecting host,
making the actual sender of the spam difficult to trace. Spam is annoying, but usually harmless,
except in cases where it contains links to web sites. Clicking on these links may sometimes leave your
system open to hackers or crackers.
Audit trail
Computer Audit Trails are used to keep a record of who has accessed a computer system and what
operations he or she has performed during the given period of time. Audit Trails are useful both
for maintaining security and for recovering lost transactions. Audit Trails help to detect
trespassing and alterations. Incase the system is broken into by a hacker; an Audit Trail enables
their activities to be tracked. Any unauthorized alterations can be rolled back to take the system
back the state it was in before the alterations were done
Data encryption
Data encryption is a means of scrambling (or ciphering) data so that it can only be read by the
person holding the encryption ‘Key or ‘algorithm’. The key is a list codes for translating
encrypted data – a password of some sort. Without the key, the cipher cannot be broken and the
data remains secure. Using the Key, the cipher is decrypted and the data remains secure. Using
the Key, the cipher is decrypted and the data is returned to its original value or state. Each time
one encrypts data a key is randomly generated. The same key is used by the data recipient to
decrypt the data.
Data encryption is a useful tool against network snooping (or tapping).
Log files
They are special system files that keep a record (log) of events on the use of the computers and
resources of the information system. The information system administrator can therefore easily
track who accessed the system, when and what they did on the system.
Firewalls
A firewall is a program or hardware that filters information coming through the Internet and
connection into your personal computer or network. Firewalls can prevent unauthorized remote
logins, limit or stop Spam, and filter the content that is downloaded from the Internet. Some
Firewalls offer virus protection, but it is worth the investment to install Anti-Virus software on
each computer.
Security monitors
These are programs that monitor and keep a log file or record of computer systems and protect
them from unauthorized access.
Biometric security – is unauthorized control measure that takes the user’s attributes such as
voice, fingerprints and facial recognition.
Authentication policies such as signing users log on accounts, use of smart cards and Personal
Identification Number (PIN).
Regulations and laws in Kenya, United Kingdom and USA that govern data processing and
information security.
In Kenya, the Copyright Act was amended in 1996 to include protection for computer programs
and software copyrights.
1. Data and information should be kept secure against loss or exposure
2. Data and information should not be kept longer than necessary
3. Data and information should be accurate and update.
4. Data should not be transferred to other countries without the owner’s permission.
5. Data and information should be collected, used and kept for specified lawful purposes.
6. To observe copyrights for those who create original works.
Some laws governing privacy and confidentiality have been created, and can be summaries as
follows:
1) No secret databases – no keeping of personal data exclusively secret in government or private
organizations.
2) Right of individual access – an individual must be able to find out what information about
themselves is recorded and how it is used.
3) Right of consent – information obtained for one purpose cannot be used for other purposes
without owner consent.
4) Right to correct – an individual must be able to correct or amend records of his or her
information.
5) Assurance of reliability and proper use – data must be reliable.
Revision questions
1. Differentiate between private and confidential data
2. Why information is called a resource?
3. Explain any three threats to data and information.
4. Give two control measures you would take to avoid unauthorized access to data and information.
5. Explain the meaning of industrial espionage.
6. Differentiate between hacking and cracking with reference to computer crimes.
7. What reasons may lead to computer fraud?
8. Explain the term “information security”.
9. Why would data and information on an externally linked network not be said to be secure even
after burglar proofing a room?
10. How can piracy be prevented in regard to data and information?
11. Define a computer virus.
12. Give four rules that must be observed to keep within the law when working with data and
information.
13. Give and explain two types of computer viruses.
14. What is a program patch? Why are patches important?
15. Explain the measures you would take to protect your computers from virus attacks.
16. What is data alteration? Explain its effects on data.
17. How can you control the threat of user errors to data and information?
18. Data and information security has recently become very important. Explain.
19. Explain tapping while dealing with computer crimes.
20. Why do we need copyrights for data and information?
ANSWERS TO REVIEW QUESTION AND REVISION QUESTIONS
Revision questions
1. A graphic is a non-text object like a picture, drawing etc.
2. (a). Click it to select then drag
(b). Click it ten click the increase brightness button on picture toolbar.
3. Microsoft clip gallery, scanner, using drawing tool.
4. A graphic image that is predefined in shape but the user draws it by selecting it then dragging its
size on the screen.
5. (a). Select it then choose a different line thickness on the drawing toolbar.
(b). Select it then choose a fill pattern from the fill bucket on toolbar.
(c). Right click the autoshape then select the Enter text command. Type the text then click a blank
area on the screen to apply.
2.0 SPREADSHEETS
Review Questions 2.1
1. A ledger sheet is made up of rows and columns for entering / writing data.
2. a computer software that5 looks like the manual ledger sheet with rows and columns for entering
data that can be manipulated mathematically.
3. (i). (a). Electronic software that looks like the manual ledger sheet with rows and columns for
entering data that can be manipulated mathematically.
(b). Electronic spreadsheet has inbuilt formulae called functions that are nonexistent in
manual worksheet.
(c). Electronic spreadsheet uses the power of the computer to quickly carry out operations.
(d). Superior formatting and editing qualities of electronic spreadsheet make it better than the
manual worksheet.
(ii). (a). Has more memory than calculator
(b). Able to perform more complex and even logical operations but a calculator cannot.
(c). uses large storage capacity of computer that calculator doesn’t have.
(d). Large work area that calculator does not have.
4. (a) Worksheet
(b). Database
(c). Graphs
5. (a) Scientific applications
(b). accounting
(c). Forecasting
(d). Data management
(e) Mathematical operations
6. Predicting future trends using the goal seek command.
7. (i). D (ii). A (iii). B (iv). E
8. (a). Double click the shortcut icon on the desktop, OR
(b). Select Microsoft Excel from the programs menu
9. formulae – arithmetic and user developed
Functions – Inbuilt formulae. Some of them are macro functions.
10. =$F$10+$G$20
11. =B1+D2
12. one page in a workbook is called a worksheet
13. (a). Moves cell pointer to that cell.
(b). Moves cell pointer to end of current row.
(c). Moves cell pointer to cell A1
14. (a). Intersection between row and column
(b). Horizontal arrangement of cells
(c). Vertical arrangement of cells
15. click the File > Close command
16. R20C7
17. It is a cell reference that is a name.. To name a range, select it then type a name in the name box
then press enter key to apply the name.
18. A pre-formatted worksheet document used as a master layout for other. To start a template:
(i). Click File > New command
(ii). In the new dialog box click the spreadsheet solutions tab then double click the template that
you wish to start.
19. values, labels, formulae, functions
20. (i). Single referencing – for one cell, e.g. A1
Multiple referencing – for many cells, e.g. A1:B3
(ii). Range – a group of rectangular cells.
Revision Questions
1. (i). select a cell then type at keyboard; OR
(ii). Select a cell then double click the formula bar and type the value in the bar
2. Formulae have equal sign at the beginning while text has either letters or a combination of letters
and numbers
3. Select cell then press delete key on the keyboard.
4. Click the cell that has the formula than click the Edit > Copy command. Click the cell to copy
then click the Edit > Paste command.
5. (a). Click File > Page Setup command,
(b). On the Margins tab of the page setup dialog box, select the page orientation then click OK
button,
Send document to printer
6. click the insert > Rows command
7. Copying – makes duplicate of data.
Move – relocates data from one section of document to another.
8. A feature that applies a pre-formatted format on a selected range of the worksheet
9. a filter hides all the rows that do not have a particular selected value in a column
10. (a). A form helps users to enter values in a table with minimum errors.
(b). It hides the base data of the table hence enhances data security
11. Pie charts, Line Charts, Bar charts, Scatter charts, Column charts.
12. a chart represents sets of data in pictorial form hence makes the data easier to understand and
interpret.
13. Subtotals command groups and finds totals of similar data records of similar data records in the
spreadsheet.
14. Sorting is arranging data values in a particular order.
Procedure:
(i) Highlight data range to be sorted
(ii) Click Data – Sort command
(iii) In the sort dialog box, select the order of sort in the key fields than click OK.
2. i). Number ii). Currency iii) Textiv). Scientific v). Fraction iv). Time
3. Are printable borders inserted around cell borders.
a). Select the range then click Format – Cells command.
b). On the Borders tab, select the border styles then click OK to apply.
4. Print range – print a selected range. Print whole document – entire worksheet that has data.
5. Highlight range then select font size from formatting toolbar.
6. Is a key that shows the meaning of different data values in a graph that are usually represented by
different colors.
7. A line chart.
3.0 DATABASE
REVIEW QUESTIONS 3.1
1. A relational database is a model where information is stored in related structures
called tables or relations.
2. Tables: A structure used to store related records.
Records: related fields that represent a single data or entity.
Field: logical combination of characters that can be manipulated.
3. Objects which help the user easily manipulate data in a database include:
Tables Reports
Forms Macros
Queries Modules
2. To start Ms Access, click start button, point to All Programs then Microsoft Access.
To exit, Click exit or simply click the close button on the title bar.
3. Query : a database feature used to analyze data in a table.
Macro: a feature used to automate database operations.
Module: a programming environment embedded in Ms Access used to
Automate database operations.
REVIEW QUESTIONS
1. Report -used to give a summarized information for the purpose of presentation.
2. A report gives a summarized information for the purpose of presentation while a
label is a sticker placed on an item for the purpose of identification or description.
3. To create a report that displays subtotals and grandtotals, click Summary options
button in the report design grid in the grouping field footer and report footer
respectively.
4. Generating Dr. Garaya labels –refer to your handout notes.
5. Macros and Modules.
6. Drag the logo and drop it in the page header in the report design.
11. Tracking refers to changing the visual denseness or openness of characters in a line while
kerning is fixing particular pairs of letters that are too close or too far apart from each other.
12. Change case – change text case from upper to lower, sentence, title and toggle case while
drop cap refers to making the first character in a line bigger and drops down to occupy the
space in the next lines.
13. Fill and stroke – a stroke refers to a line style while a fill refers to applying background
pattern such as shading.
Revision questions
1. it is a publication that is ready for printing
2. The design and production of text and graphics layouts in mass.
3. (a). printable area (b). paste board (c).rulers (d). Menu bar
4. a). select text and graphic objects.
b). insert and select text in the application
c). drawing rectangles
d). moves objects around a fixed focal point.
5. helps user set general layout options that apply to all pages in the publication
6. Margins mark text areas on the page along the edges while column guides divide the page into
several fields.
7. right click a ruler then select millimeters
8. Drag ruler guides on the screen to mark a rectangle area of 5cm x 6cm on the screen. Draw a
rectangle in the guides. Select the rectangle and then click Element followed by polygon setting
dialog box, select 3 sides then click OK.
9. to hold them in place in order to avoid losing the format.
10. (a). The size, boldface, italics of font etc.
(b). Thickness of a line
11. click File then Place command. Browse for the file. Double click its icon. The mouse pointer
changes to become a loaded icon. Click anywhere on the pasteboard to place the graphic.
12. file – Document setup – Wide – Document setup.
13. element – Fill and stroke – Fill and colour type – Fill and Stroke dialog box.
14. angular placement
15. magnifier
16. cropping
17. place holders
18. Tracking refers to changing the visual denseness or openness of characters in a line while
kerning is fixing particular pairs of letters that are too close or too far apart from each other.
5.0 INTERNET AND EMAIL
Revision questions
1. It is a network of networks that covers nearly the whole world and enables transfer of
messages, data and information across continents.
2. Internet – organizational intranets and extranets.
Internet – an interconnection of internets and other networks and individual computers
globally.
3. A hypertext page prepared to display content on the web.
4. Http – hypertext transfer protocol.
www – world wide web
google – name of computer with web content
.com – commercial organization.
5. Transmission of voice data over the Internet.
6. Started with ARPAnet as detailed in the handout.
7. A virtual space on the Internet that allows web pages and sites to be accessed.
8. Software that allows viewing of web content.
9. Refer in the handout.
10. Start the browser software like Internet Explorer. Type the URL address of the web page you
wish to access in the address bar then press the Enter Key to load the website.
11. (a). sending/receiving text
(b). sending / receiving attachments
(c).Sending fax
(d). Keeping address book
(e). Mobile mail to mobile devices
12. Downloading or saving files form remote hosts on the Internet on to your computer.
- Right click the link to the file
- Select the Save target as command
- Select a folder and name for the file in the Save as dialog box then start saving the file.
13. A text or picture that is a link to another webpage on the Internet.
14. Check newsrooms for latest information on the topic then use a search engine to look for links
to the information required.
15. Click the refresh button.
16. A search engine is a special program that collects and stores links to information websites
allowing user to search its database for them.
17. 17 a company that offers Internet Services to end users.
18. Modems, Internet software, Internet service provider, Telecommunication lines, TCP/IP
protocols.
19. Modem – term stands for modulator demodulator.
20. Are special communication rules that govern sending and receiving of message by computers
on a network. Transmission Control Protocol (TCP), Internet Protocol (TP)
Introduction:
- In digital computers the user input is converted and transmitted as electrical pulses represented
in two states: “1” and “0” before processing.
- Data stored in a computer is usually in forms of bits/ binary digits. It is only in this form of
representation and the computer micro- processor can retrieve stored information and
manipulate it.
- The computer system is made up of logic that works only with states “ON” and “OFF’
represented by the two distinct digits “0” and “1” respectively.
KCSE 2006
1. What is meant by?
- Analog data: they are quantities that are continuous and infinite variety of values e.g.
temperature, pressure, flow rate, current, voltage.
- Digital data: they are input data, which uses two discrete states e.g. ON/OFF, YES/NO,
HIGH/LOW, RIGHT/WRONG.
Kcse 2005
Arrange the following data units in ascending order of size BYTE, FILE, BIT, NIBBLE (2 marks)
Answer: BIT<NIBBLE<BYTE<FILE {marked as a whole}
Kcse 2007
Explain the term nibbles as used in data representation in computers. (1 mark)
Answer:
A nibble is a group of four binary digits usually representing numerical numbers.
Absolute value is the magnitude of a digit in a number i.e. weight. Positional values are in increasing
powers of the base as we move left and decreasing powers of the base as we move right, i.e. whether
tens, hundreds or thousands.
e.g. N10 = 3 9 4 6
6x1 = 6
4 x 10 = 40
9 x 100 = 900
3 x 10001 = 3000
3946
The base value (radical base) depends on the type of number system that is being used, for decimal
system is 10. The weight of each position is multiplied by the corresponding digit to obtain the value
of that positional. The values of each position are then added to obtain the number.
In any number, the right most digit has the most value and is called the most significant digit (MSD)
Each position weight is the base of the number raised to a specific power. E.g.
= (3 x 103) + (9 x 102) + (4 x 101) + (6 x 100)
= 3000 + 900 + 40 + 6
= 3946.
The 16 symbols used in this system are decimal digits 0 to 9 and the alphabets A to F. a hexadecimal
number is usually denoted using 16 as a Subscript or capital letter H to the right of the number, e.g.
94B can be written as 94B10 or 94BH
The decimal equivalent of 94B16 can be worked out as
n10 = (9 x 162) + (4 x 161) + (11x 160)
= (9 x 256) + (4 x 16) + (11 x 1)
237910.
Note:
The main advantage that the octal and hexadecimal numbers have over decimal numbers is that they
can easily be converted to and from binary numbers.
Note
Whatever is on the left of the period is equated to zero when multiplied or you simply have it as a
zero. The equivalent of the fractional part is extracted from the products by reading the respective
integral digits from top to down.
Example
Convert 76.2510 to binary
2 76 Rem
2 38 0
2 19 0
2 9 1
2 4 1
2 2 0
2 1 0
2 0 1
7610 = 10011002
For a binary is the same approach only that the weights are based on factors of 2 e.g 11011011 2
Place value 21 20 . 2-1 2-2 2-3 2-4 2-5
Binary digit 1 1 . 1 1 0 1 1
Value in base ten 2 1 . 0.5 0.25 0 0.0625 0.03125
Work out the integral and fractional parts separately then combine them when converting a real
number from binary to decimal.
Example:
Convert 11.0112 to a decimal number
Place value 21 20 . 2-1 2-2 2-3
Binary digit 1 1 . 0 1 1
Value in base ten 2 1 . 0 0.25 0.125
0.5 x 0 = 0.000
0.25 x 1 = 0.250
0.125 x 1 = 0.125
0.37510
Example 2
Convert the octal number 11118 to its base 10 equivalent.
Soln.
Place value 83 82 81 80
Octal digit 1 1 1 1
Work out
512 x 1 = 512
64 x 1 = 64
8x1 = 8
1x1 = 1
585
Therefore 11118 => 58510.
Example:
Convert 0111011.0102 to octal.
First group into three bits from right to left in the integral part, then from Left to Right in the
fractional part.
222210 222210 222210 2-12-22-3
000 111 011 . 010
0 7 3 . 2
A C 2 7
1010 1100 0010 0111
Example:
Convert 91B16 into Octal.
Soln.
9 - 10012
1 - 00012
B(11) - 10112
100100011011
Group into 3 bits
(1 x 22+ 0x21 + 0 x 20), (1 x 22+ 0x21 + 0 x 20), (0 x 22+ 1x21 + 1 x 20), (0 x 22+ 1x21 + 1 x 20),
4 4 3 3
Therefore = 21116
Conversation from decimal to Octal
Divide repeatedly by 8 until the last result of the division is 0. Then write the remainder of the
numbers going upwards.
Example
Convert 5710 to octal.
Soln.
8 57 R
8 7 1
0 7
5710 = 718
8 123 R
8 15 3
8 1 7
0 1
For the fractional part, multiply this part by 8, that is you can only
0.50 x 8 = 4.00
For the fractional part, multiply this part by 8, that is 0.5 x 8 = 4.00.
You only use complete units and you read downwards, 123.510 173.48
Converting octal number to hexadecimal
Convert 3768 to hexadecimal.
Soln.
3 = 0112
7 = 1112
6 = 1102
Group into 4 bits 0 ,1111, 1110 then convert into hexadecimal as follows:
i). ( 23 x 1 + 22 x 1+ 21 x 1 + 20 + 1) = 15 (F)
ii). (23 x 1 + 22 x 1 + 21 x 1+ 0 x 20) = 14 (E)
Therefore 3768 FE16
Or
Change octal to decimal first then from decimal to hex as follows;
3768 3 x 82 + 7 x 81 + 6 x 80 = 25410
Divide the decimal repeatedly by 16 to change to hexadecimal.
16 254
16 15 R 14(E)
0 R 15 (F)
= FE16
Question:
Write the number 45110 in BCD notation.
Soln.
Workout each digit binary equivalent independently, where he digits are less than 4 add 0s on the left
to make 4 bits
4 = 0100
5 = 0101
1 = 0001
45110 = 010001010001BCD
ii). Extended Binary Coded Decimal Interchange Code (EBCDIC)
EBCDIC is pronounced as “Eb-See-Dick”. It represents characters using 8 – bits which allows
representation of more characters 256 i.e. 2 8. EBCDIC is mainly used on IBM computers. The eight
bits of EBCDIC are divided in two pieces. The first four bits are called the zone bit which represent
the category of the characters, whereas the last four bits are called the data bits and identify the
specific character.
2110= 101012
Therefore -2110 010102 (by complementing each binary digit / bit).
Therefore -2110 = 010102 (1’s complement method.)
Two’s complement
The 2’s complement of a binary integer is formed by finding the 1’s complement of the number and
adding 1 to it.
Advantages of 2’s complement
There is no two ways of representing a zero as in 1’s complement and signed magnitude.
Effective addition and subtraction can be done even with numbers that are represented with a sign bit.
Question: Using six bits, find the two’s complement of -2310. (4 marks)
Solution:
Step 1: Binary equivalent 2310 = 101112
Step 2: Add 0 in front of the MSB to make it six bits number = 0101112
Step 3 Find one’s complement = 101000
Step 4 Add 1 to number 101000
+1
101001
Signed magnitude
In decimal numbers, signed numbers has a prefix “+” for a positive number e.g +3210 and “-“ for a
negative number e.g. -3210. in binary a negative number may be represented by prefixing a digit 1 to
the number while a positive number may be represented by prefixing a digit number 0. i.e. 1710 =>
100012 (unsigned)
-1710 => to indicate it’s a negative number we add an extra bit (1)100012
+1710 to indicate its positive we add an extra bit (0) 100012
Binary addition
The binary addition is same as for decimal numbers only that any complete unit of two’s is carried to
be added to the next significant digit. The five possible additions are
A B Sum carry
1. 0 + 0 = 0 0
2. 0 + 1 = 1 0
3. 1 + 0 = 1 0
4. 1 + 1 = 10 1{read as 0, carry 1}
5. 1 + 1+1 = 11 1{read as 1, carry 1}
Examples:
i). Find sum of 1112 + 0112
Soln.
1 1 1
+ 0 1 1
10 1 02
Step 2 1000012
1112
1010002
Binary subtraction
There are four possible direct subtractions in binary as illustrated below:
1) 0 – 0 = 0
2) 12 – 0 = 1
3) 12 – 12 = 0
4) 10 2 – 12 =12{borrow 1 from the next most significant digit to make 0 become 10 2, hence 102 – 12
= 12}
When subtracting binary numbers the above rules should be understood and adhered to.
Examples:
1). Workout the following binary subtraction
11012
- 10102
Step 1 1-0 = 1
Step 2 10 – 1 = 1 {borrow 1 to make the current value 10 2
(22) from the next significant digit)
Step 3 0–0=0
Step 4 1–1=0
5. 1110112 6. 1000102
- 1102 - 112
6. 1000102 – 112 7. 011012 – 10112 8. 1111112 – 101011012
9. 111011012 – 1001112 10. 1000002 - 11112
Example
Subtract 100112 from 110012 using 1’s complement.
Step 1
Minuend => 1’s complement of 100112 = 011002
Step 2
Add minuend 1’s complement to subtrahend 110012
11001
01100
(1) 00101
Add overflow bit to the result + 1
001101
00110
Final result =
001102.
Example:
Subtract 3 from 5 in 8-bits 2’s complement.
+5 Subtrahend 00000101
+(-3) Minuend 00000011
Step 3 Add the two numbers now i.e. add the binary equivalent of 00000101
5 (Subtrahend) to the 2’s complement of 3 (Minuend) 11111101
(1)00000010
Revision questions
1). Explain the two types of data signals.
2). Differentiate between
a). Octal and decimal number systems
b). Binary and hexadecimal number systems
3). Convert the following binary numbers to their decimal equivalents
a). 1011102 b). 57010 c). 4210 d). 3010
4). Convert the following decimal numbers to their decimal equivalents.
a). 78910 b). 57010 c). 4210 d). 3010
5). Find the sum of the following binary numbers
a). 11102 + 11112 = b). 0012 + 1002 =
c). 11012 + 10112 + 1002 = d). 10102 + 1012 = e). 1112 + 112 =
6). Workout the following binary subtraction using direct, ones and twos complement methods.
a). 11001 – 1101 b). 1000 – 101 c). 100011 – 111
d). 10101110 – 1000110 e). 10001000110 - 101
7). Write down the character represented by the following codes.
8). Find the ones and twos complement of the following decimal number in binary form.
a). -7510 b). -8010 c). -10010
9). Determine the value of X in the equations:
a). 1001102 – X2 = 0010102 b). X2 + 11012 = 7010
10). Work out the decimal equivalents of the following binary numbers.
a). 0.100102 b). 101.112 c). 11.1012 d). 0.0012
11). Work out the binary equivalents of the following decimal numbers.
a). 0.3510 b). 2.5010 c). 0.2010 d). 7.12510
Data processing
Refers to;
1) Transformation of raw data into meaningful output (information)
2) The preparation, storage or manipulation of data / information.
3) The collection, manipulation and distribution of data to achieve a certain objectives.
Data processing can be done manually, mechanically or electrically.
Data collection
Processing
c). Processing
Transformation of input data by the CPU to a more meaningful output.
d). Output
Is the final activity of data processing cycle which produces the desired output (information)? The
information is then distributed to the target groups or stored for future use.
Distribution (dissemination)
Is the making information available to those who need it.
The accuracy of the data entered in the computer determines the accuracy of the information given out
hence the saying Garbage In Garbage Out, GIGO.
a) Misreading errors.
They are brought about by incorrect reading of source document by the user and hence entering
wrong values. Example typing 2754 instead of 2154; typing wrong characters e.g. datat instead of
data. There are also omission errors where a character has been missed onto. These errors may be
caused by bad handwriting or confusion on the source document. Example 0 instead of letter o.
b) Transposition errors
Are errors which occur due to a mistake made by interchanging (incorrect arrangement) of two
correct characters or numbers during typing e.g. typing 7754 instead of 7745. Transcription errors
can be eliminated by use of data capture devices.
DATA INTEGRITY
Refers to the accuracy and completeness of data entered in a computer or received from
information system.
Can also mean the condition in which data is unchanged from its source and has not been
accidentally or maliciously modified, altered or destroyed.
Relevance – the data entered must be pertinent to the processing needs at hand and must meet
the requirements of the processing cycle.
Audibility – auditability referred to as verifiability. This is the ability of users to check the
accuracy and completeness of information.
Specific objectives
By the end of the lesson the learner should be able to:
a). Define computer networking
b). State the purpose of computer networks
c). Describe the elements of a network
d). Describe the various types of networks
e). Describe the various types of network topologies
Transmission media is any physical or non-physical link between two or more computers and in
which a signal can be made to flow from source to destination.
Examples of shared resources include: programs, printers, fax machines, modems, storage devices,
communication links, etc.
Communication: is the process of transmitting data from one person or device to another.
Data communication:
- it is the transmission of data between a user and a computer or between computers, or
- the process of transmitting data signal from one point to another through the network.
Computer networking is the most efficient and reliable means of transmitting data.
Tele-communication: refers to data communications over large distances.
Signal modulation and demodulation: conversation of data signals to a form that is suitable for
transmission over a transmission medium. E.g. a modem converts digital signal to analog, a process
called modulation. A modem at the receiving end converts the analog signal into digital form, a
process called demodulation.
Multiplexing is the process of sending multiple data signals over the same medium e.g. a wire
conductor. Demultiplexing is the process of separating the multiplexed signals at the receiving end.
Computers share a single cable, different data signals are made to have different frequencies on the
cable so that they don’t interfere with one another. The different frequencies create different logical
Demultiplexor
Multiplexer
Multiplexed line
To computers
From computers
Throughput: is the measurement of how much data is being put through the wires (media)
connecting computer systems and devices. The data transmission rate is measured in bits per second
(bps).
Bandwidth:
- is the range of frequencies that can be accommodated on a particular telecommunications
medium; or
- the maximum amount of data that a transmission medium can carry at any one time e.g. 100mps
(megabits per second).
There are two main types of bandwidth namely Baseband and Broadband
Broadband transmission: It send analog signals with different frequency over the transmission
medium. Two computers can send signals at the same time in a network but at different
frequency. The advantage of broadband is that it transmits audio, video and digital data at the
same time. using a particular frequency. Several data signals can simultaneously be sent through
the same medium but at different frequencies unlike in Baseband signal.
Baseband signal: is a digital signal that is generated and applied to the transmission medium
directly without modulation. Signals are send at different times i.e. only one signal can be send at
a time. Two computers can send signals to the same network one at a time. Make use of
transceivers to transmit and receive digital data. Because signals are un-modulated, no modems
are required. Base band is simpler, cheaper and less sophisticated than broadband.
Test your knowledge
a). Explain the term broadband and base band
b). Differentiate between broadband and baseband.
Answer:
Baseband broadband
- transmits only digital data - transmits digital, video
and analog (audio)
Uses transceivers no modems Uses modems
A computer has to send a signal Signals of different
each at a time frequencies can be send
simultaneously
c). State two ways in which collision can be avoided in a wired network ( bounded media)
Sending signals at different times (baseband)
Sending signals with different frequency (broadband)s
Attenuation refers to signal loss i.e. the strength of the signal reduces as the distance increases or the
decrease in magnitude and energy as a signal progressively moves along a transmission medium. Is
corrected by placing signal amplifiers (repeater stations) along the medium at appropriate distances in
order to receive the weak signal, clean it and amplify it then retransmit it.
Disadvantages
- They require a greater bandwidth than analog signals
- Digital processing of data is very complex i.e. converting data from analog form to digital form.
Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless LANs use
high frequency radio signals, infrared light beams, or lasers to communicate between the
workstations and the file server or hubs. Each workstation and file server on a wireless network
has some sort of transceiver/antenna to send and receive the data.
iii). Metropolitan Area Network (MAN)
These are large networks that spans a university or city. They typically use fibre optics
connections to link LANs in different geographical area. It is a bigger version of LAN.
Advantage
Sharing of resources in different LANs.
iv). Wide Area Network (WAN)
Refers to computers connected together by telephone line, satellite or microwave linked over a
wide geographical area. The largest WAN is the Internet which uses point – to – point data
transmission method. This is a computer network covering a large geographical area such as a
country, a continent or the whole world. It consists of many LANs and MANs connected
together to form one large network. The Internet is a good example of WAN.
Advantages
Faster data transmission
Allows communication between users in remote locations.
NB: Only three are the basic: LAN, MAN and WAN.
Computer server
A computer server is a computer in a network that provides services to other computers on the
network.
There are different computer servers depending on their functions:
1). File server - are generally powerful PCs with a large RAM and large amount of hard disk space
dedicated to storing files in a network.
2). Server software – is a specials program run by network servers which controls computers on
the network and listens to client requests to service them over the network.
3). Print server is a computer that manages one or more printers in a network. It also distributes the
various printing work to different printers in a network.
4). Network server – is a computer that manages the network traffic, files, documents, emails that
travel in a network i.e. computer dedicated to servicing requests from other computers on the
network.
5). Email server - is a computer that acts like a post box. It manages the incoming and outgoing
mails in a network. It provides storage for emails and a set of defined rules for local users. The
rules determine how the server should respond to the destination of specific messages. It also
stores all the recognized accounts of the users in a network.
6). Proxy server - is a computer that acts on behalf of the client computer and the server in a
network. Proxy server provides security for incoming and outgoing data. It translates the
addresses to which data is being transmitted to.
Clients / work stations refers to other computers on the network that send requests to the server.
Remote communication
Remote communication refers to the transmission of data signals between two communication
devices located at different geographical locations. It enables people to share ideas and pass
messages over the Internet.
The computer mailing a remote request is called a remote client while the computer that is being
accessed is called a remote host.
Cost effective
Although the initial purchase and laying down of network components may be expensive, the
savings experienced and the value added to service delivery make them a ready choice for
enterprising managers. Network increases the efficient use of scarce resources e.g. printers, fax
machine, optical drives, files and applications. Transport and communication costs can be cut down
by use of video conferencing and electronic messages.
Reliability
Data can be transferred with a minimum error from source to destination. Incase one computer
breaks down, a user can still access data and information from other computers using another
computer on the network.
Speed
You can share and transfer files very fast. Otherwise, you have to copy the files to floppy
disks, then carry or send the disks from one computer to another. This method of transferring
files (called sneaker-net) takes a lot of time.
Security
Different user access levels and passwords can be created to restrict or block unauthorized
people from accessing or using files and programs. You can also make it impossible for any
user to copy network software by designing them as ‘copy inhibit’.
Easy installation of software
All software running in a network is normally loaded in one file server. No time and energy is
spend installing updates and tracking files on independent computers throughout the computer
installation.
Electronic mail
Because networks have both hardware and software that is necessary for the use of email this
helps in speeding communication among staff. A teacher can give students an email based
exercise which they can do and send it back as an attachment. Also a teacher can address
students within or outside campus using video conferencing resources.
Online collaboration
For schools that are connected to the internet students can collaborate with others in real time
(synchronously) or asynchronously. It has been tried out in UK using Gemini Project and
Japan has initiated online collaboration project called PANGAEA - a Greek word meaning
‘all lands’. For more information please visit: http://www.abcgemini.org and
http://www.pangaean.org
Networking helps in better control of resources and improved productivity.
Workgroup Computing. Workgroup software (such as Microsoft BackOffice) allows many
users to work on a document or project concurrently. For example, educators located at
various schools within a county could simultaneously contribute their ideas about new
curriculum standards to the same document and spreadsheets.
Limitations of networking
Costly to install:
The high initial cost of buying networks hardware and software is very high. You also need an expert
to set up the network.
Security issues
Networks are vulnerable to hackers, disgruntled employees or even competitors. These people can
easily try to break into a network system to read or damage crucial information. Much effort is thus
spend on trying to prevent unauthorized access to data and software.
Insulator Wire
conductor
Although the plastic insulator is meant to reduce inter-line interface, if several pairs of two-wire lines
lie side by side, transmission suffers from cross-talk (a problem where signals in one pair of wires
produces a magnetic field, which in turn causes a signal to flow in another pair of wires or unwanted
signals: unwanted sounds or other signals picked up by one channel of an electronic communications
system from another channel, e.g. between telephones or loudspeakers ). This problem sometimes
occurs with the telephone system when someone else’s conversation is heard on the line. Also the
wires capture environmental frequencies e.g. radio waves causing noise in the transmission channel.
Noise is random unwanted signals picked up by the channel.
A cable pair
The two common types of twisted pair are: unshielded twisted pair (UTP) and shielded twisted
pair (STP).
Unshielded twisted pair (UTP) is the most popular and is generally the best option for school
networks (See fig. 1). UTP cables don’t have a shield that prevents electromagnetic interference
(RMI) from the environment. It is susceptible to noise and signal interference. UTP is not suitable for
environments that are electrically noisy.
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has
four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to
help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting,
the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic
Industry Association / Telecommunication Industry Association) has established standards of UTP
and rated five categories of wire.
Use
Twisted pair
Unlike UTP the shielded twisted pair (STP) a braided shield is wrapped around the wires to shield or
protect them from noise. The extra covering in STP wiring protects the transmission line from
electromagnetic interference (EMI) leaking into or out of the cable. A disadvantage of UTP is that it
may be susceptible to radio and electrical frequency interference. Shielded twisted pair (STP) is
suitable for environments with electrical interference; it is difficult to tap data from an STP cable
however, the extra shielding can make the cables quite bulky and harder to install. Shielded twisted
pair is often used in Token Ring and Apple Talk networks.
Advantages of twisted pair cabling
- It is easier to set up network media like telephone systems using UTP
- Installation equipments is cheap and readily available.
- It is cheap because of mass production for telephone use.
Cabling has a single copper conductor at its center. A plastic layer provides insulation between the
center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside
interference from fluorescent lights, motors, and other computers and also prevents any internal fields
from escaping. The layers of insulation help minimize interference and distortion. Coaxial cables
transmit electrical signals that run through the central wire and the metal braid. Coaxial cable have
greater bandwidth of upto 1Gbps. These cables are widely used to connect 2 or more separate LANs
or worksites for Local Area Networks, office buildings and cable television to connect TV aerials.
Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials
(See fig. 5). LED is used at the transmitter to convert electric signal to light then at the receiving end a
photosensitive device is used to convert light back to electric signals that can be processed by
computer. It transmits light rather than electronic signals eliminating the problem of electrical
interference. It has also made it the standard for connecting networks between buildings, due to its
immunity to the effects of moisture and lighting.
Fibre optic cable is made up of core, cladding, buffer, strength members and the jacket.
The core is the central region an optical fibre through which light is transmitted. It is made up of glass
or plastic fibers.
Cladding is a single protective layer made of glass surrounding the core. It has a lower index of
refraction i.e. it has some light bending characteristics in that when the light tries to travel from the
core to the cladding it is redirected back to the core.
Buffer surrounds the cladding and its main function is to strengthen the cable.
An outer ‘protective layer’ or ‘jacket’ the layer is made up of Teflon or PVC and serves to protect the
core and cladding from damage.
The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install
and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.
Single mode fibre: has a very small core diameter of approximately 8 microns. It allows only one
mode of light to propagate. This makes it to have very low attenuation rate an d is preferred for long
distance transmission. It has a bandwidth of 50 Gbps.
Stepped multi-mode fibre: it has a relatively large core diameter of 50 to 100 microns (one millionth
of a meter) – much smaller than the diameter of a human hair. It allows many ‘modes’, ‘paths’ or
‘rays’ of light to bounce around inside the core reflecting off the cladding. This results in some rays
taking long path while others take a shorter path through the core.
Graded index multimode fibre: it has a gradual change in the core’s refractive index. The light rays
thus gradually bend back into the core path. This results in a better receive signal than with stepped
index.
Both stepped and graded index allows more than one mode light source to be fed in the cable, so
distortion occurs. Have a high attenuation rate and are used for shorter distances unlike single mode.
Light signal propagates through the core in a process called total internal reflection caused by
refraction. Refraction is the bending of light when it crosses boundary of two mediums that have
different density. Light is refracted back to the core from cladding hence propagate through the cable.
- Since they transmit light rather than electronic signals they do not suffer from electromagnetic
interference, radio interference or cross-talk.
- Are immune to the effects of moisture and lighting
- Transmit signals over much longer distances than coaxial and twisted pair
- Have a high transmission rates from 100 Mbps way up to 2 Gbps enabling services like video
conferencing and interactive services.
Disadvantages
- Are very expensive to install and difficult to work with.
- Are more fragile than wire and difficult to split.
- Physical vibration at times shows up as signal noise.
- Are difficult to configure or fix together
- If a cable breaks is difficult and expensive to repair.
BOUNDED MEDIA
Two wire open Twisted pair Coaxial cable Fibre optic cables
lines cables cables
Transmission and reception for wireless media are usually achieved by means of an antenna and can
be one of the following.
Directional: point – to – point focused beams employing high frequencies.
Omnidirectional: Waves propagating in all directions using signals of lower frequency
Ionospheric propagation
Definition of ionosphere: ionized layers in upper atmosphere: four layers of the Earth's upper
atmosphere in which incoming ionizing radiation from space creates ions and free electrons that
can reflect radio signals, enabling their transmission around the world.
This propagation bounces off the earths ionospheric layer in the upper atmosphere. It operates in the
high frequency (HF) of 30-85 MHz. because it depends on the earths ionosphere it changes with the
weather and time of day. The signal bounces off at the ionosphere and back to earth’s surface and the
receiver will pick the signal. The limitation of high frequency communication is signal interception by
unauthorized parties. AM radios operates in earth’s atmosphere.
Bluetooth
A short range wireless technology. Operate at approximately 1Mbps with range from 10 to 100
metres. Blue tooth is an open wireless protocol for data exchange over short distances.
The main component in Bluetooth is a small low power two-way radio transceiver, small enough to
be inserted in small devices. A network of Bluetooth enabled devices is called a wireless personal
area network (WPAN) or piconet. Bluetooth is best suited for personal or hand held devices thus
making it very popular in mobile communication and Internet connectivity.
Microwave Transmission
Microwaves are radio waves that provide a high speed signal transmission. The transmission process
involves sending signals from one microwave station to another.
Satellite communication
A satellite is a microwave relay station and the microwave earths stations make parabolic dishes with
an antenna fixed on them in order to focus a narrow beam towards the satellite in space. Satellite
communication is often used for long distances communications. Signals are send from earth station
to a satellite. Satellites are transponders (units that receive on one frequency and retransmit on
another) that are set in geostationary orbits directly over the equator. A satellite transmission system
has three main components:
a). Transmitter earth station – that set up an uplink to the satellite in order to transmit data. The
uplink has unique frequency.
b). A satellite – its in space where it receives, amplifies and retransmits the signal to a receiving
earth station via a downlink frequency different from that of the uplink to avoid signal
interference.
c). Receiving earth station - receive the sent signal on the other side of the globe.
New trends in microwave transmission have seen the use of very small aperture terminal (VSAT)
technology which is a very small satellite dish used in data, radio and TV. It enables direct access to
satellite communication.
Infrared transmission
Is a form of light which is invisible to the human eye but can be used in the same way as laser beams
to carry data. Communication is through transceivers, which must be within a line of sight in the same
room. It is used in TV remote controls but can also be used to communicate between computers or
between a computer and a printer at a short distance. Just like TV remote control, the signal needs a
clear “line of sight” between the sender and the receiver. Infrared signals cannot penetrate obstacles
like walls unlike radio signals. But the signals can be reflected off surfaces like walls and ceiling until
they reach their destination.
Example: an infrared transceiver on mobile phones once activated enables two people in the same
room to send messages to each other without going through the mobile service provider hence avoid
being charged.
In computer networking environment, the technology used to connect devices in the same room to
each other without need for cables e.g a computer to a printer.
Cellular radio
Use several radio communication technologies. The systems are divided to different geographic area.
Each area has low-power transmitter or radio relay antenna device to relay calls from one area to the
next are.
With so many users, it would be impossible to allocate individual radio frequencies to each cellular
telephone. With a cellular radio system, the country is divided into a number of geographical areas
called cells. These vary in size according to the number of mobile phones users in the area. Within
each cell, the phones can each operate on a different frequency so that privacy and security is
maintained.
COMMUNICATION DEVICES:
For the network to be fully operational computers and transmission media require communication
devices, to be used as interfaces or junctions between the terminal devices. Examples of data
communication devices are;
o Network interface card s(NICs)
o Modems and codecs
o Hubs
o Bridges
o Repeaters
o Gateways
o Switches
o Access points (AP)
1. Network interface card (NIC)
- Enables each computer on the network to be connected to the network cable. The NIC transmits
data from the computer to the network and receives the data packets from the network to the
computer.
- A network card is a circuit board with a back plate which slots into one of the expansion slots
at the back of the computer.
- It is also referred to as a network adapter card or a transceiver.
- Every card must have a network card driver (software) loaded in the computer, which provides
the communication between the card and the network operating system software.
- Currently, a good number of NICs are internal, with the card fitting into an expansion slot
inside the computer.
The main role of the network interface card is to:
(i) Provide a physical connection between a computer and data transmission media.
(ii) Prepare data from the computer for the network cable.
(iii) Send the data to another computer.
(iv) Control the flow of data between the computer and the cabling system.
NB: the performance of NIC depends on the card bus width (equal tot the computer bus width) and
the speed of the card.
3. Hub
Also called multi port repeater or concentrator, operates at the Physical layer and are simple devices
that pass all traffic from both directions they link. Hubs forward everything they receive. Hub
connects and amplifies digital signals from one computer, and transmits them to all other computers
in the network by broadcast. A hub will usually connect networks that have a common architecture
software usually called protocols. Protocols. Several hubs can be connected one after another to
expand a network. This increases the broadcast range which may lead to broadcast storms on the
network. Broadcast Storm: a condition where a network is overwhelmed with message broadcast
due to malfunctioning of network interface cards or hub related problems.
Purpose of Hubs: Provide a physical start topology. At the centre of the star is the hub, with the
network nodes located on the tips of the star
Disadvantage: hub may cause broadcast problem.
4. Repeater:
- Repeater works at the Physical layer and are fast in performance. A repeater solves the problem of
attenuation, which is the loss of power of a signal. A repeater takes an incoming signal and
repeats it, but at a higher power and noise- free. A repeater not only amplifies but also
regenerates signals.
- Signal regeneration means that the original signal is absorbed, copied and retransmitted along
another segment of cabling.
- The new signal has been beefed up and cleaned up and when it leaves the repeater is both
renewed and noise free.
- Under OSI model the repeater functions on the physical layer to regenerate BASEBAND digital
signals.
- A repeater does not check errors and does not re-package the original signal. If the signal had
become corrupted before reaching the repeater, the device would pass the corrupted data onto the
attached segment.
- Both segments connected by a repeater must use the same access method i.e. the logical link
protocols must be the same in order to send a signal.
- Repeaters can move packets from one physical medium to another e.g. they can take an Ethernet
packet from a thinnet coaxial cable and pass it on to a fiber- optic segment. In this case, the same
access method is being used on both segment but a different medium is used to deliver the signal.
- Because repeaters broadcast data from one segment to the next and back, are simplest to expand.
5. Bridges:
Operate at the Data Link layer and are fast in performance. Connect similar types of LANs (i.e.
Ethernet to Ethernet, Token Ring to Token Ring) over a wide area communication links. They
understand only data link layer protocols and addresses. They may connect similar types of cables.
- A bridge selectively determines the appropriate network segment for which a message is meant
for delivery through address filtering. A bridge can divide a busy network into segments to
reduce network traffic.
- A bridge is informed of where data is going to, and based on that information can make an
intelligent call whether or not to allow the data to go to the destination.
- Bridges operate on the data link layer of the OSI model. On this layer network systems group
packets from data off the wire and make a determination as to where the data goes.
- Each device on the network has a unique physical station address. This identification is used
by devices on a network to determine how to send data to one another. A bridge allows two
networks to be connected to one another, each moving its own group of devices with unique
station addresses.
Purpose of a bridge
o Isolates networks by Media Access Control (MAC) addresses i.e. it takes an overloaded
network and splits it into two networks, therefore they can divide the network to isolate traffic
or problems and reduce the traffic on both segments.
o Manages the network traffic by filtering packets. The term filtering packets refers to the
process of deciding whether or not to forward a packet.
o Translates from one protocol to another on the data link layer.
o Extend the length and the number of stations that a segment can support.
Advantages of bridges:
Increase the number of attached workstations and network segments.
It is possible to interconnect different segments, which use different MAC protocols.
Since bridges work at MAC layer, they are transparent to higher-level protocols.
By subdividing the LAN into smaller segments, overall reliability is increased.
Used for non- routable protocols like NetBEVI, which must be bridged.
Help localize network traffic by only forwarding data onto other segments as required
unlike repeaters.
Disadvantages:
The buffering of frames introduces network delays.
Bridges may overload during periods of high traffic.
Bridges, which combine different MAC protocols, require the frames to be modified by
transmission onto new segment, thus causing delays.
In complex networks, data is not sent over redundant paths, and the shortest path is not
always taken.
Bridges pass on broadcasts, giving rise to broadcast storms on the network.
6. Routers:
- Routers operate at the Network layer. The router interconnects different networks and directs the
transfer of data packets from the source to the destination. Routing depends on network address
enabled by a special internetworking protocol called the Internet Protocol (IP).
- All the computers on the same network have the same network address but different host
numbers.
- The router receives a packet from another router on the internet work and checks the destination
network address is the same as the one on which the router is, it passes the data packet to the
destination host by reading the host address otherwise the packet will be routed to the next
network address.
- A router links physically dissimilar LANs like Ethernet to token ring LANs. Some modem
routing devices combine the functionality of a bridge and a router using a device called a
brouter.
- Routers determine the best path for data to flow and filter broadcast traffic to the local segment.
They do NOT pass on the broadcast traffic.
In summary:
Require specific addresses.
Only pass packets to the network segment they are destinated for.
Routers do not talk to remote computers, only to other routers.
They can segment large networks into smaller ones.
They act as safety barrier (firewall) between segments.
They prohibit broadcast storms, because broadcasts and bad data not forwarded.
Are slower than most bridges.
Can join dissimilar access methods.
Routers do not look at the destination computer address but NETWORK address and only pass
on the data if the network address is known. This leads to less traffic.
Disadvantages of routers:
Do not send corrupted broadcast packets or corrupted packets.
Cannot transform information from one data format to another e.g. TCP / IP to PX / SPX.
Processing is intensively CPU.
7. Brouters
Are devices that combine the functions of both Bridges and Routers. It combines the best
qualities of both bridges and routers. When a brouter receives a data packet to be forwarded to
the remote segment, it checks to see if it recognizes the Network layer protocol. If the Brouter
does, it acts like a Router and finds the shortest path. If it doesn’t recognize the Network layer
protocol, acts like a bridge and forwards the data packet to the next segment.
Brouters connect mainly different types of LANs together like Token ring and Ethernet.
Brouters are more cost effective than individual bridges and routers.
8. Switches:
- Like Bridges, Switches operate at the Data Link layer (again understanding only data link layer
protocols and addresses.
- Unlike a Hub, a switch forwards a packet directly to the address node without broadcasting. A
node is data terminal equipment such as a workstation or computer on the network. Switches
connect two nodes point to point thus reducing the broadcast problems on the network.
- Switches are enhanced version of the hub and one switch may be used as a bridge to connect
several hubs thus reducing the collision caused by broadcasts.
- Switches are more expensive than hubs.
9. Gateways
A gateway is a translator which allows communication between dissimilar systems or environments
which do not use the same protocols, data formatting structure, languages and architecture.
Gateways work at the Application layer making communication possible between different
architectures and environments. They perform protocol and data conversion / translation by taking
the data from one environment, strip it, and re-repackage it in the protocol stack from the destination
system. They repackage and convert data going from one environment to another so that each
environment can understand the other environments data so that each environment can understand
the other environments data . Gateways can translate protocols and data.
Disadvantages
- They slow things down because of the work they do
- They are expensive
- Difficult to configure
Network software
The software is classified into two main groups namely;
1. Network operating system s
2. Network protocols.
Network operating systems are designed as multiuser operating systems that run the network server
program. Once installed on the right hardware platform and configured as a server, the OS will
provide network management tools to network administrators. These tools can be used to;
1. Secure network against unauthorized access
2. Track network usage and keep a log of all the people who have used the network.
3. Ensure inter-operatability between various systems on the network.
4. Performance monitoring to ensure maximum throughput on the network
The OSI, or Open System Interconnection, model defines a networking framework for implementing
protocols in seven layers. Control is passed from one layer to the next, starting at the application layer
in one station, proceeding to the bottom layer, over the channel to the next station and back up the
hierarchy.
The seven layers of networking is sometimes referred to the OSI Model, Open System
Interconnection. Networking is broken down by traveling through several layers or protocols. This
process is broken down into seven layers; Application Layer, Presentation Layer, Session Layer,
Transport Layer, Network Layer, Data Link Layer, and Physical Layer. When a person communicates
to another person on a network the information passes through these layers. It begins at the
Application Layer, works its way through to the Physical Layer and then back up to the Application
Layer.
(7) Application Layer- This layer is where the end-user (computer user) begins the
communication process. At this layer user authentication is identified and protocols like FTP,
TELNET, E-MAIL, and other file transfer protocols begin with the user starting the process.
(6) Presentation Layer - This layer is where encryption occurs. This layer converts the file
and/or information into a language (format) that the remaining layers can read and handle
without any compatibility problems.
(5) Session Layer - This layer is where the communication is coordinated. Applications are
managed in this layer. This layer manages the exchange of information by creating and
terminating all communication between the application layer at both ends.
(4) Transport Layer - This layer is responsible for ensuring the data completes it's
transmission to the other user. It's also responsible for flow control and error recovery.
(3) Network Layer - This layer is where the routing and switching takes place. Packet
sequencing, addressing, congestion control, and internetworking happen at this layer. Logical
paths are created at this level to allow users to communicate to each other. This layer utilizes
IP addresses.
(2) Data Link Layer - This layer is where packets (information) is broken into bits through
encoding and decoding. At this layer you have two sections; Media Access Control (MAC),
and Logical Link Control (LLC). The MAC section is where packets (information) is
gathered and gets permission to transmit the data. The MAC section is where your computer's
MAC address is located to allow proper delivery to a specific system (computer). The LLC
section controls synchronization, flow control, and error checking.
(1) Physical Layer - This layer is where your hardware such as ethernet cable, Network
Interface Cards, etc., provide the transmission through electrical impulse, light, and radio
waves. This layer is the hardware means of sending and receiving data (information).
The top four layers have been grouped together and are called ‘Application Set’ mainly concerned
with controlling how the various applications currently running are making use of the network.
The bottom three layers are called the ‘Transport Set’ concerned with passing of information through
the network.
Network protocols defines a language of rules and conventions for communication between network
devices.
Examples of network Protocols
Application layer Protocols
1. simple mail transfer protocol (SMTP) used to send e-mail
2. File Transfer protocol (FTP) allows files to be transferred over the internet
3. Apple share – apple computers networking suit.
4. AppleTalk – it allows for sharing of files and printers.
5. NCP
6. telnet (TELetype NETwork) – provide a method for establishing an interactive connection
between computer systems.
7. SNMP
8. SMB
Network topology is the way in which computers and other devices have been arranged or how data is
passed from one computer to another in the network.
Network topologies is classified into two: logical and physical topology.
The logical topology describes how the network works while a physical network describes how the
network has been cabled.
Data sent over the Ethernet exists in the forms of frames. An Ethernet frame contains a header, a data
section, and a footer having a combined length of no more than 1518 bytes. The Ethernet header
contains the addresses of both the intended recipient and the sender.
Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access with Collision
Detection). In this method, the computer senses that the cable is free then data is transmitted. If data is
on the cable, no other computer can transmit until the cable is free. If a collision occurs i.e two
computers attempt to transmit at the same time, the computers wait a random period of time and
retransmit. Each Ethernet device tests each frame to determine if it was intended for them and reads
or discards the frame as appropriate. Network adapters incorporate this function into their hardware.
Local Talk
It uses the method called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
How CSMA/CA works
The computer broadcasts a warning packet before it begins transmitting on the wire which
eliminates almost all collision. No computer attempts to broadcast when another computer
sends the warning packet. All other computers wait until the data is send.
The only drawback is that network is very high due to the broadcasting of the intent to send a
message.
The Local Talk protocol supports linear bus, star or tree topologies.
Physical Topology
Main Types of Physical Topologies
Linear Bus
Star
Star-Wired Ring
Tree
Considerations When Choosing a Topology
Summary Chart
Linear Bus
Also called multidrop/Ethernet/parallel
The file Server has a long data cable called the bus or backbone with a terminator at each end (See fig.
1). All nodes (file server, workstations, and peripherals) connect to a central cable. Wiring is usually
done point to point using coaxial cable. Data is broadcast along the cable with an identification. The
transmitted message is visible to all computers connected to that cable. The workstation with the right
ID takes the message while all the others ignore it. Data flows to and fro.
Terminator
The bus network topology use Ethernet which uses CSMA/CD {Carrier Sense Multi Access with
Collision Detection}
Star Topology
A star topology is designed with each node (file server, workstations, and peripherals) connected
directly to a central network hub or concentrator or switch. (See fig. 2).the main computer is the file
server or network server. Communication between any two stations is via the server. The ne6twork
server is the computer that controls all other computers and monitors user’s access to the shared
resources.
Data on a star network passes through the hub or concentrator before continuing to its destination. The
hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the
data flow. This configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.
The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a
similar topology, called the star-wired ring.
Users
Supermarkets, bank halls, airline booking, water billing offline mostly where similar tasks are done
by all workstations.
All devices are connected to one another in the shape of a closed loop, so that each device is
connected directly to two other devices, one on either side of it. Data flows in one direction thus
reducing the risk of data collision. To allow orderly access to the ring, a token is passed from one
computer to the next around the ring. When a data packet arrives with an address (destination) the
workstation takes it if it belongs to that address, otherwise it passes it on. A computer can only
transmit when it captures the token. A token is used to exchange data from one station to another.
Each station is responsible for regenerating and transmitting signals. In a ring topology, if a single
computer or section of cable fails, there is an interruption in the signal. The entire network becomes
inaccessible. Network disruption can also occur when computers are added or removed from the
network, making it an impractical network design in environments where there is constant change to
the network.
Ring networks are most commonly wired in a star configuration. In a Token Ring network, a
multistation access unit (MSAU) is equivalent to a hub or switch on an Ethernet network. The MSAU
performs the token circulation internally. To create the complete ring, the ring in (RI) port on each
MSAU is connected to the ring out (RO) port on another MSAU. The last MSAU in the ring is then
connected to the first, to complete the ring. Table 3 summarizes the advantages and disadvantages of
the ring topology.
It’s a Hybrid topology because it combines characteristics of linear bus and star topologies. It consists
of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 4). In this
topology the main file server connects to other File Servers and workstations, whereby the
workstations by be connected to other workstations. This network is very complex and on a Wide
geographical area. Tree topologies allow for the expansion of an existing network, and enable schools
to configure a network to meet their needs.
Users:
Large organizations e.g. National Banks, airlines, universities etc. which have operations over a wide
geographical area.
Mesh Topology
In this topology each computer on the network is connected to the others. Is mostly used in wide Area
Network where there are many paths between different locations. Devices are connected with many
redundant interconnections between the nodes. Every node has a connection to every other node in the
network.
Users:
Offices e.g. Newsroom, accounts department, etc.
Advantages of Mesh Topology
- Faster communication between work stations while still having access to the File Server.
- Efficient flow of data because data does not have to go through the file server.
- Suitable for a busy network
- It is highly fault tolerant. A single cable break will not stop network communications between
any two computers.
Disadvantages
- Used in a small Geographical area
- Supports few work stations
- It uses a large amount of network cabling making it expensive
Money. A linear bus network may be the least expensive way to install a network; you do not
have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter lengths of cable.
Future growth. With a star topology, expanding a network is easily done by adding another
concentrator.
Cable type. The most common cable in schools is unshielded twisted pair, which is most often
used with star topologies.
Summary Chart:
10BaseF - Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per
second) with a distance limit of 2000 meters per segment.
10BaseT - Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits
signals at 10 Mbps (megabits per second) with a distance limit of 100 meters per segment.
100BaseT - Ethernet specification for unshielded twisted pair cabling that is used to transmit data at
100 Mbps (megabits per second) with a distance limit of 100 meters per segment.
1000BaseTX -Ethernet specification for unshielded twisted pair cabling that is used to trasmit data at
1 Gbps (gigabits per second) with a distance limitation of 220 meters per segment.
Asynchronous Transfer Mode (ATM) - A network protocol that transmits data at a speed of 155
Mbps and higher. It is most often used to interconnect two or more local area networks.
AppleTalk - Apple Computer's network protocol originally designed to run over LocalTalk networks,
but can also run on Ethernet and Token Ring.
AUI Connector (Attachment Unit Interface) - A 15 pin connector found on Ethernet cards that can be
used for attaching coaxial, fiber optic, or twisted pair cable.
Bit - Binary digit in the binary numbering system. Its value can be 0 or 1. In an 8-bit character
scheme, it takes 8 bits to make a byte (character) of data.
Cable - Transmission medium of copper wire or optical fiber wrapped in a protective cover.
Client/Server - A networking system in which one or more file servers (Server) provide services;
such as network management, application and centralized data storage for workstations (Clients).
CSMA/CA - Carrier Sense Multiple Access Collision Avoidance is a network access method in
which each device signals its intent to transmit before it actually does so. This prevents other devices
from sending information, thus preventing collisions from occurring between signals from two or
more devices. This is the access method used by LocalTalk.
CSMA/CD - Carrier Sense Multiple Access Collision Detection is a network access method in which
devices that are ready to transmit data first check the channel for a carrier. If no carrier is sensed, a
device can transmit. If two devices transmit at once, a collision occurs and each computer backs off
and waits a random amount of time before attempting to retransmit. This is the access method used by
Ethernet.
Coaxial Cable - Cable consisting of a single copper conductor in the center surrounded by a plastic
layer for insulation and a braided metal outer shield.
Concentrator - A device that provides a central connection point for cables from workstations,
servers, and peripherals. Most concentrators contain the ability to amplify the electrical signal they
receive.
DIN - A plug and socket connector consisting of a circular pattern of pins in a metal sleeve. This type
of connector is commonly seen on keyboards.
Dumb Terminal - Refers to devices that are designed to communicate exclusively with a host (main
frame) computer. It receives all screen layouts from the host computer and sends all keyboard entry to
the host. It cannot function without the host computer.
E-mail - An electronic mail message sent from a host computer to a remote computer.
Ethernet - A network protocol invented by Xerox Corporation and developed jointly by Xerox, Intel
and Digital Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable
types at 10 Mbps (megabits per second).
Expansion Slot - Area in a computer that accepts additional input/output boards to increase the
capability of the computer.
Fast Ethernet - A new Ethernet standard that supports 100 Mbps using category 5 twisted pair or
fiber optic cable.
Fiber Distributed Data Interface (FDDI) - A network protocol that is used primarily to interconnect
two or more local area networks, often over large distances.
Fiber Optic Cable - A cable, consisting of a center glass core surrounded by layers of plastic, that
transmits data using light rather than electricity. It has the ability to carry more information over much
longer distances.
File Server - A computer connected to the network that contains primary files/applications and shares
them as requested with the other computers on the network. If the file server is dedicated for that
purpose only, it is connected to a client/server network. An example of a client/server network is
Novell Netware. All the computers connected to a peer-to-peer network are capable of being the file
server. Two examples of peer-to-peer networks are LANtastic and Windows for Workgroups.
Gigabit Ethernet - An Ethernet protocol that raises the transmission rates to 1 Gbps (gigabits per
second). It is primarily used for a high speed backbone of a network.
Hub - A hardware device that contains multiple independent but connected modules of network and
internetwork equipment. Hubs can be active (where they repeat signals sent through them) or passive
(where they do not repeat but merely split signals sent through them).
Infrared - Electromagnetic waves whose frequency range is above that of microwaves, but below that
of the visible spectrum.
Internet - A global network of networks used to exchange information using the TCP/IP protocol. It
allows for electronic mail and the accessing ad retrieval of information from remote sources.
LAN (Local Area Network) - A network connecting computers in a relatively small area such as a
building.
Linear Bus - A network topology in which each node attaches directly to a common cable.
LocalTalk - Apple Corporation proprietary protocol that uses CSMA/CA media access scheme and
supports transmissions at speeds of 230 Kbps (Kilobits per second).
MAN (Metropolitan Area Network) - A network connecting computers over a large geographical
area, such as a city or school district.
Modem (Modulator/Demodulator) - Devices that convert digital and analog signals. Modems allow
computer data (digital) to be transmitted over voice-grade telephone lines (analog).
Multiplexer - A device that allows multiple logical signals to be transmitted simultaneously across a
single physical channel.
Network Modem - A modem connected to a Local Area Network (LAN) that is accessible from any
workstation on the network.
Network Interface Card (NIC) - A board that provides network communication capabilities to and
from a computer.
Network Operating System (NOS) - Operating system designed to pass information and
communicate between more than one computer. Examples include AppleShare, Novell NetWare, and
Windows NT Server.
Node - End point of a network connection. Nodes include any device attached to a network such as
file servers, printers, or workstations.
Physical Topology - The physical layout of the network; how the cables are arranged; and how the
computers are connected.
Protocol -A formal description of a set of rules and conventions that govern how devices on a
network exchange information.
RAM (Random Access Memory) - The working memory of a computer where data and programs are
temporarily stored. RAM only holds information when the computer is on.
Repeater - A device used in a network to strengthen a signal as it is passed along the network cable.
Router -A device that routes information between interconnected networks. It can select the best path
to route a message, as well as translate information from one network to another. It is similar to a
super-intelligent bridge.
SCSI (Small Computer Serial Interface) - An interface controller that allows several peripherals to
be connected to the same port on a computer.
Segment - Refers to a section of cable on a network. In Ethernet networks, two types of segments are
defined. A populated or trunk segment is a network cable that has one or more nodes attached to it. A
link segment is a cable that connects a computer to an interconnecting device, such as a repeater or
concentrator, or connects a interconnecting device to another interconnecting device.
Sneaker-Net - Refers to a manual method of sharing files in which a file is copied from a computer to
a floppy disk, transported to a second computer by a person physically walking (apparently wearing
sneakers) to the second computer, and manually transferring the file from floppy disk to the second
computer.
Speed of Data Transfer - The rate at which information travels through a network, usually measured
in megabits per second.
Star Topology - LAN topology in which each node on a network is connected directly to a central
network hub or concentrator.
Star-Wired Ring - Network topology that connects network devices (such as computers and printers)
in a complete circle.
Tape Back-Up - Copying all the data and programs of a computer system on magnetic tape. On tape,
data is stored sequentially. When retrieving data, the tape is searched from the beginning of tape until
the data is found.
Terminator - A device that provides electrical resistance at the end of a transmission line. Its function
is to absorb signals on the line, thereby keeping them from bouncing back and being received again
by the network.
Thicknet - A thick coaxial cable that is used with a 10Base5 Ethernet LAN.
Thinnet - A thin coaxial cable that is used with a 10Base2 Ethernet LAN.
Token - A special packet that contains data and acts as a messenger or carrier between each computer
and device on a ring topology. Each computer must wait for the messenger to stop at its node before it
can send data over the network.
Token Ring - A network protocol developed by IBM in which computers access the network through
token-passing. Usually uses a star-wired ring topology.
Topology - There are two types of topology: physical and logical. The physical topology of a network
refers to the configuration of cables, computers, and other peripherals. Logical topology is the method
used to pass the information between workstations. Issues involving logical topologies are discussed
on the Protocol chapter
Transceiver (Transmitter/Receiver) - A Device that receives and sends signals over a medium. In
networks, it is generally used to allow for the connection between two different types of cable
connectors, such as AUI and RJ-45.
Tree Topology - LAN topology similar to linear bus topology, except that tree networks can contain
branches with multiple nodes.
Twisted Pair - Network cabling that consists of four pairs of wires that are manufactured with the
wires twisted to certain specifications. Available in shielded and unshielded versions.
USB (Universal Serial Bus) Port - A hardware interface for low-speed peripherals such as the
keyboard, mouse, joystick, scanner, printer, and telephony devices.
WAN (Wide Area Network) - A network connecting computers within very large areas, such as
states, countries, and the world.
Workgroup - A collection of workstations and servers on a LAN that are designated to communicate
and exchange data with one another.
Workstation - A computer connected to a network at which users interact with software stored on the
network.
Introduction:
The use of computers is spreading virtually in all areas. Some companies are using it for competitive
advantage while others are using it to be abreast of the latest in technology. Computers have been
applied in the contemporary society to add value to the information systems of various organizations.
An information system: is a collection of specific human and machine efforts required to support the
decision making process, data processing, information output and presentation.
APPLICATION AREAS OF INFORMATION AND COMMUNICATION TECHNOLOGY
1. FINANCIAL SYSTEMS:
Enable organizations to manage their finances and they include:
(a) Payroll systems.
(b) Accounting systems
(c) Banking systems.
(a) Payroll systems: it deals with the production of pay slips for employees and the maintenance of
records required for taxation and any other deductions. This happens at the end of each pay
period. The system processes the accurate information for employees including: gross pay,
deductions and net pay.
(b) Accounting system: are popular in business management. There are six business accounting
activities/subsystems as follows:
(i) Customer order entry billing: records incoming customer orders, authorizes delivery of
items or services ordered and produces invoices for customers who do not pay in
advance or on cash basis.
(ii) Inventory management: keep track of the items in stock and help the management
determine which items to reorder. Management will make enough stock at all times to
meet eh needs of the customers.
(iii) General ledger account: also known as nominal ledger. It contains a summary of all
business accounts. It is used in preparing balance sheet, profit and loss account, trial
balance, day book/journal, list of accounts, and so on.
» It is used to keep track of how much a business makes and is worthiness by summarizing
the financial transactions. It produces reports on income, sources of income, expenses,
and the net profit or loss earned.
(iv) Accounts receivable: keeps the money owed to a company by its customers e.g. when
goods are sold to a retailer, money owed on the sales is an account receivable item until
the payment is received. This helps the management to make a follow-up by billing the
customers for overdue charge.
(v) Accounts payable: keeps track of the amount the business owes to the others e.g. when
a wholesaler purchases goods from a manufacturer, money on the purchase is an
accounts payable item until the bill is paid. This helps the management to produce
cheques for payment of these amounts.
2. BANKING SYSTEMS:
Modern banks are self- service. Most of the work is done by the customer and not the bank
staff. The computerized banking services include:
(a) Processing customer transactions: computers are used in banks to carry out financial
transactions such as recording deposits, withdrawals and calculating interests on loans and
saving.
(b) Cheques clearing and processing: the use of Magnetic Ink Character Reader (MICR) details of
the cheques are automatically entered into a computer for cheques processing. The characters
identify the bank in which the cheque is drawn, the customer account number, the cheques
number and the amount of the cheques.
(c) Electronic funds transfer (EFT): is a method of transferring money from one bank account to
another without paper money changing hands. The money can be transferred instantly or at a
stated period of time.
Uses of EFT:
» Government departments and companies use it to deposit payroll into the employees
accounts directly.
» Individuals transfer money electronically from one account to another within the same
bank.
» Payments of goods purchased from a supermarket or any other retailer that has a
provision for electronic fund transfer.
» Paying electricity
» Direct payment of mortgage
Advantages
» Is quick and reliable
» Risk of loss or stolen or misdirected payments is minimized.
» The bank’s processing costs is lowered
Disadvantage
Customers are compelled to a fixed standard time of payment.
{EFT is the movement of money using Information and Communication Technology e.g. when
paying for goods using a credit card, payment is transferred electronically from the customer’s
account to recipient account.
Electronic method of moving money from one bank account to another without any paper
transactions.}
(f) Cash dispensers (ATMs): they are set outside banks and are linked to the central computer. An
ATM is simply a data terminal with two inputs and four output devices.
Input devices: card reader, a keypad.
Card- reader captures the account information stored on the magnetic stripe on the back of
an ATM/ debit or credit card.
A keypad is used by the card holder to tell the bank what kind of transaction is required e.g.
cash withdrawal, balance inquiry, deposit of cash, etc. it is also used to enter the cardholder’s
personal ID (PIN) for verification.
Output devices: a speaker, display screen, a receipt printer, the safe and cash dispensing
mechanism.
ATMs allow customers to do their banking at any hour of the day or night.
3. RETAIL SYSTEMS:
(a) Stock control: this is managing sensibly the amount of goods in stock. A computerized stock
control system enables a user to manage stock more efficiently.
Aims of stock control:
To keep enough of each item in a stock so that they do not run out.
To avoid making too much of any item(overstocking)
4. RESERVATION SYSTEMS:
Are distributed networked systems that are used mainly to make bookings in such areas as:-
(a) Hotel booking: booking and reservation of rooms in hotels are made from a remote
terminal connected to a centralized computer database. A customer makes enquiries via
the remote terminal connected to the central computer.
(b) Airline booking: major airlines have centralized databases. This means that all flights and
passengers records are stored in a computer system in one location. Travel agent from all
over the world can access each data via communication lines. In that way, agents book in
client where tickets have not been bought.
Reservation systems use real time processing.
5. EDUCATIONAL SYSTEMS:
(a) Computer Aided Learning (CAL): it involves using the computer as an aid to normal
teaching. Some CAL programs improve basic skills with drill and practice exercises
which provide extra motivation. Also have graphical presentations such as video clips and
voice for demonstrating or explaining difficult concepts. Can also be used to replace
difficult, dangerous or lengthy science experiments.
Advantages of E- learning:
It can work from any location and any time.
Courses can be tailored to specific needs.
Asynchronous reading is possible when communication takes place in turns.
It is very flexible.
You can save on traveling costs.
You do not spent a lot of time away from work.
It can lead to increased retention and a stronger grasp on the subject.
It can be updated easily and quickly.
It provides a consistent message.
Disadvantages:
It can at times make boring slides.
There may be monotonous speeches.
There might be little opportunity for interaction.
Categories of E- learning:
1. Knowledge of databases.
2. Online support.
3. Asynchronous training.
4. Synchronous training.
(d) E- curriculum: is the concept of learning with computers rather than learning about
computers. In this system all curriculum materials are loaded into a computer with sound,
animation and activities to rationalize the thinking and imagination of school- age
student.
(e)Computer based simulation: refers to the science of representing the behavior of a real
life situation by using computerized models. This program creates real situation which
replaces very dangerous and expensive experiments in science mainly used in areas where
practical skills have to be learnt like training pilots, engineers etc.
Common uses of simulation
Traffic lights {read more on page 192 Sec computer studies book 4 by Herman Oduor}
Thrill ride simulator
Flight simulation – pilots are able to practice landing and taking off.
A robot arm
Fire training simulator
Space shuttle simulators.
Nuclear power stations
Zero gravity simulator
Traffic lights simulations
Military operations simulation
Study of the origins of the universe
Circuit testing – for production of computer chips
Advantages of using a simulation
6. COMMUNICATION SYSTEMS:
Communication is the distribution of information or data from one person or location to another.
Effective and efficient data communication is achieved by use of high speed electronic devices such
as computers, cell phones, radios and TV.
ICT is the integration of computerized electronic devices and telecommunication infrastructure for
the purpose of communication. Some of the communication systems include:
(a) Facsimile (fax): is a telecommunication device used to send digitized images along
telephone lines. The fax machine at one end scans the document and converts it into
analog form then transmitted over the telephone line. The fax machine at the receiving
end uses these signals to reproduce a hard copy of the document.
Advantages of fax:
There is instant transmission thus making it quite faster compared with letters.
It is convenient and simple. Documents with signatures and handwritten are send.
Hard copy is produced.
A document can be faxed to any part of the world so long as the recipient has a fax
machine.
If a computer has a fax modem, the fax will be answered and automatically stored on
the hard drive.
Disadvantages:
Faxed printouts are sometimes of poor quality.
Can be slow to send bog documents because every paper has to be scanned and
converted into digital form before being sent.
The telephone line cannot be used whilst you are sending faxes. You must separate fax
number to avoid this problem.
Faxing text that is in color is not easy.
Advantages:
People in different places can link up to see and hear each other. This saves the time
and cost of traveling to meetings.
Meetings can take place without one leaving the office.
Meetings can be arranged at a short notice.
Participants can still attend meetings even if they are physically unable e.g. weather
preventing them from traveling.
You can even send text messages to a lecturer over a long distance in real time.
Disadvantages:
It provides low quality pictures.
It may not be as productive as a face to face discussion round a table.
Meetings may be disrupted due to a technical failure.
Setting up the whole system is quite expensive.
It may not be necessary for confidential documents e.g. a contract to be viewed and
signed in- person.
(f) Internet:
Internet transmits huge amounts of information in form of words, images and sounds.
Some of the services available on the internet are:-
(i) World Wide Web (www):
WWW refers to a collection of web pages which may be made up of text, images,
animations, sounds and video held on web servers. One can access information using a
computer or other devices like mobile phones.
NB: for a mobile phone to be used to access the internet, it must have a wireless
application protocol. (WAP)
(ii) E- mail:
This is a system that allows a person to type out a text message on his/ her computer. Once
you subscribe for internet services through a service provider, you can send or receive e-
mails to or from anyone connected to internet using a computer or a WAP- enabled cellular
phone.
Advantages of E- mail
Sending messages is much faster.
It is cheaper.
You can send one message to a number of people.
You can send attachments.
The message arrives almost immediately.
One can send replies immediately.
Graphics and text can be electronically transmitted and placed in a document by the
recipient.
Some E- mail systems will notify you when an e-mail has been read by the recipient.
If your message does not reach its destination, you are immediately notified.
Disadvantages:
You can only send letters and attachments but not physical objects like parcels.
You must subscribe to ISP
Sending e-mail messages can be expensive when lines are busy.
Not all businesses or homes have equipment for sending e-mail.
You may end up getting a lot of mail that you do not need i.e. spam or junk mail.
Unless you make a new email alert, you have to remember to check your mail box.
7. INDUSTRIAL SYSTEM:
(a) Computer Aided Design or Computer Aided Manufacturing. (CAD or CAM):
Is the use of a computer to help in the drawing of designs from which objects are
going to be manufactured or constructed. In CAM or CAD, the computer is involved
in all the stages from design to manufacture.
One application of CAM is the use of robots to carry out assembly line operatives. A
robot is a computer controlled device that emulates a human being in carrying out
operations that would otherwise be hazardous, repetitive and boring to a human being
e.g. welding, lifting heavy objects, spray painting of vehicle bodies, removing red hot
materials from furnaces etc.
(b) Industrial simulation:
This allows some activities that would otherwise be expensive and dangerous in real life
situation to be put under test e.g. a plane crash test simulation with the use of a visual model on
the computer screen that represents the real situation or object.
(c) Modeling:
Computer modeling is the creation of electronic representations of objects or ideas, computer
model shows what something might look like when the real thing would be too difficult or too
expensive to create and visualize.
Disadvantages
It can lead to unemployment as fewer employees are needed
The initial cost of the system may be expensive.
9. LIBRARY SERVICES:
(a) Lending services:
Computerized library system manages the issuance and return of borrowed reading materials.
Books, magazines, reports etc. are given unique identification numbers or codes. Member’s
details are recorded once a book is borrowed and updated when the book is returned to reflect
new status.
(c) Cataloguing:
Computerized catalogues have replaced manual card catalogue which enhance service delivery
and efficiency. The electronic catalogue is updated constantly when new reference materials are
acquired.
(b) Games:
Three dimensional multimedia games are now possible on personal computers. There are
computer games that simulate sports e.g. driving, war combat, etc. such games give the player
maximum pleasure in a virtual environment on the screen.
13. MARKETING:
(a) Electronic commerce (E- commerce)
E- Commerce has changed the way in which goods are sold. A large number of dot com
companies have cropped up that operate solely from the internet. Even supermarkets are selling
goods and arranging home delivery via the internet. Therefore e- commerce involves the
carrying of day- to- day transactions of an enterprise electronically through the internet.
(c) Advertising:
It is possible to create advert materials and video clips using simulation, presentations and
animation software and then have them displayed on billboards, broadcasted over television or
place them in internet.
REVISION QUESTIONS:
1. (a) What is meant by computer Aided Manufacture? (2 marks)
(b) Give two examples of Computer Aided Design software. (2 marks)
2. (i) What is simulation? (1 mark)
(ii) Name two application areas of simulation. (2 marks)
(iii) State two advantages of Computer Based Simulation. (2 marks)
3. Explain two ways in which ICT can enhance commerce. (2 marks)
4. describe the following network services and identify their application:
(i) Voice mail. (2 marks)
(ii) Video conferencing. (2 marks)
5. distinguish between the following:
(a) tele text and videotext.
(b) CAI and CAL.
(c) e- learning and CBS.
6. i) What is tele working? (1 mark)
ii) State three advantages and two disadvantages of tele working. (5 marks)
iii) Give four examples of the expert system. (4 marks)
7. Explain the concept of biometric analysis. (2 marks)
8. Explain why computers have become important in library management tools.
(2 marks)
(iii) Job displacement { no loss of job, one is shifted to section/departments computer skills not
required}
This is the true process of placing manpower with computerized machines and an employee is
moved to another place or department where computer skills are not required e.g. a data clerk
reduced to an office messenger. However, to avoid losing competent employees in- service training
may be done.
2. AUTOMATED PRODUCTION
This involves computerization of production processing industries i.e. The use of computer aided
production which does not require high manpower.
Outsourcing means constructing outside business or services to perform the work once done
in- house. Contractors do the work more cheaply and efficiently. Therefore, downsizing has led
to outsourcing of non- core services for example organization contracts a transport firm to ferry
its stuff instead of using company transport i.e. budget buses (nrb) are constructed by several
companies to ferry their workers.
(v) Isolation
People can conduct business and communication without ever coming face to face. Computers
workers can work by taking the instructions from computer screen, sending and receiving memos to
each other electronically without engaging in personal conversation. These people feel isolated
from other workers.
Ergonomics: science of designing the work place for the comfort and safety of the workers. This is
a study of how living and working conditions can be adapted to the information technology. The
need for better working environment has resulted to designing of special furniture to prevent
backaches, special monitors to prevent eye- strain etc.
4. ENVIRONMENTAL
(i) Environmental pollution
Huge garbage dumps of dead computer parts, printers ink toner cartridges, monitors and other
computer accessories are disposed in large fills hence causing environmental pollution and leaking
into underground water tables and catchment areas.
(ii) Energy consumption and radiation
Initially, computers consumed a lot of energy hence generated a lot of hear and emitting
electromagnetic radiation. In recent years, the environmental protection agency (EPA) launched
energy star policy to encourage minimal use of power of electronic devices.
5. CULTURAL EFFECTS
The introduction of computers and particularly the internet has had a very negative impact on some
users. It has actually made them to engage in criminal or immoral practices. ICT has changed the
way we talk, affected our privacy, human rights and integrity. Examples include:
o Watching pornographic materials which is morally wrong and institutions should use filters to
block such sites.
o Flaming which is writing online messages that use derogatory obscene or dirty language.
o Credit card fraud when using e- commerce where customer’s credit card details have been made
public.
o Hacking- which is unauthorized access to companies/ banks/ users files and possible
manipulation of data. Hackers are also called superhighway thieves or computer junkies.
o Spreading viruses- certain users enjoy spreading viruses either for personal interest or financial
gain.
o Compromising moral integrity through use of computers to forge certificates, passports and other
documents.
o Data sabotage - hacking illegal destruction of data and information into a rival company where
you may delete or attempt eaves- dropping.
Tapping without authorization into communication lines over which computer data and messages are
sent.
o Piracy- making unauthorized copies of copyrighted computer software.
o Manipulating stored personal data e.g. removing a criminal record.
Solutions:
Several legislations have come up to protect computer based data e.g.
The electronic communications act in 2000 (mainly for e- commerce)
The copyright act which was amended in 1996.
Designs and patents act of 1998.
Data protection act of 1998.
Computer act of 1990.
Therefore, at times it is a matter of personal conscience that can help user decide on whether our act is
right or wrong. This is what computer ethics is all about.
Disadvantages:
Make mistakes and they do not learn from them.
Are difficult to build.
They require a lot of space.
Human beings can easily become slaves of it.
Heavy usage of expert systems can make experts to lose their jobs.
Can only be built with the help of experts alone.
Lack of human touch.
6. ROBOTICS
Robotics is the study, design and use of robots.
A robot is an automated device used to perform tasks that are difficult and dangerous for a human
being. Also a machine that is designed and programmed to perform a specific set of tasks without
human interactions.
Perception systems are sensing devices that emulate the five common senses of a human being i.e.
sight, hearing, touch, smell and taste.
Types of robots:
Types of robots include mobile robots, industrial robots, perception robots.
They can be found in these areas:
Manufacturing industry.
The military.
Space exploration.
Transportation.
Medical applications.
Uses of robots
o Perform dull and difficult jobs like lifting heavy objects, painting, handling chemicals and
welding, automobiles and manufacturing industry i.e. car manufacturing.
o High risk jobs, in design field, space-based robots.
Advantages of robots
They can work 24 hours, all year round without getting bored or taking a break.
Can work faster with high productivity than human beings.
The output is of consistently high quality.
Performs repetitive tasks that are monotonous to human beings.
Are more accurate than humans.
Can work in conditions that would appear hostile or dangerous to humans such as under water
and in radioactive environments.
Disadvantages
They are expensive to build, install and maintain (too expensive to buy and operate).
They are not flexible as they are designed to do one job.
The robot may malfunction and cause a lot of chaos or a batch of faulty goods e.g. water
heaters all with electrical faults.
They cause job replacement.
Evil people may use robots in war to manipulate biological material.
Components of a robot
A robot is made up of:
A microprocessor to process the data from the sensors.
Actuators and mechanical parts e.g. motors, pistons, grippers, wheels, gears. These help
robots to move or operate external devices.
Sensors – for visional sight.
REVISION QUESTIONS
1. Discuss these applications of computers in our lives (4 marks)
Medicine
Commerce
Education
Military
2. (a) Explain with examples the following effects of computers on employment:
(i) Job creation (2 marks)
(ii) Job replacement (2 marks)
(iii) Job displacement (2 marks)