Computer Form 1 Final
Computer Form 1 Final
COMPUTER STUDIES
Form 1 notes.
CALL/WHATSAPP : 265998019039
EMAIL: [email protected]
INTRODUCTION TO COMPUTERS
(a) Definition of a computer
A computer is an electronic device that operates (works) under the control of programs
stored in its own memory unit
An electronic device that accepts data, as input and transforms it under the influence of
a set of special instructions called programs, to produce the desired output (referred to
as information).
(b) Why a computer is referred to as an electronic device
It uses electrical signals to process data
It is made up of electronic components and uses electric energy to operate
Definition of terms
Data
collection of raw facts, figures or instructions that do not have much meaning to the
user
Program
computer program is a set of related instructions which specify how data is to be
processed
A set of instructions used to guide a computer through a process
Data processing
It is the process of collecting all terms of data together & converting them into
information
Information
Data which has been refined summarized & manipulated in the way you want it, or into
a more meaningful form for decision- making
(a) Read - To transfer data from an input device to the computer, e.g. the computer
reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output
Device e.g. the computer writes output on a printer or onto a disk.
- To move or copy data from the main storage to a backing storage
Page 2 of 78
Modem
Scanner
Speakers
Graph plotters
Computer generations
Page 3 of 78
Computers have evolved through a number of generations.
Characteristics of the first generation of computers.
Classification of computer according to historical development
(generations)
First generation computers
Used vacuum tubes in their memory
Large in physical size
consumed a lot of power
Produced a lot of heat
The computers constantly broke down due to the excessive heat generated; hence were
short- lived and were not very reliable
Their internal memory capacity/ size was low
Slow in processing data
Very costly
Used magnetic drum memories
Cards were sued to enter data into the computers
Page 4 of 78
Slightly smaller in size than 1st & 2nd generation computers
They used a wide range of peripheral devices
Could support remote communication facilities/ more than one user at the same time
Magnetic disks were introduced for storage purposes
Classification of computers
Computers are classified according to :
Physical size & processing power
Power
Page 5 of 78
Functionality (mode/ method of operation)
Type of processor (CPU)
Computers can be classified into four main groups namely supercomputers, mainframe
computers, minicomputers and microcomputers.
Supercomputers
They are the fastest, largest, most expensive and powerful computers available. They are able to
perform many complex calculations in a fraction of a second. Because of their extreme weight,
a supercomputer is kept in a special room. Due to their huge processing power supercomputers
generate a lot of heat. Special cooling systems are therefore required. Sometimes the whole CPU
is immersed in an aquarium like tank containing liquid fluorocarbon to provide cooling.
Supercomputers are mainly used for scientific research, which requires enormous calculations.
Applications that justify use of supercomputers include aerodynamic design and simulation,
petroleum research, defense and weapon analysis among others. Supercomputers are mainly
found in developed countries such as in USA where they are used for advanced
Scientific research such as nuclear physics. Figure 1.3 shows an example of supercomputer.
Mainframe computers
They are less powerful and less expensive than the supercomputers. While supercomputers may
be described as giant computers, the mainframes are said to be big in size. They are used for
processing data and performing complex mathematical calculations. They have a large storage
capacity and can support a variety of peripherals.
Mainframe computers handle all kinds of problems whether scientific or commercial. They are
mostly found in government agencies, big organizations and companies such as banks, hospitals,
airports etc. which Have large information processing needs. Figure 1.4 shows a picture of a
mainframe computer.
Page 6 of 78
PC (Personal Computer)
A PC can be defined as a small, relatively inexpensive computer designed for an individual
user. PCs are based on the microprocessor technology that enables manufacturers to put an
entire CPU on one chip. Businesses use personal computers for word processing, accounting,
desktop publishing, and for running spreadsheet and database management applications. At
home, the most popular use for personal computers is playing games and surfing the Internet.
Although personal computers are designed as single-user systems, these systems are normally
linked together to form a network. In terms of power, now-a-days high-end models of the
Macintosh and PC offer the same computing power and graphics capability as low-end
workstations by Sun Microsystems, Hewlett-Packard, and Dell.
Workstation
Workstation is a computer used for engineering applications (CAD/CAM), desktop
publishing, software development, and other such types of applications which require a
moderate amount of computing power and relatively high quality graphics capabilities.
Workstations generally come with a large, high-resolution graphics screen, large amount of
RAM, inbuilt network support, and a graphical user interface. Most workstations also have
mass storage device such as a disk drive, but a special type of workstation, called diskless
workstation, comes without a disk drive.
Common operating systems for workstations are UNIX and Windows NT. Like PC,
workstations are also single-user computers like PC but are typically linked together to form a
local-area network, although they can also be used as stand-alone systems.
Minicomputers
A minicomputer resembles the mainframe but is slightly smaller. Thus it is referred to as a small-
scale mainframe computer. Although it supports fewer peripheral devices and is not as powerful
and fast as the mainframe computer, it was developed as a cheaper alternative to the mainframes
for smaller organizations. They are used mainly in scientific laboratories, research institutions,
engineering plants and places where processing automation is required. They are well adapted
for functions such as accounting, word processing, database management and specific industry
applications. Figure 1.5 shows a picture of a minicomputer.
Microcomputer
A microcomputer is the smallest, cheapest and relatively least powerful type of computer. It is
called a microcomputer because; its CPU is called a microprocessor, which is very small
Page 7 of 78
compared to that of a mini, mainframe or supercomputers. Microcomputers are also called
personal computers (PC) because they are designed to be used by one person at a time.
Microcomputers are commonly used in training and learning institutions, small business
enterprises, and communication centers among others. Today, the power of microcomputers has
grown tremendously closing the gap that formerly existed and reserved for the minicomputers
and the mainframes.
Technological advancement has seen the development of smaller and smaller microcomputers.
The following are the various types of microcomputers in operation today arranged in descending
order according to size.
-Portable like a briefcase. It is designed to be used by placing it on the lap hence its name.
- Small enough to fit in the pocket and can he held in the palm when being used.
Computers can be classified according to the tasks they perform either as general or special
purpose computers.
General-purpose computers
General-purpose computers have been designed to be able to perform a variety of tasks when
loaded with appropriate programs. They are the most common types of computers in use today.
Their flexibility enables them to be applied in a wide range of applications like document
processing, performing calculations, accounting, data and information management among
others.
Page 8 of 78
Special purpose computers
Special purpose computers are designed to serve a specific purpose or to accomplish one
particular task. Such computers can perform no other task except the one they were meant to do.
This means that the set of instructions, which drive a special purpose computer, are limited in
number at the time of manufacture. Examples of such computers include, robots used in a
manufacturing industry production line, mobile phones for communication only and electronic
calculators that carry out calculations only.
Since special purpose computers are dedicated to a single task, they can perform the task quickly
and very efficiently.
Computers can be classified according to the type of data they can process. Data can either be in
discrete or continuous form. Discrete data which is also called digital data is one that can be
represented as distinct values that do not have any transitional stages over time e.g. either 1 or
O. Continuous data which is also called analog data can be represented as progressively
changing values overtime. Computers can be classified as digital, analog or hybrid.
Digital computers
Digital computers process digital data only. Any data to be manipulated by a digital computer
must first be converted to digital form. Most home appliances today are also digital in nature.
For example to increase the volume of a digital television you simply press a button and it
changes from 1 to 2, 3 If the same television is analog, it would have a knob
that you can continuously turn round or slide in a slot to increase or decrease the volume.
Analog computers
This refers to computers that process data that is analog in nature. Analog computers solve
problems by measuring the amount of change that occurs in quantities like speed, temperature
and pressure. An analog machine is usually a special purpose device that is dedicated to a single
task. Analog computers are used in manufacturing process control like monitoring and regulating
Page 9 of 78
furnace, temperatures, and pressures. They are also used in other applications like in weather
stations to record and process physical quantities e.g. wind, cloud speed, temperature etc.
Hybrid computers
Hybrid computers are designed to process both analog and digital data.
4 By Use
These are also known as Microcomputers. They get their name from the fact that
they fit nicely on the desktop. They can also be used on the desk in the office
environment or for personal use at home.
These computers are those designed to be used at home. An individual may install
only games program in it or a word processor to enable them write letters, still
some would install accounting packages to enable th em budget and control their
finances at home.
These computers get their name from the fact that you can place them on your laps
while using. They are very small computers that have the structure of a briefcase
i.e. you open and close the same way.
These have a keyboard attached to them and a flat screen together with a mouse
ball and chargeable batteries. This means that you can use them in the rural areas
where the is no electricity.
Laptop computers also have ports (small slots) th rough which you can attach an
external keyboard, mouse or external drive like drive A:.
Page 10 of 78
(b) Why smaller computers like Laptops tend to be more expensive than Desktop
computers
The technology of producing smaller devices is expensive
They are convenient because they are portable
They have advanced power management capabilities (they consume less power since a
laptop can operate on rechargeable batteries
Page 11 of 78
Defense and weapon analysis
Aerodynamic design and simulation
Page 12 of 78
Hospitals
Airports (i.e., in Airline reservation systems for booking & storing flight
information) - Communication networks as servers
(c) Minicomputer
Scientific laboratories & research institutions
Engineering plants for controlling chemical or mechanical processes
Space industry
Insurance companies & banks for accounting purposes
Communication centers as servers
Page 13 of 78
Cost of the computer
Speed of output devices
Number of users who can access the computers at the same time
Page 14 of 78
For calculating & keeping home budgets
4. Industries
To monitor and control industries processes through the use of robots
For management control, i.e. to keep track of elders, bills and transactions
For advertisement purposes, which enable an industry to attack more customers
5. Police stations
Matching, analyzing & keeping databases of fingerprints
For taking photographs & other identification details
For record keeping
For face recognition, scene monitoring & analysis which help the police
carry out criminal investigations speedily
6. Transport industry
Airports; to control the movement of aircrafts, their take off & landing using radar
equipment
For making reservations (booking purposes)
Storing flight information
Automobile traffic control; to monitor vehicle traffic in busy towns
In Railways corporations; to coordinate the movement of goods & wagons
In shipping control, for efficient management of fleets, cargo handling &
communication
7. Offices
For receiving & sending of information through e- mails, fax, etc
Production of documents
Keeping of records
Page 15 of 78
Improves data security and privacy
Page 16 of 78
PERSONAL COMPUTER MANAGEMENT AND
MAINTAINANCE
(a) Define the term „ computer laboratory‟
A computer laboratory is a room that has been specially prepared to facilitate
installation of computers, and provide a safe conducive environment for teaching
& learning of Computer studies.
Factors to be considered when preparing a computer laboratory
Security of computers
Reliability of the source of power
Number of computers to be installed and the amount of space available - The
maximum number of users that the laboratory can accommodate
Page 17 of 78
Should be kept in well ventilated rooms with optimum (medium) humidity
Why must foods and beverages be kept out of the computer room?
Food particles may fall into the moving parts of the computer and damage them.
Liquids may spill into the computer parts causing rusting or electrical faults
Page 18 of 78
Allows the user to save his/ her work, and switch off the system using the correct
procedure
Causes of strain- in the computer room
Poor lighting of the room
Bright monitors
Flickering monitors
Very bright wall paints reflect too much light
Proper sitting postures while using the computer
Adopt relaxed and straight back position to avoid bending forward or learning far
backwards
The feet should be firmly placed flat on the floor
The seat must be high enough allowing the eyes to be the same level with the top
of the Screen .
The seat must have a straight backrest that allows someone to sit upright. This
prevents muscle pains & backaches caused by poor sitting posture
The height of the chair or working surface must be high enough such that your
forearms are parallel with the floor and your wrists are straight.
The seat must be high enough relative to the table to enable the user use the hands
on the peripheral devices comfortably.
Page 19 of 78
Ensure that all electrical wires are properly insulated
Ensure that the computer room has a gaseous fire extinguisher containing carbon
dioxide in case of any accidents
Smoking
A Computer Virus
A computer virus is a computer program that can spread across computers and
networks by making copies of itself, usually without the user‘s knowledge.
First, viruses are notable for the ability to replicate itself to infect computer. By
replicating itself it is able to spread across computer systems and networks to infect as
much as it possibly can.
Second, before the virus can do anything, it must be executed. If it cannot be
executed, it is harmless. To get itself to replicate it hitches a ride by attaching itself to an
executable program. It has to modify the program involved to also execute the virus code.
The virus is usually attached to a common executable such as the operating system, which
is automatically executed on startup. It may also attach itself to a commonly executed file
that a specific company may use.
Third, viruses do not just contain self-replicating code; they also contain what is
called a payload. The payload is similar to a warhead on a missile; it is the side-effect of
the virus. The payload has the potential to be malicious, but it does not have to be.
Lastly, the virus must be able to disguise itself before it is noticed by its side-effects.
There are two methods of disguise, encryption and interrupt interception.
Page 20 of 78
Creation Replication Activation Discovery Assimilation Eradication
Identity Theft - Malware can be created in order to collect personal information off of a
person‘s computer. This information can include bank accounts, social security numbers,
passwords or even birthdates. With this information people can open other bank accounts,
get hold of your money or even open up loans.
Data Corruption - Malware can also be created with the soul purpose of trying to corrupt
the data on your computer. Malware that is sent out with the purpose to damage existing data
can come from anywhere on the Internet or even from an email attachment. These types of
malware usually come in the form of viruses which can either damage parts of the hard drive
or replicate themselves so much that it causes the system to completely crash.
The motives of most virus writers remain unknown. There are however some motives that
can be identified by examining virus samples or talking to known or anonymous virus
authors.
Page 21 of 78
Challenge and curiosity. There are no courses or good books about how to write viruses.
Many programmers want to see if they can do it, and do not necessarily realize that the
virus may cause significant damage.
Fame and power. Even if the author remains anonymous, it probably gives a kick to read
about the virus in headlines. The virus, and possibly the damage it has caused makes other
people work and react in some way.
Protest and anarchy. A virus is quite a powerful way to cause intentional damage. There
have been cases where a virus is intended to harm a school’s network.
Proof of concept. Someone may for example want to prove that a certain replication
technique works. This type of virus may also appear on new platforms or applications
capable of hosting viruses.
Political motives. A virus may be used to spread a political message. This may, for
example, be protests against totalitarian
Classification of viruses
. The viruses are classified in to four main categories which are as follow;
A boot sector virus infects the boot sector of floppy disks or hard drives. These blocks
contain a small computer program that participates in starting the computer. A virus can
infect the system by replacing or attaching itself to these blocks.
These viruses replicate very slowly because they can only travel from one computer to
another on a diskette. In addition, a boot attempt must be made on the target computer
using the infected diskette before the virus can infect it. The virus may, however, reside
on the diskette and infect new computers even if there is no operating system on it.
A traditional file virus can spread when program files are transmitted or shared, regardless of the
used media .
Page 22 of 78
Document or macro viruses
Document or macro viruses are written in a macro language. Such languages are usually
included in advanced applications such as word processing and spreadsheet programs. The vast
majority of known macro viruses replicate using the MS Office program suite, mainly MS Word
and MS Excel, but some viruses targeting other applications are known as well.
Trojan horses
The name Trojan horse is borrowed from Greek mythology. In the computer world the term
refers to a program that contains hidden malicious functions. The program may look like
something funny or useful such as a game or utility, but harms the system when executed. Many
Trojans contain activation criteria that enable the Trojan to work for a while. The user is
convinced that the program is safe and useful, and forwards it to other users before the malicious
code strikes.
Trojans lack a replication routine and thus are not viruses by definition. A Trojan is spread to
other computers only through deliberate transfer by the users.
1. Compatibility problems
Individuals make viruses and worms and they do not have resources to test their
creations on a wide range of computer systems. Nor do they develop the viruses
according to quality control systems and guidelines. This makes it likely that they
cause compatibility problems when run on systems that differ from the one on which
they were developed. These problems can occur as error messages, crashes, inability
to access certain functions etc.
Page 23 of 78
system now and then. The backup routine stores partially corrupted data until the
virus is detected. Restoring the data is hard or impossible as several generations of
backups are compromised. The last correct backups may be too old and it may even
be hard to tell which backups are or are not valid.
Viruses may plant backdoors in the system, or steal passwords. These functions can
later be used by hackers to access the system. Damage caused by such hacking
activities is hard to predict. Unauthorized usage of the system may, for example,
continue unnoticed for a long time.
Viruses and worms have access to the same communication methods as the user, and
even use them to replicate. A payload routine may easily locate documents that
match certain criteria and send them to anyone on the Internet. Some email worms
also cause disclosure of data as a part of replication. The worms that replicate when
attached to a document, such as Melissa, send this document to recipients to whom
the user had no intention of sending the document.
Viruses and worms can disturb computer systems by spending resources, either
intentionally or unintentionally. Some viruses contain payloads that deliberately eat
system resources
Cleaning virus infections means extra work for the IT support staff. This damage,
and the downtime for the user, may result in great expense unless the viruses are
stopped properly using anti-virus software.
Even if viruses are successfully stopped using anti-virus software, the cost of maintaining
this system may be seen as a cost caused by viruses.
Page 24 of 78
Software are available in the market today that help to disinfect diskettes
(disks) and of course the main memory from the virus infection.
Such software is often easy to use once installed. Examples of such software
include: Norton Anti- virus, Dr. Solomon Anti-virus Tool Kit, F-Prot
Professional etc.
Such software will scan and ask the user to "repair" hard disks and floppies
as well as the boot sector from viruses.
To guard a computer against virus attack, special programs called antivirus software such
as Norton Antivirus, PC-cillin or McAfee should be installed on the computer. These
programs can check your system for thousands of known viruses and eradicate them. To
scan for viruses the following is done:
3. From the shortcut menu displayed, select the name of the anti-virus program e.g. Scan
with Norton Antivirus.
COMPUTER SYSTEMS
(i) System
A collection of independent entities that collectively work together to achieve a desired
goal
Page 25 of 78
(ii) Computer system
A collection of entities that work together to process and manage information using
computers
A collection of hardware software and live- ware all working together in data inputting,
processing and production of required output from a computer
Difference between a computer and a computer system
A computer is made up of both hardware and software, while a computer system
integrates hardware, software and user
Hardware
They are the physical & tangible devices that make up a computer systems, e.g system
unit, input devices, output devices and storage devices
Software
These are programs & data used in a computer system that enable it perform a number of
specific functions, e.g. operating systems, application programs, utility programs,
programming languages & devices
computer hardware
Page 26 of 78
Functions performed by the CPU
It carries out processing of data
System control- it controls the sequence of operations within the computer
It gives commands to all parts of the computer
It controls the use of the Main Memory in storing of data & instructions
Storage of data- It provides temporary storage (RAM) & permanent storage
(ROM)
1. Control Unit
Interpreting instructions
Issuing control instructions to the operating system
Page 27 of 78
Performs arithmetic calculations such as addition, or multiplication of figures
Performs logical operations & comparison on data
Performs output of logical functions (variables)
3. Registers
Holds data and instructions temporarily just before and after processing
Logic operations
Logic operation is the ability to compare two quantities or numbers to determine which is
greater than, less than, equal to, or not equal to the other.
It also involves the testing for existing of a condition encountered during the processing
of an application & altering the sequence of instructions accordingly.
Page 28 of 78
The keyboard
- these are devices that converts typed numbers, letters and special characters into
machine readable form examples: keyboard and keypad
Keyboard
- this is the most commonly used keying method with desktop and laptop computers.
Examples include:
-traditional keyboard, flexible keyboard, ergonomic, wireless etc
Keypad
- this is a small keyboard used with hand held devices i.e. cell phones, calculators,
notebooks etc
Pointing device.
Mouse.
Trackball.
Light pen
Joystick.
Page 29 of 78
Light pen
Light pen and stylus- A light pen, also called a selector pen, is a
computer input device in the form of a light-sensitive wand used in
conjunction with a computer's CRT display. It allows the user to
point to displayed objects or draw on the screen in a similar way to a
touch screen but with greater positional accuracy
2. Scanning devices
-These are devices that capture data directly into the computer.
-They can also be defined as devices that use a magnetic or photo-electric source
to scan and convert images into electric signals that can be processed by an
electronic apparatus, such as a computer.
Uses of Scanning Devices
Scanning devices are commonly used to:
-Convert a text document into an electronic file;
-Convert a photograph into an electronic graphic file;
-Sense an image to be sent over a voice frequency
-Circuit, such as a fax machine;
-Reproduce text and images, as with a copier.
Classification of scanning devices Scanners are classified according to
technology used to capture
data namely: optical and
magnetic scanners. Optical
scanners- these scanners
Advantages
Voice input is fast
Page 30 of 78
Its suitable for people with special needs especially those with impaired hands -
Can be used in emergency situations
Disadvantages
Voice input is complex to develop
Voice input does not take care speech related problems such as accents, tone etc
The response rates of speech input devices are relatively slow
Most speech input devices can recognize a limited, standard vocabulary of spoken
words, and the voice of only one speaker
Cannot differentiate words that have same sounds (homophones)
(a)Computer bus
It is a communication path/ medium within the computer that connects the basic
computer components. It allows different elements or sections of the computer to
communicate with each other.
Page 31 of 78
A parallel collection of conditions that carry data & control signals from one element to
another
Computer Motherboard
This is the electronic board where all electronic components such as processor,
memory chips, BIOS, bus connections etc are assembled
Components found on the computer motherboard are:
Processor (CPU)
SIMM/DDR sockets
Memory chips
BIOS
Interface chips
Buses
Computer Drive
A drive is a computer device for reading data from or writing data into a storage media,
e.g. a tape or disk
Page 32 of 78
CD- ROM drive - DVD – ROM drive
Tape drive - Zip drive
USB port – for flash disk
Magnetic disks
Floppy disk- The term usually refers to the magnetic medium housed in a rigid plastic
cartridge measuring 3.5 inches square and about 2millimeters thick. Also called a "3.5-inch
diskette," it can store up to 1.44 megabytes (MB) of data. Although many personal computers
today come with a 3.5-inch diskette drive pre-installed, some notebooks and centrally-
administered desktop computers omit them. Floppy disk requires floppy drives (shown below)
to read and write.
Disk platter - A hard-disk platter (or disk) is a
component of a hard-disk drive: it is the circular disk
on which the magnetic data is stored. The rigid nature
of the platters in a hard drive is what gives them their
name (as opposed to the flexible
materials which are used to make
floppy disk). Hard drives typically
have several platters which are
mounted on the same spindle. A
platter can store information on
both sides, requiring two heads per platter.
Page 33 of 78
The Compact Disc, or CD for short, is an optical disc used to store digital data. It was
originally developed to store and play back sound recordings only, but the format was later
adapted for storage of data (CD-ROM), writeonce audio and data storage (CD-R), rewritable
media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD),
PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio players have been
commercially available since October 1982. Have a storage capacity of
700MB or 80 minutes of continuous play. Compact Disc
DVD/Digital Versatile/Video
Disk
Is an optical disc storage format,
invented and developed by Philips,
Sony, Toshiba, and Panasonic in 1995,
DVDs offer higher storage capacity than
Compact Discs while having the same
dimensions: Have a storage capacity of
4.7 GB or 2 hours of continuous play, up to 20 GB.
Optical Cards
Optical memory cards use a technology
similar to the one used for music CDs or CD
ROMs. A panel of the "gold colored" laser
sensitive material is laminated in the card and
is used to store the information. Can store
from 4 - 6.6 MB
Page 34 of 78
Flash disks- A USB flash drive is a data storage device that includes
flash memory with an integrated Universal (USB) interface. USB flash
drives are typically removable and rewritable, and physically much
smaller than a floppy disk. Most weigh less than 30 g. As of September
2011 drives of
Difference between
(A)Primary and secondary storage
Primary storage devices are accessed directly by the CPU, while secondary
storage is not .
(B)Fixed and removable disks
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g. floppy
disk,
Jazz disk, Zip disk, flash disk, CD- R, CD – RW, DVD
Page 35 of 78
Disadvantages of floppy disks as storage devices
Page 36 of 78
In magnetic storage media, data is recorded using magnesium, while in optical storage
media data is recorded using a beam of light (laser)
(a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per
surface, and 512 bytes per sectors
No. of sectors = (2 sides x 6 sectors)
= 12 sectors
If 1 sector = 512 bytes
(12 x 512) = 6,144 bytes
Page 37 of 78
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided
into 9 sectors of 512 bytes each. What is the total capacity of the disk in megabytes?
( 2mks)
Total tracks = (40 x = 80
2)
Total sectors = (80 x
= 720
9)
Total bytes (720 x 512) = 368,
640 bytes
If 1 = 1,048,
MB 576
bytes
368,
?
= 640
bytes
368,
640
1,048,
576
0.352
= MB
Page 38 of 78
Primary Memory Secondary Memory
Used for holding data & instructions Used for storing backup information
required immediately by the CPU that is not needed immediately by the
It is accessed directly by the CPU CPU.
Provides fast access to information is It is not accessed directly by the CPU
accurate & reliable Provides slow access of information
It is expensive per bit of memory dues Secondary storage devices are cheap
to the technology involved it has high storage capacity
It has low/ limited storage capacity It is non- volatile i.e. stores data
It is volatile & therefore it is used to permanently.
store temporary programs & data E.g. punched cards, magnetic tapes,
The speed of the processor depends on floppy disks, hard disks, etc
the size & type of primary
storage
E.g. Read Only Memory (ROM) &
Random Access Memory (RAM)
Page 39 of 78
SOFTWARE
Computer software
The term software refers to a set of computer programs. Its function is to guide the
computer in its operations. Software can be classified according to purpose or
acquisition.
System software
1. Booting the computer and making sure that all the hardware elements are working
properly.
Page 40 of 78
This is a set of complex programs that work together to control execution of user programs
called applications and acts as a go between (interfaces) between the applications of the
computer hardware. It manages input/output and storage operations in a computer.
Examples of common operating systems are Microsoft Windows 95/98/2000/XP, UNIX,
Linux, Macintosh (Mac OS) and OS/2. What type of operating system software do you use
in the computer laboratory?
Therefore the operating system is the main program on the computer system.
Memory Management
The Operating System controls reading of data coming in from the various
input devices into the memory and writing of data to output devices such as
printers.
The Operating System will ensure that each time the user types in commands
those inputs are accepted into the memory, and if the latter is busy the it
holds the same temporarily on b uffers until the memory is free and also does
the same to output data awaiting to be displayed on the monitor or to be sent
to the printer if the same are busy.
Resource Allocation
Operating System load programs into the computer memory and starts them
running after receiving instructions from the user, at the same time, operating
Page 41 of 78
systems must have ability to divide resources available to different users,
memory and of course the peripherals to different processors going on at the
same time so that none of the users gets "stuck" or "deadlocked" during the
operation for lack of a computer resource.
Error Handling
Any Operating System must have the ability to handle errors in the computer
system be it hardware or software faults and be able to provide routi nes to
correct these errors.
Interface Any Operating System should have the ability to receive commands
from the user and respond to them accordingly.
Interrupt Handling
There are majorly two types of Operating Systems that we will discuss in this
section.
In this type of Operating System, only one user can use the machine at a
time, load one program at a time in the main memory and process only that
one program. Most of the small microcomputers employ single user systems.
Examples are Ms-DOS, Pc-DOS and Windows.
This system as the name suggests is for multi user, as opposed to the single
user system.
More than one program can be loaded int o the main memory by different
users and processed at the same time in an interactive manner. Examples of
such an operating system are UNIX and Windows NT.
Page 42 of 78
Firmware
Firmware, also referred to as stored logic is a combination of both the software and
hardware recorded permanently on electronic chips. Usually, a firmware is a read-only
memory chip that is mounted or plugged into the motherboard. Firmware may hold an
operating system, utility programs, language processors etc.
Utility software
Utility software is a special program that performs commonly used services that make
certain aspects of computing to go on more smoothly. Such services include sorting,
copying, file handling, disk management etc. The two basic types of utility software are:
Networking software
This type of software is mostly used to establish communication between two or more
computers by linking them using a communication channel like cables to create a computer
network. Networking software enables the exchange of data in a network as well as
providing data security. Network software may come as independent software or integrated
in an operating system. An example of networking software is novel Netware.
Application software
Application software, also called application packages are programs that are designed to
help the user accomplish specific tasks.
letters. WordPro,
WordStar.
Page 43 of 78
calculating
budgets.
Design
files.
manipulating Photoshop.
pictures.
The task of determining a suitable computer system for an individual or organisation is not
easy. A good computer system must meet all the requirements of the user. Therefore,
before selecting the computer system to implement, it is advisable to do an analysis of all
the requirements necessary in order to avoid acquiring a system that may disappoint the
users.
Requirements analysis for selecting a computer system should cover the following:
Page 44 of 78
3. Evaluating software requirements that will meet the users needs. The computer
hardware and software to be acquired should therefore be able to meet all needs of the
data processing environment that, they are intended for effectively.
USING A COMPUTER
The Computer Keyboard
Alphanumeric Functional Special PC operation keys
keys keys
Page 45 of 78
Classification of the keyboard keys/ Parts of the keyboard
Page 46 of 78
Summary of keyboard keys and uses
Multiplication * Multiplication
sign
Page 47 of 78
Subtraction - Subtraction
sign
N/B: ToggleKeys are designed for people who have vision impairment or cognitive disabilities. When
ToggleKeys are turned on, your computer will provide sound cues when the locking keys (CAPSLOCK,
Mou
se
NUMLOCK, or SCROLLLOCK) are pressed. Hold the num lock for five seconds to activate.
MOUSE
-Clicking- this is pressing the left button of the mouse once to execute a
command -Double clicking- clicking the left button of the mouse twice in quick
succession. Used to start an icon
-Drag and drop-this involves clicking on an icon, dragging it, and releasing the
button.
Used to move and resize objects
Page 48 of 78
Terminologies associated with the use of a mouse
Clicking: This means pressing and releasing the left mouse button once. A click
often selects an object.
Double clicking: This means pressing the left button twice in quick succession.
Double clicking usually opens a file or starts a program
Right clicking: Pressing the right hand side mouse button once displays a list of
commands from which the user can make a selection. This list of commands is
called a shortcut menu or context sensitive menu. It is called a context sensitive
menu because the commands on it apply to the right clicked item.
Drag and drop: This is whereby the user drags an item from one location on the
screen to another. The procedure to accomplish this operation is as follows:
1. Point to the item you want to drag.
2. Press the left hand side mouse button and hold it down
3. Slide the mouse until the pointer reaches the desired position on the screen.
4. Finally release the mouse button and the item will be dropped in the new
location.
LOGGING IN
o login using your username and password if it is password protected
Page 49 of 78
Navigating widows
To open the Help function:
Click with the left mouse button on the Start menu and then choose Help. The following
window will open:
• In the blank field next to the word “Search” enter the name of the tool or term you need
help with and press the left mouse button on the arrow “next” or press
“Enter”
The Desktop
Page 50 of 78
Start: to begin working on the computer, click with the left mouse button on the Start button.
A menu with submenus will open
Page 51 of 78
in the left column of the Start menu you can find:
shortcuts to installed Internet browsers (programs that search
the Internet and enable viewing of web pages), examples of these shortcuts on the picture are
Mozilla Firefox and Internet Explorer; software for sending and receiving electronic mail (e-
mail), an example of this kind of software on the picture is Mozilla Thunderbird
o shortcuts to the most frequently used applications, examples on
the picture are:
FileZilla, Media
Player Classic,
Notepad, etc.
o All
Programs – the
menu that lists
all installed
programs
enabling you
to run the
desired
software
Page 52 of 78
o Search – searches the computer for a file or folder o Run – runs applications by
entering the name of the application (.exe) o Log off – logs off the user, but does not
shut down the computer o Turn Off Computer – options: shut down or restart the
computer
Icons:
• These are images that represent applications, program shortcuts, folders, or files
• predefined Microsoft Widows icons are: My Computer, My Documents and the Recycle
Bin
• most frequent icons: folders, applications for text editing (OpenOffice.org Writer,
Microsoft Word)
• Selecting icons: position the mouse pointer (cursor, arrow) over the desired icon, press
and release the left mouse button; the icon will become colored meaning that it is selected
Moving icons (the drag-and-drop method):
1. press and hold down the left mouse button on the desired icon
2. drag the icon to the desired position
3. release the left mouse button
• Opening an icon:
o double-click on the icon with the left mouse button, or o select the icon and press
Enter
Page 53 of 78
Shortcuts to programs or files
Taskbar:
Windows
• folders and files open within a window, some programs open in full screen (games for
example)
• window elements:
1. Title bar
2. Menu bar
3. Toolbar
4. Status bar
5. Side bar – horizontal and vertical
6. Buttons: minimize, maximize (restore) and close
Page 54 of 78
• Moving a window:
o press and hold down the left mouse button on the windows title bar, move it in a
desired direction, release the mouse button (the drag and drop method)
• Resizing a window:
o Position the mouse pointer over the edge of the window, press and hold the left mouse
button, change the window size as you please, release the mouse button
Page 55 of 78
Maximize: resizes the window to cover the entire desktop
• Working with multiple windows o you can have more than one window open, but only
one active
o the active window has a highlighted title bar which is greyed out when inactive
o you can activate a window by pressing on it with the left mouse button
o when on the taskbar, you can activate the window by pressing the left mouse button
on its slot
• Hard Disk
• Floppy Disk
• CD, DVD
• USB Stick
• online data storage device
Working with data storage devices within Windows XP
• Start > My Computer – the window displaying data storage devices:
Page 56 of 78
• Each device has an appropriate icon, title and letter within the brackets (A, B, C, D, E...):
A - Floppy disk
C – usually a system disk- the disk the operating system is installed on
Page 57 of 78
o there can be more than one disk drive in the computer and one disk drive can be
divided into several partitions
o if there is more than one disk drive in the computer, or more than one partition on the
hard disk drive, the letters usually assigned are:
A - Floppy disk
a folder (directory): a container files or other folders are placed in. You
can create files and folders within a folder in order to better organize data
a folder can contain subfolders which can have their own subfolders and
they can also contain subfolders ... – a branching map
Page 58 of 78
path - the path to a desired folder or file
Explorer view
Page 59 of 78
o folders will open if you double-click on them o when Detailed view
is selected, several informational columns will be shown:
Page 60 of 78
Page 61 of 78
• each file has its own properties:
o press the right mouse button on the file and on the quick
menu select the Properties option
o it displays the location, size, creation date, date modified,
author etc.
• press the right mouse button on the file and choose Properties; on the tab General mark
the checkbox next to Hidden, press the Apply button and then OK
• the dialog box Confirm Attribute Changes appears with the following options:
o Apply changes to this folder only
o Apply changes to this folder, subfolders and files
Page 62 of 78
• Hidden files and folders can be made visible: o on the Tools menu choose Folder
Options; on the tab View select Show hidden files and folders; press the Apply button and
then OK
• files have extensions that define the file type and determine the application that will open
the file. The extension is placed after the name, separated by point
• to display the file extension: on the Tools menu choose Folder Options; open the tab
View and unmark the checkbox next to “Hide extensions for known file types”. Confirm
the change by pressing the Apply
OK
Page 63 of 78
To change a file status
• files can be opened, modified and deleted if their properties allow it
• change the file status to read only: select the tab General, press the left mouse button over
the box next to the Read Only attribute, confirm the change by pressing the Apply button
and then OK
• when you want to change the file status back, press the left mouse button over the same
box and the box becomes empty again, confirm the change by pressing the Apply button
and then OK
Extension:
Microsoft Office
2003 2010 version
version
Page 64 of 78
audio file .mp3
image .jpg
• selecting a number of files that are not sequential – press the left mouse button over the
first file, press and hold Ctrl and then press the left mouse button over other files or
folders you want to select, then release the Ctrl key
• selecting all files within a specific folder: on the Edit menu choose the option Select All
(keyboard shortcut Ctrl + A)
File count
• to count files within a folder: press the right mouse button on the folder > Properties> and
see the files and subfolders the folder contains
• count the same file type: View > Details > Display Type> Check files of the same type>
you can find the number in the status bar
(Ctrl + C)
3. position the cursor to the place you want to copy the content to
Page 65 of 78
4. press the right mouse button and on the quick menu choose the tool Paste
(Ctrl + V) Copying via drag and drop method:
1. select the file or folder you want to copy
2. over the selected file or folder press and hold down the left mouse button and then
press and hold down the Ctrl key
3. “drag” the mouse pointer to the place you want to copy the content to
4. release the mouse button and then release the Ctrl key
2. press the right mouse button and on the quick menu choose the tool Cut
(Ctrl +X)
3. position the cursor to the place you want to move the content to
4. press the right mouse button and on the quick menu choose the tool Paste
(Ctrl + V)
Moving via drag and drop method: the same as copying, but without the Ctrl key- just apply the
drag and drop method.
Page 66 of 78
• restoring a file: press the right mouse button on it and on the menu choose Restore
• compression reduces the space the data occupies on the disk o right-click the file or folder
and select the command Send to > Compressed (zipped) Folder o a compressed folder or
file is created with the same name as the original and with the letter Z on the
icon
o to add files and folders use the drag-and-drop method o programs for compression are:
Win Zip, WinRar
• in order to modify compressed files and folders you need to decompress them first
Page 67 of 78
o right-click over the compressed folder or file > select a decompressing program >
specify the location you want to save the folder in
Page 68 of 78
• you use it when you want to find something you saved, but you do not know the location
you saved it in
• Start > Search > choose what you are searching for (picture, music, video, documents,
printers…)
Sorting data
o next to the sort criteria is a gray triangle showing whether the data is sort in an
ascending or descending order o sorting criteria:
Name Type
Size Date modified
MANAGING PRINTING
Page 69 of 78
Change the default printer
• if there are multiple printers, only one is default; documents will print on the default
printer unless you choose another printer in the print dialog
• changing the default printer: Start > Printers and Faxes > select printer > press the right
mouse button > Set as default
Page 70 of 78
• on the File menu choose the
Print option; enter the desired
settings (number of copies,
print page range) and press
OK
Page 71 of 78
Working with programs for text editing (OpenOffice.org Writer, Microsoft Office Word)
• when saving a document for the first time: on the File menu select Save as; in the dialog
box that appears specify the location you wish to save the file in (Save in), enter the
filename and then click the Save button
• formatting media prepares media for use and if there was any data on
the media, it was deleted after formatting
• in the My Computer window, right-click on the disk you wish to
format, press the right mouse button and select the option Format and
then press the OK button
• it is advisable to make a copy of data before formatting media
• Print Screen is used when we want the picture currently on the monitor to be saved as an
image
1. Press the PrtSc button (full name: Print Screen) on the keyboard
2. Open an application for image editing, like Microsoft Paint, paste the image into the
application, edit the image, choose the name and the location you want to save the
image in
CONTROL PANEL
• The Control panel is a panel enabling access to all settings available for maintaining or
tuning our PC. You can access it through the icon placed on the Start menu
Page 72 of 78
• views:
o Category view
o Classic view
Getting the basic system information: double click on the icon to open system
properties.
Page 73 of 78
To set the date and time:
• Start > Control panel > Date and
Time; or: doubleclick on the clock
in the lower right corner of the
taskbar
• after setting the time and date,
press the Apply button and then OK
Page 74 of 78
o the Display Properties icon contains several tabs, on
the Desktop tab choose an image for the desktop
background, press the Apply button and then OK
o you can also Browse and find any image stored on
the computer and set it as a desktop background
image
Page 75 of 78
• by using dynamic images, the Screen Saver protects
the monitor; it turns off when the mouse is moved or
any key on the keyboard is pressed
• in the Control Panel, open the Display icon with a
doubleclick, select the Screen Saver tab, choose one
of the listed screen savers. In the field Wait choose
the period of time the computer has to be unused for
the Screen Saver to activate. After entering the
changes,
press the
Apply button
and then OK
Change the
screen
resolution
• the screen
resolution
depends on
the quality of
the monitor and graphics card
• resolution determines the quality of the displayed
image on the monitor. Better resolution means better
image quality
• in the Control Panel open the Display icon and on
the tab Settings there is an option for Screen Resolution with a sliding bar – move the
slider. After you have chosen the resolution, press the Apply button and then OK.
• the Windows operating system has support for a number of official languages
• in the Control Panel, open Regional and Language Options> Languages> Details if
there is no keyboard layout offered for your language, choose the option Add
Uninstall a program
• in the Control Panel open the Add / Remove icon, select the program you want to remove
and select the Remove button
Page 76 of 78
Installing new programs
• new programs can be installed in different ways: using a CD, DVD or any removable
media, media downloaded from the internet etc.
• to launch the installation, double-click on the .exe file usually named: setup.exe or
install.exe
• after starting the installation, the installation wizard appears. Follow the instructions,
enter the license key if necessary and press Finish.
Page 77 of 78
Adjusting the sound and speakers is possible through the Sound icon found in the Control Panel.
Double-click the Sound icon and a window with sound options will appear.
Page 78 of 78