Information: Communication Technology
Information: Communication Technology
Information: Communication Technology
COMMUNICATION TECHNOLOGY
These notes are more simplified to enable learners in the advanced level pass
paper 1 of the information and communication technology with ease
4/24/2022
TABLE OF CONTENTS
It‘s a general term used to describe all the various physical or tangible parts of a computer
like monitor, printer, keyboard etc. Hardware is divided into four main components:39
i
TOPIC 7: ELECTRONIC SPREADSHEETS 1....................................................... 67
TECHNOLOGIES ..................................................................................................... 98
ii
TOPIC 1: INTRODUCTION TO COMPUTERS
PARTS OF A COMPUTER
1. The monitor: This is a device which shows/gives the soft copy of the
data/information in the computer screen. There are two basic types of monitors: CRT
(cathode ray tube) monitors and LCD (liquid crystal display) monitors. Both types
produce sharp images, but LCD monitors have the advantage of being much thinner and
lighter. CRT monitors, however, are generally more affordable.
2. Keyboard. It‘s an input device that converts letters and other characters into electric
signals readable by the processor. It has a type writer area, function keys, cursor
movement keys and numerical keypad. It‘s a device which enables a computer user
to communicate to the computer system.
3. Mouse. This is a hand held pointing device which is used to point, select, move
and draw object in the computer screen. Examples of mice include: codeless, touch
pad (touch tone pad), mouse stick/wired.
4. Printers. These are devices which gives a hard copy of the soft copy of the data or
information held in the computer. Printers are output devices that produce text and
graphics on paper. The two main types of printers are; impact printers (dot matrix,
1
Daisy wheel) and non-impact printers (laser jet, ink-jet, thermal printers etc.)
5. Speakers. Speakers are output devices used to play sound. They may be built into the
system unit or connected with cables. Speakers allow you to listen to music and hear
sound effects from your computer.
6. System unit; is an enclosure that contains most the computer components. Or is a casing
/box that houses the internal electronic components
7. CD/DVD Drive. This a computer hardware device that reads compact discs and DVDs
8. Hard drive. This is the storage media of a computer. It is categorized into two; internal
and external.
9. The computer system. A computer system is the set of interrelated elements working
together in an integrated way to achieve a set objective.
There are four main components of a computer system are;
i. Computer hardware; this refers to the physical or tangible parts of a
computer.
ii. Computer software; these are instructions or programs a computer must follow
to accomplish a task.
iii. Data; these are raw material that are fed into the computer to be processed.
iv. Human ware or live ware; this is the user or a person who operates the
computer.
REASONS FOR STUDYING COMPUTER
To acquire general knowledge and skills in the use of computers and related
technologies
To use the acquired knowledge in computer studies to enhance learning other
subjects
To understand important issues of a technology based society and exhibit them
using computers
To acquire knowledge as a foundation for further studies in computer technology
To use a variety of computer technologies to assess, analyze and interpret
information
Jobs
Passing exams
COMPUTER MODELS
Speed: computer is quite fast in their operations in that their speed is measured in
millions instructions per second i.e. the computer is capable of processing 15
million instructions per second
Accuracy: computers are known to be accurate that they hardly make any
mistake. So for computers if wrong data is fed in it then expect wrong
information as the principle of GIGO
Storage: for a computer to work it must have a work area or work space where
data is stored before and after processing. The space is known as memory
Versatility: computers can be able to do many tasks at the same time e.g.
playing music, typing a document and browsing internet at the same time
COMPUTER SPECICFICATIONS
There are several computer systems available on the market that can be acquired as
office or personal computers. However, depending on the purpose and period for which
the computer will be used then care should be taken when choosing such a computer.
Hard disk size. The choice of a hard disk mainly depends on several factors
i.e. the tasks that the computer will be used whether the operations will keep on
increasing requiring more memory or will be constant.
3
Display device. Currently there are two types of displays i.e. CRT and LCD.
CRT occupies bigger space and consumes a lot of power whereas LCD is
better.
Expansion slots. Expansion slots are found on desktop computers which provide
space for expansion cards (add-on-cards) that might have ports for additional
peripheral components like TV cards.
Sound Card. When planning to work with multimedia packages, especially sound,
an appropriate card has to be sought of.
Modems. These are used to transmit data to and from the computer. So you
have to consider whether the modem is capable of both wireless and wire internet
connection
PC Casing. This refers to the physical structure of the box that contains and
shields the working components of a computer i.e. do you need a tower casing or
standard desktop casing.
Cost
Hiring of a computer
Lease of a computer
Data: These are basic facts of any event in life such as costs, prices, date time etc.
(unorganized facts) e.g. a list of students in a school irrespective of their classes, sex or
age. Or Data can be defined as the raw materials we feed into the computer to be
processed into information. E.g. typed names that have not been sorted Information: This
is data that has been turned into a more meaningful form that would make immediate
sense to any user i.e. processed data (organized facts). E.g. formatted document etc.
It should be complete
It should be clear
4
Should be available whenever needed
Input
Processing
Storage
Output
Data is entered into the computer through input devices like the keyboard, then it is
received by the main memory (RAM) which stores it temporarily as it awaits to be
processed, it is then sent bit by bit to the central processing unit for processing and
finally it is output through the output devices like a printer or stored on secondary storage
devices like a hard disk.
ICT‘s can also be defined as diverse set of technological tools and resources used
to communicate and create, disseminate, store and manage information. These
technologies include; computers, the internet, broadcasting technologies (radio and TV)
and telephones
Or
ICT refers to the technologies that provide access to information focusing mainly on
communication technologies such as internet, wireless networks, cell phones, personal
5
computers and other communication mediums.
News papers
Film
Recordings
Video conferencing
Internet
Cellular phones
Databases
Satellites etc.
o Business
6
4. Tele-marketing is often used by media companies especially sales
departments to generate appointments with potential customers. Often
electronic versions of customer database lists are purchased allowing sales to
contact potential customers directly.
o Education
2. The education sector is arguably one major area that ICT‘s are playing
remarkable role. These technologies are widely used in education as teaching
aids and in research; they are used to access reference materials thus
helping in facilitating learn ship and exchange of educational materials.
o Health
7
Medical automation by the use of ICT‘s offers a great assistance in the areas
of:
Automated diagnosis
ICT‘s allow for access to otherwise inaccessible and expensive foreign expertise
or labor and make it possible for hospitals in our country to use consultants or
even surgeons in another country thereby saving patients from traveling.
They s u p p o r t e f f i c i e n t e x c h a n g e o f i n f o r m a t i o n b e t w e e n
h e a l t h professionals, they enable transfer of patient records between sites and
they can improve clinical effectiveness, continuity, and quality of care by health
professionals.
ICT‘s offer Special Needs (for the Physically Challenged). For many people
with physical disabilities, ICTs can be extremely useful in providing access to
communication, education and open up opportunities for them. Most
telecommunications infrastructures are now being designed with the capabilities
of meeting the special needs of the physically challenged. For instance, the Short
Message Service (SMS) can be used to send and receive messages by the hearing
impaired; the voice activated dialing service can be used by visually impaired.
o Security
Computers keep law and order, fight crime and offer security and defense.
Police are now able to keep databases of fingerprints which are automatically
analyzed by computers. The police use this database to keep track of all
investigations.
Also computers based on face recognition and analysis, help the police force in
leading to arrest of traffic offenders and criminals.
ICT‘s are used as sources for obtaining information. For example, political
candidates provide statements of their policies on their websites, and possibly, a
link to their full manifesto, free access to information on a particular political
issue is a pre-requisite for engaging in public debate, and such debate is
desirable prior to political action like mass demonstrations.
ICT‘s are heavily used in many government ministries such as finance, planning,
education etc. to store government records and improve the efficiency within the
civil services.
Computers have been programmed to play games such as prince and chess.
o Communication industry
9
In the airline industry, computers are heavily used in air traffic control and
surveillance of air space using radar equipment as well as for reservation purposes.
Shipping and cruise liner industries utilize computers to speed up cargo handling
and passenger booking.
This has been one of the most recognized uses of the ICTs. Various
communication technologies, ranging from broadcasting to telecommunications and
to the Internet are playing effective roles in the a c q u i s i t i o n and s h a r i n g of
i n f o r m a t i o n . The c o n c e p t s of t h e information r e v o l u t i o n and information
s o c i e t y are d r i v e n b y enormous advancements in ICTs and their
application. The Internet for e x a m p l e , h a s p r o v i d e d p l a t f o r m s f o r
s h a r i n g i n f o r m a t i o n i n applications such as the E-Mail and The World Wide
Web.
Social
Positives
We can have access to the Internet in our social lives as well with libraries
having Internet access points and Internet cafes still being popular. Restaurants
often have Internet access points and if you have stayed in a ‗big‘ hotel lately
you will find that the rooms have Internet access points for your laptop to plug
into.
There is some concern that the widespread use of computers is dividing society
into two kinds of people – the ‗information rich‘ and ‗information poor‘.
The information rich have easy access to computers and electronic
communications. They get information and news from the Internet and buy the
latest products through on-line shopping. They are able to follow computer-
10
based learning and skills training courses at home, and look for jobs that are
advertised solely on the Internet. They tend to find it easier to get well-paid jobs
and will enjoy a more comfortable and secure life-style.
The information poor don‘t have easy access to computers and don‘t have the IT
skills and confidence to take part in teleshopping, telebanking, and Internet chat
and news groups. As corporations like the BBC seek public opinion on current
matters increasingly via the Internet, the voices of the information poor may not
be heard. The jobs on offer to them will be less skilled, paid less and much more
insecure.
One effect of high levels of unemployment has been that families feel more
secure with two wages coming into the family. This has meant that more and
more mothers have careers. As a result, they may not have any children till they
are thirty or older and even then they may only have one child because they do
not want, or are afraid, to interrupt their careers.
More and more families enjoy television, computers and electronic games in
their homes. Father may be watching television; mother may be teleshopping
over the Internet while the children are in their bedrooms playing arcade games.
Research has shown that families are spending less and less time together.
In addition, with the growth of teleworking, fewer people are meeting with
colleagues to discuss business matters during the day. Computers are having an
adverse effect on human communication skills and relations within the family
and in society in general.
o Economic
Another less obvious effect of computers and IT on the family is the change that
banks have made to our lives. Before banks were computerized, most workers
were paid weekly and in cash, and they did not need a bank account. With t h e
i n t r o d u c t i o n o f c o m p u t e r i z a t i o n , ban ks s t a r t e d t o p e r s u a d e
companies, government and local authorities to pay employees by cheque. As a
result, very little cash is in circulation now compared with the 1950s and 60s
11
because now people work with ‗plastic money.
o Political
ICT‘s such as internet are used to predict and track climate changes in
agriculture, the incidence of forest fires, flood and drought patterns, the
movement of invasive species just to name a few and develop appropriate
management and adaptation strategies, and plot a course toward better
environmental management.
ICT‘s applications can be used to impart information directly to farmers and the
farming community. There are expert system designed to handle agricultural
issues such as water utilization and management, pest control, harvest
management and so forth.
Improved corporate image i.e. firms use ICTs to create logos and headed letters
Many IT products for the disabled are being created i.e. Baillie Keyboards
Widens the gap between the information rich and the information poor as the rich
12
produce products faster on the market than the poor
Isolates older people since they do not find it easy to learn and use ICT gadgets
very fast
ICT avails people with lots of good and bad information from the internet
Reduced physical activities which in turn creates lots of health problem e.g. eye
strain, back problems etc.
Erosion of individual privacy as more and more people‘s private data is being
stored in databases was others can access any time.
Increased unemployment as less skilled people get retrenched and their jobs taken
over by more effective ITs like Robots in factories
The initial maintenance and ICT facilities is very high e.g. internet access bills
13
TOPIC 2: COMPUTER MANAGEMENT
3. Icons are small graphic images or pictures that represent a file, program, web page
or a command
4. Desktop is the first computer screen display before any program is opened. It
consists of different icons i.e. my computer.
5. Booting This means starting/restarting of a computer. There are two main ways of
booting a computer i.e. cold booting and warm booting.
6. Cold booting is the starting of a computer from its off state from the mains.
Involves switching on a computer right from the main power supply, stabilizer or
uninterruptible power supply (UPS), the system unit and the monitor.
The BIOS runs the complementary metal oxide semiconductor (CMOS) on the
motherboard. CMOS helps to keep track of the current date and time (system
time)
The BIOS the runs Power-On self-Test (POST). POST checks whether all the
basic hardware (RAM, Disk Drives, keyboard) are working properly.
FILE MANAGEMENT
14
A folder is a collection of files.
Deleting a folder
Identifying a file
Types of files
Text files, data files, program files, directory files etc. program files store files
whereas text files store text.
S ys te m files. These are sets of files that instruct the computer how to function.
They usually have a file extension of .sys
Program files; these are files that contain instructions which a computer carries
out while performing a task. They usually carry an extension of .exe or .com
Data files; these are files that contain text or numeric information and are
created during the execution of a task using a specific computer program by the
computer.
Batch files; these are text files that contains a sequence of commands for a
computer‘s operating system. They contain an extension of .Bat
File extension. Refers to the last three/four/five characters after the period (.) that
make up the entire file name.
The file extension indicates what kind of file it is. For example, Myfile.docx is a file
15
with name Myfile and file extension .docx.
.htm/.html - a plain text document with added code that enables it to read on
World Wide Web
File path. It‘s a notation that indicates the location of a file on your computer.
Or
A group of letters occurring after a period (.) in a file name indicating the type of file
This is the process of changing the different settings of how your computer screen
display will look like i.e. setting screen saver, changing the wall paper, mouse pointer
and setting different icons to appear on the screen
Practical questions
When a computer starts, it displays different icons that work differently as explained
below;
Recycle bin icon. It‘s an icon that represents a container for all deleted items from the
computer or this is where deleted items are stored
My computer; It‘s the icon that represent computer hard disks i.e. local disk (D), local
disk (C)
Utility programs are system programs that are used to support and enhance the
proper performance of an operating system.
1. Backup programs. These programs let you protect your files by making copies
of them.
17
2. Data recovery. These are programs used to restore data that has been physically
damaged or corrupted.
5. Anti-virus programs. This software protects your system from viruses. They
include; Mac fee, Avira, Avast etc.
Selecting a printer
Print a document
MODES OF PRINTING
1. Multiple page printing. This is where a user prints more than one page of the
same document on a single sheet of paper
2. Multiple copies printing. This is where a user prints more than one copy of the
same document
3. Handout printing. This is the mode of printing where multiple slides are
printed on one page
4. Slide printing. This is the mode of printing where a single slide is printed
covering the whole page
18
TOPIC 3: COMPUTER LABORATORY CARE AND MAINTENANCE
Computer literacy is the knowledge and ability to use computers and related
technology efficiently.
Assembling
If the power goes off, computer equipment must keep running. Even home
computers need the time to shut down properly. Damage to devices and data
can occur when there is sudden power loss or fluctuation.
A UPS is essentially a small battery that keeps the power supply on for long
enough for you to switch off the computer safely when there is a sudden
blackout.
b. Air conditioner
Air conditioning units monitor and maintain the temperature, air distribution
19
and humidity in a computer room.
An Air conditioning unit is a device used for cooling and controlling the
humidity and purity of the air circulating in a space.
c. Fire extinguisher
Fire extinguishers are a critical component of saving property and lives in the
case of a fire emergency.
It can save our property from burning because the use of the device will help
prevent it from spreading and can even stop the flame in no time.
d. Security camera
Security cameras act as a deterrent to theft and other crimes. Cameras monitor
data centers or blind spots outside of doors / Surveillance
20
Play back for reference purposes
e. Blower
Used to blow/remove dust that may have entered inside the computer
g. Water proof covers. Protect computers from moisture, water and liquids.
A first aid kit is a box or bag that contains the necessary items for providing
emergency care. It is important to have first aid kits, because they allow
someone who is injured, to be rapidly treated with basic first aid, before they
can be properly treated at the local hospital.
21
i. Wool carpet
The wool carpet is used to trap dust that enters in the computer laboratory.
Absorb moisture
j. Internet gateway
k. Burglar proofing
Burglar proofing provides protection against any forced physical entry into
the computer laboratory. Burglar proofing involves fitting metal grills in
windows and doors.
Protection against fire. Have gaseous fire extinguishers like those filled with
carbon dioxide. Water based or powder extinguishers should be avoided since
they can cause damage to computer components.
Computers should not share the same power line with other office machines to
avoid overloading the power units.
Cable insulation. All power cables must be properly insulated and laid away
from pathways in the room.
Lay them along the walls in trunks. This prevents electric shock and power
disconnections caused by stumbling on cables.
Protect computers from being damaged and data loss due to power instabilities
by having:
22
Uninterruptible power supply (UPS)
Burglar proofing
Consider installing security alarms at strategic access points that would alert the
security personnel in case of a break-in.
Fit strong metallic grills and locks on doors, windows and strengthen the roof
incase the roofing is weak.
AIR CIRCULATION
Have good air circulation in the computer room since users and computers emit
heat energy.
This is possible through having enough ventilation points like windows, installing
an air conditioning system.
23
Avoid overcrowding of machines and users.
Lighting. A computer laboratory must be well lit with appropriate wall paints to avoid
eye strain, headaches, stress and fatigue and always fit radiation filter screens to
reduce light that reaches the eyes
Standard furniture. Have standard furniture so that the tables are wide enough and
strong to bear the weight of the computers and accommodate all peripherals. The seat
for the user must be comfortable and have a straight backrest that allows someone to
sit upright.
a) Physical security. While setting up lab one should consider the following
security measures.
Employ security guards to keep watch over data and information centers.
Apply burglar proof for the computer laboratory by reinforcing weak access
points like windows, doors, roofing with metal grills and strong padlocks.
Use system locks (locked key systems) to make it difficult to access internal
components like hard disks and memory sticks.
Electronic locking mechanism with keys, swipe cards, finger print recognition.
24
Remote administration software should be considered with high number of
computers in a computer center.
Computer covers
c) Electric power security. One should use uninterruptible power supply and surge
protectors to protect your computers from electric shocks
e) Software based security. This involves the use of unique authorized logins
( IDs a n d p a s s w o r d s ), p r e v e n t i o n s ys t e m s o f t w a r e , a n t i v i r u s ,
firewalls etc.
f) First Aid Boxes. This provides first aid to users in the Lab in case of an
accident.
g) Air conditioner. This helps to cool the computers as they generate heat when
working
h) Fire extinguisher. This is used to put off fire in case of any accident.
i) Installation of smoke detectors which can be used to detect smoke and alert
member before the outbreak of fire
Computer laboratories give many people access to computer programs, internet and
other resources. Lab computers are used often by people with varying degrees of
computer training. This means they are at risk from viruses, corrupt files, spyware,
malfunction etc. so you have to maintain Lab computers regularly in order to
ensure that they do not crash by doing the following;
25
Plug all your computer equipment into a surge protector to avoid power
spikes which can damage electrical equipment as well as lose user‘s data
Set up a network layer firewall that will deny access to sites or programs that
don‘t fit into the acceptable range
Set up weekly updates or automatic updates for your lab computers i.e. update
your programs regularly
Install an up-to-date anti-virus program on the computers this will usually stop a
computer from acquiring virus.
Back up your computers data on a regular basis so that if your computers become
corrupted by a virus you can return to the previous backup to restore it
Do not unplug printers, scanners and other connected machines when the
computers are on i.e. eject any USB devices before unplugging them
Ask your users to always press the Ctrl+Alt+Del buttons whenever their
computers freezes rather than shutting it down with the power button
Turn off all computers by selecting the shut down option on the desktop. A
void pressing the power button to turn off computers
Clean your computer lab regularly. The following are effective ways to clean a
computer lab
a) Dust computer screens using a thin soft microfiber cloth. Dedicate one cloth
to be used only on the screen
c) Dust all parts that are found inside the system unit using a borrower
Most institutions in Uganda have computer Labs with safety rules to follow when
using them. There are a lot of machines and other equipment items kept in the
Labs and it‘s absolutely necessary to ensure that no one carries out an action to
damage the equipment. Below are some of the rules
26
Install fire extinguishers to help in case of fire out break.
Do not use external devices without scanning them for computer viruses
Ensure that the temperature in the room stays cool since there are many
machines in the lab which can over heat easily.
Dust can affect computers so ensure that all computers are always clean
Maintenance of computers
Back Up Your Files. One of the most stressful experiences for a computer user is
data loss. Most computers use a hard disk drive as the primary storage device.
Hard disk drives can function for many years, but at some point, they will crash.
One of the solutions is to create a backup of your files. You can burn a CD or
DVD with your most critical files, copy your files to an external hard disk drive or
use an online backup service. Whatever strategy you use, just make sure you create
a backup copy of your files on a regular basis.
Use Antivirus Software. Computer systems face a number of security threats. The
most serious threats consist of viruses.
The best way to deal with the threat of computer viruses is to use antivirus
software. Antivirus software helps to protect a computer system from viruses
and other harmful programs.
Antivirus software prevents viruses from getting into your computer system,
scans your online activity to make sure you are not downloading infected files
also helps to detect and remove viruses from your computer system if you get
infected.
Use Disk Tools. Disk tools include a range of different tools to manage hard
disk drives and other storage devices. These are important because a hard disk
drive failure can have disastrous consequences, including losing all your data.
Keeping disks running securely and efficiently is an important part of overall
computer maintenance.
Some of the recommended disk tools you should use on a regular basis are disk
cleaning and disk defragmentation.
Do not download and install unknown software from Internet. This is the
biggest mistake most of the PC users are doing. Some of this software can
damage the Windows registry, which cause lot of errors.
Install a Personal Firewall. Most of the antivirus programs are bundled with
Personal Firewalls these days. Personal firewall is a barrier between your PC
and the outside world. This can protect your PC from hackers and Spyware
tools.
Be very careful when you download music from the Internet. Always stick to
one trustworthy web site.
28
Software update is also called a patch because it's 'patching' the software.
We are often asked to investigate why a computer is running slowly and what
can be done to make it faster. Diagnosing the reason a computer is running
slowly requires checking all of these potential causes, since the symptom alone
is not enough to differentiate or isolate the cause. This list is not comprehensive;
there are some other unusual and rare causes that will make a computer run
more slowly
1. Insufficient RAM to run all programs in memory without swapping to the hard
drive.
Solution: compare commit charge to physical RAM and add RAM memory.
2. Bad hard drive; disk errors creating delays. Solution: test and repair or replace
the hard drive.
3. Low performance CPU. Solution: replace a Celeron CPU with a Pentium CPU for
improved performance.
4. Overheating due to failed fan or excessive dust blocking heat sink. Solution:
clean accumulated dust using compressed air.
7. Wrong video driver making the display run slowly. Solution: upgrade the video
driver software in Windows device manager.
Solution: use MS config to remove startup programs, use add-on manager in IE7
and later to remove unused add-ons and toolbars.
29
10. Viruses and spyware stealing memory and processor performance. Solution: use
Malware bytes and other scanning tools to identify and remove extraneous
software.
11. Low performance hard drive with 2mb cache or 5400-rpm spindle motor:
Solution: replace hard drive with faster 8mb cache and 7200-rpm spindle motor or
SSD drive.
30
TOPIC 4: COMPUTER WORD PROCESSING
Introduction
Lesson 1 familiarized you with the Microsoft Word window. You are now ready to learn
how to create a Word document. This lesson covers typing, using the Backspace key,
using the Delete key, inserting text, bolding, underlining, and italicizing.
The features in Word 2007 can make your work easier, make your documents more attractive,
and/or enable you to work more efficiently. This Microsoft Word lesson teaches you how to open
a file, cut, copy, paste, use AutoText, use spell check, use Find and Replace, and change fonts. All
of these features either make your work easier or make your document more attractive.
Open a File
Cut and Paste
Copy and Paste
Use the Clipboard
Create AutoText
Use Spell Check
Find and Replace
Change the Font Size
Change the Font
Save Your File
When you type information into Microsoft Word, each time you press the Enter key Word
creates a new paragraph. You can format paragraphs. For example, you can indent the first
line of a paragraph, you can set the amount of space that separates paragraphs, and you
can align a paragraph left, right, center, or flush with both margins. Styles are a set of
32
formats you can quickly apply to a paragraph. For example, by applying a style, you can
set the font, set the font size, and align a paragraph all at once. In this lesson, you will
learn about the various formats you can apply to a paragraph and about styles.
Adding Bullets and Numbers, Undoing and Redoing, Setting Page Layouts and Printing
Documents
If you have lists of data, you may want to bullet or number them. When using
Microsoft Word, bulleting and numbering are easy. The first part of this lesson teaches
you to bullet and number. After you have completed your document, you may want to
share it with others. One way to share your document is to print and distribute it.
However, before you print you may want to add page numbers and tell Word such
things as the page orientation, the paper size, and the margin setting you want to use.
In this lesson you will learn how to layout and how to print your documents.
This lesson will introduce you to the Word window. You use this window to interact with Word.
To begin this lesson, open Microsoft Word 2007. The Microsoft Word window appears and your
screen looks similar to the one shown here.
33
Note: Your screen will probably not look exactly like the screen shown. In Word 2007, how a
window displays depends on the size of your window, the size of your monitor, and the resolution
to which your monitor is set. Resolution determines how much information your computer
monitor can display. If you use a low resolution, less information fits on your screen, but the size
of your text and images are larger. If you use a high resolution, more information fits on your
screen, but the size of the text and images are smaller. Also, Word 2007, Windows Vista, and
Windows XP have settings that allow you to change the color and style of your windows.
34
The Ribbon
You use commands to tell Microsoft Word what to do. In Microsoft Word 2007, you use the
Ribbon to issue commands. The Ribbon is located near the top of the screen, below the Quick
Access toolbar. At the top of the Ribbon are several tabs; clicking a tab displays several related
command groups. Within each group are related command buttons. You click buttons to issue
commands or to access menus and dialog boxes. You may also find a dialog box launcher in the
bottom-right corner of a group. Clicking the dialog box launcher gives you access to additional
commands via a dialog box.
The Ruler
The ruler is found below the Ribbon.
You can use the ruler to change the format of your document quickly. If your ruler is not visible,
follow the steps listed here:
Click the check box next to Ruler in the Show/Hide group. The ruler appears below the Ribbon.
35
The Vertical and Horizontal and Vertical Scroll Bars
The vertical and horizontal scroll bars enable you to move up, down, and across your window
simply by dragging the icon located on the scroll bar. The vertical scroll bar is located along the
right side of the screen. The horizontal scroll bar is located just above the status bar. To move up
and down your document, click and drag the vertical scroll bar up and down. To move back and
forth across your document, click and drag the horizontal scroll bar back and forth. You won't see
a horizontal scroll bar if the width of your document fits on your screen.
Draft View
Draft view is the most frequently used view. You use Draft view to quickly edit your document.
36
Web Layout
Web Layout view enables you to see your document as it would appear in a browser such as
Internet Explorer.
Print Layout
The Print Layout view shows the document as it will look when it is printed.
Reading Layout
Reading Layout view formats your screen to make reading your document more comfortable.
Outline View
Outline view displays the document in outline form. You can display headings without the text. If
you move a heading, the accompanying text moves with it.
You should use Draft view for these lessons. Before moving ahead, make sure you are in Draft
view:
Click Draft in the Document Views group. When the Draft option is selected it appears in a
contrasting color.
Click
During the lessons that follow, you will be asked to "click" items and to choose tabs. When asked
to click:
37
Press your right mouse button.
38
TOPIC 5: COMPUTER HARDWARE
It’s a general term used to describe all the various physical or tangible parts of a computer like
monitor, printer, keyboard etc. Hardware is divided into four main components:
Output devices
Storage devices
Processing unit
(i) Input units. These are devices that feed the computer with data and
information. They include; a keyboard, scanner, mouse, digital cameras, joy
stick, smart cards, credit card, automated Teller Machine card (ATM card),
light pen, magnetic ink character reader(MICR), optical mark reader (OCR),
bar code readers, optical character readers, touch screen, digitizer among
others.
OR
These are devices used in entering data and instructions into a computer. Note
that, the input could be text (numbers, letters and formulae) images, sound etc.
1. Keyboard. It‘s an input device that converts letters and other characters into
electric signals readable by the processor. It has a type writer area, function
keys, cursor movement keys and numerical keypad. It‘s a device which
enables a computer user to communicate to the computer system. Advantages
of using the keyboard
- Keyboards are more reliable and usually produce fewer errors than other
input devices such as voice inputs
39
Typing speed is still very slow when compared with computer speed
2. Mouse. This is a hand held pointing device which is used to point, select,
move and draw object in the computer screen. Examples of mice include:
codeless, touch pad (touch tone pad), mouse stick.
3. Scanner. Is a light sensing input device that converts printed texts and
graphics into a digital form that can be further processed by the computer OR
This is a device that is used to read graphical data or information into a
computer e.g. logos, emblems, photos, pictures etc. scanners are usually used
to capture existing documents in an electronic form for further processing or
incorporating into other documents. Text and graphics can be scanned and
images can be manipulated by changing the colors, the sharpness and contrast
etc.
Types of scanners
Hand scanners. These are used in scanning small objects e.g. logos,
signatures, emblems, budges, thumb prints etc.
Flatbed scanner. These are heavy scanners which are used for scanning
commercial photos and pictures.
4. Credit card. It‘s a small plastic card that allows its holder to buy goods and
services on credit and to pay at fixed intervals. It has a strip of magnetic tape
fixed on it containing coded information which is usually the owner‘s code.
The card is inserted into a slot where magnetic data may be picked. Details of
the transaction are then recorded against the credit card number and the
owner‘s account is credited with the transaction.
5. Bar code reader. Most items manufactured are labeled with a Universal
Product Code (UPC), identifying the items .the label code is terms of bars
with coded spacing and thickness. These bars contain information in codes
that a computer can interpret. Most supermarkets today use this system and the
codes can be seen on every item on stock. This enables fast pricing,
identification and accurate stock tracking/taking. A bar code reader is a device
used to read these codes and send request to central computer on which the
database of the organization is stored, the central computer sends a
response about the product details i.e. its price, name, manufactured date etc.
40
6. Optical mark reader. This is a device which can detect the presence or
absence of a mark on a paper. Light is shown onto the paper and the
reflected light is detected. This device is used for reading answers to questions
in an exam or survey.
8. The voice recognition device. This is used to recognize words from a person
and follow the instructions. An example of its use is in a computer which
opens money safe, if the correct password is said.
9. The joystick. It‘s a device connected to a terminal with a control level that
can be moved or titled in various directions for moving the cursor to any
position on the screen. It‘s commonly used in computer graphics and in
playing games.
10. A light pen. It consists of a stylus connected by a cable to the terminal that can
sense the light from a position on the screen and convert it into an electrical
signal transmitted to the computer. It can be used to move or delete images on
the screen or to create new images.
11. Touch screen. With touch screen, users of computers just have to point on a
particular item they want to select from the screen using their fingers.
When a particular part is touched, the screen can sense that part and the item
in that area will be selected.
12. Digital cameras. These take photographs like normal cameras do. The only
difference is that digital cameras do not create an image on a film like
ordinary cameras but instead the image is stored on the camera and after
downloaded onto a computer for editing and printing.
These are external hardware components that transfer information from the
computer‘s central processing Unit (CPU) to the computer user in either soft or
hardcopy format.
They include:
41
Monitor (VDU) Printers
Plotters projector
CRTs are not affected by the problem of dead pixels as images are painted
on the screen. Etc.
LCD monitors are not resistant to harsh conditions like dusty conditions
LCDs are affected by the problem of dead pixels as images are painted on the
42
screen. Etc.
2. Printers. These are devices which gives a hard copy of the soft copy of the data
or information held in the computer. Printers are output devices that produce
text and graphics on paper. They are connected by a cable to a PC through a
special socket on the computer referred to as a printer port. Types of printers:
They are basically two types of printers i.e. impact and non-impact printers.
Impact printers are the ones which print by physically striking their print heads
on the printing media like paper, cloth etc. e.g. Dot matrix which print using a
set of pins on a print head, Daisy wheel which print using a wheel of characters
etc. Their print heads press the paper with the ribbon to produce the printout.
Non-impact printers are the ones which print by not physically striking their
print heads on the printing media like paper, cloth etc. They use chemicals, laser
or heat to produce the image. They give out high quality printouts. E.g. laser jet
which uses toner contained in toner cartridges and ink jet which uses ink
contained in ink cartridges.
These are devices that are used in computers to store data. Computer memory
can be divided into three:
Examples
Hard disks, Floppy diskettes, Compact disks, Digital versatile disks, Flash
disks, Memory cards Etc.
Magnetic tapes generally transfer data a bit slower than hard drives;
however magnetic tapes are cheaper and are more durable.
But inserting a floppy disk into system we must use a floppy disk drive.
The capacity of the floppy disk is 1.44MB.
Zip disks: is a high capacity floppy disk drive that is slightly larger than a
normal floppy disk. They can hold 100 or 250 MBs of data; they are durable
and good for backing up data Magnetic hard disk: is the main and usually
largest data storage device in a computer. A hard disk is generally the fastest
in all secondary storage devices and has the large data storage capacity.
Inexpensive storage
Gradually lose their charge over time i.e. there is data loss over time
Hard disks eventually fail which stops the computer from working.
This is a data storage device based on electronic circuits with no moving parts.
Solid state devices use a special type of memory called flash memory.
Floppy disk; this is small portable plastic disk used to store data or
information. It utilizes its magnetic properties to keep data or information.
Digital Versatile Disks (DVD’s). They look exactly like CD‘s except that
DVD‘s have got very big storage capacity than CD‘s. CD‘s have the capacity
ranging from 500MB‘s to 700MB‘s but DVD‘s range from 1 GB to 20 GB‘s.
Zip drives. These are related to diskettes but they are bigger than diskettes in
terms of size and storage capacity. They have storage capacity ranging from
100 MB to 2 GB‘s.
- Compact Disk Read Only Memory (CD-ROM). With these disks, you just
read what is there but you cannot erase or write on them.
- Compact Disk Recordable (CD-R). This type can be written to but only
once. This means that once you write on this disk, you can‘t erase to write
new information or make changes to the existing one.
- Punched card. It‘s a rectangular card used to store data by the presence or
absence of small holes that can be punched in specific locations on the card.
These cards were used with first computers before disks were invented.
Do not place a diskette near a magnetic field such as near a radio speaker, on top
of your system unit or near electric motor etc.
Do not insert or remove it from its drive when the drive active light is on.
Do not force it into its drive. It should slip in with little or no resistance.
b. The primary memory. This is a type of memory that stores data and
instructions only when the computer is working. It‘s a temporary type of
memory that can lose its contents when power to the computer system is turned
off (volatile memory)
- Cache memory
RAM Random Access Memory (the main memory of the computer); this is the
working memory and main memory of the computer that temporarily store data
46
and programs that are being accessed by the computer.
The data and programs that are stored on RAM are volatile i.e. it be lost in case
power in the machine is switched off.
Types of RAM:
SRAM Static RAM uses a completely different technology. S-RAM retains stored
information only as long as the power supply is on. Static RAM‘s are costlier and
consume more power. They have higher speed than D-RAMs.
It‘s a form of RAM that is more expensive to produce, but is generally faster and
requires less power than DRAM and, in modern computers, is often used as cache
memory for the CPU.
DRAM; this is a form RAM which stores information for a very short time even
when the power supply is on.
CHARACTERISTICS OF RAM
Its volatile
This is another type of memory that holds information which was put there at
the time of manufacturing. It can‘t be modified and additions can‘t be made. A
computer has a set of in-built instructions it has to know what to do when
turned on.
47
The instructions built into ROM are permanent.
The computer can read or follow instructions in ROM but can‘t change them or
add to them. That is why the memory is called Read Only.
It‘s a stable memory i.e. it‘s not affected by power cut off. An example of
ROM memory is the PC‘s ROM BIOS (Basic Input and Output System) chip.
This ROM chip contains a set of instructions that the microprocessor uses when
the PC is turned on or reset.
PROM is read-only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM program. It
can be programmed only once and is not erasable.
CHARACTERISTICS OF ROM
o Can‘t be upgraded
o Its non-volatile
This is the heart of the computer where the entire processing takes place. It
48
is sometimes referred to as the brain of the computer. It is the center of
activities in the computer hence referred to as Central Processing Unit.
o The arithmetic and logic unit (ALU): performs calculations and decisions
The Arithmetic and Logic Unit (ALU): This is the component in the CPU,
which handles all the arithmetic and logic operations of the computer system. It
is actually the calculator of the computer system.
The control unit; this is a component of the CPU which governs all activities
within the computer. It interprets instructions stored in the main memory and
gives instructions to relevant parts of the computer system.
The control unit performs the four steps carried out by the machine cycle within
the CPU for each machine language instruction. The machine cycle has got four
steps which include;
- Storing; this involves sending and writing the results of execution back to
memory.
49
one application at the same time
MEMORY MEASUREMENTS
1000MB = 1GB
1000GB = 1TB.
Note:
50
However, RAM is a volatile memory i.e. in case the machine is turned off or
power goes off without saving all the information in the memory is lost.
There are five different kinds of port in a system unit. The ports are:
Serial Port
Parallel Port
A serial port is used to connect a device to the system unit by transmitting data
one bit at a time. Earlier PCs used the serial port for the mouse, and earlier
Macintosh models used the serial port to attach a printer.
Today, the serial port is a legacy interface, having been superseded by the
This parallel port can transfer eight bits of data (one byte) simultaneously
through eight separate lines in a single cable. An example of a parallel port is
the printer port.
c. USB PORT
MIDI port; It is designed to connect the system unit to a musical instrument, such
as an electronic keyboard.
IrDA port
52
TOPIC 6: COMPUTER SOFTWARE
Program; This is a series of step-by-step instructs that provide solutions and tell the
computer what to do. They are logical arranged set of programming statement.
CHARACTERISTICS OF SOFTWARE
a) Correctness: the software should meet all the specifications stated by the customer.
b) Usability/learnability: the amount of effort or time required to learn how to use the
software should be less.
c) Reliability: the software product should not fail while processing a task.
d) Efficiency: the software should make effective use of the storage space and
execute commands as per the desired timing requirements.
e) Security. The software should not have negative effects on data it is processing or
hardware on which it is installed.
f) Safety. The software should not be hazardous to the environment and life. g) Cost.
It should be affordable in terms of cost.
g) Maintainability. Maintenance of the software should be easy for any kind of user.
h) Scalability. Software should be easy to upgrade for more functionality (or for more
number of users).
i) Interoperability. This is the ability of software to change information with other
applications e.g. exporting MS excel data to ms word.
j) Portability. The ability of software to perform same functions across different
environments and platforms, e.g. same performance on dell, Acer and hp
computers.
53
A. SYSTEM SOFTWARE
54
It helps in multi-programming.
It enables booting a computer.
Sometimes they have in-built system utilities like debuggers
and defragmenters which help in the maintenance of disks.
It helps in mediating between the computer user and the computer system in
order to help the user to interact with the computer hardware to obtain
results.
It coordinates all activities in the various parts of the computer
It alerts the user and reports errors
It manages resources such as the CPU and memory.
It manages multi-tasking (doing many tasks at once e.g. printing, inputting
and processing) and multi-programming (a technique of having more than
one program in the main/ primary storage which programs may be running
or are being processed at the same time). For example, having a word
document and excel spreadsheet open at the same time.
Ensures automatic update of time and date on the computer
It determines the interface of the desktop. Some operating systems are
command based and thus require one to type in commands (e.g. DOS) while
others use graphics / pictures (e.g. windows XP)
Controls system security by maintaining the use of passwords. A password
is a set of system before further access is permitted.
2. Programming Languages: These are coded instructions which are used when
designing computer programs. Programming languages provide a medium used to
write instructions that command computer hardware to perform particular tasks.
These languages are grouped into two major categories:
Low level languages (L.L.L)
High level languages (H.L.L)
a. LOW LEVEL:
These are the languages, which the computer can understand. They are machine
dependent and are very difficult for the programmer to understand. Examples
include:
(i) The machine language: this is written in the binary code i.e. the digits 0s and
1s are used. It is also referred to as the first generation languages.
(ii) The Assembly Language: This language use letters to represent a group of
55
words instead of presenting a binary operation instruction to the computer
as a set of ones and zeros. They use more English-like instructions ―ADD‖.
Each assembly language instruction is eventually translated into one
machine language instruction. The computerized translation program is
referred to as an assembler (The plan language)
b. High Level Languages: these are the languages which the programmer can
easily understand. The computer can not immediately understand these
languages. In these languages, instructions are used like wards and phrases
and they are translated into a low-level language for computer to easily
understand. High level languages are now referred to as third- generation
languages.
Examples include;
56
Interpreter. A programming language processor that translates a program line by line
(statement by statement) and carries out the specified actions in sequence
These are system programs that assist in the preparation of a program and translate into
machine code for execution. Examples include; language translators, compilers,
assemblers, editors, debug aids.
3. Utility software. These are system programs used to support, enhance or expand
programs in a computer system. They can also be defined as software tools that
are used to carry out organization and maintenance activities e.g. deleting of
unwanted materials, deleting those programs which cause the computer to work
abnormally etc. They are generally programs which perform tasks related to
maintenance in your computer‘s health, hardware and data. They include:
File viewer, displays and copies the content of a file
Diagnostic utility. Compiles technical information about computer hardware and
certain system software programs and prepares a report outlining any identified
problems.
Disk scanner. Detects and corrects both physical and logical problems on a hard
disk or removable drive, searches for and removes unwanted files. Physical
problem is one with the media such as scratch on the surface of the disk.
Logical problem is one with the data such as a corrupted file allocation table
(FAT)
Screen saver. Causes the monitors screen to display a moving image or blank
screen if no keyboard or mouse activity occurs for specified time period.
Uninstaller. Removes an application as well as any associated entries in the system
files.
Backup up programs. These ones let you protect your files by making copies of
them.
Data recovery programs. These are used to restore data that has been
physically damaged or corrupted.
Data compression programs. Reduces the size of the file
Debuggers. These are programs which correct errors in a computer program.
A bug is an error in a computer program and to debug means to correct errors in
a program.
57
Defragmenters. These are programs, which bring fragments of a file together
for storage in one location in the computer memory.
Disk maintenance. Disk maintenance utilities like Norton disk doctor, scandisk
etc. These programs detect errors on a computer disk and fix them like checking
for bad clusters on a hard disk or diskette and marking faulty ones as bad cluster.
A bug: An error or defect in software or hardware that causes a program to
malfunction. Often a bug is caused by conflicts in software when applications try
to run in a wrong or unexpected way.
Debugging is the process of locating and fixing or bypassing bug s (errors) in
computer program code or the engineering of a hardware device.
Virus protection programs (Anti-virus programs). This is anti-virus software
which protects your system from viruses.
A virus is a program that interferes with the normal running of a computer system.
Anti-virus programs can be used to detect and remove viruses from your
system and any other storage media. Examples of anti-viruses include; central
point anti – virus, Mac fee, Norton anti-virus, Avast etc.
Computer viruses: These are computer programs which silently replicate
(reproduce) themselves on storage media without the computer user realizing it.
A computer virus is a program designed to harm or cause harm on an infected
computer. Its spreads through e-mail attachments, portable devices, websites
containing malicious scripts and file downloads.
A computer virus attaches itself to the host files and always activate whenever you
open the infected files. The virus can replicate itself and then infect the other files
on your computer causing more damage. Below is a list of different types of
computer viruses and what they do.
a. File virus. This type of virus hides in program files, especially those files
which have extension. EXE and COM.
b. Boot sector viruses. These viruses hide in the boot sector of a disk. This
particular sector contains important information about the disk‘s logical setup.
c. Partition sector viruses. These hide in the primary sector of a hard disk. This
58
area is where programs which start a computer are stored. When a virus gets to
this area, it at times changes the programs it finds there. In the end, this may
cause a computer not to start.
d. Macro Viruses. These viruses infect the files created using some applications or
programs that contain macros such as doc, pps, xls and mdb. They automatically
infect the files with macros and also templates and documents that are contained in
the file. They hide in documents shared through e-mail and networks.
Macro viruses include: Relax, bablas, Melissa.A, 097M/Y2K
e. Memory Resident Viruses; they usually fix themselves inside the computer
memory. They get activated every time the OS runs and end up infecting other
opened files. They hide in RAM. Memory Resident Viruses Include: CMJ,
meve, randex, mrklunky
f. Overwrite Viruses; these types of viruses delete any information in a file they
infect, leaving them partially or completely useless once they are infected. Once in
the computer, they replace all the file content but the file size doesn‘t change.
Overwrite Viruses Include: Trj.Reboot, way, trivial.88.D
g. Direct Action Viruses; these viruses mainly replicate or take action once they are
executed. These viruses are generally found in the hard disk‘s root directory, but
they keep on changing location. They include; Vienna virus
h. Directory Virus; Also known as cluster virus or file system virus. They infect the
computer‘s directory by changing the path indicating file location. They include;
dir-2 virus
i. Web Scripting Virus; Most web pages include some complex codes in order to
create an interactive and interesting content. Such a code is often exploited to
cause certain undesirable actions. They mostly originate from the infected web
pages or browsers. Web Scripting Viruses Include: JS.Fortnight – a virus that
spreads via malicious emails.
j. Multipartite Virus; These type of viruses spread in many different ways. Their
actions vary depending on the OS installed and presence of certain files. They tend
to hide in the computer‘s memory but do not infect the hard disk.
k. FAT Viruses; These lardy viruses attack the file allocation table (FAT) which is
the disc part used to store every information about the available space, location of
files, unusable space etc. FAT Viruses Include: the link virus
l. Companion Viruses; These types of viruses infect files just like the direct
59
action and the resident types. Once inside the computer, they ‗accompany‘
other existing files. Companion Viruses Include: Asimov.1539, stator and
terrax.1069
m. Polymorphic Virus; they encode or encrypt themselves in a different way
every time they infect your computer. They use different encryption and
algorithms. This makes it difficult for the antivirus software to locate those
using signature or string searches (since they are very different in each
encryption). Polymorphic Viruses Include: Marburg, tuareg, Satan bug,
elkern
n. Worm; this program is very similar to a virus and has the ability to self-
replicate leading to negative effects on your computer. Worm Viruses
Include: lovgate.F, sobig.D, trile. C, PSWBugbear.B, Mapson
o. Trojans; Trojans can illegally trace important login details of users online.
For example E- Banking is very common among users, therefore,
vulnerability of tracing your login details whenever your PC is working
without any strong powerful antivirus installed. Email Virus
p. This is a virus spread via an email. Such a virus will hide in an email and
when the recipient opens the mail.
q. Browser Hijacker; This virus can spread in many different ways including a
voluntary download. If infects certain browser functions especially in form
of re-directing the user automatically to certain sites. A good example of
Browser Hijackers Include the cool web search
Getting aware of how computer viruses get into your computer for
example some viruses are written to ride along with another computer
program. When a computer user inserts a disk into a computer with an
infected program on it, the virus is duplicated in the computer.
If you are aware of how computer viruses are transmitted, you can avoid
them by being careful about which program to use.
Using special virus detection program. These programs analyze every program
and every disk that is inserted into the computer to make sure that it is not caring
any virus. If it does have a virus, detection program can be used to eliminate a
found virus from a disk. Example of such programs include Norton anti-virus tool
kit, Dr. Solomon‘s anti-virus tool kit etc.
Avoid external disks especially diskettes as they may be carrying a virus. If you
have an anti-virus program, first check your disks before using them.
You have to be careful when downloading programs (freeware, shareware,
computer games etc.) from the internet as some of the programs contain
viruses.
Perform a virus scan on your computer at least once a week and also other
storage media like your diskettes, backup tapes etc.
Always remember to update your anti-virus software. Every day, new viruses
are created and the designers of these virus programs first look at the
available anti - virus programs so that they can create a strange virus which can
bypass those programs.
61
in terms of milliseconds. Based on the priority of tasks the time slices are
assigned. Memory is also managed by operating system. Disk space is the part of
main memory. The data flow is controlled by operating system.
Monitoring system activities: The system security and system performance is
monitored by system software. System performance includes response time and
CPU utilization. System security is a part of operating system. Multiple users can‘t
access without the security code or password.
File and disk management: The user needs to save, copy, delete, move and
rename the files. The system software will handle those functions. Disk and file
management is the technical task.
B. APPLICATION SOFTWARE.
These are programs designed to solve specific problems of the user.
Or programs designed to enable a user to accomplish a specific task (s)
Application software is divided into two: i.e. off-shelf and Bespoke (custom-made)
software/Tailor made application software.
1. Off-shelf application software; these are already made programs bought ‗off-the
shelves‘ from a software shop or vendor.
It can also be defined as software that is ready-made and available to lots of
people. You usually pay a license fee to use it.
Off- shelf application software can further be divided into Horizontal market
applications (common applications you can find on every office computer) and
vertical market applications also known as specialized application programs.
Horizontal market software; these are software tools that are useful to almost
any one in any job. These are programs you can find on almost every computer in
every office.
Vertical market (specialized applications). It consists of programs developed for a
specific industry. Examples include Computer Aided Designs (CAD), Bakery
recipes, Bridge analysis, airline ticketing, airplane wing structure, robots swivel
control, electronic testing etc.
ADVANTAGES OFF-SHELF APPLICATION
It is relatively cheap, especially when compared to custom written software
It is easily available from most computer shops
It will have been thoroughly tested so there won‘t be any serious problems or bugs
There will be lots of user support i.e. books, user guides, online help and
62
discussion forums on the Internet
Lower training costs. If it is a commonly used package, users and I.T. staff may
already be familiar with it, saving on learning time and training costs. Or, there
may be pre-existing training materials and courses that you can leverage.
More functionality. Off-the-shelf software often has more functionality, because
the developers try to meet the requirements of as many users as possible. (There
may even be functionality you didn‘t realize you need!)
Upgrades. The vendor will continue to develop the software, so you will likely get
upgrades for free or at a reduced cost, whereas in bespoke software you don‘t get
anything new unless you pay for it to be built.
DISADVANTAGES OFF-SHELF INCLUDES:
Limited to perform what they were designed for
Can easily be pirated
Vulnerable to virus
They make you to pay for many applications when you are to use a few.
Compromise. You may have to compromise on your requirements – it is unlikely
you will find ready-made software that does everything you need it to, exactly how
you want it to.
May be overly complicated. The software may include functionality that you
don‘t need, as it is trying to meet the different requirements of a number of users.
This can make it more difficult to learn and use.
You are not in control. The vendor‘s plans for the future may not always fit with
your own. As a single customer amongst many, you may not be able to get the
features you want implemented.
Examples of application software include;
Microsoft word Microsoft excel Microsoft PowerPoint Microsoft access Microsoft
publisher etc.
63
system
Desktop publishing packages used for creating leaflets, posters, business
cards
Graphics packages for manipulating images that can be used at home, school
or a business
Web design application used for creating personal or business web sites
Communication software among others.
Computer-aided design (CAD) is the use of computer systems to assist in the
creation, modification, analysis, or optimization of a design. CAD software is used
to increase the productivity of the designer, improve the quality of design, improve
communications through documentation, and to create a database for
manufacturing.
2. Bespoke (custom-made) software/Tailor made application software; bespoke
software is written especially for you, to meet your specific business requirements.
If very specialized software is needed, a company may decide to write or order its
own software. This software is called custom software. This software is developed
by computer specialists or programmers. Examples may include; report
making software, loan portfolio software for Cairo bank, programming in D-base
dealing in hotel operations etc.
a. Tailored to you. The software is developed and built to meet your specific
requirements, ensuring that you get software that works exactly how you need it to
and delivers the results you want.
b. More flexible. A bespoke system can evolve over time to match your changing
requirements.
c. No per-user fees. If you own the software, you won‘t have to extra per-user fees
as your business grows.
d. Not tied in. You own the intellectual property, so you are not tied to a specific
vendor that could potentially disappear at any time.
e. Competitive advantage. As your competitors won‘t have the same software, it
could give you a competitive edge. An effective software package can make a
company work more efficiently, improve their performance and have a positive
impact on customer satisfaction levels.
64
The disadvantages are:
Higher initial costs. It will cost more at the beginning, as you have to pay the
development costs.
Takes longer. Depending on the size and complexity of the software, it may take
months or even years to develop.
ADVANTAGES OF GUI
DISADVANTAGES OF GUI
They need significantly more memory (RAM) and processing power to run than
other interface types
It also occupies more disk space to hold all files for different functions.
It difficult to automate functions for expert users.
They can be irritating to experienced users when simple tasks require a number of
operations
65
be automated
DISADVANTAGES
66
TOPIC 7: ELECTRONIC SPREADSHEETS 1
Connection Types
Pornography: This is a very serious issue concerning the Internet, especially when
it comes to young children.
Spamming: This refers to sending unsolicited e-mails in bulk, which serve no
purpose.
Virus threat. Virus is a program that interrupts the usual operation of your personal
computer system. PCs linked to the Internet have high probability of virus attacks
68
and as a result of this your hard disk can crash, giving you a lot of trouble.
Theft of personal details while using the Internet, there is high probability that your
personal details like name, address and credit card number may be accessed by con
artists and used for fraudulent purposes.
Some people are getting addicted to the internet and thus causing problems with
their interaction of friends and loved ones
It provides a lot of wrong information. This is because any one can post anything
and much of it is garbage.
Internet traffic; the server speed of the site you are visiting determines the speed of
the internet.
Device hardware; your computer‘s resources like speed, memory etc. also
determine the internet speed i.e. if they are inadequate, the speed will be low.
Viruses and malware; these consume significant resources like memory and
adversely affect internet speed.
Number of applications running; multiple programs using internet like
downloading music with ITUNES and surfing the web using Firefox will reduce
the overall speed.
Number of devices connected; multiple laptops, tablets, smart phones reduce the
overall speed of each device on the internet.
Internet service provider (ISP). A company that provides internet access to
individuals and business. Examples; Info com, Mai web, communication
companies like MTN, AIRTEL, AFRICELL etc.
Services provided by ISP include; internet access, Domain name registration,
E-mail accounts, web hosting, IP addresses and ranges.
Factors to consider when selecting an ISP
Price; one should select an ISP whose price is friendly.
Technical support; be sure the ISP you select provides technical support that meets
your organization's requirements or that can offer help incase things go wrong.
Viability; when selecting an ISP, do some checking to see how long the company
has been in existence, track of records and whether or not they received an award.
Performance; whether you are paying for a high speed connection or just using dial
up, you should check the ISP‘s track records for such things as uptime and overall
69
throughout.
Advantages of email:
Cost .Email is cheap: businesses can save large amounts of money using e-mail, in
lieu of long-distance phone calls and postal deliveries.
Time .Email will reach its destination across the world in a few seconds as opposed
to days or even weeks with the postal service.
Convenient .Email doesn't worry about crossing time zones or that colleagues are
not in their offices to take telephone calls.
Email can be sent to groups of people at the same time. This facilitates
collaborative working and efficient dissemination of information.
Doesn't use any paper (good for the environment).
Can attach large documents and other files with a click of a button (and without
using up resources like paper).
Unlikely to be lost
Faster to arrive
Allows sending messages to several people at a time
Cheaper in terms of costs incurred
Less prone to illegal access
Allows sending multimedia format document
Several documents can be sent at once
Disadvantages of emails:
User has to open email website or email program to read the message. If you do
not login, unread messages can remain unread forever.
Socially, writing a letter and talking over a phone is thought to bring you closer to
the recipient compared to writing an email through a computer.
A lot of unwanted emails from spammers can fill your email inbox and important
emails may not get delivered.
Email attachments can bring virus into your computer if not scanned by the
70
network or virus program on your computer.
Emails cannot really be used for official business documents.
Less hand-writing practice.
Can be bad for your eyes if you spend too long sending e-mails on your
computer.
Messages may be misinterpreted easily.
Components of an e-mail
Address or to; this is where the address of the person whom you are sending the
message must be typed. E.g. [email protected] to mean the massage is
for siraji belonging to learn online which is an academic institution (ac) of Uganda
(Ug)
The subject; this is where you type subject or theme of your document e.g.
Inquiry, Application to someone.
CC; Carbon copy: here you type the addresses of those to whom you are sending
carbon copies. They can be as many addresses for cc as you wish only are
separated by commas e.g. [email protected],[email protected],
[email protected].
BCC; Blind carbon copies: here you type the addresses as in cc, but the recipients
will not know whether the other has received the copy.
b. Instant messaging; this type of online chat which offers real time text
transmission over the internet.
c. Video conferencing; this is a technology that allows users in different
locations to hold face-to-face meetings on the internet. It involves
transmission of audio and video data.
71
Meetings can be called instantly
Delegates can still attend the meeting even if they are physically unable
It saves time
Increases productivity by sharing of data.
Disadvantages
# Confidential documents that need to be viewed and signed in person may not
be used.
# It is more expensive
# It is limited to certain number of participants
# Stability of connection requires complex technology
d. Chat room; this is a software application in which participants can engage in
real time discussions about a specific topic with one another.
e. News group. This is an internet based discussion about a particular topic. It
ranges from transport, cars, investments etc.
Cloud computing; in cloud computing a type of Internet-based computing,"
where different services — such as servers, storage and applications — are
delivered to an organization's computers and devices through the Internet.
Or the practice of using a network of remote servers hosted on the internet to
store and manages resources. Examples include; e-mail communication,
online storage such as Google drive, Drop box, web hosting services etc.
f. Web browser; is a software tool or program that allows you to navigate
through the web. Or its application software that allows users to
access/connect to the internet or it‘s a tool that allows you to view web pages
and interact on the internet. Examples of web browsers include: Google
Chrome, Mozilla Firefox, Internet Explorer, Opera, and Safari, Konqueror,
Flock , etc.
g. Search engine; It’s a program or web site that can be used to search for
keywords on web pages throughout the World Wide Web.
A web search engine is a type of website that helps computer user find
specific information on the Internet. Search engines include: Google, Yahoo!,
Ask.com, Forestle, Bing and Alta Vista. Searches for information from the
Web
h. Website; Web site is the location of a web domain name in a computer
72
somewhere on the internet.
Types of Websites
Static-Content; in static Websites, the information does not change, and the same
information is displayed to all visitors.
Mostly coded in HTML so easier to build. Most commonly used for simple sites.
Updating is difficult.
Cannot do complex tasks, such as providing user interactivity.
Dynamic-Content: Dynamic website pages are able to accept input data (fill-in
forms) and store that information in a database on the server, allowing a visitor to
create a user profile and personalized experience.
In Dynamic Websites, the information may change at any given time and according
to the visitor. Mostly built in scripting languages like JavaScript, and can be more
difficult to build.
Used for large sites with a lot of content, sites that need extensive updates, use real
time services (e.g. online stores), and/or require automatic changes (e.g. blogs).
Updating is easy.
Can do complex tasks, allowing for user interactivity and providing customized,
personalized information
Personal Websites; A platform for individuals to provide information about
themselves, promote themselves, create an online CV and/or portfolio, keep in touch
with family and friends, share photos and videos, expand hobbies and interests, and
express thoughts and ideas.
Commercial/Business Websites; A platform for companies or organizations to
provide information about themselves, market or sell their products and/or services,
and provide customer support
Informative Websites; these are dedicated to providing information. They may
include news websites, online encyclopedias, educational websites, and websites
providing topic-specific information like sports data, medical information, weather
reports, stock market quotes and analysis, and TV guides.
Search Engines/Directories
These are search engines index material on the web that automatically responds to a
73
search query with links to relevant websites.
Directories list businesses by different categories and/or locations.
Wiki
A wiki is a specialized form of content-managed web site designed to support the
easy collaborative creation of web pages by groups of users.
Wikis differ from blogs and other cms options in that wikis allow all users to
change the content of the wiki pages, not just to post comments about the content.
Examples of wiki are Wikipedia; online encyclopedia can be publicly accessible
and edited by any user.
Blogs; Web logs, or blogs, are the most popular, inexpensive, and widespread form
of web content management. Blog software such as Blogger, Roller, or Word Press
allows nontechnical users to combine text, graphics, and digital media files easily
into interactive web pages.
Blog – online journal used to express ideas/opinions
E-Commerce website – platform to sell products online
Forum – promotes discussions among people with mutual interests
Media-Sharing Website – where people can share pictures, videos, music, etc.
Review Websites – where people can write and/or view reviews of products,
services, etc.
Social Networking Website – where people can meet, interacts and share multi-
media.
Webmail – provides e-mail services
The World Wide Web; (Abbreviated as WWW commonly known as the web) is a
system of interlinked hypertext documents accessed via the Internet. Or it‘s a vast
collection of linked documents held on computers all over the world and is
accessible via the internet.
Netiquettes; Refers to the do's and don'ts of online communication or rules and
regulations governing online communication
> Keep messages brief and use proper grammar and spellings
> Never read someone‘s private email
> Respect other people‘s privacy
> Know where you are in cyberspace. Understand the group of people you are
74
interacting with. When you join a new group, first understand its likes and dislikes
before giving your full contribution
> Post only acceptable information that has no harm to the public
> Minimize use of uppercase in text when sending messages
> Be forgiving of other‘s people‘s mistakes like spelling error, a stupid question or
unnecessary long answers because experts on internet were once beginners.
> Respect other people‘s time and bandwidth. Ensure that time and bandwidth people
spend reading your postings is not wasted. Send a well prepared message and
ensure that it‘s sent to right recipient.
> Make yourself look good online
> Avoid impersonation
> Be ethical and aim at acting within the laws of society and cyberspace
> Don't spam. That is, don't repeatedly post the same advertisement for products or
services. Most sites have strict and specific rules about who is allowed to post ads
and what kind of ads they are.
> Remember that your posts are public. They can be read by your partner, your
children, your parents, or your employer.
> Do not post copyrighted material to which you do not own the rights.
> Treat others as you would like to be treated.
o Web site is the location of a web domain name in a computer somewhere on the
internet.
o Web page is a document on the web site. A web is composed of a web page or
collection of related web pages.
A web page is a document on the www that can include text, pictures, sound, and
video.
o Home page. This is the first page you see at a web site, it acts like a title page of
a book. It identifies the web site and contains links to other pages at the site.
o Browsing. With internet, it means searching for particular/ specific items.
o Surfing means moving from place to place on the internet searching for topics of
interest.
o Site name: is the name of a web site.
o Web pages: contain formatted text, graphics, sound, animation and video
75
allowing point and click.
A webpage is a document, typically written in plain text interspersed with
formatting instructions of Hypertext Mark-up Language (HTML, XHTML).
o Telnet: a terminal emulation protocol that allows a user to log onto a remote
device.
o FTP (file transfer protocol) is an internet standard that allows users to upload and
download files with other computers.
o TCP/IP is a set of protocols or rules that have been developed to allow computers
to share resources across a network.
TCP/IP manages the transmission of data by breaking it up into packets. The
protocol defines how to break the message into packets, providing routing
information for massage delivery, reassemble the message at the receiving end.
o Hyperlink: colored and underlined text or graphic that you click to go to a file, a
location in a file, an HTML page on the www.
o Website is an electronic page that has links with other pages and contains
information.
Websites are the places where the information is stored in internet.
o Web site address: is a unique name given to the web site to communicate and
collect the information.
o Web browser is a tool (piece of software) that allows you to view and interact on
the internet. Internet explorer, Netscape, Mozilla Fire fox, Opera, Apple's Safari,
and Google Chrome etc. are web browsers.
o Transmission control protocol/internet protocol TCP/IP. It‘s a set of protocols or
rules that have been developed to allow computers to share resources across a
network
o Webmaster: is the person responsible for developing web pages and maintaining
a website.
o URL is an address that uniquely identifies a location on the internet. A URL for
a www site is preceded with http://Examples of URL. http//unebuganda.co.ug
o HTML (Hypertext Mark-Up Language) is a set of formatting codes used to
create hypertext or www based text files.
o Hyperlink. Coloured and underlined text or a graphic that you click to go to a
file allocation in a file,
76
Computing; The process of utilizing computer technology to complete a task.
Or the use of a computer to process data or perform calculations.
Green computing is the practice of using computers and other resources efficiently.
Reduced energy usage from green computing techniques translates into lower
carbon dioxide emissions, stemming from a reduction in the fossil fuel used in
power plants and transportation.
Conserving resources means less energy is required to produce, use, and dispose
of products.
Saving energy and resources saves money.
Green computing even includes changing government policy to encourage
recycling and lowering energy use by individuals and businesses.
Reduce the risk existing in the laptops such as chemical known to cause cancer,
nerve damage and immune reactions in humans.
This is the practice of using a network of remote servers hosted on the internet to
store and manage resources. Examples include; e-mail communication, online
storage such as Google drive, Drop box, web hosting services etc.
Its services are flexible. You can easily scale up or down depending on your
77
requirements
Automatic software updates. The fact that cloud services are online, it‘s easy and
convenient to update software centrally.
It cuts out the high cost of hardware purchase, storage and maintenance.
Increased collaboration; once people can access, edit and share documents
anytime from anywhere, they are able to do more together and do it better
convenience with cloud computing and availability of internet, you can work
from anywhere.
78
TOPIC 9: COMPUTER WORD PROCESSING II
These are devices that allow the user to send and receive messages. These
can be electronic or manual. Examples of electronic communication tools
include; computers, mobile phones and internet etc.
Manual communication tools include; manual drums, bells and messengers.
Slow Faster
Voice mail
Global positioning system
Faxing
Intranet
Email
Extranet
Instant messaging
Skype
Chart rooms
Short message service
Video conferencing
Social networks like twitter, Facebook etc.
Data Transmission Modes; There are three ways for transmitting data from one
point to another.
Simplex: is a mode of transmission where data flows in only one direction between
the two communicating devices e.g. broadcast on radio, TV and transmission
between keyboard and the monitor, fire alarms.
Full-duplex: is a mode of data transmission where data signals can flow in both
directions at the same time. E.g. telephone communication.
Use of full-duplex line improves the efficiency as the line turn-around time
80
required in half-duplex arrangement is eliminated. Example of this mode of
transmission is the telephone line.
Digital and Analog Transmission; Data is transmitted from one point to another
point by means of electrical signals that may be in digital and analog form. In
analog signal, the transmission power varies over a continuous range with respect
to sound, light and radio waves. On the other hand a digital signal may assume only
discrete set of values within a given range. Examples are computer and computer
related equipment. Analog signal is measured in Volts and its frequency in Hertz
(Hz).
When digital data are to be sent over an analog form, the digital signal must be
converted to analog form. So the technique by which a digital signal is converted to
analog form is known as modulation. And the reverse process, that is the
conversion of analog signal to its digital form, is known as demodulation. The
device, which converts digital signal into analog, and the reverse, is known as
modem.
Analog Signal
Digital signal
81
block by block. Each block can contain many characters. Synchronous transmission
is well suited for remote communication between a computer and related devices
like card reader and printers
The transmission medium is the physical path by which a message travels from
sender to receiver.
Twisted-pair cable
Twisted pair consists of two conductors (normally copper), each with its
own plastic insulation, twisted together.
82
Unshielded Twisted-pair (UTP) cable
Advantages of UTP
o it‘s cheaper
o it is flexible and easy to install
Shielded twisted (STP) Cable; STP cable has a metal foil or braided – mesh
covering that enhance each pair of insulated conductors.
Materials and manufacturing requirements make STP expensive than UTP but
less susceptible to noise
83
Applications
Twisted-pair cables are used in telephone lines to provide voice and data
channels.
The DSL lines that are used by the telephone companies to provide high data
rate connections also use the high-bandwidth capability of unshielded twisted-
pair cables.
Local area networks, such as 10Base-T and 100Base-T, also used UTP cables
Coaxial Cable; A coaxial cable has a single copper conductor at its center. A
plastic layer provides insulation between the center conductor and braided metal
shield.
The metal shield helps block any outside interference from fluorescent lights,
motors and other computers.
Coaxial cables have bandwidths of up to 1GB ps. They are installed in a network
to form the network backbone (link that connects two or more separate local areas
networks.
Advantages
Disadvantages
# It is difficult to install
Coaxial cable standards:
RG-8, RG – 11 are used in thick Ethernet,
RG – 58 used in thin Ethernet
RG – 59 used for T
Optic fiber cable; optic fiber cable uses light signals to transmit data from
one point to another on the network. The electrical signals from the source
are converted to light signals which are then propagated along the fiber
optic cables. This eliminates the problem of electrical interference.
84
Fiber optic cabling consists of a center glass core surrounded by several layers of
protective materials.
Can transmit signals over much longer distances than coaxial and twisted pair
They are not affected by electrical interference such as lighting and power
surges
They are thinner and lighter than coaxial cable
They provide greater security because they are difficult to tap into
They have a high transmission rate and a low error rate
They can carry a thousand of separate signals
Disadvantages
Infrared rays; this is a wireless transmission medium that send signals using
infrared light waves.
Micro waves. Microwaves are extremely high frequency radio waves. Unlike
radio waves, microwave signals must be transmitted in a straight line with no
obstructions between microwave antennas. Because micro waves travel in
straight lines, both sender and receiver must be aligned to be strictly in line of
sight.
Disadvantages
COMMUNICATION PROCESSORS
Or
A device that translates analog signals to digital signals and vice versa
Modems modulate and demodulate computer data for transmission on telephone
lines.
An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users
outside the company. It has also been described as a "state of mind" in which the
Internet is perceived as a way to do business with other companies as well as to
sell products to customers.
87
7. Integrated Services Digital Network (ISDN)
ISDN is an international standard for the digital transmission of both voice and
data. Using ISDN lines, data can be transmitted over one or more separate
channels at up to 2.2 billion bits per second if fiber-optic cables are used. This
higher 64,000-bit transmission system allows full motion video images to be
transmitted.
1. Frequency: This Refers to the cycle of waves per second. The amount of data
that can be transmitted depends on the wave frequency. Frequency is expressed
in hertz
2. Band width: This is the difference between the highest and lowest frequency
(+max 2 – min).The higher the bandwidth the higher the rate of data
transmission.
3. Transmission impairments: Such as attenuation and electromagnetic
interference
PACKET SWICTHING
This is a technique for dividing electronic messages into packets for transmission
over the network to their destinations through most expedient route.
Advantages
The message is sent thru different routes, at different speeds and sand witched
88
between packets from messages.
Once the packets arrive at their destination, the receiving computer re-assembles
them in to a proper sequence to form a complete message.
NETWORKING
TYPES OF NETWORKS
The three basic types of networks include: LAN, MAN and WAN.
A file server - stores all of the software that controls the network, as well as
the software that can be shared by the computers attached to the network.
A workstation - computers connected to the file server (Mac or PCs). These
are less powerful than the file server
Cables - used to connect the network interface cards in each computer
Peer-to-Peer
Client/Server
PEER-TO-PEER
Peer-to-peer network operating systems allow users to share resources and files
located on their computers and to access shared resources found on other computers.
However, they do not have a file server or a centralized management source. (See
figure below)
89
In a peer-to-peer network, all computers are considered equal; they all have the same
abilities to use the resources available on the network. Peer-to-peer networks are
designed primarily for small to medium local area networks.
AppleShare and Windows for Workgroups are examples of programs that can
function as peer-to-peer network operating systems.
Disadvantages
The file servers become the heart of the system, providing access to resources and
providing security. Individual workstations (clients) have access to the resources on
the file servers. The network operating system provides the mechanism to integrate
all the components of the network and allow multiple users to simultaneously share
the same resources irrespective of the physical location. Novell NetWare and
windows 2000 server are examples of client/server network operating systems.
A server is a centralized computer that controls the shared resources on the network
While is a client computer that sends request to the server and depends on the
server
90
Advantages of a client/server network:
Centralized – resources and data security are controlled though the server.
Scalability – any or all elements can be replaced individually as increase.
Flexibility – new technology can be easily integrated into the system
Interoperability – all components (clients/networks/servers) work together
Accessibility - Servers can be accessed remotely and across multiple platforms.
Client-server model
Metropolitan Area Network (MAN) covers larger geographic areas, such as cities.
Often used by local libraries and government agencies often to connect to citizens
and private industries
91
WIDE AREA NETWORK (WAN)
1. Speed. Networks provide a very rapid method for sharing and transferring
files. Without a network, files are shared by copying them to floppy disks, then
carrying or sending the disks from one computer to another. This method of
transferring files (referred to as sneaker-net) is very time-consuming.
2. Cost. Networkable versions of many popular software programs are
available at considerable savings when compared to buying individually licensed
copies. Besides monetary savings, sharing a program on a network allows for
easier upgrading of the program. The changes have to be done only once, on the
file server, instead of on all the individual workstations.
3. Security. Files and programs on a network can be designated as "copy
inhibit," so that you do not have to worry about illegal copying of programs.
Also, passwords can be established for specific directories to restrict access to
authorized users.
4. Centralized Software Management. One of the greatest benefits of
installing a network at a school is the fact that all of the software can be loaded on
one computer (the file server). This eliminates the need to spend time and energy
installing updates and tracking files on independent computers throughout the
building.
5. Resource Sharing. Sharing resources is another area in which a network
exceeds stand-alone computers. Most schools cannot afford enough laser
printers, fax machines, modems, scanners, and CD-ROM players for each
computer. However, if these or similar peripherals are added to a network, they
can be shared by many users.
6. Electronic Mail. The presence of a network provides the hardware
necessary to install an e-mail system. E-mail aids in personal and professional
communication for all school personnel, and it facilitates the dissemination of
general information to the entire school staff. Electronic mail on a LAN can
enable students to communicate with teachers and peers at their own school. If the
92
LAN is connected to the Internet, students can communicate with others
throughout the world.
7. Flexible Access. School networks allow students to access their files from
computers throughout the school. Students can begin an assignment in their
classroom, save part of it on a public access area of the network, and then go to
the media center after school to finish their work. Students can also work
cooperatively through the network.
8. Workgroup Computing. Workgroup software (such as Microsoft BackOffice)
allows many users to work on a document or project concurrently. For example,
educators located at various schools within a county could simultaneously
contribute their ideas about the new curriculum standards to the same document
and spreadsheets.
9. Expensive to Install. Although a network will generally save money over time,
the initial costs of installation can be prohibitive. Cables, network cards, and
software are expensive, and the installation may require the services of a
technician.
10. Requires Administrative Time. Proper maintenance of a computer network
requires considerable time and expertise. Many schools have installed a
network, only to find that they did not budget for the necessary administrative
support.
11. File Server May Fail. Although a file server is no more susceptible to failure
than any other computer, when the files server "goes down," the entire network
may come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
12. Cables May Break. The Topology chapter presents information about the
various configurations of cables. Some of the configurations are designed to
minimize the inconvenience of a broken cable; with other configurations, one
broken cable can stop the entire network.
Server faults stop applications being available
Network faults can cause loss of data.
Network fault could lead to loss of resources
User work dependent upon network
93
System open to hackers
Decisions tend to become centralized
Could become inefficient
Could degrade in performance
Resources could be located too far from user
- File Servers
- Workstations
- Network Interface Cards
- Switches
95
- Repeaters
- Bridges
- Routers
File Servers; A file server stands at the heart of most networks. It is a very fast
computer with a large amount of RAM and storage space, along with a fast
network interface card. The network operating system software resides on this
computer, along with any software applications and data files that need to be
shared.
The file server controls the communication of information between the nodes on a
network. This requires a computer that can store a lot of information and share it
very quickly.
The network interface card (NIC) provides the physical connection between the
network and the computer workstation. Most NICs are internal, with the card
fitting into an expansion slot inside the computer.
It‘s an electronic device that connects two similar networks and controls the data
flow between them.
Router; An electronic hardware device that directs data packets to a secure path to
the final destination
Gateway; It‘s an electronic hardware device that can perform logical functions. A
gateway is a device or system (collection of hardware and software) that connects
two networks and translates information from one to the other so that data can be
transmitted between two dissimilar networks.
96
Repeater; A hardware device which is used to join same type of networks to
extend the length of the communication medium It also simplifies the signals
received from one network and sends the amplified signals to another network.
97
TOPIC 12: ELECTRONIC PUBLICATION
Most common computer security threats and what you can do to protect
yourself from them.
A threat, in the context of computer security, refers to anything that has the potential
to cause serious harm to a computer system.
THREAT 1: VIRUS; A virus is a piece of software that can replicate itself and
infect a computer without the permission or knowledge of the user. A virus can only
spread when it is transmitted by a user over a network or the Internet, or through
removable media such as CDs or memory sticks.
THREAT #2: SPAM / SPIM / SPIT; SPAM is the sending of e-mail messages in
bulk which are unnecessary. Email addresses are collected from chat rooms,
websites, and newsgroups and by Trojans which harvest users‘ address books.
SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN,
Messenger and ICQ.
ISPs attempt to choke the flood of spam by examining the information being sent
and traffic patterns. User systems may use spam filters to screen out email messages
with suspect titles or from suspect persons, as well email messages from blocked
senders.
98
THREAT #3: SPOOFING, PHISHING AND PHARMING
Phishing is typically carried out by email or instant messaging. The email message
claims to be from a legitimate source but when the user clicks on the link provided,
he or she lands on the fake web page.
As spoofing, phishing, and to a lesser extent, pharming, rely on tricking users rather
than advanced technology, the best way to handle these threats is through vigilance.
Don‘t open emails from unknown sources or click on links embedded in suspect
messages.
Check the security guidelines of websites such as PayPal so that you can distinguish
between legitimate and bogus emails.
There are many ways in which a virus can spread from one computer to another,
but let‘s take a look at the most frequent ways in which people run into viruses,
spyware and Trojans on the internet.
1. Systems analysis is the dissection of a system into its component pieces to study
how those component pieces interact and work.
2. System analyst is a person who researches problems, plan solutions,
recommends software‘s and systems at least at the functional levels and co-
ordinates development to meet business or other requirements.
A system analyst does the following.
a. Identifies, understands, and plans for the organize, and plans for the organization
planned systems, and ensure that new technical requirements are properly
intergraded with existing processes and skill sets.
b. Plans a new system from the beginning to the end.
c. Interacts with the internal users and customers to learn and document
requirements that shall be used to produce business requirements
documents.
d. Write technical requirements from a critical phase.
e. Interact with designers to understand software limitations.
f. Help programmers during system development; provide use cases,
flowcharts or even data base design.
g. Perform system setting.
h. Deploy the completed system.
i. Document requirements or contribute to user manuals.
j. Whenever a development process is conducted, the system analyst is
responsible for designing components and providing that information to
the developer.
3. Expert system is a computer system that imitates the decision making
ability of a human expert. Expert systems are designed to solve complex
105
problems by reasoning about knowledge, like an expert, and not by
following the procedure of a developer as is the case in conversional
programming. The first expert systems were created in the 1970’s.
4. Artificial intelligence (AI) is technology and a branch of computer
science that studies and develops intelligent machines and software.
State examples of data threats and give ways of curbing these threats.
Save as you work. You should always save your work as you go and learn
how to use the ‘auto-save‘ features in your application.
Make a backup. Before you make changes to critical data always make a
duplicate. Even if you just made a backup yesterday-make another.
Keep a copy of your data offsite. Keep a copy of your data offsite. If
there were a fire or other disaster, your onsite data backup will be lost as
well.
Never trust disks from other people. Anytime you receive a file on any
type of storage media check it first for viruses.
Update! Make sure you have the latest updates for your software –
especially for your virus checking software. Make it a habit to regularly
check for updates and enable automatic updates for soft ware‘s that offers
that feature.
Protect your passwords. Your USERID is your identity. The key to your
identity is your password .anytime your account accesses the network you
are responsible for any activity from the account! Remember to change
your password on a regular basis
Protect your computer. Use secure operating system which requires users
to be authenticated. As an added benefit these operating systems also
restrict what individual users can see or do on the system.
106
Perform regular maintenance. Learn how to use utilities that diagnose
the system for problems. It I a good idea to run a disk-scanning program,
defragment your hard drive, or whatever else your system might need.
These utilities can prevent little problems from becoming big problems,
and will keep your system running at a top speed.
Computer crime
Phishing is the act of attempting to acquire sensitive information like user name
password and credit card details by distinguishing as a trustworthy source.
Phishing is carried out through emails or by luring the users to enter personal
information through websites. Criminals often use websites that have a look and
fill of some popular webs which makes the users feel safe to enter their details
there.
Computer viruses are computer programs that can replicate themselves and
harm computer systems on a network without the knowledge of the system
users.
107
like USB drives, DVDs, CDS.
Cyber stalking; the use of communication technology e.g. the internet to stalk
a person online. The stalker sends threatening emails spreads false information
and accusation, transmits threats on the internet and damages data and
equipment.
Cyber stalkers often target the users by means of chartrooms, online forums
and s o c i a l networking websites to gather information and harass the users on
the basis of the information gathered, obscene emails, abusive phone calls
Identity theft involves stealing money and obtaining other benefits by using
another person‘s identity. It is the act of pretending to be someone else by using
someone else‘s identity as ones‘ own. Financial identity theft involves the use
of false identity to obtain goods and services and a commercial identity theft is
the using of someone else‘s business name or credit card details for commercial
purposes. Identity cloning is the use of another user‘s information to pose as a
false user. Illegal migration, terrorism and black mail are often made possible
by means of identity theft.
Computer viruses
Denial-of-service attacks
Malware (malicious code)
Crimes that use computer networks or devices to advance other ends include:
Cyber stalking
Fraud and identity theft
Information wa0rfare
Phishing scams
Spam; Spam, or the unsolicited sending of bulk email for commercial purposes, is
108
unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on
Other forms of fraud may be facilitated using computer systems, including bank
fraud, identity theft, extortion, and theft of classified information
Just like any sort of crime, common sense is your most valuable ally when dealing
with cyber criminals, never open suspicious documents.
Don't give out personal information to people you don't know. And be wary when
approached with a suspicious proposition.
Learn about cyber crime and talk to your family about how to identify scams.
Never give out your personal information to anyone you do not know on the Web.
Use a firewall to protect your computer from hackers. Most security software
comes with a firewall. Turn on the firewall that comes with your router as well.
Shop only at secure websites. Look for a Trustee or VeriSign seal when checking
out. Never give your credit card information to a website that looks suspicious or
to someone you don't know.
Use strong passwords on your accounts that are difficult to guess. Include both
letters and numerals in your passwords. Never use a word that is easy to guess --
109
like your wife's name.
Keep watch over your children and how they use the Internet. Install parental
control software to limit where they can surf.
Computer ethics refers to a set of moral principles that regulate the use of
computers.
Or the human values and moral conduct relating to right and wrong
behavior/decisions made when using computers.
Computer integrity refers to steadfast loyalty to a strict moral or principled
set of laws regarding computer use Some of the Computer ethics and
integrity that should be put in mind when using computers include:
Respect the privacy of others. Do not in any way examine or change files
or passwords belonging to others. Do not violate the privacy of individuals
or organizations.
Respect the integrity of the computing systems. Do not develop or use
programs that invade, damage, or alter computing systems or software. Do
not in any way harass other users.
Always identify the user accurately. Never use someone else's account.
Do not use fraudulent means to avoid accounting for the use of computing
services.
Respect copyrights and licenses. To copy a licensed computer program is
illegal; it is indeed theft.
Respect the intellectual property of others. Individual programming
assignments are expected to be done by individual students; do not take
another's work or ideas to call your own.
Exhibit responsible, sensible use of computer hardware, software, and
data.
110
Digital forensics is a branch of forensic science encompassing recovery and
investigation of material found in digital devices, often in relation to
computer crime
Web developers. These design and create websites. They are responsible for
the look of the site, the site‘s technical aspects like performance and capacity.
Software developers. These are the creative minds behind computer
programs. Some develop applications that allow people to do specific tasks
on a computer or another device.
Information security analysts. These plan and carry out security measures
111
to protect an organization‘s computer networks and systems. They are
important in averting cyber attacks.
Programmers. These write and test code that allows computer applications
and software programs to function properly.
Data analyst. A data analyst inspects, cleans, transforms and models data
with the aim of discovering useful information, suggesting conclusions and
supporting decision-making.
112
5. Megabyte; it is approximately equal to one million bytes or 1048576 bytes
i.e. 1 MB = 1000 or 1024 Bytes 1 MB = 1,000,000 bytes or 1048576 bytes
6. Gigabyte; it is approximately equal to 1 billion bytes i.e. 1 GB = 1000 or
1024 MB, 1 GB = 1,000,000,000 or 1,073,741,824 bytes
7. Terabyte; it is approximately equal to one trillion bytes i.e. 1 TB =
1,000,000,000,000 bytes.
Examples;
How many bits are in the word ―school‖?
School = 6 characters
1 character = 8 bits
6 characters = y
Y = 8x6
Y= 48 bits
How many bytes are in 64 bits? Let the number of bytes be X
1 byte = 8 bits
X = 64
X = 8bytes
How many characters are in 1000 bytes?
1 byte = 1 character
1000 bytes = 1000 characters
The number of characters is 1000.
Convert 2000 MB into GB Let the number of GB is y.
1 GB = 1000 MB
Y=2 GB
NETWORK TERMS
Internet; this is the world-wide network of computers accessible to anyone who
knows their Internet Protocol (IP) address.
The IP address is a unique set of numbers (such as 209.33.27.100) that defines
the computer's location.
113
Intranet is a private network that allows access to organization data/information
to only members of the organization.
Extranet is a private network that allows access to organization
data/information to members within the organization and some authorized
outsiders like suppliers
Routers are physical devices that join multiple wired or wireless networks
together
A Gateway is a device that acts like a security guard and only allows data in or
out if it has the right network headers
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN)
A hub is usually a small rectangular box, often made of plastic, which receives
its power from an ordinary wall outlet. Or a multiport repeater to enhance
signal within the same LAN
A hub joins multiple computers (or other network devices) together to form a
single network segment
A packet is a formatted block of data carried by a computer network
Ethernet hubs are by far the most common type, but hubs for other types of
networks such as USB also exist
A hub includes a series of ports that each accepts a network cable
Small hubs can network four computers together
They contain four or sometimes five ports
Firewall a machine and its software that serve as a special gateway to a
network, protecting it from inappropriate access.
Ethernet is a physical and data link layer technology for local area networks
(LANs).
Bandwidth. Bandwidth: amount of data that can be transmitted at a time or a
rate of data transmission or a range of frequencies in a given transmission
medium.
System recovery is the process of restoring the computer to its original settings.
(Original factory software configuration)
What is System Restore?
System Restore is a recovery tool in Windows that allows you to reverse
certain kinds of changes made to the operating system.
114
What is System Restore Used For?
System Restore is used to return important Windows files and settings like
drivers, registry keys, system files, installed programs, and more - back to
previous versions and settings.
The System Recovery Options menu is a group of Windows repair, restore, and
diagnostic tools.
DEVICE DRIVERS; A device driver is a program that controls a particular
type of device that is attached to your computer. There are device drivers for
printers, displays, CD- ROM readers, diskette drives, and so on.
Plug-and-play; a plug and play is a specification that facilitates the discovery
of a hardware component in a system without the need for physical device
configuration or user intervention in resolving resource conflicts
Refers to the ability of a computer system to automatically configure expansion
boards and other devices.
A plug and play device is a hardware that can be automatically configure with
the computer without user‘s intervention, such devices do not need drivers.
Configuration
The way a system is set up, or the assortment of components that make up the
system. Configuration can refer to either hardware or software, or the
combination of both.
Many software products require that the computer have a certain minimum
configuration.
For instance, a typical configuration for a PC consists of 32MB (megabytes)
main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, aVGA
monitor, and the Windows operating system.
Configuration can also refer to preferred hardware and Software (specific to a
particular computing environment) will interact.
The devices that may be configured include:
The hard drive (disc) setting partitions.
The disc drives. The printers.
Monitors. To the desired display.
Installation: refers to the process of adding hardware components to the
computer or activating software such that it works with the computer.
Software Installation: is the process of activating software such that it works
115
with a computer.
Hard ware installation: Refers to the process of adding hard ware components
to the computer.eg disc drive, printer, camera
An installation program or installer is a computer program that installs files,
such as applications, drivers, or other software, onto a computer.
Uninstaller utility software is a program that deactivates an application from
the computer.
Program Files' is a standard folder in Microsoft Windows operating systems in
which applications that are not part of the operating system are conventionally
installed.
A software suite or application suite is a collection of computer programs —
usually application software or programming software
In computers, a suite is a set of usually related programs sold together in a
single package. Sometimes called "bundled software," suites.
Definition of computing: The process of utilizing computer technology to
complete a task.
117