Concepts of Information Communication Technology
Concepts of Information Communication Technology
INTRODUCTION
ICT : Refers to all aspects of managing, communicating and processing information. It includes,
computer hardware and software, cell phones, digital video, cabling microwaves, radio waves etc
a) What is a computer
Definition: This is a versatile, first operating machine that can be used for home and business related
tasks to enhance productivity.
2) HARDWARE
It refers to all physical/tangible parts of a computer eg mouse, keyboard, monitor, printer etc
Compiled by E.Kabi 1
SIDE NOTE
‘PDA IMAGE’
- A typical PDA has a touch screen and stylus and a built in keyboard.
- Some PDA can also be used as phones
- They can be synchonised with other PC or computing devices for data transfer
2. Mobile Phone
- The mobile phone or cellular phone is along range portable device. High frequency radio
wave enables this.
- It is used for voice, mms, sims, ogps, names etc
3. Smart Phone
- This a mobile phone offering the advanced capability of PDA
- The difference is (1) how they are built. And (2) functions they can perform.
- Smartphones run their own operating systems e.g. symbian OS, Android or windows mobile
e.g Iphone, Samsung mini tab.
4. Multimedia players
- This is an electronic device its main feature being the capability to store, organize and audio
and video files or organize and e.g Ipod.
Compiled by E.Kabi 2
3) WORKING WITH DATA
Processing - The computer then processes the data. The micro processor (cpu) interprets and
executes instructions.
Storage - Information that is output from the processor can be stored for future use on non-
volatile storage devices (e.g) HD, FLD
4) IN-PUT DEVICES
The hardware, through which this data is sent is called input devices.
EXAMPLES
1. KEYBOARDS
a) Mechanical keyswitch keyboards mainly these are external keyboards used by Desktop
computers (also can be used with lap-tops).
b) Capacitative keyboards
They are used with laptops and notebooks as they take up less space.
Compiled by E.Kabi 3
IMAGE OF THE KEYBOARD
2. MOUSE
A mouse is appointing device that is used to point, click, drag and select items on the screen. It
is a mouse pointer.
TYPES OF MOUSE
- Optical mouse
- Laser mouse
- PS 2 mouse
- Cordless mouse
3. Trackball
It looks like a mouse but it is used the ball to move the mouse pointer
4. Scanner
5. Touchpad
6. Stylus
7. Joystick
8. Web camera
9. Digital camera
10. Microphone
11. Barcode reader
5. OUT-PUT DEVICES
The information that a computer produce is known as output. The information in the computer
is always in binary code to a form that is human readable.
Examples
a) Monitor/screen/ VDU (visual display unit)
b) LCD - (Liquid crystal display), flat panel display
SCREEN RESOLUTION
DEFN: Resolution refers to the sharpness and clarity of the image displayed.
This is determined by the number of dots or pixels that illuminates the light (e.g.) VGA, SVGA,
XGA, SXGA, UXGA.
B) PRINTER
A printer produces paper copies (hard copies) of data that can be viewed on the monitor.
Examples are:
Compiled by E.Kabi 4
5) Speakers
6) Headphones
6) INPUT/OUTPUT DEVICES
This devices are both input and output devices e.g touch screens
7) INPUT/OUTPUT PORTS
A port is place where information goes in and out of the computer.
a) USB Port (Universal serial port)
b) Serial port (transmits one bit of data at a time)
c) Parallel port (transmit 8 bits a time.
d) Network port
e) Firewire port – it allows direct device communication
8) PROCESSING DEVICES
a) Motherboard; it is used to combine the input component (keyboard, mouse and scanner) the
output components, the storage components and the processing components of the computer
- It essentially holds everything together.
c) Clock speed
- The faster the CPU the faster the computer can process data.
- The operating speed at which a processor executes instructions is referred to as clock speed.
- The speed is measured in Herzt e.g. Mhz or Ghz.
d) Memory (volatile- loses data when there is no power or non volatile- does not lose data when there
is no power.
- This is part of the computer in which all programmes and data are stored, either temporary
or permanently.
- Information is stored in memory chips. It helps the computer remember the information it is
working with.
- There are 2 types of memory, RAM and ROM
i) RAM – Random Access Memory (volatile random access because you can access any
memory call directly and in any order.
o It stores data for the CPU to access it quickly that fetching/extracting the same
information from the hard drive.
o RAM is read and write computer memory used to store data temporarily.
o RAM is measured in MB’S (Megabytes) eg 1024 mb,2048 mb (equals to 2 GB of
RAM)
Compiled by E.Kabi 5
ii) Read only memory (ROM) –non volatile
o ROM is an integrated circuit program with a specific, permanent set of instructions
and data when it is manufactured eg) it tells the computer how to load the
Operating System when starting the computer.
RAM ROM
ii) Bytes
Compiled by E.Kabi 6
8 bits Equals to 1 byte
Equals 1 kilobyte
1024 bytes
9) POWER SUPPLY
This is the device that supplies power to the computer.
It is an electrical transformer that regulates power used by the computer by converting
electricity from the plug in the wall to the lower voltages that are suitable for the computer.
b)UPS (Uninterrupted Power Supply)
c) USB Flash drive – User the universal serial bus connector.- Storage capacity 128m -64GB
d) Memory card – Used mainly with digital cameras and phones, PDA’s, Music play
e) Network Drives – This is a drive on a separate disk or open space on a network saved by a
computer server shared by a computer in net.
f) Online storage devices- stored via internet a host device provider. (eg Google)
Compiled by E.Kabi 7
11) COMPUTER PERFOMANCE
a) Clock speed/CPU Speed
-This determines the speed at which information will be processed.
-The speed is emitted in pulses and it is measured in hertz (Mhz), Mega hertz, Gigahertz.
b) RAM Size
-RAM increases speed and performance. It increases the amount of information that can be
held at any given time.
c) Hard drive
- This stores permanent the data and the bigger the size the faster the performance of the
computer.
e) Applications
The more application running at any time the slower the computer.
12) SOFTWARE
This is a set of instructions which the computer needs to operate or function.
- There are two categories of softwares:
i) System software.
ii) Application software
1.System software
- This is also known as OSS (Operating System Software) is the most fundamental program
that is in the computer. The OS runs in the background and sets the rules for how the
computer and application software work together.
- It acts as a host for other programs eg Windows 7, 2000xp, Ubuntu, fedora, redhat
FUNCTIONS OF OS
2. Application software
These are softwares that have specific tasks to perform for the user or for another application
programs. Eg Pastel, QuickBooks, office suite
Difference between Operating System and Application Software (mention)
Compiled by E.Kabi 8
13) COPYRIGHT
- To hold copyright is to hold ownership of an intellectual property. A company/person owns
a computer program eg video song which they have developed.
- The owner of software/property has the exclusive right to print, distribute and copy the
software.
- Every software has a License Agreement.
- Using, copying or distributing software without paying for it or not using it in compliance
with license agreement is known as software piracy.
- Benefits of software registration.
a) Shareware – is software that is copyright protected but may be downloaded and used for free
for a limited time, after which the user is asked to send the author some money and register
the product.
b) Freeware – copyright protected is software that can be copied, used and distributed at no
charge. Although it is free the user cannot use it for commercial purposes or changed by other
users/developers.
c) Open source – This is any program of which the source code is made available for use or
modification as user or developer see fit.
*source code is a list of instructions written in programming language.
-There are various types of applications that help users to cope with the difficulties of using a computer
or just make it easier to use a computer.
a) Voice recognition- Is ability of an application to receive and interpret spoken word or carry out
spoken command.
b) Screen reader software – Reads contents from the screen and converts it into spoken work, voice or
Braille. Eg Jaws
c) Screen magnifier – Software that enlarges screen content, it is assistive technology (AT) suitable for
visually impaired people who still have some functional vision.
d) Onscreen keyboard – This provides a visual keyboard on the screen that can be used in place of an
actual keyboard and can be manipulated by other pointing devices eg mouse
15) NETWORKS
A network is formed where 2 or more computers are connected to each other so that they can share
resources and communicate with each other. Eg sharing printers, scanners etc
- Technology connecting computers can be wireless, fibre optic, direct cable connection, radio
waves.
Purpose of networks
1. To share hardware.
2. To share centralized backup.
Compiled by E.Kabi 9
3. To use the same apps.
4. To share a single internet connection.
a) Network Terminology
i) Server – A computer responsible for the central management of hardware devices as well as
storage management of files.
ii) Work station/client – a PC on the network that perform general tasks.
iii) Gateway – a network point that acts as entrance to another network.
iv) Bandwidth - The amount of data that can be transferred from one PC to another in a given
period.
v) Switch – it inter-connects different PCs to form a network (LAN)
vi) Router – A device that connects one network to another.
Note: In a client/server environment one or more computers can act as a server. The other
computers that connect to a server are called clients.
b) Network types
i) Local Area Network (LAN)
Advantage of LAN
Compiled by E.Kabi 10
d) Wide Area Network (WAN)
- This is a computer network covering a wide geographical Area involving a large number of
computers and devices (eg) Internet, ATMs.
- They are connected through fibre optic, satellite, wires, microwaves etc
16) INTERNET
Internet is a WAN computer that allows people worldwide to share information and to communicate
electronically. Internet is a network of networks.
1. Searching.
2. E-commerce
3. Downloading
4. Send and receive instant messages.
5. Study.
6. Communication.
Intranet
Intranet is private computer network that uses internet concepts and technologies to securely share any
part of an organization’s info.
Extranet
This is a private network that uses internet Concepts and Technologies and Public Telecommunication
system to securely share specific information or operations with suppliers, vendors, partners etc. thus
an extended intranet to approved users outside the company.
Compiled by E.Kabi 11
17) DATA TRANSFER AND COMMUNICATION
The rate at which data can be transferred in a given time. It depend on various factors:
The type of internet connection plays a big role in the rate at which data is transferred between a
computer and internet. ISP (Internet Service Provider) is also required to provide final link eg telecom,
Vodacom.
i) Dial up connection
- Uses a modem or a telephone line.
- Connection is slow.
ii) Broadband connections
Characteristics of broadband
- Flat fee – A monthly flat fee is paid to the ISP for the specific number of megabyte usage
- High speed
Compiled by E.Kabi 12
Assignment: Short description of available services and compare the speeds.
It is a method of sending text, graphics e.t.c electronically from one compute to another. It uses specific
email address known as e-mail account eg [email protected]
A virtual community is a community/group of people sharing common interests, ideas and feelings over
the internet or other networks. They can be based anywhere in the world.
Also known as online discussion groups. The purpose is to discuss specific topics with other
users. Also known as message board, new group discussions group even a conference.
- Forum consists of a group of contributors who have registered to participate and are known
as members. Visitors are allowed to view contents of the forum.
- Members submit topic for discussion (known as threads) and communicate with others
using publicly visible messages (known as posts) or private messages eg mathforum.org,
internetcrimeforum.org.uk.
c) Chat rooms.
d) Online computer games.
REVIEW QUIZ
1. What can affect computer performance?
2. Do you need OS software and application software, Explain
3. Difference between freeware and shareware.
4. What is software piracy.
5. Difference between WAN and WLAN
6. What is RSS and does it work?
7. Why is security important when visiting online communities?
Compiled by E.Kabi 14
ELEMENTS OF E-COMMERCE
1. Products.
2. A place to sell the product
3. A way to get people to visit the website.
4. A way to accept order (online form)
5. A way to accept payment (Credit card)
6. A way to deliver products (shipping).
7. A way to accept returns.
8. A way to provide customer services.
Disadvantages of E-C
Examples of E-C
Compiled by E.Kabi 15
c) E-government (Electronic Government)
Learning facilitated using the internet. Delivery of learning experience and learning content to learners
via internet.
Advantages of e-learning
1. Flexibility of learning.
2. Flexible learning location.
3. Multi-media learning experience.
4. Cost effectiveness
e)Teleworking/Telecommuting
This refers to working outside the main workplace or office often from home and communicating with
the office via a network, telephone, fax, e-mail and internet.
ADVANTAGES
DISADVANTAGES
Compiled by E.Kabi 16
21) HEALTH AND ENVIRONMENT
a. Ergonomics
-This is the study of workplace design and the physical and psychological impact it has on
employees.
-It is about the fit between people and their work activities, equipment, work systems and
environment to ensure that work systems and environment are safe, comfortable, efficient and
productive.
b. Health Hazards related to prolonged use of computers
1. CVS (Computer Vision Syndrome) blurred vision, irritated and dry, headaches.
2. RSI (Receptive Strain Injury)- Painful hand
3. CTS (Carpal Tunnel Syndrome)-Painful around nerves around the wrist.
c. Proper PC Ergonomics
(i) Proper sitting.
(ii) Place both feet flat on the ground.
(iii) Desk and computer position should be placed in the recommended angles.(avoid glare)
(iv) Lighting and ventilation.
d. What to be done to ensure well being of a computer user.
1. Take regular breaks, at least every 2 hours.
2. Stretch the legs, arms and feet regularly.
3. If possible get fresh air at least every 2 hours.
4. Do regular eye hand exercises.
5. Remember to blink and close eyes regularly.
6. Do not sit in one position for a long time.
e. Golden rules for PCs
1. Use a mouse pad on flat surface.
2. Keep the work place clean and tidy.
3. Clean computer components on regular basis.
4. Avoid eating or carrying food stuff on your workplace.
5. Allow space for ventilation around the computer and its peripherals.
6. Do not unplug peripheral devices when the computer is still on.
7. Do not share electrical socket with high voltage device eg fridge
8. Keep computer free of dust.
9. Use surge protectors.
f. Influence of computers on the environment.
1. What is E-waste/E-trash
- This is discarded electronic parts or components whether broken or merely out-dated.
- These devices contain toxic materials eg lead, cadmium and mercury.
How to stop or limit E-waste
- Recycle a cell phone.
- Download software.
- Print less
- Purchase recycled/recyclable products.
Compiled by E.Kabi 17
22) COMPUTER SECURITY
a) Computer Viruses
- A computer virus is a piece of computer code or program (set of instructions) written for the
sole purpose of damaging other software program or even hardware.
- The main purpose is to survive, reproduce and usually damage your computer system and or
files in the process.
- It is usually embedded in large legitimate program.
- Worms are viruses that replicate themselves until they slow the computer down.
Compiled by E.Kabi 18
- Theft of information (personal), credit card number and monitoring web-browsing activity
for marketing purposes.
1) Do not pick password that a person can guess easily e.g. ID NO.; Birthday, pets name
2) Do not pick a word that can be found in a dictionary
3) Do not pick a word that is currently newsworthy.
4) Pick a mixture of letters, numbers and symbols
5) The longer the password the better (6 – 13 characters)
6) Change passwords regularly
7) Do not share passwords with others
8) Do not write passwords down.
BACK-UPS
This is saving a copy of file somewhere else other than on the hard drive of the computer on which they
have been created.
Compiled by E.Kabi 19
IP Addressing Fundamentals
A host is a computer or device on a TCP/IP network. Every TCP/IP host is uniquely identified by
its IP address. An IP address consists of a network ID and a host ID. If two different hosts belong
to the same network, they have the same network ID. The two hosts will have different host ID's
and can communicate with each other locally without going through a router. If two hosts have
different network ID's, they belong to different segments on the network. They must
communicate with each other remotely through a router or default gateway.
An IP address consists of 32 binary bits, where each bit is either a 0 or 1. We first write
the 32 bits into four 8-bit numbers (octets) separated by periods(.).
For Example: 11000001. 00001010. 00011110.00000010 (IP address in binary form)
To convert the IP address from binary to decimal form, we convert each of the four 8-bit
numbers according to the following table:
Decimal 128 64 32 16 8 4 2 1
Value
Octet X X X X X X X X
Value
So the first octet in the above binary number would be translated as:
Decimal 128 64 32 16 8 4 2 1
Value
Octet 1 1 0 0 0 0 0 1
Value
Everywhere a 1 appears in table, the decimal value in that column is added to determine
the decimal value of the entire octet.
or 128 + 64 + 1 = 193
Using the same table to translate the other three octets would give us the following result.
00001010 = 8 + 2 = 10
00011110 = 16 + 8 + 4 + 2 = 30
00000010 = 2
So in decimal form, the above IP address is: 193 . 10 . 30 . 2 An IP address consists of two parts,
one identifying the network and one identifying the host. The Class of the address determines
which part is the network address and which part is the host address.
In the binary numbering system, the radix is 2. Therefore, each position represents increasing
powers of 2. In 8-bit binary numbers, the positions represent these quantities:
128 64 32 16 8 4 2 1
11111111
128 64 32 16 8 4 2 1
A 1 in each position means that we add the value for that position to the total. This is the addition
when there is a 1 in each position of an octet. The total is 255.
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
A 0 in each position indicates that the value for that position is not added to the total. A 0 in
every position yields a total of 0. 0 0 0 0 0 0 0 0
Compiled by E.Kabi 21
Evh 2012/13 – [email protected]
Compiled by E.Kabi 22