Comp Notes
Comp Notes
Page | 1
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
CHAPTER 1
INTRODUCTION TO COMPUTERS
a) Definition of a computer
b) Classification of computers
c) Physical size
d) The way they process data
e) By purpose
f) By use
g) Acquisition of Keyboard skills
h) Layout of keyboard
i) Summary
j) Questions
o DEFINITION OF A COMPUTER
Page | 2
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Data is the name given to facts. For example, in a school, the number of
students in a class, the number of teachers, names of students, the name
of customers in a business.
Page | 3
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 4
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
o CLASSIFICATION OF COMPUTERS
There are four basic ways by which computers can be classified:
a) Physical size i.e how large the computer is.
b) By the way they process data
c) By purpose
d) By use
▪ Physical Size
The following computer systems are categorized by how large they are:
a. Monster Computer
Sometimes it is referred to as Super computers or Maxi computers.
These are computer of enormous power and are very large in size. Its
installation requires special floors to carry its weights and it also needs
special plumbing to carry a fluid known as fluorocarbon needed to cool
it.
One unique feature of maxi computers is that when you purchase it, the
purchase price will include the services of 2 permanent engineers to
maintain it forever. They are typically used for scientific research and
military applications, petroleum engineering, nuclear physics and
meteorology.
Examples of monster computers include CYBER and CRAY
computers. For example, the whole globe needs only one monster
computer to forecast weather at once.
Page | 5
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
b. Mainframe Computers
Mainframe computers are second in size to monster computers. These
computers perform more data processing work than any other type of
computers. For this reason they form a large portion of installation in most
organization.
As does the monster computers, mainframe computers also have
some special requirements, for the reason, they are housed in special
rooms brought about by the special power that they posses together
with environmental control requirements.
Mainframe computers can be used by more than one person at a time
since they can support a large network of other computers organizations
that employ mainframe computers alongside other computers are
banks, government agencies, commercial and industrial agencies.
c. Minicomputer
Also called Medium sized computers. These computers compared to
mainframe are smaller, slower and less expensive.
A minicomputer has an advantage over the previous two in the sense
that it does not have any special power or environmental control
requirements. For this reason, the medium sized computer can always
be located anywhere within the organization.
Minicomputers can do the work that the mainframe does but on a
small scale.
d. Microcomputers
Of the types of computers, microcomputers are the slowest. However,
they counteract this disadvantage because they are easy to use and the cost
of purchase is also low.
A microcomputer gets its name from the fact that its main computing
component, the microprocessor (to be introduced later) is located in one
Page | 6
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
i) Analog Computers
These computers process data that vary continuously, for example
variations in temperature, amount of current flowing through an electrical
conductor and so on. The flow of such data is in the form of wave like
movement i.e. not predictable. Such computers are used for a wide variety
of industrial and scientific applications that require the processing of data
that are measured continuously.In conclusion, we say that analog
computers measure things.
Page | 7
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
iii)Hybrid Computers
These computers possess features of both digital and analog
computers meaning both counting and measurement operations in one
computer.
▪ By Purpose
Classification by purpose falls into 2 categories:
• Special Purpose Computers
These are computers that are single task oriented. In other words, they
are designed to solve only a particular type of problem. Examples include
embedded computers in our common digital watches.
• General Purpose Computers
These are computers that can perform a vast number of operations or
solve problems of different varieties. Most of the computers in use today
are general purpose. However, it is wise to note that general-purpose
computers can always be adapted with special programs to do a job
specified hence becoming special purpose computer.
• Embedded Computers
These are computers attached to other computers that help in operating
them. E.g. computers embedded in lifts, petrol pumps, digital watches and
so on.
▪ By Use
It is worthy noting that we categorize these computers according to
what it is used for and when it is used. Under this category, the list is
endless. For this reason we will limit ourselves to only five main types.
Page | 8
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
There are many ways to enter data into the computer. However,
keyboard still remains the predominant input device for the many users.
A computers keyboard is used much like a typewriter keyboard. A
keyboard has alphabetic, numeric, and special characters found on a
typewriter. The only difference is that data keyed in, is recorded in the
computer systems’ data coding scheme and is stored in the memory. The
traditional format of a computer or terminal keyboard follows the
organization prescribed by the typewriter keyboard. This is known as
Page | 9
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Other special keys include: Delete keys and backspace keys which
deletes characters. Delete key deletes a character that is in front of the
cursor whereas backspace key delete characters before the cursor. Insert
key will insert characters from text. Others e.g home key will take you to
the top of the document and end key to the end of the document.
Computer keyboard employ one or more control keys. Control works
just like the shift key on a keyboard in that they cause other keys to
perform functions different from their normal operations. Example, if
you hold shift key down and press the letter “e”, you get a different
character “E”. Holding down the control key while you press any of the
other keys causes still another character to be sent to memory.
Page | 10
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Like the control keys, the escape key is used to cause other keys to
perform special functions. Unlike the control keys, however, it is not held
down while pressing another key. Once sending a signal to the computer
system, for that purpose. If you press another key following Escape, it
will cause the computer to execute a function established by the
program in use.
▪ SUMMARY
Page | 11
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• Computers can be classified by: Size, The way they process data, By
Purpose and by use.
▪ QUESTIONS:
i. Define a Computer.
iv. What are the 4 basic functions a Computer will perform on data.
vi. Discuss the layout of a typical keyboard and functions of the different
keys
Page | 12
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
CHAPTER 2
COMPUTER COMPONENTS
This chapter introduces the student to the computer hardware system.
At the end of the chapter, the student should be able to: differentiate
between hardware and software, identify the elements of a computer
systems’ hardware, explain the functional organization of the elements of
a computer system, describe the central processing unit, describer the
types of input and output devices, describe the types of secondary storage
devices and media and finally be able to distinguish between system
software and application software.
Page | 13
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Fig. 2.1
Page | 14
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
KEY:
C.P.U - Central Processing Unit
A.L.U - Arithmetic Logic Unit
DOS - Disk Operating System
ROM - Read Only Memory
RAM - Random Access Memory
DBMS- Data Base Management System
Page | 15
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Documentation refers to, in its simplest form, the manual that helps the
user to know how the different parts of the software work, how to install
it, uninstall, trouble shoot or as a reference book. The definition of
software is not complete until documentation is included.
Page | 16
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
APPLICATION
INPUT SOFTWARE OUTPUT
OPERATING
SYSTEM
HARDWARE
FEEDBACK
Fig. 2.3
Page | 17
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Processor
Control Arithmetic/Logic
Unit Unit
Input Input
Devices Devices
memory
C.P.U
Monitor
C.P.U.
Disk Drive
Mouse
Keyboard
Fig. 2.6
Page | 18
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Arithmetic Logic Unit forms the second part of the CPU. The ALU
performs the calculations and makes comparisons between units of data.
The last component is the Control Unit (CU), the work of which is to
control the operations of the hardware for example by issuing commands
to all elements of the computer as per the dictations of memory. (e.g from
the input devices to memory, from memory to output devices, etc).
The Central Processing Unit determines the power of a computer
hardware system which is described in terms of :
a) Size of Memory, which is measured by the number of characters of
ve
data it can store
b) Speed of the Control and Arithmetic Logic Unit, which is measured
in millions of instructions per second (MIPS).
Page | 19
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
The work of the various input devices such as terminal keyboard, disk
storage units and tape storage units is to send data into the CPU, whereas
the work of the output devices such as printers, visual display units, disk
and tape units is to give out the results from the processing operations.
The Central Processing Unit also “houses” Registers. The latter is a small
part in the CPU that holds data before processing or probably after. They
store data to be processed and thereafter partial results. Registers are of
different kinds performing different functions:
• Ordinary Counter Register (OC) – This register addresses the next
instruction to be expected or we could say it contains the addresses of
the next instruction to be executed.
• Instruction Register (IR) – This register contains the actual
instruction under execution.
• Accumulator Register – This register stores data to be processed or
the results of a partial execution.
When reading a word from the memory, the CPU stores the address of
that word in MAR and sends a read signal to a main memory. After one
memory cycle, the value of the word is in DAR from where the CPU will
search for it.
When reading a word, the CPU stores in MAR the address of where
the write operation will take place. The value to be written will be stored
in the DAR and then it sends the write signal to the memory.
Page | 20
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Execution of an Instruction
The execution of an instruction of the central processing unit is performed
through the following steps:
• Storage of the next instruction to be executed from the main memory
to the instruction register (IR);
• Modification of the contents of the OC registers the address of the
next instruction;
• Recording of the instruction recently stored;
• Localization of the data needed by the instructions in the memory;
• Storage of data if necessary into the internal registers of the CPU
generally the accumulator;
• Execution of the instruction;
• Storage of the results in the appropriate place;
• Return to step (i) for the execution of the next instruction.
The Processor
The Control and Arithmetic/Logic Units are usually considered as a
hardware device separate from the memory. This is because the size of
the memory may vary independently from the Control and
Arithmetic/Logic Units. As separate devices they are known as Processor.
Processors used in microcomputers are known as microprocessors
(refer to chapter 1), but conceptually they are the same processors found
in larger computer systems.
Memory
A computer’s memory stores data before, during and after processing
as well as the application program in use at the time. These data are stored
in cells of the memory. Each memory cell contains one byte of data (a
byte = 8 characters: a character is say a letter of the alphabet, or a number).
Therefore, one cell will contain eight characters called a byte.
The size of the computer memory is measured in terms of “Kilobytes”
or “Megabytes” or “Gigabytes”. Since “Kilo” stands for 1,000 and
Page | 21
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Primary Memory
Primary storage or RAM is the computer’s working bench. All data
to be processed must first be recorded in it and all output of results draws
data from it. Primary storage has 2 crucial characteristics. The first is that
data can only be stored temporarily, and two, it cannot store a great deal
of data.
Secondary Storage
These characteristics of primary storage give rise to the requirements
to store large quantities of data in machine readable form that can be fed
into RAM in small segments for processing. Units that do this are called
secondary storage devices also referred to as Auxiliary Storage or
Backing Storage. (Description of these devices latter in the chapter).
The two most prevalent of these are disks and magnetic tapes. These
media offer the ability to store data off line, meaning that data can be
processed from time to time by the computer system and are not stored
permanently as part of the hardware configuration. When needed, they are
mounted on data reading and writing device, called drops, as required by
their application programs.
Page | 22
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ Keyboard
Please refer to 1.4 for full keyboard explanations. Using the keyboard is
a matter of knowing which command you want to issue to the machine
or what entries in the form of characters you want to make; then simply
type in the right characters from the keys of the keyboard.
▪ Mouse
This is another type of input device but as opposed to the keyboard,
it doesn’t have keys. A mouse has usually two buttons (but not always).
When installed in your machine, a pointer is always seen on the screen.
Underneath the mouse is a rotating ball which with the slight movement
of the device on a pad, the pointer will correspondingly move on the
screen by the same distance and to the right direction. To issue an
instruction to the system, the user simply needs to click (press the mouse
button once – usually the left) a menu and choose a command he wishes
to issue or click a command he would want to use.
You can use a mouse also to draw different shapes of your style apart
from simply clicking commands. A mouse (mice – plural) is usually
employed in Windows Applications without which the Windows
Operating System become incomplete.
Page | 23
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Normally used with palm tops. Since palm tops are very small light
pens replace mouse.
Page | 24
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ Joy Stick
This is a device that permits you to move a picture, line, word, or cursor
from point to point in a display screen. Used normally in playing computer
games.
▪ Graphic Tablet
It lets you draw a design just as you might do on paper. You use a
special pen or your finger to do the drawing on a flat, table like surface.
Your drawing appears immediately on the display screen.
Page | 25
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ Laser Scanner
This input device is used to scan a picture or other documents from
print onto the screen and hence can be available for storage in the
computer memory for processing or future reference. Some printers come
with inbuilt scanners. However, we have small scanners (manual) that are
held in the hand while scanning an object to the monitor into the memory.
You can scan for example your photograph,
signature, and logo on other documents. Another scanner is known as
flat bed which is used by placing the document to be scanned on it.
▪ Voice Input
Voice input systems require that the user pronounce the vocabulary of
voice command several times while the system does the “listening” and
analyses the voice patterns of the various words. After this, using an
airplay of the voice patterns, the system will respond to the commands as
dictated. Once the computer has been initialized with the voice pattern of
the person, such system will always not respond to anyone else. Example
is voice dialing in a mobile phone.
Page | 26
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ Voice Input
Voice input systems require that the user pronounce the vocabulary
of voice command several times while the system does the “listening” and
analyses the voice patterns of the various words. After this, using an
airplay of the voice patterns, the system will respond to the commands as
dictated. Once the computer has been initialized with the voice pattern of
the person, such system will always not respond to anyone else. Example
is voice dialing in a mobile phone.
Page | 28
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
There are several output devices that are available within the current
technological advancement. For our level, we will limit ourselves to the
following: Printers, Monitors, Plotters, Sound Output and Microfiche
/Microfilm devices.
▪ Printers
Printers are necessary when hard copies of displayed work on the
monitor have to be sent to customers, report prepared by the
Management and the Board of Directors and so on must be printed. It’s
not disputable the fact that other electronic means of transmitting
information are now available. Printed-paper, however, still remains the
most popular means of communicating the same information. Printers
fall into three main categories classified by the amount of printed work
the device is able to produce in one operation.
o Page Printers
These printers print a whole page at once. They are sometimes
known as image printers. They produce the images by laser or
electrostatic means. The quality of output from such printers is
Page | 29
Fig.439
Prefer Calling Sir Obiero Amos @ 0706 851 2.8.1 (a)F1-F4 All Subjects Notes
for
[email protected]
sufficiently high for business correspondence. They use toners just like a
photocopy.
o Line Printers
These type of printers produce a whole line of a text at ago. They are
very fast but the quality of the output is always low.
It is important to note that the length of a line is not standard as it
differs with the requirement of the application in use. However, most of
the printers will print between 120 and 144characters per line. This will
require approximately paper width of about 14 inches so as to
accommodate the said character scale. 132 characters are often the
most common width. These use cartridges.
o Character Printers
Form or print one character as a time on the paper. This rate of
printing varies between 20 and 600 characters per second depending on
the mechanism or use in the different makes employed. These printers
make use of ribbons.
There are many different types of character printers. The first is
called Daisy Wheel Printer, which creates fully formed letters much like
a typewriter sometimes called Letter Quality Printer. The output is often
good enough for business correspondence.
Page | 30
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Daisy Wheel
a) The Whole
The Whole Daisy Wheel
Page | 31
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Non-impact printers are usually the fastest since they minimize the
amount of physical movement required during the printing process.
Examples of non-impact printers include Thermal Printers, Inkjet and
Electrostatic Printers.
Page | 32
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Impact Printers are usually noisy given the physical motion involved
during the printing process when the printing device strikes the paper.
To get multiple copies from impact printers, all you need to do is
interlace a carbon paper between the papers.
Thermal Printer
o Electrostatic Printers
They form characters by charging the paper electrically. The paper is
then passed through a toner solution. Particles of the toner solution (ink)
stick to the electrically charged areas of the paper. When the paper is
heated, the particles melt thus producing the characters. They are quite
fast; some print about 300 pages per minute.
Page | 33
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ Voice Output
Computer voice output is common place. For example a computer
could be programmed to offer telephone information service, like
directory help. Others let you know if you dialed a wrong number or if
the number you are calling is out of order or busy and the like.
▪ Plotter
This is an output device used to produce graphical output like drawing
graphs, charts, maps or electric circuits. The design of the graph, circuit
is done on the computer then the output is sent to the plotter. Plotters
are of two types: one that has a single sheet sometimes called Flat Set
Plotter and the second uses a continuous sheet which rolls continuously
on drum like cylinders: also known as Drum Plotters.
▪ Microfiche/Microfilm
Microfiche and Microfilm are both better known collectively as
microform. The later is a document photographed and hence stored in a
film. Microfiche is a sheet of film that measures 105mm x 148mm
whereas a microfilm is actually a 16mm roll film. A typical 16mm will hold
the equivalent of 3,000 A4 Pages. One typical microfiche will hold the
equivalent of about 98 A4 Pages.
Page | 34
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
The latter has a “read head” for reading the information stored on the
tape that’s for transforming data from the tape into main memory. It also
has a “write head” for recording the information. Usually, to read from,
write to an individual tape, you have to mount it on a tape drive.
In processing data is read from the tape into main memory (or
RAM) where processing takes place. The results are given out only as a
written report or as another tape file written on another drive. Because
RAM capacity is limited, only a small amount of data is used for the input
tape or written to the output device at one time.
Data that is stored on magnetic tape as well as other auxiliary
storage devices are usually organized into records. A record for now
should be understood as a unit of data consisting of characters about
someone or something. How data processing uses records is a matter of
loading one or more records into RAM for an output device. Processing
those records and sending the result to an output device.
This technique of sorting records on tape in the form of groups that
are read into or written from RAM all at once giving rise to a number of
technical terms that are used in all types of secondary storage media.
See fig. 2.9.1 below.
I I I
100 Logical 100 Logical 100 Logical
R Records R Records R Records
G G
Physical Record
Page | 36
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Disk Drive is the device on which the disk is mounted when used to
store and retrieve data. The device can position the read/write head in a
number of portions along the disk radius. As the disk rotates past the
read/write head, data is recorded in a circular track. This means therefore,
that there are as many concentric tracks displayed on the surface of the
disk, as there are positions for read/write head. This is illustrated in Fig.
2.9.2 (a)
Fig. 2.9.2 (b) shows how a track is divided into sectors and how the
sector contains an address used to locate where data is stored on the
disk. A hard disk with a capacity of 300k for example contains forty tracks
(40) of nine sectors each; having a total of 360 sectors available on each
side; of a two-sided disk for a total of 720 sectors. Each sector contains
512 bytes or 4096 (512 x 8)characters, so the disk offers a total data
storage capacity of 368,649-bytes. Such a disk is said to be a 360k disk
following the conception that “k” equals 1,024 (360 x 1024= 368640).
Page | 38
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Read/Write
Head
Track Disk
Access
Rotation Arm
Spindle
Fig. 2.9.2(a)
Address Data
Fig. 2.9.2(b)
Page | 39
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Disk storage media take different forms. Hard disks are rigid in
nature. They contain the most data. Hard disks may be fixed in their
devices or may be removed. They are usually 14” in diameter, although it
is unusual to the smaller had disks in microcomputers. One such system
is known as Winchester, so named because its prototype makes use of two
drops of thirty million bytes each has effectively the “30-30”. It uses a 14”
plotter. Later versions called Mini-Winchester or Mini-winns” used 8” or
6” and one-quarter inch plotters, which are stored in the drives and can
store up to 85,000,000 bytes.
Data is recorded beneath the transparent layer that cover the surface
of the CD by burning a permanent pattern into the surface of the disk by
means of a laser beam. Reading the data is also by a laser beam in an
optical disk recorder.
Page | 40
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 41
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ System Software
System Software are programs with their associated
documentations that control the entire operation of the computer. It is
what tells the computer what to do when you issue a command or when
you switch on the computer. Within the set of system software, we find
a set of programs called Operating Systems. The latter is usually defined
as a set of programs that standardize the way a computer’s resources are
made available to the user and to applications software. The resources
here refer to the hardware components of the computer.
Page | 42
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ Application Software
This is a program that is usually applied on one area of operation only
– not as all encompassing as system software. Application software is
usually divided into 2 categories:
o SUMMARY
• Software are programs that are used to run the computer together
with the associated documentation.
Page | 43
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• Storage Devices are in two forms: Primary Storage devices, the Main
Memory and Secondary Storage devices which supplements the main
memory.
Page | 44
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• System software are programs that control the entire operation of the
computer together with the associated documentation. An
application program is software that is usually applied on one area of
operations only. They could be standard packages or user developed
packages.
2.11 QUESTIONS
Page | 45
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 46
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
CHAPTER 3
Page | 47
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 48
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 49
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 50
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
i. Cabling
Cables in the lab should be properly located either on false floor or
ceiling or along the walls so as to avoid interference for example with
communication coolers in the lab. Cables put haphazardly may result in
possible power disconnection if stepped on or pushed around.
iv. Ventilation
It is a good practice to include ventilation in a computer room but the
same should not provide an entrance to hackers to tamper with data.
v. Floor space
The space on the floor should be wide enough to provide a thorough
route for equipment installation and other movements of the trolley to
transfer equipment. It should also provide for an emergency exit.
NB: Slippery floors are not recommended in a computer lab. Such a floor
if there is, should be covered with mats and the like.
VDU LEGISLATION
This is a legislation (British) that was passed in 1990 for frequent
users of computer screens in the lab. It states as follows:
▪ One should not use a computer for more than one hour continuously.
▪ While using the VDU, the eyes should not look at the screen directly
but at an angle of 30-60.
▪ The distance from the screen should be between 300mm-480mm.
▪ While using the keyboard, the arms and elbows should be at right
angles and parallel to the ground.
Page | 52
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
▪ The seats and desks in the lab should be adjustable to the users height
this is to aid (iv) and avoid Repetitive Strains Injuries (RSI) of the
fingers and wrists. The seats should have backrests!
▪ All seats in the lab should be fitted with castors – to make them mobile
and less noisy.
Air Conditioning
Air conditioning is very essential in the computer room where main
frames are housed or some minicomputers together with their
associated peripherals. Most devices however, usually contain their own
Page | 53
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
environmental controls that are automatic for example fans, filters and
sealed units.
Accessibility
While installing equipment in the lab, there must be a provision for
a through route, which is also important for emergency exit. Only for
security purposes should such a route be closed.
Corridors of the lab must be high enough with double doors and
floors, stairs or lifts must be strong enough t bear the load of equipment.
It is often recommended that ground floor should be used but this again
has many security risks.
Page | 54
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Equipment Sitting
Design of the sitting equipment should always be such that it ensures the
workflow of the operator and minimizes the walking distance from one
equipment to another. This means for example that the location of a
stand-alone computer and the printer should be close enough to ease
the work!
Health and Safety
For the sake of health and safety of the staff and equipment, the
following should be observed:
a) Lighting
There should be a provision for large lighting so as to avoid minimized
reflections and glare. A further provision should be for emergency
lighting.
b) Alarms
Fire alarms in the lab must be very clear (audible) and visible from any
angle you are placed. This will allow for quick action and reaction in the
event of a fire break out.
c) Communications
To avoid noise in the lab, telephone lines should be strategically placed
with visible indicators for quick response.
d) Physical security
General:
a. Only authorized personnel should be allowed into the computer
room.
b. The lab should not have any outside walls to keep off intruders.
c. The lab should have small windows’ provision for ventilation.
d. Video cameras should be on to monitor the activities of the
personnel and intruders.
Page | 55
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
e) Fire
Alarms should be in place as discussed earlier. Automatic detection of
smoke and electrocuting system should be provided for. In the computer
room, there should be hand held Co 2 and BCF extinguishers. The
personnel should be given evacuation training in the event of the fire break
out.
f) Flooding
Computer labs should never be sited in basements where they are
vulnerable to floods. No water pipes should be placed under, over or in
the computer rooms. This is because water is likely to destroy equipment,
programs and data in the lab.
g) Power
The computer room should have independent power supply, stable and
adequate with shrouded panic off button. Problems with power supply
come in three main forms:
i. Supply interruption – is caused by a number of factors that include
transformer failure, cutting of supply lines by accident, by people,
lightening and so on.
ii. Spike – this is a voltage level imposed onto the supply by interface
source such as switches, electro-mechanical devices and so on.
The problem caused by spikes is generally loss of data as soon as power
is removed. Disk files also get corrupted when store cycles are
interrupted by removal of power.
Page | 56
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
vii. Lighting
The computer lab should have adequate lighting. This lighting
should be large enough to minimize reflections and glare on the part of
the user. There should also be a provision for emergency lighting.
Page | 57
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
x. Power Supply
Power supply problem result in two forms:
xi. Virus
A virus is a peace of software (program) that replicates itself
without the user intending it or noticing it. Viruses often affect our
computers having been brought about by hardware/software engineers
who move from one computer to another carrying out demonstrations
or through external infected disks, which are brought into the lab.
Such disks are often infected with boot sector virus (boot sector is
the first partition of the hard disk/floppy). When it (infected disk) is put
into the drive, it will be loaded into memory. The disk is now infected
since the memory to which it must be loaded first is now infected.
A virus usually has many effects for example replication where a
virus divides itself repeatedly thus spoiling the data on the
screen/memory/or disk.
Page | 60
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Also unauthorized persons could perform some fraud with the data
for say personal gain at the expense of the organization. A hacker could
gain access to for example change an existing invoice to reflect a higher
or lower bill, clear an invoice, etc.
• PRECAUTIONS
The following precautions should be put in place to avert the possible
loss of data through the risks identified above.
o Use of UPS
UPS in short for Uninterrupted Power Supply. This is a simple device
that consists of suitable sized strapped across the input supply. Its size is
dependent upon the capacity of the system it is required to support and for
how long. This method can be interrupt driven from a simple hardware
dictation circuit which automatically locks the user out as soon as an
interruption is detected and all data is automatically stored and also safely
packed before the system is switched off.
Page | 61
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
xvii. Virus
The following precautions should be adhered to so as to guard against
virus:
o Write Protection Disks
Every floppy 3½ disk contains a physical write protect tab on the left
hand corner that slides down to indicate its “on”. When the disk is write
protected, it means you cannot be able to write anything or change a word
in it, you can only read! This will protect you against virus since it cannot
allow any external data of any form!
Page | 62
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 64
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 65
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• SUMMARY
Page | 66
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Possible causes of data loss and programs are the following: power
failure, viruses, accidental erasure, erasing of disks, poor storage and
handling of disks and unauthorized access by hackers and other
intruders.
Page | 67
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• QUESTIONS
Page | 68
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
CHAPTER 4
OPERATING SYSTEMS
This chapter will introduce the student to what operating terms are, the
functions and types. It will also serve to explain how disk Operating
System (DOS) organizes information. The student is expected to use some
DOS commands for file and disk management and be able to list external
and internal DOS commands at the end of the chapter.
Page | 69
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
i. Memory Management
An Operating System allocates memory to itself and to its resident
system programs, sets aside areas of application programs and user
partitions, arranges the input and output buffers (areas on RAM where
input data and output data are temporarily stored) and reserves storage for
specialized purposes.
d. FILE MANAGEMENT
Medium of storage employed by most microcomputers is often disk.
Data that is stored on disks are often held in a file. The latter is often
referred to as a group of related records. The records may hold data about
customers, employees of the organization and names of students in a
school and the like depending on the organizations.
Therefore, the file as a group of program instructions is actually a
computer program. When files are stored on such storage media, then the
term “file” refers to anything stored on the medium, be it a program or
data file.
x. Directory Hierarchy
Files stored on a disk can always be organized into subdirectories.
Directory hierarchy refers to a “tree” like structure formed by directory –
subdirectories – files. For example, we could have a directory called
KENYA with subdirectories of towns NAIROBI, MOMBASA,
NAKURU and files of Estates within each town, e.g. Hurlinghum, Nyali
and Milimani. The figure below shows the directory hierarchy.
Page | 73
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
KENYA
Fig. 4.4.2
To be able to specify which file to open, the user has to specify to the
operating system the data path or path to that file. For example, to open
a filename Milimani, the following path must be specified:
Kenya\Nakuru\Milimani.
A path is often defined as a logical, sequential list of directories and
subdirectories leading to a filename. The names of directories and
subdirectories are separated from each other by determinates which
could be a backslash(\) or a hyphen (-) or a slash (/) depending on the
Ms-Dos version in use.
The directory names have extension DIR wheras the files have TXT.
The directory named Kenya under which the subdirectories Nakuru,
Mombasa and Nairobi are stored is called root directory.
Since the use could have multiple disk drives on-line (mounted) at
one time, the operating system must have a way of determining when
disks are actually mounted on the driver. To do this, we use volume labels
or volume directory, which simply a name assigned to each disk used in
the computer installation. The difference between volume labels identifies
a storage medium as physical unit while the latter two identify data stored
on disk. Suppose we gave a volume label country to the hierarchy above,
the complete name for reaching Milimani file will be:
COUNTRY\KENYA\NAKURU\MILIMANI
The operating system will ensure that disk on a volume label Country
is located first if it is the one mounted, before it searches for the actual file
in the specific directories.
How does one know that the application program has finished its
work and it is no longer loaded by the operating system? The operating
system will display that by displaying its prompt; it could be a character
or two that will signal the user it awaits further system commands.
The MS-DOS Operating System, uses the prompt C:\> or C>. The “C”
in the prompt indicates the disk drive in which the operating system will
look for any files referred to by the next TCL instructions. The disk drive
attached to the system are usually identified by letters of the alphabet
through a system with four drives could have drive identifiers A: through
D. Any reference to a drive must include the colon in the drive identifier.
The drive identifier displayed by the dos prompt is known as a logged
drive, the default drive or the active drive.
e. MS-DOS COMMANDS
Using system commands is quite easy. It is a matter of knowing the
right commands key, key it in and press enter key for the command to
be accepted. System commands help us to manage our files and
directories for example; we can copy a file from one disk to another,
delete files or change names. We can also manage our disks for example
to format a disk, label a disk or copy disks.
Page | 76
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 77
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• /P (Pause) Switch
To see the files with all the relevant information i.e. filename,
filename extension, size and date and time, then /P switch does the
work. The files will be shown one screen at a time and tests the user to
Page | 78
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
see the files with instructions to “press any key to continue…” The format
is DIR/P <ENTER>
• /W (Wide) Switch
This command will display filenames and their extension only for
the entire directory at once. They will be displayed in rows five files wide.
The format is DIR/W <enter>.
In this case, Dos will display the particular information about that file or
tell you that it is not on disk.
Page | 79
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
DIR Same.*
All files called “Same” will be displayed.
Suppose you decided to identify your files as Same 1, Same 2 and so on,
and therefore you wanted to only display a filename Same but with
specific extension DBF, you would enter:
DIR Same*.DBF
To see all same files you would enter:
DIR Same*.*
The asterisk wildcard is a many character wild card. It fills out a filename
or extension from its position to the end of the name in the above EXE
file, the asterisk is the fifth, sixth, seventh and eighth character if they
exist in the filename beginning with SAME.
Another wild card used in the Dos command if? It is usually called a one
character wild card. When it appears in a command, you can substitute
it with one character e.g.
DIR ?AME*.DBF, will substitute ? with any character as long as the next
line i.e AME is part of that filename. So if it is a command, like DIR
SAME*??? Would be the same as DIRD SAME*.* when the three
questions marks in the former stand fir three character.
Page | 80
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
When you copy a file to protect against loss of data we say you are
backing up a file. The copy command requires 2 parameters/arguments to
accomplish the task. It is a resident command.
• The first argument is the name of the file to be copied.
• The second argument is the filename for the copy. If the file is
not on the logged drive, then drive identification must be
included.
•
Page | 82
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
The above command will copy file named SAME1 on the same drive
and give it a new name ZAME2.DBF. it is important to note that if you
are copying within the same drive, then the new file must have a different
name.
Page | 83
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 84
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
N/B: You could also use the command PRESS CTRL + P which will sent
everything on the CRT to the printer. To stop printing pre CTRL + P again.
Page | 85
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Procedure:
a) To Format a non system or data disk
Simply enter FORMAT followed by a drive identification if the new disk is
not to be in the logged drive i.e.
FORMAT or FORMAT B:
This command will prompt Dos to load format program and display
the following message:
INSERT NEW DISKETTE FOR DRIVE A: and strike any key when
ready. In the file case or
INSERT NEW DISKETTE FOR DRIVE B: and strike any key when ready
in the second case.
Simply put the new diskette in the indicated drive and press any
key. Dos will display:
Page | 86
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Formatting …
After a few minutes, Dos repeats
Formatting……Format Complete
362496 bytes total disk space
362496 bytes available on disk
Format another (Y/N)
To which you will answer “Y” or “N” press Y if you want to format
another otherwise press N key from the keyboard.
The messages displayed are the same as the ones above with addition of
the ones indicating that system transferred and how much space it
required.
A disk with the system includes some hidden files the names of which do
not appear when you look at the contents of the disk, and a file called
COOMAND.COM. These files form the resident portion of Dos.
Page | 87
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Procedure:
The format for DISKCOPY includes two parameters:
•Source Drive and
• Destination Drive.
To be able to execute the command, enter the following:
DISKCOPY A:B:
Page | 89
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
This command will copy the contents of the entire drive A: to the one in
drive B:.
NB: Everything on the disk in B:, the destination drive, will be destroyed
by the operation. After the command, Dos will prompt you to insert the
disks.
You can as well specify DISKCOPY B:A: if you intend to copy from drive B:
to drive A:.
This method is often effective for disks that are full, otherwise we would
use the command:
COPY A:*.*B:
To copy all the files in drive A: with any extension to a disk in drive B. this
command as opposed to diskcopy, will always check for faulty areas on
the destination drive and mark them so that no data is kept in them.
h. SUMMARY
Page | 90
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
i. QUESTIONS
Page | 91
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
• List some of the internal and external Dos commands that you know.
(ii) How would you format a Diskette? How can you include an
Operating System to a formatted diskette?
BIBLIOGRAPHY
Computing - by Heathcate
IMIS IT 1 Manual
Page | 93
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes
[email protected]
Page | 94
Prefer Calling Sir Obiero Amos @ 0706 851 439 for F1-F4 All Subjects Notes