Introduction To Computers AA-1
Introduction To Computers AA-1
Table of Contents
DEFINITION OF ICT.........................................................................................................................2
USES OF INFORMATION................................................................................................................3
THE INFORMATION PROCESSING CYCLE.................................................................................3
CAREERS IN ICT...............................................................................................................................5
HISTORY AND DEVELOPMENT OF COMPUTERS....................................................................5
THE GENERATIONS OF COMPUTERS.........................................................................................7
DEFINITIONS OF COMPUTERS.....................................................................................................8
TYPE OF COMPUTERS....................................................................................................................9
USES/APPLICATIONS OF COMPUTERS....................................................................................11
THREATS TO COMPUTERS AND USERS..................................................................................12
COMPONENTS OF THE COMPUTER SYSTEM.........................................................................14
THE SYSTEM UNIT OR COMPUTER CASE...............................................................................16
COMPONENTS OF THE SYSTEM UNIT......................................................................................17
MEMORY.........................................................................................................................................18
EXPANSION SLOTS AND BOARDS............................................................................................19
STORAGE DEVICES.......................................................................................................................20
UNITS OF MEASUREMENT FOR STORAGE.............................................................................20
SOFTWARE......................................................................................................................................21
A. System software........................................................................................................................21
B. Application software.................................................................................................................22
TYPES OF OPERATING SYSTEMS..............................................................................................22
OPEN SOURCE AND PROPRIETARY SOFTWARE...................................................................23
OPEN SOURCE OPERATING SYSTEMS SOFTWARE...........................................................23
Proprietary Software......................................................................................................................24
TYPES AND USES OF APPLICATION SOFTWARE..................................................................24
Types of application software........................................................................................................24
BOOTING, REBOOTING AND SHUTTING DOWN....................................................................26
MOUSE SKILLS...............................................................................................................................26
Mouse pointers..................................................................................................................................26
1 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
INTRODUCTION
No matter what career you choose, ICT will affect you somehow. Knowledge of ICT
and the effective use of ICT can make the difference between whether the effect will be
positive or negative. The important thing is to gain a basic understanding of computing
concepts and to build skills necessary to ensure that ICT is an advantage in whatever
career path you choose in life.
ICT is very important and integral because it forms the basis for lifelong learning. It is
common to all disciplines, to all learning environments, and to all levels of education
and growth.
Having the ability to use ICT proficiently affords one the ability to use digital
technology, communication tools and networks to define information needs, access and
manage information, evaluate information, and communicate this information to others.
DEFINITION OF ICT
The acronyms “ICT” stands for Information and Communication Technology and it
can be defined as the computing and communications facilities and features that support
everyday living. Alternatively, ICT can be defined as the study or business of
developing and using technology to process information and aid communication.
Bear in mind though that there is not a universally accepted definition for ICT. Why?
Because the concepts, methods and applications involved in ICT are constantly evolving
on an almost daily basis.
A good way to think about ICT is to consider all the uses of digital technology that
already exist to help individuals, businesses and organizations use information.
ICT is an umbrella term that covers any product that will store, retrieve, manipulate,
transmit or receive information such as computers, television, telephones and radios.
Thus you can say that ICT is concerned with the storage, retrieval, manipulation,
transmission or receipt of data.
2 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Sources of data
Data comes from multiples sources. The challenge is to capture and use only data that is
relevant and reliable.
Information – is data that has been processed in such a way that it is meaningful to the
person who receives it. Information is therefore defined as a collection of data organized
in such a way that it has additional value beyond the value of the facts themselves.
USES OF INFORMATION
Businesses and other organizations need information for many purposes. The use of
information can be classified into five areas. These are: Planning, Recording,
Controlling, Measuring and Decision making.
E-LEARNING
Electronic learning or E-learning is a general term used to refer to computer-enhanced
learning. E-learning is naturally suited to distance learning and flexible learning, but can
also be used in conjunction (combination) with face-to-face teaching, in which case it is
referred to as blended learning.
The key advantages of E-learning are flexibility, convenience and the ability to work at
any place and at one’s own pace. One common disadvantage is that it removes face-to-
3 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
face interaction with the teacher. Some of the tools used in E-learning include, the
computer, Internet, personal digital assistant (PDA) and many other tools.
The Information Processing Cycle is divided into five stages. These stages include
receiving data, processing data, displaying results as information, storing information
and distribution of information.
CAREERS IN ICT
The following are some careers in ICT: ICT educator, Web designer, Computer
engineer, Internet Café Operator, Programmer or software developer, Database
administrator and Network administrator, Ethical hacker et al.
The abacus was invented more than 500 years ago in Babylon to assist in the numerous
calculations performed by most traders. Much development was not made until early in
the 17th century when Wilhem Schihard designed a “calculating clock” which used a
geared mechanism to multiply numbers. A few years later, Blaise Pascal invented a
gear-driven adding machine in 1642 which he called the Pascaline. In 1801, Joseph-
Marie Jacquard developed a loom in which the pattern to be woven was controlled by
punched card.
These were small cards with several holes in them. The pattern of the holes determined
how the loom performed. The series of cards could be changed without changing the
mechanical design of the loom.
5 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Charles Babbage, the man generally considered as the grandfather of the modern
computer did not actually invent the computer as we know it, but rather, he was the
originator of the basic concepts of digital computing.
In 1822, Babbage presented a plan to the royal Society of Scientists to begin work on
what he called the Difference Engine. Although his work was unfinished, it did not
deter Ada King, Lady Lovelace, from writing programs for it, thereby becoming the
world’s first programmer.
The next milestone in the history of computing was Herman Hollerith’s tabulating
machine which he invented for the United States Census Bureau in 1890. The machine
used punched cards to record census information about each citizen. His machine made
it easy and efficient to collect and sort out data and its success further inspired Hollerith
to start his own company in 1901 to market his machines. The company was called the
Tabulating Machine Company or TMC. Ten years later, it merged with two other
companies and in 1924 changed its name to International Business Machines, or what
people know as, IBM.
In 1927, the brilliant, visionary scientist and engineer, Vannevar Bush, designed a
mechanical analogue calculator called the Product Intergraph.
In 1932, he built a larger calculating machine, called the Differential Analyzer, which
performed calculus operations. Though it was driven by electrical motors, its actual
operation was still mechanical.
Mathematician John Von Neumann was following the development of the computer
and noticed a glaring (clear) omission in its design. It could not store programs or data,
but had to rely on punched cards to hold this information. He came up with the idea of
the “stored program”, the combination of CPU and separate memory storage that are the
basis for the architecture of most modern computers. His concept became known as the
Von Neumann Model.
7 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Third Generation (1964-1971) Integrated Circuits
Eleven years after the invention of the transistor, Jack St. Clair Kilby ushered in the
third generation by inventing the integrated circuit or IC. The development of the
integrated circuit was the hallmark of the third generation of computers. Transistors
were miniaturized (reduced) and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.
The IC vastly increased the power of a single computer and lowered its cost
considerably. The IC promoted a reduction both in the size and cost of computers. Third
generation computers could carry out instructions in portions of a second.
It was also capable of all the computing and logical work of a computer. Thus in the
early seventies, Intel introduced their 4004, 4040, 8008 and 8080 microprocessor that
were to become the basis for the personal computer revolution.
In time, Bill Gates and Paul Allen teamed up to develop software for the computers
that were being designed. Their success led to the formation of the company known to
all as Microsoft. Steve Jobs and his associate Steve Wozniak also decided to build their
own computers without the Intel microprocessor which they found to be too expensive.
DEFINITIONS OF COMPUTERS
1. A computer is an electronic device operating under the control of instructions
store in its memory that can accept data through input, process, output and store
data for future use.
8 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
2. In electronic device for processing information and performing calculations;
follows a program to perform sequences of mathematical and logical operations.
Note: In the first definition when you say “operating under the control of instructions”
that simply tells us that computer is a mere machine that knows nothing of itself or
simply not intelligence. So it cannot take instruction on its own, it follows the
instruction of the end-user operating it through the software.
Broadly there are three (3) main components of the computer system:
1. Hardware: represents the physical and touching components of the computer i.e.,
the component can be seen and touched. Input devices, output devices, CPU,
floppy disk, hard disk etc. are examples of computer hardware.
3. Peopleware: in some publications and research, you may find out that a computer
needs hardware and software for it proper functioning. But a computer that has
both hardware and software still need an end-user to operate it. This is why the
term “peopleware” becomes one of the components. It refers to the end-users that
interact/interface with the computer system. The goal of the fifth (5 th) generation
of computer is to create machine the will respond to natural language input and
capable of self-learning.
TYPE OF COMPUTERS
There are three known types of computers.
• Digital computers
• Analogue computers
• Hybrid computers
Digital computers
A digital computer is defined as a communication or information device that operates in
a binary code.
9 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
These include computers such as a desktop computer, a laptop, a palmtop or a mobile
phone. Digital computers can again be sub-divided into four. These are often referred to
as the kinds of computers. This should not be confused with the types of computers.
Computer types refer to digital, analogue and hybrid computers, but computer kinds or
classes refer to:
• Supercomputers
• Mainframes
• Minicomputers
• Microcomputers
Supercomputers
These are the most powerful type of digital computer. These machines are special,
highcapacity computers used by very large organizations. They are large and can fill
entire rooms.
For example, the National Aeronautics and Space Agency (NASA) of the United
States of America uses supercomputers to track and control space explorations.
Supercomputers are also used for oil exploration and for charting weather forecasts.
Mainframes
These are large computers occupying specially wired and air-conditioned rooms. They
are capable of great processing speeds and data storage.
They are also used by large organizations like banks, universities and government
agencies. They are capable of handling millions of transactions at the same time.
Minicomputers
These are sometimes referred to as mid-range computers. This is because they are
desksized machines which fall between the abilities and size of mainframes and
microcomputers. Minicomputers process data a little slower than mainframes but fast in
their own respects.
Medium sized companies make use of minicomputers and especially for specific
purposes. In recent times, a number of medium sized companies are purchasing these
minicomputers to fulfill the function of servers; which connects and controls the activity
of several microcomputers connected to it.
10 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Microcomputer
These are the most widely used and fastest growing type of computer. They are rather
small in size and therefore take up very little space. Due to their size, they are less
expensive and can be found in homes, schools and a lot of business establishments.
The other desktop computer is usually referred to as a tower because it stands straight
(vertically) on the desk.
2. Portable Computers
Portable computers on the other hand are small enough and light enough to carry
around.
They are all built into one unit and do not need to be assembled whenever they are
moved. There are four known categories of portable computers. They are:
• Laptops
• Notebooks
• Palmtops
• Personal digital assistants (PDAs)
Analogue computers
Analogue computers are communication or information device that operates using
physical quantities received from continuously varying variables. Examples of analogue
computers include: speedometer, thermometer, and hydrometer.
Analogue computers cannot be used for more than one purpose. For this reason,
analogue computers are known as special purpose computers. Think of it can a nurse in
the hospital use her thermometer to measure the heartbeat of a patient.
11 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Hybrid Computers
Hybrid computers are computers that combine both the features of a digital computer
and an analogue computer.
Thus, a hybrid computer has the ability to either represent data in a numerical format
using the binary mode or by representing data as physical quantities using varying
variables.
A good example of a hybrid computer is the automatic teller machine (ATM). The ATM
performs numerical functions such as the verification of bank accounts and balances
coupled with the function of relying on manipulating physical variables in order to
deliver money to the ATM user.
USES/APPLICATIONS OF COMPUTERS
As computers become more and more prevalent, many people find themselves
wondering why they might need a computer in their home or offices.
Others are curious to know just how often they should buy a computer and what tasks
the computer can accomplish for them in their life. In the modern computer world, the
uses of the digital computer are almost as limitless as a person’s imagination.
Producing documents (Word Processing): Typing letters, reports, memo and school
assignments.
Accounting: Accountants and people who deal with figures love to use computers
because it makes their work less tiring and burdensome.
THREATS TO COMPUTERS
To ensure that a computer is always working properly, you must do well to take care of
its physical components as well as the programs that run on the computer. Computer
threats can be put into two categories. These are hardware and software threats.
Hardware threats
Hardware threats are the dangerous or harmful things that can damage the physical
components of the computer or even the entire computer for that matter. They include:
electrical faults, dust or water, rat and theft.
Software threats
Software threat can be describe as the dangerous or harmful things that can damage the
components of the computer that cannot be seen or the computer itself.
The following are software threats: viruses, spyware, spam, worms, Trojans, adware,
human errors and phishing.
Viruses
Computer virus is defined as hidden instructions that are buried within another set of
instructions and move between computers often to cause damage. They are created by
people (programmers).
13 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Worms
This virus fills a computer system with information that makes duplicates of itself all the
time. This fill up the space on the computer and in the process make it extremely slow.
Eventually if nothing is done to remove the worm, it stops the computer from working.
Spyware
This send information about you and your computer to somebody else. Spyware may
transmit personal information to people who would then end up using this information
to steal from you.
Trojans
This is an apparently legitimate computer program that is really intended to disrupt and
damage computer activity. These usually attempt to hijack the computer and influence
their operation.
Spam
This is usually unsolicited Internet mail often promoting products of a dubious financial
or sexual nature. These mails can be rather annoying and morally debasing (shameful)
and can seriously irritate computer users.
Adware
This puts advertisements on your screen. This takes many forms including pop-ups of
messages on your computer advertising any type of product. The annoying thing about
adware is the way they break the concentration of the computer user.
Phishing
Phishing is pronounced “fishing” has no resemblance to fish, but how they are caught.
Phishing works by collecting very personal information about you, like your bank
account number and pin codes to your credit card.
This is usually done by sending you electronic mail claiming to come from reliable
sources such as a bank, insurance company. Often wanting you to verify your account
details, they can look very realistic but are generally scams to harvest user names and
passwords.
Human errors
As humans, mistakes are unavoidable and the fact that you are using a computer does
not guarantee perfection. Some of these mistakes could be as deadly as deleting
important instructions that the computer needs to operate or less deadly errors like
14 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
entering data wrongly. One thing about the computer is that it only works with what it is
given. Wrong data results in wrong information. ICT professionals often refer to this
condition as GIGO; garbage in, garbage out.
1. HARDWARE
Hardware refers to the physical components of the computer system. This means that
hardware is the part of the computer that you can see and touch. Examples of hardware
are keyboard, monitor, etc.
Microcomputer hardware falls into four categories. These are: Input devices, the system
unit, Storage devices and Output devices. Computer hardware is often made by
computer engineers. There are many computer hardware manufacturers in the world.
Input Devices
Input devices let users enter commands or data into the computer. Input devices translate
data and commands that humans can understand into a form that the computer can
process. Examples of input devices are mouse, keyboard, image scanner, etc.
Keyboard
The keyboard is one of the primary ways we communicate with the computer and enter
data. There are many different types of computer keyboards such as wired, wireless,
multimedia, and more. Although there may be differences in the location of some keys
or features, keyboards are very similar and allow you to accomplish basically the same
tasks.
15 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Mouse
The mouse is a peripheral that is known as a pointing device. It lets
you point to objects on the screen, click on them, and move them.
There are two main types of mice: optical and mechanical. The
optical mouse uses an electronic eye to detect movement and is
easier to clean. The mechanical mouse uses a rolling ball to detect
movement. Generally, a mechanical mouse is cheaper, although it
may require regular cleaning to keep it working properly.
Traditionally, a mouse connects to the computer using a USB or PS/2 connection.
However, you can also buy a wireless mouse, which can reduce clutter on your desktop.
Output Devices
Output devices translate information processed by the computer into a form that humans
can understand. Examples of output devices are monitor, printer and plotters. The two
main kinds of output are soft copy and hard copy.
Soft copy refers to data that is shown on a display screen or is in audio or voice form.
This form of output is not tangible; it cannot be touched or held.
Hard copy refers to printed output. The principal examples are print outs, whether text
or graphic from printers.
Monitor
The monitor is an output device that allows you to see how the
computer reacts to the information you provides it.
There are basically two types of monitors:
16 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Flat panel
Compared to CRT’s, flat panel displays are much thinner, weight less and consume less
power. Flat Panel displays are made up of two plates of glass with a substance in
between them, which is activated in different ways.
Printer
A printer is an output device that prints characters, symbols and perhaps graphics on
paper or other hard copy mediums. Printers can be divided into two categories: Impact
printers and Non-impact printers.
Plotters
A plotter is a specialized output device designed to produce high quality graphics in a
variety of colors. Plotters are usually used for creating maps and architectural drawings.
Projectors
Projectors are output devices that extend the functionality of the computer monitor.
Projectors are mainly used for presentations at public gatherings.
Peripheral devices
Computer peripherals are any electronic devices that can be attached to a computer other
than the standard input-output devices (monitor, keyboard and mouse). Examples of
peripherals are printer and scanner. Note: peripheral devices have an effect on the
operation of the computer.
Ancillary devices
An ancillary device is a device connected to the computer system but does not directly
affect the operation of the computer. Examples are UPS (interrupts power supply), glare
shield (used to protect the vision of the computer user), etc.
System unit or Computer cases come in different shapes and sizes. A desktop case lies
flat on a desk, and the monitor usually sits on top of it.
A tower system unit or case is tall and sits next to the monitor or on the floor. The
front of the case usually has an on/off switch and one or more optical drives.
The system unit contains the following: Power supply, Motherboard, Specialized
processor chips, Expansion slots and boards, RAM chips, ROM chips, CPU chip and
Ports.
Regardless of the type of system unit, it is the CPU that determines the computing
power of the computer.
It is sometimes called the brain of the computer, and its job is to carry out commands.
Whenever you press a key, click the mouse, or start an application, you're sending
instructions to the CPU (Central Processing Unit).
The CPU is generally a 2-inch ironstone square with a silicon chip located inside. The
chip is usually about the size of a thumbnail. The CPU fits into the motherboard's CPU
socket, which is covered by the heat sink, an object that absorbs heat from the CPU.
Motherboard
The motherboard or system board is the main circuit
board in the system unit. The motherboard consists of
a flat board that fills the bottom of the system unit.
This board contains the “brain” of the computer, the
CPU or microprocessor; electronic memory (RAM)
that assists the CPU; and some sockets, called
expansion slots, where additional circuit boards,
called expansion boards may be plugged in.
Power supply
The electricity available from a standard wall socket
is alternating current (AC) but a microcomputer runs
on direct current (DC). The power supply is a device
that converts AC to DC to run the computer.
MEMORY
There are two principal and well known types of memory used for storage. They are
ROM (Read Only Memory) and RAM (Random Access Memory).
19 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
RAM
RAM stands for random access memory, is a memory that
temporarily holds data and instructions that will be needed
shortly by the CPU or the CPU is processing at any given time.
RAM chips are often mounted on a small circuit board such as a SIMM (Single Inline
Memory Module) or DIMM (Dual Inline Memory Module) which is plugged into the
motherboard.
RAM (Radom Access Memory) is referred to as temporary or volatile storage because
as soon as the computer is turned off, everything in RAM is lost.
ROM
ROM which stands for Read Only Memory contains programs that are built in at the
factory. Unlike RAM, ROM cannot be written on or erased by the computer user
without special equipment. The materials usually found in ROM are special instructions
for basic computer operations such as those that start the computer or put characters on
the screen. Unlike RAM, ROM retains its contents even when the computer is turned
off, thus it is referred to as being nonvolatile.
These are sometimes called PCI (Peripheral Component Interconnect) cards. You
may never have to add any PCI cards, as most motherboards have built-in video, sound,
network, and other capabilities. However, if you want to boost the performance of your
computer or update the capabilities of an older computer, you can always add one or
more cards.
Sound-card
The sound card, also called an audio card, is responsible for what you hear in the
speakers or headphones.
Most motherboards have integrated sound, but you can upgrade to a dedicated sound
card for higher quality sound.
Network-card
The network card allows your computer to communicate over a network and access the
internet. It can either connect with an Ethernet cable or through a wireless connection
(often called Wi-Fi). Many motherboards have built-in network connections, and a
network card can also be added to an expansion slot.
Bluetooth-card
Bluetooth is a technology for wireless communication over short distances. It's
often used in computers to communicate with wireless keyboards, mice, and
printers. It's often built into the motherboard or included in a wireless
network card. For computers that don't have Bluetooth, a USB adapter (called
a dongle) can be purchased.
Power-Cord
The power cord is the link between the power outlet and the power
supply unit in the computer casing. If the power cord is not
plugged in, the computer will not power on. To protect your
computer from voltage spikes, you can plug the power cord into a
surge protector. You can also use an Uninterruptable Power
Supply (UPS), which acts as a surge protector and also provides
temporary power if there is a blackout.
STORAGE DEVICES
Storage devices are devices that provide computers with the capacity to save or keep
information for long periods until they are needed again. Storage devices include, pen
drives, compact disks, zip disks, hard drive, memory stick or card and floppy disks.
21 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Hard disk
The hard disk is the main permanent storage device inside the system
unit. Hard disks are rigid metal platters that hold data as magnetized
spots.
Bit: A bit is the smallest unit of data in computer processing. In the binary system, each
0 or 1 is called a bit, which is short for binary digit.
Byte: A byte is a group of eight bits. Byte is used to represent letters, numbers, or
special characters (such as! or *), bits are combined into groups.
And a byte represents one character, digit or other value. The capacity of a computer’s
memory or a diskette is expressed in numbers of bytes or multiples such as kilobytes
and megabytes.
Kilobyte: a kilobyte (K or KB) is about 1000 bytes. The kilobyte was a common unit of
measure for memory or secondary storage capacity on older computers.
Megabyte: a megabyte (M or MB) is about 1 million bytes. Measures of microcomputer
primary storage capacity today are expressed in megabytes.
Gigabyte: a gigabyte (G or GB) is about 1 billion bytes. This measure was formerly
used mainly with “big iron” types of computers, but now it is typical of secondary
storage capacity of today’s microcomputers.
Terabyte: A terabyte (T or TB) represents 1 trillion bytes.
SOFTWARE
Software is also known as programs. Programs are the instructions that tell the computer
how to perform a task in order to process data into information. In most cases, the words
software and programs are used interchangeably. There are two major kinds of software;
these are application software and system software.
22 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
A. System software
As the user, you interact mostly with the applications software and let the applications
software interact with the system software. System software controls the allocation and
usage of hardware resources and enables the applications software to run.
System software consists of several programs, the most important is the Operating
System. The OS is a large program made up of many smaller programs that control how
the CPU (Central Processing Unit) communicates with other hardware components.
The Operating System manages the basic operations of the computer. These operations
include booting the computer and management of storage media.
It also manages the computer’s resources and files. It also makes computers easier to
operate by people who do not understand programming languages. In other words,
Operating Systems make computers user friendly.
The operations of the Operating System can be classified into six groups. These are:
Booting, Managing storage media, User interface, managing computer resources,
managing files and managing tasks. The user interface is defined as the user controllable
part of the Operating System that allows you to communicate or interact with it.
There are four types of user interfaces, these are: Command driven interface, Menu
driven interface, Graphical user interface (GUI) and Network user interface (NUI)
Command driven Interface
A command driven interface requires you to enter a command by trying in codes or
words.
Menu driven interface
A menu driven interface allows you to use cursor movement (arrow) keys to choose a
command from a menu.
Graphical user interface (GUI)
The easiest interface to use, the graphical user interface or GUI allows you to use
graphics (images) and menus as well as keystrokes to choose commands, start programs,
and see lists of files and other options.
23 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
B. Application software
Application software is normally designed to solve a particular problem, to perform
useful work on specific tasks, or to provide entertainment. Because it aimed at the
computer user or liveware, it is often described as “end user” software.
Application software may be packaged or custom made just like how clothes are made.
You may either buy them from a store all ready, made up with standard measurements,
or you might ask a tailor to make one for you, using your measurements.
Custom made software or simply, custom software is software designed and developed
for a particular customer. This is the kind of software that you would hire a computer
programmer to develop for you. Such software would perform a task that could not be
readily done with standard off-the-shelf packaged software. Custom software is
normally designed to compute payroll, keep track of goods in company warehouses or
calculate sales commissions.
Package software or a software package on the other hand is the kind of software
developed for sale to the general public.
There are different Operating Systems available for PCs, but the most common is
Windows, developed by Microsoft. Operating Systems are constantly being improved or
upgraded as technology advances.
When a company thinks that their Operating System requires more functionality other
than the one already on the markets, they release their new version for sale.
The choice of OS may be dependent on the hardware architecture, specifically the CPU.
Some Operating Systems cannot run on certain computers whereas others are designed
to run on any type of computer.
Some of the popular Operating Systems in the field of computing include: DOS (Disk
Operating System), Microsoft Windows ( versions of Microsoft Windows: Windows,
Windows 95, Windows 98, Windows 2000, Windows ME, Windows XP, Windows
Vista, Windows 7, Windows 8, Windows 10, etc), Macintosh Operating System and
Linux
24 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Remember that the advantages and disadvantages of microcomputer Operating Systems
are associated with microprocessors for which they were originally designed.
Inside the open source framework, there are a number of categories in which software
developers can operate. These include: Public domain software, Freeware and
Shareware.
Freeware
Freeware is software that is available free of charge.
Shareware
Shareware is copyrighted software that is distributed free of charge but requires users to
make a contribution in order to continue using it.
Proprietary Software
Proprietary software is software whose rights are owned by an individual or business,
usually a software developer. The ownership is protected by the copyright and the
owner expects you to buy a copy in order to use it.
25 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
TYPES AND USES OF APPLICATION SOFTWARE
As we have already learnt, application software is a software that has been developed to
solve a particular problem, to perform useful work on specific tasks, or to provide
entertainment.
For the purposes of this study, we shall classify application software as, word processor,
database software, spreadsheet software, presentation software, educational software,
Internet browsers, authorizing software, graphics software and desktop publishing
software.
Word Processor Software
Word processing software is used to create, edit, save and print documents. Documents
can be any kind of text material. Examples of documents are letters, memos, reports,
term papers and contracts. Examples of popular word processing packages include
Word Pro, Microsoft Word and WordPerfect.
Database software
A database is a collection of related data that has been entered into a computer system
and stored for future use.
Educational Software
Educational Software is used for learning purpose. Although the computer alone won’t
boost academic performance, they can have a positive effect on student achievement in
all major subject areas. Students’ skills are known to improve when students use
programs that are self-paced or contain interactive video.
Thus, in recent times, there has been a spread of educational software, library search and
reference software. Some educational software includes Mavis Beacon, Microsoft
Encarta, etc.
Spreadsheet software
The spreadsheet software is used by financial analysts, accountants, contractors and
others concerned with manipulating numeric data.
26 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
The spreadsheet is based on the traditional accounting worksheet. Paper worksheets
have long been used by accountants and managers to work up balance sheets, sales
projections and expense budgets. Popular spreadsheet packages include Excel, Lotus 1-
2-3 and Quattro Pro.
Presentation Software
Presentation software is a computer software package used to show information,
normally in the form of a slide show. Popular presentation software are Freelance
Graphics, Harvard Graphics, Adobe Persuasion and Microsoft Powerpoint.
Browsers
Browsers are software that enables you to browse through and view websites on the
internet. Some common browsers includes: Google Chrome, Opera, Internet Explorer,
Netscape and Mozilla Firefox.
Authoring Software
Authoring software are special programs used to create multimedia presentations. They
bring together all the video, audio, graphics and text elements into an interactive
framework. Authoring programs are usually used for creating Internet pages.
Some of the common authoring software includes Dreamweaver and FrontPage. You
need some special training in order to master the use of these programs.
Graphic Software
These are software that give users the freedom and flexibility of creating and
manipulating text and objects. Graphics are often used in the design of single paged
items such as book covers, billboard, newsletters and flyers. Examples of graphic
software includes: CorelDraw, Freehand and Adobe Illustrator.
Just like graphics software, they allow the user to manipulate text and objects, but these
go beyond that in allowing the user to create large volumes of pages which make up a
book. Desktop publishing software can create indexes and tables of content
automatically. They give a visual representation of how the final book would look like.
27 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
BOOTING, REBOOTING AND SHUTTING DOWN
Although it might sound as simple as that, you must understand that there are
procedures to follow in order to turn on the computer properly and there are also
procedures to follow if you want to turn off the computer.
Learning how to boot, reboot and shut down the computer will prolong the life of the
computer and secure your data from being corrupted or damaged.
There are three methods involved in rebooting a computer. These are: using the reboot
tab, using the CTRL, ALT and DEL buttons, and using the reset button.
MOUSE SKILLS
Knowing how to use the mouse would greatly enhance your ability to issue computer
commands and use the graphical interface of most Operating Systems. Just as you
would use your hands to interact with objects in the physical world, you can use your
mouse to interact with items on your computer screen.
You can move objects, open them, change them, throw them away, and perform other
actions, all by pointing and clicking with your mouse.
Mouse pointers
When you move the mouse with your hand, a pointer on your screen moves in the same
direction. (The pointer's appearance might change depending on where it's positioned on
your screen.).
28 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
Holding and moving the mouse
Place your mouse beside your keyboard on a clean, smooth surface, such as a mouse
pad. Hold the mouse gently, with your index finger resting on the primary button and
your thumb resting on the side. To move the mouse, slide it slowly in any direction.
Don't twist it—keep the front of the mouse aimed away from you.
As you move the mouse, a pointer (see picture) on your screen moves in the same
direction. If you run out of room to move your mouse on your desk or mouse pad, just
pick up the mouse and bring it back closer to you.
MOUSE ACTIONS
Pointing
Pointing to an item on the screen means moving your mouse so the pointer appears to be
touching the item. When you point to something, a small box often appears that
describes the item. For example, when you point to the Recycle Bin on the desktop, a
box appears with this information: "Contains the files and folders that you have deleted.
“
The pointer can change depending on what you're pointing to. For example, when you
point to a link in your web browser, the pointer changes from an arrow to a hand with a
pointing finger. Most mouse actions combine pointing with pressing one of the mouse
buttons. There are four basic ways to use your mouse buttons: clicking, double-clicking,
right-clicking, and dragging.
Clicking (single-clicking)
To click an item, point to the item on the screen, and then press and release the primary
button (usually the left button). Clicking is most often used to select (mark) an item or
open a menu. This is sometimes called single-clicking or left-clicking.
Double-clicking
To double-click an item, point to the item on the screen, and then click the left mouse
button twice quickly. If the two clicks are spaced too far apart, they might be interpreted
as two individual clicks rather than as one double-click. Double-clicking is most often
used to open items on your desktop. For example, you can start a program or open a
folder by double-clicking its icon on the desktop.
Right-clicking
To right-click an item, point to the item on the screen, and then press and release the
secondary button (usually the right button). Right-clicking an item usually displays a list
of things you can do with the item.
29 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998
CSED 101 INTRODUCTION TO COMPUTERS/ICT
For example, when you right-click the Recycle Bin on your desktop, Windows displays
a menu allowing you to open it, empty it, delete it, or see its properties. If you're ever
unsure of what to do with something, right-click it.
Dragging
You can move items around your screen by dragging them. To drag an object, point
to the object on the screen, press and hold the primary button, move the object to a
new location, and then release the primary button.
Dragging (sometimes called dragging and dropping) is most often used to move files
and folders to a different location and to move windows and icons around on your
screen.
30 | P a g e Edited & Complied By: Jerry K. Gbaye, Jr Contact: +231770 210 310/+231888 827 998