Final A Level Departmental Notes Edited
Final A Level Departmental Notes Edited
TABLE OF CONTENTS
1
Simplified “A” level ICT Departmental Notes.
TOPIC 1:
INTRODUCTION TO COMPUTING
Introduction to Computers
A computer is a multipurpose, automatic and electronic device, which accepts data (Input), processes the input data
into useful information (output) and stores it for future use.
It is an electronic device that converts raw data into meaningful information.
Characteristics of Modern computers
1. Speed
Computers are quite fast in their operation in that their speed is measured in Millions of Instructions per Second
(MIPS) or Megahertz (MHz). Many computers process billions or trillions of operations in a single second.
2. Accuracy
Computers are known to be accurate. They can process large amounts of data and generate error- free results,
provided the data entered is correct. They hardly make any mistake. They are capable of detecting and correcting any
mistakes made.
3. Storage
For a computer to be able to work it must have a work space where data is stored before being processed or where
information is stored before being output to particular devices. This storage space is known as Memory.
4. Automation
Computers work automatically. They do not need any supervision in order to perform programmed tasks. This is
because of the instructions (programs) installed in them.
5. Diligence (Consistency)
Computers have the ability to perform the same task over and over for neither a long time without getting tired or
bored and with no mistakes (errors).
6. Artificial intelligence
Computers are artificially intelligent. They can respond to requests given to them and provide solutions. This is
because of the programs installed in them. Evidence is seen in industrial Robots.
7. Versatility /Flexibility/Multipurpose. Computers are capable of performing different kinds of tasks commanded
by the user.
Monitor
A monitor is a display device that looks like an ordinary television screen used for displaying information in visual
form such as text, graphics, still and moving pictures. There are two types of the monitors: cathode ray tube (CRT)
monitors and Liquid crystal display (LCD) monitors. Without a monitor, it is very difficult to see what you enter into
the computer
2
Simplified “A” level ICT Departmental Notes.
Keyboard
A keyboard is a primary input and control device of a computer that allows the computer user to enter data and
commands into the computer. It has a typewriter area that looks like or similar to a typewriter keyboard.
Mouse
This is a handheld input pointing device that used to point and select and moves items on the computer screen. It is an
extension of your hand since you cannot touch inside the computer.
System unit
The system unities a rectangular box-like case that houses internal electronic components of a computer.
Factors to consider when acquiring a computer
1. Cost of the computer 7. Portability
2. Connectivity 8. Multimedia capability
3. System requirements 9. Available software
4. Authenticity of hardware and software 10. Hard disk capacity
5. The monitor size 11. Processor speed
6. User needs
3
Simplified “A” level ICT Departmental Notes.
They facilitate the use of telecommuting (working away from the actual work place).
ICTs are very important in preparation of accounts and Pay roll management.
Business premises use ICT equipment to enhance their security for example the use of CCTV cameras,
sensor, voice recognition equipment, smart cards etc.
Business companies can use the internet to carry out research on quality and guinenity of products.
Education
ICTs enable research by teachers and students.
ICTs have made learning easier and convenient by offering online degrees and distance learning.
The uses of aided facilities like audio-visual materials have eased and improved the teaching and learning
ICTs can be used to ease the storage of data and information for example the use storage devices, and online
storage of data and information.
Computer Assisted Assessment (CAA) enables students to be examined and assessed any time and report
making.
Use of ICT has enabled simulation of experiments or real life situations that may be hazardous such as atomic
physics experiments (virtual labs).
School management systems are used to ease admission and management students
Communication
Entertainment
Security payments
Registrations for exams E-registration
Health Sector
The use of computer aided devices to carry out many surgical procedures such as laparoscopic surgeries.
ICT enable the diagnosing of many diseases using ICT high end machines such as CT scan, ultra sound
devices, and magnetic imaging have.
ICTs have enabled online consultation by medical professionals.
ICTs have enabled patient’s records to be manageable.
ICTs have enabled medical professionals to carry out research about medical issues.
Modern hospitals and health centers are using computer assisted life saver machine to hold the life of patients
in a critical condition.
ICTs have enabled faster communication between medical professionals, doctors, and patients.
Modern hospitals and health centers are using computer assisted technology in baby incubators to artificially
grow babies.
The security of the hospitals, properties, and the patients is ensured by high end ICT devices such as CCTV
cameras, sensors etc.
They are used in telemedicine through use of computers with videoconferencing capabilities.
They are used by experienced doctors and surgeons to train others through computer – aided surgery prior to
performing surgery on live humans.
Payments
Entertainment etc.
Security
ICTs are highly used in fighting against crime by using digital forensic (investigation involving crime scene),
CCTV cameras and other computer based operated systems.
Security officers are using Biometric devices such as finger prints, iris, and signature verification to
identifying criminals.
ICTs are used in detecting and tracking of dangerous gadgets, using radar systems, warning systems and
military laser.
ICTs are essential in communication by the military agencies.
4
Simplified “A” level ICT Departmental Notes.
Computers are used in battle management helping the military to find target, detonate weapons, communicate
etc.
ICTs are used in training and educating military forces especially with skills and vital details regarding
military tactics.
Computers are used to design and to test new weapons.
Security agencies use the phones and internet tapping techniques to track down crimes.
Homes
Online shopping purposes. The computers provide them with lists of shopping items as well as prices and
electronic fund transfer (EFTs) facilities.
They provide a variety of entertainments for those looking for leisure. This includes music, videos and
games.
People use computers in homes to pay bills through the payment by phone services (PPS).
For education and research at home. People can take online courses and carryout research using the internet
facility.
For communication with friends and relatives. This is achieved through use of e – mails, telephones, chat
rooms, etc.
They are used to store family records such as photos of family members, family documents, etc.
They are used by students and other learners in doing take home assignments.
For security using CCTV cameras, alarm systems etc.
Leisure/Entertainment
Chat rooms and social sites such as twitter, face book, yahoo massager, WhatsApp etc have enabled many
people to connect and socialize globally.
ICTs have enabled the playing of computer games such as solitaire, pinballs, chess tintans, internet checkers
etc.
ICTs have enabled movie making, audio and music recording and playing in the entertainment industry
With the use of internet, people are able to use computers to read books or magazines online.
Places like amusement parks, Casino‘s and other GUMBLING places run some of their machines using
computers
Offices
ICTs help in creation of documents eg memos, letters and reports about their institutions.
Preparation and calculation of payroll, income statements and balance sheets.
ICTS are to ease inventory/stock management and generation of invoices and receipts.
Computers have been used to present projects and ideas by means of presentation software.
In offices, computers are used for communication through use of fax machines, electronic mails and
videoconferencing.
Through telecommuting, employees can work away from a company’s standard workplace. This can only be
achieved through use of computers.
They are used to advertise products and services and carryout electronic commerce.
Banking Institutions
It is used to carry out on banking make deposits of cash and cheques, withdraw cash, transfer money between
accounts, obtain account balances.
They are used to transfer money electronically among different accounts, apply for loans, and obtain bank
statements, account balances and credit card statements.
Keeping record of all the banks’ clients in terms of their personal data, account numbers, and their deposits
and withdrawals on their respective accounts.
They are used to run Magnetic Ink Character Recognition (MICR) to process cheques.
They are used to verify transactions and store transaction records.
They are used when conducting electronic commerce.
They help in counting of money using counting devices.
5
Simplified “A” level ICT Departmental Notes.
Use of CCTV cameras and sensors in ensuring security in the bank environment.
Farming Institutions
Keeping records of farm, customer details and sales.
Use of internet services to carry out research about new technology in farming.
Use of mobile money services in paying and receiving payment for goods and services.
In branding of farm produces.
Super Markets
Use of bar code reader in reading serial numbers on packaged products.
Creating a data base and keeping customer’s records by the computer
Use of notes (money) devices for counting money
Use of CCTV cameras and sensors in ensuring security in the bank environment.
Creating and printing customer receipts after purchase of items using a mobile printer
For inventory management such as stock taking.
Communication, Transport and Multimedia
In telecommunication industry every telephone exchange relies on ICTs to switch incoming and outgoing
calls.
Railway co-corporations relay heavily on ICTs to co-ordinate the movement of their wagons and goods.
In the airline industry, ICT is heavily used in the air traffic control and surveillance of the air space using
radar equipment as well as preservation purposes
All the known modes of transport use computers in one way or another.
For Air transport, computers are used at the airports to take record of all the flights and passengers for each
and every place that will fly off or land at that Airport.
Used for security check-Ups at the Airports, e.g. to check whether one is smuggling in or out weapons for
war, drugs, etc.
While inside the aero plane, computers are used to give the pilot sense of direction by indicating how high he
is flying, the temperatures, the pressure and weather conditions of the space in which he is flying0
In the cars, we have the speedometer, which determines the speed at which the car is moving. Modern
technology has offered us Satellite-watched cars, i.e., at any one time, the car can be located in any part of the
World because the Satellite keeps tracking it.
In a ship, computers are used to guide the captain movements while he sails. By showing the landscape of the
sea bed, the captain is able to draw the right direction and bearing in which he should sail the sheep.
In the multimedia industry such as TV stations, Radio station, program managers keep computer terminals on
their desks to record urgent and important news.
Industrial, Technical and Scientific Uses
In many of the Industries be it Large Scale, Small Scale or Heavy duty industries, computers of all kinds are
widely used for the daily operations of such industries.
In Manufacturing Industries/Factories, Computers are used to make the production and sometimes packaging
processes faster using CAM. E.g. in a Car Manufacturing Industry, most production operated by robots.
They are used for communication with different industries and businessmen.
They are used to manage large volumes of financial transactions within the industries.
In Food and beverage Processing Industries, computers are used to determine the right portions of each
ingredient that should make up the final product.
Computer driven machines such as robots are used to carry out repetitive tasks, lift heavy equipment, and
carry out tasks which require a high degree of precision.
They are used in Computer Aided Design (CAD) and computer aided manufacturing for creating engineering,
architectural and scientific drawings.
They are used for research about new stock especially through the use of the internet.
Politics and Governance
6
Simplified “A” level ICT Departmental Notes.
Computers are highly used to store government records in many government ministries such as finance,
education, etc.
GREEN COMPUTING
Green computing refers to the responsible use of computing resources, maximizing economic viability while
minimizing negative impact on environment.
Meaning of Green Computing
Green computing refers to the environmentally responsible usage of computers and related resources which involves
the use of energy efficient hardware equipments, reduced energy consumption equipment and proper disposal of
electronic waste (e-waste).
.
Goals of Green computing
1) To enable the reduction of high use of ICTs devices.
2) To minimize the use of toxic substances during the manufacture of hardware devices such as lead, mercury,
cadmium, beryllium etc.
3) To ensure the use of biodegradable materials in ICT’s. I.e materials when decomposed are not harmful to the
environment.
4) To extend the life time span of hardware devices.
Actions towards Green Computing
i. Enforcing green computing practices
ii. Strategic leaders are taking into consideration the social and environmental impacts and of new and emerging
technologies.
iii. One of the green computing group called tactical increamentalists are applying and using green computing
philosophies mainly to save up on costs rather than saving the environment.
iv. Many multinational companies and organization are now enforcing the use of Electronic Products
Environmental Assessment Tool (EPEAT)in order to increase the efficiency and the life of computing
products.
Green Computing Practices
1) Creating a power plan which allows the system to automatically turn off components such as monitors and
hardware drives after a st period of inactivity.
2) To do computer related tasks during contiguous, intensive blocks of time, leaving hardware of at other times
that is to say avoid using computers for a long period of time because it may lead to 00health and safety
problems.
3) Power up and power down energy intensive peripherals such as laser printers, scanners etc according to the
need.
4) Use Liquid Crystal display (LCD) monitors rather than Cathode Ray Tube (CRT) monitors because CRT
monitor emit a lot of electromagnetic radiations.
5) Use notebook computer rather than desk top computer because notebook computers consume less energy,
emit very little heat and other electromagnetic radiations.
6) Minimize the use of paper and properly recycle waste papers.
7) Recycle computing equipments as this can keep harmful materials such as Lead, mercury, and hexavalent
chromium out of landfills.
8) Dispose of e-waste according to the federal, state and local regulations.
9) Terminal servers should be used instead of standalone computers in order to cut down power consumption.
9
Simplified “A” level ICT Departmental Notes.
10) Increased online security measures through the use of firewall, anti-spyware and anti-virus origrams to reduce
the increasing amount of e-waste on the internet and on other networks.
11) Using more energy efficient and less noisy cooling systems like liquid cooling systems instead of the
conventional heat sink and fans.
CLOUD COMPUTING
Cloud computing refers to the outsourcing of services such as computer hardware, software and platforms from
different servers over the internet.
10
Simplified “A” level ICT Departmental Notes.
TOPIC 2:
COMPUTER MANAGEMENT
Computer management is the process of managing, monitoring and optimizing a computer system for performance,
availability, security. It is broad term that includes manual and automated administrative processes in the operations
of a computer.
Computer Booting
Booting is the process of starting or restarting a computer which involves loading an operating system into memory.
Types of Computer Booting
1. Cold booting
2. Warm booting
Cold Booting
It is the process of starting a computer which has been totally off which involves loading the operating system into
memory.
Warm Booting
It is the process of restarting (resetting) a computer that is already turned on.
Reason For Warm Booting
I. Whenever the computer devices such as keyboards, mouse, etc.stop responding to commands issued to them.
II. After installing a software or hardware onto your computer.
III. After scanning for viruses.
IV. After uninstalling a software
V. In case one wants to recover from errors
VI. When a computer freezes
Computer Booting Processes
i. The power supply sends an electrical signal to the motherboard and other devices located in the system unit.
ii. The CPU resets itself and looks for the ROM that contains the BIOS.
iii. The BIOS executes the Power OnSelf Test (POST) to ensure that all the computer hardware is connected
properly and operating properly.
iv. The results of the POST are compared with the data in the CMOS chip on the motherboard.
v. If the POST is completed successfully, the BIOS look for the boot program that loads the operating system.
vi. Once located, the boot program is loaded into memory and executed, which then loads the kernel of the
operating system into RAM.
11
Simplified “A” level ICT Departmental Notes.
vii. The operating system loads system configuration information and the remainder of the operating system is
loaded into RAM and the desktop and the icons display on the screen.
Kernel
The kernel is referred to as a memory resident because it remains in memory while the computer is running.
It is the core of an operating system responsible for;
I. Managing memory,
II. Managing files and devices,
III. Maintaining the computer ‘s clock,
IV. Starting applications
V. Assigning the computer ‘s resources such as printers, scanners, etc.
COMPUTER PROGRAM
A computer program is a series of instructions that directs a computer how to perform the tasks necessary to
process data into information.
A File
A file is a collection of related data.
Types of Files
Regular files are files used to store data in the form of text or binary
Directory files are files that contain information used to access other files.
Special files are files that defines physical devices for the system
Video files for video development.
Web files for web activities such as wed development
System files are files that enable computer to function with the operating system
Image files used to develop photos and graphics.
Audio files for digital audio such as music sound etc.
Backup files for copies of files in a computer which can later be accessed in emergence cases.
Creating a File
Click on the file menu or the office button in the program you are using
Select the first option new and the click on it.
A dialogue box will appear and then click create
12
Simplified “A” level ICT Departmental Notes.
After working with the new file, click the file menu
Select save as option to give the file appropriate name
Then save the file either in my computer or my document or on the desktop by clicking saves.
Saving a File
Click on the file menu or the office button
Select save as option
Give the file the appropriate name
Choose where to save the file either in my computer or my document, or on the desktop
And then click save
2. It identifies what program to associate the file with and how to properly open it using the correct program.
A Folder
A folder is a specific virtual container on a storage medium that contains related files. It is a virtual container within a
13
Simplified “A” level ICT Departmental Notes.
graphical user interface in which groups of computer files and other directories can be kept and organized.
Creating A Folder
Right click the empty are on the desktop
Select new from the drop down menu that appears
Select folder
Give the appropriate name to the folder
Then press the enter key on the keyboard
Renaming A Folder
Right click the folder
Select the option rename
Give the appropriate new name to the folder
Then press the enter key on the keyboard
Moving a folder
Point the cursor to the folder you want to move
Hold down the primary mouse button
Move the folder the desired location or another folder on the screen
Then release the mouse button.
Deleting a folder
Right click on the folder
Choose the delete option
Then click yes
FILE HIERARCHY
A file hierarchy defines a set and arrangement of directories (folders), which can contain files and other folders.
The top-most directory in any file system is called the root directory.
A directory that is below another directory is called a subdirectory.
A directory above a subdirectory is called the parent directory.
ROOT DIRECTORY
DIRECTORY DIRECTORY
File Path
A file path or a file directory specifies a unique location/address of a particular file in a file system.
Example; C:\My Documents\assignments\English\nouns.doc
Root directory: C:\
Directory(folder): \My Documents\
Subdirectory(subfolder): \English\
file: \nouns.doc
A file path can be observed in the address bar of a particular window in which the file is being used. A file path or
directory consist of location of a file, user profile, folder, sub folder file, file name and file type.
Example; D:\visitor\my document\sub ICT\S5 results.doc
D:\ file location
Visitor\ user profile
14
Simplified “A” level ICT Departmental Notes.
My document\ folder
Sub ICT\ sub folder
S5 results\ file name
.doc file type
Viewing File Extension
Click start button
Click control panel
Click the tools drop down menu
Click folder options
Click view
Uncheck Hide extension for known file types
Click apply, then ok
Managing Computer Files
When using files on your computer system, there are some aspects one needs to put under consideration such as
storage of files, security for the files, backups, disk space usage.
Such considerations include;
1. Create backups of your files that keeping copies of your files away from computer to avoid some
events such as data loss, disasters like fire outbreak etc.
2. Install antivirus software to protect your computer against malware.
3. Use file compression utility to save disk space for files which takes up large storage space.
4. Use disk fragmentation tool to allow faster computer processing.
5. Protect your files using encryption or password
How to create a file with password?
Click on the file menu or the office button in the program you are using
Click on save as option
Click on the tool menu at the bottom of the dialogue box
Click on general options
Type the password of your choice and click ok
Retype the same password
Then click ok
File Backup
File backup refers to creating copies of files away from the computer, which can later be accessed or retrieved.
There are two forms of file backups
1. Local backup (offline backup)
It involves backing up important files to external storage devices such as flash disks, memory cards, external hard
disks, compact disks, Digital versatile disks, magnetic disks, zip drives etc.
2. Internet backup (online backup)
This involves sending your files to another site on the internet computer for safe keeping. Eg creating a backup on
your email account.
Importance of Backup
To recover from data loss in case of accidental deletion, data theft, data corruption
To safely stored data away from the computer
To ensure disaster data recovery plan
Desktop Environment
A desktop is the entire screen that displays when booting is done. It consists of features mainly shortcuts and icons of
programs such as my computer, recycle bin we browser etc.
Shortcuts are icons on the desktop that provides a user with immediate access to a program or file.
Icons are the smallest graphical or pictorial representation of several commands, an application, a shortcut etc.
Major icons on the desktop
15
Simplified “A” level ICT Departmental Notes.
1) My computer
2) Recycle bin
3) Network places (network)
4) My documents
My computer/This PC
This is a system folder in the file manager which allows the user to explore the content of their computer drives as
well as managing their computer files.
Recycle bin
Recycle bin (Trash). It is a temporary storage for files that have been deleted in the file manager by the user, but not
yet permanently deleted for the file system.
My network places
My network place is an icon on the desktop that displays shortcuts to shared computers, printers, and other resources
on the network.
My documents
My document is name of a special folder on the computer’s drive that the system commonly uses to store a users
documents, music, pictures, downloads, and other files.
Common Utilities
A utility program is a type of system software that allows a user to analyses, optimize, and maintain a computer in a
normal working state.
Utility programs are programs designed to enhance the performance of the computer.
Some are included with the operating system eg disk repairing programs, disk scan etc.
Examples of utility program
1. Backup: This utility allows you to make a duplicate copy of every file on your hard disk, which can be stored
way from the computer.
2. Disk defragmenter: This utility finds fragmented files on a disk and organises them back in a contiguous manner
to improve data access.
3. Disk repair utility: This utility scans a hard disk or floppy disk for bad sectors (defective areas) and either makes
repairs to these sectors, or marks the defective area so that the operating system does not store any data in that
location.
4. Virus protection utility: Antivirus software programs scan for computer viruses and remove them.
5. Computer language translators: Computer language translators (assemblers, compilers and interpreters)
translate a program written by a programmer into machine language (the language the computer can understand).
6. Check Disk utilities: Check Disk is a utility that checks your hard drive (or floppy drive) for problems. It will
check for directory structure errors, file errors, etc.
7. Scandisk: This is a utility provided with Windows that is used to scan computer disks to see if there are any
potential problems on the disk, such as bad disk areas, and possibly repairs them. Since disks are magnetic media,
all disks, including the hard drive, can be corrupted.
8. Disk cleaners: These are utilities used to find files that are unnecessary to the computer’s operation and yet
taking up disk space. Disk cleaners help the user to decide what to delete such files when your hard disk is full.
9. Disk partitioning software: Such utilities are used to divide an individual drive into multiple logical drives, each
with its own file system and treated as individual/separate drives.
10. Disk compression utilities: Disk compression utilities are used to compress/reduce size of the contents of a disk
to take up a small disk space.
11. File managers: A file manager or file browser is a computer utility program that provides a user interface to
work with file systems. The most common file management operations used include create, open, edit, view,
print, play, rename, move, copy, delete, attributes, properties, search/find, and permissions.
12. System profilers: System profilers provide detailed information about the software installed and hardware
attached to the computer.
13. Cryptographic utilities: Cryptographic utilities are used to encrypt and decrypt streams and files. Cryptography
is the art of hiding information by transforming it (encrypting it) into an unreadable format, called cipher text.
Only those who possess a secret key can interpret (decrypt) the message into plain text.
14. Registry cleaners: Registry cleaners clean and optimize the Windows registry by removing old registry keys that
are no longer in use.
16
Simplified “A” level ICT Departmental Notes.
15. Network utilities: Network utilities are tools that analyses the computer’s network connectivity, configure
network settings, check data transfer or log events.
16. Screensavers: A screensaver (or screen saver) is a computer program that blanks the screen or fills it with
moving images or patterns when the computer is not in use.
Antivirus Program
Antivirus program (antivirus software) is software used to scan, detect and remove malware such as computer virus,
worms and spyware. It is a utility that searches a drive for viruses and removes any that are found.
Common Antivirus Programs
ACD system Kaspersky
Anti vir 360 total security
Avast Smadav
Avira (B) Notron
Trendo Micro RAV
Panda software Sophos
TOPIC 3
COMPUTER LABORATORY CARE AND MANAGEMENT
Introduction:
Caring and maintaining of computers involves three important factors; keeping computers clean, protecting
computers from malware and backing up important files.
Computer Laboratory
A computer laboratory is a room that prepared to facilitate installation of computers and to provide a safe conducive
environment for teaching and learning computer studies.
It is a place where computers are set for a particular task.
17
Simplified “A” level ICT Departmental Notes.
1. Musculoskeletal problems:
Back pain, chest pain, pain or numbness in arms, shoulder and feet are the common complaints. These types of
problems mainly occur because your posture while using the computer is not correct. Either you are sitting on an
uncomfortable chair or your workstation is not supportive of correct posture.
Practical tips
Adjust your chair and desk such that your screen is either at your eye level or lower. Sit with your back straight
and legs perpendicular to the floor with feet resting flat on the floor. Your elbows should rest at the sides.
Take regular breaks from work and stretch a bit or go for a short walk.
Pain in the neck, shoulder, fingers may indicate repetitive stress injury.Eg twisting the wrist to use the mouse or
specific typing technique that causes stretching of fingers.
19
Simplified “A” level ICT Departmental Notes.
Practical Tips:
Adjust the mouse besides the keyboard. Move your entire arm, while moving the mouse. Don’t just move your
wrist by fixing it at one position. Typing should be gentle. Do not fix your wrists in a certain position while
typing.
Relax your arms or stretch when you are not typing or using the mouse.
3. Vision problems
Bright light and bad glare or flickering image can strain your eyes. Constantly focusing on the screen without
blinking can cause dry eyes.
Practical tips
Adjust the contrast and brightness such that your eyes are not strained.
You can tilt your screen to avoid glare.
Maintain a proper distance from the screen.
Look away from the screen intermittently. Don’t forget to blink.
3. Headache,
4. Headache is common problem with computer use. Many a times, prolonged use can affect eye power which
needs vision correction. This can also result in headache.
Practical tips
Get your eye power tested if headache is a common problem with computer use.
Keep your neck straight when in front of the computer.
Constantly looking down or stretching the neck sideways.
Take regular breaks in between and circle your neck a bit to release the strain.
5. Obesity:
Practical tips:
Set limits for your children if they insist to playing computer games non-stop.
Encourage your children to play outdoor games and involve them in extra-curricular activities.
Adults who work for 7-8 hours on computers should avoid spending time on computer after reaching home.
6. Stress disorders
Prolonged computer use along with other factors like poor health, work pressure and job environment can make you
susceptible to stress. It can also lead to loss of concentration and dizziness.
Practical tips:
Be proactive and take necessary measures to beat stress before it affects your health.
. Hand tools
These are tools held in the hand and operated without electricity or other power. Most tools used in the computer
assembly process are small hand tools. They are available individually or as part of a computer repair toolkit.
Examples of hand tool include; questions screwdriver, Crimper, Wire cutters, tweezers, Flashlight, Wire stripper,
Needle-nose pliers etc
Diagnostic tools
Diagnostic tools are tools or devices used to test, diagnose, and solve hardware-related problems. Examples of
diagnostic tools include;
Adigital multimeteris a device that can take many types of measurements of circuits and the quality of electricity in
computer components.
Aloopback adapter, also called a loopback plug, tests the basic functionality of computer ports.
Software Tools
21
Simplified “A” level ICT Departmental Notes.
A technician must be able to use a range of software tools to diagnose problems, maintain hardware, and protect the
data stored on a computer; to be able to identify which software to use in different situations.
Examples of software tools are; Disk management tools and Protection Software Tools
Disk management tools are tools that help to detect and correct disk errors, prepare a disk for data storage,
and remove unwanted files.
FDISK a short form for fixed disk: A command-line tool that creates and deletes partitions on a hard drive.
Disk Management Tool: used to initialize disks, creates partitions, and formats partitions.
Format: used to prepare a hard drive to store information.
ScanDisk or CHKDSK: used to checks the integrity of files and folders on a hard drive by scanning the file
system, and disk surface for physical errors.
Defrag: used to optimize space on a hard drive to allow faster access to programs and data.
Disk Cleanup: used to clears space on a hard drive by searching for files that can be safely deleted.
System File Checker (SFC): A command-line tool that scans the operating system critical files and replaces
files that are corrupted.
Protection Software Tools: These are software tools used to protect data, operating system and hardware,
guarding against virus attacks and to remove malicious programs.
Windows security Center:it checks the status of essential security settings. The Action Center continuously
checks to make sure that the software firewall and antivirus programs are running. It also ensures that
automatic updates download and install automatically.
Antivirus program: Protects computers against virus attacks.
Antispyware program: Protects against software that sends information about web surfing habits to an
attacker. Spyware can be installed without the knowledge or consent of the user.
Organizational Tools
These are tools used to keep accurate records and journals (documentation of work) during a busy workday. Example
is work-order systems which are used by technicians to document their work.
Cleaning Tools
These are tools used to keep the computer components and the work area clean.
Examples Of Computer Cleaning Tools Are;
Clean Cloth. Cotton Swabs
Compressed Air Portable Vacuum
Isopropyl Alcohol Lens Cleaning Kit
N.B. Different Parts and Areas Must Be Clean with The Appropriate Materials and Detergents.
Preventive Measure During Cleaning Process Must Be Put into Considerations Such as;
Proper Handling of the Computer Parts Not to Fall Down
Ensuring That the Appropriate Tools Are Use and They Must Be in Good Conditions.
Before Cleaning, Ensure That Those Parts Such as Monitor, Key Board Are Plug Out of Power.
After Cleaning Them, Plug Back the Power Cord Safely.
Do Not Use a Vacuum Cleaner Inside A Computer Or On A Laptop Keyboard Because The Plastic
22
Simplified “A” level ICT Departmental Notes.
Parts Of The Vacuum Cleaner Bulds Static Electricity.
Use Little Amount of Water So That It Does Not Drop Inside the Monitor
SAMPLE TOOLS USED FOR SERVICING AND MAINTAINING A COMPUTER AND RELATED
DEVICES
EXAMPLES OF HAND TOOLS
Tool Image Tool Name Tool Function
Cripping tool For fixing a connector to the end of a cable.
For instance, network cables and phone cables
are created using a crimping tool to join the
RJ-45 and RJ-11 connectors to the both ends
of either phone or cable.
Wire Cutter For cutting wire or to strip the wire from its
insulator
Adjustable wrench To loosen or tighten Hex nuts
Needle Nose Pliers For cutting thin wires or to grip small object
Reverse Action Tweezers For holding small items to be glued into small
places
23
Simplified “A” level ICT Departmental Notes.
INSTALLATION PROCESS
Open My Computer.
Open the drive that contains the installation files. It may be on a CD or DVD, in that case, open the D: drive or
the letter of the disk drive.
Within the drive that contains the files, locate either a setup or install file. The setup executable file must have the
.exe extension
Alternatively, click Start then Run. In case of windows 7, find run in accessories
In the Run Window, type x:\setup or x:\install where x is the letter of the drive you wish to start the installation
from.
Make sure that your computer meets the requirements of the program, game, or utility you are attempting to
install.
After installing or during the installation, a program may need to install other programs, files, or utilities before it
is able to run. If
When installing a program, utility, or game, it is always a good idea first to close or disable any other programs
that are running.
Restart the computer system after installing a new program for it to work well, the computer may prompt you to
reboot the system for the installed program to work.
The computer system may not have the system requirements for the software to run, verify that your computer
meets the minimum requirements of the software program.
24
Simplified “A” level ICT Departmental Notes.
The software may not be compatible with the computer system. Make sure the program or utility you are
installing is compatible with the version of operating system you have on your computer.
Most proprietary software requires that a registration code or serial number is entered before the software is
entered. If you lost your number or key or it does not work, you will need to contact the developer of the
program.
In the Hardware Update Wizard point Windows to the location of the updated drivers on your hard disk drive
Uninstalling Software
Software uninstallation is the deliberate process of removing part or all of a given software from the computer. A
utility used for uninstalling software is an uninstaller.
An uninstaller, also called a de-installer, is utility software which is designed to remove all or parts of a specific
other application software. It is always recommended to use an uninstaller to uninstall a program.
Reasons for Uninstalling Software from The Computer System;
The software may not be working properly due to corrupt files, or improper installation, hence the need for a
clean reinstallation of the program which requires that the program must be uninstalled first.
It could be that the software is no longer being used and is unnecessarily taking up valuable disk space.
The software may be conflicting with other programs installed on the computer.
The software may not be meeting your expectations, that is, it's not functioning as expected.
25
Simplified “A” level ICT Departmental Notes.
You may be running out of disk space, therefore you just want to free up some space on your computer's hard
drive.
It is always necessary to carry out a proper uninstallation through proper program uninstall procedure instead of
merely deleting the program folder and shortcuts
If you are using windows, get to Programs and Features control panel, then choose uninstall program to properly
uninstall the program;
Wait until the process of uninstallation is done then you click close
TROUBLESHOOTING
Troubleshooting is the process of identifying, planning and resolving a problem, error or fault within a software or
computer system. It enables the repair and restoration of a computer or software when it becomes faulty,
unresponsive or acts in an abnormal way.
Troubleshooting is primarily done to keep a system or software in desired condition, specifically when it encounters
or exhibits a problem. Typically, the first step involves identifying what the problem is followed by coming up with a
solution to counteract the problem and then implementing that solution.
Hardware troubleshooting is the process of reviewing, diagnosing and identifying operational or technical problems
within a hardware device or equipment. Hardware troubleshooting is done by hardware or technical support
technician.
The process starts by first identifying the problem and finding different issues that can cause such a problem and
eventually implementing a solution or alternative. Hardware troubleshooting is generally done on hardware
Equipment Installed Within A Computer, Server, Laptop Or Related Device.
Removing, Repairing and Replacing Faulty Ram, Hard Disk or Video/Graphic Card.
Cleaning Dusts from Ram and Video Carts Slot/Ports and from Cooling Fan.
Tightening Cable and Jumpers On Motherboard and/or Components.
Software Related Hardware Problems Such as Device Driver Update or Installation.
TOPIC 4:
COMPUTER HARDWARE
Introduction to Computer Hardware
Computer hardware refers to the physical and tangible components of a computer. These are devices you can see,
touch and feel.
Categories of Computer hardwires
1) Input hardware
2) Storage hardware
3) Processing hardware
4) Output hardware
5) Communication (Networking) hardware
INPUT HARDWARE
Input is any data or program instructions people enter into the memory of a computer.
Terms related to input
Data
This is collection of raw unorganized facts, and figures to be processed by a computer.
Information
Information is processed data that is organized, meaningful and useful.
A program
Is a series of instructions that directs a computer how to perform the tasks necessary to process data into information;
A program is written by a programmer and then store the program in a file that a user can execute (run).
A command
Is an instruction given to a computer program to perform a specific action; Commands can be issued by typing
keywords, pressing special keys on the keyboard, clicking the mouse, speaking into a microphone, or touching on a
screen.
A user response
This is an instruction users issue to the computer by replying to a question posed by a computer program.
INPUT DEVICES
These are hardware components or devices that allow the user to enter data and instructions/ commands into the
computer. The data may be in form of a sound, characters, graphics etc.
Examples of input devices
Keyboard Pointing devices
27
Simplified “A” level ICT Departmental Notes.
KEYBOARD
A keyboard is a primary input device made up of keys with numbers; letters, symbols and special keys used to enter
data into the computer.
Keyboard Navigation and the Mouse
1.2.1 The keyboard
A keyboard is a primary input device made up of keys with numbers, letters, symbols and special keys used to enter
data and commands into the computer.
Keyboard layouts
The arrangement of the English language keyboard keys was modeled after the QWERTY type writer keyboard
developed by Christopher Sholes in 1868.
Its name was derived from the first six letters at the top of the keyboard.
NB; The alternative to the QWERTY keyboard is the Dvorak keyboard developed by Dr. Dvorak in 1936. With the
Dvorak, the most used letters are positioned in the middle row of the keyboard, intending to reduce typing time and
finger movements.
Types of keyboards
A standard computer keyboard
Wireless keyboard
Handheld keyboard
Laptop keyboard
Ergonomic keyboard
Enhanced keyboard
These are keys found across the top row of the keyboard. Each key is composed of letter F and a number ranging
from 1 to 12.
Each functional key performs a specific operation based upon the software being used.
Numeric keypad
This is an extra section to the right of the keyboard.
28
Simplified “A” level ICT Departmental Notes.
b) Navigation/Cursor/Arrow keys
These keys are used to navigate through documents and websites. They include the up, down, left, and the right
arrows.
29
Simplified “A” level ICT Departmental Notes.
Advantages of using a computer keyboard
1. Keyboards are very common (commonly supplied with computers)
2. Entering data and commands with keyboard is faster as compared to the mouse
3. Keyboards are more reliable
4. They are used for computer gaming
5. A keyboard is used to control computer
Disadvantages of using computer keyboard
1. It takes a lot of time to practice in order to type quickly
2. Keys can easily become faulty due to dust.
3. Some keyboards keys are very hard to press, causing fingers to hurt.
Computer Key board combination and their uses
4. Alt+Tab: Switch between open programs or windows
5. Ctrl+A: Select all items in a document or window
6. Alt+F4: Close the active item, or exit the active program
7. Ctrl+S: Save the current file or document.
8. Ctrl+C: Copy the selected item
9. Ctrl+X: Cut the selected item
10. Ctrl+V: Paste the selected item
11. Ctrl+Z: Undo an action
12. F1: Get help
13. F2: Rename a selected item.
POINTING DEVICES
Pointing devices are input devices that allow you to control a pointer on the screen and interact with computer.
Examples of pointing devices include;
A Mouse A touch screen
A light pen
A trackball
A stylus and graphics tablet
A touch pad
Digitizers
Pointing Stick
The Mouse
A mouse is a handheld input device used to position the cursor, point, select and move objects on the computer
screen.
Basic activities performed by a mouse piece
1. Point
Means positioning the pointer on the screen to an object such as a button, a menu, an icon, a link, or text
2. Click
Means pressing and releasing the primary mouse button, which selects or deselects items on the screen or starts a
program or program feature.
3. Right-click
Involves pressing and releasing the secondary mouse button, which displays a shortcut menu
4. Double-click
Means pressing and releasing quickly the primary mouse button twice without moving the mouse; this action starts a
program or program feature.
5. Drag
Means pointing to an item, holding down the primary mouse button, moving the item to the desired location on the
screen and then releasing the mouse button
6. Right-drag
30
Simplified “A” level ICT Departmental Notes.
Displays a shortcut menu after moving an object from one location to another
7. Rotate wheel (Scrolling)
Involves rolling the wheel forward or backward that scrolls up or down a few lines
Advantages of using a computer mouse
It is user friendly
It is faster to select items
It is easy and convenient to use with graphical user interface
It is good for limited desk space
A trackball
A trackball is like an upside-down mouse. It is a stationary pointing device with a ball mechanism on its top. It is
operated by rolling the ball directly with your hand.
A touch pad
A touchpad is a small, flat, rectangular pointing device that is sensitive to pressure and motion used to move the
pointer by sliding your finger tip across the surface of the pad.
Pointing Stick
A pointing stick is a pressure-sensitive pointing device shaped like a pencil eraser used to move the pointer
by pushing the pointing stick in any direction with your finger.
A touch screen
A touch screen is a touch-sensitive input display device used by touching any items, icons, words, pictures, numbers,
letter, or locations identified on the screen.
A light pen
A light pen is a handheld input device that detects the presence of light by pressing the light pen against the
surface of the monitor screen, a special type of paper, or a graphic tablet. It can be used for writing,
drawing by taping on the flat surface .
Digitizers
This is used with a digitizing tablet in making maps (cartography) and architectural drawings to accurately trace out
lines on a map. They are commonly used by architects, mapmakers, artists, and home users create drawings and
sketches by using a pressure-sensitive pen or a cursor (digitizer) on a graphics tablet.
31
Simplified “A” level ICT Departmental Notes.
Game pads, Dance pads
Joysticks and wheels, Motion-sensing controllers
Light guns, Touch sensitive pads
A game pad
A game pad is an input device that is used to control the movement and actions of players and objects in
video/computer games by pressing its buttons with thumbs and moving sticks in various directions to trigger
events.
A wheel is a steering wheel- type input device used by turning the wheel to simulate driving a vehicle. Most wheels
also include foot pedals for acceleration and braking actions.
A light gun
A light gun is one the input devices used to shoot targets and moving objects by pulling the trigger on the weapon or
an item on the computer screen.
A dance pad
A dance pad is a flat electronic input device divided into panels that users press with their feet in response to
instructions from a music video game. It is operated by stepping on the correct panel at the correct time, following a
pattern that is synchronized with the rhythm or beat of a song.
AUDIO INPUT
Audio input is the process of entering any sound into the computer such as speech, music, and sound effects. To
enter high-quality sound into a personal computer, the computer must have a sound card.
A sound card is a device that can be slotted into a computer to allow the use of audio components for multimedia
applications. Without a sound card, audio input and output is not possible.
Dictaphones
Dictaphone is an electronic audio input device that allows the user to record or create spoken words or voices that are
later repeated then aloud so that they can be written down as important notes.
32
Simplified “A” level ICT Departmental Notes.
VIDEO INPUT
Video input devices are input devices used to capture and enter images such as still photos, motion pictures,
graphics, video etc. into the computer for processing.
NOTICE; To enter video from an analog device into a personal computer, the analog signal must be converted to a
digital signal by plugging a video camera or other analog video device in a video capture port on the system unit.
Common video input devices include:
Digital camera Film camera
Digital video camera Camcorder
A webcam
Digital camera
A digital camera video input device that allows users to take pictures and store the photographed images digitally
instead of storing on a traditional film. When you take pictures, the images are electronically stored in the camera.
Digital video camera
A digital video (DV) camera is an input device that records video as digital signals instead of analog signals. For a
video or the image to be displayed, it requires a video capture card to convert analogue video signals into digital
signals so that the computer can understand the images
A webcam
A Web cam is a type of digital video camera that allows users to capture video and still images, and make video
telephone calls on the Internet. During a video telephone call, both parties can see each other as they talk. Some
laptop computers have built-in Web cams.
Webcams enable users to:
capture video and still images,
send e-mail messages with video attachments,
add live images to instant messages,
broadcast live images over the Internet,
and make video telephone calls
Camcorder
This is a light weight video camera that records data in digital form onto a storage device
such as a video tape.
Film cameras
Film cameras are cameras that expose photographic film to light in order to take a picture. A film is a chemical
emulsion on a thin plastic material that is sensitive to light. When exposed, an analogous image of the scene is
created within the chemical layer of the material; thus, film cameras are analog cameras.
Advantages of a digital Camera over the ordinary film camera
They are environmental-friendly
They record massive amount of videos unlike film camera
They have user-friendly features
They store large amount of Photos
They have high Operating Speed compare to film camera
They save money for buying films.
They allow images taken to be previewed and even edited on the camera.
Unwanted images can be deleted after preview.
Digital cameras are best for three – dimensional objects unlike film cameras
Disadvantages of digital camera
Digital cameras are very complex because the user must know how to upload and edit photos using a
computer
Digital cameras are sensitive and susceptible to extreme conditions such as heat, extreme cold and moisture
in comparison to the old film cameras that causes their malfunctions
33
Simplified “A” level ICT Departmental Notes.
Digital cameras consumption power faster than film cameras. This makes it necessary to keep a few spare
batteries in hand, especially during lengthy photo sessions.
They are normally expensive than the ordinary film cameras with the same functions.
Photo printing costs are higher than that of the ordinary film cameras.
SCANNING DEVICES
These are devices that capture data directly from source documents and converts it into a digital form that can be
stored into a computer.
A scanner is a light-sensing input device that converts hardcopy documents, drawings, or pictures to an electronic
version (softcopy) to be stored on a drive.
Optical Scanners use light mechanism to convert text, drawings, or
pictures into computer-recognizable digital data
Examples of optical scanner include
Flatbed scanner Drum scanner
Sheet-feed scanner Handheld scanner
NB: The quality of a scanner is determined by its resolution and color depth.
Advantages of scanners
Scanners provide high quality in terms of resolution for both color and black and white documents. They also
provide enough detail and resolution to handle images, photographs, graphics and designs.
Scanners make it unnecessary to retype text or redraw images. Thus, you can reproduce a document or
picture in a short time.
Using a scanner can also be environmentally friendly that is to say, scanners create digital copies of
documents, photos and files on your computer
Scanners are very easy to use and Most of the settings are automatically adjusted and fine-tuned, leaving a
user to only select basic options such as photograph or document, or color versus black and white.
Disadvantages of scanners
Scanned output varies depending on the quality of the lens inside the scanner, the cleanliness of the scanner’s
glass, and the condition of the original documents.
Scanners are very expensive in terms of buying and maintenance such as replacement of lambs, and lens etc
Scanners can be used to fake documents.
Most scanners restrict you to the size of an 8.5 inch by 14 inch page of paper, or in some cases of photo
scanners, even smaller.
34
Simplified “A” level ICT Departmental Notes.
Larger flatbed scanners are expensive, and in most instances, you’d scan a big document, poster or other item
in sections, perhaps even having to cut or fold it, to completely scan it.
READING DEVICES
Reading devices are input devices that capture data from a source document, which is the original form of the data.
Examples of reading devices include optical reading devices.
OPTICAL READING DEVICES are devices that use a light source to read characters, marks, and codes and
convert them into digital data that a computer can process.
Optical character recognition (OCR) is a technology that reads typewritten, computer printed, or
handwritten characters from ordinary documents and translates the images into a form that the computer
can understand.
Advantages of OCR readers
They save lot of time when using a digital file rather than paper documents
OCR allows user to copy and paste from the document itself whether that's in PDF format or MS Word
format.
They are less expensive in terms processing documents.
They allow written and printed data to be read at the same time.
Hard copies of documents can be read directly into a computer without retyping.
The characters converted can later be edited by word processing software.
Disadvantages of OCR readers
These are input devices that read hand-drawn marks such as small circles or rectangles. A person places
these marks on a form, such as a test, survey, or questionnaire answer sheet. The OMR device first reads
a master document, such as an answer key sheet for a test, to record correct answers based on patterns
of light; the remaining documents then are passed through the OMR device and their patterns of light
are matched against the master document.
35
Simplified “A” level ICT Departmental Notes.
They are much faster than someone manually entering large amounts of text
They consistently provide unmatched accuracy when reading data
They have better recognition rate than OCR hence can read marks.
OMR have large volumes of data that can be quickly collected without the need of specially trained staff.
Their cost of data input is small.
The chance of data errors can also be reduced because it is not necessary to type the details for data entry.
Disadvantages of OMR readers
All documents need to be checked over carefully and then manually corrected
If the original document is of poor quality or the handwriting difficult to read, more mistakes will occur
They are not worthy working for small amounts of text
Documents for OMR are complicated to design.
The OMR reader needs to be reprogrammed for each new document design.
It needs the person putting marks on the documents to follow the instructions precisely.
Any folding or dirt on a form may prevent the form from being read correctly.
A bar code reader
It is an optical reader that uses laser beams to read bar codes by using light patterns that pass through the
bar code lines.
A bar code is an identification code that consists of a set of vertical lines and spaces of different width. The bar
code represents some data that identifies the item and the manufacturer.
The magnetic strip can hold personal details such as account number, and name stored magnetically.
To read the data on the card, it is 'swiped' through a Magnetic Stripe Reader machine and the data is read and fed
back to the computer.
Advantages of MICR
The processing speed for cheques are very fast
They are more secure than OCR (Optical character recognition) technology.
Documents prepared for MICR are difficult to forge.
37
Simplified “A” level ICT Departmental Notes.
38
Simplified “A” level ICT Departmental Notes.
It is a device that captures one’s face image and compares it with a stored image to determine if the person is a
legitimate user, then allow or deny access.
Improved security
Improved customer experience
Cannot be forgotten or lost
Reduced operational costs
REMOTE CONTROL; A remote control (RC) is a small hand-held electronic device used for controlling devices,
such as a television, radio or audio/video recording etc. Remote controls commonly operate via infrared
signals. Remote control is an input device that emits a beam of infrared light, which carries data signals to allow
control of a device from a short distance.
Storage devices (storage media) are hardware components that hold/store data, instruction, and information. The
purpose of storage devices is to store data entered before and the results after processing.
8. Data and information access. This the method in which Data and information is accessed, either sequential
or random-access.
Sequential Access: In this, data can be accessed sequentially that is one by one from its location.
Random Access: In this type of access, the data can be accessed directly from its location.This type of access
provides fast access of data.
Output buffer; the output buffer is used between the CPU and the output unit. The role of the output buffer is to
accept data and instructions at the high speed of the CPU and remits them at the low speed of the output device, to go
as computer outputs.
High speed Low speed
Input Output buffer Output put
device
N.B: Buffering refers to the process of using the buffer to control the speed of communication between the CPU and
peripheral devices.
Importance of the buffers
They help the operating system to carefully monitor the contents in memory.
It helps the operating system to clear these items from memory when they are no longer required by the CPU.
Spooling
Spooling is the process of placing print jobs in a buffer instead of being sent immediately to the printer.
Non – Volatile memory
Non volatile memory is a type of memory where contents within the memory are not lost when power is put off the
computer. Eg. Read Only Memory (ROM).
Magnetic tape cartridge can store large amounts of data and information up to 1 Terabyte.
Data collection can go on without interruption overnight or for an entire weekend.
Magnetic tape can be recorded over and reused repeatedly.
Magnetic tape is inexpensive and budget friendly.
Its storage is large than that of floppy disks.
It is light and portable
Disadvantages of magnetic tapes
If the data is stored near a strong magnetic field or a large speaker, the tape can be damaged.
Magnetic tape has a lifespan of 15 years. Data quality gradually erodes over time.
It is necessary to keep older tape equipment just to be able to read the stored data.
Data access is only sequential which is time wasting. That is Random data access is not possible
2. Floppy disks (diskettes)
A floppy disk is a portable in expensive storage medium that consist of a thin, circular, flexible plastic disk with a
magnetic coating enclosed in a square – shaped plastic shell.
NB: Formatting. Formatting is the process of preparing a disk for reading and writing by organizing the disk into
storage locations called tracks and sectors.
Care for floppy diskettes
- Avoid touching the disk surface
- Avoid bending them or putting weights on them
- Avoid exposing them to sun or heat and cold
- Keep them in dust free environments
- They should not be exposed to chemicals such as cleaning solvents.
- Keep the diskettes in their jackets.
Advantages of floppy disks
They are portable
They are cheap
Data on a floppy disk can be accessed randomly
Data on a floppy disk can be writing – protected from being changed accidently.
They can be used to transfer data from one computer to another.
Disadvantages of floppy disks
They provide less storage capacity of 1.44MB (about 500 double-space pages of text, several
digital photographs, or a small audio file) compared to the hard disks.
They are not durable
They can easily be damaged by magnetic fields
They operate at a low speed
Can easily be lost or misplace because of their size.
They can easily infect machines with viruses.
3. Zip drive
The Zip drive is a medium-capacity removable disk storage system with capacities of 100 MB to 750 MB. Their
43
Simplified “A” level ICT Departmental Notes.
capacity is bigger than that of floppy disks.Data access is random /direct.
Digital versatile Disc-Read only memory (DVD-ROM) is an extremely high capacity compact disc capable of storing
about 4.7 GB. In order to read a DVD-ROM, you must have a DVD-ROM drive, which can also read CD ROMs.
DVD – R (Digital Versatile Disk -Recordable)
Digital Versatile Disk -Recordable is a DVD which can be written once and read for many times.
DVD – RW (Digital Versatile Disk -Rewritable)
Digital Video Disk -Rewritable DVD which can be erased, written and read multiple times.
Blue-raydisks Blue-Ray disks are a recent replacement for DVDs. A Blue-Ray disc can hold 25 - 50GB of data (a
dual-layer. Blue-Ray discs are random-access devices.
They are used in the same way as DVD-ROMs but, since they can hold more data, they are also used to store very
high-quality, high-definition (HD) video.
The 'Blue' part of Blue-Ray refers to the fact that the laser used to read the disc uses blue light instead of red light.
Blue light has a shorter wave-length than red light (used with CDs and DVDs).
Using a blue laser allows more data to be placed closer together on a Blue-Ray disc, than on a DVD
Solid State Storage Devices (SSD)
Solid state storage devices are non-volatile computer storage devices made from silicon microchips used to
store digital information electronically without any moving or mechanical parts.
Characteristics of solid state storage devices
They have no mechanical or moving parts
They are non- volatile devices
They operate much faster than traditional electromechanical storage devices
They consume less power and are more resilient under physical shock.
They are very expensive
They are built on flash memory architecture
They provide a temporary storage solution for portable information.
Solid State devices provide a quick, easy, and accessible way to gather, add, and temporarily store
genealogical information until it may be organized and stored in more permanent formats.
There are three forms of solid state storage
Solid state drives
Solid state cards
Solid state modules
Solid state drives
A solid state drive is a type of mass storage device similar to a hard disk drive (HDD).. Internal SSDs are connected
to a computer like a hard drive, using standard IDE or SATA connections.
46
Simplified “A” level ICT Departmental Notes.
Instead of storing data on magnetic platters, SSDs store data using flash memory and they do not have any moving
parts.
The most commonly used solid state drive is USB flash memory/Flash disk.
A smart card
A smart card is similar in size to a credit card. It stores data on a thin microprocessor embedded in the card.. When
the smart card is inserted into a specialized card reader, the information on the smart card is read
and, if necessary, updated.
Solid state modules
Solid state modules are solid state storage that resides in a Dual In-line Memory Module (DIMM). Solid state
modules devices are normally used in mobile devices.
Photographic film
Photographic film
Photographic film is a sheet of plastic such as polyester coated with a light sensitive emulsion that is used to record
and store photographs.
47
Simplified “A” level ICT Departmental Notes.
2 11 1
2 5 1
2 2 0
2 1 1
0 0 0
=1011
48
Simplified “A” level ICT Departmental Notes.
PROCESSING DEVICES
Central Processing Unit
Central Processing Unit (CPU) therefore, means an electronic device that interprets and carries out the basic
instructions that tell the computer how to work. The CPU in other words controls and coordinates the activities of all
the other components of the computer system and performs all the arithmetic and logical operations to be applied to
the data.
CONTROL UNIT
The control unit is a group of electronic circuitry that has the overall function of directing and controlling and
coordinating most of the operations within the central processing unit.
It extracts instructions from memory and decodes and executes them. In fact, it regulates the flow of information
through the processor. In short, it can be said, this component receives, decodes, stores results and manages execution
of data that flows through the CPU. Its communication with both arithmetic unit and memory is inevitable.
Functions of the control unit;
Interpreting each instruction issued by program and then initiating the appropriate action to carry out the
instruction.
Directing data from storage to memory.
Sending data required for mathematical operations from the memory to the ALU.
Sending the data processed to the printer or a storage device.
Erasing/deleting/rubbing data from memory when instructed to do so.
Storing results in the CPU memory.
Machine cycle
A machine cycle is a series of operations performed to execute a single program instruction. For every instruction, the
control unit repeats a set of four basic steps that s. These four basic steps include;
1. Fetching
2. Decoding
3. Executing
4. Storage
49
Simplified “A” level ICT Departmental Notes.
Step 1: Fetching. The control unit obtains /gets/fetches instruction to be executed from memory (RAM).
Step 2: Decoding which means to interpret and understand the meaning of given information. The control unit after
receiving instruction, it interprets/translates instruction into commands the computer understand.
Step 3: Executing. Carrying out commands by the given control and performing the actual operation on the data such
as arithmetic computation and logical comparison by ALU.
Step 4: Storage. Storing results into registers or memory
Notice: The first two steps are called instruction time (I-time), and the last two steps are called execution time (E-
time)
OUTPUT DEVICES
Output is data that has been processed into a useful form called information. Output can be in a form of text, graphic,
audio, and video.
Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer
storage space) that are used to create words, sentences, and paragraphs.
Graphics are digital representations of non-text information such as drawings, charts, photographs, and animation (a
series of still images in rapid sequence that gives the illusion of motion).
Video consists of images played back at speeds to provide the appearance of full motion.
Soft copy
A soft copy is the unprinted digital document file. It can be viewed by appropriate editing programs like word
processor, data base, presentation software, etc.
Advantages of soft copy
They are not presented physically
They are easy to store on the computer hard drive
They are easy to share or transfer electronically.
They can easily be converted into a hard copy.
They are less costly to produce
Disadvantaged of soft copy
Information can easily be manipulated.
It requires computer devices in order to read the output.
Softcopy can easily be attacked by viruses.
Output devices are devices used to bring out information from the computer and present it in a suitable form to the
user.
Examples of output devices;
Display devices Earphones Interactive whiteboard
Printers Fax machines Terminals
Speakers Multifunction peripherals 3D-spectacles
Headsets Data projectors
DISPLAY DEVICES
Display devices also known as Visual Display Units (VDUs)are output devices that visually convey text, graphics,
and video information to the user. Information’s shown on a display device are known as soft copy.
Examples of display devices include;
Liquid Crystal Display (LCD) monitors
Cathode Ray Tube (CRT) monitors.
Plasma monitors
Data projector
Head mounted display /A head gear
Light emitting diode (LED)
Liquid Crystal display (LCD monitor)
A liquid crystal display (LCD) monitor is a computer flat panel screen that uses LCD technology to show clear
images.
They are available in a variety of sizes.
Advantages of LCD Monitors
51
Simplified “A” level ICT Departmental Notes.
They require little power.
They take up less desk space than CRT.
They emit very little radiation.
They are portable than CRTs
Disadvantages of LCD Monitors
They are very expensive than CRT monitors
They can only be viewed from a very narrow angle.
LCD color output is usually slow and poor
Factors that affects the quality of an LCD monitor
i) Resolution
ii) Response time,
iii) Brightness,
iv) Dot pitch,
v) Contrast ratio.
i) Resolution is the number of horizontal and vertical pixels in a display device. A pixel is a single point in an
electronic image.
A higher resolution uses a greater number of pixels and thus provides a smoother, sharper, and clearer image.
ii) Response time of an LCD monitor or screen is the time in milliseconds (ms) that is takes to turn a pixel on or
off.
iii) Brightness of an LCD monitor or screen is measured in units.
A nit is a unit of visible light intensity equal to one candela (formerly called candlepower) per square meter.
The candela is the standard unit of luminous intensity.
iv) Dot pitch, sometimes called pixel pitch, is the distance in millimeters between pixels on a display device.
v) Contrast ratio describes the difference in light intensity between the brightest white and darkest black that
can be displayed on an LCD monitor.
A Cathode Ray Tube (CRT) monitors
A CRT (cathode ray tube) monitor is a desktop screen that contains a large sealed glass cathode-ray tube. Inside the
CRT, an electron beam moves back and forth causing dots on the front of the screen to glow, producing an image on
the screen. Each dot consists of a red, a green, and a blue phosphor, which combine to make up a pixel.
Advantages of CRT monitors
Can produce a rich color output (very deep colors).
Can be viewed from a very wide angle.
They are cheaper than the LCD.
They are more durable than the LCD.
Disadvantages of CRT monitors
They are not as bright as LCDs. Not suitable for very brightly lit environments.
There are not portable since they are heavy, and bulky.
A plasma monitor
This is a display device that uses gas plasma technology, which sandwiches a layer of gas between two glass plates.
When a voltage is applied, the gas releases ultra violet (UV) light. This UV light causes the pixels on the screen to
glow and form an image.
Advantages of plasma monitors
52
Simplified “A” level ICT Departmental Notes.
1. They can be mounted on the wall
2. They are less bulky.
3. They produce deep blacks allowing for superior contrast ratio
4. They have a wider viewing angle than those of LCD
5. They are less susceptible to reflection glare in bright rooms
6. Have a richer color display than LCD monitors
Disadvantages of plasma monitor
1. Susceptible to screen burn-in and image retention
2. Generally, do not come in smaller sizes than 32 inches.
3. Heavier than LCD due to the requirement of a glass screen to hold the gases
4. Use more electricity than an LCD TV.
5. Do not work well at high altitudes due to pressure differential between the gases inside the screen and the air
pressure outside.
6. They are more expensive.
Data projectors
A data projector is an output device that can take small image generated by a computer and reproduce a
bigger image onto a screen, wall, or other surface for the audience to see clearly. There are three types of
data projectors;
A liquid crystal display (LCD) projector
A digital light processing (DLP) projector
Cathode ray Tube projector
Applications of data projector today
Project a PowerPoint presentation at a business meeting.
Project a computer screen to teach a class in school.
Project a TV or computer with a movie playing to a large screen.
Demonstrate a product or service at a convention center.
Transform a wall, house, or other object to give it a different appearance.
Head mounted display (HMD) / headgear
A headgear is made up of two tiny display and sound systems that channel images and sound from the source to the
eyes and ears, thus presenting a stereo three dimensional sound effect in the virtual world.
Light emitting diode is a flat panel electronic device that emits light when an electrical current is passed through it.
LEDs are commonly used for indicator lights (such as power on/off lights) on electronic devices. They also have
several other applications, including electronic signs, clock displays, and flashlights
CATEGORIES OF PRINTERS;
Printers are categorized into two groups; Impact printers & Non-impact printers.
Inkjet printers
Character printers
Line printers Photo printers
Dot matrix printers
Page printers
Laser jet printers
Daisy wheel printers Label printers
Braille printer
Impact Printers Plotters
Mobile printers
Thermal printers
These are printers that produce a hard copy output by the print heads physically touching the print media.
Impact printersform characters and graphics on a piece of paper by striking a mechanism against an ink
ribbon that physically makes contact with the paper.
Examples of impact printers include;
Character printers
Line printers (High speed printers)
Dot matrix printers
Page printers
Daisy wheel printers
Braille printers
Character printers
Character printers are types of printers that print one character at a time instead of one line at a time.
54
Simplified “A” level ICT Departmental Notes.
Line printers
A line printer is an impact printer that prints one line of text at a time or entire line of text at once from one end of a
paper to the other end
Dot matrix printers are types of printers that produces characters by striking pins against an ink ribbon like in a type
writer to print closely spaced dots in the appropriate shape. Dot-matrix printers are relatively expensive and do not
produce high-quality output
Page printers
Page
Printeris aprinter which processes and prints a whole page at a time, as opposed to printers which print one line or
character at a time. They are much faster than all other printers.
Daisywheel printer
Daisy wheel printers are printers consisting of a wheel and attached extension on which molded metal characters are
mounted. When it is printing the wheel rotates until the right character is facing the paper.
Braille printers
Braille printers are impact printers that create tactile dots on heavy paper, making written documents accessible to
blind individuals. They press dots down onto a piece of paper to let a person using the Braille system read by using
their fingers.
55
Simplified “A” level ICT Departmental Notes.
Inkjet printers are printers that recreate digital image by propelling droplets of ink onto paper, plastic, or other
material.
In the inkjet printing mechanism, the print head has several tiny nozzles, also called jets. As the paper moves past the
print head, the nozzles spray ink onto it, forming the characters and images.
Cartridge
A cartridge is physical object in a protective plastic shell that contains ink or powder substances that is inserted into a
printer, allowing it to print. A compatible toner cartridge is one that is specially designed to work with a particular
brand and model of printer.
Photo printers
Photo printers are color printers that produce photo-lab-quality pictures. Some photo printers print just one or two
sizes of images.
LaserJet printers
LaserJet printers are high-speed and quality nonimpact printer that uses photocopier technology.
How LaserJet printer’s works
When a document is sent to the printer, a laser beam "draws" the document on a selenium-coated drum using
electrical charges.
After the drum is charged, it is rolled in toner, a dry black powder type of ink.
The toner adheres to the charged image on the drum.
The toner is transferred onto a piece of paper and fused to the paper with heat and pressure. After the
document is printed, the electrical charge is removed from the drum and the excess toner is collected.
56
Simplified “A” level ICT Departmental Notes.
Cost per page of toner cartridges is lower for than for other printers.
Disadvantages of LaserJet printers
The initial cost of LaserJet printers can be high.
A label printer
These are small printers that print on an adhesive (sticky) type of materials that can be placed on a
variety of items such as envelopes, packages, DVDs, photographs, file folders, and toys. Most label
printers also print bar codes. Label printers are different from ordinary printers because they need to
have special feed mechanisms to handle rolled stock, or tear sheet (fanfold) stock
Plotters
Plotters are output device that is used to produce high quality wide graphics in a variety of colors.
Plotters are used to create maps, architectural drawings, graphs and charts.
Advantages of plotters
Plotters can work on very large sheets of paper while maintaining high resolution.
They can print on a wide variety of flat materials including plywood, aluminum, sheet steel, cardboard, and
plastic.
Plotters allow the same pattern to be drawn thousands of times without any image degradation.
Disadvantages of plotters
Plotters are quite large when compared to a traditional printer.
Plotters are also much more expensive than a traditional printer.
A mobile printer
This is a small, battery-powered printer that allows a mobile user to print from a computer, Tablet PC,
PDA, smart phone or other mobile device while traveling.
Thermal printers
Thermal printers are non-impact printers generate images by pushing heated pins against a coated heat-sensitive
paper. The coating turns black in the areas where it is heated, producing an image. e.g. ATM receipt printers.
1. They print characters or images by striking 1. They print characters and images without
print hammer or wheel against an inked ribbon. striking the papers.
4. They normally uses continuous paper sheet. 4. They normally uses individual paper sheet.
5. They generate lot noise during printing. 5. They generate no noise during printing.
6. They use inked ribbon for printing. 6. They use toner or cartridge for painting.
8.Print heads are reliable, durable i.e. can last for 8.Print heads are less durable
a long time
9.They print limited colors 9.They are capable of printing strong clear colors
10.They are not commonly used today 10.They are commonly used today
The difference between screen output and print output
Screen output Print output
Displays soft copy output Prints hard copy output
The output is temporarily incase power goes off The output is permanent i.e. It can be maintained
for future reference
The output is silent Produces a lot of noise when outputting especially
impact printers
Different styles of print e.g. italics, and color A styled print is only possible with the advanced
displays possible. models having the color capabilities.
It is very fast Comparatively slow
Most personal computers have a small internal speaker that usually outputs only low-quality sound.
Headsets
Headsets are hardware devices that connect to a telephone or computer that allow the user to talk and listen while
keeping their hands free.
Data projectors
A data projector is an output device that can take images generated by a computer and reproduce them onto
a screen, wall, or other surface so that an audience of people can see the image clearly. For example, you
could use a projector to show a presentation on a large screen so that everyone in the room can see it.
59
Simplified “A” level ICT Departmental Notes.
mouse, directly on the screen. Items can be dragged, clicked and copied and the lecturer can handwrite notes, which
can be transformed into text and saved.
Spectacles
These are common in modern computer games especially on fights. The user wears the glasses like ordinary sun
glasses except that here, instead of seeing through the glasses, one will be treated with high quality three –
dimensional pictures. It is similar to being in a cinema hall.
COMMUNICATION DEVICES
Communication device are devices that connects the communications channel to a sending device by converting the
data from the sending device into signals that can be carried by a communications channel
Example of communication devices;
Modem Cables
Router Bridge
Hub Repeater
Switch Network interface card
Gateway Multiplexer
Modem
A modem is a communication device that converts between analog and digital signals
Router
Router is an intelligent communications device that sends communications traffic to the appropriate network
using the fastest available path
Hub/concentrator
A hub is a device that connects multiple devices to the network so that they can send and receive signals along the
network. It serves as a central connection point for cables from computers, servers and peripherals on the network.
Switch
A switch is a high-speed device that keeps track of which hardware addresses are located on which network segment.
It maps the internet protocol (IP) address with the Media Access Control (MAC) address of the LAN card.
Gateway
60
Simplified “A” level ICT Departmental Notes.
A gateway is a communication device that consist of a combination of hardware and software that connects
networks that use different protocols technologies by performing the required protocol conversions
Cables
Cables(cords) refer to two or more wires that allows the transmission of power or data between devices.
They are insulated wires having a protective casing and used for transmitting electricity or telecommunication
signals.
There are two main types of computer cables;
Data cables are cables that provide communication between devices.
Power cables are any cables that powers the devices
Bridge
A bridge is a device that links two local area networks that use the same address method or protocol. It accepts all
packets from each network addressed to devices on the other, buffers them, and retransmits them to the other
network.
Repeaters
A repeater is a communication device that accepts a signal from a transmission medium, amplifies it, and retransmits
it over the medium in order to overcome attenuation.
N.B Attenuation is the process by which signals undergo reduction in its strength as it travels over long
distances.
Network interface cards (NIC) or LAN Adapter
A network interface card is communication device or an expansion card that enables a computer and other devices to
connect to a network.
Multiplexer
Multiplexer is a communications device that combines two or more input signals from various devices into a single
stream of data and then transmits it over a single transmission medium.
TOPIC 5:
COMPUTER SOFTWARE:
Computer software is a program that consists of step by step instructions that tell the computer how to perform a
given task. Software consists of computer programs that control the working of the computer hardware.
A program; A computer program is a sequence of instructions, written to perform a specified task with a computer.
Without software, the computer hardware cannot do anything.
Characteristics of computer software
Computer software is intangible
Computer software gives instructions/procedures to computers
Computer software is copy righted
Computer software can be installed
Computer software is executable
computer software is loaded into Memory when running
All software has a source Code written by a programming Language.
Categories of computer software
61
Simplified “A” level ICT Departmental Notes.
63
Simplified “A” level ICT Departmental Notes.
Multiuser operating system is a type of operating system that allows multiple users to use the same computer at
the same time.
Classification of OS according to human–computer interface
The user interface is the aggregate of means by which the user interacts with the computer system. A user interface
provides:
Input, allowing the users to manipulate a system
Output, allowing the system to indicate the effects of the users' manipulation
Types of computer user interface
Graphical user interface
Command line interface
Touch user interface
Voice recognition interface
Graphical user interface (GUI) operating systems
A graphical user interface (GUI) is a type of user interface that allows users to interact with programs by
manipulating graphics, along with a keyboard and pointing devices such as a mouse, to provide an easy-to-use
interface to a program.
Advantages of a GUI operating System
They make computer operation more intuitive, and thus easier to learn and use.
GUIs generally provide users with immediate, visual feedback about the effect of each action. For example,
when a user deletes an icon representing a file, the icon immediately disappears, confirming that the file has
been deleted.
GUIs allow users to take full advantage of the powerful multitasking capabilities of modern operating
systems by allowing such multiple programs to be displayed simultaneously.
GUIs have windows that enable a user easily to view, control, and manipulate multiple things at once.
GUI is easy to use because of the use of graphics because user simply uses the mouse to choose the
appropriate icons/commands.
GUI enables a user to create shortcuts, tasks, or other similar actions to complete a task or run a program
Disadvantages of GUI operating System
GUI requires a lot of system resources (e.g. memory space) because of each of the elements that need to be
loaded such as icons, fonts, etc.
When it is not properly built, it can be very difficult to work with.
It requires the installation of additional software, e.g., the "runtime environment" in the case of java.
It is very slow to download into memory.
The user choices are restricted to those on the menus
COMMAND-LINE USER INTERFACE (CLI) OS
The command line is a user interface (CLI) that is navigated by typing commands at a command prompt; for
example, the root MS-DOS command line prompt generally is C:\>.CLI can only be navigated by using a keyboard
and entering commands; it does not use a mouse.
This method of instructing a computer to perform a given task is referred to as ‘entering’ a command: the system
waits for the user to conclude the submitting of the text command by pressing the Enter key on the keyboard.
Advantages of command-line user interface
It does not require a lot of memory resources to run because it is light.
Users have much more control of their file system and operating system in a command line interface. For
example, users can easily copy a specific file from one location to another with a one-line command.
It is precise because the user states exactly what he or she wants to do, and the more sophisticated CLIs keep
a record of the commands that have been issued.
Disadvantages of command-line user interface
Difficult to use by new users because of the memorization and familiarity of commands needed to operate a
command line interface new user find it much more difficult to successfully navigate and operate a command
line interface.
CLIs cannot show images.
64
Simplified “A” level ICT Departmental Notes.
It is fast and precise because command line users only need to use their keyboards to navigate a command
line interface and often only need to execute a few lines to perform a task.
Difference between command Line Interface and Graphic User interface
CLI GUI
The user has to know the commands or The commands are much more intuitive
look them up
The commands usually have to be entered Command shortcuts are possible such as
in full <Ctrl> C to copy
The user has to learn the commands and Less learning and training by the user is
more training is needed required
There are no menus Menus are used for making choices and
selections
The user has complete control The user choices are restricted to those on
the menus
Commands have to be entered accurately Spelling and typing errors are avoided
with the correct spellings and syntax
(rules)
65
Simplified “A” level ICT Departmental Notes.
Batch process operating system is where programs and data are collected together in a batch queue before
processing starts. Batch processing can be used for fairly automatic tasks; for example, weekly or monthly payroll
processing, processing utility bills (water, electricity, etc.) and credit card bills.
Real-time processing operating systems are the type of operating system designed to respond to an event within a
predetermined time. As soon as the data is input, it is processed and output immediately. These types of operating
systems are found in environments where computers are responsible for controlling systems continuously; for
example, robotics, manufacturing, interactive games, airlines and theatre booking systems.
Distributed operating systems are types of operating systems that manage a group of distributed computers.
Distributed computations are carried out on computer networks that work in cooperation.
Embedded operating systems are types of operating systems designed to operate on small machines like PDAs.
They are able to operate with a limited number of resources.
Factors to consider when choosing an operating system
The Human–computer interface
The Applications intended for the computer.
The availability of operating system on the market.
The basic design of the computer.
The Hardware provisions of the computer.
The available of operating systems for all sizes of computers.
The operating system should be user friendly.
The cost of the operating system
Reliability and security provided by the operating system.
The number of processors and hardware devices it can support.
The number of users it can support
The availability of basic utilities and accessory programs within the operating system
INSTALLATION AND UNINSTALLATION OF OPERATING SYSTEM
There are many reasons why you might need to install or reinstall an operating system:
When you need to upgrade to a more advanced operating system.
When the existing operating system files have been corrupted and it therefore no longer functions.
When you need to set up a brand new machine which was supplied without an operating system.
When you need to perform a recovery on your computer after it has suffered a fatal error (accidental error)
In case of an irreparable Registry or System file corruption in the existing Windows installation.
Note: Before doing a clean install of an operating system, you will need to back up your data files.
UTILITY PROGRAMS
A Utility program is a type of system software that allows a user to perform maintenance-type tasks, usually related
to managing a computer, its programs and its devices.
Utility programs included with most operating systems provide the following functions:
Managing and searching for files,
Viewing images,
Securing a computer from unauthorized access,
Uninstalling programs,
Scanning disks,
Defragmenting disks,
Diagnosing problems,
Backing up files and disks,
Setting up screen savers. etc
Examples of utility program include;
A file manager;
It is a utility that performs functions related to file and disk management such as;
Formatting and copying disks
Organizing files in folders
66
Simplified “A” level ICT Departmental Notes.
Displaying a list of files on a storage medium
Checking the amount of used or free space on a storage medium
Organizing, copying, renaming, deleting, moving, and sorting files; and
Creating shortcuts.
A shortcut is an icon on the desktop that provides a user with immediate access to a program or file.
Formatting a disk is the process of preparing a disk for reading and writing.
A search utility
A search utility is a program that attempts to locate a file on your computer based on the criteria you specify. The
criteria could be a word or words contained in a file, date the file was created or modified, size of the file, location of
the file, file name, and other similar properties.
A personal firewall
A personal firewall is a utility that detects and protects a personal computer from unauthorized intrusions. Personal
firewalls constantly monitor all transmissions to and from a computer. When connected to the Internet, your computer
is vulnerable to attacks from hackers (people who try to access a computer or network illegally).
An uninstaller
An uninstaller is a utility that removes a program, as well as any associated entries in the system files.
A disk scanner
A disk scanner is a utility that searches for and removes unnecessary files from the hard disk. It is used to detect and
correct both physical and logical problems on a hard disk or floppy disk and searches for and removes the unwanted
files. A physical problem is one with the media e.g. any scratch on the surface of the disk.
A disk defragmenter
A disk defragmenter is a utility that reorganizes the files and unused space on a computer's hard disk so that operating
system can be able to access data quickly and running of programs faster. Disk defragmentation enables data to be
accessed more quickly and programs to be run faster.
A diagnostic utility
A diagnostic utility is a type of utility that compiles technical information about your computer's hardware and certain
system software programs and then prepares a report outlining any identified problems.
A backup utility
A backup utility is a utility that allows users to copy, or back up, selected files or an entire hard disk to another
storage medium. During the backup process, the backup utility monitors progress and alerts you if it needs additional
media, such as another CD or tape.
Disk checker
Disk checker is a utility that scan the contents of a hard disk to find files or areas that are faulty.
Disk cleaner
Disk cleaner is a utility used to find files that are unnecessary to computer and can decide to delete.
Disk compression
Disk compression is a type of utility used transparently to compress / uncompress the contents of a disk, and
increasing the capacity of the disk.
Network utility
Network utility is a utility used to analyze the computer's network connectivity, configure network settings, check
data transfer or log events.
A screen saver
A screen saver is a utility that causes a display device's screen to show a moving image or blank screen if no
keyboard or mouse activity occurs for a specified time. When you press a key on the keyboard or move the mouse,
the screensaver disappears and the screen returns to the previous state.
Importance of a screen saver
To prevent ghosting problem that is images that are permanently etched on a monitor’s screen
It prevents unwanted lookers from accessing information or data from your computer.
For advertising business on the screen
For entertainment- in which digital photos can be put on your screen as moving pictures
Debugger
Debugger is a utility program used during the testing of a program by tracing and removing of errors from newly
installed programs.
N.B. Debugging is a process of removing of errors from installed programs in the computer system.
67
Simplified “A” level ICT Departmental Notes.
Antivirus utility
Antivirus utility is a utility used to detect remove, and prevent viruses from a computer‘s memory or storage devices.
A file compression utility
A file compression utility is a type of utility used to reduce or shrink the size of a file. A compressed file takes up less
storage space on a hard disk than the original file. Compressing files frees up room on the storage media and
improves system performance.
Disk partition
Disk partition is a utility used to divide an individual drive into multiple logical drives, each with its own file system
which can be mounted by the operating system and treated as an individual drive.
PROGRAMMING LANGUAGES
A computer program is a step by step set of instructions that a computer has to work through in a logical sequence
in order to carry out a particular task. The computer executes these instructions when told to do so by the user.
Computer programming
Computer Programming is defined as the process of creating computer software using a programming Language.
Computer programs are written by Human individuals (Programmers).
Programming Languages
Programming languages are the vocabulary and set of grammatical rules for instructing a computer to perform
specific tasks. There are many different types of programming languages each having a unique set of keywords
(words that it understands) and a special syntax (grammar) for organizing program instructions.
It is a set of instructions used to direct the operation of a computer.
Characteristics of programming languages
Every programming language has instructions for input and output.
They have instructions for calculations.
They have instructions for transfer of control instructions for data storage and retrieval
They gave instructions for data movements
Classification of programming languages
1. Machine code languages (First generation language)
2. Assembly languages (second generation language)
3. High level languages (Third generation language)
4. Fourth generation languages
5. Fifth generation languages
Categories of programming languages
There are two categories of programming languages;
Low Level Languages
High Level Languages
Low Level Languages
Low level languages are languages written without sequence of text including words, numbers, and punctuations.
There are two types of low level languages;
Machine Code (First generation Language or1GL)
Assembly language (Second generation Language or 2GL)
Machine Code languages (First generation Language or1GL)
These are languages written in binary form represented in the binary system by 1 and 0 respectively. Machine
language codes are very difficult to read and write by human beings hence susceptible to errors.
Characteristics of machine code languages (First Generation Language)
They are fast to execute because it is already in the language that the computer can understand.
Difficult to interpret hence requires the aid of a reference manual to interpret the meaning of each code).
Very easy to make mistakes in the sequence of 1s and 0s; replacing a 1 for a 0 can result in the wrong
command/instruction being executed
It is difficult to identify mistakes made
Time-consuming and tedious to write
They are machine dependent
68
Simplified “A” level ICT Departmental Notes.
69
Simplified “A” level ICT Departmental Notes.
Disadvantages of high level languages
A source program needs a compiler/translator to converts it into machine code.
They take a lot of time because they consume large amount of memory.
They are less efficient in the use of CPU and other facilities.
Categories of high level languages
i) Commercial languages
ii) Scientific languages
iii) Special purpose languages
iv) Multipurpose languages
v) Command languages for operating system
Commercial languages
This language was developed purposely for commercial use. Example of commercial language is
COBOL
It is an acronym for Common Ordinary Business Oriented Language. It was a high level language widely used in
business. COBOL has the ability to handle input and output of large volumes of alphanumeric data.
Advantages of COBOL
It is fairly easy to understand.
It can be used on different types of computers.
It enables programmers to easily re – arrange records within a file.
It enables programmers to easily produce reports.
Disadvantages of COBOL
Coding is lengthy and tiresome to make.
It takes longer to learn
Scientific languages
These languages were developed purposely for engineering applications and for scientific use. Examples include;
FORTRAN (Formula Translation), and ALGOL (Algorithmic Language)
FORTRAN (Formula Translation)
It was developed in 1956 by IBM to provide an easier way of writing scientific and engineering applications because
of its simplicity, conciseness, standardization, efficiency and numerical precision.
Advantages of FORTRAN
It is widely accepted and understood.
It is easy to write a simple FORTRAN program.
It includes mathematical functions that are good for solving problems.
Disadvantages of FORTRAN
It is difficult to use it for other applications other than scientific and engineering applications.
Input and output operations cannot be accomplished easily.
Difficult to read reports and screen displays.
ALGOL (Algorithmic Language). It is suitable for scientific and engineering computations.
Special purpose languages
These are languages intended to be tailor made for a particular type of problem, e.g. machine control, wages,
simulations, control experiments. Examples are; Ada and SQL (structure Query language).
Multipurpose languages
These are languages which are intended to deal with a number of different types of application areas especially in the
areas of business and science, e.g. BASIC, Pascal, C, C++, and JAVA
BASIC (Beginners All Purpose Symbolic Instruction Code)
It was developed in 1964 to teach programming languages to beginners who did not have any knowledge in
programming. It is a simple language which is easy to learn and to use it.
Advantages of BASIC
It is easy to learn and use.
It is so popular
70
Simplified “A” level ICT Departmental Notes.
C
It is a high level language. It is the most portable general purpose language. Derivatives of C are; C+ ++ the
, C
language is based on C and it is very popular for object oriented programming (OOP)
++
JAVA is an Object Oriented Programming (OOP) language that resembles a simplified form of C . Object Oriented
Programming (OOP) uses objects which combine data and behavior. OOP enables rapid program development.
Examples include; Visual Basic.
Fourth generation Languages (4GLs / Application generators / program generators)
Are languages designed to make the process of creating a computer – based application easier by doing the
programming themselves. The user defines certain tasks and then the application generators will create the program
code that will perform the tasks that have been defined. Examples of 4GLs
Structured Query Language
Fifth Generation Languages /5GLs (Artificial Intelligence Languages)
These are languages used in intelligent knowledge based systems (IKBs) such as robots. They―think and reason like
human beings because of the programs installed on them. They are extremely used in artificial intelligence projects
like space exploration.
Web development languages
These include HTML and JAVA. HTML (Hypertext Markup Language) is one of the programming languages used to
create web pages for the internet and intranets.
LANGUAGE PROCESSORS (TRANSLATORS)
These are programs used to translate high level programming languages to low level languages that processors can
understand.
Compilers
These translate a program written in a high level language into machine code language. The entire program is
translated into machine code at once.
Assemblers
These translate a low level language (assembly language) into machine code.
Interpreters
These translate source program, line by line while the program is running. This is done each time a program is
executed. As a result, a program running under an interpreter runs very slowly compared to a compiled program.
Linkers
These programs combine compiled programs and determine where the program will be located in memory.
APPLICATION SOFTWARE
Application software’s are programs that perform specific tasks for users. They are programs designed to enable a
computer to do a particular job.
CATEGORIES OF APPLICATION SOFTWARE
General-purpose software
This is software which can be used or adapted to suit a wide selection of users’ specific needs.
Specialized software
Specialized software is a program written for a specific task rather than for a broad application area. These programs
provide facilities specifically for the purpose for which they were designed. For example, a payroll program, expert
systems, accounting programs ,etc.
71
Simplified “A” level ICT Departmental Notes.
Open source software (OSS)
Open source software is copyrighted software for which the software plus the source code are freely distributed.
The OSS free software license/copyright permits users to use, change, and improve the software, and to redistribute it
in modified or unmodified forms.
Source codes (code) are the program instructions (statements) written in a computer programming language to
specify the actions to be performed by a computer.
A software license (copyright) is a legal instrument governing the usage or redistribution of software to protect the
interests of the program designer.
Copyrighted software is the software with legal restrictions in terms of usage, redistribution etc.
Freeware
Freeware is copyrighted software that is offered at no cost but whose source code is not provided. Software that is
not freeware is referred to as commercial software or pay ware or commercial software.
Proprietary software (closed source software)
Proprietary software is copyrighted software obtained at a cost where the software publisher grants a license to use
one or more copies of the software, but the ownership of those copies remains with the software publisher such that
all rights reserved by the software publisher.
Shareware
Shareware is copyrighted software that is distributed free on a trial basis (as a trial version) with the understanding
that the user may need or want to pay for it later.
Once the trial period has passed, the program may stop running until a license is purchased.
Public domain software
Public domain software is the software which is not copyrighted because it has been formally released to the public.
Copy lefted software
This is free software whose distribution terms ensure that all copies of all/modified versions of the copylefted
software to carry the same distribution terms like the original version.
Software Piracy
Software Piracy is the unauthorized/illegal duplication and use of computer software/programs.
Integrated software/packaged software:
Integrated software is a single application package which combines the most commonly used functions and
commands such as word processor, spreadsheet, database and presentation packages. For example, Microsoft office.
SOFTWARE SUITES
A software suite/application suite is a software package that has several applications that work well together because
they have related functions, features and user interfaces, and are able to interact with each other. e.g. Microsoft
Office, OpenOffice.org, and iWork, etc.
Advantages of integrated software and software suites
It is easy to transfer data from one component of the application to another.
Integrated software takes up less disk space than individual packages.
The user can move much faster from one application to the next.
It is usually easier to learn how to use the applications in a software suite because the user interface for
choosing commands is similar for all applications.
A software suite tends to be more powerful and versatile than individual applications.
A software suite is less likely to crash and contains fewer errors (bugs), since it has been widely tried and
tested.
The producers of software suites often offer after-sales services (e.g. online help facilities); users can also get
support from user groups and magazines.
Software suites are usually cheaper to buy than purchasing the packages individually.
Disadvantages of integrated software and software suites
Not all the features of a single application are included.
Some integrated packages do not contain all the applications that may be required to complete a task.
Classifications of application software
Application software’s are classified into two;
Special purpose/Custom (Tailor –made software)
General purpose/Off-the shelf software (standard software)
72
Simplified “A” level ICT Departmental Notes.
Special purpose/custom (tailor-made) software
Custom-made software is a program uniquely designed based on the user’s request to perform particular user’s needs.
The individual user hires programmers to design such a program which does not target the general market.
Examples of custom made software
Locally made school management information systems (SMIS)
Inventory management systems
Payroll management systems
Library management systems
73
Simplified “A” level ICT Departmental Notes.
It is very difficult to gain any competitive advantage from its use over business rivals because they use the
same software.
EXAMPLES OF APPLICATION SOFTWARE
Word processing software Web page authoring software
Spreadsheet software Video and audio editing software
Database software Educational software
Presentation software Entertainment software
Desktop publishing software Communications software etc
Accounting software
Paint and image editing software
Uses of application software
Word-processor: allows you to create, edit, store and print a range of different text documents; from letters and
faxes to books and essays.
Spreadsheet: enables you to use formulas to perform a large number of calculations on data stored in cells arranged
in rows and columns.
Database: uses forms to store data in tables made up of records and fields. The data can be searched using queries in
order to find out useful information. It can be used to create anything from an address book to a complex application
that produces end of year reports.
Graphics program: can be used to create posters, perform image processing in order to improve or alter photographs
or create original artwork.
DTP software: Desk Top Publishing software allows you to manipulate text and graphics in frames on a page in
order to create magazines, brochures and other complex documents.
Presentation Software: allows you to create a slideshow to illustrate a talk, or a presentation for other people.
Communications software: could include a web browser or email client software as well as other programs that
allow you to communicate with
APPLICATION PROGRAMS
These are programs that are designed to perform specific tasks for the user. These are programs that do the real work
for the user. Examples include: -
Word processing Databases
Spread sheets Graphic design
Presentation Desktop publishing
TOPIC 6:
WORD PROCESSING
W ord processing is the process of creating text based documents such as reports, letters, brochures, memos,
mailing labels and newsletters.
Word processor is software used to create, edit, format, save and print text based documents
Examples of word processing software;
Microsoft word Lotus WordPro
Corel WordPerfect WordPad
74
Simplified “A” level ICT Departmental Notes.
TOPIC 7:
ELECTRONIC SPREADSHEETS
A spreadsheet is an electronic worksheet that is used to organize data in rows and columns and perform calculations
on the data.
76
Simplified “A” level ICT Departmental Notes.
There are two types of spreadsheets;
1. The manual spreadsheets
2. The electronic spreadsheets
A manual spreadsheet is the type of the spreadsheet in form of books as a ledger book with many sheets of papers
divided into rows and columns on which data is entered manually using a pencil or a pen
An electronic spreadsheet is the type of the spreadsheet that uses the computer program that enable the computer
use to enter data in rows and columns and perform calculations automatically using formulae and functions.
USES OF SPREADSHEETS
It can be used by business men to record sales
It can be used by business men to produce invoices
It can be used to compile statements (e.g. Bank statements)
They are used for project planning and forecasting.
They can be used for creating personal lists such as shopping lists etc.
They are used for statistical analysis for instance in calculating average, mode, median etc
They are used for budget planning such as weekly, motherly, annual budgets.
They are used for processing examinations results.
They are used in schools for creating class registers and mark sheet.
They are used in accounting by generating cashbook, ledger books, balance book etc.
ADVANTAGES OF USING SPREADSHEES
Handle a variety of applications
Easy organizing and processing of information
Automatic calculations
Enables easy formatting & editing of work
Speedy, flexible and efficient
Can be stored and retrieved at a later time
Reduces inventory (storage)costs
Easy sharing over the network
Neat work with various illustration like charts
Disadvantages of using Spreadsheets
It requires a lot of resources like computers which are expensive
It is costly in terms of training personnel and resources needed
It is limited to power availability that is it can‘t work without power.
The whole work is lost in case of Virus attacks
Data can easily be change with ease by hackers.
Advantages of using electronic spreadsheets over manual worksheets
It is easy to make changes and corrections to data on the worksheet.
The rest of the worksheet is recalculated whenever data on a worksheet changes.
It is fast with the help of built-in functions and macros.
Calculation is always accurate, provided that data and formulae entered are correct.
It is easy to create different kinds of charts or to change chart types.
Information on charts is updated automatically whenever related data on the worksheet changes
Spreadsheets are much larger than manual worksheets
They can perform mathematical, statistical and financial calculations quickly and accurately.
Cells in electronic spreadsheets can use information from other cells
Electronic spreadsheets can be stored and retrieved for repeated use.
Examples of spreadsheet program include; Corel Quattro Pro
Microsoft excel Lotus1-2-3
77
Simplified “A” level ICT Departmental Notes.
VisiCalc
Super Calc Multiplan
MICROSOFT EXCEL (MS Excel)
This is an electronic spreadsheet that can be used for practically manipulating of data and figures.
Parts of Ms Excel document
A cell is the intersection of a column and a row.
A cell address is a unique address which defines the location of a cell in a worksheet (e.g. A1, A2, Q7, etc)
Range is a rectangular selection of a worksheet containing two or more cells
Work sheet is the biggest range consisting of all the cells in one sheet.
Work book is a collection of various worksheets
Range address is a range reference which has a format of top-left cell address: bottom-right cell address (e.g.
D12:F19)
Labels are text that identify the data and help to organize the worksheet. All label entries are left aligned by default.
Column letter is a column that runs vertically on a work sheet and each one is identify by a letter in the column
header.
Row number is a row that runs horizontally on a work sheet and each one is identify by a number in the row header.
Values are numbers to be used for calculations.
Cell reference is the location of a cell on a worksheet.
Types of cell references
Relative cell reference is a cell reference in which the cell address (e.g. B1 + C1) will be self-adjusted when the
formula is moved or copied to another cell (e.g. B2 + C2)
Absolute cell reference is a cell reference in which the cell address (e.g. $B$2) is always fixed.
Mixed cell reference is a cell reference that uses absolute column and a relative row reference. Example $A2 and
A$2
FORMULAE AND OPERATORS
A formula is a set of instructions for performing a calculation and displaying the resulting value in the cell. A
formula always begins with an equal (=) or a plus (+).
Types of formulae
Numeric (Arithmetic)
Text
Logical
Numeric (Arithmetic) formulae is a formula use to perform calculations on values and use +, -, *, ^ and % numeric
operators for calculation.
Examples=25+5, =A15*B1/B5
Text formulae are formulae used to manipulate text. The text is normally enclosed in (quotation marks) and to
combine strings of text, use & (ampersand).
Logical formulae are statements that evaluate a condition. They result into 1 if true and 0 if false.
They use =, <,>,>=, <= and <>, AND, OR, and NOT to calculate various conditions. Example
Entry Results
=5>4 - Results in true or1
=5<A1 - Result in 1 or true if A1 has a value less than5
=AND(A1=1,A2=2) - Result in 1 or true (if A1 contains 1andA2contains2
=OR(A1=1,A2=2) - Result in 1 or true (if A1 contains 1orA2 contains2)
=NOT(A1=0) - Result in 1 or true (if A1 contains any value but not zero)
Basic mathematical operators used in spreadsheets
Symbol Description Example
() Parentheses =B2*(C4+D5)
* Multiplication =B2*C4
/ Division =B2/C4
+ Addition =(B2+C4)
- Subtraction =(B2-C4)
% Percentage =C5*60%
78
Simplified “A” level ICT Departmental Notes.
^ Exponential =C4^2
Rules governing formulas
1. Always begin the formula with an equal sign or plus sign.
2. Type names of the functions correctly
3. Use the number of brackets on either side
4. Do not leave unnecessary spaces between functions and brackets
5. Separate multiple arguments with commas
6. Enter the correct number of arguments in their correct order
Functions;
A function is a predefined formula that helps to perform common mathematical functions. Each function has a
specific order, called a syntax which must be strictly followed for the function to work correctly.
Syntax order
All functions begin with the =sign. After the = sign, define the function name (e.g. SUM). One or more arguments,
numbers, and text or cell references enclosed in parentheses: if these are more than one argument, separate each by a
comma.
Types of FUNCTIONS used in spreadsheet
Statistical functions
Logical functions
Mathematical functions
Lookup functions
Examples of statistical functions
Function Example Description
sqrt =SQRT(A4) Calculates the square root of a number
Count =COUNT(B1:B2) Counts the number of cells that contain value within a range
Max =MAX(C2:C3) It returns the largest values in a set of values
Min =MIN(G1:G3) It returns the smallest values in a set of values
Mode =MODE(B2:C4) It returns the most frequently occurring value in a set of values
Median =MEDIAN(B3:G8) it returns the middle value in a given range
Rank =RANK(A2,A2:A6,0) It returns the rank of a number in a list by comparing its size
relative to the others
Average =AVERAGE(C2:C5) It returns mathematical mean of a set of values that contain
numbers
Logical function
If =IF(LOGICAL_TEST_,VALUE_IF_TRUE,VALU It returns a specified value if a condition
E_IF_FALSE) is evaluated is found to be True and
another value to be False
Mathematical functions
Sum =SUM( A1:A2) Returns all the values in range of cells
Products =PRODUCTS(A3:B3) It adds values in a range of cells and
returns the result in the specified cell
Sumif =SUMIF(A1:A10) It adds values in the cells specified by a
given criteria or condition
Countif =COUNTIF(A1:A10) It counts the number of cell within a
specified range that meet the given
criteria
Lookup functions
79
Simplified “A” level ICT Departmental Notes.
N.B. In IF function, there are three items between the round brackets to be notice
IF (logical test, value_if_true, value_if_false)
1. Logical test; This is the first argument that you want to test for.
2. Value_if _true; This is what you want to do if the answer to the argument is Yes.
3. Value_if_false; This is what youwant to do if the answer to the argument is No.
TOPIC 8:
ELECTRONIC PRESENTATION
Electronic presentation is software used to create slides which can be used to communicate ideas/illustrate a speech
to a group or audience. Presentation is a collection of data and information to be delivered to a specific audience.
The presentation can be viewed as a slide show on a large monitor or a projection screen. Examples of presentation
software;
Microsoft PowerPoint Harvard Graphics
Corel presentations Micro media director etc
Lotus Freelance graphics
Functions of a presentation
It allows text to inserted and formatted.
It is used to insert and manipulate graphics, images or animations with objects
It has a slide show system to display the designed slide content.
Principles of a good presentation
Avoid excessive visuals and slides to detract you from your message.
Be the primary source of presentation but not power point slides.
Use flowcharts and photographs to illustrate more abstract points.
Think carefully about the sequence or the flow of your slides.
Factors to consider when designing a good presentation
Identify the goal of the presentation
Use slide design effectively
Include the title page with your name, contact, date and session topic for the presentation.
Include only the main points
Present information consistently
Include only one main concept per slide.
Include graphics, charts, and videos to keep your audience alert
Avoid fancy fonts
Don not includes too many slides in your presentation.
Avoid excessive use of animations and transitions
Common terms used in Microsoft Power Point;
Slide is an individual page in a presentation. They are normally viewed using projectors.
Title slide is the first slide in your presentation normally with a heading and sub-heading.
Slide Master/ Master Slide is a single slide that controls all other slides in a given presentation. Any changes made
to it affect the rest of the slides respectively.
80
Simplified “A” level ICT Departmental Notes.
Handout is a combination of 2 to 6 slide images on a single page.
Speaker’s notes are notes that help in the actual delivery of a presentation. Power point lets you enter and print a
notes page for each slide
Colour scheme is the overall colour design for all the slides in a presentation
Timing is the period of time a slide stays on the screen during a slide show.
Templates are already created files stored in the computer for reference purposes that defines what your presentation
will look like. Power point provides over 100 professionally designed templates containing proven layouts, color
schemes and background textures.
Slide Layout is the given design of a slide showing divisions/areas or sections of a slide where work can be done.
E.g. title only and blank slide layouts
Animations are visual effects applied to individual items in a slide such as graphics, images, titles etc.
Transition is a way a slide moves off the screen and the next slide appears.
Wizard is a series of automatic steps that guides you through a task. It helps the user to choose a style and design for
the slides.
Transitional looping is a facility which sets up the presentation to run continuously until it is stopped by the
presenter.
Action buttons are built in button shapes that you add to a presentation to use as hyperlink.
Viewing a presentation
Power point provides five different presentation views i.e.
Outline view Notes page view
Slide sorter view Slide show view
Slide view
Slide view shows the user how the slide will appear when printed or displayed. It is similar to page layout in a word
processor for windows. All text, graphics and other media elements appear in slide view.
Outline view enables one to outline content much as you would in a word processor to enter, arrange and edit textual
information. It is useful in organizing one‘s thoughts and developing textual content for a presentation.
Slide sorter view provides a light table for viewing multiple slides. When selected, this view arranges small
thumbnail presentations of your slides, complete with text and graphics, rows and columns.
Notes page view allows you to insert edit and delete reminder notes for yourself on each slide. It allows you to use a
slide‘s notes page for creating extended notes as an audience handout. It lets you enter text and graphics in a notes
place holder located below the image of the slide.
Slide show view (Also called on-screen presentation) is a view that takes up the full computer screen, like an actual
presentation. It lets you see how your graphics, timings, movies, animated effects, and transition effects will look
during the actual presentation to the audience.
Advantages of presentation software over traditional chalk and talk
1. It provides a wide variety of presentation formats and layouts for the slides.
2. Allows addition of multimedia components such as clipart images, video clips and audio clips.
3. Allows setting of timing for the slides so that the presentation automatically displays the next slide after a
predetermined period of time.
4. Allows application of special transition effects on each slide.
5. The presentation can be viewed and printed in different formats.
6. Provides no dusty environment
7. Provides security through the use of password
8. Provides different print formats e.g. Handouts, slides.
TOPIC 9:
DATABASE
A database is a collection of related information stored for a particular purpose. It is a collection of interrelated data
about a particular subject or for a specific purpose which allows a user to retrieve, update and manipulate data any
time. Examples of database include;
Telephone books (directories) Television guides etc
Customer address books School registers
Dictionaries National voters register
81
Simplified “A” level ICT Departmental Notes.
82
Simplified “A” level ICT Departmental Notes.
Advantage of using a Database Management System over manual based systems
Databases allow control of data redundancy because most of the data is storing in one place hence less
duplication
It provides security and authorization to to its users.
Database management system provides possibilities for data backup and recovery.
It provides possibilities of data access via network connection.
Data is entered, stored, modified and accessed by methods that are not affected by application programs.
Database management system eliminates data duplication that minimizes costs of maintenance.
Disadvantage of using a Database Management System over manual based systems
There is lack of confidentiality, privacy, and security when information is made available to user from the
remote location
Data quality is compromised when there is increasing number of users accessing data directly.
It provides threats to data integrity when different people are tempting to update the same data at the same
time.
They are also difficult and time consuming to develop.
Database management systems are expensive to set up and to maintain because of their complexity and
efficiency.
It creates user resistance to change from traditional file orient system to database management system
Common terms/words used in Microsoft Access
An object is a compilation of table, quarry, form, reports, pages, modules and macro in a database
A record is a row in a table that contains information about a given person, product or event
A table is a primary element used to collect data that are related to a particular subject organized into rows (records)
and columns (fields) similar to an electronic worksheet.
The table structure is the number of fields, field names, and field lengths and data types in the database table
Table relationships are the associations of data between tables e.g. one-to- one & one-to-many
A file is a combination of related records.
A field is a column in a table that contains a specific piece of information within a record
A field name/Label is a title or a name of a particular column.
Field Length is the maximum number of characters that can be stored for data in a particular field
Field properties refer to specific characteristics of a particular field.
Validation is the process of checking of input data for errors (e.g. data type) before processing
Data verification is the checking for mistakes when data is copied from one place to another
Data type (field type) is the type of value that you enter into the field. This is a column that specifies data that will
be stored in the field.
83
Simplified “A” level ICT Departmental Notes.
Object Linking and Allows a linkage to pictures, photographs & other objects created in
Embedding (OLE object) another program such as word document, excel spreadsheet
Lookup wizard Allows you to link the field to another table
Hyperlink Allows a link to an internet, internet site or to another location in the
database
DATABASE OBJECTS
A database is made up of several objects, grouped into a single file; among them include;
Database objects Description
Tables Are primary structures in a database that holds raw data
Queries These are tools used to select records from one or more tables in a database so
they can be viewed, analyzed, and sorted on a common datasheet. They do
questioning tasks like how many boys from stream A
Forms These are graphical interfaces that are used to display and edit data. Forms can
be developed from a table or a query.
Reports These are tools that enable one to preview and print data in a meaningful
format.
Pages Are tools used for creating/editing world wide web pages
Macros These are simplified programming languages which you can use to add
functionality to a database
84
Simplified “A” level ICT Departmental Notes.
Modules These are collection of declaration, statements, and procedures that are stored
together as a unit, modules, like macros, are objects one can use to add
functionality to a database.
QUERY CRITERIA
A query criterion refers to as expression in Microsoft office access. Criteria are similar to a formula.
Consider the following criteria use in query;
Criterion Query result
“Kampala” Returns records where the location field is set to Kampala.
Not “Jinja” Returns records where the location field is set to a location other than
Jinja.
Like U” Returns records for all countries whose names start with "U", such as UK,
USA, and so on.
Not Like U” Returns records for all countries whose names start with a character other
than "U".
Like “*Lira*” Returns records for all locations that contain the string "Lira".
Not Like “*Lira*” Returns records for all locations that do not contain the string "Lira".
Like “*ina*” Returns records for all locations whose names end in "ina", such as China
and Argentina.
Not Like “*ina*” Returns records for all locations that do not end in "ina", such as China
and Argentina.
Is Null Returns records where there is no value in the field.
Is Not Null Returns records where the value is not missing in the field.
““(a pair of quotes) Returns records where the field is set to a blank (but not null) value. For
example, records of sales made to another department might contain a
blank value in the location field.
Not”” Returns records where the location field has a nonblank value.
““Or Is Null Returns record where there is either no value in the field, or the field is set
to a blank value.
Is Not Null And Not”” Returns records where the location field has a nonblank, non-null value.
>=“Jinja” Returns records of all locations beginning with Jinja and continuing
through the end of the alphabet.
Like“[A-D]*” Returns records for location whose names start with the letters "A"
through "D".
“Uganda” Or “USA” Returns records for Uganda and USA.
In (“Kampala”, “Jinja”) Returns records for all locations specified in the list.
Right ([Location],1)= “X” Returns records for all countries/regions where the last letter is "X".
Len ([Location])>10 Returns records for locations whose name is more than 10 characters long.
Like "Chi??" Returns records for locations such as China and Chile, whose names are
five characters long and the first three characters are "Chi".
Wildcards
A wild card is a symbol used to replace or represent one or more characters. Wildcards are typically either
an asterisk (*), which represents one or more characters or question mark (?), which represents a single character. A
wildcard refers to a character that can be substituted for zero or more characters in a string.
Wild card Description
? Allow a single character 0r digit at the position marked by?
* Allow any characters, digits, quantity at position marked by*
85
Simplified “A” level ICT Departmental Notes.
TOPIC 10:
ELECTRONIC PUBLISHING
What is publishing?
This is the process of making information available for the general public.
Desktop publishing (DTP) is the process of creating document using page layout skills on a personal computer.
Electronic publishing refers to a type of publishing that is used to create and disseminate information by electronic
means including emails and via the web.
FORMS OF ELECTRONIC PUBLISHING
Web publishing
Online publishing
Desktop publishing
86
Simplified “A” level ICT Departmental Notes.
TOPIC 11:
DATA COMMUNICATION & NETWORKING
Definition of Data communication
Data communication is the process of transferring data, instructions and information from one computer to another
computer.
Elements of data communication
A sending device
Message
A communication device
A communications channel
Protocol
Communications software
A receiving device
A sending device;
A sending device is a device that initiates an instruction to transmit data, information, or instructions. It can be a
computer system, a terminal, a cellular telephone, a GPS receiver, an Internet- enabled PDA, or another device that
originates the message.
Message
This is the data/content/information to be transmitted over a transmission medium. The message is usually in a
discrete form.
A communication device;
Is a device that connects the communications channel to a sending device by converting the data, instruction or
information from the sending device into signals that can be carried by a communications channel; It can be a
modem, repeater, switch, router, gateway etc.
A communications channel/medium Also known as communication links or Data links a communication channel is
a medium over which Data travels/is transmitted from one computer (device) to another.
87
Simplified “A” level ICT Departmental Notes.
It is a path through which the signals are sent either physically (cables) of wireless waves. It can be a standard
telephone line.
Protocol
This is a set of rules and procedures for exchanging information among computer device on a network.
A receiving device;
It is the device that accepts the transmitted signals from the sending device. They include computers, fax machine,
digital cameras, phone, PDA, etc.
Communications software;
This software consists of programs that manage the transmission of data, instructions and information between the
sending and receiving computers. It controls and manages the activities and functions of the communications
network.
Definition of data communication tools
These are tools that enable the user to emulate and test the networks.
Types of electronic data communication tools
Phones
Email
Social network
Instant messaging
Phones
Wireless phones are the most dominant form of communication in the world. Text messaging is now rampant because
of the advent of smart phones which allows the mobile phones to have personal computer functionality of sending
large pictures and video files.
Email
Email is a function of the internet and users can access it from countless devices including cell phones. Email is
virtually instant, much like modern communication modes.
Social network
Social medium that enable instant interactions among user, who can communicate directly through twitter, face book,
what saps etc.
Instant messaging
Instant messaging is done more often on keyboards over internet. Skype offers online calling, messaging and video
calling cat across the world via internet.
Services offered by data communication tools
Voicemail Newsgroups (Discussion groups)
Fax Internet telephony
E –mail Videoconferencing
Bulletin Board System (BBS) Telecommuting
Instant messaging (IM) Groupware
Chat room Skype
Voicemail
This functions like an answering machine. It allows a caller to leave a voice message which is stored in a voice mail
box for the caller party. The called party can listen to the message, add comments to the message and reply or forward
the message to another mail box in the voice mail system.
Fax
A facsimile (fax) machine is a device that transmits and receives documents over telephone lines. Sent or received
documents are called faxes. Fax capability can be added to a computer using a faxmodem.
E –mail
Email is a transmission of messages via the internet and users can access it from countless devices including cell
phones. Email is virtually instant, much like modern communication modes.
Bulletin Board System (BBS)
88
Simplified “A” level ICT Departmental Notes.
It is a computer that maintains centralized collections of electronic messages. They are declining because of the
emerging of internet which can serve the same purpose.
Instant messaging (IM)
Instant messaging is a real time communications service that notifies a user when one or more people are online and
then allows the user to exchange messages or files with them.
Chat room
Chart room is a location on an internet server that permits users to chat with each other by typing lines of text on the
computer.
Newsgroups (Discussion groups)
It is an online area where users conduct written discussions about a particular subject.
Internet telephony
It is also called a Voice over IP (VoIP). It is a web based telephone that allows a user to talk to others for just the cost
of the internet connection. A microphone, sound card and special internet telephony software are required for
conducting internet telephony.
Videoconferencing
It is a meeting between two or more geographically separated people who use a network or the internet to transmit
audio and video data.
Groupware
It is a software application that helps groups of people to work together and share information over a network. It
enables members of a workgroup to communicate, manage projects, schedule meetings and make group discussions.
Skype
This service allows users to communicate with peers by voice using a microphone, video by using a webcam and
instant messaging over the internet.
Telecommuting
Telecommuting is a work arrangement in which employees work away from the standard workplace of a company,
but communicate with the office using some kind of communications technology
Advantages of telecommuting
Reduces time and expenses for travelling to and fro work.
Eliminated travelling during bad weather conditions
Allows flexibility in the work schedule
Reduces air pollution by vehicles driven to and fro work
Employers reduce costs due to less office space and furniture required.
Favors the disabled employees
Disadvantages of telecommuting
Reduces human face – to – face interactions among the working staff
If any device of the communications system fails, the work has to stop.
Leisure time at home may be replaced by work.
There is less security over the company’s information.
89
Simplified “A” level ICT Departmental Notes.
Serial transmission is the sequential transmission of one bit of signal at a time sent over a single wire. Low data
transfer rates are possible, but can be used to transfer data over longer distances.
Parallel transmission
Parallel transmission is the simultaneous transmission of the signal elements of a character or other entity of data over
two or more separate paths. Multiple electrical wires are used which can transmit multiple bits simultaneously, which
allows for higher data transfer rates.
Asynchronous Data transmission
Transmission where each group of digital or analog signals making up the code for one character is separated and
individually wrapped with a start BIT and a stop BIT and an error check BIT.
Asynchronous transmission is relatively slow because of the extra bits that must be sent with the data bits for each
character.
Multi-Drop transmission
Multi –drop transmission is a transmission in which all components are connected to the electrical circuit. A process
of arbitration determines which device sends information at any point. The other devices listen for the data they are
intended to receive. There are both physical (cable or wired) media, and wireless media.
Definition of data transmission media
90
Simplified “A” level ICT Departmental Notes.
This is a communication channel or path over which the data signals are sent from the source to the destination.eg
cables and wireless.
TYPES OF DATA TRANSMISSION MEDIA
There are two types of transmission media, i.e.
Physical (Guided/bounded) transmission media
Wireless (Unguided/Unbounded) transmission media
They are low frequency cables, not suitable for transmission of very high frequency signals like cable TV,
TV antenna and radio antenna signals
Coaxial cable;
This is an electrical cable that consists of a single copper wire surrounded by three insulating layers i.e. an insulating
material, a braided metal and a plastic outer coating.
Features of coaxial cable
Both conductors share a common center axial, hence the term "co-axial"
It has a high bandwidth
It is highly resistant to signal interference
It is used for long distance (300-600 meters)
It is quite bulky and sometimes difficult to install
It has higher installation costs
Coaxial is prone to lightning strikes
It is more expensive than twisted pair cables
It is not flexible
Broadcast radio
Radio broadcast is a wireless transmission medium that uses radio waves through the air to send transmissions over
long distances to a large audience who will listen to the transmission over a radio.
A transmitter is needed to send the broadcast radio signal. To receive the broadcast radio signal, a receiver with an
antenna that is located in the range of the signal is needed.
Bluetooth,
This is a short range wireless medium for exchanging data over short distances between paired devices. In order for
devices to communicate, they must be Bluetooth enabled.
Advantages of Bluetooth Technology
Connection establishment is very quick because users only need to pair two devices.
It has low power consumption.
It can pass through walls.
It has better range than Infrared communication.
It is used for voice and data transfer.
Bluetooth technology is adopted in many products such as head set, in car system, printer, web cam, GPS
system, keyboard and mouse.
Bluetooth devices are available at very cheap cost.
It has less interference compare to other wireless technologies
Easy to install
It makes connecting to different devices convenient
Disadvantages of Bluetooth Technology
It can easily be hacked into by intruders
It only allows short range communication between devices
It can only connect two devices at once
It can lose connection in certain conditions
The bandwidth is lower compare to Wi-Fi.
Battery usage is more compare to the condition when Bluetooth is powered OFF
Microwaves
These are high-frequency radio waves media that provide a high speed signal transmission through the space. They
provide a high speed signal transmission by receiving signal amplifies it and transmits it to the receiving devices or
retransmits it to the next microwave transmission tower.
A microwave station is an earth-based reflective dish that contains the antenna, and transceivers. Microwaves
transmit signals in a straight line with no obstructions between microwave antennas.
Advantages of microwaves
Their higher frequencies allow broadband width and high data flow
They enable long distance transmission of data.
Disadvantages of microwaves
Microwave frequencies travel only in straight line path hence difficult to propagate.
Microwave transmission towers are expensive to construct and maintain.
93
Simplified “A” level ICT Departmental Notes.
Microwave systems do not pass through solid objects. This can be problematic in cities with a lot of tall
buildings or mountainous regions.
Applications of microwaves
Broadcasting and telecommunication
To detect the range, speed, and other characteristics of remote objects (Radar technology is a technology that
uses radio waves to find the position of objects which cannot be seen)
Radio astronomy
In navigation especially global navigation microwave systems (GNSS)
Heating and power application e.g. microwave ovens
Communications satellite; Satellites are communication devices stationed in space to communicate with earth based
communication facilities using microwave. These earth-based stations often are microwave station.
Applications of satellites
They are used in applications such as;
Air navigation, Paging,
Television and radio broadcasts, Global positioning systems,
Weather forecasting, Internet connections etc
Video conferencing,
Wi-Fi
Wi-Fi is a short form for "wireless fidelity," it is a wireless networking technology/medium that allows devices to
exchange data using radio waves over a computer network. Internet.
Devices must be WI-FI enabled to access Wi-Fi via a wireless network access point. Eg PC, smart
94
Simplified “A” level ICT Departmental Notes.
Different competitive brands of access points and client network inter-operate at a basic level of service.
Manufacturers are building wireless network adapter into most laptops leading to the reduction in the price of
the chipsets for Wi-Fi
Wi-Fi allows cheaper deployment of local area network.
Disadvantages of Wi-Fi
Wi-Fi networks have limited range, and this range varies with frequency band
Devices that uses Wi-Fi has high power consumption
Wi-Fi connections can be disrupted or the internet speed lowered by having other devices in the same area.
Wi-Fi is less secured than wired connections for instance Ethernet because an intruder does not need physical
connections.
It a limited range which does not favor mobile devices.
Cellular radio
Is a form of broadcast that is used for mobile communications using radio waves.Eg wireless modems and cellular
phones.
Infrared (IR)
Is a wireless transmission medium that transmits signals across short distances to transmit data between devices using
infrared light waves
These devices have an IrDA port that enables the transfer of data from one device to another using infrared light
waves.
Advantages of IrDA (Infrared)
The devices are very cheap.
The devices are compact, lightweight and consume low power.
The technology based devices are easy to use.
They are more secure compare to RF technologies.
95
Simplified “A” level ICT Departmental Notes.
Wireless access point and Wi-Fi technology in general have limited range that is signal strength decrease as
the range increase.
Poor security of data on a wireless network, outsider can easily log on an unsecured wireless network.
These are other computers on the network that sends request and receive responses from the server
2. Network Hardware Devices
These are devices that handle the movement of data in a computer network.
Modems Bridge
Router Repeaters
Hub Network interface cards
Switch Multiplexer,
Gateway
A modem
The word "modem" is a contraction of the words modulator and demodulator i.e. Modulation and Demodulation.
Modulation is the process of converting digital signals into analog signals while Demodulation is the process of
96
Simplified “A” level ICT Departmental Notes.
converting analog signals into digital signals.
A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a telephone
line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
Therefore, a modem is a communication device that converts between analog and digital signals.
A DSL Modem
Wireless modem
A wireless modem is a communication device that converts digital data into radio signals and back.
Fax modem
A fax modem is a communication device that enables a computer to transmit and receive documents as faxes.
Router
Is an intelligent communications device that sends communications traffic to the appropriate network using the
fastest available path.
Hub/concentrator
A hub is a device that connects multiple devices to the network. It serves as a central meeting place for cables from
computers, servers and peripherals on the network.
Switch
A switch is a high-speed device that maintains a bridging table, keeping track of which hardware addresses connected
to a network. It maps the internet protocol (IP) address with the Media Access Control (MAC) address of the LAN
card. It sends the data packets only to the destined computer.
Gateway
A gateway is a communication device that consist of a combination of hardware and software that connects networks
that use different protocols technologies by performing the required protocol conversions
Bridge
A bridge is a device that links two local area networks that use the same address method or protocol. It accepts all
packets from each network addressed to devices on the other, buffers them, and retransmits them to the other
network.
Repeater
A repeater is a communication device that accepts a signal from a transmission medium, amplifies it, and retransmits
it over the medium in order to overcome attenuation. Hence repeaters are needed over the medium to boost up these
signals
N.B Attenuation is the process by which signals undergo reduction in its strength as it travels over long
distances.
A network interface card is an electronic communication device or an expansion card that enables other devices on a
computer to connect to a network.
Wireless Network Card
Multiplexer
Multiplexer is a communication device that combines two or more input signals from various devices into a single
stream of data and then transmits it over a single transmission medium.
3. Transmission or communication (Network) media/channels
Transmission or communication (Network) media/channels is also known as communication links or Data links. It is
a medium over which Data travels/ transmitted from one computer (device) to another.
97
Simplified “A” level ICT Departmental Notes.
4. Network software
Network software’s are Communication programs that are used in combination with network devices to enable
transmission of data between network terminals. Eg protocols.
Commonly used protocols
TCP/IP-transmission control protocol/Internet protocol.
HTTP- Hypertext transfer protocol
FTP- file transfer protocol.
POP- post office protocol
SMTP-Simple mail transfer protocol
IPX/SPX-stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking
protocols used primarily on networks using the Novell NetWare operating systems
NETBEUI-(NetBIOS Extended User Interface) is a new, extended version of NetBIOS, the program that lets
computers communicates within a local area network. it does not support the routing of messages to other
networks,
Telnet (Telecommunication Network) for Remote access between computers
IMAP; Internet Message Access Protocol.
The Point-to-Point Protocol (PPP) which is a data link protocol commonly used in establishing a direct
connection between two networking nodes.
5. Server
A server is a computer that runs software that enables it to serve specific requests from other computer (clients).
IMPLICATIONS OF USING COMPUTER NETWORKS
Positive Implications (Advantages)
It facilitates easy communication for instance through electronic mail.
Allow users to log on and access their work from any workstation on the network
Computer network provides rapid method of sharing files instead of using movable disks.
Computer networks enable workgroup computing
It allows software to be upgraded easily on the network since it is done at ago on the server.
It enables online learning and collaborative research
Computer network allows sharing of data and information stored on any other computer on the network.
It reduces on cost by sharing hardwires and software’s among the network since one device is jointly used in
the network instead of installing a hardware and a software to each computer.
Peer-to-peer networks
This is an interconnected group of equal computers where each computer acts as both a client and a server to others
on the network. There is no hierarchy among them,
Clients-server networks
This is a type of local area network that consists of a central computer (the server) on which other computers (clients)
are connected. The central computer providing services to client computers
99
Simplified “A” level ICT Departmental Notes.
Wireless adaptor/card is a device that provides an interface between the network operating system and an
antenna to create a wireless connection to the network.
100
Simplified “A” level ICT Departmental Notes.
Wireless Access Point (WAP) is a device that connects wireless communication devices together to form a
wireless network. For a computer to be able to communicate with wireless device, it must have a wireless
network adaptor.
N.B Access Point (AP) is a wireless equivalent of a hub that receives buffers, and transmits data
Antenna is a structure made of metal rods or wires which receives and sends out radio and television signals.
NETWORK TOPOLOGY
Topology is the physical and logical arrangement of a local area network. The physical topology of a network refers
to the physical arrangement of cables, computers, and other communication devices on a network
Logical topology is the method used to pass information between workstations on a network.
Types of physical network topologies
Bus network topology Star network topology
Ring network topology Hierarchical network topology
101
Simplified “A” level ICT Departmental Notes.
Ring topology
This is a topology where all devices on the network are connected to one another to form a closed ring. Data travels
in from one device to another device around the entire ring in only one direction until it reaches its final destination.
Less secure than star network as data pass through a number of workstations before reaching its destination.
Star topology
A star topology is a type of topology where computers and other devices are connected directly to a central network
hub or switch thus forming star.
Data on a star network passes through the hub or switch before continuing to its destination
Hierarchical topology
This is a type of topology that resembles extended star topology, except that computer controls traffic instead of a hub
or a switch.
Hybrid Topology
Hybrid topology is combination of two or more different topologies (bus, star, ring, etc.).
Advantages of hybrid topology
103
Simplified “A” level ICT Departmental Notes.
Its design is difficult to understand.
The cost of this network design is high, because of requirement of lot of cables, cooling systems, etc.
MAU (Multi-station Access Unit) is required.
It is expensive to install and maintain
Tree topology
A tree topology is a type of network topology that has combined characteristics of bus and star topologies; it consists
of groups of star-configured workstations connected to a bus backbone cable.
Tree topologies allow for the expansion of an existing network
Mesh topology
This is a network where each device has its own connections to all other devices on the network. It provides each
device with a point-to-point connection to every other device in the network. Data sent on a mesh network can take
any of the several paths from the source to the destination.
104
Simplified “A” level ICT Departmental Notes.
Summary of physical types of topologies
Ethernet
Ethernet is a type of local area network technology that uses coaxial cable or special grades of twisted pair wires.
Ethernet is also used in wireless LANs.
Token Ring
A Token is a special packet that contains data and acts as a messenger/carrier between each computer and device on a
ring topology.
Each computer must wait for the token to stop at its node before it can send data over the network so as to avoid
collision of data packets on the network.
Packet switching
This involves breaking the data into individual segments known as packets which are transmitted individually and
then re-assembled when they reach the destination computer.
Circuit switching
Circuit switching is a method of communicating in which a dedicated communication path referred to as a circuit is
established between two devices before communication takes place.
Each circuit that is dedicated cannot be used by others on the network until the circuit is released and a new
connection is set up. The telephone system uses circuit switching.
CHARACTERISTICS OF INTERNET
It is made up of numerous networks worldwide.
There is No organization that has a direct control over the Internet.
It is dynamic; ever changing.
It offers very many services
The Internet size and technology is growing at a very faster rate.
It is not owned by any single organization (has no central control.
Internet has facilitated social networking that is the sharing of information to people across the world. Any
job vacancy, emergency news, ideas etc. can be shared in the social networking websites such as Face book,
what saps, twitter etc
As far as learning is concern, internet has now become a part of education in the sense that online studies, e-
library, uploading educational information’s, and research can easily be carried out using internet.
All business deals can be carried in the internet like transaction of money that is e-money, online
reservations, online ticket booking for movie, online shopping, advertising for goods and services.
Internet leads to the loss of information that is information crucial to us or any important files can be easily
taken by the hackers.
Internet offers high possibility for the fraudulent people to easily access personal details such as names,
address, credit card number etc
Networked computers connected to internet are susceptible to virus attack leading the crushing of the hard
disk and alternate the normal behaviors of the computer.
Internet allows anybody to access and down unnecessary materials and pornographic photos and films hence
leading to moral degeneration in the society
Internet had led to social disconnecting in the society that is reduction into face to face interaction for
example the use of social media such as face book, what sap, twitter etc.
Internet has also led to the distribution of unwanted bulky e-mails (spamming)
Learning is fun and easy as internet is exciting due to the multimedia content used.
It offers different sources of information hence a variety of opinions on a topic.
It is a quick way of getting information where internet connection is good.
It encourages group work through collaboration therefore sharing of information and experience among
students and teachers.
Related topics are easily accessible through hyperlinks.
Students are able to attend virtual classes.
Different skills such as typing, use of web browsers, problem solving, E-mail are developed through the use
of the Internet.
Instant or timely communication is done by use of the E-mail system.
Shopping for item such as books is made easy and less expensive.
INTERNET PROTOCOLS
The Internet Protocol (IP) is a standard set of rules for sending and receiving data from one computer to another on
the internet. For a Host computer to be recognized by other devices, it must have an internet protocol address.
Internet protocol (IP) address is a number that uniquely identifies each compute on the internet. IP address consists of
four groups of number, each separated by periods e.g. 192.168.5.6. The first three values that 192.168.5 usually
identifies the network and the last value that 6 represent the specific computer
Examples of internet protocols
Transmission communication protocol/internet protocol (TCP/IP)
Hypertext transfer protocol (HTTP)
File transfer protocol (FTP)
Dial-up (DUN)
This is a connection method where the client must request for a connection to the ISP server each time he wishes to
109
Simplified “A” level ICT Departmental Notes.
access the Internet.
Leased line
This is where there is a permanent connection between the user and the ISP at a fixed fee. This connection normally
uses digital subscriber line (DSL) technology
Cable modem
A cable modem is a type of modem that provides access to a data signal sent over the cable television infrastructure.
Broadband Internet access
Broadband Internet access (broadband) is high-speed Internet access.
Bandwidth
Bandwidth is the amount of Data that can be transmitted along a communication channel in a given time (per second)
which is measured in bits per second.
Bit rate
Bit rate is the speed at which a particular transmission is taking place. It is measured in bits per second (bit/s or bps)
and represents the actual speed of transfer of data.
Electronic Mail is a method of exchanging messages between people with E- mail addresses using computer and
other electronic devices.
In order for any two users to receive or exchange E-mail messages online, they must have E- mail addresses.
E-mail address is a set of characters such as letters, number, symbols etc that are required to send and receive emails.
World wide web (WWW)
The World Wide Web (WWW) is an information space where all the Web pages, pictures, videos and other online
content can be accessed via a Web browser. Web resources are identified by Uniform Resource Locators (URLs),
Chat rooms
A chat room is an online service that permits users to chat (converse) with each other through the internet by
typing and sending lines of text using the computer.
To start a chat session, a user must connect to a chat server through a chat program on his or her computer. Some chat
rooms require a username and password in order to log in or join a conversation.
Mailing lists
110
Simplified “A” level ICT Departmental Notes.
A mailing list is a collection of names and addresses used to send material to multiple recipients. Mailing lists are
used as a means to share content with subscribers whereby once a message is sent to a mailing list, every person in
the list will receive a copy of the message.
Instant messaging (IM)
Instant messaging (IM) is a type of online chat that offers real-time text transmission over the Internet
between two parties.
Internet Relay Chat (IRC) is a text based communication system that allow people to chat with one another on
the Internet within the chart room. It allows people within the same chart room to send and receive instant message
News group
A newsgroup (discussion group} is an online discussion forum about a particular subject. To participate in a
discussion, a user sends a message to the news group and other users in the news group read and reply to
the message.
Internet forum (Message board)
An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of
posted messages. .
Voice over internet protocol (VoIP)
This is a technology for sending and receiving voice messages over Internet .
Usenet
Usenet is a collection of newsgroups where the users can post messages and these posted messages are distributed via
Usenet servers. Each server holds the posted messages for a certain period of time which is also known as retention
time.
Video conferencing
Video conferencing (or video conference) is a mean of conducting avideo discussion using a set of
telecommunication technologies between two or more participants at different locations by using Internet. Each
participant has a video camera, microphone, and speakers mounted on his or her computer.
Telnet
Telnet is a protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented
communication facility using a virtual terminal connection.
Electronic commerce (e-commerce)
E-commerce (electronic commerce or EC) is an online buying and selling of goods and services using internet.
Examples of transactions conducted online
Online shopping
Online banking
Advantages of e – commerce
It operates 24 hours a day hence transactions can be conducted at any time.
Information about a product can be changed and be available quickly (i.e. it is easy to update)
It gives immediate feedback
Allows manufacturers to buy and sell directly hence avoiding the cost of middlemen.
Customers can easily compare prices.
It allows business to gather customer information, analyze it and react appropriately.
Businesses have access to millions of people with internet connections.
It widens the market easily. It can work globally hence saving time for participants on both ends.
Distribution costs for information is reduced or completely eliminated.
111
Simplified “A” level ICT Departmental Notes.
Social network
This is a dedicated website which enables users to chat, post comments, and share files online by using social media
such as face book, Twitter, . Instagram, WhatsApp, etc.
. Internet banking (e-banking)
Internet banking/electronic baking or online banking is a method used to enable the customers to have easy and safe
access to the bank account in order to carry out online transaction services via the Internet.
Search engine is a service that allows Internet users to search for content via the World Wide Web (WWW). A user
enters keywords or key phrases into a search engine and receives a list of Web content results in the form of websites,
images, videos or other online data.
The most popular and well-known search engine is Google. Other popular search engines include AOL, Ask.com,
Baidu, Bing and Yahoo.
A wiki is a website that allows multiple users to create, modify and organize web page content in a collaborative
manner via their web browsers. Wiki documents can be modified by anyone with access to the website. Examples of
a wiki is the Wikipedia
A blog is a website where users post entries that are displayed in reverse chronological order, with the most recent
posting at the top of the page. Blogs can take the form of online diaries, news columns and reports from special
events.
Discussion boards
A discussion board is a discussion forum (online forum) which allows members to hold discussion online about a
particular topic. Discussion is started by one member posting a topic and other members of the same group begin to
reply by sharing information and ideas.
Portals.
A Web portal is a specially designed website that brings information from diverse sources, like emails, online forums
and search engines, together in a uniform way. Examples of portals include; UNEB portal etc.
Podcasts.
A podcast, or generically net cast, is an episodic series of digital audio or video files which a user can listen to. It is
often available for subscription, streaming rather than downloading.
E- Libraries
E-Library /Digital Library is a special library with a collection of digital objects that can include textbooks, visual
material, audio material, video material, stored as electronic media formats as opposed to print, or other media.
Electronic waste (e-waste)
Electronic waste is a term abbreviated as "E-Waste” refers to the disposal of broken or obsolete electrical and
electronic equipments (EEE) and its parts that have been discarded by the owner as waste without the intention of re-
use such as televisions, stereos, copiers and fax machines.
Netiquette
112
Simplified “A” level ICT Departmental Notes.
Netiquette is a short form of network etiquette or Internet etiquette and its defined as a set of rules for acceptable
online behavior. Similarly, online ethics focuses on the acceptable use of online resources.
In general, netiquette is the set of professional and social etiquettes practiced and advocated in electronic
communication over any computer network. Common guidelines include being courteous and precise, and avoiding
cyber-bullying. Netiquette also dictates that users should obey copyright laws and avoid overusing emoticons.
Rules of netiquette
Keep messages brief. Use proper grammar, spelling and punctuation.
Be careful when using sarcasm and humor as it might be misinterpreted.
Be polite. Avoid offensive language.
Read the message before you send it.
Use meaningful subject lines
Avoid sending or posting flames, which are abusive or insulting messages.
Avoid sending spam, which is the internet‘s version of junk mail.
Do not use all capital letters which is equivalent to SHOUTING!
Read the FAQ (Frequently Asked Questions), if one exists. Many news groups and web pages have a
FAQ.
Do not assume material is accurate or up-to-date. Be forgiving of other’s mistakes.
Never read someone’s-mails.
Electronic mail (e-mail)
Electronic Mail is a method of exchanging messages between people using electronic devices. In order for any two
users to receive or exchange E-mail messages online, they must have E- mail addresses. E-mail address is a set of
characters such as letters, number, symbols etc that are required to send and receive emails
E – Mail address
An email address is a set of characters that are required to send and receive emails
Parts of an email address
Email address consist of four parts;
Consider this email address: [email protected]
1. Username: kalemageoffrey
2. @: at
3. Domain name: Gmail
4. Top level domain: com
Username:
A username is a name that uniquely identifies someone’s account on the email server that handles the email.
@:
It separates username or account name from the name of the mail server.
Domain name:
It consists of Email server name (Gmail) that comes after the @ symbol in an email address
A top level domain:
A top level domain refers to the last segment of a domain name, or the part that follows immediately after the "dot"
symbol. It’s usually a three letter extension which shows the type of a particular organization.
Examples of top level domain names
Top-level domain name Purpose of host
.com a business or commercial enterprise (trying to make money)
.ac an academic institution or a university
.edu host is an educational institution
.org a non-commercial organization
.mil Military
.net for network(ISP)
113
Simplified “A” level ICT Departmental Notes.
.gov Government
Country-codes Country
.ca Canada
.au Australia
.nz New Zealand
.ug Uganda
.uk United Kingdom
.za South Africa
Sending and receiving of an email
To send and receive emails, both the sender and the recipient must have the right tools.
An internet connection
An email address
An email client
Email client is software that runs on a personal computer and relies on an internet connection to perform some
of its operations.
It works with ISP (Internet Service Provider) that uses standard internet email protocols that make i possible for
people using different email client software to communicate with one another.
Email message
An email message is a text, typically brief and informal, that is sent or received over a computer network including
attachments (such as image files and spreadsheets). Email message can be sent to multiple recipients at the same time.
Email message comprises of the 3 parts, these are:-
1. Message Header
2. Message Body
3. Message Envelope
Message Headers
The message headers contain information concerning the sender and recipients. The exact content of mail headers can
vary depending on the email system that generated the message. Generally, headers contain the following
information:
From: Contains the E-mail address and the actual name of the sender of the e-mail message.
To: Contains the E-mail address and the actual name of the recipient of the e-mail message
Date: Contains the date and time when the E-mail message is sent.
Cc: Carbon Copy
Contains another E-mail address (es) of recipients to whom the same copy of the E- mail message is
being sent.
The recipients of such an E-mail are able to view the e-mail addresses of all the other recipients who
have received the same mail.
Bcc: Blind Carbon Copy
Contains another E-mail address (es) of recipients to whom the same copy of the E- mail message is
being sent.
But the recipients of such an E-mail are not able to view the e-mail addresses of all the other recipients who
have received the same mail.
Subject: Contains the main theme/topic/content of the mail message.
Message Body
The email body is the main part of an email message. It contains the message's text, images and other data (such as
attachments)
The message body must include salutation, the actual message, complimentary close, and a signature or automatically
generated text that is inserted by the sender's email system.
Message Envelope
When email is handed over from the sending computer to the receiving computer the sending computer declares a
sender address (the “envelope-from", which is the address that bounce messages will go to if delivery fails at a later
114
Simplified “A” level ICT Departmental Notes.
stage) and one or more recipient addresses ("envelope-to").
Notice: For one to create email address and access to e-mail via the Web, he or she is required to enter a
username and a password.
A username is a name that uniquely identifies someone account on the email server that handles the email.
A password is a private combination of characters associated with the user name that allows access to
certain computer resources or to a network. The password helps ensure that unauthorized users do not
access the computer.
Characteristics of a good password
Should be easy to remember but not too obvious.
Should be longer, at least eight characters.
Should have a combination of mixed case letters and digits.
Should be easy to type without looking at the keyboard.
Avoid the followings with a password
Using your name, birthday, ID card number or telephone number.
A password of all digits or all the same letter.
Safeguarding your password
Do not share your password with others
Do not write down your password
Change your password frequently
Advantages of email
It is very quick to communicate quickly with anyone on the Internet.
It is a cheap means of transferring files.
Other computer files can be attached to the email.
Records and copies are kept automatically online.
Can be picked up anywhere in the world.
Can be sent at any time to its destination (it works24-7)
You can deal with your email at a convenient time.
You can send letters, notes, files, data, or reports all using the same techniques.
Disadvantages of an email
A computer and other hardware such as a modem are required hence expensive
It is not secure
It is easy to get on junk (useless) mail lists.
Email isn't necessarily private. Since messages are passed from one system to another, and
sometimes through several systems or networks, there are many opportunities for someone to
intercept or read email
Some email systems can send or receive text files only.
It's possible to forge email. This is not common, but it is possible to forge the address of the sender. You
may want to take steps to confirm the source of some email you receive.
It's difficult to express emotion using email. The recipient doesn't have the benefit of seeing your facial
expressions or hearing your voice.
In case of any error in the address, email cannot be delivered.
Email consumes a lot of time hence promoting laziness
Parcels cannot be delivered via email which limit its usability
A webpage
A web page is an electronic document or files of information stored on the web /website that contain text, animations,
audio, and video (i.e. multimedia elements), as well as hyperlinks to other documents.
A web server
A web server is a computer that keeps and delivers web pages requested by users.
A webmaster
A web master is an individual person responsible for creating, managing and developing web pages and maintaining a
website.
Hyperlinks
These are built-in links to other related documents, allowing users to quickly navigate from one document to
another when clicked
Hyper text
Hypertext is a web page that has hyperlinks to other WebPages program used to access and view web pages.
Homepage
Home page is the first page (starting page) or the table of contents of a website. Web publishing software
Web publishing software is specially software designed for creating web pages that contain text and
multimedia elements. Examples include: Microsoft FrontPage, Macromedia Dreamweaver, Adobe Go Live,
Adobe Page mill etc.
Domain name
A domain name is one that represents an IP address of a computer on the network. It identifies the organization or
group on the internet.
An example; www.bbc.co.uk
The domain is separated into four parts just like the IP address. A user normally finds it easier to use a domain name
instead of an IP address to access the internet, but the internet protocol only understands IP addresses so the domain
name must be translated(resolved) into an IP address by the DNS server (domain name system)
SEARCH ENGINES
A search engine is software that allows one to search for web pages on the WWW.
A user enters keywords or key phrases into a search engine and receives a list of Web content
118
Simplified “A” level ICT Departmental Notes.
Objectivity
What is the purpose of information?
What do the authors want to accomplish?
Does this purpose affect the presentation?
Is the information fact, opinion, spoof, or satirical?
Currency
Is the information current (up to date)?
Is it still valid?
When the site was last updated?
Is the site well-maintained?
119
Simplified “A” level ICT Departmental Notes.
Coverage
Is the information relevant to your topic and assignment?
What is the intended audience?
Is the material presented at an appropriate level?
Is the information complete?
A WEBSITE
A web site is a collection of web pages where information of a particular organization or company is stored.
Basic Types of Websites
News websites E- Commerce website
Informational websites Mobile device websites
Online Business / marketing websites Blogs
Wikis Personal websites
Online social networks Photo sharing websites
Educational websites
TOPIC 13:
SYSTEM SECURITY, PRIVACY AND ICT ETHICAL ISSUES AND EMERGING TECHNOLOGIES
Computer security system
Computer system security is the ability of a computer system to protect information and system resources with
regards to confidentiality and integrity. It refers to all processes and mechanisms by which computer based
equipment, information and services are protected from unauthorized access or destruction including unplanned
events and disasters.
Forms of computer security system
There are two forms or categories of computer security systems;
Physical security
Data security
Physical security; is the protection of personal programs, networks and data from physical circumstances and events
that could lead to damage. The protection includes protection from fire, natural disasters, buglers, theft, vandalism
and terrorism.
In order to protect the physical equipment, the following physical security access control measures must be put in
place;
Use physical access controls such as locked doors and windows.
Use cables to lock the equipment to desk, cabinet or floor.
Install alarm systems to warn you in case of any intrusion
Use passwords, and biometric devices.
Install surveillance cameras to help you in easy monitoring of the hardware
Putting up strong burglar poof doors and windows to avoid thieves
Ensure that fire extinguisher is fixed in the computer lab in case of any emergency fire outbreak
121
Simplified “A” level ICT Departmental Notes.
unauthorized users. For data protection to be ensured the user must employ both hardware and software based
security mechanisms such as;
Keep a copy of your data off site in case of any firebreak.
Make regular backups of critical data. A backup: is a duplicate of a file, program or disk that can be used if
the original is lost, damaged or destroyed
Protect data files by using password mechanism
Install intrusion detection software to provide extra protection against hackers and other intruders.
Use data masking. Data masking is the process of obscuring a specific data within a database table to ensure
that data is maintain and sensitive information is not exposed to unauthorized user.
Install reliable antivirus programs on your computer system and update it regularly.
You can use steganography program to hide data inside another data.
Use encryption mechanism. Encryption is the process of transforming plain text or data into cipher
(unreadable) text that cannot be read by anyone other than the sender and the receiver. It is a process of
covering readable data into unreadable characters to prevent unauthorized access.
Install a firewall-The key defense against Internet attackers is an Internet firewall.
Avoid e-mail Attachments from Unknown Sources.
Avoid booting computers from infected floppies.
Avoid downloading programs from unknown/unlicensed sources.
This is a software program that monitors all incoming and outgoing network traffic and allows only the connections
that are known and trusted.
Don’t open any email attachments unless they are authored by a person or company that you trust.
Turn off your computer or disconnect from the network when not in use
Encryption involves converting data into a form that cannot be easily understood by others.
Use Biometric devices.
This is a form of identity access management and access control which uses measurable physical and behavioral
characteristics of individuals as a way of identifying them as the authentic users. Examples of biometrics that might
be used to authenticate a user include fingerprints, retinal patterns, or speech/voice.
Avoid booting computers from infected floppies.
123
Simplified “A” level ICT Departmental Notes.
COMPUTER VIRUS
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge
of the user making it to malfunction.
It is a computer program designed to damage or makes a computer to malfunctions.
Computer viruses are basically designed to carry out two tasks i.e.
To be able to replicate themselves from one computer to another
Non-resident viruses
Non resident viruses are viruses that which search quickly for other hosts that can be infected.
Resident viruses
Resident viruses are types of viruses that do not search for hosts when they are started instead they load themselves
into memory during execution.
These types of viruses’ dwell in the RAM memory. From there it can interrupt all of the operations executed by the
system: corrupting files and programs that are opened, closed, copied, renamed etc.
Examples of resident viruses;
Multipartite Viruses Polymorphic Virus
Direct Action Viruses File Infectors
Boot Virus Network Virus
Directory Virus
Macro Virus
Multipartite Viruses: Multipartite viruses are distributed through infected media and usually hide in the memory.
Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive.
Direct Action Viruses: The main purpose of this virus is to replicate and take action when it is executed. When a
specific condition is met, the virus will go into action and infect files in the directory or folder that it is in.
Boot Virus: This type of virus affects the boot sector of a hard disk. This is a crucial part of a disk, where a program
that makes it possible to boot (start) the computer are found.
Macro Virus: Macro viruses infect files that are created using certain applications or programs that contain macros.
Directory Virus: Directory viruses change the paths that indicate the location of a file. By executing a program
which has been infected by a virus, you are unknowingly running the virus program, while the original file and
program have been previously moved by the virus. Once infected it becomes impossible to locate the original files.
Polymorphic Virus: Polymorphic viruses encrypt or encode themselves in a different way (using different
algorithms and encryption keys) every time they infect a system.
Network Virus: Network viruses rapidly spread through a Local Network Area (LAN), and sometimes throughout
the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders.
SOURCES OF COMPUTER VIRUS
1. Fake games
2. Through use of contaminated disks on several computers.
3. Through using pirated software.
4. Through using freeware and shareware from the internet. since these are free, they are good grounds for
distributing viruses. They also in most cases contain bugs which may turn into viruses unintentionally
5. Through software updates most especially over the internet or other networks.
6. Through sharing of data in a network.
124
Simplified “A” level ICT Departmental Notes.
IT CODES OF CONDUCT
Codes of conduct are written guidelines that help to determine whether a specific action is ethical or unethical.
128
Simplified “A” level ICT Departmental Notes.
It also includes other types of rights, such as trade secrets, publicity rights, moral rights, and rights against unfair
competition.
Types of Intellectual Property
Copyright
Copyright is a legal term used to describe the rights that creators have over their literary and artistic works. Works
covered by copyright range from books, music, paintings, sculpture and films, to computer programs, databases,
advertisements, maps and technical drawings.
Patents
A patent is an exclusive right granted for an invention. Generally speaking, a patent provides the patent owner with
the right to decide how - or whether - the invention can be used by others. In exchange for this right, the patent owner
makes technical information about the invention publicly available in the published patent document.
Trademarks
A trademark is a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises.
Trademarks date back to ancient times when artisans used to put their signature or "mark" on their products.
A cookie is a small text file that a Web server stores on your computer that allows a site to track the actions of its
visitors. E-commerce, Webcasting, and other Web applications often rely on cookies to identify users and track
information about viewers, customers, and subscribers.
A cookie resides on an individual’s hard drive, but does not interact with other information stored on the system.
MEANING OF EMERGING TECHNOLOGIES
These technologies are generally new but include older technologies that are still controversial. Prediction suggest
that with the rapid advancements in information and communication technology more new technologies and
computer related devices are emerging up which will bring a lot of impacts in all aspects of life.
Lists of Emerging Technologies
Artificial intelligence
Artificial Intelligence is a group of related technologies that attempt to develop machines to emulate human like
learning, reasoning, communicating, seeing and hearing.
Three Dimensional (3D) optical storage media
This is a form of optical data storage in which data and information can be written, read and recorded with three
dimensional resolutions opposed by two dimensional resolution media such as CD and DVD.
Fourth generation (4G0 cellular communication
4G cellular communication is a system that provides mobile ultra-broad band internet access to laptops, USB wireless
modems, smart phones, and to other mobile devices. It is a successor of 3G cellular communication.
129
Simplified “A” level ICT Departmental Notes.
Radio Frequency identification
Radiofrequency identification is the use of a wireless non-contact system that uses radio frequency electromagnetic
fields to transfer from a tag attached to an object for the purpose of automatic identification and tracking.
Three Dimensional (3D) printing
3D printing is a combined system with Internet technology allow for digital blueprints of virtually material products
to be sent instantly to another person to be produced on the spot, making purchasing a product online immediately.
Distributed ledger technology
Distributed ledger is a technology which provides transparent and immutable lists autonomous transactions through
the use of smart contracts. A smart contract is a vending machine that holds goods until money has been received and
then the goods are released to the buyer. The machine holds the property and is able to enforce the contract. There
were two main issues that needed to be addressed before smart contracts could be used in the real world. The first one
is the control of physical assets by smart contract to be able to enforce agreements. Secondly, the last of trustworthy
computers that is reliable and trusted to execute the contract between two or more parties.
Application areas of Emerging technologies
The use of mobile phones allows transfer or transaction of money from any bank or credit line and vice versa.
The application of Radio Frequency identification in the area of identification and tracking of assets use by
many legal firms
One of the most common applications of car phones is in charging iPhones and other tablets freeing many
people from the worry of charring their devices.
The application of digital forensics in criminal investigation before a criminal is presented before the court of
law.
The application of smart contract machine for holding goods until money has been received and then the
goods are released to the buyer by business companies.
ADVANTAGES OF EMERGING TECHNOLOGIES
It has become pretty easy to get access to relevant information at anytime and anywhere. This has been possible
because of modern technologies like broadband internet.
Lots of data is being published and indexed online, sites like Wikipedia and YouTube have great original content that
is regularly used for research or entertainment.
With smart gadgets like the iPod, iPhone, Galaxy tablets, etc., users can easily have access to a vast amount of
information wherever they are through the use of the internet.
Today, it is simple to start a business while at home. On this platform, creative developers post projects to
seek funding from the community; this helps them generate capital for their ideas which later leads to the creation of
new jobs and further innovation of technology.
Improved Communication
Modern technology has blessed us with advanced communication technology tools. These include e-fax, electronic
mail, mobile phones, video conferencing, instant text messaging applications, social networking, etc.
Modern transportation technology makes it very easy to travel long distances. Transport is a very important both in
our lives and in the business world. Transportation technology has evolved with years. Improved Housing and
Lifestyle
130
Simplified “A” level ICT Departmental Notes.
New architectural technology has improved the kinds of home we build. People with money can afford floating
homes, and glass homes, mobile homes. Most of the items in our houses are now automated, for example, doors use
fingerprints, key cards, or Bluetooth on our mobile.
Improved Entertainment
Modern technology has played a significant role in changing the entertainment industry. Home entertainment has
improved with the invention of video games, advance music systems and visual systems like smart televisions, robot.
Modern technology has helped businesses increase production. Humans are slow, and sometimes they fail to deliver
on time and quality. Many companies have integrated modern technology in their production line, increasing output
and allowing for more consistent quality.
Convenience in Education
Modern technology has made it simple for students to learn from anywhere through online education and mobile
education. Also, students now use modern technology in classrooms to learn more effectively. Social Networking
Modern technology has made it simple to discover our old friends and also discover new people to network with; this
is a benefit to both individuals and businesses. Many businesses have embraced social networking technology to
interact with their customers.
Today most hospitals have implemented modern technology in surgical rooms, and this has reduced mistakes made
by doctors. Humans can easily make mistakes because of work overload and stress factors. Additionally, health apps
emerged that enable us to monitor our health, weight or fitness.
Increased Loneliness
Social Isolation is on the increase, people are spending more time playing video games, learning how to use new
modern technologies, using social networks and they neglect their real life. Technology has replaced our old way of
interacting. If a user can easily interact with 100 friends online, they will feel no need to go out to make new friends
which at a later stage can lead to loneliness.
Job Loss
Modern technology has replaced many human jobs; robots are doing the jobs which used to be done by humans.
Many packing firms have employed robots on production lines to increase production and efficiency but it is bad
news for employees because they may become redundant.
Excessive dependency:
Increased dependencies on modern tools and applications like calculators and spelling checkers have reduced
creativity. This affected the way we use our brains. Also depending on machines and modern transportation put
people at a distinct disadvantage, because they became less self – reliant.
Security
131
Simplified “A” level ICT Departmental Notes.
Due to the network of worldwide devices and systems, many have fallen prey to an identity thief, hacked accounts by
some mischievous hacker.
Modern technology has been the main aid in the increasing of endless wars. It aids the manufacturing of modern war
weapons. So when these weapons get into the hands of criminals, they will use them for their selfish reasons. To add,
these weapons often severely damage the natural earth, making some areas uninhabitable.
It is expensive to buy technology, but it is also costly to maintain it. Many small businesses cannot afford the cost of
hiring a full-time technical person, so they resort to monthly tech contractors who charge them for work done.
DIGITAL FORENSICS
Digital forensics, is a branch of forensic science encompassing the recovery and investigation of material found in
digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym
for computer forensics but has expanded to cover investigation of all devices capable of storing digital data.
132
Simplified “A” level ICT Departmental Notes.
Database forensics
It is a branch of digital forensics relating to the forensic study of databases and their metadata. Investigations use
database contents, log files and in-RAM data to recover relevant information.
Advantages of Digital forensics
133
Simplified “A” level ICT Departmental Notes.
Software developer is a person who is skilled in software development and technical operation of computer
hardware.
Responsibilities
Developing system and application software
Developing user and technical documentations for the new software.
Maintaining and updating the software to meet day to day requirements while overcoming
challenges.
Computer Engineer
Computer engineer is a technical person with skills and knowledge of designing and developing computer
components such as storage devices, motherboards, and other electronic components.
Responsibilities
Determine the electrical power requirement of each computer component.
Re – engineer computer components to enhance its functionality and efficiency.
Design and develop engineering and manufacturing computer controlled devices such asrobots.
Information Systems Manager
Responsibilities
He controls, plans, staffs, schedules and monitors all the activities of the ICT department in the
organization.
Test the impact that an alternative course of action might have on the business.
Ensures that all tasks in the IT department are done correctly and on time in order to support business
planning, control and decision making process.
Prepares budgets for the ICT department.
Keeps the department‘s inventory records up-to-date.
Managing the human resource within the ICT department.
Database Administrators(DBA)
Responsibilities
Designing and developing database applications for the organization.
Setting up security measures needed to control access to data and information.
Keeping the database up-to-date by adding new records, modifying or deleting unnecessary records.
Computer Trainer/Instructor/Teacher
Due to the dynamic nature of computers and information technology, there is a high demand for qualified ICT
trainers.
Responsibilities
Training people on how to use a computer and various application programs.
Developing training reference materials
Guiding learners on how to acquire knowledge through carrying out research.
Advising the learners on the best career opportunities in the broad field of ICT.
Preparing learners for ICT examinations.
Website Administrator /Webmaster
Responsibilities
Developing and testing websites
Maintaining, updating and modifying information on the websites to meet new demands by the
users.
Monitoring the access and use of internet connection by enforcing security measures.
Downloading information needed by an organization or institution from the internet websites.
Computer Graphics Designer
This is a professional responsible who creates either graphics or 3D animations for software programs, games, movies
by etc. This person must have a good understanding of graphic software such as Adobe Photoshop, Adobe Illustrator,
etc
Network Administrator
134
Simplified “A” level ICT Departmental Notes.
This is a professional person responsible for designing, setting up and maintaining a network
Responsibilities
Monitoring the network resources
Troubleshooting network related problems
Secretary
A secretary is a person who uses computers to keep all the necessary information instead of keeping paper
files. He creates documents and keeps them.
“TECHNOLOGY THE WAY TO GO”!
BE YOUR BEST
135