Introduction To Computers Notes
Introduction To Computers Notes
INTRODUCTION TO COMPUTERS.
Definition of a Computer:
A Computer is an electronic device that operates (works) under the control of programs
stored in its own memory unit.
A computer is an electronic machine that processes raw data to give information as
output.
An electronic device that accepts data as input, and transforms it under the influence of a
set of special instructions called Programs, to produce the desired output (referred to as
Information).
A computer automatically accepts data & instructions as input from an Input device, stores them
temporarily in its memory, then processes that data according to the instructions given, and
finally transfers the processed data (Information) to an Output device.
Explanations;
A computer has an internal memory, which stores data & instructions temporarily
awaiting processing, and even holds the intermediate result (information) before it is
communicated to the recipients through the Output devices.
It works on the data using the instructions issued, means that, the computer cannot do
any useful job on its own. It can only work as per the set of instructions issued.
A computer will accept data in one form and produce it in another form. The data is normally
held within the computer as it is being processed.
Program:
Data:
Data is a collection of raw facts, figures or instructions that do not have much meaning to the
user.
TYPES OF DATA.
Data Processing:
It is the process of collecting all items of data together & converting them into
information.
Processing refers to the way the data is manipulated (or handled) to turn it into
information.
The processing may involve calculation, comparison or any other logic to produce the required
result. The processing of the data usually results in some meaningful information being
produced.
Information:
Information is the data which has been refined, summarized & manipulated in the way you want
it, or into a more meaningful form for decision-making.
Data Information
1. Unprocessed (raw) facts or figures. 1. It is the end-product of data processing
(processed data)
2. Not arranged.
2. Arranged into a meaningful format.
3. Does not have much meaning to the
user. 3. More meaningful to the user.
Before 20th century, most information was processed manually or by use of simple machines.
Today, millions of people are using computers in offices and at home to produce and store all
types of information
The following are some of the attributes that make computers widely accepted & used in the day-
to-day activities in our society:
1. Speed.
Computers operate at very high speeds, and can perform very many functions within a very short
time.
2. Accuracy:
Unlike human beings, computers are very accurate, i.e., they never make mistakes.
A computer can work for very long periods without going wrong. However, when an error
occurs the computer has a number of in-built, self-checking features in their electronic
components that can detect & correct such errors.
Usually errors are committed by the users entering the data to the computer, thus the saying
Garbage in Garbage Out (GIGO).
This means that, if you enter incorrect data into the computer and have it processed, the
computer will give you misleading information.
3. Reliability.
The computer can be relied upon to produce the correct answer if it is given the correct
instructions & supplied with the correct data.
Therefore, if you want to add two numbers, but by mistake, give the computer a “Multiply”
instruction, the computer will not know that you intended to “ADD”; it will multiply the
numbers supplied.
4. Consistency:
Computers are usually consistent. This means that, given the same data & the same instructions,
they will produce the same answer every time that particular process is repeated.
5. Storage:
A computer can store data & instructions for later use, and it can produce/ retrieve this
data when required so that the user can make use of it.
Data stored in a computer can be protected from unauthorized individuals through the use
of passwords.
6. Diligence:
Unlike human beings, a computer can work continuously without getting tired or bored. Even if
it has to do a million calculations, it will do the last one with the same speed and accuracy as the
first one.
7. Automation:
A computer is an automatic device. This is because, once given the instructions, it is guided by
these instructions and can carry on its job automatically until it is complete.
8. Versatile:
A computer can be used in different places to perform a large number of different jobs depending
on the instructions fed to it.
9. Imposition of a formal approach to working methods:
Because a computer can only work with a strict set of instructions, it identifies and imposes rigid
rules for dealing with the data it is given to process.
Review Questions.
1. What is a Computer?
2. Why is a computer referred to as an electronic device?
3. Define the following terms as used in computer science.
o
o
o Data processing.
o
4. (a) Briefly explain the two forms of data.
PARTS OF A COMPUTER.
System Unit.
This is the casing (unit) that houses electronic components such as the ‘brain’ of the computer
called the Central processing Unit (CPU) and storage devices.
This system unit is made to stand alone. They are designed to be placed on the floor.
Tower style units have more space for expansion than the typical desktop units.
Desktop units lie on the desk with the monitor resting on top of the system unit.
This is the brain of the computer, and carries out all the processing within the computer.
Input devices.
These are the devices used to enter/put data into the computer.
They accept data for processing & convert it into a suitable form that the computer can
understand.
The Keyboard
The keyboard looks like a typewriter, and has letters, numbers and other keys through which data
is entered into the computer.
To enter data & instructions into the computer, the user should press the required keys.
The Mouse
It is a pointing device that enables the user to issue instructions to the computer by controlling a
special mouse pointer displayed on the screen.
Output devices.
Output devices are used to give the end results of data that was entered into the computer.
The Monitor
It is a television like screen used for displaying output. When you type a letter or number on the
keyboard, it shows up on the monitor.
Note. The monitor enables the user to monitor/track or see what is going on in the computer.
Printer
A computer is basically made up of a system unit and other devices connected to the system unit
called Peripheral devices.
Peripheral devices are the elements (components) connected to the system unit so as to assist the
computer satisfy its users.
Peripheral devices are connected to the System unit using special cables called data interface
cables that carry data, programs & information to and from the processor. The cables are
connected to the system unit using connectors called Ports.
Review Questions.
DEVELOPMENT OF COMPUTERS.
HISTORY OF COMPUTING.
Before 1900, most data processing was done manually using simple tools like stones & sticks to
count and keep records.
Around 2000 years ago, Asian merchants came up with a special calculating tool called Abacus
that could be used to calculate large figures.
An Abacus is made up of a rectangular frame and a crossbar at the middle. It is fitted with wires
or strings running across from the frame to the crossbar.
Each bead in the lower row has a value of 1, while each bead in the upper row has a value of 5.
To represent a number, the bead is moved to the crossbar. Those beads away from the crossbar
represent zeros.
The Figure below represents the number 6908 (Six thousand nine hundred and eight).
After Abacus, the first machine that is usually regarded as the forerunner of modern computers
was named the Analytical Engine, and was developed by an English mathematician called
Charles Babbage.
In 1939, Professor Howard Aken of Horrard University designed the first computer-like machine
named Mark 1. Since then, a series of advancements in electronics has occurred. With each
breakthrough, the computers based on the older form of electronics have been replaced by a new
“generation” of computers based on the newer form of electronics.
COMPUTER GENERATIONS.
The 1st generation of computers used thousands of electronic gadgets called Vacuum tubes or
Thermionic valves to store & process information.
The tubes consumed a lot power, and generated a lot of heat during processing due to
overheating.
The computers constantly broke down due to the excessive heat generated, hence were short-
lived, and were not very reliable.
Their internal memory capacity was limited. The maximum memory size was approx. 2 KB
(2,000 bytes).
The computers used big physical devices in their circuitry; hence they were very large in size,
i.e. the computer could occupy several office blocks. For example, ENIAC occupied an area of
about 150m2 – the size of an average 3-bedroom house.
They were very slow – their speed was measured in Milliseconds. E.g., ENIAC (the earliest
electronic computer) could perform 5,000 additions per second & 300 multiplications per
second.
ENIAC (Electronic Numerical Integrator And Calculator) built in 1946 for use in World
War II. It contained 18,000 Vacuum tubes.
The 2nd generation computers used tiny, solid-state electronic devices called Transistors. The
transistors were relatively smaller, more stable & reliable than vacuum tubes.
The computers consumed less power, produced less heat, were much faster, and more reliable
than those made with vacuum tubes.
Their operation speed increased to between 200,000 – 300,000 instructions per second. Their
speeds were measured in Microseconds. E.g., a computer could perform 1 million additions per
second, which was comparatively higher than that of the 1st generation computers.
The computers were smaller in size & therefore, occupied less space compared to the 1 st G
computers.
NCR 501, IBM 300, IBM 1401, IBM 7070, IBM 7094 Series & CDC-6600 Mainframe
computers.
ATLAS LEO Mark III.
UNIVAC 1107.
HONEYWELL 200.
Used electronic devices called Integrated Circuits (ICs), which were made by combining
thousands of transistors & diodes together on a semiconductor called a Silicon chip.
The processing speed increased to 5 Million instructions per second (5 MIPS).
The storage capacity of the computers (i.e., the RAM memory sizes) expanded to 2 MB.
The computers could support more than user at the same time. They were also able to support
remote communication facilities.
The 4th generation computers used Large Scale Integrated (LSI) circuits & Very Large Scale
Integrated (VLSI) circuits. These circuits were made by compressing more tiny circuits and
transistors into even smaller space of the silicon chip.
The computers were small, and very fast. Their processing speeds increased to 50 Million
instructions per second.
Had large storage capacity, i.e., their memory sizes expanded to several hundred Megabytes.
Memories used included Magnetic disks, Bubble memories & Optical disks.
The technologies used are Parallel architectures, 3-Dimensional circuit design & super
conducting materials.
They are able to perform parallel (or multi-processing) whereby a single task is split among a
number of processors.
The computers are designed using VLSI and the Microchip technology that has given rise to the
smaller computers, known as Microcomputers used today.
The computers have special instruction sets that allow them to support complex programs that
mimic human intelligence often referred to as Artificial Intelligence. Such programs can help
managers to make decisions and also provide critical expert services to users instead of relying
on human professionals.
Review Questions.
(b). Describe the FIVE generations of computers in terms of technology used and give an
(c). Compare computer memory sizes during the Five computer generation periods.
3. What was the most remarkable discovery during the second computer generation?
4. (a). Technology is the basis of computer classification. Based on this, explain briefly the
5. Match the following generations of computers with the technology used to develop them.
Generation Technology
First generation A). Very Large Integrated Circuit
Second generation B). Thermionic valves (Vacuum tubes)
Third generation C). Transistors
Fourth generation D). Integrated Circuits
ENIAC
VLSI
IC
Microcomputers use microprocessors, which are manufactured on a single chip, as their CPU.
In larger computers such as supercomputers, mainframe & minicomputers, the processing is
carried out by a number of separate, high-speed components instead of a single processor.
Processing speed.
Larger computers have faster clocks and therefore can process many instructions per second
compared to small computers, which have slower clocks.
All computers have some amount of RAM (Random Access memory), which is used to hold the
instructions required to perform a task.
Larger computers have more RAM and therefore can handle large volumes of data & also
support many and sophisticated programs which might require large memory sizes.
The storage capacity is the amount of space that is available for storing the instructions required
to manipulate data.
The cost of computers is directly related to the size. Microcomputers are less costly compared to
minicomputers, mainframes or Supercomputers.
The speed of an output device is determined by the amount of information that can be printed in
a specified amount of time.
The speed of microcomputer output device is less than that of the larger computers in that:
For a microcomputer, the speed of its output device is measured by the number of characters
printed per second (cps). For larger computers, their output devices are faster and their speeds
are measured depending on the number of lines or pages printed per minute (lpm / ppm).
Number of users who can access the computer at the same time.
Most microcomputers can support only 1, 2 or 3 users at the same time. However, they can be
networked to share resources.
Larger computers can support hundreds of users at the same time.
Review Questions.
1. Briefly explain five factors that can be used to determine the type of a computer.
CLASSIFICATION OF COMPUTERS
Computers can be classified into 5 main groups according to their size as:
Mainframe computers.
Portable computers (Laptops, Notebooks & Palmtops).
Supercomputers.
Supercomputers are the fastest, largest, most expensive & also the most powerful computers
available.
They are very fast in processing. They can perform many complex calculations in a fraction of a
second.
Most Supercomputers use multiple processors. In this case, a single task is split among the
processors for faster execution. However, all the processors are controlled by a single central
processor.
Supercomputers generate a lot of heat, & therefore require special cooling systems. Sometimes,
the whole CPU is deeped in a tank containing liquid Fluorocarbon to provide cooling.
Supercomputers are very large & heavy, and are usually kept under special environmental
conditions (i.e., in a special room).
They are operated by computer specialists. A Supercomputer can be operated by over 500 users
at the same time.
Areas where supercomputers are used:
Supercomputers are mainly used for complex scientific applications that involve many
calculations & require a lot of computational power. Some of the applications that use
supercomputers include;
Weather forecasting.
Petroleum research.
Defence and weapon analysis.
Aerodynamic design and simulation.
Note. These tasks use large amounts of data, which need to be manipulated within a very short
time.
Examples of Supercomputers:
Mainframe computers.
Are powerful computers with very high capacities of Main storage. They also have a large
backing storage capacity.
Have a very high processing speed, i.e., can process large amounts of data very quickly.
They can support a large number of peripherals of different types (can support between 5–300
terminals).
They can handle hundreds of users at the same time, e.g., they can be operated by 200 users at a
time.
Mainframe computers are general-purpose, and can handle all kinds of problems whether
scientific or commercial.
Mainframe computers are mostly found in government departments, big organizations and
companies which have large information processing needs, e.g., they are used;
Examples of Mainframes:
IBM 4381.
ICL 39 Series.
CDC Cyber series.
Minicomputers.
A Minicomputer is physically smaller than a mainframe. However, it can support the same
peripheral devices supported by a mainframe.
A Minicomputer can support several users at a time, e.g., can be operated by 6 users at a time.
Several workstations/ terminals are connected to one central minicomputer so that the users
connected can share its resources (C.P.U time, storage, etc).
Minicomputers are cheaper than the mainframes, but more costly than the microcomputers.
They handle small amounts of data, are less powerful, & have less memory than the mainframes.
Example of Minicomputer:
Microcomputers.
Microcomputers are the PCs mostly found today in homes, schools & many small offices. They
are called Personal Computers (PCs) because they are designed to be used by one person at a
time.
They consist of very few connected units, i.e. can support very few peripheral devices (usually 1
or 2).
Microcomputers are smaller in size & also cheaper than minicomputers. Their design is based
on Very Large Scale Integration (VLSI) that confines several physical components into an IC.
They are less powerful than minicomputers & their internal memory is smaller than that of
minicomputers.
Examples:
A Laptop is a PC sufficiently small & light such that a user can use it comfortably on his/her
lap. It is designed to be used by placing it on the lap.
Laptops are very small in size & are portable. They are small enough to fit inside a
briefcase; still leaving room for other items.
Laptops normally have in-built disk drives & Flat screens (Liquid Crystal Displays).
Note. The smaller computers like Laptops tend to be more expensive than Desktop computers
because of the following reasons:
Palmtops.
Palmtops are small enough to fit in the pocket, and can be held in the palm when being used.
Desktop computer.
This is the name given to any computer designed to be used when placed on a desk in an office
environment.
Home computer.
This is a low-cost microcomputer of limited capability designed for domestic use. It has
programs that are used typically for computer games or controlling family finances.
This is a microcomputer designed for independent use by an individual at work or in the home
mainly for business purposes.
PCs are mostly used in offices, schools, business premises, and at home for various
applications like computer literacy, Games, Database management, Accounting, Word
processing, Telecommunications, etc.
A PC can be connected to a mini & mainframe computer so as to enable the user access
the facilities offered by the larger machines.
A workstation is usually a desktop computer with all the facilities but interlinked to a network.
It is larger & more powerful than a PC. g., workstations use 32-bit microprocessors,
while PCs use 16-bit microprocessors.
It has in-built capabilities for its interconnection & operation with other computers, i.e., it
is fully connected to a computer network as any other computer on the network in its own
right.
It has high resolution graphics.
It has a Multi-tasking operating system, i.e. it is able to run multiple applications at the
same time.
An Embedded computer.
This is a computer that is within another device or system but is not accessed directly. E.g., there
are embedded computers operating within Petrol pumps, Watches, Cameras & Video recorders.
Digital computers can be classified further according to the tasks they perform either as:
General-purpose.
Special purpose
Dedicated computers.
General-purpose computers.
General-purpose computers are designed to perform a wide variety of tasks. They use
specifically written instructions (programs) to carry out the desired processing tasks.
Example;
A single computer can be used to process documents, perform calculations, process the Payroll,
simulate the loading on a bridge, process Insurance policies, and play games, among others.
Special-purpose computer.
For example;
In a computer Network, the Front End Processor (FEP) is only used to control the
communication of information between the various workstations and the host computer.
A Special-purpose computer is dedicated to a single task; hence it can perform it quickly & very
efficiently.
It is electronic.
Has a screen.
It has a Keypad.
Has a Memory.
It is programmable.
Dedicated computer.
E.g., the computer can be dedicated to carrying out Word processing tasks only.
Usually, there are two forms of data; Digital data, and Analogue data. Computers can be
classified according to the type of data they can process as either.
Digital computers.
Analogue computers, or
Hybrid computers.
Digital computers.
A Digital computer is a computer that operates on discrete data only. It can process both
numeric & alphabetic data within the computer, e.g., 0, 1, 2, 3…, A,B,C….
Their operation is based on 2 states, “ON” & “OFF” or on digits “1” & “0”. Therefore, any data
to be manipulated by a digital computer must first be converted to digital form.
Digital computers are usually general-purpose computers; hence, they are widely used in
different areas for data processing.
Digital computers are less accurate, i.e. may not solve all your problems since the facilities
provided are generalized.
Examples:
Analogue computers.
They carry out their data processing by measuring the amount of change that occurs in physical
attributes/quantities, such as changes in electrical voltage, speed, currents, pressure, length,
temperature, humidity, etc.
An Analogue computer is usually a special-purpose device that is dedicated to a single task. For
example, they are used in specialized areas such as in:
Note: Analogue computers usually use one characteristic, e.g. a length, to give information about
another physical characteristic, such as weight.
Analogue computers are very accurate & efficient since they are dedicated to a single task.
They are very fast since most of them use multiple processors.
The computer responds to the Cockpit simulator control movements made by the pilot to
physically change the environment so that the pilot feels as if he were controlling an actual
aeroplane.
A Bathroom scale.
It uses the weight of a person to move a pointer smoothly/continuously over calibrated scale,
which shows the person’s weight.
In Speedometer, the rotation of the wheel is converted to a voltage, which causes a pointer to
rotate over a dial calibrated in Km/h or Miles/h.
A Petrol pump measures the rate of flow of Gasoline (petrol) & converts the volume
delivered to 2 readings; one showing the volume & the other showing the cost.
A Post-office scale converts the weight of a parcel delivered into a charge for posting.
Hybrid computers.
Hybrid computers are designed to process both analogue & digital data. They combine both
the functional capabilities of the digital and analogue computers.
Hybrid computers are designed by interconnecting the elements of a digital computer &
analogue computer directly into one processor, using a suitable interfacing circuitry.
Hybrid computers are more expensive.
Example;
In a hospital Intensive Care Unit, an analogue device may be used to measure the functioning
of a patient’s heart, temperature and other vital signs. These measurements may then be
converted into numbers and send to a digital device, which may send an immediate signal to the
nurses’ station if any abnormal readings are detected.
Computer Calculators
1. Costly due to the technology used.
1. Cheaper – they imitate simple computer
technology.
2. Bigger in size.
2. Comparatively smaller.
3. Operate at very high speeds.
3. Slower than computers.
4. Are more accurate – they give up to
over 10 decimal places of accuracy.
4. Less accurate – most calculators give up to 8 dp
of accuracy.
5. Flexible – can be used in solving
any problem.
5. Mostly used for numerical calculations involving
arithmetic/ mathematical operations
6. Work under the control of
programs.
6. Calculators are non-programmable, but if
programmable, the range is limited.
7. Support a variety of peripherals,
e.g. keyboard, mouse, light pen, printer,
7. They only use Display units & Keyboards of
etc.
limited capabilities.
8. Have large internal memory of
8. their internal memory is very small. Most
several KB’s.
calculators only use Registers for temporary storage
during calculations.
9. Support large Backing storage
media.
9. Some calculators have got some sort of fixed
Backing store, though very limited.
10. A computer can support several
people at the same time.
10. A calculator can serve only 1 user at a time.
11. Have got telecommunication
11. Have no telecommunication capabilities.
capabilities.
12. Do not require well-monitored environmental
12. Require well-monitored
conditions.
environmental conditions.
Review Questions.
1. State three methods of classifying computers. In each case, list the different types of
computers.
2. What is a Personal computer?
3. Differentiate the following types of computers.
o Supercomputer and Mainframe computer.
o Minicomputer and a Personal computer.
o Special-purpose (dedicated) computers and General-purpose computers.
o Desktop computers and Laptop computers
4. Briefly describe terms “Analogue” and “Digital computers” as used in computer science.
5. Give three examples of Special-purpose computers.
6. Name any FOUR classes of computers based on size and complexity.
Computers have many advantages over other types of office and business equipments that are
used for data processing functions. Some of the advantages are:
The processing speed of a computer when measured against other devices like typewriters &
calculators is far much higher.
Computers produce more accurate results as long as the correct instructions & data are entered.
They also have the ability to handle numbers with many decimal places.
A computer requires less effort to process data as compared to human beings or other machines.
Computers can quickly and effectively store & retrieve large amounts of data.
They are very economical when saving information, for it can conserve a lot of space.
Computers can operate in risky environments, e.g. volcanic sites, dangerous chemical
plants, where human life is threatened:
Requires skilled manpower to operate, i.e., one has to have some knowledge so as to
operate a computer.
The records are usually kept in a form that is not visible or human-readable. This makes
it difficult to control the contents of the computer’s master file.
Information stored in computers can easily get lost due to power interruptions or machine
breakdown.
A computer doesn’t have its own intelligence, i.e., it cannot do any useful job on its own,
but can only work as per the set of instructions issued.
The computer technology is changing very fast such that the already bought computers
could be made obsolete/ out dated in the next few years.
In addition, this rapid change in the computer technology makes computers & related facilities to
become outdated very fast, hence posing a risk of capital loss.
The emergence of computers has increased the rate of unemployment since they are now
being used to perform the jobs, which were done by human beings.
Computers have led to increase in computer crimes especially in Banks. The computer
criminals steal large amounts of funds belonging to various companies by transferring
them out of their company accounts illegally. In addition, they destroy vital data used in
running the companies.
The following are some of the areas where computers are used:
1.
Supermarkets and other retail stores use computers for stock control, i.e., to help them
manage their daily activities.
The stock control system keeps record of what is in store, what has been sold, and what is out of
stock. The Management is automatically alerted when a particular item or items are running out
of stock and need to be reordered.
2)The use of computers has made Industries more productive & efficient. They are used:
To monitor and control industrial processes. The industries use remote controlled devices
called Robots. A Robot is a machine that works like a human being, but performs tasks
that are unpleasant, dangerous, and tedious to be done by human beings.
For management control, i.e. to keep track of orders, bills and transactions.
By companies as a competitive tool. g., they are used to assist in defining new products &
services. They also help industries form new relationships with suppliers and therefore,
enable the producers maintain a competitive edge against their competitors.
3. Banks/Insurance industries
4. Process control.
Computers are used in production environments such as factories to control chemical &
mechanical processes. The computers are usually loaded with specialized programs & each
computer is designed to do a specific job.
They are used to get a cross-sectional view of the patient’s body that enables physicians to
properly diagnose the affected part of the body with high levels of accuracy.
To enable medical experts in different countries to share their expertise or labour, thus
reducing the transportation of patients & professionals.
6)For receiving & sending of messages through e-mails, fax, etc.
Production of documents.
Keeping of records.
7. Government Institutions.
To store/keep records and improve the efficiency of work within the Civil service.
If computers were not used, the large number of files in government registries would make
information recovery extremely difficult.
To produce bills & statements.
8)Computers are widely used in the teaching & learning process. Learning and teaching using
computers is referred to as Computer Aided Learning (CAL) and Computer Aided Teaching
(CAT).
Computers are used in learning institutions (schools & colleges) as teaching aids, i.e. to
help in teaching various subjects.
E.g., they are used to demonstrate experiments in subjects like Chemistry or Physics using a
special program that can illustrate them on the screen through a process called Simulation.
To assist the Long distance learning in universities usually referred to as the Open
University Concept.
Computers are used in Aviation for training of pilots. Flight simulators are used to
monitor the control movements made by the pilot while the computer is used to
physically change the environment so that the pilot feels as if he were controlling an
actual aircraft.
9)Computers can be used for research in various fields. They are used by:
The integration of computers & telecommunication facilities has made the transmission and
reception of messages very fast and efficient.
They are used in telephone exchanges to switch incoming & outgoing calls.
For sending & receiving electronic messages, e.g. fax and e-mails, if connected to a
computer network.
11. Transport industry.
Shipping control. The computers are used for efficient management of fleets &
communication.
To control the movement of aircrafts, take off & landing through the use of radar
equipment.
Making reservations (booking purposes).
Storing flight information.
Computers are widely used in fighting crime. The Police use computers to keep databases
on fingerprints and also analysed them.
The Police also use computers for face recognition, scene monitoring & analysis, which
help them to arrest traffic offenders and criminals.
The information held in computers such as fingerprints, photographs and other identification
details helps law enforcers to carry out criminal investigations speedily.
13) Computers are used in electronic news gathering, efficient communication, detecting
and tracking of targets; in radar systems, warning systems & in guided missile systems.
Computers are used in military defence equipments, e.g. Fighter jets, Rockets, Bombers,
etc.
The presentations are done using overhead projectors attached to computers running slide shows
& digital video clips taken using a Camcorder. An overlaid voice is used to describe the
product.
To enable the library personnel to easily access & keep updated records of books and
other library materials.
To search for book titles instead of using the manual card catalogue.
The emergence of computers has provided employment opportunities to very many people.
Review Questions.
Education
Communication industry.
Law enforcement agencies.
Domestic and Entertainment.
2. Explain various ways computers have been mostly used in our country.
3. List down and explain 6 uses of computers in our society.
4. Explain the similarities and differences between human beings and computer systems.
COMPUTER LABORATORY.
Definition:
A Computer laboratory is a room that has been specially prepared to facilitate installation of
computers, and provide a safe conducive environment for teaching & learning of Computer
Studies.
Computer systems are expensive to acquire & maintain, and should therefore be handled with
great care. Most computer breakdowns are caused by failure to follow the correct instructions on
use of equipment, carelessness, and neglect.
Computer hygiene involves keeping the computers in good care & order.
Review Questions.
After establishing the computer laboratory, a number of safety precautions, rules, and practices
need to be observed in order to avoid accidental injury to the users, damage of computers or lack
of a conducive environment for teaching and learning.
Food particles may fall into the moving parts of the computer and damage them. Liquids may
spill into the computer parts causing rusting or electrical faults.
Collect any waste materials (e.g., paper bits) which might be lying in the computer room
& put them into the dustbin.
Avoid unnecessary movements, because you may accidentally knock down the peripheral
devices.
Computer users should be trained on how to use computers frequently.
Computer illiterates should not be allowed to operate the computers.
Shut the door of the computer room properly.
Always follow the proper procedure for starting & shutting down the computer to avoid
loss of data and damage to computer programs.
Avoid turning the computer on & off frequently as it is harmful. Every time a PC is
turned on, the internal components get heated and again cool down when the computer is
turned off. As a result, the circuit boards expand & contract and this can badly affect the
solder-joints of the computer.
Inflammable chemicals, such as those used for cleaning & servicing the computer
equipment.
Electrical faults, such as open wires or cables.
Keep the chemicals away in a store after using them to avoid any accidents.
Ensure that all electrical wires are properly insulated. Open wires or cables must be
properly covered with an Insulating tape or replaced with new ones as they can cause fire
leading to damage of equipment.
The computer room must always have a gaseous fire extinguisher especially those
containing Carbon dioxide in case of any accidents.
Note. Water based or Powder extinguishers should not be used in the computer room because;
they can cause damage to computer components.
Water causes rusting of the metallic parts and short circuits, while Powder particles normally
settle on storage devices and may scratch them during read/write operations.
Any incidence that may result in damage to equipment should be reported to the person
in charge of the laboratory.
No student should attempt to repair the equipment as this may lead to complete damage
of the equipment.
3. INSULATION OF CABLES.
All power cables in the computer room must be properly insulated and laid away from
busy pathways in the room (i.e., preferably along the walls). This prevents the user from
stumbling on the cables, which might cause electric shock or power interruptions.
System cables should be of the best quality & type, and should also be properly clipped
(fixed).
The cables should be handled carefully especially at the ends to avoid breaking the pins.
Ensure that there is a steady flow of input power to the computer in order to prevent loss
of data or information & also prevent damaging the computer’s secondary storage media.
Note. Power from main supply is not always stable and may sometimes experience power
surges or under voltage (also referred to as Brownout). To protect the computer from being
damaged due to power instabilities especially in areas where power fluctuates, avoid connecting
it directly to the main supply. Instead, it is important to connect the computer to a special power
correction equipment or device such as a Stabilizer or Uninterrupted power supply /source
(UPS), then connect the UPS to the main supply.
The UPS gets charged when the main power is on. When the main power goes off, the UPS
gives some sound (usually a beep) to alert the user.
1. It regulates power from an unstable power source to the required clean stable voltage.
1. It prevents power surges and brownouts that might destroy the computer.
1. It temporarily provides power to the computer in case of the main power failure. This
allows the user to save his/her work and shutdown the computer using the correct
procedure.
To ensure that work continues even in the absence of main power, organizations that give
important services such as banks, schools, & hospitals usually install devices that provide
alternative sources of power such as standby generators, solar panels, rechargeable batteries,
etc that automatically comes on in case of a power failure. Such devices are referred to as
Power backups.
However, note that, power from a generator must pass through a UPS before being fed to the
computer, because it is also not stable.
Physical access to the computer room should be restricted to ensure that only authorized persons
get access to the computers.
To prevent unauthorized access to the computer room, the following controls should be
implemented:
Fit strong metallic grills and locks on the doors, windows & roofs (in case the roofing is
weak).
Lock the doors, (i.e., keep the computers in a strong room, which should remain firmly
locked when not in use).
Install security alarms at strategic access points so as to alert the security personnel in
case of a break in.
Use of special voice recorders that would be able to analyse the voice of a trespasser &
check against the database containing the voice patterns of valid users.
2.
Both computers and human beings emit heat energy into the environment. Therefore, the
computer room must have good circulation of air to avoid overheating and suffocation.
Proper ventilation enables the computers to cool, and therefore, avoids damaging the electronic
parts.
The room should have large & enough windows & doors.
Installing an air-conditioning system.
Installing cooling fans.
Avoid overcrowding of either machines or people in the room.
3. DUST CONTROL
NB: If the environment is dusty, the computers should be regularly serviced to get rid of harmful
dust.
The service should include; blowing dust from the System unit, cleaning the floppy drives,
cleaning the Keyboard, cleaning the Monitor externally, and also cleaning all peripheral devices
such as Printers and Mouse.
4. DUMP CONTROL.
Humidity in the computer laboratory must be regulated to remain at an optimum 50%. If the
humidity is low, it allows static electricity to build up and causes damage to sensitive electronic
components. Similarly, high humidity of over 70% causes rusting of the metallic parts of the
computer system.
To eliminate low humidity, place humidifiers in the room, while high humidity can be controlled
by installing dehumidifiers in the room.
Computer devices must be handled with a lot of care as they are extremely fragile and can easily
get damaged. Dropping or bumping can cause permanent damage on the device, e.g., to
transport the System unit always handle it on its frame.
Always use the manufacturer’s shipping carton when transporting the devices.
Do not place heavy objects on the computers.
Protect the computer devices especially the Monitor & the disks from any electrostatic
discharge.
The computer devices should not be exposed to direct sunlight or warm objects. This
causes the internal components of the computer to get heated, and as a result, effects the
computer’s solder-joints.
Students should only perform operations on the computer that they are sure of and under
supervision. If in doubt, the student should ask to ensure that no damage is caused due to
lack of proper knowledge.
Computer equipment should be regularly checked and serviced.
Floppy disk management.
Floppy disks are used to store data, and if properly taken care of, they reduce the likelihood of
destroyed or corrupted data.
Note. Data is very difficult & expensive to reconstruct, unlike application software, which can
easily be re-loaded.
Insert the diskette in the drive with the correct side up & in the correct direction.
The diskette should slide in easily (with no force at all) until it locks in the drive. To remove the
diskette out of the drive, press the Eject button.
Don’t touch the exposed surface of the diskette when inserting or removing it.
Don’t remove the diskette from the drive if the drive light is shining. This indicates that
the diskette is in use, and removing it might damage the files on the diskette.
Never leave the diskette in the computer after finishing its job.
Ensure that all your diskettes are labelled carefully using meaningful names that indicate
the right contents of the diskette. The labels should be applied at the slightly depressed
region at the top surface of the diskette.
Labelling prevents confusing the data in the different diskettes, and also mixing diskettes that are
used everyday with those used for long-term storage of important data.
Use a soft writing material such as a soft felt pen to write on the diskette.
Use the shutter at the bottom of the diskette to write-protect it in order to protect the data
stored in it.
Note. To write-protect the diskette, the shutter is pushed up until the hole is covered & no data
can be written to the diskette. To write to the diskette, the hole must be left open.
Avoid overusing the diskette. If used for long (usually over 6 months), its surface wears
out.
Keep your disks safely away from extreme temperatures or direct sunlight, i.e., avoid
placing the diskette near possible heat sources, e.g. on top of monitor displays.
Keep floppy disks away from any magnetic media, e.g., near power supplies & magnets.
They can corrupt the data.
Never carry disks in loose bags or in pockets to prevent dust from getting in & harming
them.
Store your diskettes in disk banks or a proper storage jacket. Use envelopes or enclosed
polythene when carrying them.
Never use clips or staples to hold the disks to avoid damaging them.
Protect the diskettes against computer viruses, i.e. you should not use foreign diskettes in
your computer, especially if you suspect that they might have viruses in them.
Use of Printers.
1. Different printers have different sensitivity to printing papers. Using the wrong quality
paper in a particular printer can make the paper get stuck.
1. Printers are very specific to manufacturer’s cartridges & ribbons. Use of clones or
imitations (i.e., the wrong make & model) can damage the printer mechanism.
1. Avoid refilling of cartridges or re-inking of Ribbons. This can spoil the printer due to
leakage or use of poor quality materials.
6. LABORATORY LAYOUT.
The computer laboratory should have enough floor space to facilitate free movement
from one place to another.
Your working surface must be large enough to hold the computer equipment & any other
additional items required. This prevents squeezing the devices together & also minimizes
breakages.
The table/bench on which a computer is placed must be strong and wide enough to bear
the weight and accommodate all the peripheral devices.
The seat for the user must be comfortable, and have a straight backrest that allows
someone to sit upright. This prevents muscle pains & backaches caused by poor sitting
posture.
For example;
Adjust the height of the chair or working surface so that your forearms are parallel with
the floor and your wrists are straight.
The seat must be high enough relative to the table to enable the user use the hands on the
keyboard comfortably.
The eyes must be at the same level with the top of the screen when the user is seated
upright.
You should be able to maintain your proper arm position and place your feet firmly flat
on the floor.
Adopt a relaxed, upright working posture. Avoid slouching (bending) forward or leaning
far backwards.
The Chairs should have low back support & footrest and should also be adjustable.
For example;
The Keyboard, Mouse & other input devices should be positioned such that your hands
are in a relaxed, comfortable position.
Position the Keyboard directly in front of you. This makes it possible to type with your
shoulders relaxed and your upper arms hanging freely at your sides.
A computer room must be well lit to avoid eyestrain that eventually leads to headaches, stress,
and fatigue. Similarly, when you work at your computer for long periods of time, your eyes may
become irritated. Therefore, special care should be given to your vision.
Tilt the computer so that the display faces away from the windows. This will minimize
glare (or bright reflections) on the screen.
Position the lighting equipment or sources of light such that glare (or bright reflections)
on the display are minimized. Where necessary, use indirect lighting to avoid bright spots
on the display.
Use/fit radiation filter screens that are specially tinted to reduce the light that reaches the
eye.
Avoid using a flickering monitor. This causes extreme eyestrain that can damage your
eyesight.
The wall paints used should not be very bright as they reflect too much light causing
eyestrain.
Use the brightness & contrast controls on the Monitor to adjust the brightness of the
computer monitor until the eyes feel comfortable, and also to improve image quality of
your display.
Turn off the screen when not in use or reduce its brightness in order to prevent screen
burnout.
If the room has windows, use blinds or shades to control the amount of daylight in the
room.
You should have glasses that are specifically suited for working with the computer
display.
The distant between the user & screen should be between 450 – 500 mm.
Review Questions.
1. List down THREE safety precautions one should observe when entering a Computer
laboratory.
2. Why must foods and beverages be kept out of the computer room?
3. Discuss TWO main causes of fire or accidents in the computer laboratory and give the
precautions that should be taken to guard against them.
4. (a). Give Six safety precautions you should take when handling diskettes.
(b). Where should the arrow on a diskette point when being inserted into the floppy drive.
5. List THREE things that can spoil a Printer if they are not of the correct specification, and
explain what damage may be caused.
6. Why are powder based and water-based fire extinguishers not allowed in the computer
room?
7. Identify three facilities that will ensure proper ventilation in a room.
8. Give THREE reasons why it is important to regularly service the computer.
9. Explain precisely how the Keyboard, mouse, and other Input devices should be arranged
to avoid strain while working on the computer.
10. (a). What name is given to alternative sources of power in a computer.
11. State two reasons why a computer needs to be connected to a stable power supply.
12. State two functions of the UPS.
13. State two reasons that are likely to cause eye-strain in the computer room.
14. Identify three proper sitting postures while using the computer.
1. Before switching on a computer, make sure that all the components are properly
connected, and that the computer is connected to an active power source.
2. Turn on the switch at the source of the power supply. If your computer is connected to a
constant voltage Stabilizer or an Uninterrupted power supply (UPS), turn it on after
switching the main supply.
3. Turn on the switches on the System unit and the Monitor. Switch on the power button on
the Monitor first, then followed by that of the System unit.
After the power is on, the computer automatically goes through a process called Booting.
Booting is a term used to describe the starting up of a computer. It is the entire process that
makes the computer ready for use.
Types of Booting.
Cold booting.
Warm booting.
Cold booting.
This happens when a computer that was originally off is switched on by pressing the power
button on the system unit.
Warm booting.
This happens when a computer that was originally on is forced to restart by pressing the Restart
button on the System unit or by pressing a combination of keys on the keyboard (Ctrl+Alt+Del).
In Windows operating systems, one can use the Restart option on the Shutdown dialog box to
perform a warm boot.
When Power is switched on, the computer starts by checking all its components to determine
whether they are available for use and whether they are functioning correctly. It does this by
executing a small program called the Power-On-Self-Test (POST) that is permanently stored in
ROM.
POST prepares the computer for use by instructing it to perform a number of diagnostic tests
when booting up. It instructs the computer to check the memory (RAM) to make sure it is
operating correctly; check the CMOS (BIOS), Hard disk controller, Floppy disk drive controller
& the Keyboard.
During this process, some monitors display information showing the status of each device being
tested. If a problem is found, e.g., in case one of the devices is faulty or missing, the process will
halt and display an appropriate error message on the screen indicating to the user where the
problem is located. Sometimes, an error code is displayed with the message, or an abnormal
number of beeps are sounded.
The special program that directs the POST process is called the Basic Input Output System
(BIOS).
After finishing working with the computer, the user must follow the correct procedure of
shutting down the computer in order to ensure that loss of data, damage of programs and
computer components does not occur.
1. Save all the work done on the computer, and close all programs that may be currently
running.
2. Remove any floppy disk you might have inserted in the computer.
3. Follow the proper shut-down procedure required before switching off the computer.
For example;
Click the Start button on the screen, then select Shut Down from the list.
In the prompt that appears, select Shut down, then press the Enter key on the keyboard.
After a few seconds, the message “It is now safe to turn off the computer” appears on the
screen. Switch off the System unit, then the Monitor.
Note. Some system units switch themselves off automatically. In such a case, press the button
on the Monitor to turn off the screen.
Review Questions.
KEYBOARD.
The Keyboard is a computer input device by which data & instructions is typed into the
computer memory.
It enables the user to enter data & instructions into the computer by pressing its keys.
Types of Keyboard.
KEYBOARD LAYOUT.
The Keyboard of a computer consists of keys similar to those of a typewriter. It contains the
usual range of alphabetic characters (A – Z), digits 0 – 9, and other symbols frequently used to
represent data items. However, it has some command keys for giving special instructions to the
computer.
SECTIONS OF THE KEYBOARD.
Most Keyboards have a total of 101 keys, which are divided into 5 different groups: –
These are the keys located along the top of the Keyboard marked F1 up to F12. They are used to
issue commands into the computer.
Each of these keys is used to perform a special function in various application packages, e.g., F1
is used in most applications for help.
Function keys are used differently by different applications, i.e. their functions vary with
different programs, and are therefore sometimes called Programmable Keys.
Alphanumeric keys.
This section consists of alphabetic & numeric keys. Alphanumeric keys are mostly used for
typing of text.
It has the 26 letters of the English alphabet marked on them in capital letters, and Number keys
arranged in their natural order from 0 – 9. Along with these keys are Punctuation marks
(comma, full-stop, etc) and some Symbols.
At the bottom of the alphanumeric keys, is the Space bar, which is used to separate words or
sentences from each other (or to create a blank space after typing each word).
It is on the rightmost part of the Keyboard. It has keys with digits (numbers) 0 – 9 marked on
them in rows from the bottom upwards.
The keypad also has some mathematical symbols marked on its keys. They include: the
multiplication sign (*), subtraction sign (-), addition sign (+), division sign (/) & the decimal
point (.).
The Keypad is used for fast entry of numeric data into the computer.
Note. The numbers on the Numeric keypad can only be used when the Num Lock key is turned
on.
They are used to move the Cursor (insertion point) within the window of an application.
They include; Page Up, Page Down, Home, End, & the four Arrow Keys.
Arrow keys:
To move the cursor one character to the right in a Word processing document, press the Right
arrow key; to move the cursor one character to the left, press the Left arrow key.
To move the cursor one line up, press the Up arrow key; to move the cursor one line down, press
the Down arrow key.
To move the cursor up one page in case the document has many pages, press the Page Up key; to
move the cursor down one page, press the Page Down key.
To move the cursor to the beginning of the current line, press the Home key; to move the cursor
to the end of the current line, press the End key.
Editing keys.
Backspace key.
Used to erase characters to the left of the cursor (i.e., from right to left on the same line).
When pressed, it makes the cursor move one space backwards and the immediate letter or
number to the left is erased.
Delete (Del) key.
It is used to erase characters to the right of the cursor, (i.e., from left to right).
Used in a word processor to switch between the Insert mode & Overtype mode. When
pressed, it helps the user to insert text in the middle of a sentence or replace a character at
the cursor position (i.e., overwrite the text).
They are used in combination with the other keys or on their own to perform special
functions/tasks, or to give special instructions to the computer.
Examples; Esc, Tab, Caps Lock, Shift, Ctrl, Alt, Enter, Num Lock, Scroll Lock.
TAB key ( ).
It is used in certain programs such as Word processors to move the text cursor or a certain text at
set intervals on the same line to the required position on the screen, e.g., 10mm, 20mm, etc.
A Cursor is a blinking underscore ( __ ) or a vertical beam (I ) that shows where the next
character to be typed will appear.
CAPS Lock.
Used to switch between capital (uppercase) letters & small (lowercase) letters.
When pressed on, an indicator with a Green light appears on the top-right hand corner of the
Keyboard, and all the text typed will appear in capital letters. When pressed off, all the text
typed will appear in small letters.
SHIFT key ( ).
It can be used to get single capital letters. Hold down the SHIFT key & press an alphabet
key to get the letter in its capital form.
It is used to get the punctuation marks on top of the Number keys or the symbols on top
of certain keys especially on the alphanumeric section.
To get the punctuation mark on top of a number key or the symbol on top of a certain key; press
& hold down the SHIFT key before pressing the required key.
ENTER key (↵).
It is used as a RETURN When pressed at the end of a text line or paragraph in a word
processor, it forces the text cursor to move to the start/ beginning of the next line or
paragraph.
It generates special code for the computer. In some programs, it is used when you want to quit
doing some task, i.e. escape from or to cancel a task.
It controls various functions in combination with other keys, e.g. CTRL+”S” is used to give the
command for saving the text/object.
Some key shapes cause much confusion. If you use the wrong key, the process you are working
on may not work as expected, but it may be very difficult to determine what is wrong.
Look closely to spot the difference between capital “I”, one (1) and “l” (lowercase “L”), and
between small “o”, capital “O” and zero “0”.
The Hyphen key (dash or minus) & the Underscore (underline) are on the same physical key
top. To get the underscore, use the SHIFT.
The Underscore is often used in places where a space is needed to separate individual words, but
is not legal in the context. E.g., the filename TAX 1990 is illegal in MS-DOS because of the
blank space between TAX and 1990, but TAX_1990 is legal. The Underscore takes the places of
the blank space.
Both symbols are on the same physical key top. To get the double quote, use the SHIFT.
Accent grave (`) & Tilde (~) are found on the same key top. The Tilde is used in Mathematics,
foreign languages, or in UNIX operating system to indicate the home subdirectory.
Each of these symbols is used differently depending on what program you are running.
Sit upright with both feet firmly on the ground, maintaining an alert posture.
Place the material to be typed on your left in a position you can read without strain.
Rest both hands on the keyboard with fingers resting on the Home keys.
Home keys are the keys on which fingers rest during typing in readiness to press other keys.
The home keys for the left hand starting with the small finger are A, S, D, F with the thumb on
the Spacebar, while those of the right hand are the apostrophe (‘), semicolon (;), L, K with the
thumb on the Spacebar.
Start typing the text slowly at first, making sure you are using all the ten fingers, and that
you press the key nearest to the home keys with the closest finger, e.g., to press Q, use
the small finger on the left hand, while to press J, use the index finger on the right hand.
Descriptive Questions.
1. Define a Keyboard.
2. (a) Give the TWO types of Keyboards found in the current market.
(b) State and briefly explain the functions of five categories of keys found on a standard
keyboard.
3. State the use of each the following section or combination of keys on the keyboard:
Function keys.
Numeric keypad.
Arrow keys.
Control key.
What is the difference between Function keys and Special PC operation keys?
Caps Lock.
Shift Key.
Enter Key.
Num Lock.
MOUSE.
A Mouse is a pointing device that enables the user to issue instructions to the computer by
controlling a special mouse pointer displayed on the screen.
A Mouse consists of 4 parts: –
A Roller ball – used to slide/move the mouse on a flat surface. It also enables the cursor
to move on the screen as required.
The Sensor Buttons (Right & Left) – used for making selections.
To use a mouse, hold it in your hand and move it across a flat surface or on top of a table. When
you move the mouse, an arrow-shaped pointer called the Mouse pointer moves across the
computer screen in the same direction. The pointer is usually controlled by moving the mouse.
Position the tip of the pointer (cursor) over the item to be selected;
Press a button on the mouse to make your selection.
Point: – this means moving the mouse until the tip of the pointer on the screen is over the item
you want to select.
To select an item on the screen, point the item, then press a mouse button. Use the Left button
(Primary button) for most tasks or the Right button (Secondary button) to quickly accomplish
common tasks.
Clicking: – pressing & releasing the left mouse button once. A click usually selects an
object/item on the screen.
Double-clicking: – pressing the left button twice in a row (in a quick succession) without
moving the mouse. Double-clicking usually opens a file or starts a program.
Right-clicking: – pressing the right mouse button once (or, selecting an item by use of the right
mouse button).
A right click usually displays a list of commands from which the user can make a selection. This
list of commands is called a Shortcut menu or Context-sensitive menu. This is because; the
commands on this menu apply to the specific item that has been right-clicked.
Shortcut menu:
Drag and drop: This is whereby the user moves an item from one location on the screen to
another.
Review Questions.
4. Distinguish between:
COMPUTER SYSTEMS.
The term System can be defined as a collection of independent entities that collectively work
together to achieve a desired goal.
All things can be viewed as being made up of small independent components (subsystems) that
come together to form a bigger more complex system.
For example;
A School can be seen as a system with students, teachers, Accounts department, and the
Administration as subsystems. The school system itself is a subsystem of the ministry of
education.
COMPUTER SYSTEMS.
The term Computer system refers to the complete set of devices required to use &
operate the computer.
Computer system is the complete set of devices that make a computer work as one unit.
A collection of entities that work together to process and manage information using
computers.
A computer system consists of the computer itself & supporting devices for input, output,
processing & storage of data such as disks, Monitors, Printers, etc
A Computer system consists (or is made up) of 4 basic elements that are interrelated and work in
unison. The four elements are:
Liveware (Computer user).
HARDWARE.
Hardware is a term used to describe all the physical & tangible devices that make up a computer
system, i.e. it consists of the parts that can be touched and felt.
Hardware include all mechanical & electronic elements found in the computer, e.g., the System
Unit, Transistors, Diodes, bus systems such as electronic paths (channels), the Input devices
(e.g., Keyboard, Mouse), Output devices (e.g., Monitor) & the Storage devices.
Hardware devices enable the user to enter information into a computer, view the output on
screen, print out our work, store and process the work.
The hardware elements of a computer are generally grouped/ sub-divided into 4 major
categories:-
Input devices.
Input devices are used to communicate with a computer. They enable the computer user to enter
data, information & programs into the computer. They also let the user issue commands to the
computer.
An Input device converts the input information into machine-sensible/ readable form.
Examples.
* Keyboard. * Mouse.
* Key-to-disk. * Key-to-Tape.
* Document readers, such as, Magnetic Ink Character Reader (MICR), Optical Mark Reader
*Point Of Sale terminals, such as, Bar code readers, Kimball Tag readers, Card readers, &
Badge readers.
The CPU is composed of the Main Memory, the ALU & the Control unit.
The CPU performs the necessary operations on the data held within the memory. It interprets &
processes all the instructions from the Input devices.
The CPU is housed in the computer casing (System Unit), which contains all the major
components of a computer system.
Output devices.
Output devices are used to extract/ disseminate processed data from the computer. They display
the results of all the information that has been processed.
They also convert machine-coded output results from the Processor into a form that can be
understood by people.
Examples.
Storage devices.
These are devices used to store data & programs in computers. They include; Hard disks, Floppy
disks, Magnetic tape drives, Cassette Tapes, Optical disks (CD-ROMs), and Random Access
Memory (RAM).
Note. All these storage devices differ in the way (technology) they store data & the capacities of
data they can hold.
SOFTWARE.
These are the programs & data used in a computer system that enable it perform a no. of
specific functions.
Software is a set of computer programs that guides the computer in each and every
activity that happens inside the computer during data processing operations.
When used in a computer, Software instructs the computer to carry out specific processing tasks,
e.g. produce the year end Balance sheet.
LIVEWARE
Liveware is a term used to refer to the computer end-user. They are the people who coordinate
the various activities, which are necessary to get a computer system to perform useful tasks.
They include; Data entry operators, Computer Operators, Programmers, System Analysts, Data
Processing Managers, Database Administrators, Computer Librarians, and the other staff directly
or indirectly involved in the running of the system operations.
Apart from the hardware and software elements, the user is also seen as an integral part of the
computer system as shown in the figure below;
Input devices.
Central Processing Unit (CPU), also called the Processor.
Output devices.
Memory storage devices, which consist of Main memories & Secondary memories.
Data & instructions to be processed are supplied to the computer memory by the user
with the help of Input devices.
The CPU performs the desired operations on the data and the results of calculations/
processing are communicated to the user through the Output devices.
The data and/or instructions not being used immediately by the computer are held
permanently in the Backing storage, for retrieval any time it is required by the user.
INPUT DEVICES.
Before a computer can process any data, it must be given the data & program instructions by use
of an Input device.
Input is a term used to describe all that goes into the computer memory (usually the raw data &
instructions) to await processing.
Input involves entering data & instructions into the computer by use of suitable devices.
1. Accepts data & instructions from the user into the computer system.
2. Read data from the medium on which it is stored.
3. Converts the human-readable data into electronic/machine-readable form (i.e. a form that
can be understood by the computer)
4. Accepts commands for running, halting or aborting a program from the user.
5. Data input can either be Online or Off-line.
Once the data is entered into the computer, it finally enters the Main storage.
Exercise.
Input devices can be classified according to how they are used to enter data into a computer.
These include.
Keying devices.
Pointing devices such as the Mouse, Trackball, etc.
Scanning and other data capture devices, e.g., Scanners, Digital cameras, etc.
Data capture devices are those devices that automatically capture data from the source.
KEYING DEVICES.
Traditional keyboard
Flexible keyboard
Ergonomic keyboard
keypad.
POINTING DEVICES.
These are the input devices that enter data or instructions by controlling a pointer on the screen.
Examples of pointing devices are; Mouse, Trackball, Joystick, and Light pen.
MOUSE.
A mouse is a pointing device that rolls on a small ball and is used to control the movement of the
cursor (or, a pointer) on the computer screen.
Types of mouse
Traditional mouse
Optical mouse
Cordless mouse
The mouse is mostly used with Graphical User Interfaces (GUIs). It issues commands to the
computer by activating certain simple graphic images called Icons displayed on the screen.
1. The mouse is easy to learn & convenient to use. This is because; it is used to select
options (icons) displayed on the screen.
2. It is inexpensive.
3. Most modern software includes an option to use it.
4. It performs operations much easier & much more quickly than a keyboard. It is very fast
to work with as it lets the user provide simple “point” & “click” instructions to the
computer.
5. Can be used in art and design work because; it allows diagrams to be drawn & modified
easily.
TRACKBALL.
A Trackball works just like the mouse, but instead of moving it on a flat surface, it has a ball
fixed on its top which is rolled using the index finger.
As the ball rotates, it moves a pointer on the screen. The user can then click its button to execute
the selected command.
The advantage of a trackball over the mouse is that, a Trackball doesn’t require a flat surface for
movement.
Note. Today some computers come with a trackball on top of a Keyboard and a Mouse.
LIGHT PEN.
A Light Pen is a hand-held device similar in shape to a ball-point pen, and has a light sensitive
point. It consists of a pen-like device called a stylus connected by a cable to a computer
terminal.
A Light pen is used together with a graphic VDU that is able to sense light shining on the screen
using special hardware & software. A Light pen does not emit light but instead, it reacts to the
light emitted by the display using a photosensitive detector at its base.
When the pen is moved across the screen, its position is sensed because of the light it produces.
A Light pen provides a direct input mode. It can be used to read data directly from the
source document. It allows the user to point directly to an object on the screen, thus
identifying it to the screen.
It can also be used to select items from a given list of ‘menus’ displayed on the screen by
simply pointing the pen at the item required & then pressing a button on the pen.
Light pens are usually used as design aids – they can be used to draw images on the
screen, which can be printed. They can also be used to indicate a point on a screen or pad,
for example, to select options for drawing.
TOUCH-SENSITIVE SCREENS.
A Touch-sensitive screen uses the human finger as the input medium, (i.e. one can select items
or options from a given list by touching the screen with a finger).
This method of input is usually used with a VDU, which is able to sense the touched points on
the screen.
When the user touches the screen with a finger, it blocks out the light emitted from that portion
of the screen. The computer detects the position of the finger. The screen can then determine
which part is being touched, and therefore, which selection is required.
Touch screens are mostly used in public places like banking halls, hotels, in airports (to provide
guidance information), etc.
Notes.
Both the Light pen & the Touch provide fast input modes.
There is no typing or printing required; however, they operate under the influence of
complex programs.
These are hand-held Input devices, which enable the user to interact with a program. They are
used for playing computer games.
A Joystick is an input device that looks like a car gear lever. It is an analogue-to-digital
converter where the input involves moving the control lever sideways, upwards or downwards to
control the movement of the cursor on the screen.
Just like the mouse, it has a button which is used for selecting an item. It is commonly used in
playing video games.
A Game paddle may consist of a button, which can be pressed by the user to input data to the
program. When the program senses that the button has been pressed, it takes the appropriate
action, such as, firing a missile or reversing the direction of a tank.
A Game paddle can also consist of a dial which when rotated; it conveys information to the
program. The program must immediately act on the information supplied by the dial setting, e.g.
a goalkeeper may be moved across the face of the goal to intercept a shot.
DIGITIZERS.
The Digitizers are input devices that convert graphical drawings or images on the paper or other
material into digital data and convey them to the computer memory.
Digitizers are slow, but easy to handle and errors are hardly present.
Graphic Tablets are used for entering drawings directly into the computer.
A Graphics tablet consists of a pad or tablet (that is sensitive to touch) & a pointing device,
which is similar to a ball-point pen called a stylus.
A paper is placed on the graphic pad & the user can trace lines and draw pictures using the pen.
As the stylus moves on the tablet, the tablet senses the pressure on it & translates it into digital
signals giving its corresponding position on the screen. It then converts this ‘pressure’ into x-y
co-ordinates, which describe what is being drawn. This data is then relayed to the computer,
which can display the drawings on the screen or have them printed.
In Engineering & Architectural design as it lets the user create his/her own images. It is
very easy for the user to ‘try out’ different designs.
In Computer-Aided Design work as diagrams & maps can be traced or drawn &
transferred into the computer memory to be further worked on using Graphics programs.
2. VIDEO DIGITIZERS.
These consist of special hardware & software, which converts video signals frame-by-frame into
a digital representation in computer memory, which can be saved on disk, if necessary. A
sequence of frames can have graphics, cartoons, text added, etc.
DIGITAL CAMERAS.
A Digital camera stores its images in digital form. These images can then be streamed (entered)
directly into a computer for editing or printing by connecting the camera to a computer using a
special cable.
There are 2 types of digital cameras; one that can take still (motionless) images, i.e.,
photographs, and another that takes motion pictures (video).
The SRD accepts spoken commands & convert them into electronic pulses/ signals, which can be
processed by the computer.
The user must train the system to recognize his/her voice by repeating each word in the
vocabulary several times. Each word is analyzed & filed for identification.
Voice input is a fast & easier method mostly suitable for the handicapped especially those
with impaired hands.
In Security & Access control – Each person has a unique ‘Voiceprint’ that can be used for
identification. This approach could be used in; –
2. Word separation.
The speech must be “clipped” i.e. each word must be followed by a short period of silence. This
enables the device to recognize the end of each word. If this is not done, the device might not be
able to tell the difference between ‘Command” and “Come and”, depending on the accent of the
speaker.
3. Speaker variability.
The speed, tone (quality of sound), accent, loudness and pronunciation of an individual speaker
can vary
Voice input is complex to develop, and it does not take care of speech related problems such as
accents and tone. This implies that the device must learn the unique speech of an individual.
4. Limited vocabulary understood & the no. of speakers they can recognize.
Most speech systems can recognize a limited, standard vocabulary of spoken words. The
simplest SRD can recognize the voice of only one speaker. .
The device must also be ‘taught’ the voice patterns of the speaker. For example, if a device can
store a vocabulary of 25 words, the user will speak the 25 chosen words into the device. The
device then stores the patterns for the spoken words. Later, when the user speaks a word, the
device compares the pattern of the word spoken with those patterns it had previously stored. If a
match is found, the word is recognized. If not, the speaker may be requested to repeat the word
or use a synonym (a word that means almost the same thing).
When you compare the no. of words in English & the total no. of words that can be said at a
given point, show that speech recognition is slow.
6. Speech input is complex to develop & is still at the early stages of development.
Review Questions.
SCANNING DEVICES.
These are devices that enter (capture) data into the computer directly.
IMAGE SCANNERS.
A Scanner is used to input pictures or photographs into the computer. This is because a
Keyboard or a Mouse cannot perform these tasks.
Scanners are usually used to capture existing documents in an electronic form into the computer
for further processing or incorporating into other documents.
It converts text & graphics into machine sensible format. Once the text & graphics are scanned,
the images can be manipulated by changing the colors, the sharpness and contrast.
Page scanner:
This is a desktop machine that looks like a small photocopier. It scans a whole page at a time.
An example is the Flatbed scanner.
Using this scanner, one can scan text, a real object or a picture by placing it on a glass plate
exactly the way a photocopying machine works. The text or the picture scanned is displayed on
the screen or saved so that one can edit or print it.
Hand scanner:
Scanners are very useful when large amounts of existing documents need to be converted into
electronic form for feeding into a computer system.
For example, if the contents of the Bible are to be entered into a computer system, you can either
type everything using a Word-processor, or scan each of the pages and import them into a word-
processor, which is faster and also more accurate.
Each character is compared to all known shapes or patterns so that the appropriate code can be
entered into the computer.
Scanner Problems.
Make sure the DMA, IRQ and Address jumper settings on the interface board matches
the settings you selected in the Scan Mate installation program.
Check the brightness control dial on your Scanner. If the dial is at the brightest settings,
you may not be able to see the image.
This shows that there is a conflict with resident software on DMA channel.
To prevent this, do not rescale the image. If you scale the image, you will lose some of the
details when you print. If the image is too big, scan at lower resolution.
This shows there might not be enough RAM to scan the images.
5. The scanned image on the screen is much larger than the original.
This occurs if your image is displayed at a lower resolution than you scanned.
Note. The Size of your screen image depends on your Monitor’s size & your VGA card.
DOCUMENT READERS.
A Document reader is an input device, which can read data directly from source documents,
such as bank cheques, & convey it to the computer in form of electronic signals.
Optical Readers.
Optical readers use the principles of light to sense the document contents or to capture data. A
special type of concentrated beam of light is passed over the object, image or text which needs to
be entered into the computer. The reader converts the data into digital form, and then passes it to
the computer for processing.
There are 2 types of Optical readers: Optical Character Reader (OCR) & Optical Mark
Reader (OMR).
Magnetic Readers.
They use the principles of magnetism to sense the document characters that have been written
using magnetized ink.
Optical Character Recognition (OCR) is a data capture technique, which enables the computer
to read printed or hand-written documents directly.
The characters are formed onto the document by a Typewriter or computer Printer using a
special type font. Handwriting can also be recognized if the characters have been carefully/well
formed.
The reading is done by OCR, which can be connected directly to the computer. An OCR is able
to distinguish one character from another by its shape.
As the OCR reads/ scans the document, each character reflects different amounts of light, which
is sensed by the OCR using a photoelectric device & converts the shape sensed into electronic
signals. These signals represent a particular pattern.
Note. The Reader has a memory that stores reference patterns for a given character set or font.
The sensed pattern is then compared with the stored patterns of the characters, which the reader
can recognize. If a match is found, the character sensed is identified; otherwise, the document
may be rejected by the reader.
OCR devices are used by companies that do a large amount of processing on a regular basis. For
example, Public utility companies, Insurance companies, Airlines, Banks & the Postal service
(for reading postal codes).
Public utilities – OCR is used to process documents produced as output and which can be
re-used as input by the computer. For example, an Electricity bill has a returnable slip,
which is printed with all the information required for re-input into a computer, i.e.,
customer code and amount owing. If the customer pays the exact amount stated, the
returned portion of the bill is used for direct input to the computer.
The forms can be printed by the computer with standard data, e.g. Stock codes, Account code,
etc. The Salesman then enters details of the order form and returns it for OCR processing.
The computer can print out stock sheets in OCR characters. The stock checker then enters the
actual stock quantities on the form in careful handwriting. The sheet can then be optically read
into the computer for amending the stock records.
Disadvantages of OCR.
The document should be handled carefully (e.g. it should not be folded or creased) for
accurate reading.
Document size & type area may be limited for accurate reading.
It requires special typing & character formation and a paper with the required quality.
The user must make sure that characters are well-formed; if they are not, reading errors may
arise, making output results unreliable.
The documents are pre-printed with predefined data positions. These positions can then be
marked by, let say, a pencil.
The OMR detects the presence or absence of a mark on a form by sensing the reflected light of
these positional marks. The reader is then used to convert the marks into computer-readable data
& send the value of the sensed data into the computer in form of electronic signals.
The accuracy of an OMR depends on the marks being made properly. If a mark is too light or
not solid enough, it may be misread, giving rise to errors.
Uses of OMR.
OMR forms are used in situations where the data to be input is simple, or the volume of data is
large enough since using other methods would be more expensive.
Used in marking Multiple-choice examination papers where the answers are filled in a
form with special pencils.
The OMR can sense the presence of a pen or pencil mark. The person taking the test makes a
pencil mark in the box, which he/she thinks corresponds to the answer. An ‘OMR’ is then used
to ‘read’ the answers given by sensing the marks made. This data is then relayed to the
computer, which can then check the answers given and grade the paper.
Speeds up data input. They ensure faster & more accurate processing of data.
They read data directly from the source document & enable data to be given directly to the
computer for processing.
They read data directly from the source document & therefore, no data preparation is
required.
Errors are easily corrected.
The documents can be re-used, thus saving on stationery.
The contents of the documents are both human & machine sensible, hence reliable.
The sensitivity of an OMR can be altered to allow for different surface, pencils and inks.
OMR has a better recognition rate than OCR.
With an OCR, no typing or transcription/recording process is involved & therefore, not
prone to transcription errors.
They are expensive methods of input, because they require specialized techniques &
equipment.
Verification of marked data is difficult.
Documents may be difficult to design, understand and fill in.
The document reader will have to be reprogrammed for each new document design.
Magnetic Ink Character Recognition (MICR) is the machine recognition of characters printed
with Magnetic Ink.
The document characters are typed or printed in ink containing Iron (II) Oxide that gives them a
magnetic property.
After forming the characters onto the document, the inked characters are magnetized by passing
the document under a strong magnetic field.
During the reading process, the magnetized characters cause current to flow through the read
head depending on the magnetized surface area occupied by individual characters.
The reader differentiates characters depending on the magnetic patterns that bring different
amount of currents. The MICR recognizes these patterns & conveys them into the computer in
form of electrical signals.
Magnetic Ink Character Recognition (MICR) is used in banks to process the many
cheques being written each day.
The MICR mostly uses a font known as E13B, which consists of 14 characters (i.e. digits 0-9, &
four special characters).
A cheque is usually pre-printed with the Identification number of the bank, the Account
number of the customer, Serial number of the cheque, Branch number, using a special ink
containing particles of Iron Oxide (Magnetic Ink). When the cheque is presented for payment,
the amount is written on the cheque in magnetic ink, using a special device. The cheque can
then be read by a MICR. The data read is then transmitted directly to the CPU for immediate
processing, or can be stored on magnetic disk for latter processing.
An MICR can read data faster & accurate since the information on the document is
usually pre-printed.
Difficult to forge.
Document can still be read when folded, written on, etc. This means that, MICR is more
‘robust’.
A wider range of fonts can be used, including hand printing & normal type. However,
there is no standard-type font.
Faster than OCR. It is possible to read about 2,400 A4 sized documents 1 minute.
A POS terminal can be used as an Input device when online processing is required. Data arising
out of a transaction (e.g. the purchase of an item) is entered on the terminal and is immediately
processed by the computer.
POS terminals are widely used in the Banks & computerized Wholesale or retail industries, such
as Supermarkets.
Each item in the store has a code; Universal Product Code (UPC) printed on it, that identifies
the item.
The POS terminal consists of a Numeric keypad & a few Control (Functional) keys for entering
data, a Screen and a Printer to print out the list of items and price for the customer.
The Item code, Quantity & Price of the goods purchased by the customer is entered into the POS
terminal directly by the operator. The terminal produces the customer receipt. The details of the
sales are then entered directly into a backing storage device and the Stock level is also
automatically decreased.
A Bar code reader, a Credit card or a Kimball tag Reader could be attached to a POS
terminal to reduce the data entry.
BAR-CODE READER.
This is a device used to read the bar-codes printed on many items in Supermarkets &
Pharmacies.
Each item is given a code known as Bar-code (a Bar-code is a set of parallel bars of varying
thickness & spaces of varying widths representing a number code). A space represents a “0”
while a bar represents a “1”. The coded data can be read by using the principles of light.
A computer is used to store the code of the items, item description, price, amount in stock, etc.
When a Bar-code reader is moved across the bars by the Cashier, the reader scans the bar codes
printed on the item using a laser beam, which generates electrical pulses corresponding to the
reflected light received. The bar code is then converted to a number (which is the code for the
item).
The interpreted data is sent to the computer memory in form of signals. These pulses are
compared with standard codes stored in the computer and is used to look up the price of the
item. The details of the price & description are printed out on a receipt for the customer. The
Store Inventory may also be updated at the same time.
Bar codes are also used in Library lending Systems. Each user is given a library card, which is
coded with his library User Number. The relevant details of the user; let say, Name, Address,
Telephone number, category of user (e.g., Staff or Student), No. of books borrowed, date of
expiry of the card, etc are stored in a file on a disk.
When the user wishes to borrow a book, a Bar-code reader ‘reads’ his card, and transmits the
code to the computer. The computer uses the code to retrieve the user’s record from disk.
The Library Assistant will then update the user’s record by entering the relevant information
such as the name (or number) of the book, the date borrowed & the date on which it is to be
returned.
Note. Bar-codes cannot be used on goods such as Fresh Fruits & Vegetables.
They are very fast & accurate provided that the bar-code has been printed clearly. For
example, if the bar-code is soiled by dirty hands or has broken bars, errors may occur
when an attempt is made to read the code.
It is a cost-saving method.
Saves time. The prices do not have to be attached to each item in the store because the
items details are already held in a master file.
Does not require special skills to operate.
It improves customer convenience.
Some manufacturers use Kimball tags; small paper punched cards attached to clothes or other
commodities on sale mostly in supermarkets. The data is incorporated in the small punched
holes. The holes alternate with spaces to represent data in binary digits.
An optical scanning method is used to read the Kimball tag and extract the product code & price
from it. The tags are removed at point of sale and transferred to the data processing department
for their contents to be used in updating the stock files.
Note. POS terminals, Bar-code readers & Kimball tags speed up customer service & also ensure
accuracy. They may also be used to manage inventory, accounts & maintain up-to-date sales
information.
Advantages.
Disadvantages.
Difficult to handle because they are small.
Store small volume of data.
CARDS / BADGES.
These are small rectangular cards made of plastic that incorporate data in both machine-sensible
& human-sensible forms, e.g. Credit cards.
Magnetized marks, e.g. a short strip of magnetic tape sealed into the card’s surface.
Optical marks.
Punched holes.
The cards are read using Badge readers. The data recorder machine records data on these
badges automatically, once manually inserted, using magnetized marks, optical marks or
punched holes.
For reading, the badge is slotted into the reading unit where the converter machine (the reader)
accepts the contents of the badge and conveys them directly to the computer as input for
processing.
The badges are used in banks as Credit and Service cards, e.g., in the Automated Teller Machine.
The Badge contents are usually static, though some cards contents can be altered by the reader,
e.g., Phone credit cards whose currency value keeps on changing until zero currency value is left.
SMART CARDS.
A Smart card is a special type of badge whose data can be changed by a special badge reader.
A Smart card can be used as a form of electronic money. As the customer purchases an item, the
badge reader can deduct units from the card. This process continues until the card has no more
currency units left.
CREDIT CARDS.
A Credit card has a strip of magnetic tape fixed on it. The tape contains coded information,
which is usually the owner’s code. The card is inserted into a slot where magnetic data may be
picked. Details of the transaction are then recorded against the credit card no. & the owner’s
account is credited with the transaction.
In Car parks – badges are used to raise car barriers, allowing entry to or exit from a car
park.
In Banks – Credit and Service cards, i.e. Automated Teller Machines (ATMs) give out
cash automatically when customer inserts a plastic card & follows the instructions issued.
In Access control – Access control cards are used in many offices to control access to
buildings or rooms for security reasons.
In Production control – Punched cards can be used to hold data in a factory such as
employee’s details, etc, which is used for production scheduling (arrangement), stock
control and job costing.
Sensors are devices that can be connected to computers & are used to record physical quantities
like Temperature, light, humidity.
Sensors used to record temperature, light, humidity in a Green house to ensure the best
conditions for plant growth.
Thermostats connected to a Central heating system controlled by a computer in order to
monitor temperature & to help save electricity.
Pressure pads on a road connected to computer-controlled traffic lights to speed traffic
flow.
The continuous logging of temperature data in order to monitor & subsequently control a
chemical process. The automatic capture of data for use in such processes is usually
known as Data logging.
Advantages of using devices, which can read data directly from source documents.
They ensure faster & accurate processing of data. This is because the data is read directly
from the source document, and no data preparation is necessary.
No typing or recording required, and therefore, not prone to transcription errors.
The documents can be re-used, thus saving on stationery.
The contents of the documents are both human & machine sensible, hence reliable.
Errors are easily corrected.
Difficult to forge.
Review Questions.
3. The diagram below shows coded data that could be input into a computer.
What is the name given to the above method of input?
State TWO applications that would use this method.
For one of the applications you have given, state TWO items of information that might be
represented by the coded data.
State what hardware is needed to enter the coded information into a computer and briefly
describe how this hardware works.
Interactive whiteboard
The CPU is described as the computer’s ‘brain’ that monitors all the computer operations. It is
the unit inside the computer where all software instructions, math and logic operations are
carried out.
Notes.
The CPU is one of the most expensive components of the Motherboard & also a very
delicate piece of equipment.
The CPU has a label, such as “486” or “Pentium” to show its type, and the chip
manufacturer’s logo on it.
It has a large fan (known as the Heat sink) screwed on top of it, that keeps the CPU cool
while the system is on. This is because the CPU gets very hot when it is in operation.
1. To control the use of the Main memory in storing of data & instructions.
2. To control the sequence of operations within the computer.
3. To give commands to all parts of the system.
4. To carry out data processing.
Basic features (functional elements) of a Microprocessor system.
Note. The elements making up the Computer system communicate through electronic paths
called Buses. The buses carry data, instructions, information, control commands and power
between the communicating elements.
The CU acts as the manager of the computer. Its main work is to control, supervise & co-
ordinate all the activities of the various units of the computer, enabling the machine to perform
useful tasks.
The CU is usually described as the Nerve centre of a computer system. It co-ordinates &
controls the activities of the different components of the computer system in the same way that
the brain directs the actions of the body.
The CU carries out the fetching, decoding & execution of the instructions. It fetches/ selects the
required instruction from Main storage, stores it in a no. of special Registers, interprets the
instructions, and causes the instruction to be executed by sending appropriate signals to the
appropriate hardware devices.
Note. The CU automatically repeats this cycle of operations until either it is instructed to stop or
the last instruction has been executed.
In order to enable the Control Unit to carry out the various functions, certain registers are used.
For the next instruction to be executed, it must be brought from the memory into the Processor.
When an instruction has been fetched from memory, the Program Counter is increased by 1, and
is then ready to find the next instruction.
Therefore, the Sequence Control register sequentially points to the address of the instruction to
be carried out, reads it into the Instruction Register, and automatically moves to the next
instruction in the processing sequence.
Instruction Register.
Instruction Decoder.
It decodes (interprets) the instruction received from the Instruction Register & sends signals to
the control switches of the computer.
Address Registers.
Each location in a memory has its own address, which allows us to get directly to any program
instruction or item of data stored within the memory.
Address – A label, name or a number identifying a storage location, or a device from which
information is received or to which it is transmitted.
Address Registers are 16-bit registers used for the storage of addresses. They are connected to
the Address Bus.
The Address part of the instruction goes to the Address Register, which retrieves the required
data item in the address indicated and copies it in the ALU so that the operation instruction may
be executed.
Address modification – the process of changing the address part of a machine instruction by
means of coded instructions.
System Clock.
In order to be able to fetch & execute instructions, the CU uses a timing signal provided by a
System Clock attached to the CPU. The Clock is an electronic system that is used to control the
Processor on when to fetch the next instruction from the Main memory.
The Clock sorts out all the internal paths inside the Processor to make sure that data gets from
the right place & goes to the right place.
The clock is an Oscillator that generates timing pulses (at a frequency of several Megahertz) to
synchronize the computer’s operations & ensure that the operation occurs at the right time.
The CU performs 1 step of the instruction in 1 clock pulse. The speed of processing will depend
on:
1. It co-ordinates & controls various parts of the computer system, namely; Main memory,
ALU & the Peripheral devices.
2. It maintains order & controls all the operations or activities inside the Processor.
The CU controls the activities of all the other units of the computer by using the appropriate
control signals. For example, it instructs the ALU on which arithmetic or logical operations are
to be performed.
3. It connects the required circuits to enable the ALU to process the data in storage, as
specified by the program.
4. It directs sequence of operations, i.e., it generates synchronization signals & manages
commands exchanged between the ALU, I/O units & the Memory.
5. It retrieves and interprets instructions from the Main storage & makes the computer to
execute these instructions by giving commands to the rest of the computer elements.
6. It controls the transfer of unprocessed data to the Main storage & results from the Main
storage.
7. It stores the results in the memory.
8. It determines the location of the memory that contains the next instruction to be retrieved.
9. It monitors the CPU operations & identifies problems, such as equipment malfunction,
illogical instructions or erroneous data finding its way into the system, and flashes them
on the computer screen.
This is the part of the Processor that performs all the arithmetic operations, such as adding or
multiplying figures, & logical operations needed to solve a particular problem.
For example, if two numbers are to be added or multiplied, this is done by the ALU.
The ALU also performs Logic Functions, e.g., AND, NOT, OR, TRUE, FALSE & IF.
ACCUMULATOR.
It is a storage device in the A.L.U, where all the answers from both arithmetic & logical
operations are stored temporarily before being transferred to the memory.
A Register in the ALU in which operands are placed, and in which arithmetical results
are formed.
COMPUTER BUS.
A computer bus consists of a set of parallel wires connecting the Processor to the other devices
of the computer.
Data Bus.
It is a bi-directional (2-way) bus that carries information & data to and from the Processor, i.e., it
carries data from the Processor to the memory during Write operations & from memory to the
Processor during Read operations.
Note. The Data Bus determines the Bus Width of the microprocessor. Its size indicates the
Address Bus.
It is a unidirectional (1-way) bus from the Processor to the external devices. It usually contains
the address of the memory location or device to be acted on by the Processor (i.e. it conveys
addresses).
The Address bus is wide (usually between 4 – 32 lines) to enable it to address as many devices as
possible.
The size of the Address Bus tells you how much memory the chip can handle.
Control Bus.
It’s a unidirectional (1-way) bus that carries command (i.e. timing & control) signals from the
Processor. These signals are necessary to coordinate the activities of the entire system. For
example, the command for the Printer to prepare to receive data is a control signal from the
processor.
Note. Buses are implemented as actual communication lines. They may be Internal buses,
which are usually laid down as a circuit on the chip itself, or they may be External buses,
implemented as cables.
CLASSIFICATION OF MICROPROCESSORS.
1. Clock speed.
2. Width of the Data Bus.
Clock Speed.
Every Microprocessor has a clock that drives its operation. Clock speed is the speed at which
the processor runs.
Microprocessor speed refers to its Clock speed, which is measured in Megahertz (MHz – 1
million cycles per second).
The Clock speed varies from one processor to another. Microprocessors with faster clocks
perform operations much faster compared to those with slower clocks. Therefore, the speed of a
microprocessor gives its power – the higher the speed, the more powerful the microprocessor.
Note. The speed at which a computer can process data is also affected by the speed at which the
memory can work.
Bus Width.
The size of the Data Bus determines the Bus Width of a microprocessor. It indicates the moving
capability of information of the chip.
Higher Bus widths provide higher computer performance. For example, fetching a 16-bit
instruction from memory using a Data bus width of 16 bits would require a single fetch
operation, whereas an 8-bit Data bus would require 2 cycles to fetch the same instruction; hence
slowing the execution of the instruction.
TYPES OF PROCESSORS.
RISC (Reduced Instruction Set Computer) processors.
CISC (Complete Instruction Set Computer) processors.
MICROPROCESSORS.
The Microcomputers use Microprocessors, which usually have all the required functions on one
chip.
Intel Inc., AMD (American Device Manufacturers) & Cyrix who manufacture
microprocessors for IBM compatible microcomputers.
MICROPROCESSOR TRENDS.
Pentium MMX has Multimedia instructions such as 3-D bitmap manipulation built in them. The
Pentium III Multimedia instructions are 4 times more powerful than those of Pentium MMX
Microprocessors.
ADVANCED CPU’s.
Larger computers such as Supercomputers, Mainframes & Minicomputers use Processors made
of separate, high speed sophisticated components. That is, the CPU components in large
computers are not all on one chip.
RISC Processors.
RISC machines are much faster than Micro-processor based machines, i.e. in RISC machines,
the time required to execute an operation is much shorter compared to the time a Micro-
processor would take to execute the same operation.
RISC chips generally use 128 or fewer instructions to execute their tasks. This means that, the
processor has few instructions to locate. They can execute these instructions more quickly & are
therefore very fast.
Again, each instruction is exactly 32 bits long. So, the processor does not waste any power
determining where the instructions begin or end. This makes RISC processors more superior.
CISC Processors.
CISC chips use between 200 – 300 instructions. Therefore, the processor has more instructions
to look up.
The instructions are usually between 8 -120 bits long. This means that, a CPU devotes at least
part of its circuit time determining where instructions begin and end, making them run slowly.
Incorrect configuration (construction / arrangement).
Failed components.
Running the processor at the wrong speed.
Jammed or clogged or too small heat-sink / cooling fan.
Processor inserted the wrong way.
Exercise (a).
Control unit.
Arithmetic logic unit (A.L.U).
Main memory.
Exercise (b).
7. Explain in a sentence the function of each of the following components in a Control unit.
Program Counter.
Instruction Register.
Exercise (c).
1. (a). Give the meaning of the initials CPU, and state its other name.
2. Outline the FIVE main processes under which data undergoes to become information.
MEASURING THE MEMORY SIZE OF A COMPUTER.
The size of a computer’s memory is the no. of ‘units of storage’ it contains. The unit of storage
can be a Bit, a Byte, or a Word.
A Character is any letter, digit or symbol, which can be obtained by pressing a key on the
Keyboard.
The no. of bits in a word is called the Word Size. The most common Word sizes are 16, 32 &
64.
On a given computer, a Word is the amount of storage normally needed to store an instruction.
Memory sizes.
Characters
A computer memory is made up of many storage cells called Bytes. Each cell (byte) is capable
of storing 8 bits (binary digits) and has a unique numeric address.
Generally, the memory size of a computer is usually measured in Bytes. The prefix K is taken to
be 1,024 bytes.
For example, when the size of a computer memory is quoted as being, say, 256 Kbytes, this
implies that, there are 262,144 memory cells or the computer has (256 x 1,024) = 262,144 bytes
of memory.
Exercise (a).
(b). How many bytes would be required to store the following statement?
(b). How many Kilobytes and how many characters make a Megabyte?
Exercise (b).
1. What is a Byte?
2. Name 2 standard 8-bit codes used internationally to represent information in computers.
MAIN MEMORY.
It can also be described as the Primary storage, Internal Memory, Immediate Access storage,
Semi-conductor memories, Core memory, etc.
It is used to hold data, programs & instructions required immediately (or currently being used)
by the Processor.
A computer can only obey data and program instructions that are stored in the Main memory.
It is Online (very close) to the central Processor, and therefore, any data within the Main
memory is directly accessible to the Processor.
The Primary storage generally consists of the following functional areas:
Holds instructions from both System software & Application programs, which enter the central
processor from an Input device.
Is used to hold the data being processed as well as the intermediate results of such processing.
It temporarily holds data that has been read from an Input device. Since Input devices operate at
slower speed than the Processor, part of the Input storage area serves as a Buffer. A Buffer
helps free the CPU to get on with other work while the slower I/O operations are completing.
Its operation is wholly electronic, and therefore, very fast, accurate and reliable.
Data must be transferred to the Main storage before it can be acted on by the Processor.
It provides direct data access, i.e., data is instantly accessible from the Main memory &
the Processor can act directly on the data.
It is of low/ limited storage capacity.
The Internal memory of the computer is designed in such a way that it reaches a capacity beyond
which it cannot extend.
It is volatile.
For example, the RAM (the section of the Main memory that stores the user programs,
application data, instructions and intermediate results during processing) loses its contents
immediately when the power is switched off.
The Main memory is therefore, used to store temporary programs and data.
Ideally, the Main memory is used to store all data requiring processing in order to achieve
maximum processing speed.
This is a memory that can only be read, but cannot be written to, i.e., the user can only read the
information in it.
ROM provides permanent storage of data, i.e., the contents in ROM cannot be changed at will.
This is because the program instructions and the associated data stored in the ROM are
developed & installed during the manufacture of the computer hardware by the computer
manufacturers & therefore, they cannot be changed during normal computer operations; thus the
term “Read only”.
ROM is a Non-volatile memory – its contents are retained (remain intact) when power is
switched off. Therefore, it cannot be affected by switching the computer on & off.
ROM forms a small proportion of main storage – it contributes to about 30% of Internal
memory.
ROMs are used in situations where the data or instructions must be stored/ held permanently. It
is used to store vital data & programs, which need to be held in the Main memory all the time.
For example, they are used to store essential files especially those the computer uses while
booting (starting) up.
For example, it stores the Operating system program, which is necessary for the initial co-
ordination of the hardware & the other OS programs.
It stores Control programs, used for the operation of the computer & peripheral devices.
For example, the BIOS is stored on ROM because the user cannot disrupt the information.
It stores Translation programs (Code converters), used for converting a user’s program
into Machine language.
1. Masked
2. PROM (Programmable Read only memory).
3. EPROM (Erasable Programmable Read only memory)
Masked ROM.
The bit patterns corresponding to the desired contents of this memory must be supplied by the
user in a standard format. .
This is a ROM that can be programmed or “customized” directly by the user using a special
PROM programmer to suit the needs of a particular task.
Customizing is the process by which a standard product is adapted for use in a particular
situation.
It is also called Flash BIOS. This ROM can be rewritten through the use of a special software
program, that uses electrical pulses.
Note. This is the way Flash BIOS operate, allowing users to upgrade their BIOS.
It is a type of main memory, which is used by the computer to store data & programs temporarily
during the times when they are needed in the Main memory.
The term “Random Access” means that, data in any area of the RAM can be reached or accessed
in the same amount of time.
RAM provides “Read and write” facilities, i.e., it allow instructions to be written & read out,
and also to be changed at will. Therefore, the computer user/ programmer can control or
manipulate the data stored in RAM.
For example, it is this memory that is accessed during installation of programs; deleting, moving
& copying of files.
Read refers to the retrieving (recovering) of information from memory, while Write refers to the
storing of information in memory.
RAM is a Volatile memory, i.e. the contents of RAM are usually lost (rubbed off) when the
power supply or the computer is switched off.
RAM forms the major proportion of Main storage – it contributes about 70% of the Internal
memory. It is the memory used in large quantities in Main memory, and every computer must
specify its size.
Uses of RAM.
It also stores user data, to be manipulated by the computer using the user input Application
programs. Therefore, the RAM of the Internal memory serves the user.
Types of RAM.
A Static RAM is able to maintain its data as long as power is provided to the memory chips.
It does not need to be re-written periodically. In fact, the only time the data on the memory is
refreshed or charged is when an actual “Write” command is executed.
SRAM is very fast & is currently being used in the Main Processor as a small amount of high-
speed memory called the Cache memory.
A Dynamic RAM uses capacitors to store information. The information is stored in the
Capacitors as a charge. Like any charge, the electrical charges in individual memory capacitors
of a DRAM will drive away (leak) causing the data to either be lost or changed within a few
milliseconds.
This means that, unlike SRAM, a DRAM must undergo the Refreshing process, i.e., it must be
re-written continually in order for it to maintain its data. This is done by placing the memory on
a Refresh circuit that re-writes the data several hundred times per second.
Refreshing involves reading the information out of, and then writing it back into the memory,
thus restoring a full charge.
DRAM is used widely for most computer memories because it is cheap & small.
SRAM is much faster than DRAM & it able to keep pace with the Main Processor.
It doesn’t require refresh cycles like DRAM – can retain its data forever.
They are of low data density, i.e. it stores less data bits.
SRAM chips are physically large & much more expensive than DRAM chips.
It is much slower than SRAM & is not able to keep pace with the Main Processor.
It requires refreshing in order to retain the information in its memory cells.
The charge stored in the capacitor of a DRAM leaks & most of the charge cannot be retained for
long or may be lost within a few milliseconds. To preserve the information, the charge must be
refreshed every 1 or 2 milliseconds by use of a Refresh circuit, which can be incorporated within
the CPU.
Exercise (a).
(a). What are the functions of the Main memory of the computer?
(b). Why do we say that the Main memory slows down the computer’s processing speed?
Distinguish between the two types of Primary memory, stating clearly where each one is used.
(d). Briefly describe the two types of RAM, and state where each one is used.
Identify THREE reasons why Dynamic RAMs are the most widely used memories in
microcomputer systems compared to Static RAMs.
Define and explain the following terms:
Co-processor.
Exercise (b).
Identify the TWO types of Primary memories found in the Central Processing unit.
State how RAMs and ROMs are used in the computer system.
Carefully distinguish between ROM, PROM and EPROM.
What type of memory is used to store the boot up program (the first program to be
executed on switching on a computer)?
o State the main differences between Main memory and Backing storage.
Since the memory chips are too small, they must be combined and put on a medium that can be
worked with and added to a system. To achieve this, the designers place the memory chips on a
small fiberglass card to create the SIMM (Single Inline Memory Module) or DIMM (Double
Inline Memory Module).
These cards are placed in a socket on the motherboard, and then fastened/ bolted in. This design
eliminated problems of the past, and made upgrading memory a simple task.
Secondary memory is used by the computer to hold programs, data files & backup information
that is not needed immediately (not currently in use) by the Processor.
However, contents in a secondary storage media can be quickly transferred into the computer’s
Main memory for processing when required.
It is also used by the computer to supplement the computer’s main (internal) memory in case of
mass storage purposes.
Most of these storage media are magnetic based, i.e., they use the principles of magnetism to
store data and instructions in form of binary.
The data is stored permanently in Disk drives. The disk drives can either be fixed inside the
computer, as in the case of Hard disks, or inserted anytime you want to read or write in them.
A Disk drive is a computer device for reading or writing data from or into a storage
media.
A Disk drive is a hardware on which files can be stored.
A Disk drive is a unit that houses a disk.
Examples;
A Disk drive can be used as an Input device, Output device or Secondary storage device.
They provide slow access of information – they process data very slowly compared to
primary storage.
Modern secondary storage devices normally operate in milliseconds. It can take between 25 –
50 milliseconds to locate information in a disk drive.
Disks & Tapes can store large amounts of data and instructions; however, the amount of storage
is limited by the no. of disk packs or tapes you buy.
1. The amount of storage needed on a typical Microcomputer system might be greater than
the storage space available in the Main memory. This requires the use of backing storage
devices, which can be used to store large quantities of information.
2. Whatever is in memory is lost when the computer is switched off. Thus, there is a need to
store programs & data in secondary storage devices from which it can be retrieved when
needed.
3. Primary storage is expensive, thus the need for secondary storage devices which are
cheaper.
Used to store backup data & instructions that is not needed immediately (or not currently
in use) by the CPU. This helps in creating space for another data to be stored in the
memory.
Used for transportation & distribution of data & software, i.e., for transferring files from
one machine to another.
Used to back up files (keep copies of data & programs) for safe-keeping.
Whatever is in memory is lost (or can be corrupted) when the computer or the power supply is
switched off. Disks can therefore be used to store programs & data, which can be retrieved when
needed.
Exercise (a).
(b). Explain 3 reasons why it is necessary for a computer system to have secondary storage
facilities.
2. (a). State THREE differences between Primary storage and Secondary storage.
(b). Give TWO reasons for using secondary storage devices instead of using Primary
storage.
(b). State one primary storage device and one secondary device.