0% found this document useful (0 votes)
115 views22 pages

Concepts of Information Communication Technology

1. ICT refers to all aspects of managing, communicating and processing information using computers, phones, and other devices. 2. A computer requires both hardware and software. Hardware are the physical parts like the monitor, keyboard, and processor. Software are the set of instructions that make the hardware function. 3. Computers take in data as input, process it, output the results, and can also store data for future use. Common input devices are keyboards and mice, and output devices include monitors and printers.

Uploaded by

claire wacuka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views22 pages

Concepts of Information Communication Technology

1. ICT refers to all aspects of managing, communicating and processing information using computers, phones, and other devices. 2. A computer requires both hardware and software. Hardware are the physical parts like the monitor, keyboard, and processor. Software are the set of instructions that make the hardware function. 3. Computers take in data as input, process it, output the results, and can also store data for future use. Common input devices are keyboards and mice, and output devices include monitors and printers.

Uploaded by

claire wacuka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

UNIT 1: CONCEPTS OF INFORMATION COMMUNICATION TECHNOLOGY

INTRODUCTION

ICT : Refers to all aspects of managing, communicating and processing information. It includes,
computer hardware and software, cell phones, digital video, cabling microwaves, radio waves etc

a) What is a computer

Definition: This is a versatile, first operating machine that can be used for home and business related
tasks to enhance productivity.

It is a collection of electronic parts or hardware that incorporates a set of instructions called


software.

They perform basic functions to store, manipulate and communicate information.

2) HARDWARE

It refers to all physical/tangible parts of a computer eg mouse, keyboard, monitor, printer etc

a) Main types of computers


i) -Main frame computers– This is a high performance, large, expensive computers.
-Users access the mainframe through a terminal or a thin client
-Used by large companies, Governments, Banks etc
b) Personal Computers (PC)
-This is a computer that is normally used by a normal/average user. Its performance is usually
average.
-it is inexpensive and smaller compared to mainframes.
c) Laptop/Notebook
- This is a light weight, portable computer that includes a screen, keyboard and
mouse/touchpad.
- It operates mainly on a built-in battery.
- It is the same as Desktop or PC
d) Tablet P.C
- This is a computer that can either look like a laptop or slated shaped device.
- It has touch-sensitive screen and information is entered by writing on the screen with a
stylus, electronic pen or your fingers.
- It has an in-built mouse and keyboard eg ipad, Samsung tablet etc

USES OF PERSONAL COMPUTERS

i) Creating various types of documents


ii) Budgeting and performing accounting task.
iii) Searching through list or specific information
iv) Scheduling or planning information
v) Creating illustrations
vi) Communication by e-mail
vii) Internet browsing and doing business on internet

Compiled by E.Kabi 1
SIDE NOTE

- To perform a task a computer requires a hardware and software


- It works with information that is entered into the computer give examples of data
- Data is any information that is entered into the computer give examples of data.

MAIN PARTS OF A COMPUTER

i) Central Processing unit


ii) Main memory (RAM and ROM)
iii) The hard drive (HD)
iv) Input and output devices (keyboard, mouse, printer, screen)
v) Storage devices – hard drive, CD ROM, DVD ROM
vi) System unit or system casing

IMAGE OR PARTS OF A COMPUTER

1. PDA (personal digital assistant)


This is a small had held device/computer. It has many features e.g address book, calendar,
calculator, notepad, word processing, spreadsheet etc.

‘PDA IMAGE’
- A typical PDA has a touch screen and stylus and a built in keyboard.
- Some PDA can also be used as phones
- They can be synchonised with other PC or computing devices for data transfer

2. Mobile Phone
- The mobile phone or cellular phone is along range portable device. High frequency radio
wave enables this.
- It is used for voice, mms, sims, ogps, names etc

3. Smart Phone
- This a mobile phone offering the advanced capability of PDA
- The difference is (1) how they are built. And (2) functions they can perform.
- Smartphones run their own operating systems e.g. symbian OS, Android or windows mobile
e.g Iphone, Samsung mini tab.
4. Multimedia players
- This is an electronic device its main feature being the capability to store, organize and audio
and video files or organize and e.g Ipod.

Compiled by E.Kabi 2
3) WORKING WITH DATA

Processing data involves four basic steps

INPUT PROCESSING OUTPUT STORAGE

Input - This is process of entering data into the computer

Processing - The computer then processes the data. The micro processor (cpu) interprets and
executes instructions.

While info/data is being processed it is stored temporarily in memory chips.

Output - Process of information or processed data flowing out of the computer

o Information processed by CPU is sent to an output device or storage device.

Storage - Information that is output from the processor can be stored for future use on non-
volatile storage devices (e.g) HD, FLD

4) IN-PUT DEVICES

Data and instructions that a computer receives are called input

The hardware, through which this data is sent is called input devices.

EXAMPLES

1. KEYBOARDS
a) Mechanical keyswitch keyboards mainly these are external keyboards used by Desktop
computers (also can be used with lap-tops).
b) Capacitative keyboards
They are used with laptops and notebooks as they take up less space.

KEYBOARD IS DIVIDED INTO:


- Function Keys (F Keys)
- Alphanumerical keys (alphabets and numerics)
- Modifier keys (ALT, CTRL, SHIFT)
- Editing keys (back space, shift and delete keys)
- System keys (Print screen, Esc)
- Lock Keys (num lock, caps lock)
- Numeric key pad (keypad with numbers)
- Navigation keys (they are marked with arrows and control the cursor)
- Windows keys (used to display start-up menu)

Compiled by E.Kabi 3
IMAGE OF THE KEYBOARD

2. MOUSE
A mouse is appointing device that is used to point, click, drag and select items on the screen. It
is a mouse pointer.

TYPES OF MOUSE
- Optical mouse
- Laser mouse
- PS 2 mouse
- Cordless mouse

3. Trackball
It looks like a mouse but it is used the ball to move the mouse pointer
4. Scanner
5. Touchpad
6. Stylus
7. Joystick
8. Web camera
9. Digital camera
10. Microphone
11. Barcode reader

5. OUT-PUT DEVICES
The information that a computer produce is known as output. The information in the computer
is always in binary code to a form that is human readable.

Examples
a) Monitor/screen/ VDU (visual display unit)
b) LCD - (Liquid crystal display), flat panel display

SCREEN RESOLUTION

DEFN: Resolution refers to the sharpness and clarity of the image displayed.

This is determined by the number of dots or pixels that illuminates the light (e.g.) VGA, SVGA,
XGA, SXGA, UXGA.

B) PRINTER

A printer produces paper copies (hard copies) of data that can be viewed on the monitor.
Examples are:

1) Impact printers uses carbon ribbon e.g. dot cartridge.


2) Non-impact printers e.g. laser-jet or non-impact printer
3) Printer drivers
4) Printed spooled

Compiled by E.Kabi 4
5) Speakers
6) Headphones
6) INPUT/OUTPUT DEVICES

This devices are both input and output devices e.g touch screens

7) INPUT/OUTPUT PORTS
A port is place where information goes in and out of the computer.
a) USB Port (Universal serial port)
b) Serial port (transmits one bit of data at a time)
c) Parallel port (transmit 8 bits a time.
d) Network port
e) Firewire port – it allows direct device communication

8) PROCESSING DEVICES
a) Motherboard; it is used to combine the input component (keyboard, mouse and scanner) the
output components, the storage components and the processing components of the computer
- It essentially holds everything together.

b) Central processing unit (CPU)


- This is the tiny flat electronic chip within the system suit.
- It is a piece of silicon in which transistors are placed.
- It is the decision-making, calculating and processing brain of the computer.
- It is the heart of the standard computer.

c) Clock speed
- The faster the CPU the faster the computer can process data.
- The operating speed at which a processor executes instructions is referred to as clock speed.
- The speed is measured in Herzt e.g. Mhz or Ghz.
d) Memory (volatile- loses data when there is no power or non volatile- does not lose data when there
is no power.
- This is part of the computer in which all programmes and data are stored, either temporary
or permanently.
- Information is stored in memory chips. It helps the computer remember the information it is
working with.
- There are 2 types of memory, RAM and ROM
i) RAM – Random Access Memory (volatile random access because you can access any
memory call directly and in any order.
o It stores data for the CPU to access it quickly that fetching/extracting the same
information from the hard drive.
o RAM is read and write computer memory used to store data temporarily.
o RAM is measured in MB’S (Megabytes) eg 1024 mb,2048 mb (equals to 2 GB of
RAM)

Compiled by E.Kabi 5
ii) Read only memory (ROM) –non volatile
o ROM is an integrated circuit program with a specific, permanent set of instructions
and data when it is manufactured eg) it tells the computer how to load the
Operating System when starting the computer.

iii) Cache memory


The CPU often stores data it will need to access in a cache.
o
Fact : it takes more time to get data fro memory to the CPU to access
o
instantaneously the mostly used data.
o This memory can be inbuilt in the CPU or separate set of chip on the motherboard.
DIAGRAM THAT SHOWS DATA FLOW
Hard drive Memory CPU Cache Memory
(RAM)

When retrieving a file to make some changes

1. Data flows from Hdd to RAM.


2. From RAM to Cache Memory.
3. Then to CPU.
4. The CPU sends back the processed data to the RAM.
5. From the RAM the data is sent back to the hard drive when you save it.

Comparison between RAM and ROM

RAM ROM

1. Needs power Doesn’t need power.


2. Data can be changed Data cant be changed
3. Data loss if power is lost Data cannot be lost if power goes.
4. Volatile Non-volatile
5. Stores data currently being processed Fixed instructions is stored.
e) Capacity measurements
i) Bits
Both RAM and HDD capacities are measured in bytes, also files sizes,
-computer operate using a binary number system.
-Hence computer use binary digit in place of decimal numbers.
- The word bit is short for Binary Digit.
-Decimal digits have a possibility of 0 to 9 Bits have a possibility of 2 1 and 0.
-8 bits are equal to one byte.

ii) Bytes

- Bits cannot be used alone in the computer.


- They are bundled in sets of 8 which is also known as a byte
- 1 byte is equals to one character (eg) (01000001=upper case A)
- What is the number of bytes for the (Long walk to freedom)

Compiled by E.Kabi 6
8 bits Equals to 1 byte
Equals 1 kilobyte
1024 bytes

1024 KB Equals to 1 megabyte


Equals to 1 Gigabyte
1024 MB
Equals to 1 Terabyte
1024 GB
Equals to 1 Tetrabyte
1024 TB

9) POWER SUPPLY
This is the device that supplies power to the computer.
It is an electrical transformer that regulates power used by the computer by converting
electricity from the plug in the wall to the lower voltages that are suitable for the computer.
b)UPS (Uninterrupted Power Supply)

It is used to protect the user against sudden power loss.


It is charged and powers the computer for a while (e.g) 2 minutes.
10) STORAGE DEVICES.
They are used to store data for future use, depending on the devices.
The data on the device can be retrieved, changed and restored.
It can also be of permanent nature meaning it can be read or copied but not editable.
Storage devises uses different technologies.
NB:Hdd uses magnetism to encode data as a series of O’s and I’s on CD roms variation to how
the disc surface reflects light are used to encode data.
Naming of drives using alphabetical letters e.g A- floppy C-harddisk D-CD drive.
A)Hard Drive or hard disk drive (HDD)
_Internal hard drive
_External hard drive
_Capacity is measured in Gigabyte 80gb,120gb etc.
b) i) CD-ROM Drive (Compact Disk Drive) eg 650,700mb capacity.
ii) CD-R (Compact Disk Re-writable (CD-RW)
iii)DVD-ROM (Digital Versatile disk capacity 4.7 GB and above.

c) USB Flash drive – User the universal serial bus connector.- Storage capacity 128m -64GB
d) Memory card – Used mainly with digital cameras and phones, PDA’s, Music play
e) Network Drives – This is a drive on a separate disk or open space on a network saved by a
computer server shared by a computer in net.
f) Online storage devices- stored via internet a host device provider. (eg Google)

Compiled by E.Kabi 7
11) COMPUTER PERFOMANCE
a) Clock speed/CPU Speed
-This determines the speed at which information will be processed.
-The speed is emitted in pulses and it is measured in hertz (Mhz), Mega hertz, Gigahertz.

b) RAM Size
-RAM increases speed and performance. It increases the amount of information that can be
held at any given time.

c) Hard drive

- This stores permanent the data and the bigger the size the faster the performance of the
computer.

d) Graphic, cards, processor and memory.

e) Applications

The more application running at any time the slower the computer.

12) SOFTWARE
This is a set of instructions which the computer needs to operate or function.
- There are two categories of softwares:
i) System software.
ii) Application software

1.System software

- This is also known as OSS (Operating System Software) is the most fundamental program
that is in the computer. The OS runs in the background and sets the rules for how the
computer and application software work together.
- It acts as a host for other programs eg Windows 7, 2000xp, Ubuntu, fedora, redhat

FUNCTIONS OF OS

- Serves as a communication link between the user and h/w


- It runs other software programs and controls how a program interacts with the user.
- It coordinates the operations of all parts of a computers system.
- It maintains the flow of events.
- It provides the user with tools with which to manage disks and folders.
- It manages some peripherals.

2. Application software
These are softwares that have specific tasks to perform for the user or for another application
programs. Eg Pastel, QuickBooks, office suite
Difference between Operating System and Application Software (mention)

Compiled by E.Kabi 8
13) COPYRIGHT
- To hold copyright is to hold ownership of an intellectual property. A company/person owns
a computer program eg video song which they have developed.
- The owner of software/property has the exclusive right to print, distribute and copy the
software.
- Every software has a License Agreement.
- Using, copying or distributing software without paying for it or not using it in compliance
with license agreement is known as software piracy.
- Benefits of software registration.
a) Shareware – is software that is copyright protected but may be downloaded and used for free
for a limited time, after which the user is asked to send the author some money and register
the product.
b) Freeware – copyright protected is software that can be copied, used and distributed at no
charge. Although it is free the user cannot use it for commercial purposes or changed by other
users/developers.
c) Open source – This is any program of which the source code is made available for use or
modification as user or developer see fit.
*source code is a list of instructions written in programming language.

14) ACCESSIBILITY ENHANCEMENT OPTIONS

-There are various types of applications that help users to cope with the difficulties of using a computer
or just make it easier to use a computer.

a) Voice recognition- Is ability of an application to receive and interpret spoken word or carry out
spoken command.

b) Screen reader software – Reads contents from the screen and converts it into spoken work, voice or
Braille. Eg Jaws

c) Screen magnifier – Software that enlarges screen content, it is assistive technology (AT) suitable for
visually impaired people who still have some functional vision.

d) Onscreen keyboard – This provides a visual keyboard on the screen that can be used in place of an
actual keyboard and can be manipulated by other pointing devices eg mouse

15) NETWORKS

A network is formed where 2 or more computers are connected to each other so that they can share
resources and communicate with each other. Eg sharing printers, scanners etc

- Technology connecting computers can be wireless, fibre optic, direct cable connection, radio
waves.

Purpose of networks

1. To share hardware.
2. To share centralized backup.

Compiled by E.Kabi 9
3. To use the same apps.
4. To share a single internet connection.

a) Network Terminology
i) Server – A computer responsible for the central management of hardware devices as well as
storage management of files.
ii) Work station/client – a PC on the network that perform general tasks.
iii) Gateway – a network point that acts as entrance to another network.
iv) Bandwidth - The amount of data that can be transferred from one PC to another in a given
period.
v) Switch – it inter-connects different PCs to form a network (LAN)
vi) Router – A device that connects one network to another.

Note: In a client/server environment one or more computers can act as a server. The other
computers that connect to a server are called clients.

b) Network types
i) Local Area Network (LAN)

A LAN links computer in a small area, eg building small campus, room.

Advantage of LAN

1. Share printer and other peripherals.


2. Share and access the communication services.
3. Share application from a central server.
4. Access databases
5. Access files from other computers.
6. Transfer data between computers.

c) Wireless Local Area Network (WLAN)


This is connecting computers and devices without using cables/wires .
- Information is mainly transferred through radio frequency (RF), infrared light, satellite etc. It
can be both short or long range. (distance) eg cell phone network, Bluetooth.

Compiled by E.Kabi 10
d) Wide Area Network (WAN)
- This is a computer network covering a wide geographical Area involving a large number of
computers and devices (eg) Internet, ATMs.
- They are connected through fibre optic, satellite, wires, microwaves etc

16) INTERNET

Internet is a WAN computer that allows people worldwide to share information and to communicate
electronically. Internet is a network of networks.

FACTS ABOUT INTERNET

1. It provides global connection to it’s users.


2. The internet has no single owner.
3. It has agreed international standards.
4. It offers low cost and faster communication.

MAIN USES OF INTERNET

1. Searching.
2. E-commerce
3. Downloading
4. Send and receive instant messages.
5. Study.
6. Communication.

Intranet

Intranet is private computer network that uses internet concepts and technologies to securely share any
part of an organization’s info.

Extranet

This is a private network that uses internet Concepts and Technologies and Public Telecommunication
system to securely share specific information or operations with suppliers, vendors, partners etc. thus
an extended intranet to approved users outside the company.

Compiled by E.Kabi 11
17) DATA TRANSFER AND COMMUNICATION

Downloading – Taking data from computer or network.

Uploading – taking your info/data to another computer.

a) Data transfer rate

The rate at which data can be transferred in a given time. It depend on various factors:

1. Available band width.


2. The size of the file.
3. Speed of the connection.

It is measured in bps (bits per second)

Bps, Kbps (Kilobit), Mbps (Megabit), gbps (Gigabit)

Note: 8 bits equals to 1024 bytes = 1KB

b) Internet Connection Services

The type of internet connection plays a big role in the rate at which data is transferred between a
computer and internet. ISP (Internet Service Provider) is also required to provide final link eg telecom,
Vodacom.

i) Dial up connection
- Uses a modem or a telephone line.
- Connection is slow.
ii) Broadband connections

Is an “always” on (high speed) connection to the internet.

Characteristics of broadband

Always on –Once connection has been made, it doesn’t have to be stopped/disconnected.

- Flat fee – A monthly flat fee is paid to the ISP for the specific number of megabyte usage

- High speed

- risking intruder attack.

-Options of connecting to the internet

(i) Phone line eg ADSL


(ii) Mobile phone
(iii) Cable connection
(iv) Wireless
(v) Satellite

Compiled by E.Kabi 12
Assignment: Short description of available services and compare the speeds.

Dial up, ADSL, GPRS,3G, HSPDA

18) ELECTRONIC MAIL (E-MAIL)

It is a method of sending text, graphics e.t.c electronically from one compute to another. It uses specific
email address known as e-mail account eg [email protected]

a) Instant messaging (IM)


- Instant Messaging is a form of real time communication between two or more people
mostly using typed text.
- All parties involved must be online.
IM provides:
- Instant Messaging
- Chat
- Weblinks
- Video
- Images
- Sounds
- Files
- Mobile capabilities
b) Voice over Internet Protocol (VOIP)
This means making calls via internet rather than normal (landline or cellular phones)- This can be
made through a computer and a head set.
c) Real Simple Syndication Feeds (RSS)
-This is an automated system that can keep track of these changes and display it on a website
-It is a useful too to keep updated on different changes in different websites.
-It is typically used with news sites.
d) Weblog blog
This is a personal diary or personal form of thoughts published on a website. It is updated regularly.
e) Pod cast
This is a service of audio or video digital media files which is distributed over the internet by RSS
feeds. It can be subscribed to and downloaded automatically when new content is added.

19) VIRTUAL ONLINE COMMUNITIES

A virtual community is a community/group of people sharing common interests, ideas and feelings over
the internet or other networks. They can be based anywhere in the world.

- It is also referred to as online community.


- Communication can take place via e-mail, blogs, IM, Chat rooms, social networking sites,
forums etc
a) Social Networking Websites
-This is an online service that allows individual to create a public or semi-public profile within
an enclosed system. They can create a list of other users with whom they share a connection
and view and share their list of connection.
-They can be used for finding friends, common interests, sharing photos, videos, ideas etc
eg my space, twitter, facebook and latest if google+
Compiled by E.Kabi 13
b) Internet forums

Also known as online discussion groups. The purpose is to discuss specific topics with other
users. Also known as message board, new group discussions group even a conference.
- Forum consists of a group of contributors who have registered to participate and are known
as members. Visitors are allowed to view contents of the forum.
- Members submit topic for discussion (known as threads) and communicate with others
using publicly visible messages (known as posts) or private messages eg mathforum.org,
internetcrimeforum.org.uk.
c) Chat rooms.
d) Online computer games.

Security measures when using online communities or facilities.

1. Make your profile private.


2. Limit the amount of personal information.
3. Do not provide any personal information in chat room or public forums.
4. Be wary of strangers
5. Do not make any bank account details available.

REVIEW QUIZ
1. What can affect computer performance?
2. Do you need OS software and application software, Explain
3. Difference between freeware and shareware.
4. What is software piracy.
5. Difference between WAN and WLAN
6. What is RSS and does it work?
7. Why is security important when visiting online communities?

20) THE ELECTRONIC WORLD

Focus will on internet services available to customers.

a) E-commerce (Electronic Commerce)


- Commerce is, simply put, the exchange of products and services, usually for money.
- E-commerce refers to the exchange of product and services, usually for money, on the
internet.
- There are three types of commerce transactions
1. Business to Business.
2. Business to Consumer.
3. Consumer to consumer.

Compiled by E.Kabi 14
ELEMENTS OF E-COMMERCE

These are elements needed to conduct E-Commerce:

1. Products.
2. A place to sell the product
3. A way to get people to visit the website.
4. A way to accept order (online form)
5. A way to accept payment (Credit card)
6. A way to deliver products (shipping).
7. A way to accept returns.
8. A way to provide customer services.

Advantages of purchasing goods and services online.

1. Shopping can be done at any time of the day.

2. Less order –taking and customer service cost.

3. Goods are available from all over the world.

4. Transaction done at home.

5. Security of payments being monitored and improved.

6. Large catalogue can be displayed.

Disadvantages of E-C

1. Choosing goods from a virtual shop is difficult.


2. It’s sometimes difficult to access quality of goods ordered.
3. No human contact.
4. Risk of insecure payment methods.
5. Personal info can be used illegally.
6. Difficult to get people to know your website.

Examples of E-C

www.amazon.com, www.kalahari.net , www.E-bay.com

b) E-banking (Electronic banking)


It is known as Internet Banking, doing banking transactions on the internet. This includes:
- Managing debit orders.
- Paying accounts.
- Transferring funds between accounts.
- Viewing bank statements.

Compiled by E.Kabi 15
c) E-government (Electronic Government)

Use of internet technology to provide Government services to other Government Departments,


businesses and ordinary citizens eg tax e-filing system (KRA)

d)E-Learning (Electronic Learning)

Learning facilitated using the internet. Delivery of learning experience and learning content to learners
via internet.

Advantages of e-learning

1. Flexibility of learning.
2. Flexible learning location.
3. Multi-media learning experience.
4. Cost effectiveness

e)Teleworking/Telecommuting

This refers to working outside the main workplace or office often from home and communicating with
the office via a network, telephone, fax, e-mail and internet.

ADVANTAGES

1. Less or no commuting time.


2. Flexible schedules.
3. Greater flexibility to focus on one task.
4. Reduced company space.
5. Opportunities for disabled.
6. Less absenteeism.
7. Keep working even when relocating.

DISADVANTAGES

1. Less focus on team work.


2. Miscommunication.
3. Lack of human contact.
4. No specific working hours.

Compiled by E.Kabi 16
21) HEALTH AND ENVIRONMENT

a. Ergonomics
-This is the study of workplace design and the physical and psychological impact it has on
employees.
-It is about the fit between people and their work activities, equipment, work systems and
environment to ensure that work systems and environment are safe, comfortable, efficient and
productive.
b. Health Hazards related to prolonged use of computers
1. CVS (Computer Vision Syndrome) blurred vision, irritated and dry, headaches.
2. RSI (Receptive Strain Injury)- Painful hand
3. CTS (Carpal Tunnel Syndrome)-Painful around nerves around the wrist.
c. Proper PC Ergonomics
(i) Proper sitting.
(ii) Place both feet flat on the ground.
(iii) Desk and computer position should be placed in the recommended angles.(avoid glare)
(iv) Lighting and ventilation.
d. What to be done to ensure well being of a computer user.
1. Take regular breaks, at least every 2 hours.
2. Stretch the legs, arms and feet regularly.
3. If possible get fresh air at least every 2 hours.
4. Do regular eye hand exercises.
5. Remember to blink and close eyes regularly.
6. Do not sit in one position for a long time.
e. Golden rules for PCs
1. Use a mouse pad on flat surface.
2. Keep the work place clean and tidy.
3. Clean computer components on regular basis.
4. Avoid eating or carrying food stuff on your workplace.
5. Allow space for ventilation around the computer and its peripherals.
6. Do not unplug peripheral devices when the computer is still on.
7. Do not share electrical socket with high voltage device eg fridge
8. Keep computer free of dust.
9. Use surge protectors.
f. Influence of computers on the environment.
1. What is E-waste/E-trash
- This is discarded electronic parts or components whether broken or merely out-dated.
- These devices contain toxic materials eg lead, cadmium and mercury.
 How to stop or limit E-waste
- Recycle a cell phone.
- Download software.
- Print less
- Purchase recycled/recyclable products.

Compiled by E.Kabi 17
22) COMPUTER SECURITY

a) Computer Viruses

- A computer virus is a piece of computer code or program (set of instructions) written for the
sole purpose of damaging other software program or even hardware.
- The main purpose is to survive, reproduce and usually damage your computer system and or
files in the process.
- It is usually embedded in large legitimate program.
- Worms are viruses that replicate themselves until they slow the computer down.

- Ways in which virus enters a computer


o Using internet, downloading and installing infected files, email attachments.
o Using CDs, DVDs and flash-disks
o Over computer networks
o Program from unknown sources
- Symptoms of a Computer virus infection
o Computer is slower than usual, freezes completely
o Files may disappear
o There may be sudden increase in error message
o Blocks of storage memory become inaccessible.
- Protecting a computer against a virus infection
o Keep updated on the latest virus developments
o Make regular back-up of the system
o Do not copy or borrow applications form unknown source
o Do not open email attachments from unknown source.
o Install and register an antivirus program
o Scan incoming and outgoing e-mail.
o Virus check files received over a network.
- Anti-virus software is a program that attempt to identify, neutralizes or eliminate malicious
code. Most anti-viruses are designed to combat a wide range of threats including worms,
phishing attacks, spyware and Trojans.
- They check for known viruses or threats that match virus definitions in a virus directory
(library).
- Infected files can either be healed, deleted or placed under quarantine.
- Examples; Kaspersky, F-prot, Norton, Mc fee, Avira, AVG etc.
c) Phishing
This can be described as criminally fraudulent process of attempting to acquire sensitive
information e.g. user names, passwords and credit card details by camouflaging as trustworthy
entity in electronic communication e.g. email, stealing personal information.
d) Spyware
- This is technology that gathers information about people or organizations without their
knowledge. On the internet, it is sometimes called spy bot or tracking software.
- It does not self-replicate. They are designed to exploit infected computers for commercial
gain.
- Typical tactics include delivery of unsolicitated pop-ups advertisement.

Compiled by E.Kabi 18
- Theft of information (personal), credit card number and monitoring web-browsing activity
for marketing purposes.

c) Identity and data security


- This ensures that data is kept safe from corruption, with suitably controlled access.
- Data security helps to ensure privacy and the protection of personal data.
- Many computer systems or networks will require a user to sign on before using a
specific systems or networks e.g. Private Information or sensitive data e.g. bank details.
- This also can be applied to a computer itself especially when a computer starts. Where
a user supplies a user name and password.
o User name
o Passwords) explain briefly

GOOD PASSWORD POLICIES

1) Do not pick password that a person can guess easily e.g. ID NO.; Birthday, pets name
2) Do not pick a word that can be found in a dictionary
3) Do not pick a word that is currently newsworthy.
4) Pick a mixture of letters, numbers and symbols
5) The longer the password the better (6 – 13 characters)
6) Change passwords regularly
7) Do not share passwords with others
8) Do not write passwords down.

BACK-UPS

This is saving a copy of file somewhere else other than on the hard drive of the computer on which they
have been created.

BACK-UPS can be made in various ways;

1) An external storage devices e.g. hard drive, CD or DVD


2) Using back-up software specifically created to make back-up easily e.g. Acronis back-up system,
Norton ghost back-up.
3) Back-up on a server which might be off-site using back-up software set to perform back-up
automatically.
4) Online back-ups which are facilities available on the internet e.g. Ubuntu cloud storage which
offers 5gb for free.

Compiled by E.Kabi 19
IP Addressing Fundamentals
A host is a computer or device on a TCP/IP network. Every TCP/IP host is uniquely identified by
its IP address. An IP address consists of a network ID and a host ID. If two different hosts belong
to the same network, they have the same network ID. The two hosts will have different host ID's
and can communicate with each other locally without going through a router. If two hosts have
different network ID's, they belong to different segments on the network. They must
communicate with each other remotely through a router or default gateway.

Binary/Decimal Numbering System

An IP address consists of 32 binary bits, where each bit is either a 0 or 1. We first write
the 32 bits into four 8-bit numbers (octets) separated by periods(.).
For Example: 11000001. 00001010. 00011110.00000010 (IP address in binary form)
To convert the IP address from binary to decimal form, we convert each of the four 8-bit
numbers according to the following table:

Decimal 128 64 32 16 8 4 2 1
Value

Octet X X X X X X X X
Value

So the first octet in the above binary number would be translated as:

Decimal 128 64 32 16 8 4 2 1
Value

Octet 1 1 0 0 0 0 0 1
Value

Everywhere a 1 appears in table, the decimal value in that column is added to determine
the decimal value of the entire octet.
or 128 + 64 + 1 = 193

Using the same table to translate the other three octets would give us the following result.
00001010 = 8 + 2 = 10
00011110 = 16 + 8 + 4 + 2 = 30
00000010 = 2

So in decimal form, the above IP address is: 193 . 10 . 30 . 2 An IP address consists of two parts,
one identifying the network and one identifying the host. The Class of the address determines
which part is the network address and which part is the host address.

In the binary numbering system, the radix is 2. Therefore, each position represents increasing
powers of 2. In 8-bit binary numbers, the positions represent these quantities:

2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0

128 64 32 16 8 4 2 1

The base 2 numbering system only has two digits: 0 and 1.


Compiled by E.Kabi 20
When we interpret a byte as a decimal number, we have the quantity that position represents if
the digit is a 1 and we do not have that quantity if the digit is a 0, as shown in the figure.

11111111

128 64 32 16 8 4 2 1

A 1 in each position means that we add the value for that position to the total. This is the addition
when there is a 1 in each position of an octet. The total is 255.

128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255

A 0 in each position indicates that the value for that position is not added to the total. A 0 in
every position yields a total of 0. 0 0 0 0 0 0 0 0

Compiled by E.Kabi 21
Evh 2012/13 – [email protected]

Compiled by E.Kabi 22

You might also like