Course Material: Kwara State Polytechnic, Ilorin
Course Material: Kwara State Polytechnic, Ilorin
iLORIN
OPEN DISTANCE AND FLEXIBLE
e-LEARNING (ODFeL)
COURSE MATERIAL
FOR
1
Course Outline
Study Modules 1: History, classification and Impact of Computers
Study Session 1: History of Computers
Study Session 2: Classification of Computers
2
STUDY MODULES 1
HISTORY, CLASSIFICATION AND IMPACT OFCOMPUTERS
Contents
Study Session 1: History of Computers
Study Session 2: Classification of Computers
STUDY SESSION 1
HISTORY OF COMPUTERS
Introduction
You are welcome to the first study session of the first module in COMM 101. Computer is
fast becoming the universal machine of the 21st century. Early computers were large in size
and too expensive to be owned by individuals. Thus, they were confined to the laboratories
and few research institutes. They could only be programmed by computer engineers. The
basic applications were confined to undertaking complex calculations in science and
engineering. Today, computer is no longer confined the laboratory. Computers and indeed,
computing have become embedded in almost every item we use. Computing is fast becoming
ubiquitous. Its application transcends science, engineering, communication, space science,
aviation, financial institutions, social sciences, humanities, the military, transportation,
manufacturing, extractive industries to mention but a few. This unit presents the background
information about computers.
3
2.1 Definition of Computers and its Basic Components
A Computer is an electronic device that can perform activities that involve Mathematical,
Logical and graphical manipulations. A computer System is used to describe a collection of
devices that function together as a system. It performs the following three operations in
sequence:
1. It receives data & instructions from the input device.
2. Processes the data as per instructions.
3. Provides the result (output) in a desired form
4
3. Output device: decodes information and presents it to the user
Central Processing Unit: It is the part of the computer that carries out the instructions of a
computer program. It is the unit that reads and executes program instructions. Hence it is
known as the brain of the computer. The CPU consists of storage or memory unit, Arithmetic
Logic Unit (ALU) and control unit.
(a). Memory Unit: It is also known as the primary storage or main memory. It stores data,
program instructions, internal results and final output temporarily before it is sent to an
appropriate output device. It consists of thousands of cells called storage locations. These
cells activate with off-on or binary digits (0, 1) mechanism. Thus, a character either a letter or
numerical digit is stored as a string of (0, 1) Binary digits (BITS). These bits are used to store
instructions and data by their combinations.
(b) Arithmetic and Logical Unit (ALU): It is the unit where all Arithmetic operations
(addition, subtraction etc.) and logical functions such as true or false, male or female are
performed. Once data are fed into the main memory from input devices, they are held and
transferred as needed to ALU where processing takes place. No process occurs in primary
storage. Intermediate generated results in ALU, CPU, output device, input device, Memory
unit, Control Unit and ALU are temporarily placed in memory until needed at later time. Data
may move from primary memory to ALU and back again to storage many times before the
process is finalized.
(c). Control Unit : It acts as a central nervous system and ensures that the information is
stored correctly and the program instructions are followed in proper sequence as well as the
data are selected from the memory as necessary. It also coordinates all the input and output
devices of a system.
5
Pascal’scalculator:
Pascal‘scalculatorwasthefirsttruemechanicalcalculator.In1642,attheageof19,theFrenchphilo
sopherandmathematicianBlaisePascaldeveloped
arotatingwheelcalculator,ofthelatterpopulardesktopcalculator.
TheDifferenceEngine:Thedifferenceengineisbelievedtobetheforerunnerofthemodern
computer. CharlesBabbage(1792-1871),aBritishmathematicianand
engineer,isconsideredbymanytobetherealfatheroftoday‘scomputerdevelopedthe Difference
Engineandthe Analytical
Engine.Healsodesignedasignificantlyimprovedversionofthedifferenceengine(butnotbuilt)c
alledAnalyticengine.Ithasdifferentkeycomponents:
• Thestore:A memory wheel consistingof set of counter wheels
• Themill:
Anarithmeticunitcapableofperformingthefourbasicarithmeticoperations.Itoperatedon
pairsofmechanicalregistersandproducedaresultstoredinanotherregister,allofwhichwer
elocatedinthestore.
• Operationcards:Thesecardsselectedoneofthefourarithmeticoperationsbyactivatingthemi
lltoperformtheselectedfunction.
• Variablecards:These cards
selectedthememorylocationstobeusedbythemillforaparticularoperation(asourceofoper
andandthedestinationoftheresult).
• Output:wastoprintoracardpunchdevice.
HermanHollerith’sTabulatingMachine
HermanHollerithwasastatistician,in1880,hedevelopedthetabulatingmachinecommissionedby
theU.S.CensusBureau.
MarkI:DevelopedbyHowardAikenatHarvardUniversityin1944,MarkI,wasthefirstelectromec
hanicalcomputer.Instructionswereprovidedbymeansofpunchedpaper
tape,whichcombinedthefunctionsofBabbage‘soperationcardsandvariablecards.Eachinstructio
nhadtheformat:A1A2OP, whereA1andA2areregistersstoringtheoperandsandOP
istheoperationtobeperformed (e.g.+,-
,x,%).MarkI,wasabletodoasingleadditionin6secondsanddivisionin12seconds.
6
ENIAC (Electronic Numerical Integrator and Computer)
Thiswasthefirstelectroniccalculatorandfirstgeneral-
purposedigitalcomputer.Thismachinewasenormous,weighing30tons.,occupying15,000squar
efeetoffloorspaceandcontainingover18,000vacuumtubes.Whilerunning,
itusedtoconsumeover140KWhofpower.Ithadthecapacitytoperform5,000additionspersecon
d.Itsmemoryconsistedof20―accumulators‖eachcapableofholdinga10-digit
decimalnumber.Thefollowingaresomeof the characteristics of ENIAC.
ENIACdidnotuseinternallystoredprograms.Programswerewiredonboardssimilartoatelepho
neswitchboard.OneofthemajordrawbacksofENIACwasthatithadtobeprogrammedmanu
allybysettingswitchesandpluggingandunpluggingcables.
DevicesthatpredatesmoderndaycomputersareAbacus,Pascal‘scalculator,theDifferenceengi
ne,HermanHollerith‘sTabulatingMachine,MarkIandENIAC.AmongthemENIACwasregar
dedasthefirstelectroniccalculatoranddigitalcomputer.
Commercial
Computers:The1950ssawthebirthofcomputersindustrywithtwocompanies,SperryandIBM,d
ominatingthemarketplace.In1947,EckertandMauchly developed their successful
commercial computer called UNIVACI (Universal AutomaticComputer).
7
2. What were the distinguishing features of ENIAC from modern day computers?
3. What makes a computer different from any other electronic device?
Answers
1. It performs basic operations
2. ENIAC did not use internally stored programs. Programs were wired on board
similar to a telephone switch board and it had to be programmed by setting switches
and plugging ang unplugging cables.
3. It can store information permanently, it has huge computing power and is highly
accurate.
1. What is a computer?
2. Draw the schematic diagram of a computing system and describe each of the
components.
8
STUDY SESSION 2
CLASSIFICATION OF COMPUTERS
Section and Subsections
Introduction
1.0 Learning Outcomes
2.0 Main Content
2.1 Classification of Computers according to Generation
2.2 Classification of Computers according to Functionality
3.0 Study Session Summary and Conclusion
4.0 Self-Assessment Questions
5.0 Additional Activities (videos/audios)
6.0 Further Reading
Introduction
You are welcome to the second study session of the first module in COMM 101. An attempt
is made in this study session to present in chronological order the various landmarks and
milestones in the development of the computer. Based on the milestone achievement of each
era the computer evolution is categorized into generations. The generational classification
however, is not rigid as we may find one generation entering into the next. Also, this session
looks into how computers are classified based on certain criteria.
9
The period of first generation was from 1946-1959. The computers of first generation used
vacuum tubes as the basic components for memory and circuitry for CPU (Central Processing
Unit). These tubes, like electric bulbs, produced a lot of heat thereby causing some of the
components to fuse together frequently. They were very expensive and only large
organisations were able to afford it. In this generation, mainly batch processing operating
system was used. Punch cards, paper tape, and magnetic tape was used as input and output
devices. The computers in this generation used machine code as the programming language.
The main features of the first generation are:
i. Vacuum tube technology
ii. Unreliable
iii. Supported machine language only
iv. Very costly
v. Generates lot of heat
vi. Slow input and output devices
vii. Huge size
viii. Consumes lot of electricity
ix. Generates heat
Some computers of this generation were: ENIAC, EDVAC, UNIVAC, IBM-701 and IBM-
750
10
iv. Generates less heat
v. Consumed less electricity
vi. Faster
vii. Very costly
viii. Supported machine and assembly languages.
Some computers of this generation were: IBM 1620, IBM 7094, CDC 1604, CDC 3600
and UNIVAC 1108
Some computers of this generation are: IBM-360 series, Honeywell-6000 series, PDP
(Personal Data Processor), IBM-370/168 and TDC-316 11.
11
microcomputers of fourth generation. Fourth generation computers became more powerful,
compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC)
revolution. In this generation, time sharing, real time networks, distributed operating system
were used. All the high-level languages like C, C++, DBASE etc., were used in this
generation. The main features of fourth generation are:
i. VLSI technology used
ii. Very cheap
iii. Portable and reliable
iv. Use of PCs
v. Very small size
vi. Pipeline processing
vii. Concept of internet was introduced
viii. Great developments in the fields of networks
ix. Computers became easily available
Some computers of this generation were: DEC 10, STAR 1000, PDP 11, CRAY-1(Super
Computer) and CRAY-X-MP (Super Computer).
12
Some computer types of this generation are: Desktop, Laptop, Notebook, Ultrabook and
Chromebook.
Answers
1 a. ULSI technology b. Development of true artificial intelligence c. Development
of Natural language processing d. Advancement in Parallel Processing e.
Advancement in Superconductor technology f. More user-friendly interfaces with
multimedia features g. Availability of very powerful and compact computers at cheaper
rates.
2.Machine language
13
energy research, and petroleum exploration.
2.3.2 Mainframe Computer
A very large and expensive computer capable of supporting hundreds or even thousands of
users simultaneously. In the hierarchy that starts with a simple microprocessor (in watches,
for example) at the bottom and moves to supercomputers at the top, mainframes are just
below supercomputers. In some ways, mainframes are more powerful than supercomputers
because they support more simultaneous programs. But supercomputers can execute a single
program faster than a mainframe.
2.3.5 Workstations
Are terminal or desktop computers in a network. In this context, workstation is just a generic
term for a user‘s machine (client machine) in contrast to a ―server‖ or ―mainframe.‖
14
2.4 Impact of Computer on Society
Computers are employed in every aspect of life. Its effect on life cannot be over emphasised.
Computers are particularly important to people who own organisations, industries etc.
Almost everything in today‘s life is run by computers-cars, traffic lights, hospital equipment,
hotel facilities. Most jobs now require the use of computers. Computers have made both
negative and positive impact on social life of individuals.
In this study session we have learnt that there are five computer generations
known till date. We also discussed each generation in detail along with their period and
characteristics. We also learnt classification of computers according to size and
functionality and how computers can affect society both positively and negatively.
15
4.0 Self- Assessment question
16
STUDY MODULE 2
CONCEPT OF COMPUTER HARDWARE
Contents
Study Session 1: The Computer Hardware Components
Study Session 2: The CPU and its Components
STUDY SESSION 1
ELEMENTS OF THE COMPUTER SYSTEM
Section and Subsections
Introduction
1.0 Learning Outcomes
2.0 Main Content
2.1 Definition of Computers and its basic components
2.2 Development of Computers
3.0 Study Session Summary and Conclusion
4.0 Self-Assessment Questions
5.0 Additional Activities(videos/audios)
6.0 Further Reading
Introduction
You are welcome to the first study session of the second module in COMM 101. There are six
main elements that make up a computer system. They all interact with each other and perform
the task at hand. They include the hardware, software, people, procedures, data and connectivity.
In this study session, we are going to learn about the computer hardware.
17
2.0 Main Content
2.1 Hardware and its Components
These are all the physical parts of a computer system. They are tangible, i.e., you can see and
touch them. Hardware components are the electronic or mechanical instruments, like keyboard,
monitor, printer etc. They help computer users interface with the software, and also display the
result of the tasks being performed. There are four types of hardware components, depending on
which function they perform. The four types of hardware are:
Key board
Is an input device that helps to input data to the computer. The layout of the keyboard is like
that of traditional typewriter, although there are some additional keys provided for
performing additional functions. Keys on the key board include:
i. Typing keys- letters A-Z and numbers 0-9.
ii. Numeric Keypad - It is used to enter the numeric data or cursor movement.
Consists of a set of 17 keys used by most adding machines and calculators.
iii. Function Keys - The twelve function keys are arranged in a row at the top of the
keyboard. Each function key has a unique meaning and is used for some specific
purpose, i.e., f1 to f12
iv. Control keys - These keys provide cursor and screen control. It includes four
directional arrow keys. Control keys also include Home, End, Insert, Delete, Page
Up, Page Down, Control (Ctrl), Alternate (Alt), Escape (Esc).
v. Special Purpose Keys - Keyboard also contains some special purpose keys such
as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
18
Mouse
Mouse is a pointing device. It has a small palm size box with a round ball at its base, which
senses the movement of the mouse and sends corresponding signals to the CPU when the
mouse buttons are pressed. It has two buttons called the left and the right button and a wheel
between the buttons. A mouse can be used to control the position of the cursor on the screen,
but it cannot be used to enter text into the computer
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a monitor
screen. The joystick can be moved in all four directions.
The function of the joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
Light Pen
Light pen is also pointing device. It is used to select a displayed menu item or draw pictures
on the monitor screen. It consists of a photocell and an optical system placed in a small tube.
Track Ball
Track ball is an input device used in notebook or laptop computer instead of a mouse. This is
19
a ball which is half inserted and by moving fingers on the ball, the pointer can be moved. A
track ball requires less space than a mouse. A track ball comes in various shapes like a ball, a
button, or a square.
Scanner
Scanner is an input device. It works like a photocopy machine. It is used when some
information is available on paper and it is to be transferred to the hard disk of the computer
for further manipulation. Scanner captures images from the source which are then converted
into a digital form that can be stored on the disk. These images can be edited before they are
printed.
Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer
can convert a signal from the television or camera into a series of numbers that could be
stored in a computer. They can be used by the computer to create a picture of whatever the
camera had been pointed at. Digitizer is also known as Tablet or Graphics Tablet as it
converts graphics and pictorial data into binary inputs. A graphic tablet as digitizer is used
for fine works of drawing and image manipulation applications.
Microphone
20
Microphone is an input device to input sound that is then stored in a digital form. The
microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.
MICR input device is generally used in banks as there are large number of cheques to be
processed every day. The bank's code number and cheque number are printed on the cheques
with a special type of ink that contains particles of magnetic material that are machine
readable. This reading process is called Magnetic Ink Character Recognition (MICR). The
main advantages of MICR is that it is fast and less error prone.
OCR is an input device used to read a printed text. OCR scans the text optically, character by
character, converts them into a machine-readable code, and stores the text on the system
memory.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value, which is
then fed to the computer that the bar code reader is connected to.
21
Optical Mark Reader (OMR)
OMR is a special type of optical scanner used to recognize the type of mark made by pen or
pencil. It is used where one out of a few alternatives is to be selected and marked. It is
specially used for checking the answer sheets of examinations having multiple choice
questions.
In text questions
1. What is the most widely used input device?
2. What is the term used to define all input and output devices in a computer system?
3. Information that comes from an external source and is fed into computer software is
called
4. The most common method of entering text and numerical data into a computer system
is through the use of a ___
Answers
1. Keyboard
2. Hardware
3. Input
4. Keybord
Monitors
Monitors called Visual Display Units (VDU), are the main output device of a computer. It
forms images from tiny dots, called pixels that are arranged in a rectangular form. The
sharpness of the image depends upon the number of pixels. There are two kinds of VDUs.
i. Cathode-Ray Tube (CRT)
ii. Flat-Panel Display
22
The CRT display is made up of small picture elements called pixels. The smaller the pixels,
the better the image clarity or resolution. It takes more than one illuminated pixel to form a
whole character, such as the letter ‗e‘ in the word help. The CRT has the advantage of high-
power consumption and large size.
The flat-panel display refers to a class of video devices that have reduced volume, weight and
power requirement in comparison to the CRT. You can hang them on walls or wear them on
your wrists. Current uses of flat-panel displays include calculators, video games, monitors,
laptop computer, and graphics display. They are two types:
i. Emissive Displays – These devices convert electrical energy into light e.g., plasma
panel and LED (Light-Emitting Diodes).
ii. Non-Emissive Displays – These devices use optical effects to convert sunlight or
light from some other source into graphics patterns. For example, LCD (Liquid-
Crystal Device).
Printers
Printer is an output device used to print information on paper. There are two types of
printers
i. Impact Printers
ii. Non-Impact Printers
Impact Printers: Impact printers print the characters by striking them on the ribbon, which is
then pressed on the paper. They are of two types
Character printers: Character printers are the printers which print one character at a time.
These are further divided into two types: Dot Matrix Printer (DMP) and Daisy Wheel
23
Dot Matrix Printer
One of the most popular printers is Dot Matrix Printer. These printers are popular because of
their ease of printing and economical price. It is cheap, widely used and can be used to print
characters in other languages. It is however slow and has a bad quality.
Daisy Wheel
These printers are generally used for word-processing in offices that require a few letters to
be sent here and there with very nice quality. It is of better quality and more reliable than
DMP. It is however slower and more expensive.
Line Printers
Line printers are the printers which print one line at a time. We have two types
i. Drum Printer: The surface of the drum is divided into a number of tracks.
Total tracks are equal to the size of the paper. A character set is embossed on the track. One
rotation of drum prints one line. Drum printers are fast in speed and can print 300 to 2000
lines per minute but quite expensive.
ii. Chain Printer: A chain of character sets is used, hence it is called Chain Printer. A
standard character set may have 48, 64, or 96 characters. It is very noisy.
24
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print a
complete page at a time; thus, they are also called as Page Printers. These printers are of two
types:
i. Laser Printers
ii. Inkjet Printers
Laser Printers: These are non-impact page printers. They use laser lights to produce the dots
needed to form the characters to be printed on a page. They have high output quality, high
speed and good graphic quality but expensive
Inkjet Printers
Inkjet printers are based on a relatively new technology. They print characters by spraying
small drops of ink onto paper. Inkjet printers produce high quality output with presentable
features.
They make less noise because no hammering is done and these have many styles of printing
modes available. Color printing is also possible.
25
computer.Output devices are used to display the result or information on the
computer.Monitor and the printer are the commonly used output devices.The output seen on
the VDU is called soft copy.The printed copy of the output is called hard copy.Speakers are
used to listen to the music and sounds played by the computer.Plotter are used for a high
quality of printed output.
1. Devices that let the computer communicate with you are called ------------
2. Devices that allow you to put information into the computer are called --------------
3. Which of the following is not an example of hardware?
A) Scanner B) Printer C) Monitor D) Interpreter
4. Using output devices one can ____
A) Input data B) Store data C) Scan data D) View or print data
5. The wheel located between the two standard buttons on a mouse is used to ____
A) Click on web pages B) Shutdown C) Click and select items D) Scroll
26
STUDY SESSION2
THE CENTRAL PROCESSING UNIT AND AUXILIARY MEMORY
Section and Subsections
Introduction
1.0 Learning Outcomes
2.0 Main Content
2.1 The Central Processing Unit
2.2 Memory and Auxiliary Unit
3.0 Study Session Summary and Conclusion
4.0 Self-Assessment Questions
5.0 Additional Activities(videos/audios)
6.0 Further Reading
Introduction
You are welcome to the second study session of the second module in COMM 101. The
Microprocessor, or Central Processing Unit (CPU), is the computer‘s most important single
item. It does all the PC‘s thinking and runs the programs (series of instructions). Thepurpose
of the CPU is to process data. The CPU is where processes such as calculating, sorting and
searching take place. Whatever is done on our computers, such as checking emails, playing
games and doing homework, the CPU has processed the data we use. The CPU is made up of
three main components, the control unit, the immediate access store and the arithmetic and
logic unit.
27
2.0 Main Content
2.1 The Central Processing Unit
Central Processing Unit (CPU) is the brain of the computer. CPU performs all types of data
processing operations. It stores data, intermediate results, and instructions (program) and
controls the operation of all parts of the computer. It consists of the following three
components.
i. Memory or Storage Unit
ii. Control Unit
iii. Arithmetic Logic Unit (ALU)
28
Control Unit
This unit controls the operations of all parts of the computer but does not carry out data
processing operations. The functions of the control unit include:
i. It controls the transfer of data and instructions among other units of a computer.
ii. It manages and coordinates all the units of the computer.
iii. It obtains the instructions from the memory, interprets them, and directs the operation
of the computer.
iv. It communicates with Input/Output devices for transfer of data or results from
storage.
Arithmetic Section: This section performs arithmetic operations like addition, subtraction,
multiplication, and division. All operations no matter it complexity are done by performing
the above operations repeatedly.
Logic Section: This section performs logic operations such as comparing, selecting,
matching, and merging of data.
29
working. It is volatile i.e. data is lost when power is switched off. It is generally made up of
semiconductor device. The data and instruction required to be processed resides in the main
memory. There are two types of main memory: Random Access Memory (RAM) and Read
Only Memory (ROM).
MROM (Masked ROM): The very first ROMs were hard-wired devices that contained a pre-
programmed set of data or instructions. These kinds of ROMs are known as masked ROMs.
They are inexpensive.
PROM (Programmable Read Only Memory): PROM is a read-only memory that can be
modified only once by a user. The user buys a blank PROM and enters the desired contents
using a PROM program. Inside the PROM chip, there are small fuses which are burnt open
during programming. It can be programmed only once and is not erasable.
EPROM (Erasable and Programmable Read Only Memory): EPROM can be erased by
exposing it to ultra-violet light for a duration of up to 40 minutes. Usually, an EPROM eraser
is used to perform this function.
30
expensive. Since RAM is volatile a backup Uninterruptible Power System (UPS) is often
used with computers. RAM is small, both in terms of its physical size and in the amount of
data it can hold. RAM is of two types:
i. Static RAM (SRAM)
ii. Dynamic RAM (DRAM)
Static RAM (SRAM): In this type of RAM, the memory retains its contents as long as power is
on. However, data is lost when the power gets down due to volatile nature. SRAM need not
be refreshed on a regular basis. SRAM uses more chips than DRAM for the same amount of
storage space, making the manufacturing costs higher. SRAM is thus used as cache memory
and has very fast access.
Dynamic RAM (DRAM): DRAM, unlike SRAM, must be continually refreshed in order to
maintain the data. This is done by placing the memory on a refresh circuit that rewrites the
data several hundred times per second. DRAM is used for most system memory as it is cheap
and small. All DRAMs are made up of memory cells, which are composed of one capacitor
and one transistor.
The amount of data that can be stored in the storage unit is called the memory unit. This
storage capacity is expressed in terms of Bytes. The main memory storage units are
Bit: A bit represents a passive or an active state of a component in an electric circuit. It is a
binary digit of logic 0 or 1.
Byte: A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data
item or a character.
Word: A computer word, like a byte, is a group of fixed number of bits processed as a unit,
which varies from computer to computer but is fixed for each computer. The length of a
computer word is called word-size or word length. It may be as small as 8 bits or may be as
long as 96 bits. A computer stores the information in the form of computer words.
31
Note:
1Kilobyte (1KB) = 1024 Bytes
1Megabyte (1MB) = 1024 KB
1GigaByte (1GB) = 1024 MB
1TeraByte (1TB) = 1024 GB
1PetaByte (1PB) = 1024 TB
In text questions
1. Differentiate between a nibble and a byte
2. What are the three components of the auxiliary memory?
3. What are the main functions of the memory?
Answers
1. A nibble is a group of 4 bits while a byte is a group of 8 bits.
2. The three main components of the auxiliary memory are cache, main and secondary
memories.
3.
i. It stores all the data and the instructions required for processing.
ii. It stores intermediate results of processing.
iii. It stores the final results of processing before these results are released to an
output device.
iv. Inputs and outputs are transmitted through the main memory.
Secondary Memory
Secondary memory holds data and information permanently. This type of memory is also
known as external memory or non-volatile. It is slower than the main memory. CPU directly
does not access these memories, instead they are accessed via input-output routines. The
contents of secondary memories are first transferred to the main memory, and then the CPU
can access it. Examples include disk, CD-ROM, DVD, etc. it is usually referred to as back
up memory. It is slower than main memory.
Cache Memory
The cache memory acts as a buffer between the CPU and the main memory. Those parts of
data and program which are most frequently used by the CPU are held in the cache. The
parts of data and programs are transferred from the disk to cache memory by the operating
system, from where the CPU can access them. It is a very fast semi -conductor memory
which speeds up the CPU. It stores data temporarily i.e., data to be executed in a short time.
32
It is faster and consumes less access time than the main memory. It is however very
expensive and has limited capacity.
Auxiliary Memory
Auxiliary memory is used to store inactive programs and to archive data. They are
among computer peripheral equipment. Auxiliary memory holds programs and data for future
use, and, because it is nonvolatile (like ROM). Early forms of auxiliary storage included
punched paper tape, punched cards, and magnetic drums. Since the 1980s, the most common
forms of auxiliary storage have been magnetic disks, magnetic tapes, and optical discs.
At this study session, we have learnt that a CPU is the brain of a computer,
processing all the instructions you give it. A CPU has various components to receive the
instructions, process them, and then transform them into signals to activate other parts of
the computer. The CPU has three parts: the primary memory, control unit, and arithmetic
logic unit. Other peripheral devices, are attached to the CPU. In modern systems, the CPU is
embedded inside a chip called an integrated circuit.
33
3. What is the function of the ALU?
34
STUDY MODULE 3:
CONCEPT OF COMPUTER SOFTWARE
Contents
Study Session 1: Software and its Types
STUDY SESSION 1
SOFTWARE AND ITS TYPES
Section and Subsections
Introduction
1.0 Learning Outcomes
2.0 Main Content
2.1Types of software
3.0 Study Session Summary and Conclusion
4.0 Self-Assessment Questions
5.0 Additional Activities(videos/audios)
6.0 Further Reading
Introduction
You are welcome to the first study session of the third module in COMM 101.The computer
hardware is driven by the software. The usefulness of the computer depends on the programs
that are written to manipulate it. Computer software come in different forms: the operating
system, utility software, language translators and application software. This unit therefore
presents detailed discussions of each category of computer software. The computer hardware
is driven by the software. The usefulness of the computer depends on the programs that are
written to manipulate it. Computer software come in different forms: the operating system,
utility software, language translators and application software. This unit therefore presents
detailed discussions of each category of computer software.
35
2. distinguish between High Level Languages and Low-level Languages;
3. explain Object code and Source Code;
4. define translators and their types;
5. explain the use of Package Programs
1. System Software
Systems software are programs supplied by the manufacturer of the computer. These
programs protect the user from the enormous complexity of the computer system, and enable
the computer to be used to maximum effect by a wide variety of people, many of whom will
know very little about the Software System. Without System Software, the computer would
be virtually impossible to use. System software are of three types:
i. The Operating System (OS)
ii. System Service
iii. Graphical User Interface
36
An operating system is a program that acts as an interface between the user and the computer
hardware and controls the execution of all kinds of programs. A computer system comprises
of elements of both hardware and software. It is the job of the operating system to manage
these resources as efficiently as possible. In so doing, the operating system acts as a buffer
between the user and the complexities of the computer itself. One way of regarding the
operating system is to think of it as a program which allows the user to deal with a simplified
computer, but without losing any of the computational power of the machine. In this way the
computer system becomes a virtual system, its enormous complexity hidden and controlled
by the operating system and through which the user communicates with the real system. The
resources managed by Operating System are CPU, Memory, Input/Output Devices, Backing
Store and Files.
37
ii. Simple Batch Systems: Provides multiprogramming of batch programs but have few
facilities for multi-access. The users of a batch operating system do not interact with
the computer directly. Each user prepares his job on an off-line device and submits it
to the computer operator. Jobs with similar needs are batched together and run as a
group. The programmers leave their programs with the operator and the operator then
sorts the programs with similar requirements are sorted into batches.
iii. Multi-access and Time-sharing: Allows multiple access to system resources and
therefore share processors time to cope with numerous users. Time-sharing is a
technique which enables many people, located at various terminals, to use a particular
computer system at the same time. Time-sharing or multitasking is a logical extension
of multiprogramming. Processor's time which is shared among multiple users
simultaneously is termed as time-sharing.
The main difference between multiprogram batch Systems and Time-Sharing Systems
is that in case of multiprogram batch systems, the objective is to maximize processor
use, whereas in Time-Sharing Systems, the objective is to minimize response time.
iv. Real-time system: Used in any real time data processing technique. A real-time
system is defined as a data processing system in which the time interval required to
process and respond to inputs is so small that it controls the environment. The time
taken by the system to respond to an input and display of required updated
information is termed as the response time. So, in this method, the response time is
very less as compared to online processing.
System Services
These are programs designed specifically for program or application development.
Examples Language Translators (Processors). These are computer programs designed to
convert high-level language programs into machine code, that is, into a form directly
usable by a computer. Common types of language processors are Assembler, Compilers
and Interpreters.
Assembler: This is a translator that convert program written in Assembly language to
machine code.
38
Compiler: This is a translator that convert program written in High Level Language to
machine code, and the translation in done all at once. Languages translated by Compiler
are COBOL, FORTRAN, C++ etc.
Interpreter: This is a translator that convert program written in High Level language to
machine code, but the translator is done line by line. Example of language translated by
Interpreter is BASIC.
Utility Programs
These programs are specifically designed to aid program development and testing. These
include the following:
Editors: These permit the creation and modification of source programs and data files.
Debugging Aids: Debugging aids help programmers to isolate and identify the cause of
bugs.
File managers: These simplify and facilitate a number of operations connected with
program development and maintenance such as keeping backup copies of
important files; deleting, creating, merging, sorting files etc. Without the help of
such dedicated programs, operations such as these could be extremely be time-
consuming and consequently expensive.
39
menus which provide access to standard functions. When a GUI uses Windows, Icons,
Mouse, Pointers and Pull-down menus, it is referred to as a WIMP environment.
In text question
1. Define the following
a) Assembler
b) Interpreter
c) Compiler
2. Mention the three type of utility programs
Answers
1.a. Assembler: Is a translator that translates program written in Assembly language
to machine code.
b. Compiler: This is a translator that convert program written in High Level
Language to machine code, and the translation in done all at once. Languages
translated by Compiler are COBOL, FORTRAN, C++ etc.
c. Interpreter: This is a translator that convert program written in High Level
language to machine code, but the translator is done line by line. Example of
language translated by Interpreter is BASIC.
2 a. Editor
b. Debugging Aid
c. File Manager
User Programs: are written by people within the organisation for specific needs, which
cannot be satisfied by other sources of software. These program writers may be
professional programmers employed by the organisation, or other casual users with
programming expertise.
Commercial Packages: These are the kind of application packages that are produced by
software professionals and be sold for a wide variety of users. This falls into two main
categories:
a) Special-purpose packages: Though commercial, it is designed for a specific
purpose like a department or a section of an organisation. Examples are -
40
Airline Seat Reservation, Theatre Seat Reservation, Hotel Room Reservation,
Point of Sales Software, A Payroll Program.
Program for each of these areas are of use only in their specific area of
application and their use will be confined to a specific department of the
business. A Payroll Program for example, can only be used for Payroll and will
be used by Payroll staff only.
b) General Purpose: These provide facilities which might be used in a wide
variety of business situation and which might therefore be used across many
department of business e.g.
i. Word-processing: These programs that, more or less, turn a computer system
into a powerful typewriting tool and more. It helps us to produce letters,
reports, magazines, memos, etc. Example of Word-processing programs are:
WordStar, WordPerfect, PC Write, MultiMate, Ten Best and WordStar 2000.
ii. Database Management: They store and retrieve information such as
customer lists, inventories and notes. These programs help us to record and
maintain information about people, places, things and management reports of
all types. Examples are Dbase III & IV, FoxBASE, Oracle, FoxPro and
Clipper, MICROSOFT ACCESS, Paradox,
iii. Spreadsheet: Spreadsheets are software packages that, more or less, turn a
computer system into a sophisticated electronic calculator. Many Spreadsheet
packages also have presentation graphics generators, which take data and
painlessly convert them into bar charts, line charts, and the like. These
programs help us to produce financial reports and other mathematical
computations. Examples are Lotus 1-2-3, QuatoPro, SuperCalc, Multiplan, VP
Planner, Planning Assistant and Microsoft Excel.
iv. Desktop Publishing & Graphics Programs: Graphics programs create graphs
and drawings that can be used in newsletters, posters, advertisements and other
documents. Some allow users to import photographs into documents or create
animated pictures for use in "multimedia" presentations. Popular graphics
programs include PC Paintbrush, Illustrator, Persuasion, Cricket Draw, Corel
Draw, Print Master, Print Shop, Microsoft PowerPoint, and Harvard Graphics.
v. Communication Software: This allows communications and networking.
Examples are Internet Explorer, Netscape Navigator
41
Guideline for Acquisition of Application Software
1. The software to be acquired must be one whose use will improve the particular operating
function of that business.
2. It must be of high performance
3. The software to be acquired must be one with enough ease in learning.
4. The software to be acquired must be available when needed
5. If a software package is complex then training is required
6. Good documentation: The package to be used must be properly documented. This should
include how the package is to be installed how to use the package and other necessary
technical details.
7. Users friendliness: The package must be easy to use even by non- computer specialists.
8. Compatibility of the package: Before a package program can be adopted, it must be
compatible with the user system requirements as well as with the user‘s hardware.
Custom Application
These are software specifically designed to meet individual‘s specific needs. It is a tailored
software solution created for a specific user. They are developed to meet the precise need of
an individual and his company. They are referred to as bespoken software.
42
Systems software includes the programs that are dedicated to managing the computer itself,
such as the operating system, file management utilities, and disk operating system (or DOS).
Application software are written for specific purposes.
4.0Self-Assessment Questions
43
STUDY MODULE 4
DATA PROCESSING, DATA PREPARATION METHODS AND DATA
PREPARATION METHODS
Contents
Study Session 1: Data Processing techniques
Study Session 2: Data Preparation Methods
STUDY SESSION 1
DATA PROCESSING TECHNIQUES
Section and Subsections
Introduction
1.0Learning Outcomes
2.0 Main Content
2.1 Data Processing Techniques
3.0 Study Session Summary and Conclusion
4.0 Self-Assessment Questions
5.0 Additional Activities(videos/audios)
6.0 Further Reading
Introduction
You are welcome to the first study session of the fourth module in COMM 101. In this study
session, we are going to learn how data is processed into information. Several data processing
methods are used to convert raw data into meaningful information. Data is manipulated to
produce results that leads to a resolution of a problem or an improvement in the existing
situation. Data processing follows a cycle where inputs (raw data) are fed to a process
(computer systems, software, etc.) to produce output (information and insights). Computer
systems are employed to carry out a series of operations on the data to present, interpret, or to
obtain information. The process includes activities like data entry, summary, calculation,
storage, etc. A useful and informative output is presented in various appropriate forms such
as diagrams, reports, graphics, etc. Data processing is important in business and scientific
operations. Business data is repeatedly processed, and usually needs large volumes of output.
Scientific data requires numerous computations and usually needs fast-generating outputs.
44
1.0 Learning Outcomes
45
2. Mechanical Data Processing technique
This involves the use of different devices like typewriters, mechanical printers or other
mechanical devices to process data. This method of data processing is faster and more
accurate than manual data processing. These are faster than the manual mode but still forms
the early stages of data processing. With invention and evolution of more complex machines
with better computing power this type of processing has faded away.
Batch Processing
In this type of processing method, jobs from different users are processed in the order
received i.e., in batches. After the jobs are organised into batches, they are sent for processing
in the same order. This processing of a large volume of data helps in reducing the processing
cost thus making data processing economical. Batch processing improves efficiency by
setting processing priorities and completing jobs on time. It allows large amount of data to be
processed easily and accurately.
46
of input data in order to provide a continuous output. Examples of real-time data processing
systems are bank ATMs, traffic control systems and modern computer systems such as the
PC and mobile devices. It is the fastest data processing technique.
Multiprocessing
Multi-processing refers to the ability of a system to support more than one processor at the
same time. It is the use of two or more central processing units within a single computer
system. A multiprocessing operating system is capable of running many programs at the
same time. Applications in a multi-processing system are broken to smaller tasks that run
independently. The operating system allocates these tasks to the processors improving
performance of the system. A computer's ability to process more than one task
simultaneously is called multiprocessing. The term also refers to the ability of a system to
support more than one processor or the ability to allocate tasks between them
simultaneously.
Source: loginworks.com
Time Sharing
This is a method of data processing where computer resources are shared by different users in
different locations simultaneously. It is also called multiprogramming or multitasking. The
operating system uses CPU scheduling and multiprogramming to provide each user with a
small portion of a time. This provides the advantage of quick response, avoids duplication of
software and reduces CPU idle time. This method however poses the question of data
integrity and security.
47
Online Processing
This involves processing done in real time and provides instant output. This is a method use
Internet connections and equipment connected to a computer. This allows the data to be
stored in one place and being used at an altogether different place. Cloud computing is a
perfect example which uses this type of processing.
Offline processing
Here data is stored in files on a high-speed data storage device. A different computer system
is used to type in data from paper into a file on a high- speed storage device. When the
computer is ready, it can get all the data it needs from these files rather than from relatively
slow input devices. This is termed ‗offline’ processing because the main computer doing the
processing is not immediately controlling and reading the data from its input devices. The
data is being prepared and stored away from that computer on a high-speed storage device
and is then made available as necessary.
In text questions
1. What are the three methods of data processing?
2. Define multiprogramming
3. Define data
Answer
1. Manual, mechanical and electronic
2. This is a method of data processing where computer resources are shared by
different users in different locations simultaneously.
3. Data are raw un processed facts
48
1. What do we mean by multiprocessing?
2. Differentiate between real time processing and batch processing
3. Define data processing
49
STUDY SESSION 2
DATA PREPARATION METHODS
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1Data Processing Techniques
3.0Study Session Summary and Conclusion
7.0 Self-Assessment Questions
8.0 Additional Activities(videos/audios)
9.0 Further Reading
Introduction
You are welcome to the second study session of the fourth module in COMM 101. Data
preparationis the process of gathering, combining, structuring and organising data so it can be
used in business. It is the process in which data from one or more sources is cleaned and
transformed to improve its quality before it is used in data analysis. It‘s often used to merge
different data sources with different structures and different levels of data quality into a clean,
consistent format. This consistency of format is what makes data preparation so powerful. It‘s
the key process that combines data from many different data sources and provides the
opportunity for meaningful insights. Without data preparation, patterns and insights could be
missing from the database and overlooked during analysis. In the big data era, where
advanced data mining software like Import. Io‘s can quickly and easily grab data from
different websites, any business can take advantage of fast and effective data preparation
techniques.
50
2.0Main Content
2.1 Data Preparation Methods
Steps in the data preparation process
The steps involved in data preparation differ from one data professional and vendor to
another. It however includes several distinct steps involving the following:
1. Data Collection: data is collected from different sources and put together for further
processing. The collected data must conform with the final objectives of the application to
be developed.
2. Data Profiling: the collected data must be studied to understand its contents and ways to
improve and prepare it for its intended use. Data profiling helps identify mistakes, missing
data, anomalies so they can be fixed.
3. Data Cleansing: Here, errors and mistakes are identified, inconsistencies harmonized and
corrected to ensure the data is accurate and ready for processing.
4. Data Structuring: data is modeled and structured into a format needed for use.
5. Data Transformation: This is the act of transforming data into useful information to
produce desired result.
6. Data Publishing: The results are then made available for use or stored for future need.
51
RAM can be lost once the power is switched off. It however store data temporarily only
while the computer is running. It is very fast.
3. Read Only Memory (ROM): Data can only be read from this memory and cannot be
written into it. It contains data written to it by the programmer. This data cannot be
changed or overwritten. It is fast and non- volatile i.e.; data cannot be lost due to loss of
power.
4. Hard disk or drive: It is the main storage device on the computer system. It is a non -
volatile memory. Data can be written and read from it. Files and folders are sorte on the
hard drive and so is the operating system.
5. Basic Input Output System (BIOS): The BIOS contain the code for controlling the
computer hardware during start up after which the control is given to the operating system.
In text questions
1. Mention the steps involved in data preparation
2. What are the advantages of data preparation?
Answers
1. Data collection, Data profiling, Data cleansing, Data structuring, Data
transformation, Data publishing
2.Data preparation helps produce high quality and reliable results.
Data preparation helps to identify and fix errors quickly before analysis
It helps executives make better and more informed decisions.
Fix up Procedure
These are procedures carried out to trouble shoot a computer system caught up in an endless
boot cycle. When accessing Windows or files seem impossible, troubleshooting and repairing
52
a PC that reboots constantly without warning can be time consuming. Before taking the
computer for repair, try the following:
Restart the computer each time to connect a peripheral device; connect only device at a time.
If the computer fails to boot after connecting a peripheral device, update the driver
software causing the problem.
53
3. Type ―chkdsk c: /f /r‖ after the command prompt appear, then press ‗Enter‘
Wait for the CHKDSK utility to scan the system and hard drive for any bad sector and
repairable errors
54
Right click on the Start button or press Window logo key + X on the keyboard
Click on Shut down or sign out then choose Shut down.
3. For Windows 7
Click Start button, then click Shut down.
Computer Initialization
Computer Initialization is how the computer boots and loads. When the computer is switched
on it performs a Power- On-Self-Test (POST) to ensure it is working properly, loads drivers
needed for the computer hardware, the operating system and other programs. This takes about
2 minutes depending on the speed of the system.
55
4. Install all available Microsoft Windows update and make sure the computer has the
latest drivers.
5. If haven gone through all the steps above and still the system is slow, clean the system
registry.
6. Format the system and re-install Windows.
7. Upgrade some hardware by installing additional RAM and a Solid-State Drive (SSD).
In this study session we have learnt data preparation methods, procedures for
operating the computer such as start up sequence, fix up procedure etc. We have also learnt
what to do in case the boot up procedure is slow and how to format storage media.
56
3. What does the term shut down mean?
4. State the steps involved in disk formatting.
57
STUDY MODULE 5
COMPUTER SECURITY
Contents
Study Session 1: Computer Security
Study Session 2: Malware Infections, Data Control Techniques and Computer Ergonomics
STUDY SESSION 1
CONCEPT OF COMPUTER SECURITY
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1The Need for Computer Room Security and Safety
2.2 Malware Infection and Standard Procedure for Installing Anti-virus
2.3 Computer Ergonomics and Security
3.0Study Session Summary and Conclusion
4.0Self-Assessment Questions
5.0Additional Activities(videos/audios)
6.0Further Reading
Introduction
You are welcome to the first study session of the fifth module in COMM 101. Security
threats to the computer are possible dangers that can possibly hamper the normal functioning
of the computer. In the present age, computer security threats are constantly increasing as the
world is going digital. It has therefore become paramount to protect the both the computer
hardware and software from any threat that can cause damage or theft. One must be well
aware of these threats and be kept appraised with required knowledge to safeguard against
them. This study session outlines in simple terms the kinds of issues that can arise in
computer security, including an explanation of common security terms and their
meanings.
58
1.0 Learning Outcomes
At the end of this study session, you should be able to::
1. explain computer security and the need for computer room safety;
2. explain the methods of preventing hazards;
3. describe malware infections and the standard procedure for installing an anti-virus;
4. explain computer ergonomics and security using passwords and usernames.
59
iv. Securing both software and hardware technologies.
v. Protecting computer systems communicating over networks.
Threats to computer security are growing and becoming more complex. There is therefore the
need to device counter measures to ensure the computer, data and information are
safeguarded against these growing threats. The following are paramount to safeguard both the
hardware and software components of the computer system.
1. Update latest software Operating System versions as soon as they become available.
2. Install reliable anti-virus software
3. Constantly change your password.
4. Activate firewalls to guard against any intrusion from the Internet
5. Perform system scan on a regular basis.
6. Always back-up your data to ensure it is retrievable after loss or damage.
7. Use strong password that cannot be guessed.
8. Do not open e mail attachments from unknown sources.
9. Avoid using unsecure Wi-Fi networks in public places
60
computers and physical network connections. Any change in power supply and cooling can
result in loss of information. Measures must be put in place to ensure computer room
security.
In this study session, we have learnt that Computer security depends on many
aspects of a computer system. The threats that a site faces, and the level and quality of the
countermeasures, depend on the quality of the security services and supporting procedures.
61
5.0 Additional Activities (Videos/Audio)
62
STUDY SESSION 2
MALWARE INFECTIONS, DATA CONTROL TECHNIQUES AND
COMPUTER ERGONOMICS
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1 Malware Infection and Standard Procedure for Installing Anti-virus
2.3 Computer Ergonomics and Security
3.0Study Session Summary and Conclusion
4.0Self-Assessment Questions
5.0Additional Activities(videos/audios)
6.0Further Reading
Introduction
1.0 Learning Outcomes
2.0Main Content
2.1 Malware Infection and Standard Procedure for Installing Anti-virus
You are welcome to the second study session of the fifth module in COMM 101.
MaliciousSoftware (Malware) is a collective term used to describe harmful computer
programs like viruses and trojans designed purposely to destroy computers, networks and
gain access to sensitive information without permission from the owner. It consists of code
developed by cyber criminals, designed to cause extensive damage to data and systems or to
gain unauthorized access to a network. Malware is typically delivered in the form of a link or
file over email and requires the user to click on the link or open the file to execute the
malware. Different malwares have different ways of causing havoc or damage to the system
from stealing, encrypting or deleting sensitive data, altering or hijacking core computing
63
functions, and spying on someone' computer activity without their consent. Some are
delivered over email via a link or executable file. Others are delivered via instant messaging
or social media. Even mobile phones are vulnerable to attack. It is essential that organisations
are aware of all vulnerabilities so they can lay down an effective line of defense.
Types of Malwares
1. Virus
A computer virus is a type of malware that replicates itself by attaching itself to executable
files. Once executed it spreads from one program to another. A computer virus behaves in a
way similar to a biological virus, which spreads by inserting itself into living cells. While
some are harmless or mere hoaxes, most computer viruses are considered malicious.
2. Worms
A worm is also a self-replicating program. A worm propagates itself through computer
networks without user intervention. Unlike a virus, it doesn't need to attach itself to an
existing program. The terms "virus" and "worm," are often confused by many, using them
both to describe any self-propagating programs.
3. Trojan Horse
A Trojan Horse is a deceptive software which seems to be doing one thing but it is actually
doing another. A Trojan Horse can be used to set up a back door in a computer system so
intruders can gain access.
4. Spyware
A spyware is a type of malware. It is an unwanted software that steals Internet usage data and
information. It gathers information and relay same to other competitors and external users
without the knowledge of the user.
5. Ransomware
Ransomware is malicious software that infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. This type of malware is a
criminal moneymaking software installed through deceptive links in an email message,
instant message or website.
64
Adware
Adware is an advertising-supported software. It is a software that generates revenue for its
developer by automatically generating online advertisements in the user interface of the
software or on a screen presented to the user during the installation process. Adware can
sometimes be incorrectly labeled as malware or spyware. Not all adware are a threat because
some are perfectly safe and reputable. However, some adware does pose a risk that can
introduce a threat to your devices. When you‘re discussing adware, you might wonder ―what
is the difference between malware and adware,‖ or ―what is adware and spyware?‖
Bot
This type of malware is designed to perform a set of functions. Though created for harmless
purposes. It turned out to be harmful. They are used in botnets to perform Ddos attacks as
web spiders that extract server data. It distributes malwares that are masked as frequent
search items on download sites.
65
the authentication process. Passwords are usually used with a username. Only the user knows
the password. Passwords allow users to gain access to a computer, application or website.
Passwords vary in length and can contain letters, numbers and special characters.
Password blacklists are lists of passwords that are too easily cracked and thus are not secure
enough to use. Personal information such as birthdates, names of children, or favourite sports
teams should not be part of a password, as well as any words or phrases that are on a
password blacklist. Passwords must have a time limit when users are forced to change their
passwords. The policy may also require the user to create a password that is different from
any other they have used in the last six to 12 months.
Although strong passwords are ideal, users often forget them. As a result, password recovery
methods might vary depending upon access to an application, website or device. Methods
might include answering security questions, confirming emails asking if users want to reset
their passwords, or entering numerical security codes sent via text to a mobile phone to
authenticate users who need to reset passwords or recover the original one.
66
A two-factor authentication requires users to provide two authentication factors that include a
combination of something the user knows like a password or PIN and Something the user has
like an ID card, security token or smartphone number.
In text questions
1. What are the requirements for a strong password?
2. Differentiate between a virus and malware?
Answers
1.
i. A minimum length of eight characters.
ii. The inclusion of both uppercase and lowercase letters with case sensitivity;
iii. The use of at least one number; and
iv. The use of at least one special character.
2.A malware is a collective term used to describe harmful computer programs like
viruses and trojans designed purposely to destroy computers, networks and gain
access to sensitive information without permission from the owner; a virus is a type
of malware that replicates itself by attaching itself to executable files. Once
executed it spreads from one program to another.
2.Biometrics
Biometric technology is mainly used for identification and access control. Biometrics uses
physiological characteristics such as fingerprints or retinal scans, and behavioral
characteristics such as typing patterns and voice recognition.
3.Multifactor authentication
Multifactor authentication is similar to 2FA except that it is not limited to only two
authentication factors. It also uses something the user knows, something the user has and
something the user is.
4.Tokens
A security token is a physical hardware or electronic device that a user carries to authorize
access to a network.
67
6.Social logins
This is when users can authenticate themselves on applications or websites by connecting to
their social media account such as Facebook or Google instead of using a separate login for
each and every site.
After sitting at a computer for many hours a day, many people find themselves looking for a
better way to work. Peoples back hurts, neck gets tight, and legs fall asleep. So what can you
do when your workstation is ergonomically wrong?
68
stiff and sore. One study reported that workers who moved every seven minutes avoided
computer-related pain, even with extended computer use. Every 30 minutes to an hour, take a
short break to get up out of your chair and stretch or walk around.
Keeping physically fit can also help to avoid, and even treat, problems and pains related to
extended computer use. Build up core muscles to support the lower back while seated.
At the end of this study session, we have learnt what malware is, how it affects the
computer system and how we can protect our computers from being infected. We have also
learnt how we can use usernames and password for authentication and other alternatives to
passwords. This study session also taught us how to set up the computer to protect our health.
5.0Additional Activities(videos/audios)
6.0Further Reading
https://www.thejoint.com/washington/renton/renton-42004/192602-science-computer-
ergonomics#:~:text=Computer%20ergonomics%20is%20the%20study,comfortable%20and%
20relaxed%20workplace%20environment.
https://www.kaspersky.com/resource-center/threats/trojans
69
STUDY MODULE 6
CONCEPT OF COMPUTER NETWORK
Study Session 1: Computer Networks
Study Session 2: Types of Computer Networks
STUDY SESSION 1
COMPUTER NETWORKS
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1The Computer Network
2.2 Types of Computer Networks
3.0Study Session Summary and Conclusion
4.0Self-Assessment Questions
5.0Additional Activities(videos/audios)
6.0Further Reading
Introduction
This study session is an introduction to computer networks. In this session, you will
familiarize yourself with the basic principles and the architecture of computer networks. You
will acquire the basic knowledge of the Internet architecture and of its evolution. You will
also learn the various network topologies.
70
network is a group of devices connected with each other through a transmission medium such
as wires, cables etc. These devices can be computers, printers, scanners, Fax machines,
routers, bridges etc.
The purpose of having computer network is for the devices to communicate with one another
and to send and receive data stored in other devices over the network. These devices are often
referred to as nodes. There are five basic components of a computer network.
Source: Beginnersbook.com
Message: It is the data or information which needs to be transferred from one device to
another device over a computer network.
Sender: Sender is the device that has the data and needs to send the data to other devices
connected to the network.
Receiver: A receiver is the device which is expecting the data from other devices on the
network.
Protocol: A protocol is a set of rules that are agreed upon by both sender and receiver,
followed by all devices on a network. Without a protocol two devices can be connected to
each other but they cannot communicate. In order to establish a reliable communication or
data sharing between two different devices we need a set of rules that are called protocol. For
example, http and https are the two protocols used by web browsers to get and post the data
to internet, similarly smtp protocol is used by email services connected to the internet.
71
Tranmission media: These are chaannels through which data is tranfered from one device to
another in a network. They may be guided media eg. Coaxial cable or unguided media like
microwaves.
Functions of a Network
i. Communicating using email, video, instant messaging and other methods
ii. Sharing devices such as printers, scanners and photocopiers
iii. Sharing files
iv. Sharing software and operating system programs
v. Allowing network users to easily access and maintain information
Network Terminologies
Open system: An open system already connected to the network and prepared for
communication.
Closed system: A closed system is not yet connected to the network and so can't be
communicated with.
IP (Internet Protocol) address: The network address of the system across the network, which
is also known as the Logical Address.
MAC address: The MAC address or physical address uniquely identifies each host. It is
associated with the Network Interface Card (NIC).
Port: A port is a channel through which data is sent and received.
Nodes: A node is a term used to refer to any computing devices such as computers that send
and receive network packets across the network.
Network packets: The data that is sent to and from the nodes in a network.
Routers: Routers are pieces of hardware that manage router packets. They determine which
node the information came from and where to send it to. A router has a routing protocol
which defines how it communicates with other routers.
Network address translation (NAT): A technique that routers use to provide Internet service
to more devices using fewer public IPs. A router has a public IP address but devices
connected to it are assigned private IPs that others outside of the network can't see.
Dynamic host configuration protocol (DHCP): assigns dynamic IP addresses to hosts and is
maintained by the internet service provider.
72
Internet service providers (ISP): companies that provide everyone with their internet
connection, both to individuals and to businesses and other organisations.
Devices on a Network
Network devices are devices required for communication on a computer network. These devices
include:
Hub
Hub is the simplest in the family of network connecting
devices because it connects LAN components with
identical protocols. Hubs do not perform packet filtering
or addressing functions; they just send data packets to
all connected devices. Hubs connect multiple computer
networking devices together. A hub also acts as a
repeater by amplifying signals that deteriorate after
traveling long distances over connecting cables.
Switches
Switches have a more intelligent role than hubs. A switch is
a multiport device that improves network
efficiency. Generally, switches can read the hardware
addresses of incoming packets to transmit them to the
appropriate destination. Switches also improve network security.
Routers
Routers help transmit packets to their destinations. Routers are intelligent devices, and they
store information about the networks they‘re connected
to. Most routers can be configured to operate as packet-
filtering firewalls and use access control lists (ACLs).
The router, with the help of a routing table, has
knowledge of routes a packet could take from its source to its destination. Upon receipt of a
packet, the router removes the packet headers and trailers and analyzes the IP header by
determining the source and destination addresses and data type, and noting the arrival time. It
73
also updates the router table with new addresses not already in the table.
Bridges
Bridges are used to connect two or more hosts or network segments together. The basic role
of bridges in network architecture is storing and forwarding
frames between the different segments that the bridge
connects. They use hardware Media Access Control
(MAC) addresses for transferring frames. By looking at the
MAC address of the devices connected to each segment,
bridges can forward the data or block it from crossing. Bridges can also be used to connect
two physical LANs into a larger logical LAN.
Gateway
Gateways perform all of the functions of routers and
more. In fact, a router with added translation
functionality is a gateway. The function that does the
translation between different network technologies is
called a protocol converter.
Modems
Modems (modulators-demodulators) are used to transmit digital
signals over analog telephone lines. Thus, digital signals are
converted by the modem into analog signals of different frequencies
and transmitted to a modem at the receiving location. The receiving
modem performs the reverse transformation and provides a digital
output to a device connected to a modem, usually a computer.
Repeaters
A repeater is an electronic device that amplifies the signal it
receives. You can think of repeater as a device which receives a
signal and retransmits it at a higher level or higher power so that
the signal can cover longer distances, more than 100 meters for
standard LAN cables. Repeaters work on the Physical layer.
74
Access Point
An access point (AP) technically involve either a wired or
wireless connection, it commonly means a wireless device. It
can operate either as a bridge connecting a standard wired
network to wireless devices or as a router passing data
transmissions from one access point to another.
Network Architecture
Network architecture defines how computers are connected to get the maximum advantages
of a computer network such as better response time, security, scalability etc. The two most
popular computer architectures are P2P (Peer to Peer) and Client-Server architecture.
Peer-to-Peer architecture
In peer-to-peer architecture all the computers in a computer network are connected with every
computer in the network. Every computer in the network use the same resources as other
computers. There is no central computer that acts as a server rather all computers acts as
servers for the data that is stored in them.
75
Client-Server Architecture
In Client Server architecture a central computer acts as a hub and serves all the requests from
client computers. All the shared data is stored in the server computer which is shared with the
client computer when a request is made by the client computer. All the communication takes
place through the server computer, for example if a client computer wants to share the data
with other client computer then it has to send the data to server first and then the server will
send the data to other client.
76
In text questions
1. Define computer network
2. What are the main components of a network?
Answers
1. A computer network is a group of devices connected with each other
through a transmission medium such as wires, cables etc. These devices can
be computers, printers, scanners, Fax machines, routers, bridges etc.
2. Sender, Receiver, message, transmission media and Protocols.
Network Topologies
Network Topology is the schematic description of a network arrangement, connecting various
nodes (sender and receiver) through lines of connection
BUS Topology
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology. It
transmits data in only one direction.
77
2. If network traffic is heavy or nodes are more the performance of the network
decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.
Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination no
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node. Every node has
its own dedicated connection to the hub. Hub acts as a repeater for data flow. The hub Can be
used with twisted pair, Optical Fibre or coaxial cable.
78
Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing 2. Flooding
79
Types of Mesh Topology
1. Partial Mesh Topology: In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two or three
devices.
2. Full Mesh Topology: Each and every nodes or devices are connected to each other.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.Ideal if workstations
are located in groups and are used in Wide Area Network.
80
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
Hybrid Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology is
used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
81
3.0 Study Session Summary and Conclusion
6.0Further Reading
https://sites.google.com/site/mrstevensonstechclassroom/home/strand-3-it-systems/3-3-
networks/client-server-networks
82
STUDY SESSION 2
TYPES OF COMPUTER NETWORKS
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1 Types of Computer Networks
3.0Study Session Summary and Conclusion
4.0Self-Assessment Questions
5.0Additional Activities(videos/audios)
6.0Further Reading
Introduction
You are welcome to the second study session of the sixth module in COMM 101. There are
different types of computer networks used for sharing data, resources and application.
Computer networks are grouped based on size and function. Some are wired and some are
wireless. In this study session we are going to look at different types of computer networks
and their characteristics.
2.0Main Content
2.1 Types of Computer Networks
There are basically four types of computer networks. These include:
Source: guru99.com
83
Personal Area Network (PAN)
PAN is limited to a specific person or location such as home network. This network is usually
setup for sharing resources such as Internet and printer within personal computers.
Source: networkstraning.com
Source: freepik.com
84
Wide Area Network (WAN)
WAN is a computer network which spans over a large geographical area such as state, region,
country etc. WANs are typically used to connect two or more LANs or MANs which are
located relatively very far from each other. To provide
connectivity, this network uses special devices, cables
and technologies
Source: Networkencyclopedia.com
Source:Networkstraining.com
Specialized Networks
These are networks with specific purposes or unique security needs. These include:
Storage Area Network or System Area Network (SAN). Storage area network is a
dedicated high-speed network that connects shared pools of storage devices to several
servers. These types of networks don‘t rely on a LAN or WAN. Instead, they move storage
resources away from the network and place them into their own high-performance network.
SANs can be accessed in the same fashion as a drive attached to a server.
85
therefore benefit from the functionality, security, and management of the private network.
Components of LAN:
A LAN is made up of three basic elements; the hardware, the software (or programs) and the
users, who create, work with and manage the various files. Each of these elements can be
divided into a number of components.
2. Server
A network server is a computer designed to process requests and deliver data to other (client)
computers over a local network or the Internet. A server may be three types:
i. File Server: A file server is a computer that stores files, attached to a network, and
provides shared access of those files to multiple workstations.
ii. Print Server: A print server is a device that connects printers to client computers
over a network. It accepts print request from the computers and sends the jobs to the
appropriate printers over the LAN.
iii. Communication Server: A communication server is a computer system designed to
handle a wide range of communications-based applications.
86
In text questions
What are specialized networks? Mention 3 of them
Differentiate between a LAN and a WAN.
Answers
These are networks with specific purposes or unique security needs. They include:
SAN, VPN and EPN.
2. A LAN is a computer network which spans over a small geographical area such
as home, building, office, etc. In LAN, computers are placed relatively close. Since
computers are located within small distance, they do not need special devices and
cables to connect with each other; while a WAN is a computer network which spans
over a large geographical area such as state, region, country etc. WANs are
typically used to connect two or more LANs or MANs which are located relatively
very far from each other.
3. Station
A station is a computer that is connected with a server computer over the LAN, and
communicate with other devices connected with it.
4. HUB
Hubs are used to connect segments of a LAN. A hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can see all-
packets.
5. Switch
A switch is like a hub in that it is a central point for connecting network cables; however, a
switch is able to receive a packet and transmit it to only the destination computer.
6. Router
Routers make the connection to the Internet for LANs. They use a configuration table to
decide where packets should go.
7. Access point
A hardware device or a computer‘s software that acts as a communication hub for users of a
wireless device to connect to a wired LAN.
87
8. Power Supply
Both wired and wireless networks need a power supply. A wireless network uses the current
to generate radio waves. A cabled network sends data interpreted as an electronic pulse.
9. Connector
A network connector refers to any device that used to connect many LAN connection with
the hardware of the computer.
B. LAN Software:
Once the physical building blocks of the LAN are put into place, the next step is to make
them functional. Software is needed for devices to function properly and effectively on the
LAN. There are three categories of software found on a LAN:
i. The operating system of each server
ii. The operating system of each attached station
iii. Applications software accessed by LAN users
Groupware is a application software for the LAN environment. Groupware are programs that
help people work together collectively while located remotely from each other.
C. The People
Among the most important elements of a LAN are the people. The purpose of a LAN is to
allow the sharing of resources. This sharing is done by people, making them an integral part
of the structure. With any LAN there are two groups of people involved. Those who use the
resources and those who manage the resources called network administrators.
88
3.0 Study Session Summary and Conclusion
Int his study session, we learnt that, there are four major types of computer networks- PAN,
LAN, MAN and WAN. Other types include SAN, CAN and EPN. We also learnt that that
there three main components of LAN. These are the hardware components, software
components and the Users.
4.0Self-Assessment Questions
1. Mention the three types of server files and explain them.
2. Differentiate between a LAN and a WAN
3. What are the 3 components of LAN software.
5.0Additional Activities(videos/audios)
6.0Further Reading
https://yourbusiness.azcentral.com/six-required-components-lan-8409.html
http://www.fiber-blog.de/en/95-transceivers/145-what-are-the-main-components-of-a-local-
area-network-lan.html
89
STUDY MODULE 7
USE OF THE INTERNET AND CONTEMPORARY COMPUTING
Contents
Study Session 1: The Internet and its Resources
Study Session 2: Electronic Mail and Cloud Computing
STUDY SESSION 1
THE INTERNET AND ITS RESOURCES
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1The Internet and its Resources
2.2 Browsing and Searching the Internet
3.0Study Session Summary and Conclusion
4.0Self-Assessment Questions
5.0Additional Activities(videos/audios)
6.0Further Reading
Introduction
You are welcome to the first study session of the last module in COMM 101. The early
Internet was proposed, designed and implemented by American research institutes,
universities, and telecommunication companies. Many believe the Internet today is the initial
prototype of what is often called the National Information Infrastructure. It is a widespread
information infrastructure with rich history that entails many aspects - technological,
organisational, and community. It has a tremendous impact upon society with its influence
transcending beyond the technical fields of computer communications.
1.0Learning Outcome
At the end of this study session, you should be able to:
1. define the Internet and explain its Resources;
2. browsing and Searching the Internet.
90
2.0 Main Content
2.1 Internet and its Resources
The Internet is a global network of computer networks utilizing a suite of protocols called the
TCP/IP (Transmission Control Protocol/Internet Protocol) that supports interconnection of a
number of different computer networks. The Internet supports communication and sharing of
data, and offers a vast amount of information through a variety of services and tools.
Researchers and academics in other fields began to make use of the network, and eventually
the National Science Foundation (NSF), which had created a similar and parallel network,
called NSFNet, took over much of the TCP/IP technology from ARPANET and established a
distributed network of networks capable of handling far greater traffic. In 1985, NSF began a
program to establish Internet access across the United States. They created a backbone called
the NSFNET and opened their doors to all educational facilities, academic researchers,
government agencies, and international research organisations.
By the 1990‘s the Internet experienced explosive growth. It is estimated that the number of
computers connected to the Internet was doubling every year. Businesses rapidly realized
that, by making effective use of the Internet they could tune their operations and offer new
and better services to their customers, so they started spending vast amounts of money to
91
develop and enhance the Internet. This generated violent competition among the
communications carriers and hardware and software suppliers to meet this demand. The
result is that bandwidth (i.e., the information carrying capacity of communications lines) on
the Internet has increased tremendously and costs have dropped. It is widely believed that the
Internet has played a significant role in the economic success.
Internet Resources
The Internet has several tools and services that make it ideal as an information resource. Each
of these features has its own merits and therefore should be utilized depending on the type of
information one needs to access.
E-Mail
By far the most popular service available on the Internet, e-mail as a form of correspondence
has revolutionized the way we communicate with each other. It stands for ―electronic mail, a
way of sending messages from one computer to another. Its ability to send files through
attachments also factors in its popularity. Readily available, and in most cases free of charge,
this speedy alternative to postage mail comprises the bulk of traffic on the Internet. Almost
all ‗Net users have at least one e-mail address, and in some cases, several addresses. It has
also become the most basic form of identification on the Internet, with a lot of websites
requiring an e-mail address before offering services.
Newsgroups
These are an online forum for discussion of related topics, accessible by a newsreader. Some
newsgroups allow postings or messages from anyone, while others are moderated (postings
are screened). Several university departments have also set up newsgroups for specific issues
and class use. On the Internet, there are literally thousands of newsgroups covering every
conceivable interest.
92
to anyone joining the chat.
Telnet
Telnet is client software allowing a user to login from a local desktop computer to a remote
server (the Telnet host) and use its resources. Usually access is controlled by passwords given
to each individual or group. Once access is given, the remote user can issue commands or use
the resources of the host, depending on the level of access given the user. Mainly used by
libraries to allow access to information stored in their computers.
93
In text questions and answers
1. Define the Internet
2. What does the acronym ARPANET stand for?
3. Mention some resources of the Internet.
Answers
1. The Internet is a global network of computer networks utilizing a suite of
protocols called the TCP/IP (Transmission Control Protocol/Internet
Protocol) that supports interconnection of a number of different computer
networks
2. Advance Research Project Agency Network
3. Newsgroup, Telnet, E mail, File Transfer Protocol etc.
In order to open your web browser, select your web browser icon. Once your browser is
open, you need to decide which website you would like to visit. This is done by either
browsing to the correct website or searching for the correct website
Browsing
To browse a website, you must know its unique web address. Once you know the address,
you can visit the website as follows:
i. Open your web browser.
Enter the website‘s address or URL in the address bar at the top of your browser.
ii. As soon as you press Enter, the webpage should begin to load
iii. Once loaded, you can browse the website by clicking on buttons, links or following
the instructions on the page.
Search Engines
Search engines are software tools that search documents for specified keywords and returns a
94
list of the documents where the keywords were found. A search engine is a general class of
programs, however, the term is often used to specifically describe systems like Google, Bing
and Yahoo search that enable users to search for documents on the World Wide Web. Search
engines are special sites on the Web that are designed to help people find information stored
on other sites.
There are differences in the ways various search engines work, but they all perform three
basic tasks:
i. They search based on words
ii. They keep an index of the words they find, along with where they find them.
iii. They allow users to look for words or combinations of words found in that index.
Millions of people around the world use search engines almost on regular basis. The benefit
of search engines to both individuals and society is huge. They have made the web a very
critical resource repository of our time. They are the most popular and widely used tool to
find information online.
Search engines search through billions of webpages stored on hundreds of millions of
websites to find information matching your search. Most search engines try to place the best
options near the top of the search results, with the results becoming worse as you move to the
second and third pages. Since the first search results are usually the best, if you do not find
what you are looking for on the first page or two of the results, you should try a different
search phrase or try to use an advanced search technique.
Meta-search engines: Meta-search engines send your search query to several search engines
simultaneously and give you a consolidated report of their findings. They do not maintain a
database of their own. Examples:
• Metacrawler – http://www.metacrawler.com
• Dogpile – http://www.dogpile.com
• ProFusion – http://www.profusion.com
95
3. Mention 3 examples of a browser
4. What does a meta search engine do?
6.0Further Reading
https://www.mindtools.com/pages/article/internet-searching.htm
96
STUDY SESSION 2
ELECTRONIC MAIL AND CLOUD COMPUTING
Section and Subsection Headings
Introduction
1.0Learning Outcomes
2.0Main Content
2.1The Electronic Mail
2.2 Cloud Computing
3.0Study Session Summary and Conclusion
4.0Self-Assessment Questions
5.0Additional Activities(videos/audios)
6.0Further Reading
Introduction
You are welcome to the second study session of the last module in COMM 101. Email
provides a great way of communicating with colleagues, business associates, friends and
family. However, this comes with certain responsibilities such as knowing how to protect
yourself and others from viruses, understanding etiquette, dealing with spam and more. In
this study session, we are going to learn how e mails are sent and received, who Internet
Service Providers are, what cloud computing is and its relation to IoT.
1.0Learning Outcomes
At the end of this study session, you should be able to:
1. explain e mail and how to send and receive an e mail;
2. explain Internet Service Providers and their functions;
3. define cloud computing in relation to IoT.
2.0Main Content
2.1The Electronic Mail
Email is an acronym for electronic mail. It is a message sent from one computer to another
which are connected over a local area network or over the Internet through a communication
system‘s be able to send an email, certain things must be put in place. These include:
97
1.Email application
To send an email, you need an application called email client. This software application
allows you to send and receive messages to and from other people. The two most common
email clients are Microsoft Outlook from Microsoft Office and Windows Mail on Windows.
2.Email server
An email server is like a post office. It sends the messages through appropriate electronic
channel to their destinations. It ensures all emails are delivered to the appropriate recipients.
It also collects emails meant for you and delivers them to the email client on your computer.
Emails sent through the Internet are managed by Internet Service Providers (ISPs). Two main
protocols are used when sending and receiving emails. The Simple Mail Transfer Protocol
(SMTP) which handles out going mails and Post Office Protocol (POP) which handles in
coming mails.
3.Email account
To be able to send and receive email messages, you require an email account which is
synonymous to having a box at the local post office. This must include a user to identify you
and a password to prevent others from having access to your email.
The Domain Name: This identifies the location of the email server, the ISP or a person‘s
workplace. In the example above this is kd
98
The Top-Level Domain:this normally consists of three letters and identifies the type of
organisation associated with the host name. It is usually preceeded by a full stop; in this case
.edu. examples of top-level domain names include:
.com for private or public company
.gov for government department or organisation
.edu for educational institution
.net for networks usually reserved for Internet service providers
.org for non-commercial organisations
Country identifier
The Country Identifier Email addresses outside the United States are usually identified with
an additional two letters at the end. Some of the more common ones are au for Australia, uk
for United Kingdom, nz for New Zealand, de for Germany, fr for France, and so on.
Disadvantages
i. To receive an email, one must be connected to the Internet.
ii. Viruses are easily spread via email attachments.
iii. Phishing - sending an email to a user falsely claiming to be a legitimate company
to scam the user into providing information, such as personal information and
bank account numbers on a bogus website. The details are then used for identity
theft.
iv. No guarantee the mail will be read until the user logs on and checks their email.
v. Spam - receipt of unsolicited email, i.e., junk mail.
99
Etiquettes of sending Emails.
1. Keep emails short and precise.
2. Spell check and proof read your emails before dispatching.
3. Avoid shouting i.e., composing emails completely in uppercases. Use uppercases only
where needed.
4. Protect the privacy of others. If you are sending a message to many people and it is
not necessary for the recipients to know who else received the message, put their
addresses in the Bcc field and put your own address in the To field. Don‘t put peoples
addresses on the To or Cc fields to protect their privacy.
5. Double check email attachments to ensure they are available.
6. Use digital signatories. While email and the Internet provide a cheap, convenient and
very fast way of transmitting information, they are relatively easily accessed. One
way to ensure messages sent and received are secure is to use digital signatures.
Digital signatures help to validate your identity and they can be used to sign important
documents electronically.
In text questions
1. Define email
2. What must be put in place to be able to send and receive email.
3. Mention the parts of an email
Answers
1.Email is an acronym for electronic mail. It is a message sent from one computer
to another which are connected over a local area network or over the Internet
through a communication system.
2. Email client, email server and email account
3. Username, domain name, top-level domain name and country identifier
100
1. They provide Internet services to users through dial up service, DSL
service and cellular data service.
2. Provide direct connection from the company‘s network to the Internet.
3. Provides internet services like email, access to software tools, security
service and web hosting.
Cloud Computing
Cloud computing is the storing and accessing data and programs over the Internet
instead of the computer's hard drive. In Cloud computing the information being
accessed is found remotely in the cloud or a virtual space. Companies that provide
cloud services enable users to store files and applications on remote servers and then
access all the data via the Internet. This means the user is not required to be in a
specific place to gain access to it, allowing the user to work remotely anywhere and at
any time.
101
iv. Analyzing data
v. Audio and video streaming
vi. Delivering software on demand
2.Infrastructure-as-a-service (IaaS)
Is a method for delivering everything from operating systems to servers and storage through
IP-based connectivity as part of an on-demand service. Clients avoid the need to purchase
software or servers, and instead procure these resources in an on-demand service. Popular
examples of the IaaS system include IBM Cloud and Microsoft Azure.
3.Platform-as-a-service (PaaS)
This is considered the most complex of the three layers of cloud-based computing. PaaS
shares some similarities with SaaS, the primary difference being that instead of delivering
software online, it is actually a platform for creating software that is delivered via the
Internet. This model includes platforms like Salesforce.com and Heroku.
102
and the general infrastructure. Clients access services through accounts that can be
accessed by just about anyone.
2. Private clouds are reserved for specific clients, usually one business or organisation.
The firm's data service center may host the cloud computing service. Many private
cloud computing services are provided on a private network.
3. Hybrid clouds are, as the name implies, a combination of both public and private
services. This type of model allows the user more flexibility and helps optimize the
user's infrastructure and security.
103
There are four main components of IoT
Low-power embedded systems
Made up of less battery consumption and high performance technology.
Cloud Computing
Data collected through IoT devices is massive and this data has to be stored on a reliable
storage server. This is where cloud computing comes into play. The use of cloud computing
gives more room to discover where things like electrical faults/errors are within the system.
Network Connection
In order to communicate, internet connectivity is a must where each physical object is
represented by an IP address. However, there are only a limited number of addresses
available according to the IP naming. Due to the growing number of devices, this naming
system will not be feasible anymore. Therefore, researchers are looking for another
alternative naming system to represent each physical object.
Characteristics of IoT
i. It is very scalable and efficient
ii. IP-based addressing will no longer be suitable in the upcoming future.
iii. An abundance of physical objects is present that does not use IP, so IoT is made
possible.
iv. Devices typically consume less power. When not in use, they are automatically
programmed to sleep.
v. A device that is connected to another device right now may not be connected in
another instant of time.
104
vi. Intermittent connectivity – IoT devices aren‘t always connected. In order to save
bandwidth and battery consumption, devices will be powered off periodically when not in
use. Otherwise, connections might turn unreliable and thus prove to be inefficient.
105
Bibliography
Akinyokun, O.C, (1999). Principles and Practice of Computing Technology. International
Publishers Limited, Ibadan.
Balogun, V.F. et al, (2006). Introduction to Computing: A Practical Approach. Tom-Ray
Publications, Akure.
Barker, Joe. Browser comparisons: Internet Explorer & Netscape. University of California
Berkeley Library: Teaching Library Internet Workshops. [Online] URL
http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Browsers.html
David, L.T. The Internet as an information resource - Module 5 ICT for Library and
Information Professionals: A Training Package foe Developing Countries [Online]
URLhttps://www.researchgate.net/publication/277791812_The_Internet_as_an_infor
mation_resou
http://www.dspmuranchi.ac.in/pdf/Blog/Computer%20&%20Generations.pdf
https://blog.netwrix.com/2019/01/08/network-devices-explained/
https://ecomputernotes.com/fundamental/introduction-to-computer/write-a-detailed-note-on-
classification-of-computers
https://undergrad.cs.umd.edu/what-computer-science
https://www.geeksforgeeks.org/introduction-to-internet-of-things-iot-set-
1/#:~:text=Internet%20of%20Things%20(IoT)%20is,respect%20to%20the%20extern
al%20environment
Melnic, J. Network Devices Explained [Online] URL
National Institute of Open Schooling, http://oer.nios.ac.in/wiki/index.php/
CHARACTERISTICS_OF_COMPUTERS, Date accessed, November 2020.
rce_-_Module_5
Sinha, S. (2020) Introduction to Internet of Things: IoT Tutorial with IoT Application
[Online] URL https://www.edureka.co/blog/iot-tutorial/
Yehuala, D.M. Applied Computer Science CSI 1100 () African Virtual University
[Online]URLCSI%201100_EN%20INTRODUCTION%20TO%20COMPUTER%20
SCIENCE1.pdf
106