0% found this document useful (0 votes)
25 views

Computer Form 1 Final

This document provides an introduction and overview of computers for Form 1 computer studies based on the new syllabus in Malawi. It defines what a computer is, its basic parts and functions. It also describes the different generations of computers from the first to fifth generation and how they have evolved over time in terms of the components used and capabilities. Finally, it classifies computers according to their physical size and processing power as well as functionality.

Uploaded by

iannguluwe
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Computer Form 1 Final

This document provides an introduction and overview of computers for Form 1 computer studies based on the new syllabus in Malawi. It defines what a computer is, its basic parts and functions. It also describes the different generations of computers from the first to fifth generation and how they have evolved over time in terms of the components used and capabilities. Finally, it classifies computers according to their physical size and processing power as well as functionality.

Uploaded by

iannguluwe
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 78

Great trek in computer studies form 1 based on the new syllabus call:0998019039

COMPUTER STUDIES

Form 1 notes.

By: M.A BANDA (ST MARY’S KARONGA GIRLS SECONDARY


SCHOOL

CALL/WHATSAPP : 265998019039
EMAIL: [email protected]

INTRODUCTION TO COMPUTERS
(a) Definition of a computer
 A computer is an electronic device that operates (works) under the control of programs
stored in its own memory unit
 An electronic device that accepts data, as input and transforms it under the influence of
a set of special instructions called programs, to produce the desired output (referred to
as information).
(b) Why a computer is referred to as an electronic device
 It uses electrical signals to process data
 It is made up of electronic components and uses electric energy to operate

Definition of terms
Data
 collection of raw facts, figures or instructions that do not have much meaning to the
user
Program
 computer program is a set of related instructions which specify how data is to be
processed
 A set of instructions used to guide a computer through a process
Data processing
 It is the process of collecting all terms of data together & converting them into
information
Information
 Data which has been refined summarized & manipulated in the way you want it, or into
a more meaningful form for decision- making
(a) Read - To transfer data from an input device to the computer, e.g. the computer
reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output
Device e.g. the computer writes output on a printer or onto a disk.
- To move or copy data from the main storage to a backing storage

Three functions of a computer


Computers have the following functions:
 Accepting data
 Processing the data
 Producing information

Parts that make up a computer


 System unit
 Monitor
 Keyboard
 Mouse
 Printer

Page 2 of 78
 Modem
 Scanner
 Speakers
 Graph plotters

The system Unit


 This is the casing that houses the internal components of the computer such as the CPU
and storage devices
 Devices located under the cover of the system unit
 Central processing Unit (CPU)
 Motherboard
 Power supply unit
 Main memory
 Hard disk
 Disk drives
 Battery
 Buses
 Input/ output ports
 Video card
 Expansion slots

Types of system unit


These are tower – style and desktop system units
Tower style system unit is designed to stand alone or to be placed on the floor, desktop units lie
on the desk with the monitor placed on top
Tower style units have more space for expansion than the typical desktop units

Computer generations

Page 3 of 78
Computers have evolved through a number of generations.
Characteristics of the first generation of computers.
Classification of computer according to historical development
(generations)
First generation computers
 Used vacuum tubes in their memory
 Large in physical size
 consumed a lot of power
 Produced a lot of heat
 The computers constantly broke down due to the excessive heat generated; hence were
short- lived and were not very reliable
 Their internal memory capacity/ size was low
 Slow in processing data
 Very costly
 Used magnetic drum memories
 Cards were sued to enter data into the computers

Second generation computers


 Used transistors in their memory
 They consumed less power & produced less heat than the first generation computers
 They were relatively faster than the 1st generation computers
 Used magnetic core memories
 Were less costly than first generation computers
 RAM memory capacity was 32 KB

Third Generation computers


 Used integrated circuits in their memory
 They were faster than second generation computers
 RAM memory capacity was 2 GB

Page 4 of 78
 Slightly smaller in size than 1st & 2nd generation computers
 They used a wide range of peripheral devices
 Could support remote communication facilities/ more than one user at the same time
 Magnetic disks were introduced for storage purposes

Fourth generation computers


 Used large scale integrated (LSI) circuits & very large scale integrated (VLSl) circuits
in their memory
 They were small & very fast
 Had storage (memory) capacity
 Magnetic disks, bubble memories & optical disks were used for storage - The first
operating system was introduced

Fifth generation computers


 Are the modern computers
 Are designed/ constructed using parallel architectures, 3 –D circuit design &
superconducting materials
 Are very powerful, with very high processing speeds
 The computers can perform multiprocessing
 Have virtually unlimited ( very high) memory sizes
 Can support complex programs
 Use advanced hard disks and optical disks for storage, e.g. DVDs
 Use of zip disks
 Use of multi user operating systems & advanced application programs

Classification of computers
Computers are classified according to :
 Physical size & processing power
 Power

Page 5 of 78
 Functionality (mode/ method of operation)
 Type of processor (CPU)

Classification according to physical size and processing power

Computers can be classified into four main groups namely supercomputers, mainframe
computers, minicomputers and microcomputers.

Supercomputers

They are the fastest, largest, most expensive and powerful computers available. They are able to
perform many complex calculations in a fraction of a second. Because of their extreme weight,
a supercomputer is kept in a special room. Due to their huge processing power supercomputers
generate a lot of heat. Special cooling systems are therefore required. Sometimes the whole CPU
is immersed in an aquarium like tank containing liquid fluorocarbon to provide cooling.

Supercomputers are mainly used for scientific research, which requires enormous calculations.
Applications that justify use of supercomputers include aerodynamic design and simulation,
petroleum research, defense and weapon analysis among others. Supercomputers are mainly
found in developed countries such as in USA where they are used for advanced

Scientific research such as nuclear physics. Figure 1.3 shows an example of supercomputer.

Mainframe computers

They are less powerful and less expensive than the supercomputers. While supercomputers may
be described as giant computers, the mainframes are said to be big in size. They are used for
processing data and performing complex mathematical calculations. They have a large storage
capacity and can support a variety of peripherals.

Mainframe computers handle all kinds of problems whether scientific or commercial. They are
mostly found in government agencies, big organizations and companies such as banks, hospitals,
airports etc. which Have large information processing needs. Figure 1.4 shows a picture of a
mainframe computer.

Page 6 of 78
PC (Personal Computer)
A PC can be defined as a small, relatively inexpensive computer designed for an individual
user. PCs are based on the microprocessor technology that enables manufacturers to put an
entire CPU on one chip. Businesses use personal computers for word processing, accounting,
desktop publishing, and for running spreadsheet and database management applications. At
home, the most popular use for personal computers is playing games and surfing the Internet.
Although personal computers are designed as single-user systems, these systems are normally
linked together to form a network. In terms of power, now-a-days high-end models of the
Macintosh and PC offer the same computing power and graphics capability as low-end
workstations by Sun Microsystems, Hewlett-Packard, and Dell.

Workstation
Workstation is a computer used for engineering applications (CAD/CAM), desktop
publishing, software development, and other such types of applications which require a
moderate amount of computing power and relatively high quality graphics capabilities.
Workstations generally come with a large, high-resolution graphics screen, large amount of
RAM, inbuilt network support, and a graphical user interface. Most workstations also have
mass storage device such as a disk drive, but a special type of workstation, called diskless
workstation, comes without a disk drive.
Common operating systems for workstations are UNIX and Windows NT. Like PC,
workstations are also single-user computers like PC but are typically linked together to form a
local-area network, although they can also be used as stand-alone systems.

Minicomputers

A minicomputer resembles the mainframe but is slightly smaller. Thus it is referred to as a small-
scale mainframe computer. Although it supports fewer peripheral devices and is not as powerful
and fast as the mainframe computer, it was developed as a cheaper alternative to the mainframes
for smaller organizations. They are used mainly in scientific laboratories, research institutions,
engineering plants and places where processing automation is required. They are well adapted
for functions such as accounting, word processing, database management and specific industry
applications. Figure 1.5 shows a picture of a minicomputer.

Microcomputer

A microcomputer is the smallest, cheapest and relatively least powerful type of computer. It is
called a microcomputer because; its CPU is called a microprocessor, which is very small

Page 7 of 78
compared to that of a mini, mainframe or supercomputers. Microcomputers are also called
personal computers (PC) because they are designed to be used by one person at a time.

Microcomputers are commonly used in training and learning institutions, small business
enterprises, and communication centers among others. Today, the power of microcomputers has
grown tremendously closing the gap that formerly existed and reserved for the minicomputers
and the mainframes.

Technological advancement has seen the development of smaller and smaller microcomputers.
The following are the various types of microcomputers in operation today arranged in descending
order according to size.

1. The desktop computer

-Not portable. It is designed to be placed on Top of an office desk.

2. The laptop computer

-Portable like a briefcase. It is designed to be used by placing it on the lap hence its name.

3. The palmtop e.g. personal digital assistant (PDA)

- Small enough to fit in the pocket and can he held in the palm when being used.

Classification according to purpose

Computers can be classified according to the tasks they perform either as general or special
purpose computers.

General-purpose computers

General-purpose computers have been designed to be able to perform a variety of tasks when
loaded with appropriate programs. They are the most common types of computers in use today.
Their flexibility enables them to be applied in a wide range of applications like document
processing, performing calculations, accounting, data and information management among
others.

Page 8 of 78
Special purpose computers

Special purpose computers are designed to serve a specific purpose or to accomplish one
particular task. Such computers can perform no other task except the one they were meant to do.
This means that the set of instructions, which drive a special purpose computer, are limited in
number at the time of manufacture. Examples of such computers include, robots used in a
manufacturing industry production line, mobile phones for communication only and electronic
calculators that carry out calculations only.

Since special purpose computers are dedicated to a single task, they can perform the task quickly
and very efficiently.

Classification according to functionality

Computers can be classified according to the type of data they can process. Data can either be in
discrete or continuous form. Discrete data which is also called digital data is one that can be
represented as distinct values that do not have any transitional stages over time e.g. either 1 or
O. Continuous data which is also called analog data can be represented as progressively
changing values overtime. Computers can be classified as digital, analog or hybrid.

Digital computers

Digital computers process digital data only. Any data to be manipulated by a digital computer
must first be converted to digital form. Most home appliances today are also digital in nature.
For example to increase the volume of a digital television you simply press a button and it
changes from 1 to 2, 3 If the same television is analog, it would have a knob

that you can continuously turn round or slide in a slot to increase or decrease the volume.

Analog computers

This refers to computers that process data that is analog in nature. Analog computers solve
problems by measuring the amount of change that occurs in quantities like speed, temperature
and pressure. An analog machine is usually a special purpose device that is dedicated to a single
task. Analog computers are used in manufacturing process control like monitoring and regulating

Page 9 of 78
furnace, temperatures, and pressures. They are also used in other applications like in weather
stations to record and process physical quantities e.g. wind, cloud speed, temperature etc.

Hybrid computers

Hybrid computers are designed to process both analog and digital data.

4 By Use

It is worthy noting that we categorize these computers according to what it is used


for and when it is used. Under this category, the list is endless. For this reason we
will limit ourselves to only five main types.

(I) Personal Computers or Desktop Computers

These are also known as Microcomputers. They get their name from the fact that
they fit nicely on the desktop. They can also be used on the desk in the office
environment or for personal use at home.

(ii) Home based Computers

These computers are those designed to be used at home. An individual may install
only games program in it or a word processor to enable them write letters, still
some would install accounting packages to enable th em budget and control their
finances at home.

(iii) Lap top Computers

These computers get their name from the fact that you can place them on your laps
while using. They are very small computers that have the structure of a briefcase
i.e. you open and close the same way.

These have a keyboard attached to them and a flat screen together with a mouse
ball and chargeable batteries. This means that you can use them in the rural areas
where the is no electricity.

Laptop computers also have ports (small slots) th rough which you can attach an
external keyboard, mouse or external drive like drive A:.

Page 10 of 78
(b) Why smaller computers like Laptops tend to be more expensive than Desktop
computers
 The technology of producing smaller devices is expensive
 They are convenient because they are portable
 They have advanced power management capabilities (they consume less power since a
laptop can operate on rechargeable batteries

Why a mobile phone is regarded to be a computer


 It is electronic * uses electric energy to operate
 It has a display unit (screen)
 It has a keypad
 It has a memory for storage
 It is programmable

Special – purpose computers


 Robots
 Mobile phones used for communication only
 Calculators that carry out calculations only
 Computers used in digital watches & in petrol pumps
 Computers used in petrol pumps
 Computers used in washing machines
 An automatic pilot
 A word processor

Where each of the following types of computers can be used


(a) Supercomputer
 Weather forecasting
 Petroleum research

Page 11 of 78
 Defense and weapon analysis
 Aerodynamic design and simulation

(b) Mainframe computer


 Banks for preparing bills, payrolls, etc

Page 12 of 78
 Hospitals
 Airports (i.e., in Airline reservation systems for booking & storing flight
information) - Communication networks as servers

(c) Minicomputer
 Scientific laboratories & research institutions
 Engineering plants for controlling chemical or mechanical processes
 Space industry
 Insurance companies & banks for accounting purposes
 Communication centers as servers

(d) Microcomputer / personal computer


 Training & Learning institutions, e.g. schools
 Communication centers as terminals
 Small business enterprises e.g. shops, small offices and homes

(a) Definition a microcomputer


A computer whose CPU (processor) has been implemented with a microprocessor

(b) Difference between a microcomputer and a personal computer


 A microcomputer is larger in physical size than a PC
 A microcomputer is more powerful than a PC
 A PC was designed to be used by one person only

Factors to be considered when purchasing a microcomputer


 Type of processor
 Processing speed
 Amount of main memory (RAM)
 Storage capacity of the hard disk

Page 13 of 78
 Cost of the computer
 Speed of output devices
 Number of users who can access the computers at the same time

Reasons which make microcomputers suitable for personal computing work


 Reduced cost, i.e. are cheaper than the minicomputers & mainframe computers
 Have high processing speed
 Are small in size (occupy less office space)
 Are more energy efficient (i.e. consume less power)
 Are more reliable in doing various functions than the early mainframe computers

 Are versatile (i.e. can be used for many different tasks)

(a) Areas where computers are used to process data


1. Supermarkets
 For stock control i.e. records of what is in store, what has been sold, and what is
out of stock
 For calculating customer‟s change
 For production of receipts
 It can be used as a barcode reader
2. Banks
 Manage financial transactions through the use of special cash dispensing machines
called ATMs used for cash deposit & withdrawal services
 Processing of cheques
 For preparation of payrolls
 Better record keeping & processing of documents
 Provide electronic money transfer facilities
3. Homes
 Entertainment e.g. watching movies, playing music, playing computer games
 For storing personal information/ documents

Page 14 of 78
 For calculating & keeping home budgets
4. Industries
 To monitor and control industries processes through the use of robots
 For management control, i.e. to keep track of elders, bills and transactions
 For advertisement purposes, which enable an industry to attack more customers
5. Police stations
 Matching, analyzing & keeping databases of fingerprints
 For taking photographs & other identification details
 For record keeping
 For face recognition, scene monitoring & analysis which help the police
carry out criminal investigations speedily
6. Transport industry
 Airports; to control the movement of aircrafts, their take off & landing using radar
equipment
 For making reservations (booking purposes)
 Storing flight information
 Automobile traffic control; to monitor vehicle traffic in busy towns
 In Railways corporations; to coordinate the movement of goods & wagons
 In shipping control, for efficient management of fleets, cargo handling &
communication
7. Offices
 For receiving & sending of information through e- mails, fax, etc
 Production of documents
 Keeping of records

Advantages of using computers in banking


 Speed and accuracy
 Easy to access information
 Easy to update records
 Requires less space for storage

Page 15 of 78
 Improves data security and privacy

Number systems and data storage


1. Memory
 A computer's memory stores data before, during and after
processing as well as the application program in use at the
time.
 These data are stored in cells of the memory. Each memory
cell contains one byte of data (a byte = 8 characters: a
character is say a letter of the alphabet, or a number).
 Therefore, one cell will contain eight characters called a byte.
 The size of the computer memory is measured in terms of
"Kilobytes" or "Megabytes" or "Gigabytes". Since "Kilo" stands
for 1,000 and "Mega" for 1,000,000 computer memory is
measured by the thousands or millions of bytes that can be
stored in memory at one time.
 In computer usage, the prefix "Kilo" actually stands for 1024
bytes and "Mega" for 1,048,576 bytes

Bytes and Number system


 The computer uses base 2 number system of counting. The base 2 counting system is
called binary system.
 This means it only understands zeros and ones. E.g. the letter Z is taken as 01010101
while the later W is interpreted as 10001011.
 Notice that each characters is represented by eight numbers e.g. 10010101. This eight
digit number is knows as a byte.
 1kb = 8×8×8×2=1024bytes or 83×21
 1megabyte = 86×22= 1,048,576 bytes.
 1GB =89×23 = 1,073,741,824 bytes

Page 16 of 78
PERSONAL COMPUTER MANAGEMENT AND
MAINTAINANCE
(a) Define the term „ computer laboratory‟
 A computer laboratory is a room that has been specially prepared to facilitate
installation of computers, and provide a safe conducive environment for teaching
& learning of Computer studies.
Factors to be considered when preparing a computer laboratory
 Security of computers
 Reliability of the source of power
 Number of computers to be installed and the amount of space available - The
maximum number of users that the laboratory can accommodate

SAFE USE OF COMPUTERS


COMPUTER HAZARDS
Safety precautions one should observe when entering a computer laboratory

 Avoid smoking or exposing computers to dust


 Avoid carrying foods & drinks/ beverages to the computer room
 Avoid unnecessary movements as you may accidentally knock the peripheral
devices
 Only authorized people should enter the computer room
 Computers users should be trained on how to use computers frequently
 Computer illiterates should not be allowed to operate the computers
 collect any waste papers which might be lying in the computer room & put them
into the dustbin
 Shut the door of the computer room properly

The ideal environment for a computer to work properly


 Should be free from dust, water and magnets

Page 17 of 78
 Should be kept in well ventilated rooms with optimum (medium) humidity

Why smoke and Dust particles are harmful to a computer


 Dust and smoke particles settle on storage devices and may scratch them during
read/ write operation
 It affects the cooling of the computer

Facilities that will ensure proper ventilation in a room


 Large & enough windows and doors
 Installing fans
 Installing air conditioning system
 Avoid overcrowding of either machines or people in the room

Why must foods and beverages be kept out of the computer room?
 Food particles may fall into the moving parts of the computer and damage them.
Liquids may spill into the computer parts causing rusting or electrical faults

Stable power supply


Computers need to be connected to a stable power supply in order:
 To prevent damage to the computer‟s secondary storage media
 To avoid damage and loss of important data or information such as application
software stored on the media
 Prevent loss of data/ information that had not been saved before the failure

(functions of the uninterruptible Power Supply (UPS) (4 mks)


 It prevents sudden power surges that might destroy the computer
 It supplies power to the Computer during blackouts and brownouts
 It provides stable (clean) power supply
 Alerts the user of power loss (by beeping)

Page 18 of 78
 Allows the user to save his/ her work, and switch off the system using the correct
procedure
Causes of strain- in the computer room
 Poor lighting of the room
 Bright monitors
 Flickering monitors
 Very bright wall paints reflect too much light
Proper sitting postures while using the computer
 Adopt relaxed and straight back position to avoid bending forward or learning far
backwards
 The feet should be firmly placed flat on the floor
 The seat must be high enough allowing the eyes to be the same level with the top
of the Screen .
 The seat must have a straight backrest that allows someone to sit upright. This
prevents muscle pains & backaches caused by poor sitting posture
 The height of the chair or working surface must be high enough such that your
forearms are parallel with the floor and your wrists are straight.
 The seat must be high enough relative to the table to enable the user use the hands
on the peripheral devices comfortably.

Methods of minimizing dust in a computer laboratory


 Fit the computer room with special curtains to reduce entry of dust particles
 Cover the floor with carpets in order to absorb dust
 Regular cleaning of the laboratory
 Cover the computer devices with dust covers when cleaning the room

Causes of fire in the computer laboratory and the precautionary measures


 Inflammable chemical such as those used to clean the computer equipment
 Keep the chemicals away in store after use
 Open wires/ cables

Page 19 of 78
 Ensure that all electrical wires are properly insulated
 Ensure that the computer room has a gaseous fire extinguisher containing carbon
dioxide in case of any accidents
 Smoking

A Computer Virus
 A computer virus is a computer program that can spread across computers and
networks by making copies of itself, usually without the user‘s knowledge.

VIRUS stands for - Vital Information Resources under Siege

 A virus is different from a worm


 A pure worm is more independent than a virus. A pure worm works by itself as an
independent object. It does not need a carrier object to attach itself to. The worm
can also spread by initiating telecommunications by itself. There is no need to wait
for a human to send the file or document.

CHARACTERISTICS OF A COMPUTER VIRUS

 First, viruses are notable for the ability to replicate itself to infect computer. By
replicating itself it is able to spread across computer systems and networks to infect as
much as it possibly can.
 Second, before the virus can do anything, it must be executed. If it cannot be
executed, it is harmless. To get itself to replicate it hitches a ride by attaching itself to an
executable program. It has to modify the program involved to also execute the virus code.
The virus is usually attached to a common executable such as the operating system, which
is automatically executed on startup. It may also attach itself to a commonly executed file
that a specific company may use.
 Third, viruses do not just contain self-replicating code; they also contain what is
called a payload. The payload is similar to a warhead on a missile; it is the side-effect of
the virus. The payload has the potential to be malicious, but it does not have to be.
 Lastly, the virus must be able to disguise itself before it is noticed by its side-effects.
There are two methods of disguise, encryption and interrupt interception.

WORKING OF COMPUTER VIRUS:


Computer viruses have a life cycle that starts when they're created and ends when they're
completely eradicated. The following diagram [Diagram 1: Life Cycle of Computer Virus]
points are describes in each stage.

Page 20 of 78
Creation Replication Activation Discovery Assimilation Eradication

Life Cycle of Computer Virus


• Stage I - Creation – The Computer viruses are created by misguided individuals who wish
to cause widespread, random damage to computers.
• Stage II -Replication - Computer Viruses replicate by nature means it copies itself from
one PC to anther PC.
• Stage III -Activation - Viruses that have damage routines will activate when certain
conditions are met. Viruses without damage routines don't activate, instead causing damage
by stealing storage space.
• Stage IV -Discovery - This phase doesn't always come after activation, but it usually does.
Discovery normally takes place at least a year before the virus might have become a threat
to the computing community.
• Stages V -Assimilation - At this point, Anti-virus developers modify their software so that
it can detect the new virus. This can take anywhere from one day to six months, depending
on the developer and the virus type.
• Stage VI -Eradication - If enough users install up-to-date virus protection software, any
virus can be wiped out. So far no viruses have disappeared completely, but some have long
ceased to be a major threat.
The same or different developer develops a different strain of a new virus and process begins
afresh.

Why viruses are created


There are a number of reasons that malware (virus) is created

Identity Theft - Malware can be created in order to collect personal information off of a
person‘s computer. This information can include bank accounts, social security numbers,
passwords or even birthdates. With this information people can open other bank accounts,
get hold of your money or even open up loans.

Data Corruption - Malware can also be created with the soul purpose of trying to corrupt
the data on your computer. Malware that is sent out with the purpose to damage existing data
can come from anywhere on the Internet or even from an email attachment. These types of
malware usually come in the form of viruses which can either damage parts of the hard drive
or replicate themselves so much that it causes the system to completely crash.

The motives of most virus writers remain unknown. There are however some motives that
can be identified by examining virus samples or talking to known or anonymous virus
authors.

Page 21 of 78
Challenge and curiosity. There are no courses or good books about how to write viruses.
Many programmers want to see if they can do it, and do not necessarily realize that the
virus may cause significant damage.

Fame and power. Even if the author remains anonymous, it probably gives a kick to read
about the virus in headlines. The virus, and possibly the damage it has caused makes other
people work and react in some way.

Protest and anarchy. A virus is quite a powerful way to cause intentional damage. There
have been cases where a virus is intended to harm a school’s network.

Proof of concept. Someone may for example want to prove that a certain replication
technique works. This type of virus may also appear on new platforms or applications
capable of hosting viruses.

Political motives. A virus may be used to spread a political message. This may, for
example, be protests against totalitarian

Classification of viruses
. The viruses are classified in to four main categories which are as follow;

 Traditional file virus


 Boot Sector Virus
 worms
 Trojan Horses
 Document viruses

Boot sector viruses

A boot sector virus infects the boot sector of floppy disks or hard drives. These blocks
contain a small computer program that participates in starting the computer. A virus can
infect the system by replacing or attaching itself to these blocks.

These viruses replicate very slowly because they can only travel from one computer to
another on a diskette. In addition, a boot attempt must be made on the target computer
using the infected diskette before the virus can infect it. The virus may, however, reside
on the diskette and infect new computers even if there is no operating system on it.

Traditional file viruses

A traditional file virus can spread when program files are transmitted or shared, regardless of the
used media .

Page 22 of 78
Document or macro viruses

Document or macro viruses are written in a macro language. Such languages are usually
included in advanced applications such as word processing and spreadsheet programs. The vast
majority of known macro viruses replicate using the MS Office program suite, mainly MS Word
and MS Excel, but some viruses targeting other applications are known as well.

Trojan horses
The name Trojan horse is borrowed from Greek mythology. In the computer world the term
refers to a program that contains hidden malicious functions. The program may look like
something funny or useful such as a game or utility, but harms the system when executed. Many
Trojans contain activation criteria that enable the Trojan to work for a while. The user is
convinced that the program is safe and useful, and forwards it to other users before the malicious
code strikes.

Trojans lack a replication routine and thus are not viruses by definition. A Trojan is spread to
other computers only through deliberate transfer by the users.

Harmless effects of viruses

1. Compatibility problems

Individuals make viruses and worms and they do not have resources to test their
creations on a wide range of computer systems. Nor do they develop the viruses
according to quality control systems and guidelines. This makes it likely that they
cause compatibility problems when run on systems that differ from the one on which
they were developed. These problems can occur as error messages, crashes, inability
to access certain functions etc.

2. Compromising system integrity

Intentional damage is often caused by erasure or modification of data. Erasing files is


perhaps the most obvious way to cause damage. Erasing files, however, is a clumsy
way and modern, well maintained, systems can usually recover from backups.
Modifying data is a much more sophisticated strategy. Small changes are made to the

Page 23 of 78
system now and then. The backup routine stores partially corrupted data until the
virus is detected. Restoring the data is hard or impossible as several generations of
backups are compromised. The last correct backups may be too old and it may even
be hard to tell which backups are or are not valid.

Usage of corrupted data may lead to severe damage.

3. Granting unauthorized access

Viruses may plant backdoors in the system, or steal passwords. These functions can
later be used by hackers to access the system. Damage caused by such hacking
activities is hard to predict. Unauthorized usage of the system may, for example,
continue unnoticed for a long time.

4. Disclosure of confidential data

Viruses and worms have access to the same communication methods as the user, and
even use them to replicate. A payload routine may easily locate documents that
match certain criteria and send them to anyone on the Internet. Some email worms
also cause disclosure of data as a part of replication. The worms that replicate when
attached to a document, such as Melissa, send this document to recipients to whom
the user had no intention of sending the document.

5. Computer resource usage

Viruses and worms can disturb computer systems by spending resources, either
intentionally or unintentionally. Some viruses contain payloads that deliberately eat
system resources

6. Human resource usage

Cleaning virus infections means extra work for the IT support staff. This damage,
and the downtime for the user, may result in great expense unless the viruses are
stopped properly using anti-virus software.

Even if viruses are successfully stopped using anti-virus software, the cost of maintaining
this system may be seen as a cost caused by viruses.

Anti Virus Software

Page 24 of 78
Software are available in the market today that help to disinfect diskettes
(disks) and of course the main memory from the virus infection.

Since new viruses come up often, it is always re commended that such


software installed into your system should be regularly updated or a newer
more powerful one installed.

Such software is often easy to use once installed. Examples of such software
include: Norton Anti- virus, Dr. Solomon Anti-virus Tool Kit, F-Prot
Professional etc.

Such software will scan and ask the user to "repair" hard disks and floppies
as well as the boot sector from viruses.

Cleaning infected storage devices

To guard a computer against virus attack, special programs called antivirus software such
as Norton Antivirus, PC-cillin or McAfee should be installed on the computer. These
programs can check your system for thousands of known viruses and eradicate them. To
scan for viruses the following is done:

1. Double click my computer

2. Right click a drive icon.

3. From the shortcut menu displayed, select the name of the anti-virus program e.g. Scan
with Norton Antivirus.

4. Follow the instructions displayed by the anti-virus program to start scanning.

COMPUTER SYSTEMS
(i) System
A collection of independent entities that collectively work together to achieve a desired
goal

Page 25 of 78
(ii) Computer system
A collection of entities that work together to process and manage information using
computers
A collection of hardware software and live- ware all working together in data inputting,
processing and production of required output from a computer
Difference between a computer and a computer system
A computer is made up of both hardware and software, while a computer system
integrates hardware, software and user

Hardware
They are the physical & tangible devices that make up a computer systems, e.g system
unit, input devices, output devices and storage devices

Software
These are programs & data used in a computer system that enable it perform a number of
specific functions, e.g. operating systems, application programs, utility programs,
programming languages & devices
computer hardware

Page 26 of 78
Functions performed by the CPU
 It carries out processing of data
 System control- it controls the sequence of operations within the computer
 It gives commands to all parts of the computer
 It controls the use of the Main Memory in storing of data & instructions
 Storage of data- It provides temporary storage (RAM) & permanent storage
(ROM)

Functions performed by each of the following central processing unit elements

1. Control Unit
 Interpreting instructions
 Issuing control instructions to the operating system

2. Arithmetic and logic Unit

Page 27 of 78
 Performs arithmetic calculations such as addition, or multiplication of figures
 Performs logical operations & comparison on data
 Performs output of logical functions (variables)

3. Registers
 Holds data and instructions temporarily just before and after processing

4. The main memory


 Stores data just before and after processing
 Stores instructions waiting to be obeyed/ executed
 Holds program instructions & the data currently being processed
 Stores intermediate results of processing awaiting transfer to the output devices

5. The system clock


 It determines the processing speed of the CPU

Logic operations
Logic operation is the ability to compare two quantities or numbers to determine which is
greater than, less than, equal to, or not equal to the other.
It also involves the testing for existing of a condition encountered during the processing
of an application & altering the sequence of instructions accordingly.

Main functions of a computer input device


 Accepts data & instructions from the user and sends them into the CPU. V
 Converts data into a form that the computer can understand (i.e., machine-
sensible/readable form)
Examples of Device that reads data (scanning device).
Scanner, - Digital cameras,
Barcode readers. ~ Credit/smart card readers, - Kimball tag readers.
OMR, OCR, MICR, etc
(ii). Examples of Keying device. - Keyboard, - Keypad.

Page 28 of 78
The keyboard
- these are devices that converts typed numbers, letters and special characters into
machine readable form examples: keyboard and keypad

Keyboard
- this is the most commonly used keying method with desktop and laptop computers.
Examples include:
-traditional keyboard, flexible keyboard, ergonomic, wireless etc

Keypad
- this is a small keyboard used with hand held devices i.e. cell phones, calculators,
notebooks etc

Pointing device.
Mouse.
Trackball.
Light pen
Joystick.

(h). examples of Voice input device.


Microphone.
(v). examples Printing device.
 Printer.
 Plotter.
Advantages of using a mouse instead of a keyboard. (2 marks)
 The mouse is easy & convenient to use.
 Modern software includes an option to use it.
 It selects a position on screen much more quickly than a keyboard.
 Mouse- there are different types of mice namely: ps/2, optical,
wireless/cordless etc Mouse skills- as the mouse moves on a flat surface, it
moves a ball beneath or a photosensitive signal that corresponds by moving
the pointer/cursor on the screen. Mouse terminologies
 Joy stick- looks like a car gear. When the lever like part is
moved, the pointer moves on the screen. Mostly used to play
games.

Page 29 of 78
 Light pen
 Light pen and stylus- A light pen, also called a selector pen, is a
computer input device in the form of a light-sensitive wand used in
conjunction with a computer's CRT display. It allows the user to
point to displayed objects or draw on the screen in a similar way to a
touch screen but with greater positional accuracy

 2. Scanning devices

 -These are devices that capture data directly into the computer.
 -They can also be defined as devices that use a magnetic or photo-electric source
to scan and convert images into electric signals that can be processed by an
electronic apparatus, such as a computer.
 Uses of Scanning Devices
 Scanning devices are commonly used to:
 -Convert a text document into an electronic file;
 -Convert a photograph into an electronic graphic file;
 -Sense an image to be sent over a voice frequency
 -Circuit, such as a fax machine;
 -Reproduce text and images, as with a copier.
 Classification of scanning devices Scanners are classified according to
 technology used to capture
data namely: optical and
magnetic scanners. Optical
scanners- these scanners

 capture data using optical or


light technology
(a) What are computer scanning devices? (2 marks)
These are devices that enter (capture) data into the computer directly.
Name the type of scanner used: (2 marks)

Advantages and disadvantages of using this method of data input

Advantages
 Voice input is fast

Page 30 of 78
 Its suitable for people with special needs especially those with impaired hands -
Can be used in emergency situations

Disadvantages
 Voice input is complex to develop
 Voice input does not take care speech related problems such as accents, tone etc
 The response rates of speech input devices are relatively slow
 Most speech input devices can recognize a limited, standard vocabulary of spoken
words, and the voice of only one speaker
 Cannot differentiate words that have same sounds (homophones)

(c) Areas where speech input would be used


 For people with special needs or disabilities (e.g. the handicapped especially those
with impaired hands.
 Emergency situations
 Where faster data input is required
 In language translator or programs
 Voice tags for voice dialing
 In automated materials handling e.g. in airports, a good handlers give spoken
commands that direct the luggage to the appropriate conveyor belt.
 For house/ office or car security where voice activated locks are used for access
control
 In voice- activated toys and games
 In electronic funds transfer

(a)Computer bus
 It is a communication path/ medium within the computer that connects the basic
computer components. It allows different elements or sections of the computer to
communicate with each other.

Page 31 of 78
 A parallel collection of conditions that carry data & control signals from one element to
another

(b) functions of each of the following computer bus


Data bus-
Carries data from the processor to memory during the write operations and from memory
to the processor during the read operations
Address bus-
it conveys addresses, i.e it carries the address of the memory location or device to be
acted on by the processor
Control bus-
it carries the timing & control signals necessary to coordinate the activities of the entire
system

Computer Motherboard
 This is the electronic board where all electronic components such as processor,
memory chips, BIOS, bus connections etc are assembled
Components found on the computer motherboard are:
 Processor (CPU)
 SIMM/DDR sockets
 Memory chips
 BIOS
 Interface chips
 Buses

Computer Drive
A drive is a computer device for reading data from or writing data into a storage media,
e.g. a tape or disk

(b) Types of computer drives


Hard disk drive (HDD) - Floppy Disk drive (FDD)

Page 32 of 78
CD- ROM drive - DVD – ROM drive
Tape drive - Zip drive
USB port – for flash disk

Examples of auxiliary storage devices are:


 Magnetic tape
 Floppy disk
 Cassette tapes
 Hard disk
 Zip disks
 Jazz disks
 Flash disks
 Video Compact Disk (VCD)
 Digital video Disks (DVD‟s)
 Punched cards
 Optical discs (e.g., Compact Disks LS- 120 super disks, optical card, optical tape)

Magnetic disks
Floppy disk- The term usually refers to the magnetic medium housed in a rigid plastic
cartridge measuring 3.5 inches square and about 2millimeters thick. Also called a "3.5-inch
diskette," it can store up to 1.44 megabytes (MB) of data. Although many personal computers
today come with a 3.5-inch diskette drive pre-installed, some notebooks and centrally-
administered desktop computers omit them. Floppy disk requires floppy drives (shown below)
to read and write.
Disk platter - A hard-disk platter (or disk) is a
component of a hard-disk drive: it is the circular disk
on which the magnetic data is stored. The rigid nature
of the platters in a hard drive is what gives them their
name (as opposed to the flexible
materials which are used to make
floppy disk). Hard drives typically
have several platters which are
mounted on the same spindle. A
platter can store information on
both sides, requiring two heads per platter.

Page 33 of 78
The Compact Disc, or CD for short, is an optical disc used to store digital data. It was
originally developed to store and play back sound recordings only, but the format was later
adapted for storage of data (CD-ROM), writeonce audio and data storage (CD-R), rewritable
media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD),
PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio players have been
commercially available since October 1982. Have a storage capacity of
700MB or 80 minutes of continuous play. Compact Disc

DVD/Digital Versatile/Video
Disk
Is an optical disc storage format,
invented and developed by Philips,
Sony, Toshiba, and Panasonic in 1995,
DVDs offer higher storage capacity than
Compact Discs while having the same
dimensions: Have a storage capacity of
4.7 GB or 2 hours of continuous play, up to 20 GB.

The modern DVDs are called a Blu-Ray Disk

Blu ray DVD HD DVD and HD DVD- In 2006; two new


Optical tape formats called HD DVD and Blu-ray
Disc were released as the successor to
Is a medium for optical storage generally DVD. HD DVD competed
consisting of a long and narrow strip of unsuccessfully with Blu-ray Disc in
plastic on to which patterns can be written the format war of 2006–2008. A dual
and from which the patterns can be read layer HD (high definition) DVD can
back. It can host at least 100 MB of data. store up to 30GB and a dual layer
Mostly used by cameras to store images, Blu-ray disc can hold up to 50GB
sounds and data.

Optical Cards
Optical memory cards use a technology
similar to the one used for music CDs or CD
ROMs. A panel of the "gold colored" laser
sensitive material is laminated in the card and
is used to store the information. Can store
from 4 - 6.6 MB

Optical tape Optical card and reader

Page 34 of 78
Flash disks- A USB flash drive is a data storage device that includes
flash memory with an integrated Universal (USB) interface. USB flash
drives are typically removable and rewritable, and physically much
smaller than a floppy disk. Most weigh less than 30 g. As of September
2011 drives of

256 gigabytes (GB) are available. Storage


capacities as large as 2 terabytes are planned, with steady improvements in
size and price per capacity expected.

Memory card- A memory card or flash card is an electronic flash


memory data storage device used for storing digital information. They are
commonly used in many electronic devices, including digital cameras,
mobile phones, laptop computers, MP3 players and video game consoles.
They are small, re-recordable, and able to retain data without power. Their
storage capacities range from 32MB up to 2TB (terabytes). Memory cards
are classified according to physical sizes, storage capacity and speed classes called SD- Secure
Digital this is a non-volatile memory card format for use in portable devices. There is the Full
SD, Mini SD and Micro SD.

Difference between
(A)Primary and secondary storage
 Primary storage devices are accessed directly by the CPU, while secondary
storage is not .
(B)Fixed and removable disks
 Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
 Removable disks are not hosed inside the system unit & are portable, e.g. floppy
disk,
Jazz disk, Zip disk, flash disk, CD- R, CD – RW, DVD

(C) Hard disk and flash disk


(i) Hard disk
A fixed storage device housed inside the Computer System Unit
(ii) Flash disk
A high capacity plug-in portable storage device. Usually attached at the USB port of the
computer

Page 35 of 78
Disadvantages of floppy disks as storage devices

 Floppy disks are slower than hard disks


 Highly affected by viruses
 Low storage capacity
 Not reliable
 Affected by environmental factors, exposure to sunlight, magnetism and dirt

Advantages of using hard disks as medium of storage


 They provide permanent storage of data
 They have a large storage capacity
 Are cheap per unit of storage
 Are rewritable (provide read & write facilities)
 Are very fast compared to other secondary storage devices in terms of data
transfer
(b) Precautions you would take to avoid damaging the hard disk ( 3mks)
 Do not drop the disk drive
 Do not expose it to strong heat
 Do not expose it to dust/ smoke particles
 Do not unprocedurally switch off the computer

RAM and ROM


RAM is a temporary and rewritable memory, while ROM is a permanent and read only
memory.
Hard disk and floppy disk
Hard disk is a hard metallic platter used to store data and is encased in a metallic housing
(casing)
Hard disk is metallic. Shinny and non- flexible

Magnetic and optical storage media

Page 36 of 78
In magnetic storage media, data is recorded using magnesium, while in optical storage
media data is recorded using a beam of light (laser)

Hardcopy and softcopy output


Hardcopy is printed copy, e.g. printout on paper such as letters while softcopy is
intangible information e.g. screen display or music.

MICR and OCR scanners


MICR uses magnetic technology to read magnetic characters, while OCR uses laser/ light
technology to read characters
Explain four rules for handling magnetic disks
Keep magnetic away from excessive heat. This is because heat energy weakens the
ability of the magnetic media to store data.
Store the media in their cases when not in use in order to protect/ safeguard their
recording surfaces against environmental influences such as dust, touch, direct sunlight,
radiations, etc
Do not drop the disk on the ground
Never bring them near moving or strong magnetic bodies. Such bodies might
demagnetize the recording surfaces making recording in terms of magnetism impossible
When mounting the media into its reading/ writing unit, avoid brushing the recording
surfaces against the mechanical components of the drive
Put on the power before mounting the media and off after removing the media from the
drive.
This is because; the fluctuation in power might cause demagnetization

(a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per
surface, and 512 bytes per sectors
No. of sectors = (2 sides x 6 sectors)
= 12 sectors
If 1 sector = 512 bytes
(12 x 512) = 6,144 bytes

Page 37 of 78
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB

(b) A double – sided disk contains 40 tracks on each side. The tracks are divided
into 9 sectors of 512 bytes each. What is the total capacity of the disk in megabytes?
( 2mks)
Total tracks = (40 x = 80
2)
Total sectors = (80 x
= 720
9)
Total bytes (720 x 512) = 368,
640 bytes

If 1 = 1,048,
MB 576
bytes
368,
?
= 640
bytes
368,
640
1,048,
576
0.352
= MB

By giving examples, differentiate between primary and Secondary Computer


storage
(3
mks)

Page 38 of 78
Primary Memory Secondary Memory

Used for holding data & instructions Used for storing backup information
required immediately by the CPU that is not needed immediately by the
It is accessed directly by the CPU CPU.
Provides fast access to information is It is not accessed directly by the CPU
accurate & reliable Provides slow access of information
It is expensive per bit of memory dues Secondary storage devices are cheap
to the technology involved it has high storage capacity
It has low/ limited storage capacity It is non- volatile i.e. stores data
It is volatile & therefore it is used to permanently.
store temporary programs & data E.g. punched cards, magnetic tapes,
The speed of the processor depends on floppy disks, hard disks, etc
the size & type of primary
storage
E.g. Read Only Memory (ROM) &
Random Access Memory (RAM)

Page 39 of 78
SOFTWARE
Computer software

The term software refers to a set of computer programs. Its function is to guide the
computer in its operations. Software can be classified according to purpose or
acquisition.

Classification according to purpose:

Computer software may primarily be designed to manage the hardware resources or to


help the user accomplish specific tasks. Therefore software may be classified as either
system or application software.

System software

System software performs a variety of fundamental operations that avails computer


resources to the user. These functions include:

1. Booting the computer and making sure that all the hardware elements are working
properly.

2. Performing operations such as retrieving, loading, executing and storing application


programs.

3. Storing and retrieving files.

4. Performing a variety of system utility functions.

System software is further divided into:

1. Operating system. 2. Firmware.

3. Utility software. 4. Networking software.

The operating system

Page 40 of 78
This is a set of complex programs that work together to control execution of user programs
called applications and acts as a go between (interfaces) between the applications of the
computer hardware. It manages input/output and storage operations in a computer.
Examples of common operating systems are Microsoft Windows 95/98/2000/XP, UNIX,
Linux, Macintosh (Mac OS) and OS/2. What type of operating system software do you use
in the computer laboratory?

Therefore the operating system is the main program on the computer system.

Definition of the Term: `operating System

Operating System is a set of programs available within the system software


that standardizes the way a computer's resources are made available to the
user and to applications software.

Functions of an Operating System

The following functions are identified as common to all Operating Systems:

 Memory Management

An Operating System allocates memory to itself and to its resident system


programs, sets aside areas of application programs and user partitions,
arranges the input and output buffers (areas on RAM where input data and
output data are temporarily stored) and reserves storage for specialized
purposes.

 Input/Output (I/O) Management

The Operating System controls reading of data coming in from the various
input devices into the memory and writing of data to output devices such as
printers.

The Operating System will ensure that each time the user types in commands
those inputs are accepted into the memory, and if the latter is busy the it
holds the same temporarily on b uffers until the memory is free and also does
the same to output data awaiting to be displayed on the monitor or to be sent
to the printer if the same are busy.

 Resource Allocation

Operating System load programs into the computer memory and starts them
running after receiving instructions from the user, at the same time, operating

Page 41 of 78
systems must have ability to divide resources available to different users,
memory and of course the peripherals to different processors going on at the
same time so that none of the users gets "stuck" or "deadlocked" during the
operation for lack of a computer resource.

 Error Handling

Any Operating System must have the ability to handle errors in the computer
system be it hardware or software faults and be able to provide routi nes to
correct these errors.

 Provision for User

Interface Any Operating System should have the ability to receive commands
from the user and respond to them accordingly.

 Interrupt Handling

An interruption could be caused by software errors, mechanical faults of a


machine or by the operator by pressing the Break key for example which
halts the system. The operating system should always be able to handle such
interrupts without causing any malfunctions as a result.

Types of Operating Systems

There are majorly two types of Operating Systems that we will discuss in this
section.

1. Single User System

In this type of Operating System, only one user can use the machine at a
time, load one program at a time in the main memory and process only that
one program. Most of the small microcomputers employ single user systems.
Examples are Ms-DOS, Pc-DOS and Windows.

2.Multi User System

This system as the name suggests is for multi user, as opposed to the single
user system.

More than one program can be loaded int o the main memory by different
users and processed at the same time in an interactive manner. Examples of
such an operating system are UNIX and Windows NT.

Page 42 of 78
Firmware

Firmware, also referred to as stored logic is a combination of both the software and
hardware recorded permanently on electronic chips. Usually, a firmware is a read-only
memory chip that is mounted or plugged into the motherboard. Firmware may hold an
operating system, utility programs, language processors etc.

Utility software

Utility software is a special program that performs commonly used services that make
certain aspects of computing to go on more smoothly. Such services include sorting,
copying, file handling, disk management etc. The two basic types of utility software are:

Networking software

This type of software is mostly used to establish communication between two or more
computers by linking them using a communication channel like cables to create a computer
network. Networking software enables the exchange of data in a network as well as
providing data security. Network software may come as independent software or integrated
in an operating system. An example of networking software is novel Netware.

Application software

Application software, also called application packages are programs that are designed to
help the user accomplish specific tasks.

Table below gives examples and uses of common application packages

Software Uses Examples

Word Typing documents Ms Word, Lotus


processor like

letters. WordPro,
WordStar.

Spreadsheets Manipulation of Ms Excel, Lotus


numeric data e.g. 123

Page 43 of 78
calculating
budgets.

Desktop Designing Adobe


publications PageMaker,

Publisher like newspapers, Ms publisher.


books.

Computer Technical AutoCAD. Paint


aided drawing.

Design

Databases Keeping records Ms Access,


and Dbase.

files.

Graphics Creating and Corel Draw,’


software Adobe

manipulating Photoshop.
pictures.

Criteria for selecting a computer system

The task of determining a suitable computer system for an individual or organisation is not
easy. A good computer system must meet all the requirements of the user. Therefore,
before selecting the computer system to implement, it is advisable to do an analysis of all
the requirements necessary in order to avoid acquiring a system that may disappoint the
users.

Requirements analysis for selecting a computer system should cover the following:

1. Identifying all user requirements.

2. Evaluating hardware requirements that will meet the users needs.

Page 44 of 78
3. Evaluating software requirements that will meet the users needs. The computer
hardware and software to be acquired should therefore be able to meet all needs of the
data processing environment that, they are intended for effectively.

USING A COMPUTER
The Computer Keyboard
Alphanumeric Functional Special PC operation keys
keys keys

Cursor movement and editing keys Keypad keys

Page 45 of 78
Classification of the keyboard keys/ Parts of the keyboard

Page 46 of 78
Summary of keyboard keys and uses

Multiplication * Multiplication
sign

Page 47 of 78
Subtraction - Subtraction
sign

Division sign / Division

Equal sign = Equal

Addition sign + Addition

Hyphen sign __ Hyphen

N/B: ToggleKeys are designed for people who have vision impairment or cognitive disabilities. When
ToggleKeys are turned on, your computer will provide sound cues when the locking keys (CAPSLOCK,

Right/ALT Mouse Poi moving the mouse pointer to the


Button designated
nti
Scrolling
target used to move hidden text
and down the screen
wheel up of an active window.

Mou
se

Left Mouse M J Tra


Button o o ck

NUMLOCK, or SCROLLLOCK) are pressed. Hold the num lock for five seconds to activate.

MOUSE
 -Clicking- this is pressing the left button of the mouse once to execute a
command -Double clicking- clicking the left button of the mouse twice in quick
succession. Used to start an icon
 -Drag and drop-this involves clicking on an icon, dragging it, and releasing the
button.
 Used to move and resize objects

Page 48 of 78
 Terminologies associated with the use of a mouse
 Clicking: This means pressing and releasing the left mouse button once. A click
often selects an object.
 Double clicking: This means pressing the left button twice in quick succession.
Double clicking usually opens a file or starts a program
 Right clicking: Pressing the right hand side mouse button once displays a list of
commands from which the user can make a selection. This list of commands is
called a shortcut menu or context sensitive menu. It is called a context sensitive
menu because the commands on it apply to the right clicked item.

 Drag and drop: This is whereby the user drags an item from one location on the
screen to another. The procedure to accomplish this operation is as follows:

 1. Point to the item you want to drag.
 2. Press the left hand side mouse button and hold it down
 3. Slide the mouse until the pointer reaches the desired position on the screen.
 4. Finally release the mouse button and the item will be dropped in the new
location.

Logging in and out


The first steps:
Turning the computer on (BOOTING):
o connect all the components then plug in the power cord into the wall socket
o press the power key to turn on the computer

LOGGING IN
o login using your username and password if it is password protected

• Turning off the computer:

• press , then options:


 Stand by
 Turn Off
 Restart (the key Reset on the computer case has the
same function) – turns the computer off and then on
again

Page 49 of 78
Navigating widows
To open the Help function:
 Click with the left mouse button on the Start menu and then choose Help. The following
window will open:

• In the blank field next to the word “Search” enter the name of the tool or term you need
help with and press the left mouse button on the arrow “next” or press
“Enter”

The Desktop

• is always in the background.


• users can adjust the outlook of the desktop in many ways
• it contains: the Start button , icons and the taskbar.

Page 50 of 78
Start: to begin working on the computer, click with the left mouse button on the Start button.
A menu with submenus will open

Page 51 of 78
in the left column of the Start menu you can find:
 shortcuts to installed Internet browsers (programs that search
the Internet and enable viewing of web pages), examples of these shortcuts on the picture are
Mozilla Firefox and Internet Explorer; software for sending and receiving electronic mail (e-
mail), an example of this kind of software on the picture is Mozilla Thunderbird
o shortcuts to the most frequently used applications, examples on
the picture are:
FileZilla, Media
Player Classic,
Notepad, etc.

o All
Programs – the
menu that lists
all installed
programs
enabling you
to run the
desired
software

in the right column


of the Start menu
you can find:
o My
Documents –
the default
folder for user
files
o o My
Recent
Documents –
the list of
recently used
files
o My Pictures – the default folder for user pictures

o My Computer – browses the


computer for folders and files

o Printers and Faxes – enables viewing of installed printers and faxes


o Control Panel – this panel provides all options for managing the computer (display,
sound, add or remove program etc.) o Help and Support

Page 52 of 78
o Search – searches the computer for a file or folder o Run – runs applications by
entering the name of the application (.exe) o Log off – logs off the user, but does not
shut down the computer o Turn Off Computer – options: shut down or restart the
computer

Icons:

• These are images that represent applications, program shortcuts, folders, or files
• predefined Microsoft Widows icons are: My Computer, My Documents and the Recycle
Bin
• most frequent icons: folders, applications for text editing (OpenOffice.org Writer,
Microsoft Word)

Working with icons

• Selecting icons: position the mouse pointer (cursor, arrow) over the desired icon, press
and release the left mouse button; the icon will become colored meaning that it is selected
Moving icons (the drag-and-drop method):
1. press and hold down the left mouse button on the desired icon
2. drag the icon to the desired position
3. release the left mouse button
• Opening an icon:
o double-click on the icon with the left mouse button, or o select the icon and press
Enter

Page 53 of 78
Shortcuts to programs or files

This is an icon for a file in the PDF format named syllabus


• double-click on the shortcut with the left mouse button in order to open a file or start a
program
• shortcut icons have an arrow within the white square in the lower left corner
• its size is 1 kb; you can delete shortcuts without consequences to the program or
document that the shortcut points to
• creating a shortcut:
1. press and hold down the right mouse button on the icon of the application,
folder, or file
2. drag the icon to the desktop using the mouse and release the right mouse
button
3. choose the option Create Shortcut Here

Taskbar:

• it is located on the bottom of the desktop


• shows running programs, open folders and files;
• can be moved, hidden
• has an area called Quick launch to place shortcuts of favourite applications

Windows
• folders and files open within a window, some programs open in full screen (games for
example)
• window elements:
1. Title bar
2. Menu bar
3. Toolbar
4. Status bar
5. Side bar – horizontal and vertical
6. Buttons: minimize, maximize (restore) and close

Page 54 of 78
• Moving a window:
o press and hold down the left mouse button on the windows title bar, move it in a
desired direction, release the mouse button (the drag and drop method)

• Resizing a window:
o Position the mouse pointer over the edge of the window, press and hold the left mouse
button, change the window size as you please, release the mouse button

o buttons in the upper right corner of the window:


Minimize: minimizes the window placing it on the taskbar

Page 55 of 78
Maximize: resizes the window to cover the entire desktop

Restore: restores the window to the size it was before


maximizing it

Close: closes down the program or folder

• Working with multiple windows o you can have more than one window open, but only
one active
o the active window has a highlighted title bar which is greyed out when inactive
o you can activate a window by pressing on it with the left mouse button

o when on the taskbar, you can activate the window by pressing the left mouse button
on its slot

Data organization on the computer

Data storage devices:

• Hard Disk
• Floppy Disk
• CD, DVD
• USB Stick
• online data storage device
Working with data storage devices within Windows XP
• Start > My Computer – the window displaying data storage devices:

Page 56 of 78
• Each device has an appropriate icon, title and letter within the brackets (A, B, C, D, E...):
A - Floppy disk
C – usually a system disk- the disk the operating system is installed on

D, E - usually assigned to CD, DVD, DVD-ROM or CD-RW

Page 57 of 78
o there can be more than one disk drive in the computer and one disk drive can be
divided into several partitions
o if there is more than one disk drive in the computer, or more than one partition on the
hard disk drive, the letters usually assigned are:
A - Floppy disk

C - usually system disk – the disk the operating system is installed on


D – usually the letter for another partition or the hard disk drive
E, F- usually assigned to CD, DVD, DVD-ROM or CD-RW

Files and folders


• Data on the computer is placed within files. A file is a set of digital data representing
specific content (text, image, video, program)
 defined by a name and an extension
 the extension indicates a file format (files containing images -. jpg, text
documents - .doc or .odt, sound -. mp3)
o files are placed in folders

 a folder (directory): a container files or other folders are placed in. You
can create files and folders within a folder in order to better organize data
 a folder can contain subfolders which can have their own subfolders and
they can also contain subfolders ... – a branching map

Page 58 of 78
 path - the path to a desired folder or file

• If you choose the Folders tool in the folder window:


o you get the Windows

Explorer view

o the hierarchical structure of folders appears on the left side

Working with files and folders within Windows Explorer


• displays the hierarchy of folders
• Start > All programs > Accessories > Windows Explorer; or press the right mouse button
over the Start button and on the quick menu choose Explore working within the left
pane of the window: o displays entire folder structures enabling easier navigation o +
folders can be further branched o – folders are branched out
o press the left mouse button on a folder and in the right pane of the window folder its
content will be displayed

• working within the right pane of the window:

Page 59 of 78
o folders will open if you double-click on them o when Detailed view
is selected, several informational columns will be shown:

 Name – lists files and folders by name


 Size – shows the size of files and folders on the disk
 Type – shows file type (text file, spreadsheet, picture, video etc.)
 Date Modified – shows the date when the file was last modified
 Status bar – located on the bottom of the window; provides information
about the file or folder
Creating folders and subfolders
• Windows Explorer: within the left pane of the window select the folder you want to
create a subfolder in and:
o on the menu bar select File, then New > Folder > enter a name > press Enter; or
o press the right mouse button within the right pane of the window > New > Folder >
enter a name > press Enter

Displaying the name, size and location of a folder and subfolder


• the view can be changed by choosing the tool View; the options are:
o Thumbnails
o Tiles (on the image below)
o Icons o List
o Details

Page 60 of 78
Page 61 of 78
• each file has its own properties:
o press the right mouse button on the file and on the quick
menu select the Properties option
o it displays the location, size, creation date, date modified,
author etc.

Files and folders can be hidden:

• press the right mouse button on the file and choose Properties; on the tab General mark
the checkbox next to Hidden, press the Apply button and then OK
• the dialog box Confirm Attribute Changes appears with the following options:
o Apply changes to this folder only
o Apply changes to this folder, subfolders and files

Page 62 of 78
• Hidden files and folders can be made visible: o on the Tools menu choose Folder
Options; on the tab View select Show hidden files and folders; press the Apply button and
then OK

To show the file extension

• files have extensions that define the file type and determine the application that will open
the file. The extension is placed after the name, separated by point
• to display the file extension: on the Tools menu choose Folder Options; open the tab
View and unmark the checkbox next to “Hide extensions for known file types”. Confirm
the change by pressing the Apply

button and then

OK

Page 63 of 78
To change a file status
• files can be opened, modified and deleted if their properties allow it
• change the file status to read only: select the tab General, press the left mouse button over
the box next to the Read Only attribute, confirm the change by pressing the Apply button
and then OK
• when you want to change the file status back, press the left mouse button over the same
box and the box becomes empty again, confirm the change by pressing the Apply button
and then OK

Most often used files:

OpenOffice.org suite Extension:

text document: Writer .odt

create and view presentations: Impress .odp

work with spreadsheets: Calc .ods

Extension:
Microsoft Office
2003 2010 version
version

text document: Word .doc .docx

create and view presentations: PowerPoint .ppt .pptx

work with spreadsheets: Excel .xls .xlsx

More applications: Common


extension:

Page 64 of 78
audio file .mp3

image .jpg

video file .mpeg

compressed file .zip

executive file .exe

Renaming files and folders


• press the right mouse button over the file, on the quick menu choose the option Rename,
enter the name and press Enter
• be careful not to change the extension, or you might not be able to open the file

Selecting files and folders


• selecting one file: press the left mouse button on the file
• selecting a number of sequential files – press the left mouse button on the first file, press
and hold the
Shift key and press the left mouse button on the last file, then release the Shift key

• selecting a number of files that are not sequential – press the left mouse button over the
first file, press and hold Ctrl and then press the left mouse button over other files or
folders you want to select, then release the Ctrl key
• selecting all files within a specific folder: on the Edit menu choose the option Select All
(keyboard shortcut Ctrl + A)
File count
• to count files within a folder: press the right mouse button on the folder > Properties> and
see the files and subfolders the folder contains
• count the same file type: View > Details > Display Type> Check files of the same type>
you can find the number in the status bar

Copying files and folders:


1. select the file or folder you want to copy
2. press the right mouse button and on the quick menu choose the tool Copy

(Ctrl + C)
3. position the cursor to the place you want to copy the content to

Page 65 of 78
4. press the right mouse button and on the quick menu choose the tool Paste
(Ctrl + V) Copying via drag and drop method:
1. select the file or folder you want to copy
2. over the selected file or folder press and hold down the left mouse button and then
press and hold down the Ctrl key
3. “drag” the mouse pointer to the place you want to copy the content to
4. release the mouse button and then release the Ctrl key

Moving files or folders:


1. select the file or folder you want to move

2. press the right mouse button and on the quick menu choose the tool Cut
(Ctrl +X)
3. position the cursor to the place you want to move the content to

4. press the right mouse button and on the quick menu choose the tool Paste
(Ctrl + V)
Moving via drag and drop method: the same as copying, but without the Ctrl key- just apply the
drag and drop method.

Deleting files and folders


• Windows Explorer > within the left part of the window select a folder containing files or
folders you want to delete > in the right window select the file or folder and on the File
menu choose Delete
• right-click on the folder or file and on the menu select Delete
• press and hold the left mouse button over the file or folder you want to delete, drag the
cursor to the Recycle Bin and release the mouse button (drag-and-drop)

Restoring files and folders


• deleted files and folders are moved to the
Recycle Bin
• options:
o Empty the
Recycle Bin

o Restore all items

Page 66 of 78
• restoring a file: press the right mouse button on it and on the menu choose Restore

Compressing files and folders

• compression reduces the space the data occupies on the disk o right-click the file or folder
and select the command Send to > Compressed (zipped) Folder o a compressed folder or
file is created with the same name as the original and with the letter Z on the

icon

o to add files and folders use the drag-and-drop method o programs for compression are:
Win Zip, WinRar

Decompressing files and folders (extract)

• in order to modify compressed files and folders you need to decompress them first

Page 67 of 78
o right-click over the compressed folder or file > select a decompressing program >
specify the location you want to save the folder in

Search for files and folders

Page 68 of 78
• you use it when you want to find something you saved, but you do not know the location
you saved it in
• Start > Search > choose what you are searching for (picture, music, video, documents,
printers…)

Sorting data

• possible by using the view Details (on the image below)

o next to the sort criteria is a gray triangle showing whether the data is sort in an
ascending or descending order o sorting criteria:

 Name Type
 Size Date modified

MANAGING PRINTING

Page 69 of 78
Change the default printer

• if there are multiple printers, only one is default; documents will print on the default
printer unless you choose another printer in the print dialog
• changing the default printer: Start > Printers and Faxes > select printer > press the right
mouse button > Set as default

Installing a new printer to your computer


• Start > Printers and Faxes > Add printer, or
• use the installation CD provided with the printer

Printing documents from a text editing application

Page 70 of 78
• on the File menu choose the
Print option; enter the desired
settings (number of copies,
print page range) and press
OK

o when printing, the printer


icon appears in the low
right corner of the taskbar
> double-click with on it
the left mouse button to
open the print jobs dialog

o to pause or cancel the print


job: double-click on it
with the left mouse button
to open print jobs dialog,
select the job you wish to pause or
cancel, press the right mouse button and choose Cancel or Pause

Working with programs within the operating system Windows XP

• Start > All Programs


> Accessories:
o Paint – the
program for
drawing,
painting and
simple photo
editing
o Notepad – the
program for
text editing
with basic
formatting
o Calculator

Page 71 of 78
Working with programs for text editing (OpenOffice.org Writer, Microsoft Office Word)

• when saving a document for the first time: on the File menu select Save as; in the dialog
box that appears specify the location you wish to save the file in (Save in), enter the
filename and then click the Save button

Formatting removable media (floppy disks, memory stick)

• formatting media prepares media for use and if there was any data on
the media, it was deleted after formatting
• in the My Computer window, right-click on the disk you wish to
format, press the right mouse button and select the option Format and
then press the OK button
• it is advisable to make a copy of data before formatting media

Antivirus programs (Norton, McAfee, Sophos, free-av)


• programs that are used for protection against computer viruses
• antivirus programs need to be updated regularly. It can be done
automatically or manually. The icon of the installed antivirus program
is placed in the lower right taskbar corner, right-click on the icon and
there is an option for updating the program on the menu

Using Print Screen

• Print Screen is used when we want the picture currently on the monitor to be saved as an
image
1. Press the PrtSc button (full name: Print Screen) on the keyboard
2. Open an application for image editing, like Microsoft Paint, paste the image into the
application, edit the image, choose the name and the location you want to save the
image in

CONTROL PANEL
• The Control panel is a panel enabling access to all settings available for maintaining or
tuning our PC. You can access it through the icon placed on the Start menu

Page 72 of 78
• views:
o Category view
o Classic view

Getting the basic system information: double click on the icon to open system
properties.

Page 73 of 78
To set the date and time:
• Start > Control panel > Date and
Time; or: doubleclick on the clock
in the lower right corner of the
taskbar
• after setting the time and date,
press the Apply button and then OK

Change the desktop background


• any image stored on the computer can be set as a desktop background
• to set an image as a desktop background: go to the Control Panel and double click the
Display icon, or
• press the right mouse button anywhere on the desktop (not on an icon!) and choose the
option Properties from the quick menu (shown on the image below)

Page 74 of 78
o the Display Properties icon contains several tabs, on
the Desktop tab choose an image for the desktop
background, press the Apply button and then OK
o you can also Browse and find any image stored on
the computer and set it as a desktop background
image

Setting the Screen Saver

Page 75 of 78
• by using dynamic images, the Screen Saver protects
the monitor; it turns off when the mouse is moved or
any key on the keyboard is pressed
• in the Control Panel, open the Display icon with a
doubleclick, select the Screen Saver tab, choose one
of the listed screen savers. In the field Wait choose
the period of time the computer has to be unused for
the Screen Saver to activate. After entering the
changes,
press the
Apply button
and then OK
Change the
screen
resolution
• the screen
resolution
depends on
the quality of
the monitor and graphics card
• resolution determines the quality of the displayed
image on the monitor. Better resolution means better
image quality
• in the Control Panel open the Display icon and on
the tab Settings there is an option for Screen Resolution with a sliding bar – move the
slider. After you have chosen the resolution, press the Apply button and then OK.

Change the keyboard language layout

• the Windows operating system has support for a number of official languages
• in the Control Panel, open Regional and Language Options> Languages> Details if
there is no keyboard layout offered for your language, choose the option Add

Uninstall a program

• in the Control Panel open the Add / Remove icon, select the program you want to remove
and select the Remove button

Page 76 of 78
Installing new programs
• new programs can be installed in different ways: using a CD, DVD or any removable
media, media downloaded from the internet etc.
• to launch the installation, double-click on the .exe file usually named: setup.exe or
install.exe
• after starting the installation, the installation wizard appears. Follow the instructions,
enter the license key if necessary and press Finish.

Page 77 of 78
Adjusting the sound and speakers is possible through the Sound icon found in the Control Panel.
Double-click the Sound icon and a window with sound options will appear.

Page 78 of 78

You might also like