ICT Notes
ICT Notes
TABLE OF CONTENTS
FORM ONE
INTRODUCTION TO COMPUTERS
COMPUTER SYSTEMS
PORTS
OPERATING SYSTEMS (COMPUTER SOFTWARE)
DISK MANAGEMENT
FORM TWO
WORD PROCESSING
Definition
Main types of Word Processors
Terms in Word Processing
Paper Orientation
Features of a word processor
Advantages of Word Processor
Mail merging Document
Editing a Document
SPREADSHEET
DATABASES
DESKTOP PUBLISHING
INTERNET AND E-MAIL DATA SECURITY
FORM THREE
DATA PROCESSING
Data processing cycle
Description of errors in data processing
Types of Data Processing Errors
Transcription errors
Computational errors
Algorithm or Logical errors
Data Integrity
Data Processing Methods
Computer Files
Elements of a Computer File
Ways of viewing a file
Types of Computer Files
File Processing Methods
File Updating
File Organization Methods
Sequential file organization
Random or direct file organization
Serial file organization
Indexed sequential file organization
Elements of Data Processing Modes
Advantages of Electronic Processing
Disadvantages of Electronic information Processing
ELEMENTARY PROGRAMMING PRINCIPLES
Terms used in Programming
Levels of Programming
Low Level
High Level
Advantages and Disadvantages of Low and High Level
Advantages and Disadvantages of Low Level
Advantages and Disadvantages of High Level
Program Development Stages
Problem recognition
Problem definition
Program design
Program coding
Program testing and debugging
Implementation and maintenance
Algorithm Development
Pseudocode
Program Flowcharts
Program Control Structure
Sequence
Selection IF…THEN
IF…THEN…ELSE
Nested IF selection
Case Selection
Iteration/ looping
The FOR loop
The WHILE…DO loop
The REPEAT…UNTIL loop
SYSTEM DEVELOPMENT
Definition of System Development
Description of a system
Soft System
Hard systems
Characteristics of Systems
Information System
Reasons to develop a new system
The Role of an Information System Analyst
Theories of system development
Traditional approach
Rapid Application Development (RAD)
Structured approach
Stages of System Development
Problem recognition and definition (Problem analysis)
Information Gathering/ Fact finding
Interviews
Automated Methods
Questionnaire
Observation
System Classification
Deterministic system
Probalistic system
Cybernetics system
Requirement Specification
Output Specification
Input Specification
File / data store specification
Hardware and software specification
System Construction
System Design
System Implementation
Changeover
Direct Changeover
Parallel Changeover
Phased Changeover
System Review and Maintenance
System Documentation
FORM FOUR
INTRODUCTION TO NETWORKING AND DATA COMMUNICATION
Terms used in networking
Modes in communication
Types of Computer networks
Purpose of networking
Limitations of networking
Elements of networking
Data communication
Bounded or wired media
Two line open cables
Twisted pair cables
Coaxial cables
Fiber optic cables
Unbounded or wireless media
Microwave transmission
Satellite transmission
Radio communication
Infrared transmission
Communication Devices for Bounded (Wired) Media
Wireless (Unbounded) Communication Devices
Network software
Classifications of Network Software
Network operating system
Network Protocols
Network Topologies
Classifications of Network Topologies
Logical / Signal Topology
Physical Topology
Bus Topology.
Star Topology
Ring Topology
Mesh Topology
Tree/Hierarchical Topology
Network Security
Classification of Network Security
Share level Security
User level Security
Definition of a Computer
It is an electronic device that transforms data to information.
Data: Raw facts.
Information: Processed data.
Classification of Computers
1. Size and Memory
2. Purpose
3. Functionality
Mainframe
Minicomputer
Microcomputer
Desktop
Laptop
Advantages
∙ Portable
∙ Ruggedness: Designed to withstand travelers
∙ Display active color screen
∙ Power batteries serve as ups
Disadvantages
∙ Less expansion options
∙ They are easily stolen
Palmtop
Classification according Purpose
1. General computers
This computer can do or handle a variety of tasks when loaded with appropriate programs.
2. Special computers
They are designed to serve a specific purpose or to accomplish one particular task.
3. Dedicated Computers
They can handle any task but it is a dedicated to one task.
Control unit:
Functions of the control unit are-
∙ Avails instructions in sequence
∙ Interprets instructions
∙ Initiates the appropriate actions thereby controlling all the processes
Development of Computers
First Generation Computers (1940 - 1958)
Used thermionic valves or vacuum tubes
Advantages
∙ Vacuum tubes technology made it possible with advent of electronic digital computers
∙ It was the fastest calculating device that time.
Disadvantages
∙ Too bulky
∙ Unreliable
∙ Had limited memory
∙ Generated a lot of heat
∙ Consumed a lot of power
Examples
IBM 650, UNIAC
Features of a Computer
∙ Automation: Computers work with minimum human intervention once supplied with data
and instructions.
∙ Accuracy: Computers are ever accurate but entirely depend on the data entered.
∙ Speed: Performs tasks in very short period.
∙ Storage: Computers can store large volumes of data and information.
∙ Versatile: Ability of doing different tasks as per instructions.
∙ Diligence: Work for a long period of time without getting bored
Disadvantages of Computers
∙ Computers are very expensive
∙ Cuts down on employment opportunities
∙ Needs expertise which is expensive to hire and maintain
∙ They create eye problems
∙ Loss of information if not well managed
Advantages of a Computer
∙ Stores large amount of information in a limited space
∙ Speed: performs tasks in very short periods.
∙ Efficiency: creates an all round saving on space and time.
∙ Consistency: gives the same results given the same data and instructions.
∙ Secrecy: information is fairly protected if computer system is well managed.
∙ Versatility: Can do the same thing over and over again without being worn out.
Disadvantages
∙ Computers are very expensive
∙ Cuts down employment opportunities
∙ Needs expertise which is expensive to hire and maintain
∙ They create eye problem
∙ Loss of information if not well managed.
Computer Laboratory, Safety Precautions and Practice
Considerations for a Computer Laboratory
1. The number of computers to be installed.
2. Size of the laboratory.
3. The number of user that the laboratory can accommodate.
4. Reliability of a source of power.
Keyboard Layout
1. Alphanumeric Keys
Comprises of numbers and all alphabets, symbols like @,!,$,%,^,&,*,(,),?,>,< e.t.c. Other keys
include Caps lock, Enter key, Tab, Spacebar, Back space.
a) Caps Lock: When on letters typed appear in uppercase and when of letters appear in
lowercase.
b) Enter keys: When pressed it forces the cursor to move to the beginning of the next line.
c) Tab keys: Used to move the cursor at set intervals.
d) Back space: Deletes characters to the left from the cursor position.
2. Function keys
They are always located along the top of the keyboard. They are labeled F1, F2 to F12.
3. Cursor Movement and Editing Keys
Cursor Movement Keys
a) Arrow Keys: Used to move the cursor up, down, left and right.
b) Page up and page down keys: Moves the cursor one page up or down.
c) Home and End keys: Pressing Home key moves the cursor to the beginning of the current
line. End key moves the cursor to the end of the current line.
Editing Keys
a) Insert key: It helps the user to insert or replace a character at the cursor position.
b) Delete (Del) key: This key deletes characters at the cursor position from left to right.
4. Special PC Operation Keys
They are rarely used singly but in combination with other keys to give special instructions to the
computer. They include SHIFT, CTRL, ALT and ESC.
5. Numeric Keypad
Consist of a set of numbers 0 to 9 and the arithmetic signs +,-, *, / and are located on the right
side of the keyboard.
COMPUTER SYSTEM
Definition: Collection of entities that work together to process and manage data to information.
Hardware Configuration
CPU PERIPHERALS
Main memory
It forms an integral element of the processor. It’s tasks are;
✔ Holds data awaiting processing
✔ Holds data being processed
✔ Holds data that has been processed awaiting to be output
Types of DRAM
1) Fast Page Mode (FPM)
2) Extended Data Out (EDO) : improvement on FPM
3) Extended Correcting Code (ECC): Special DRAM, corrects errors, and used on savers.
4) Synchronous Dynamic Random Access Memory (SDRAM): twice fast as EDO. Run at
a speed of system bus up to 100 – 133 MHz
5) Rhombus Dynamic RAM (RDRAM): has a data transfer rate of 800 MHz
6) Double-Data rate (DDR): fast DRAM with module speed at which SRAM can transfer
data to the processor.
7) Video RAM (VRAM): Special type of memory that is used only with video adapter.
8) Window RAM (WRAM): a faster version of video memory.
Characteristics of RAM
✔ Information can be accessed at any time (random)
✔ Data can be changed
Special Purpose in RAM
1. Buffers: They provide temporary storage for finished tasks so that the CPU is set free to
carry out other activities instead of waiting for all data to be entered in information to be
output.
2. Registers: They hold a piece of data at a time and they are inside the CPU. Examples
a)An accumulator: temporarily holds the result of the last step of the Arithmetic and
Logic Unit.
b) An address register: Temporarily holds the next piece of data waiting to be
processed.
c)Instruction register: Temporarily holds an instruction just before it is interrupted
into a form that the CPU can understand.
d) Storage register: It temporary holds a piece of data that is on its way to and from
the CPU and the main memory.
Cache Memory
It helps the processor to access data and instructions faster due to incorporation of small high-
speed type of Static RAM than it would have taken to fasten it from the relatively slow Dynamic
RAM.
INPUT DEVICES
Devices that accept data from external environment and encode it into a form understandable to
the computer for processing.
Keying devices
1. Traditional Keyboard
2. Flexible keyboard: can be folded
3. Ergonomic Keyboard: designed to provide comfort and allocate wrist strain.
4. Keypad: Miniature keyboard used in PDAs, laptops and mobile phones.
5. Braille keyboard: designed for the blind.
Pointing devices
Mouse
1. Standard mouse: has a ball underneath, two buttons and optical scroll button located
between left and right buttons.
2. Optical mouse
3. Cordless/ wireless mouse: battery powered mouse that uses radio or infrared waves
instead of being physically connected to the system unit.
Trackball
It’s advantage over mouse is that it neither requires an extra space nor a flat surface for
movement.
Joystic
An input device like a car gear that can be moved sideways, upwards or downwards to control the
position of the cursor.
Speech Recognition/ Voice input: This is where microphone is used to enter data/
information or spoken words into a computer. Situations for speech recorgnition:
✔ Where hands are busy handling documents
✔ Due to movement
✔ Disability e.g. blind without hands
∙ Automated material
U handling
se ∙ Computer Aided Design
s Limitations
∙ Electronic fund ∙ Existence of homophones
transfer ∙ Word separation is difficult
∙ House/ car ∙ Slow recognition
security i.e. voice ∙ Speaker variability
activated locks ∙ It is still at the early stage of
∙ Offer security for development
room access ∙ Limited vocabularies
∙ Voice activated toys
and scanners
∙ Quality control
and automation in
factories
OUTPUT DEVICES
Devices that accept information from internal environment and then decodes it in a form
understandable to user
Classification of Output Devices
1. Soft copy: includes monitors/ VDU and the speakers
2. Hard copy: Printers and plotters
3. Microfiche: Computer Output on Microform (COM)
Printers
How printers are classified
a) Speed
b) How the produce the print; character, line or page printers
c) How they provide prints on the stationery; impact or non-impact printers
Types
a) Impact printers: Dot matrix, daisy wheel, golf ball and chain printers.
b) Non-impact printers: Thermal, inkjet, electrostatic and laser printers
Impact Non-impact
Slow Fast
Use ink ribbon Thermal/electrostatic principle
Cheaper Costly due to technology involved
Noisy Quiet
Multiple copies produce is Multiple copies produce almost impossible
possible
Printers Consideration
1. Printers initial price, subsequent maintenance cost and cost of consumable items.
2. Volume of printing expected.
3. Nature of report to be generated.
4. Range of capability for the selected printer.
5. Interface with computer at hand on for family particular make.
Plotters
They are used to produce graphical output e.g. maps and diagrams.
1. Flatbed plotters: Has a flat surface which the stationery is placed for the pen to be moving
over it in all directions to produce graphical output.
2. Drum plotters: Has a drum onto which stationery is placed for the drawing to be possible.
Computer Bus
Communication medium within a computer that allow different elements of the computer to
communicate with one another.
1. Address bus: Pathway used to locate storage position in memory for the data to be
executed.
2. Data bus: Pathway where the actual data transfer takes place.
3. Control bus: Pathway for all timings and controlling functions sent by the control unit to
the parts of the system
AUXILIARY/ SECONDARY STORAGE DEVICES
Factors to consider when choosing a storage device
∙ Volume of data to be stored
∙ The cost
∙ The quantity or size of data it can hold
Magnetic Tapes
These are sequential access devices. Implies that information is at the end of tape the program
will have to read almost entire tape which may take time to read. Data recorded as series of
magnetic dots across tracks on the tape cassette when characters are stored serially down the
length of the tape.
Sequential access medium: Data is stored across magnetic tape
Serial access medium: data is stored along the media
Advantages ∙ Slow since they are
∙ Light and easy to carry sequential access media
∙ Effective for batch applications ∙ Gaps between (called Inter Record
since they are cheaper Gap, IRG) waste storage space.
Disadvantages
Magnetic Disks
Floppy Disks (Diskettes)
Information is recorded on number of concentric circles called tracks. Tracks are divided into
sectors. Sectors and tracks have same storage capacity because inner tracks have a high density.
Diskettes are direct access storage medium (DASM) and access time is made up of 3 parameters.
1. Seek time: Time taken by the read/write (R/W) head to locate right track that contains
content.
2. Rotational delay time: Time taken by drive mortar to spin the diskette past R/W head.
3. Data transfer time: Time taken by the R/W head to interpret content and send it as
computer input.
Advantages Disadvantages
1. Exchangeable and easy to carry 1. Slower than hard disk
2. Can be used with PCs with no hard 2. Less storage capacity
disk 3. Damaged by light, magnet and dirt
3. They are cheap
4. Used for back up
Jaz Disks
Come with portable external drive and have a capacity of 1GB to 2GB and have high access
speeds.
Optical Tapes
They resemble magnetic tapes but they use optical technology
Optical Card
HARD DISK
Advantages
1. They offer cheap storage
2. They are well protected since they are housed in the CPU
3. Fast in terms of access retrieval and saving of data
Care for the Hard disk
a) Keep them away from smoke and dust.
b) Use the right procedure to switch of the computer to allow the R/W head to move from
the disk surface to avoid scratching on rotating surface
c) Exposure to magnetic property
2. Serial ports: They transmit one bit at a time. They are slower than parallel ports but they
support two way communications. They are 25 pin and 9 pin. COM 1 and COM2. Used by
the serial printers.
4. Small Computer System Interface (SCSI) - Use parallel method but faster than parallel
cables. The port connects up to 8 peripheral devices.
Utility Software
A special program that performs commonly used services that make certain computing aspects go
on smoothly e.g. sorting, copying, disk management etc. There are two types:
1. System level: Help user to work with the operating system and its function. It tells
whether the command entered is wrong and give suggestion on how the error can be
corrected.
2. Application level: Make use of an application program smoother and efficiently.
Functions of utility software
Reporting of errors which occur during program execution
∙ Control input and output devices
∙ Protest use hardware and data from misuse
∙ Provide program testing routines
∙ Provides communication between computer user and each program
∙ Memory management
∙ Maintenance of internal time clock and log of system usage by all users.
Network software
Establish communication between two or more computers by linking them using a
communication channel like cables to create a computer network e.g. Novell Netware
Translators
2. Application (packages) software
Programs that are designed to help user accomplish specific tasks.
Software Uses Examples
Word processors Typing long documents MS-Word, Word Pro
Spread sheet Calculating budgets MS-Excel, Quatropro
Desktop Publishing (DTP) Designing publications Adobe PageMaker, MS-
Publisher
Computer Aided Design Technical drawing AutoCAD
(CAD)
Database Keeping records and files MS-ACCESS, Dbase
Graphic Design Creating and manipulating Corel Draw, Adobe
graphics Photoshop
Internet Software
Used in communication and perusing the internet.
3. Programming Software
Used to create programs that behave like software
Hardware Considerations
a) Processing speed: For faster data processing the speed of the processor must be
relatively high.
b) Memory capacity: At least 128MB RAM. There are also factors to be considered when
buying a memory module-The type of module supported by motherboard
-Whether there is an empty slot on the motherboard
-Compatibility of the module with the existing one
-Module capacity
c) Warranty: Arrangement between the buyer and the seller whereby incase the product
fails during the agreed period of time it is taken care by the seller free of charge or for an
agreed fee. Things to consider in a warranty –The scope of cover
-Call out response and liability agreement
-Regular preventive maintenance
d) Cost: The cost is determined by the processor, size, and the memory capacity.
e) Upgradability and compatibility: Whether the hardware chosen can be easily upgraded
to accommodate emergent technologies.
f) User’s needs: Can it meet the unique needs like for the disabled?
g) Monitor: Always consider the size, resolution and the technology involved.
h) Multimedia capability: It should have speakers, CD/DVD drive, sound card, VGA or
SVGA card.
Software Requirements
a) Authenticity: Always consider genuine, valid and legitimacy and developers license.
b) Documentation: Manual from the developers that guide the user on installation, usage
and maintenance. –User guides
-License
-Manual guide
-Installation process
-Quick reference
-Warranty
c) Reliability and security: Consider whether the software offers good security to
confidential and private information.
d) User friendliness: How easily the user can interact with the software.
e) Compatibility and system configuration: Consider whether the software can work with
the computer at hand.
f) Cost: Always consider the cost and whether it serves the purpose.
g) Users’ needs: The purpose of the software.
h) Portability: Consider whether it can be installed in different computers.
Operating System
Resources under the Operating System
∙ Processor: The operating system arranges all tasks accordingly to prioritize and decides
which task to continue and which task to stop.
∙ Main memory: The operating system determines which task to remain in memory for
execution and what to send back to backing storage to wait.
∙ Input Output devices and ports: It controls the input of the data and output of
information.
∙ Secondary storage device: The operating system manages the storage (saving) and the
retrieval of data and information in storage devices. It utilizes hard disk space by holding
take not need currently by the RAM.
∙ Communication devices and ports: Operating system controls the exchange of data and
information.
Functions of an Operating System
1. Job scheduling: It determines which tasks to process first since the processor can only
handle one task at a time.
2. Resource control and allocation: An identification number called interrupt number is
given to each resource such that processor will be able to recognize and priorities the use
and request for resources are released when or where required to avoid situations known
as Deadlock (a situation where a program refuses to releases its resources to be used by
other programs).
3. Input output handling: It coordinates between the input output and other peripherals.
4. Memory management: The operating system divides the memory into blocks or partitions
for the running applications
5. Error handling: It alerts the user on errors made and gives suggestions on how to correct
them. It also alerts on errors on hardware and software.
6. Job sequencing: The operating system keeps a list of tasks to be processed and the order
of processing.
7. Interrupt handling: This is a breaking of normal processing sequence in programs. An
external request courses processing to halt for sometime to de something else before
returning back to the program interrupted.
Files
Definition
Types of files
✔ System files: files that contain information required for the operation of the computer
✔ Application files: Files that hold programs or start an application.
File Extensions
Importance
Examples
DAT- data
TXT- text
DOC- document
XLS- excel
SYS- system files
COM- command file
BAK- back up
PPT- PowerPoint
BAT- batch file
Folder/ directory: A named storage area created for storing files for easy access.
Subfolder: divided folder
Windows desktop: This is the first screen after successful booting.
Desktop Elements
Icons: This is the graphical/ pictorial representation of items.
Taskbar: It allows the user to switch between different files and programs.
Start button: It displays the start menu.
Task manager: Display buttons of the current running tasks.
System tray: Has icons of tasks running in the background but not displayed on the screen.
Backing up data: Creating duplicate copies of data on separate storage device for security purposes.
Boot up (start-up)/ system disk: System disk created to start the system in case the components of
starting up fail or when the hard disk is seriously damaged. The booting instructions are copied on the
disk.
Partioning: Subdividing a large physical disk into two or more partions called logical drives. Reasons for
disk partioning:
✔ When user intends to install more than one operating system on the same disk.
✔ For back up purposes
Definition
This is the creation of long document, reports, memos etc.
Main types of Word Processors
1. Dedicated: This word processor is the only program in the computer.
2. Non-dedicated: the word processor is among other programs installed in that computer.
Hyphenation: The way the word processor detects if the last word on a certain line will fit if not it adds
hyphenation after the first words then part of word in argument is pushed at the beginning of the next
line.
Justification: Position of line according to the centre of the page, left and the right margin. There are for
ways
∙ Full: All lines in a paragraph start at the same point and end at the same point.
∙ Left: All lines in a paragraph start at the same point but end at different point.
∙ Right: All lines in a paragraph start at different points but end at the same point.
∙ Centre: All lines in a paragraph are centered along the page.
Indentation: Way lines(s) start and end from the normal starting or ending point by the use of Tab
key indent tools from format command in the main menu. Ways of indenting;
∙ Indenting a paragraph from the left margin
∙ Indenting the first line of a paragraph from the left margin
∙ Hanging indent
∙ Indenting a paragraph from the right margin
∙ Indenting from both margins
Bolding: Increasing the intensity of text such that when printed it appears darker than normal text.
Blocking: Separating part of text by highlighting so that any issued command affects the highlighted
text.
Orphan: The last line in the last paragraph of a page that becomes the first line on the next page after the
first page is filled up.
Widow: First line in the last paragraph of a page that becomes the last line on that page while the
other part is moved to the next page after the first page is filled up.
Softcopy: Document that is in computer memory or the screen where changes are applicable.
Soft return: Situation where the cursor automatically moves to the next line before it reaches the end of
the current line.
Hard return: Situation where the user forces the cursor to move to the beginning of the next new line by
pressing the enter key on the keyboard before it reaches the end of the current line.
Soft page: Automatic page ending as per the settings that comes when one page is filled up.
Hard page: Forced page ending before the current page is filled up.
Continuous stationery: Situation where the printer uses rolls of papers therefore one does not need to
keep on inserting a paper after the other.
Preprinted stationery: One needs to insert a paper after the other is printed.
Toggle switch: How word processor behaves depending whether certain keys are on or off like Insert
and the Caps Lock keys.
Paper Orientation
Portrait
Landscape
Editing a Document
Deleting text
There are many ways to accomplish this operation
∙ Highlighting the text then right click the highlighted text and choose delete or press delete
key.
∙ Backspace Key: Deletes text on the left side of the cursor position.
∙ Delete key: Deletes text on the right side of the cursor position.
Find and replace: Fast way to search for a word in the document and if necessary replacing it
with another word.
Spelling and grammar: Press F7 or go to Spell checker to correct wrongly spelled words and
incorrect grammar
Thesaurus: Used to search for words with similar meaning (synonyms) or with opposite meaning
(antonyms).
Autocorrect and autotext: Autocorrect automatically corrects wrongly spelled word during
data entry while autotext completes words when the user types in the first letters of a word.
Undo and Redo: Undo (CTRL+Z) automatically cancels the last action done by the user while
Redo (CTRL+Y) automatically reverses the last command or action undone by the user.
Formatting Document
Text Formatting
Changing the font type, size and colour
Changing the case
∙ Uppercase: automatically changes the highlighted text into capital letters.
∙ Lowercase: automatically changes the highlighted text into small letters.
∙ Sentence case: automatically makes the fast letter of a sentence to a capital letter.
∙ Toggle case: automatically changes capitalized letters to small letters and vice versa.
Superscript and subscript
Press (CTRL+SHIFT++) for superscript option or (CTRL+=) for subscript option.
Paragraph Formatting
Alignment or Justification
∙ Full: All lines in a paragraph start at the same point and end at the same point.
∙ Left: All lines in a paragraph start at the same point but end at different point.
∙ Right: All lines in a paragraph start at different points but end at the same point.
∙ Centres: All lines in a paragraph are centered along the page.
Line spacing
Tab setting and Indents
∙ Indenting a paragraph from the left margin
∙ Indenting the first line of a paragraph from the left margin
∙ Hanging indent
∙ Indenting a paragraph from the right margin
∙ Indenting from both margins
Drop cap: Formatting the first letter of a paragraph to appear bigger and occupy several lines.
Bullet and numbering
Column
Page and column breaks
Formatting the entire document
Page setup
Page numbering
Headers and footers
Footnotes and endnotes
SPREADSHEET
Definition
An essentially large sheet that lets you enter, edit and manipulate numerical data.
Types of Spreadsheet
Manual
Electronic
Examples of Spreadsheet
Lotus 123
VisiCalc
MS-Excel
VP Planner
Components of a Spreadsheet
1. Worksheet: where data is entered. It consists of cells, columns and rows.
2. Database: Does the actual management of data e.g. filtering records, using forms, calculating
subtotals, data validation, pivot tables, pivot charts and reports.
3. Graph and charts: Pictorial representation of the base data in a worksheet.
Types of charts
Line, bar, column, pie, scattered, histogram,
Legend: A key that explain what each colour or pattern of data representation in a chart means.
Worksheet Layout
✔ Cell: Intersection between a row and column.
✔ Rows: Horizontal arrangement of cells.
✔ Columns: Vertical arrangement of cells.
✔ Range: A group of rectangular cells that can be manipulated as a block.
Cell Referencing
Identifies a cell or range of cells on the worksheet and shows MS-Excel where to look for the values or
data needed to be used in a formula.
1. Relative cell referencing: The formula keeps on changing automatically depending on the
position on the worksheet.
2. Absolute: Cell reference that is always referring to a cell in a specified location of the worksheet
even if they are copied from one cell to another.
✔ A1 referencing style: A cell can be identified by its column label followed by the row
number.
✔ R1CI referencing style: A cell is referred by its row number followed by its column number.
A1 style R1C1
B2 R2C2
C2 R10C3
E20 R20C5
Data Management
1. Sorting
2. Filtering data: Quick and efficient method of finding and working with a subset of data in a list.
3. Auto filter: Uses simple criteria and include filter by selection
4. Advanced filter: Uses more complex criteria.
5. Subtotal
6. Total function
7. Forms: Special prepared templates that the user can use to make data entry fast.
Mathematical Functions
1. Sum: Adds values in a range of cells as specified and returns the result in a specified cell.
2. Product: Multiplies values in a range of cells as specifies and returns result in a specified cell.
Definition of Database
Collection of structured and related data items organized to produce a consistent and controlled access to
the items.
Database Models
1. Flat files: They hold only one set of data and is not any different from the manual files. Example is
the library catalog.
2. Hierarchical models: Arranged in hierarchical (text) form i.e. To access level two data one has to
first access level one data items.
3. Networking models: Links or paths are used to express the relation between different data items
forming a network of items.
4. Relational model: Related data items are stored together in structures called relations or tables.
Relationships created between records of different tables.
5. Object Oriented Model: Database is a complete program built to hold a collection of objects
which have both properties and behavior.
Query Criteria
∙ Relational operations: >, <, <=, >=, <>, and =.
∙ Wildcards: *(asterisk) and #.
∙ Logical operators: AND, OR and NOT.
∙ LIKE and BETWEEN: relate or display values within a range.
Definition
This is the production of publication work within the computer framework of art and design
Layering
The process of placing objects, text and graphical objects on one another.
Importance of Layering
To have presentable levels
Importance of Internet
∙ Research activities
∙ News and information dissemination
∙ Leisure
∙ Communication
∙ Business transactions
Protocols
A set of rules that governs how two computers can send and receive data on the network. Types of
protocols are:
∙ Transmission Control Protocol (TCP): Governs how data is transferred from one computer to the
next.
∙ Internet Protocol (IP): Determines the addressing system on the internet.
VPN
Based Network
Station GPRS Internet
network WAP
Internet Services
E-mail Facilities
1. Mails
∙ Checking
∙ Compose
∙ Send
∙ Forward
2. File attachment
3. Online meeting
4. Telephone messaging
5. Contact management
2. Unauthorized Access
Types
1. Eavesdropping: Tapping into communication channels to get information.
2. Surveillance: Gathering information and use it for illegal purpose
3. Espionage: Spying to get information to use it to counter or finish another computer.
Control Measures against Unauthorized Access
∙ Data encryption during transmission
∙ Reinforce check access points
∙ Enforce network security measures
∙ Keep the computer room closed when nobody is using it
∙ Fingerprint identification strategies
5. Computer Crimes
1. Trespass: Gaining access to information without permission.
2. Cracking: Guess work till one discovers weakness in security.
3. Hacking: Intentional breaking of codes and passwords to gain access.
4. Tapping: Sending an intelligent program to the host computer to get information.
5. Piracy: Making illegal copies of copyrighted software.
6. Fraud: Use of computers to cheat people with the intention of gaining money or information.
7. Sabotage: Illegal destruction of data and information with the aim of crippling service delivery or
causing great loss to an organization.
8. Alteration: Illegal changing of data and information without permission with the aim of gaining or
misinforming the authorized users.
Concerns related to collection and use of private and confidential data are:
✔ Spreading information without the owners consent or awareness
✔ Spreading inaccurate information
✔ Eavesdropping and taping of information from a communication line
✔ Secretly recording and reporting user activities by using normal recording devices, spyware and
copiers
In digital computers, the user input is first converted then transmitted as electrical pulses called periodic
that can be represented by two distinct states ON and OFF. The ON state may be represented by a “1”
and OFF state by a “0”. The sequence of the two states results to an electrical signal that the computer can
understand.
Base Conversion
Decimal to binary
Divide by 2 noting the remainder from bottom. For fractional part multiply by 2 while noting the
remainder from top.
Example
Convert the decimal number 7.562510 into its binary equivalent
Solution
Convert the two parts separately
Integral part
2 7
2 3R1
2 1R1
0R1 7 is equivalent to 1112
Fractional part
Read this digits
0.5625 x 2 = 1.125
0.125 x 2 = 0.250
0.250 x 2 = 0.500
0.500 x 2 = 1.000
Since the product of the last step of the fractional part is zero. We stop here.
0.5625 x 2 = 0.10012
7.5625 = 111.10012
Binary to decimal:
The integral part
First write the place values starting from the right hand side.
Write each digit under its place value.
Multiply each digit under its corresponding place value i.e. 2^ (from 0, 1).
Add up the products. The answer will be the decimal number in base 10.
The fractional part
Multiply each digit under its corresponding place value i.e. 2^ (from -1).
Decimal to octal
Divide by 8 noting the remainder from bottom. For fractional part multiply by 8 while noting the
remainder from top. The answer is to base 8.
Octal to decimal
The method is similar to converting binary to decimal but using 8 instead of 2.
Binary to octal
Divide the binary numbers in pairs of three from the right side. Then multiply each digit by its place
value i.e. 2^. The answer is to base 8.
Octal to Binary
Divide each digit by 2.
Decimal to Hexadecimal
Just like the process done in converting decimal to binary but using 16. The answer is to base 16.
Hexadecimal to decimal
Like binary to decimal conversion but using 16^. The answer is to Base 10.
Binary to Hexadecimal
Divide into four parts, then multiply each digit by the place value of 2^, answer to base 16.
Hexadecimal to Binary
Divide each digit by 2. Answer to base 2.
3. Signed Magnitude
In decimal numbers, signed number has a prefix “+” for a positive number and (-) for negative
number may be represented by prefixing a digit ‘1’ to the number while a positive number may be
represented by prefixing a ‘0’ ie.
1710 100012 (unsigned)
-1710 To indicate it’s a negative number we add an extra bit (1) 100012
+1710 To indicate the positive number we add an extra bit (0)100012
Binary Arithmetic
Binary Addition
Binary addition rules
A+B SU CAR
0+0 M RY
0 0
0+1 1 0
1+0 1 0
1+1 0 1
1+1+ 1 1
1
Binary Subtractions
A-B DIFFERENC BORRO
E W
0-0 0 0
Rules
0-1 1 1
1-1 1 0
1-1 0 0
2 4
0
2 4
0
1
1
Solution
Rewrite the problem as 7+ (-4)
Convert the absolute value of 4 to 8 bit equivalent ie.
000000012
Take the one’s complement of 000000012 ie 111111102 which is the binary representation of -
410
Add the binary equivalent of 7 to 1c of 4 ie.
2 7 1
2 3 1
1 1
R
00000111
+11111110
(1)000001012
Looking at the difference of two binary numbers, you will observe that
1. Has an overflow bit
2. The results shows that the difference between the two numbers is 000001012. This isn’t
true! We know it should be 000001102.
00000101
1
000001102
000001102
DATA PROCESSING
Definition
This is the process of transforming data into a meaningful output i.e. information.
Data Processing Cycle
Data Collection
Processing
Data Integrity
The accuracy and completeness of data intended in a computer or received from the information
system. Data integrity is determined by;
1. Accuracy: whether the data is true or false.
2. Timeliness: This relays the availability of data in time or whether it is already outdated.
3. Relevance: Consider whether the expected output meets the processing cycle requirements, the
daily operations and the decision making.
4. Audibility (Verifiability): Ability of the user to check the accuracy and completeness of
information.
Minimizing threats to data integrity
▪ Using error detection and correction software when transmitting data.
▪ Using devices that capture data directly from source e.g. cameras
▪ Controlling the access to data by enforcing security measures.
▪ Back-up data preferably on external storage media.
▪ Design user interface that minimize chances of invalid data entry.
Interpreter Compiler
Translates source program Translate entire source code at once
one statement at a time for execution
Translates program code each time it Object code can be saved on a storage
is run hence slower the compiling media and run as required hence
executed faster
Levels of Programming
Low Level
They were easy, understandable and hardware oriented hence not portable.
1. First Generation Language (1st GLs)/ Machine Language: they are written using
binary logic.
2. Second Generation Language (2nd GLs)/ Assembly Language: used MNEMONICS
(symbolic operation codes, shortened two or three words)
High Level
They are very close to human language and are machine independent, hence they are portable
1. 3rd GLs (Structured procedural): Pascal, Formula Translator (Fortran), COBOL,
BASIC, Ada.
2. 4th GLs: They present programmers with programming tools. Examples; Visual Basic,
Visual Delphi, Visual COBOL.
3. 5th GLs: They depict human like intelligence- PROLOG, MERCURY, LISP and OCCAM.
4. Object Oriented Programs (OOP): Simula, C++, Java and Small Talk.
5. Web scripting: Java, php (hypertext preprocessor), Visual Basic Script.
Problem recognition
Reasons for development of a computerized program:
∙ Problem or undesirable situation that prevents an individual from achieving their goals.
∙ Opportunity to improve the current system.
∙ A new directive, given by the management requiring a change in status quo.
Problem analysis
Determining or defining the likely input, processing activities and the expected output.
Program Design
Actual development of program’s processing or problem solving logic called the algorithm.
Program Coding
Process of converting a designed model into its equivalent program using programming language.
Program Documentation
Writing of support materials explaining how program can be used by users, installed by experts by
operations and modified by programmers:
1. User oriented- enables the user to use the program easily and quickly.
2. Operator oriented: help to install and maintain the program.
3. Programmer oriented: provide necessary technical information for future modification of
programmers.
Algorithm Development
Pseudocode
Guidelines for designing a good Pseudocode
1. The statement must be short, clear and reliable
2. The statements must not have more than one meaning i.e. should be unambiguous
3. The Pseudocode lines should be clearly outlined and indented clearly
4. A Pseudocode should show clearly the start and stop of executable statements and the control
structures (to be discussed later in the section).
5. The input, output and processing statements should be clearly stated using keywords like PRINT,
READ, INPUT etc.
Program Flowcharts
Common symbols used in drawing program flowcharts are:
Input/
output
Process
Ellipse: denotes the beginning and
Advantages of Flowcharts
∙ Gives programmer good visual reference of program function.
∙ Serves as a program or system document.
∙ It is easy to trace through from the start to find the action resulting
Selection
Execution of statement depends on a condition that returns true or false. There are four types
IF…THEN
Only one IF option is available. All others are ignored during program execution. General format: IF
<condition> THEN
Statement;
END IF
IF…THEN…ELSE
Only two Ifs are the available option. The general format:
IF <condition> THEN
Statement;
ELSE
Statement;
END IF
Nested IF selection
There two or more If options and statements to be conditioned to make a selection. General format; IF
<condition> THEN
Statement
ELSE
IF <condition> THEN
Statement
ELSE
Statement
END IF
END IF
Case Selection
An alteration to Nested If especially where there are several options to choose from. The flowchart
not different from Nested IF.
CASE X OF
Label 1: statement 1
Label 2: statement 2
Label 3: statement 3
.
.
.
Label n: statement n- 1
ELSE
Statement n
END CASE
Iteration/ Looping
Repetition designed to execute the same block of code again and again till a certain condition if
fulfilled.
The WHILE…DO loop
General format
Pseudocode Flowchart
While <condition> Do
Statement Statements
End while
Condition
? Yes
No
End Loop
Repeat
Statement Statements
Until <condition>
Yes
Condition
?
No
End Loop
The FOR loop
General Format
1. Format for the FOR loop that counts from the lower limit
No Statement
Condit ion?
Yes
Flowchart extract for a FOR loop that counts downwards
No Statement
Condit ion?
Yes
SYSTEM DEVELOPMENT
Description of a system
A system is described as either hard or soft system
Soft System
∙ Their boundaries may be fluid or keep on changing.
∙ Their goals and objectives usually conflict and may not be captured clearly because they are
human based.
∙ It is difficult to precisely define exact measure of performance for them.
Examples: sales tracking and predicting systems, political system,
Hard systems
They are systems whose goals and objectives are clearly defined and the outcome from the system
process are predictable and can be modeled accurately.
Characteristics of Systems
1. Holistic thinking: Combination of various components to create a complex whole.
2. Subsystems: A system doesn’t exist in solitude but may be a component of a large system.
3. Boundary and environment: An external element whose changes in attitudes, behavior
and property affect respectively.
4. Processor: Transform or processes data from one state to another.
5. System entropy: The decaying or becoming useless because of the improvement in
technology, new management policies or the change in user requirements.
6. Inputs and outputs: The system communicates to its environment by receiving inputs and
giving outputs.
7. Open and Close: The open system receives input from and gives output to the environment
while the closed system uses input as its own benefit thus building itself from the output.
8. Purpose: The objectives that a system is supposed to achieve enable system developers to
measure the performance of a system during its operation.
9. Control: This is the method by which the system adapts to changes in the environment in order to
give the expected output or to perform to the expected level.
Control Feedback
Signal
Control
Information System
An arrangement of people, data processes and information that works together to support and improve the
day to day operation in a business and decision making. Purpose:
∙ Supporting information processing task e.g. data collection, processing and communication.
∙ Helping in decision making by collecting operational data, analyzing it and generating reports to
be used in supporting decision making process i.e. online analytic process.
∙ Enable information sharing
Interviews
Guidelines:
✔ Interviewee must be informed in good time and the topic of discussion communicated before to
allow for adequate preparation.
✔ Avoid personal biases in your questions.
✔ Be careful about body language and proxemics.
Types of Interviews
∙ Structured: Questions have been already organized or prepared and spaces for the answers/
responses.
∙ Unstructured: Questions are not written or prepared.
Advantages
∙ Non-verbal communication can be used.
∙ Questions can be rephrased instantly for clarification and to probe the interviewee further.
∙ Gives adequate opportunity for the interviewer.
∙ Interviewer is accessible to first hand information.
Disadvantages
∙ It is difficult to organize interviews and they are time consuming.
∙ Interviewee may not fully open up on some issues that may be personal or sensitive.
∙ They are expensive to conduct.
Automated Methods
The uses of data capture devices like cameras, scanners and camcorders.
Advantages
∙ The method is accurate.
∙ Fast.
Disadvantages
∙ Expensive equipment required.
Questionnaire
It is a special purpose document that allows a person to collect information and opinions from the
people who receive and respond to it.
Application
∙ When limited amount of information is required from a large number of people.
∙ People you need to gather information from are vastly dispersed.
Advantages
∙ Since they are filled and returned in primary more sincere responses are possible.
∙ Respondent can fill the questionnaire at their own pace.
Disadvantages
∙ Good ones are difficult to prepare.
∙ The respondent may not fully understand the questions because of ambiguity of language hence
giving erroneous responses.
∙ Time consuming in analyzing.
Observation
Advantages
∙ Difficult concept for non-technical staff to explain can be observed.
∙ Helps analysts become acquainted with the operational personnel.
∙ Helps the analyst acquire know how needed to assist that have been recommended.
∙ Can correct “hazy” understanding/ erroneous impressions.
Disadvantages
∙ The person being interviewed can alter behavior leading to wrong requirement being observed.
∙ The need to be on-site consumes a lot of time.
∙ The method cannot give information about past activities and problems.
3. System Classification
∙ Deterministic system: system whose output is precisely known by their inputs like the
computer system.
∙ Probalistic system: Output can only be predicted but not precise like in business and
economics.
∙ Cybernetics system: Self system which adapts to the environment and regulate their own
behavior by accessing the feedback e.g. in human beings, plants.
4. Requirement Specification
Output Specification
Activities that entail generation of reports used to facilitate decision making. Factors to consider;
∙ Target audience.
∙ Frequency of report generation.
∙ Quality and format of output.
Input Specification
∙ Content and volume of input.
∙ Mode and device of input selection.
∙ Layout and information sequence
File / data store specification
∙ The key attribute/ field
∙ Type of data
∙ Length of each field
∙ Back up and recovery strategies
Hardware and software specification
∙ Economic factors e.g. prices
∙ Operational factors e.g. reliability, upgradability, compatibility with existing resources
∙ User-friendliness
5. System Construction
The coding, installing and testing modules and their components e.g. Input, output by
∙ Using high-level structure language like PASCAL, COBOL e.t.c.
∙ Fourth Generation languages- Visual Basic, Visual COBOL, Visual Delphi e.t.c.
∙ Customizing the standard packages.
∙ Testing
6. System Design
Development of flowcharts, data flow diagrams, structured charts e.tc.
7. System Implementation
The activities involved during this stage are: Installing the system, testing, converting from old system to
the new system and training the users.
File creation and convention: Setting up of master files to be used to support the new system.
Training the staff
∙ Convert staff of user department on the effectiveness of the new system
∙ Remove fear of change from them
∙ Enabling staff cope with processing task of the new system
Methods used in training: documentations, film shows, manual reference, group discussions and visits
Changeover
The process of changing over from old system to the new system.
1. Direct Changeover: The new system commences live operations and immediately the old
system is abandoned.
Advantages
∙ Cheap method
Disadvantages
∙ Places the organization in a do or die situation
∙ Extremely risky
2. Parallel Changeover: Operations of the old system and the new system are run alongside each
other
Advantages
∙ Provides a method of training in the new system
∙ Personnel become familiar with the new system
Disadvantages
∙ Costly to run two systems
∙ Cross checking is difficult
∙ Requires more staff hence more training is required
3. Phased Changeover: Implementation is done only on part of the new system at one time or
step by step.
Advantages
∙ Allows the system to be implemented quickly
∙ Less costly
∙ Failure of the new system is limited
∙ Cause minimal description
Disadvantages
∙ Problems on assuming that the final sphere is implemented and converted
System Documentation
1. Reports on fact-finding
2. Requirement specification
3. System and module flowcharts
4. Table/ file structure description
5. Sample test data and expected output
6. Output reports.
INTRODUCTION TO NETWORKING
AND DATA COMMUNICATION
Computer Network: Collection of computers linked together using transmission media for the
purpose of communication and resource sharing.
Modes of Communication
1. Simplex- Communication in only one direction e.g. television and radio broadcasting
2. Half duplex- Communication in both directions, one at a time e.g. Walkie Talkie
3. Full duplex- Communication in both directions simultaneously.
Server: This is computer dedicated to serving requests for resources from other
computers(workstations) on network.
Advantages of LAN
1. Enables many users share expensive resources like printers and data.
2. Enables communication- sending messages and open chat sessions.
3. Capable of transmitting data very fast.
Purpose of Networking
1. Resource sharing- File sharing, mail exchange, sending faxes, schedule meetings and print
documents leading to less wastage of time and enhances greater productivity.
4. Cost effectiveness- Although the initial installation cost is high it cuts down most expenses
and adds value to service delivery. Advantages
(i) Daily communication- paperless communication environment.
(ii) Reduces transport cost for executive meetings.
(iii) Resource sharing e.g. printers, fax machine, optical drives, files and applications.
Limitations of Networking
1. Security issues- Data is prone to more illegal access threat in the network
2. High initial cost for software and hardware.
3. Moral and cultural effect- chartrooms and pornography.
4. Spread of terrorism and drug trafficking.
5. Overeliance on network thus network failure may halt the system or bring down the
organization.
Elements of Networking
A. Data Communication Media
1. Bounded (cabled) Media
Two line open cable
Insulator between the two wire help reduce interline interference. They capture environmental
frequencies e.g. radio waves hence causing noise in the transmission medium/pathway.
Insulator Wire
Conductor
Advantages
∙ Used in the telephone systems
∙ Cheap installation equipments
∙ Cheap due to mass production of telephone
Disadvantages
∙ Suffer a high attenuation rate.
∙ Sensitive to EMI and eavesdropping
∙ Low data transmission but more than
∙ two line
Coaxial cables
Has a central copper core surrounded by a dielectric material (insulator) that is then surrounded by a
hollow mesh conductor covered by a shield. The braid (mesh conductor) is made of copper/ aluminum
and serves as the ground for the carrier wire. The braid protects radio and electromagnetic interference.
The thinner the conductor determines the attenuation rate. Thinner have a high attenuation rate. Used in
network blockade- A link that connects two separate LAN’s
(ii) Thin coaxial cables (Thinnet)- has no dielectric insulator
(iii) Thick coaxial cables (Thicket)- has two dielectric insulators.
Copper core
Core insulator
Aluminum foil
Braided shielding
Outer layering
(b) Thicknet
Advantages
∙ Stable even under high loads
∙ Large bandwidth than twisted pair
∙ Carry voice, data and video signals simultaneously
∙ Resistant to radio and EMI than twisted pair cables.
Disadvantages
∙ Thicket is hard to work with
∙ Are relatively expensive to buy and install compared to twisted pare
Jacket
Cladding
Light rays
Core
Cladding
Advanta
ges
Have a high frequency of 3 GHz to 4 GHz. It suitable for point to point transmission (line of
sight): Signal is directed through a focused beam from transmitter to receiver.
Advantages
∙ It is less prone to transmission errors.
∙ It is capable of operating on both digital and analog data
∙ Operates at a high speed.
Disadvantages
∙ Signals affected by atmospheric conductors e.g. lightening
∙ Additional numbers of repeaters are added after every few kilometers.
Satellite Transmission
Satellite in space
Downlink
Uplink
Satellite footprint: Area on earth where line of site can easily be located. Transmission of signals to
many recipients’ earth stations forms a point to multipoint transmission.
Very Small Aperture Terminal (VSAT): This technology refers to very small satellite dish used in
radio, data and TV communications. It enables direct access to satellite communication instead of having
to go through satellite owned or licensed satellite gateway.
Advantages
∙ Has a high band width.
∙ Earth station can be installed on a customer property than layering extensive cables.
∙ Cheap since cost is not dependent on the distance.
Disadvantages
∙ Expensive to install ground stations.
∙ Heavy rains or bad weather increases loss of signals.
∙ Any station can receive the signals.
Radio Communication
(i) High Frequency (HF) - Propagated by directing it to ionosphere on earth. Then the
ionosphere will reflect back to earth surface and the receiver will pick it up.
(ii) Very High Frequency (VHF) - Transmitted over the earths surface. Stationeries are
place strategically to maintain the line of sight from one another.
(iii) Ultra-High Frequency (UHF)- It is the same as VHF but require smaller aerial because
they can be made to follow even narrow and direct path to the receiver than VHF
(iv) Bluetooth- Enables people to use hand-held communication devices e.g. phones PDA’s
to access the internet. Network Bluetooth enabled devices is called a wireless personal are
network (WPAN) or piconet.
Infrared Transmission
Infrared transceivers must be within the line of sight in the same room because unlike radio signals
they cannot penetrate objects.
Network Protocols
They are a set of rules and procedures that govern communication between two different two devices
or people.
Concept behind network protocols
In order to transmit data over the network it has to be broken into discrete systematic steps. Each step has
its own rule and procedures i.e. protocols that must be coordinated so that there are no conflicts or
incomplete operations. Achieved through protocol layering .Network protocols are designed after the
Open System Interprocess (OSI) model. The open system interconnection model is not a protocol as such
but is meant to help designers to come up with high quality layered protocols.
Layer Function
7. Application layer User application run here and generate request for data
transmission or open received files.
6. Presentation layer Adds formatting, display and encryption on information to data
being presented.
5. Session layer Sets up data transmission session between two communication
devices.
4. Transport layer Manages data transfer over the network to ensure reliability.
3. Network layer Address information is added to the data packet and routed to
destination.
2. Data link layer Adds error checking information and prepares data for going into
the physical connections.
1. Physical layer Data packets are finally transmitted via the network and through
transmission media in form of bits.
Network Topologies
This refers to the way in which computers her devices have been arranged or how data is passed from
one computer to another in the network.
Classifications of Network Topologies
1. Logical topology
2. Physical topology
Physical Topology
Bus Topology.
All the devices on the network are connected to a central cable called the bus r the backbone. Each
end of the cable is connected to a terminator to avoid signal from bouncing back and fourth on the
cable causing signal distortion. The network address of computers on the network is called the
medium access control (MAC) address.
Computer
Com
puter
Computer Computer
Disadvantages
∙ It requires more cables to install hence it is more expensive.
∙ Failure of the central hub puts the entire network at a stand still.
∙ Installing this type of network is time consuming.
Ring Topology
All the components in this topology are connected to a single transmission cable forming a ring styled
connection of computers
Computer
Computer Computer
Computer
Computer
Advantages of Ring topology
∙ Data transmission is fast.
∙ They use a short length cable.
∙ Ring topology is simple to install.
Mesh Topology
Device in this topology are connected with repeating (redundant) cables between the workstations.
Each node is connected to one another.
Disadvantages
∙ Expensive: Costly to provide the redundant cables.
∙ Difficult to install and maintain.
Tree/Hierarchical Topology
All the nodes are connected in form of a tree with nodes as leaves and links as branches. The branches are
connected to one another by the means of devices called hubs.
Advantages of Hierarchical topology
∙ If the node below the main node fails, the network does not fail.
Disadvantages
∙ If the top node fails the entire network fails because it controls the other nodes.
∙ Expensive to install since it is complex.
Printer
Hub
Bus/backbone
Network Security
Classification of Network Security
(i.) Share level security
(ii.) User level security
Financial Systems
Payroll systems
This system helps an organization to process accurately information of employees including gross pay
and deductions and getting their net pay.
Accounting systems
(i.) Customer order entry and billing: Subsystem records incoming customer orders authorizes
delivery of items or services and produce invoice for customers whoi don’t pay in advance
(ii.) Inventory management: Keeps track of items in stock and help the management to
determine which item to reorder.
(iii.) General ledger account: Keep track of how much a business makes and its worthiness by
summarizing the financial transactions producing a report called balance sheet.
(iv.) Accounts payable: Keeps track of the amount the business sows other organizations like the
tax organizations, suppliers and transporters.
(v.) Accounts receivable: Keeps track or records the amount owed by the customers.
Banking Systems
(i.) Processing customers’ transactions: Computers are used in banks to record deposits,
withdraws and calculating interest on savings and loans.
(ii.) Cheque clearing and processing: The use of magnetic Ink-Character Recognition (MICR)
details of the cheque is automatically entered into the computer for the cheque process. The
special characters on the cheques includes the bank in which the cheque is drawn from, the
customer accounts number the cheque number and the cheque amount.
(iii.) The electronic fund transfer: Use of Information Communication Technology to move
money. Used especially with credit cards and the ATM cards.
Reservation systems
These systems are also called online enquiries. The concept used in reservation systems is the
application of distributed network systems. Applications of reservation systems:
(i.) Hotel booking: Booking and reservations rooms in a hotel are made from a remote terminal
connected to a centralized computer database or via the internet using the hotels website.
(ii.) Airline booking: All the flights and passenger records are stored in a centralized database.
Travel agents from all over the world can access each data via communication lines.
Likewise the agents book in clients where tickets have not been bought.
(iii.) Car rentals
Education Systems
1. Computer Aided Instruction (CAI): The process of using computers to learn, drill and practice
particular education principles.
2. Computer Aided Learning (CAL): This is meant to drill the learner and present particular
education materials the way a teacher does in class.
3. E-learning: Lessons and lectures are presented from a central site like a website the transacted to
remote conference terminals or displayed on television screens.
4. Computer Aided Simulation: It refers to the science of representing behavior of a real life
situation by using computerized models.
Communication Systems
(i) Fax: During the process of sending the fax the document is scanned then converted into
analog form then transmitted. The receiver fax converts it into the original softcopy the it
prints the document.
(ii) Radio communication: Computers are used to:
∙ Record and manage radio programmes for broadcasting.
∙ Manage radio transmission and took performance.
∙ Create slides, simulated objects and sound effects when preparing electronic and
printed media advertisements.
∙ Downloading information from the internet like international news.
(iii) Television sets
∙ Ceefax (teletext):This refers to the computerized service where news and other
information are provided on television screens to subscribers using an add-on card. It
involves simplex transmission
∙ Videotext (view data)
(iv) Video conferencing: Use of computers, digital camera (camcorder), audio capturing
equipments and communication network to enable people from different locations to see
and talk to one another.
(v) Telecommuting: Situation where an employee work at home using a computer connected to
workplace network.
Advantages
∙ Reduces transport cost.
∙ Gives people the option of flex time.
∙ Saves costs.
∙ Reduces pollution and congestions inroads.
Disadvantages
∙ Lack of discipline.
∙ Work quality may suffer.
∙ Few opportunities for brainstorming with colleagues.
∙ Disappear of direct supervision.
(vi) Internet
∙ World Wide Web: This is the collection of webpages, which may be made of text,
images, animations, sounds and video held on web servers.
∙ E-mail: Electronic sending and receiving of messages, data, files or graphics in the
internet.
Industrial systems
(i) CAM and CAD
✔ Computer Aided Design (CAD): Refers to the integration of computers and
graphics to aid in the design and drafting process. Examples of software are:
Softpan, Autocad and Archicad.
✔ Computer Aided Manufacturing (CAM): It refers to the use of computers to
control machines in the manufacturing process e.g. Delta.
(ii) Industrial simulation: Allows activities that would otherwise be expensive and
dangerous to real life situation to be put under test. The Non Destructive Testing
(NDT) can be used to test motors and other machines with the use of computers.
(iii) Process control: Computers are used to contol ongoing physical process like
regulating temperature, pressure and fluid flow.
Transportation Systems
(i) Automobile traffic control: controlling traffic lights in road junctions.
(ii) Air traffic control: Computers are used to monitor air traffic movement, take off and
landing of aircrafts.
(iii) Shipping control: Controlling and guiding paths taken by spaceships and water vessels
as they travel to distant land using the Global Positioning System (GPS).
Home Use
(i) Preparing domestic budgets.
(ii) Entertainment.
(iii) Research.
(iv) Education.
Marketing
(i) Electronic commerce (e-commerce): Transactions are carried out directly without
physical interaction between the buyer and the seller.
(ii) Electronic presentation
(iii) Advertising
Virtual/ Artificial Reality/ Cyberspace/ Virtual Works/ Virtual
Environment
Condition in which a person is psychologically immersed in an artificial environment generated
by a computer system: Requirements
∙ Head mounted display (HMD)/ Headgear: made up of two tiny display screens and sound
systems that channel images and sound from the source to the eye and early presenting a
stereo three dimensional (3D) sound effect in the virtual world.
∙ Gloves: Allows the user to navigate through the virtual world and interact with virtual
objects. They have sensors that collect data about the movement of the hands and relays
the data into the system
∙ Body suit: Worn during virtual reality session and iis made of condux
∙ VR software
Applications
(i) Training in medicine, military education
(ii) Entertainment
(iii) Simulation
(iv) Study of human anatomy
(v) Exploring landscape, underneath
(vi) Crime scene reconstruction
Law Enforcement
∙ Biometric analysis: fingerprints and facial identification.
∙ Use of video camera e.g. in banks
∙ Development of strong military bases which have international coordination by use of a
computer radar system
∙ Jet fighters are computerized with correct control centers.
Teleworking
A situation where an employee works usually at home using at home using a computer connected
to work place.
Advantages
∙ Reduces travel expenses due to reduction of unnecessary travel to work.
∙ Gives people the option of flextime giving them the option of working long hours part
time.
∙ Saves cost if people work from home.
∙ Reduces pollution and congestion as a result of fewer people commuting to work.
Disadvantages
∙ People who lack discipline may not do work, where as others may overwork.
∙ Work quality may suffer if employees take the attitude “no one sees me doing the job so
it doesn’t matter.
∙ Fewer opportunities of brain storming with colleagues.
∙ Direct supervision disappears when people work from home.
Automated Production
Advantages
∙ Increases efficiency due to balancing of workload and production capacity.
∙ Improved customer service: Adequate and high quality goods are produced in time.
∙ Efficient utilization of resources
Disadvantages
∙ High initial cost of setting up automated systems
∙ Automated production may lead to unemployment
Environment pollution: Huge garbage dumps of dead computer parts, printers, ink,
tonner cartridges, monitors and other computer accessories are disposed in landfills causing
environmental pollution. Nickel-cadmium laptop batteries that contain toxic cadmium which
when buried in a landfill can leak into underground water tables and attachment areas.
Cultural Effects
1. Flaming: writing online messages that use derogatory, obscene or dirty language.
2. Pornographic material
3. Computer crimes: hacking, eavesdropping, piracy etc.
4. ICT have erased people’s integrity by using computers as a tool to accomplice their vices
e.g. forge certificates, passports and other document.
5.
Breakthrough in ICT
It has changed lifestyles in health care, education, communication, research, commerce, art and
design, entertainment, transport etc.
3. Artificial neural network: use of electronic devices and software to enable the
neurological structure of human basic. Essential attributes;
✔ The neurodes can be trained to distinguish between what constitutes a
signal and what doesn’t.
✔ They are capable of recognizing patterns in large amount of data that are
too complex for human beings.
4. Robotics: Computer controlled device that emulates human beings in carrying out tasks
that would otherwise be dangerous and different.
Merits
∙ A robot can work on repetitive task without getting bored or tied.
∙ Can work on dangerous areas unlike human beings
∙ Increased production because they are capable of working at a high
speed
∙ Leads to less operating expenses since less personnel is required
Demerits
∙ Lead to job replacement
∙ Expensive to install
3. Expanded superhighway
Involves integration of cabled and wired technologies for the purpose of data and information
transmission.
CAREER OPPORTUNITIES IN
INFORMATION AND
COMMUNICATION TECHNOLOGY
Computer Operator
1. Entering data into the computer for processing
2. Keeping up to date records (log files) of all information processing activities.
Computer Technician
1. Troubleshooting computer hardware software related problems
2. Assembling and upgrading computers and their components
3. Ensuring that all computer related accessories e.g. printers, storage media, modems are in
good working conditions
4. Help hardware engineers in designing and creating some computer components e.g.
motherboard, storage devices
System Analyst
1. Attributes/ Qualities of a good system analyst
2. Good problem solving skills and creativity: experience in problem solving
3. Good communication skills
4. Must have business knowledge
5. Technical knowledge in hardware, software and processing
Responsibilities
∙ Reviewing the current manual system and making recommendations on how to
replace it
∙ Preparing system specification
∙ Working with programmers to construct and test the system
∙ Preparing instruction manual
∙ Coordinating training for users of the new system
Computer Programmer
1. Writes in-house application programs/ system programs
2. Customize commercial application packages to suite the organization needs
3. Test, install, debug and maintain programs developed
Software Engineers
1. Develop system and application software
2. Develop user and technical documents for the new software
3. Maintaining and updating software to meet day to day requirement while overcoming
challenges
Computer Engineers
1. Design and develop computer components such as storage devices, motherboard and
other components
2. Determining the electrical power requirements of each computer component
3. Re-engineer computer components to enhance its functionality and efficiency
4. Design and develop engineers and manufacturing computer controlled devices such as
robots
Computer Trainer
1. Developing training reference materials
2. Guide learners on how to acquire knowledge through carrying out research
3. Advising learners on the best career opportunities in the broad field of ICT
4. Preparing learners for ICT examination
Network Administration
1. Set-up a computer network
2. Maintaining and enforce security measures on the network
3. Monitoring the use of network resources
4. Maintaining and troubleshooting network related problems
Computer Sales Representatives
1. Analyzing customer needs
2. Advertising them accordingly
Characteristics of a good computer sales representative
∙ Must be confident
∙ Be persuasive
∙ Proficient in business communication
Research Institutions
1. Polytechnics: Offer diploma and certificate courses
2. Colleges: Offer diploma, certificate and craft courses.