Computer Applications-1-1
Computer Applications-1-1
Advantages of computer
Computer is very accurate in performing any task
Computer is very flexible
Computer can tackle huge volume of data efficiently
Computer is automatic
Out put of a computer is presentable
Computer records are more secured than manual
Disadvantages of computer
Computer is relatively expensive
Computer technology change too often
Installation of Computer require retraining staff
Computer is prone to failure
Computer cause job displacement
Data
a) is a general term that denotes all facts, letters, symbols, figures, multi-media, graphics
that refer to or describe an object, idea or define a situation or condition
b) elements of information that can be processed by e computer
Information
a) Data that has been put into meaningful and useful context and communicated to the
recipient who uses it to make decisions
b) Consists of data, images, texts, documents, video clips, still pictures, voice, graphics
etc organized into a meaningful context
TYPES OF COMPUTERS
Can be categorized according to :
1. Computer generations (classification by age)
2. Classification by size
3. Classification by technology
4. Classification by purpose
a) First Generation
The are the earliest computers which were in use from around the mid 1950’s to late 50’s
They used big physical devices in them. Used vacuum tubes to process data all programs
were written in machine language. It was programmed manually using switches. These
computers used electronic valves like the ones used in radios and television.
Second generation
More reliable, smaller in size, powerful machines than the first generation. Used
transistors which replaced the vacuum tubes. Transistors were smaller, cheaper, lesser
power consumption and heat production rates. They were expensive machines and only
large organizations could afford. and silicon –based. Programmers could use high level
programming language e.g. Fortran, Cobol, for development of commercial based
business applications. The speed increased to 200,000 instructions per second and the
memory was about 32kb
Third generation
More powerful, reliable and compact computers using simple integrated circuit (ICs). ICs
are transistors etched onto a substrate bundled together. This allows thousands of
transistors to be packed together efficiently. This also made computers small comprising
of semi conductor memory cells and interconnections manufactured on a semiconductor
e.g. silicon was divided into chips. These chips were packaged together with pins and
assembled on a printed circuit board.
Microprogramming was used extensively to simplify the design of processors and
increase their flexibility
Operating system and the processor, he techniques of concurrent and parallel processing
were introduced eg multiprocessing, multiprogramming, pipelining.
Methods for automatic sharing of facilities or resources of a comp were introduced.
Fourth generation
The computers in use today, contain more sophisticated microelectronic devices such as
complex integrated circuits, which are classified as “ large scale integration or very large
scale integration. Networks, use of optical disks & magnetic disks were introduced
Programmers could use object oriented languages such as c++, Pascal , c etc
Fifth generation
Development of computers able to converse with people in a human like manner and able
to mimic human senses, manual skills and intelligence..... artificial intelligence, symbolic
processing. They also use very large scale integrated circuits
2. CLASSIFICATION BY SIZE
Super computers
These are very expensive, ver fast, and the most powerful computers in the world. They
are quite are as they are mainly used in scientific research stations such as in nuclear
stations and weather forecasting stations
Mainframes
They are the large and very powerful computers. They can serve hundreds of people
(multi-user system) and do many jobs at the same time. They have extensive processing,
storage capabilities
Mini computers
These are smaller and less powerful that mainframes. Several people can also use them
from different locations at the same time. Used for medium scale tasks which can not
utilize fully the main frame
Microcomputers
Are the smallest but most important for the end users
Also known as personal computers (PC’s). Can be used as standalone computers or in a
networked environment as terminals. They come in various sizes and shapes for a variety
of purposes. Or based on their use, they include home, personal, professional,
workstation and multi-user
Desktop computers
Laptop computers
Notebook computers
Palmtop computers
COMPONENTS OF A MICROCOMPUTER
Input components
Central processing components (CU, ALU, Main Memory & Register)
Output
Buses
Registers
Storage devices
3. CLASSIFICATION BY TECHNOLOGY
Digital computers
Operations are based on two or more discrete states, binary digital computers are based
on two states a logical “on” and “off’ represented by two voltage levels of 0 and 1. These
arrangement of zeros and ones are used to represent all kinds of characters such as
numbers, letters, graphics, symbols and graphic instructions.
Analog computers
Are used in measurement of quantities such as thermometers and voltmeters with pointers
on circular dials
These computers measure data varying continuously in value such as speed, temperature,
voltages, frequency, pressure, humidity etc
Hybrid computers
Is a combination computer using all qualities/features of both the analog and digital
computers. eg petropumps
CLASSIFICATION BY PURPOSE
Special purpose computers
Are designed for a particular job only; to solve problems of a restricted nature (a specific
problem domain). e.g. computers designed for use in petrol pumps.
COMPUTER HARDWARE
This refers to the physical, electronic and mechanical parts of the computer. They are
divided into the following categories;- input devices, processing devices, output devices,
storage devices and communication devices.
INPUT DEVICES
Used to enter data and commands into the computer system for processing.
Examples are:
a) Keyboard
b) Pointing devices i.e. mouse, light pen, digitizers, joystick, track ball and touch pads
c) Scanners/imaging i.e. Scanners, Optical Character Recognition (OCR), Optical Mark
Recognition (OMR), Magnetic Ink Character Recognition, Point of
Sale (POS)/Barcodes.
d) Terminals
e) Voice Recognition
In this system characters are made by ink containing magnetized particles are able to be
recognized by the MICR which transfers them directly into computer system
They are commonly used in banks e.g. in clearance of cheques
Advantages
Readable characters by both human and machine faster methods as far as transfer of
information is concerned (user friendly)
Accurate hence reduces chances of errors getting into the system
Disadvantages
Documents are expensive to produce
It has limited application in practice
It needs some manual key boarding ie when entering the name and the amount
It needs careful handling ie no folding or stripping of cheques etc
It is a method of input involving a machine that is able to read characters . Normally done
by passing the document through the OCR which produces a beam of light changing the
characters into signals for processing.
Can be used in payment of utilities e.g telephone, water and electricity bills and mail
sorting.
Advantages
They are fast
They often read ordinary typed texts
Reduces chances of errors in the system
Disadvantages
Limited application due to the limitation of the character set
At times when the text is handwritten it is slow because it has to pass a number of
times before characters recognition
Advantage
It is accurate
It is fast
It is cost effective
Disadvantages
Requires expensive equipment
Limited business applications
(4) Terminals
Terminals are devices for transmitting or relieving data over communication channels
Terminals consists of cables, VDU(monitor),Mouse and keyboard
Functions/purposes of a terminal
Transmission of data from one location to another between computers in a local
network environment for text, data or electronic mail processing purposes
To enable users to have access to computers for firms sharing facilities either for
programmed development problem solving or processing
Ton have access to real firms system e.g. airtime reservation systems hotel bookings
etc
To provide point of sale data capture in retail outlets e.g. supermarkets
To provide access to cash outside banking hours and other banking services by means
of cash point terminals (ATM)
To support business systems e.g. online controls online entry online payroll systems.
In order to provide random inquiry etc
Types of terminals
a) Dump terminal
This is a terminal that entirely depends on a host computer for all its processing activities
and is simply installed with input/output devices ie a keyboard and a VDU
It provides a means of data entry only and viewing of the processed data
b) Smart terminals
They have efficient processing capabilities of their own to allow some editing storage etc
c) Intelligent terminals
They have efficient processing capabilities of their own and they can allow programmers
to programme.
Advantages
a) They provide a faster means of data capture i.e. scanning is faster than keyboarding
b) It is less Labor intensive
c) It reduces level of errors i.e. transcription errors are minimized
d) Provides automatic inventory updates
e) There is better customer service because its fast
Disadvantages
a) There is high initial cost i.e. the cost of installing
b) They only operate when there is power supply
BARCODES
These are physical labels which represent information regarding a stocked item e.g. the
stock no. date of manufacture date of expiry, quality, quantity, type of item cost etc
It can also be described as a set of bars or spaces which represent data and information
which is in a computer sensible form
Disadvantages
Cost of adding a label is relatively
They cannot be manipulated easily since they are not human readable
PROCESSING DEVICES
The purpose of the processing hardware is to relieve, interpret and direct execution of the
software instructions provided to the computer.
The CPU is the brain (heart of the computer) and it monitors all the computer operations
A computer fetches - decodes - executes
a) Control Unit
This is the system coordinator and coordinates all the parts of the computer system -
controlling the transfer of data to and from the various major parts.
The speed of the processor/ computer speed or the speed of which a computer is able to
process data is measured in hertz = cycles per second/ instructions per second
Eg 1mhz = 1,000,000 instructions per second ie the clock speed
Mega hertz are the units used to measure the processor speed or its clock speed
A typical modern personal computer might have a specification of 600 mhz – 2.8ghz
c) Main Memory
It is the memory found internally or within the computer.
It is used to store data within the processing unit.
NB The processing power or capacity of a computer is dictated by the capacity of the
memory.
All characters (number, letters, space, symbols), pictures or words in a computer system
must be reduced to binary digits. A binary digit is called a bit and represents either a 0 or
a I. In a computer the presence of an electronic or magnetic signal means one and its
absence signifies zero. A string of 8 bits is called a byte.
e.g. a 32 megabytes computer with an internal memory of 32 million bytes i.e. it can hold
32 million characters
It holds input data in a small area of storage temporarily which is a waiting processing
It holds output data which is already processed
It provides a working area i.e. provides a small area to hold data that is being processed
The main memory will stop programs that are used to run the computer
Functions of RAM
1. Stores data temporarily awaiting processing
2. Data currently being processed
3. Data awaiting output
4. Instructions awaiting to be obedient
5. Instructions currently being executed
b) ROM - Read Only Memory
It is a memory chip into which fixed data is written permanently at the time of its
manufacture
Features
ROM is non volatile and therefore its contents do not disappear in case of power failure
ROM only allows reading and not writing (you can only retrieve the contents of the
ROM)
It constitutes 30% of the main memory.
Types of ROM
a)Programmable Read Only Memory (PROM)
Type of memory that can be programmed only once. Gives opportunity to user to be able
to configure the setting according to its requirements
The virtual storage breaks a program into a number of fixed lengths called pages or
variable lengths called segments and this permits a very large no of programs to reside in
the primary memory
Bubble memory
This type of memory represents data and instructions within it in terms of magnetic
principles ie polarized spots (bubble)
A bubble represents a 1 or the absence of a bubble represents 0
Advantages
It is convenient and easy to develop
It can withstand adverse conditions e.g. dust and this memory does not lose data while
power goes off
It can be expanded limitless
Disadvantages
It is very expensive and sometimes has ltd. capacity
Core memory
It is an internal store, which is made up small magnetic rings which are magnetized by
the wires threaded on them.
The polarity of these magnets are sent by currents ton represent data in terms of
instructions information using ones and zeros. the core storage is usually non volatile
The polarities do not change even if power is switched off and therefore very expensive
Floppy Diskettes
This is s small flexible one disk unit coated with iron on which data is stored and it is
available on 3 sizes 31/2 inch 51/4'' , 8"
3 1/2 diskette is the most popular of the 3 it has a hard plastic covering and a metallic
shatter to cover its surface when not in use
the computers operating system performs a format operation which divides the diskette
into concentric circles called tracks and pre shaped wedges called sectors. These tracks &
sectors determine the storage and location on a diskette.
Advantages
They are portable
They are relatively cheap compared to CD Allows users to read and write on them as
many times as possible
Allows direct access
Disadvantages
They have limited capacity
Transmit virus
Hard Disk
It is made from the rigid light alloy coated on both sides with a layer of magnetized oxide
data is stored on the disk surfaces along concentric tracks
The disks rotate at a very high speed on the disk drive. (a disk drive is the input output
device used to transfer data from a hard disk and have a higher data transfer speed i.e.
3600 rotations / minute as compared to the floppy disks of 360 rotation per minute.
Reading is carried out by the read write head.
Advantages
Secure since its internally in the system
Are affordable
Are reusable – you can erase data and store again
Rotates at a very high speed. Therefore data transfer is also faster
Higher storage capacity
Disadvantages
Affected by magnetic and electrical fields
Portability is a risk – coz they are very delicate – its rigid
Incase of a virus infection, all data is lost.
Magnetic tapes
Its an 1/2 '' or 1/4 '' ribbon of plastic light material coated with a thin layer of iron oxide
The magnetic tapes store very large amounts of data. Data n is stored when the read write
head aligns the iron particles
Magnetic tapes store data serially i.e. one recorded after the other the other to get to the
data one is looking for every record proceeding it must be read.
Between each record is a space where the tape starts and stops i.e. the inter blocking gap
(IBG)
This allows the tapes to attain a proper speed before data can be read or written on , data
access is slow because the tape driven has to stop between each record.
Tapes can store large quantities of data inexpensively and so are always used as back up
storage medium.
They are reusable, erasable and durable
Magnetic tapes can take various forms
Optical Disks
They use optical technology, which uses highly concentrated beams of light to store data.
One laser beam writes to the recording surface and another reads the data from the light
sensitive recording surfaces.
Optical beams are becoming popular because they are less sensitive to environmental
fluctuations. They provide more direct access storage.
CD-ROM
It is a read only technology, meaning that all data is implanted at manufacture
The capacity of a single CD ROM is over 550 Mb
Application
Delivering of text sound pictures though a single terminal (multimedia)
WORM
Write once read many
They are more advanced than CD ROM's in that users can enter their own data and once
data has been written to the medium it cannot be erased .
CD RW
IT comprises of a magnetized recording medium sandwiched between 2 plastic disks
The content of the disk can be altered magnetically at high temperatures and in this disk
old data can be erased.
OUTPUT DEVICES
The purpose of output devices is to relay/deliver the output of processing.
The most commonly used output devices include
* Printers,
* Visual display units,
* Graph plotters and
* Computer output on microfilms
Printers
Printers can be classified into
Impact and non-impact printers
Impact printers
They are noisy in operation since there is physical contact between the printers head and
the paper eg daisy wheel, dot matrix, chain printers.
Graph plotters
They are output devices used to come up with artistic designs they can be used by
architects and engineers to come up with intricate shapes
Types
Flat bed plotter
Drum plotter
Soft copy output devices
They include the VDU, COM
They are outputs which cannot be touched but can only be seen.
COM -Device
Micro films are photographically reduced documents on a film.
The computer displays the results on the screen whose contents are then photographed
onto the microphone
Disadvantages.
The technology is expensive
Updating the records is difficult
VDU/ monitor
Uses pixels for resolution
Types
VGA - video display adapter
SVGA- super VGA
LCD- liquid crystal displays
Flat screen
Antiglare screen- protective lacing for the eyes.
Computer jackets stop radiators
Volume of data
For very voluminous data a hard copy medium will be suitable compared to soft copy.
Cost
Non impact printers are more expensive than impact
Compatibility
The medium should be compatible with the current technology
Security
A computer output i.e. soft copy is more secure than a printed output.
SOFTWARE
Software is a set of instructions; they can be divided into 2 types
a) System
b) Application
a) System software
These are sets of instructions designed to manage and support the computer resources i.e.
hardware & software
It is used within the computer for organizing the internal functions of the computer.
Systems can be divided into the following categories
Operating system
Utility software
Translation programs
b) Application software
They are a set of instructions that help the user to perform specific tasks
OPERATING SYSTEM
This is an integrated collection of programs that manage the operations of the CPU and
other peripherals devices therefore it manages the computer system to enhance its
optimum utilization and efficiency.
1. Memory management
It allocates memory locations to data and other programs
It defines how much memory is used up and how much is available for use.
2. File management
Provides creation / deletion of files
Automatic management of disk space
Protection of files from accidental or deliberate corruption
3. Scheduling
Refers to the lining up of jobs which need to be passed over to other devices e.g. several
jobs awaiting printing
4. Security
Enables use of passwords and user names which the computer recognizes to identify the
legitimate user
EXAMPLES OF OS
Windows 95, 98, 2000 millenium, XP.
These are multi-user and multitasking
User friendly (GUI), use mouse +keyboard.
MS DOS
Single user, single tasking
Unix-
OS/2
Novell
Windows NT
Linux
Macintosh
Features
For the user to interact or communicate with the computer system they have to enter
commands by typing them via the keyboard
The DOS environment is not usually very user friendly because the user has to
memorize commands required to allow the user execute certain functions
DOS only supports single-user, single-tasking environment and therefore doesn’t
allow optimum utilization of the available memory of at any time
WINDOWS BASED
The user input the actions using the mouse
They use graphics i.e. icons or images are used to give commands and hence the user
does not have to memorize all the commands
They are easier to use but slower
They support multi-tasking
They allow optimum utilization of the available memory
UTILITY PROGRAM
They are programs written to enhance the efficiency of carrying out routine repetitive
tasks
These tasks can also be done by the operating system but not as efficiently as utility
programs,
Utility programs are therefore system programs that provide useful services to the user of
the common tasks
Debuggers
They are used to as an aid to removing bugs or errors from a program
Dump utility
Dumping means to copy the contents of the main memory out e.g. copying of data from
the main memory on to the storage media like a diskette and this is useful when errors
have occurred during the running of a program
Merge utility
This program is used to enhance the combining of two file contents into a single file
Screen saver
this is a screen that prevents the monitor displaying screen from being tampered with by
putting moving patterns on the screen.
Back up utility
This enables the user to move duplicate copies of the files or information on the hard
disk.
Data compression
This utility removes redundant elements and unnecessary data from the computer
memory
TRANSLATION PROGRAMS
They are programs that convert the source code programs (written in 2nd 3rd & 4th
generation languages into machine language i.e. 0’s and 1’s
Examples
Compilers- transform programs written in a high level language into machine code
program
Interpreters – transform the source code of HLL one statement at a time into the machine
code
Assembler- transform programs written in assembly language (2nd generation) into
machine code.
APPLICATION SOFTWARE
These are set of instructions/programs designed to help the user to solve specific
applications /problems/ tasks
They can be bought- off the shelf or developed - in house depending on the needs of the
organisation to solve general or specific problems
Note.
Microsoft office is a suite of programs with word, excel, access, PowerPoint etc
Examples
Accounting packages - sage, quickbooks, pastel, sunsystem
Spread sheets – ms excel, lotus 1-2-3, Quattro pro, super calc
Word-processing- ms word, word perfect, word star, word pro
Database management – ms access, dbase, oracle, fox pro, etc
Desktop publishing – PageMaker, Ventura, Harvard graphics, ms publisher
Disadvantages
1. They may not solve unique needs of the user
2. The user doesn’t have the ownership rights (copyrights) and cannot modify or sell the
package
3. Require regular training especially when a new version comes into the market
4. They become out of date soon
Disadvantages
i. Require a lot of time to implement
ii. Not highly portable
iii. May not be well documented
iv. Costly because the user has to meet all the costs/ expenses
v. Likely to have errors due to improper testing
a. Cost –
b. User friendliness – have GUI and offer online help facilities to the user
c. Flexibility - change with time
d. Maintainability – should give room for modification
e. User needs /requirement – need for user influences the type of software to be
acquired
f. Compatibility – fit in the existing technology
g. Portability – run in a variety of machines.
h. Reliability- perform desired task without failure
i. Vendor support – suppliers of the software to offer maintenance , training etc
j. Security – have facility to stop hackers
k. Documentation – should have instruction manual highlighting how to use , install etc
l. Fault tolerate – allow users to easily handle mistakes,
Advantages
1. storage capacity
2. accuracy
3. reliability
4. it operates at high speed
5. multitasking
6. cost- cutting
7. portability – laptops
8. convenient and user friendly
9. can be able to undertake large/complex mathematical calculation and statistical
analysis
10. security – use of passwords and user names
11. easier access
12. databases thus reducing redundancy
13. used for communication
14. unlike mankind can work continuously
15. can be used as an analysis tool
16. can do voluminous work
Disadvantages
1. Replacement of labor
2. Obsolescence – degradation
3. Access to Internet – access to immoral sites terrorist site
4. Piracy –leading to legal issues
5. “Deskilling” – decreased value of individual skills
6. Create health hazards
7. Expensive
8. Depends entirely on power
9. Maintenance cost is high
10. Becomes outdated very fast
11. Can only be operated by computer literate users
INTRODUCTION TO COMPUTERS
1. (a) Clearly define a computer
- A computer is an electronic device that operates (works) under the control
of programs stored in its own memory unit
- An electronic device that accepts data, as input and transforms it under the
influence of a set of special instructions called programs, to produce the
desired output (referred to as information)
(ii) Program
A computer program is a set of related instructions which specify how
data is to be processed
A set of instructions used to guide a computer through a process
(iv) Information
Data which has been refined summarized & manipulated in the way you
want it, or into a more meaningful form for decision- making
4. Explain the following input/ output terms as used in computer systems. Give
an example for each
(a) Read - To transfer data from an input device to the computer, e.g.
the computer
reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output
Device e.g. the computer writes output on a printer or onto
a disk.
- To move or copy data from the main storage to a backing
storage
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed
on the floor, desktop units lie on the desk with the monitor placed
on top
- Tower style units have more space for expansion than the typical
desktop units
(2 mks)
(b) Give two reasons why smaller computers like Laptops tend to be
more expensive than Desktop computers
- The technology of producing smaller devices is expensive
- They are convenient because they are portable
- They have advanced power management capabilities (they
consume less power since a laptop can operate on rechargeable
batteries
15. State a specific example where each of the following types of computers can
be used
(a) Supercomputer
- Weather forecasting
- Petroleum research
- Defense and weapon analysis
- Aerodynamic design and simulation
(b) Mainframe computer ( 1
mk)
- Banks for preparing bills, payrolls, etc
- Hospitals
- Airports (i.e., in Airline reservation systems for booking & storing flight
information)
- Communication networks as servers
17. Explain four reasons which make microcomputers suitable for personal
computing work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe
computers
- Have high processing speed
- Are small in size (occupy less office space)
- Are more energy efficient (i.e. consume less power)
- Are more reliable in doing various functions than the early mainframe
computers
- Are versatile (i.e. can be used for many different tasks)
18. (a) Identify and explain five areas where computers are used to process data
( 10 mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold, and
what is out of stock
- For calculating customer’s change
- For production of receipts
- It can be used as a barcode reader
Banks
- Manage financial transactions through the use of special cash dispensing
machines called ATMs used for cash deposit & withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping & processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer
games
- For storing personal information/ documents
- For calculating & keeping home budgets
Industries
- To monitor and control industries processes through the use of robots
- For management control, i.e. to keep track of elders, bills and transactions
- For advertisement purposes, which enable an industry to attack more
customers
Police stations
- Matching, analyzing & keeping databases of fingerprints
- For taking photographs & other identification details
- For record keeping
- For face recognition, scene monitoring & analysis which help the police
carry out criminal investigations speedily
Transport industry
- Airports; to control the movement of aircrafts, their take off & landing
using radar equipment
- For making reservations (booking purposes)
- Storing flight information
- Automobile traffic control; to monitor vehicle traffic in busy towns
- In Railways corporations; to coordinate the movement of goods & wagons
- In shipping control, for efficient management of fleets, cargo handling &
communication
Offices
- For receiving & sending of information through e- mails, fax, etc
- Production of documents
- Keeping of records
- Accepts data & instructions from the user and sends them into the
CPU. V
- Converts data into a form that the computer can understand (i.e.,
machine-
Sensible/readable form)
(b) Give an example of a: (3 marks)
(i). Device that reads data (scanning device).
- Scanner,
- Digital cameras,
- Barcode readers.
~ Credit/smart card readers,
- Kimball tag readers.
- OMR, OCR, MICR, etc
(ii). Keying device.
- Keyboard,
- Keypad.
OH). Pointing device.
- Mouse.
- Trackball.
- Light pen
- Joystick.
(h). Voice input device.
- Microphone.
(v). Printing device.
- Printer.
- Plotter.
5. State two advantages of using a mouse instead of a keyboard. (2 marks)
- The mouse is easy & convenient to use.
- Modern software includes an option to use it.
- It selects a position on screen much more quickly than a keyboard.
6. Outline any two advantages of a light pen as an input device, (2 marks)
- It is a faster input device because it involves just pointing on the screen
and selecting options.
- Can be used to draw images on the screen.
~ It is light and easily portable (saves energy).
- A light pen will result in few errors.
7. (a) What are computer scanning devices? (2 marks)
These are devices that enter (capture) data into the computer directly.
(b) Name the type of scanner used: (2 marks)
(i). To capture prices of goods at points of sale terminals in supermarkets and
superstores.
Barcode reader
(ii).To grade multiple choice examination
Optical mark reader (OMR)
-12- Computer studies
8. Mr. Otieno a French teacher used speech method to store students oral
answers to an exam into a computer
(a) What is a speech input?
It is a type of input where a microphone connected to a computer system is
used to enter data in form of spoken words into the computer
(b) State two advantages and two disadvantages of using this method of data
input
(4
mks)
Advantages
- Voice input is fast
- Its suitable for people with special needs especially those with
impaired hands
- Can be used in emergency situations
Disadvantages
- Voice input is complex to develop
- Voice input does not take care speech related problems such as
accents, tone etc
- The response rates of speech input devices are relatively slow
- Most speech input devices can recognize a limited, standard
vocabulary of spoken words, and the voice of only one speaker
- Cannot differentiate words that have same sounds (homophones)
9. Name two examples of scanning (data capture) devices used at point of scale
terminals in supermarkets
- Barcode reader
- Light pen
- Cash registers
11. List five factors one would consider when selecting a data input device (4
mks)
- The needs of the user
- Type of data to be input
- Volume of data to be entered
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the device on a
day – to – day basis.
- Availability & reliability of the data entry device
- Accuracy required
- Availability of space
- Appropriateness of the device in reference to where it is to be used
13. Explain the functions performed by each of the following central processing
unit elements
(i) Control Unit ( 2
mks)
- Interpreting instructions
- Issuing control instructions to the operating system
(ii) Arithmetic and logic Unit
- Performs arithmetic calculations such as addition, or multiplication of
figures
- Performs logical operations & comparison on data
- Performs output of logical functions (variables)
(iii) Registers
- Holds data and instructions temporarily just before and after processing
14. In reference to ALU, explain the meaning of logic operations and give an
example of this processing operation
Logic operation is the ability to compare two quantities or numbers to
determine which is greater than, less than, equal to, or not equal to the
other.
It also involves the testing for existing of a condition encountered during
the processing of an application & altering the sequence of instructions
accordingly.
16. (a) Name the basic unit used to measure the processing speed of a computer
( 1 mk)
Hertz (Hz)
INTERNET & E-MAIL
1. The first computer Network was set up by ARPA in the United States of
America. What is the full meaning of the acronym ARPA (1mk)
Advanced Research Projects Agency
b) Name the two most common protocols for the Internet, and state their
functions. (3mks)
Transmission control Protocol (TCP); - It governs how data is
transferred from one place to another
Internet Protocol (IP); - It is used to provide routing from one network to
another (i.e. it enable data to be sent& received by the different computers
on a network)
4. a) Explain the following terms as used in internet:
i) Website ( ½ mk)
A collection /group of related Web pages belonging to an organization or
individual
ii) Browse/Surf the web. ( ½ mk)
Moving around and between the Web pages
5. a) What is meant by the term e-learning? (1mk)
This is learning through interaction with special programs on the
computer.
b) A school intends to set-up an e-learning system. List three problems
that are likely to be encountered. (3mks)
- Lack of capital
- Lack of skilled manpower (required technology to run & support the e-
learning system)
- Spread of computer viruses
- Availability of pornographic material & literature to the students from the
internet.
6. a) Identify the parts of the following e-mail address labelled A, B, C and
D
(4mks)
lat @africaonline . co.ke
A B C D
Disadvantages
- the initial installation cost is higher
- Messages may be lost before they can be read due to virus infection
- Messages may not be kept for future reference due to the high cost of
storage
(2mks)
8. a) What is a search engine? (2mks)
Google .com
Yahoo. Com
Hotmail.com
Excite.com
9. Briefly describe four factors contributing to Internet access and growth in
Kenya. (6mks)
i) Cost: - for effective use of internet, a powerful & costly computer is
needed. The cost of installing internet services, telephone bills is also high
hence discouraging internet growth.
ii) Illiteracy: - Many people are computer illiterate and therefore have no idea
of computer internet services.
iii) Inadequate infrastructure: - Lack of infrastructures such as telephone
services in rural areas also hinders growth of internet access. Lack of
electricity discourages people from installing internets in their offices.
iv) lack of awareness of the existence of such services by the public.
DATA SECURITY & CONTROL
1. Differentiate between data security and data integrity. (2mks)
Data security – the protection of data & information from accidental or
intentional
disclosure to unauthorized person or from unauthorized modification.
Data integrity-the accuracy & completeness of data entered in a computer.
Define integrity – the accuracy & completeness of data entered in a
computer.
6. Give four rules that must be observed in order to keep within the law when
working with data and information. (4mks)
- It should be kept secure against loss or exposure
- Should not be kept longer than necessary
- Should be accurate and up-to-date
- Should be collected, used & kept for specified lawful purposes (e.g., data
should not be used for unlawful gain)
- The owner of the data has a right to know what data is held by the person
or organization having it.
- Data should not be transferred to other countries without the owner’s
permission
- Do not collects irrelevant and overly too much information for a purpose.
7. An individual has a right to demand guarantee to privacy of personal
information stored on a computer. Give three such types of information.
(3
mks)
- Name
- Date of birth
- ID. Number
- Residence
- Address
- Phone number
1. With the aid of a diagram, explain the difference between a digital signal and
an analogue signal. (2mks)
An analogue signal is continuous in nature, while a digital signal is in discretform.
5. Distinguish between Binary and Octal number systems, and give an example
of each. (2mks)
Binary (base 2) system has just two states usually called “ON” and “OFF” or “0”
and “1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how you
arrive at your answer.
a) Convert the following Decimal numbers to their Binary equivalent.
i) 4510 (2mks)
2 45 Rem
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
1 1 4510 = 1011012
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
0.50 x 2 = 1.00 1
= 1002 = 100.112
` =1111112
c) Use binary addition to solve the following: 410 +310 (2mks)
2 4 Rem
2 2 0
2 1 0
1 1
410 = 1002
Step 2: Add binary notations
1002
112 +
1112 1112
3 Rem
2 1 1
1 1
310 = 112
7 6 7
7x82 + 6 x 81 + 7 x 80
448 + 48 + 7 = 50310
1. With an aid of a diagram, explain the stages of the data processing cycle.
(6mks)
Data Collection
Data Input
Data processing
Output of ‘information’
Data collection involves getting the data/facts needed for processing from
the point of its origin to the computer
Data Input- the collected data is converted into machine-readable form by
an input device, and send into the machine.
Processing is the transformation of the input data to a more meaningful
form (information) in the CPU
Output is the production of the required information, which may be input
in future.
8. Most companies are now shifting from the use of geographically distributed
personal computers. This method of data processing is known as Distributed
Data Processing (DDP)
Required:
i) Name any threes computing resources that can be distributed. (3mks)
-CPU (Processors) time
-Files
-Application software
-Data/information/messages
-Computer processing power
-Memory (computer storage)
-Input/Output devices, e.g. printers
-communication devices/communication ports
ii) Name four examples of industries and business organizations that extensively
use distributed processing systems. (4mks)
Banks
Computerized retails stores, e.g. supermarkets
Learning institutions with many departmental offices
Bureaus or communication cyber cafes
Airline reservation systems
iii) List down two benefits and three risks that might be associated with the
distributed data processing system. (5mks)
Benefits
The load on the host computer is greatly reduced
The use of low cost minicomputers minimizes the cost in data processing
Delays in data processing are reduced
Provides better services to the customers
There is less risk in case of system breakdown
The design & implementation of the system is less complex due to
decentralization
The level of expertise required is less.
Risks
Data duplication is very common
Programming problems occur with microcomputers & minicomputers
Security threats, i.e. the data & information sent one the network from one
place to
another can be tapped, or listened to by unauthorized parties
More training is needed for the users involved
It is expensive due to the extra cost of communication equipment.
(2mks)
A Multi-programming system allows the user to run 2 or more programs,
all of which are in the computer’s main memory, at the same time.
(2mks)
It increases productivity of a computer
Reduces the CPU’s idle time
Reduces the incidence of peripheral bound operation
10. State at least four advantages of storing data in computer files over the
manual filing system (4mks)
Stored information takes up less space
Easier to update and modify
Provides faster access and retrieval of data
Reduces duplication of data or stored records
Cheaper
Enhances data integrity (i.e. accuracy and completeness)
(2mks)
A logical file is viewed in terms of what data items it contains and
what processing operations may be performed on the data
A physical file is viewed in terms of how the data items found in a
file are arranged on the storage media and how they can be
processed.
12. Arrange the following components of the information system data hierarchy
in ascending order of complexity:
Field, Database, Byte, Record, Bit, and file
(4mks)
13. In a computer based information system, state the purpose of the following
files, and give one example where such a file may be required in a school.
(8mks)
PROGRAMMING
Section A
1. Define the following terms: (3mks)
i) Computer Program
A computer program is a set of instructions that directs a computer on
how
to process a particular task.
ii) Programming
Programming is the process of designing a set of instructions which can
be used to perform a particular task or solve a specific problem.
iii) Programming language
A programming language is a language (set of instructions) used in
writing of computer programs. The language must be understood by the
computer for it to execute.
2. Explain the meaning of the following as used in computer programming.
(2mks)
i) Syntax-these are rules that govern the arrangement of commands in a
particular language
ii) Semantic - the meaning attached to every command in a particular
language.
3. a) What are low-level languages? Give their features. (4mks)
These are the basic programming languages, which can easily be
understood by the computer directly, or which require little effort to be
translated into computer understandable form.
Features:
They are machine hardware-oriented
They are not portable, i.e. , a program written for one computer cannot be
installed and used on another computer of a different family
They use Mnemonic codes
They frequently used symbolic addresses.
vii) Popularity: - the language selected should be suitable and /or successful in
the market with respect to the problems to be solved.
viii) Documentation: - It should have accompanying documentation
(descriptions on how to use the language or maintain the programs written
in the language
ix) Availability of skilled programmers: - The language selected should have
a pool of readily available programmers to ease the programming activity,
and reduce development time.
11. a) State any four rules/guidelines that should be followed when drawing
program flowcharts. (4mks)
A flowchart should have only one entry (starting point) and one
exit point
The flowchart should be clear, neat and easy to follow
Use the correct symbol at each stage in the flowchart
The flowchart should not be open to more than one interpretation
Avoid overlapping the lines used’ to show the flow of logic as this
can
create confusion in the flowchart
Make comparison instructions simple, i.e , capable of Yes/No
answers
The logical flow should be clearly shown using arrows
Ensure that the flowchart is logically correct & complete
b) Give one advantage of pseudo codes over flowcharts (1mk)
Pseudo codes are easier to write and understand
They are convenient especially for long algorithms which span
over several pages.
(3mks)
Boolean Expression
Stop
Counter Increment
START
INPUT temperature in 0C
SET Initial day to 0
WHILE Initial day <=6 DO
F = 32 + (9c/5)
INPUT temperature in 0C
Initial day = Initial day + 1
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
24. Michael deposits 1,000 in a bank at an interest rat of 10% per year. At the
end of each year, the interest earned is added to the amount on deposit and
this becomes the new deposit for the next year.
Develop a pseudo code to determine the year in which the amount
accumulated first exceeds 2,000. Also for each year, print the year (starting
from 1), the deposit, the Interest earned, and the total accumulated at the end
of the year.
START
Input initial deposit, Interest rate, and Target deposit
Set Deposit to 1000
Set Year to 0
REAPEAT
Year= Year + 1
Interest = Deposit x 10%
Total = Deposit +Interest
Deposit = total
UNTIL Deposit > 2000
PRINT Deposit, Year
STOP
25. Study the flowchart diagram below and answer the questions that follow:
a) What will be the value of the
sum when printed? Show how
you arrive at your answer.
(5mks)
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 = 34
16. State four factors that may be considered in order to design a good file.
(4mks)
- Record key fields
- Data type for each field
- Length of each field
- Backup and recovery strategies.
17. Define the term “attribute” (1mk)
An attribute is a unique characteristic of a record for which a data value
can be stored in the system database. E.g., a student record has attributes
such as Name, admission number, class, etc.
18. State two methods/tools that a system analyst may use to design a system.
(2mks)
- Use of system flowcharts
- Data flow diagrams
- Entity relationship models
- Structured charts
19. Explain three tasks that are carried out during system implementation.
(3mks)
- File conversions
- Staff training
- Project management
- Changeover strategies.
20. Your school has decided to replace its library control system. The current
system was implemented ten years ago but has restricted reporting facilities
and has a text-based interface. The school intents to replace the old system
with a new computerized system, and is now considering both ‘Parallel
running” and “direct changeover”.
a). (i) Briefly explain the terms parallel running and direct changeover as
used in system implementation.
(2mks)
Parallel running is where both the old and the new systems are run in
parallel to each other (a the same time) for sometime until users have
gained confidence in the new system. Data is processed on both systems
in order to compare their performance, and also cross-check the results.
Direct changeover is a complete replacement of the old system with the
new system in one bold move. The old system is stopped & abandoned
and the new system starts operating immediately.
(iii) Mention any two advantages of running both the manual system ad
the computerized system simultaneously.
(2mks)
o If the outputs from the two systems are similar, confidence in the
ICT systems.
o Users have time to familiarize themselves with the ICT systems.
o It is reliable because it enables thorough testing.
o Weaknesses in either of the systems are corrected.
-
NETWORKING & DATA COMMUNICATION
Disadvantages of networking
- High initial installation cost (i.e., expensive to install).
- Security threats e.g., hacking, which posses a great danger to loss of
information
- Moral and cultural effects.
- Spread of terrorism, drug-trafficking and viruses.
- Over reliance on networks.
Disadvantage
o They suffer from high attenuation
o affected by electromagnetic fields
o It has low data transmission rates as compared to other cables
Advantages
o They have a large bandwidth (up to 1 Gbps) compared to twisted
pair cables
o They can carry voice, data and video signals simultaneously
o They are more resistant to radio and electromagnetic interference
than twisted pair cables
Disadvantages
o They are hard to work with
o They are expensive to buy & install
iii) Fibre optic cables is made of transparent glass and uses light to
transmit data signals from one point to another on the network.
Advantages
o It is immune to electromagnetic interference, and eavesdropping.
o It is fast and supports high bandwidth
o It has low attenuation; hence, a long distance can be covered
o It is small & light.
Disadvantages
o Difficult & expensive to install
o Once broken, it is difficult & expensive to repair.
iv) Wireless/microwave/radio transmission. (3mks)
In wireless transmission, no physical connections are used to
transmit data from one point to another. Instead a transmitting
antenna & a receiver aerial are used to facilitate the
communication
Advantages
o wireless networks can span large geographical areas easily
7. Explain the function of the following network devices:
i) Network interface card (NIC)
NIC creates a physical link between the computer and the
transmission media.
ii) Gateway
Gateways provide access to the Wide area networks & the Internet.
iii) Bridge
This is a network device that selectively determines the appropriate
network
segment for which a message is meant to be delivered.
iv) Repeater
A repeater receives a weak signal on the network, cleans and
amplifies it for transmission over the next portion of the network.
Signals become weak due to attenuation
8. List two advantages of cell phones over fixed lines. (2mks)
Are cheaper than fixed lines
Less prone to transmission errors
Can be used even where there are no telephone lines
Portable, i.e. can be carried around
9. a) Study the diagram below and answer the questions that follow: