Computer Notes
Computer Notes
Computer Notes
NOTES
INTRODUCTION TO COMPUTERS
Chapter outline
1.1 Introduction.
1.2 Parts of a computer.
1.3 Classification of computers.
1.4 Development of computers.
1.5 Areas where computers are used.
1. 6 The computer laboratory. 1.7 Practical hands on skills.
1.1
Introduction
In the past, people have used slow and unreliable methods to generate, send,
receive and store information. However, today millions of people are using devices
called computers to produce, share and store information. Before embarking on
taking Computer Studies as a course, it will be necessary to ask the question: What
is a computer?
Definition of a computer
A computer is an electronic device that accepts user input also referred to as
data and transforms it under the influence of sets of special instructions called
programs to produce the desired output referred to as information.
Data can be defined as raw facts that do not have much meaning to the user and
may include: numbers, letters and symbols. Information is the processed data that
is meaningful to the user. The computer is said to be electronic because it utilizes
small electrical signals to process information.
Before 20th century, most information processing was done manually or by use of
simple machines. Today, millions of people are using computers
In offices and at home to produce and store useful information about all Aspects of
business, scientific research, government activities and Personal details. Together
with other telecommunication facilities, computers have also become the fastest
1
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
and most reliable means of communication. The integration of computers and,
telecommunication facilities for the purpose of communication is what is referred
to as information and communication technology (lCT).Computers come in
different sizes and designs but the most common is a computer referred to as a
personal computer (PC). Personal computers are mostly used in offices, schools,
business premises and at home.
1.2
Parts of a computer
A computer is made up of a collection of different components
that are interconnected together in order to function as a single
entity. A computer is basically made up of a system unit and
other devices convicted to the system unit called peripheral
devices. Examples of peripheral devices include; the monitor,
the keyboard and the mouse.
Peripheral devices
Peripheral devices are connected to the system unit using special cables called data
interface cables that carry data and information to and from the devices. The
cables are attached to the system unit using connectors called ports. .
Peripheral. Devices may be arranged as shown in Figure 1.1 with the monitor
resting on top of the system unit. Sometimes, the system unit may be made to stand
alone (tower style) as the one in Figure 1.2.
2
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The keyboard
It is the most common device that enables the user to enter data and instructions in
the computer by pressing its keys.
The mouse
It is a device that enables the user to issue instructions to the computer
By controlling a special mouse pointer displayed on the screen.
The monitor
The computer monitor or simply the screen is a television like device used for
displaying output. It is called a monitor because it enables the user to monitor or
see what is going on in the computer.
1.3
Classification of computers
Computers can be categorised according to:
1. Physical size and processing power.
2. Purpose.
3. Functionality.
Classification according to physical size and processing power
Computers can be classified into four main groups namely supercomputers,
mainframe computers, minicomputers and microcomputers.
Supercomputers
They are the fastest, largest, most expensive and powerful computers available.
They are able to perform many complex calculations in a fraction of a second.
Because of their extreme weight, a supercomputer is kept in a special room. Due to
their huge processing power supercomputers generate a lot of heat. Special cooling
systems are therefore required. Sometimes the whole CPU is immersed in an
aquarium like tank containing liquid fluorocarbon to provide
cooling.
Supercomputers are mainly used for scientific research, which requires enormous
calculations. Applications that justify use of supercomputers include aerodynamic
design and simulation, petroleum research, defense and weapon analysis among
others. Supercomputers are mainly found in developed countries such as in USA
where they are used for advanced
3
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Scientific research such as nuclear physics. Figure 1.3 shows an example of
supercomputer.
Mainframe computers
They are less powerful and less expensive than the supercomputers. While
supercomputers may be described as giant computers, the mainframes are said to
be big in size. They are used for processing data and performing complex
mathematical calculations. They have a large storage capacity and can support a
variety of peripherals.
Minicomputers
A minicomputer resembles the mainframe but is slightly smaller. Thus it is referred
to as a small-scale mainframe computer. Although it supports fewer peripheral
devices and is not as powerful and fast as the mainframe computer, it was
developed as a cheaper alternative to the mainframes for smaller organizations.
They are used mainly in scientific laboratories, research institutions, engineering
plants and places where processing automation is required. They are well adapted
for functions such as accounting, word processing, database management and
specific industry applications. Figure 1.5 shows a picture of a
minicomputer.
Microcomputer
A microcomputer is the smallest, cheapest and relatively least powerful type of
computer. It is called a microcomputer because; its CPU is called a
microprocessor, which is very small compared to that of a mini, mainframe or
supercomputers. Microcomputers are also called personal computers (PC) because
they are designed to be used by one person at a time.
4
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Microcomputers are commonly used in training and learning institutions, small
business enterprises, and communication centers among others. Today, the power
of microcomputers has grown tremendously closing the gap that formerly existed
and reserved for the minicomputers and the mainframes.
Technological advancement has seen the development of smaller and smaller
microcomputers. The following are the various types of microcomputers in
operation today arranged in descending order according to size.
1. The desktop computer
-Not portable. It is designed to be placed on Top of an office desk.
2. The laptop computer
-Portable like a briefcase. It is designed to be used by placing it on the lap hence its
name.
3. The palmtop e.g. personal digital assistant (PDA)
- Small enough to fit in the pocket and can he held in the palm when being used.
General-purpose computers
General-purpose computers have been designed to be able to perform a variety of
tasks when loaded with appropriate programs. They are the most common types of
computers in use today. Their flexibility enables them to be applied in a wide range
of applications like document processing, performing calculations, accounting,
data and information management among others.
Digital computers
Digital computers process digital data only. Any data to be manipulated by a
digital computer must first be converted to digital form. Most home appliances
today are also digital in nature. For example to increase the volume of a digital
television you simply press a button and it changes from 1 to 2, 3 If the same
television is analog, it would have a knob
that you can continuously turn round or slide in a slot to increase or decrease the
volume.
Analog computers
This refers to computers that process data that is analog in nature. Analog
computers solve problems by measuring the amount of change that occurs in
quantities like speed, temperature and pressure. An analog machine is usually a
special purpose device that is dedicated to a single task. Analog computers are
used in manufacturing process control like monitoring and regulating furnace,
temperatures, and pressures. They are also used in other applications like in
weather stations to record and process physical quantities e.g. wind, cloud
speed, temperature etc.
Hybrid computers
Hybrid computers are designed to process both analog and digital data.
1.4 Development of computers
Before 1900, most data processing was done manually using simple tools like
stones and sticks to count and keep records. Around 2000 years ago, Asian
merchants came up with a special calculating tool called abacus that could be used
to calculate large figures. Abacii, are still in use even today. An abacus is made up
of a rectangular frame and a crossbar at the middle. It is fitted with wires or strings
running across from the frame to the crossbar as shown in Figure 1.8.
6
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
, 1+5=6
Each bead has a value of 5
Crossbar
Each bead has a value of 1 4+5=90+0=0
3+5=8
Fig. 1.8: Representing numbers using an abacus
The first machine after the abacus that is usually regarded as the forerunner of
modem computers was developed by an English mathematician called Charles
Babbage and was named the analytical engine. After the death of Babbage in 1871
there was little improvement on his work until the 1930s. The first computer-like
machine Mark 1 was designed by Professor Howard Aken of Horrard University in
1939. Mark 1 became operational in 1943. It weighed 5 tons and was 16 m long.
Since then, rapid advancements in computing have been realized and can be
categorised into five generations.
7
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Third generation computers (1964 -1970)
The third generation computers used electronic devices called integrated circuits
(ICs) instead of transistors. An integrated circuit consists of thousands of small
transistor circuits etched on a semiconductor called a silicon chip. The use of
integrated circuit improved the processing speed and storage capacity of
computers. Examples of third generation computers included smaller and less
expensive minicomputers such as IBM 360 and ILL 19000 series.
A lot of research is being done to try and come up with a machine that can work
without human intervention. One of the most successful developments in this field
is the advent of computers that can help managers to make decisions and those that
can offer critical expert services to users instead of relying on human professionals.
8
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
3. Computers are more efficient. A computer utilizes minimum resources, to
process data as compared to
human beings or other machines. For example computers require less effort to
process repetitive tasks. In our day to day activities, we use computers in almost
every aspect of our lives. The following are some of the areas where computers are
used.
Supermarkets
Most retail stores use computers to help in the management of daily activities like
stock control. The stock control system keeps account of what is in store, what is to
be sold and what is out of stock. The management is automatically alerted when a
particular item or items are running out of stock and need reordering.
Offices
Computers have increased efficiency in offices by reducing the time and effort
needed to access and receive information. Most modern office functions have been
automated for faster message distribution and document processing.
Banks
Special cash dispensing machines called automated teller machines (ATM s) have
enabled automation of cash deposit and withdrawal services. Efficiency has also
been increased due to better record keeping and document processing brought
about by computers.
Industries
Computers are being used to monitor and control. Industrial processes. The
computer age has seen the wide use of remote controlled devices called robots. A
robot is machine that works like a human being but performs tasks that are too
unpleasant, dangerous, or complex and tedious to assign to human beings.
Hospitals
Computers are used to keep patients records in order to provide easy access to a
patient s treatment and diagnosis history. Computerized medical devices are now
being used to get a cross sectional view of the
Patient s body that enables physicians to get proper. Diagnosis of the affected part
of the body with high levels of accuracy. Computers also control life support
machines in intensive care units (lCU).
Transport
Computers are used to monitor vehicle traffic in a busy town, aircraft navigation
and to make reservations.
Communication
9
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Integration of computers and telecommunication facilities has made message
transmission and reception to be very fast and efficient. Because of the speed with
which information can be transmitted around in the world using computers the
world is said to have become a global village.
Law enforcement agencies
Information held in computers such as fingerprints, photographs and other
identification details
helps law enforcers to carry out criminal investigations speedily.
Education
Computers are widely used in the teaching and learning process. Learning and
teaching using computers is referred to as computer-aided learning (CAL) and
computer aided teaching (CAT). For example experiments in subjects like
Chemistry or Physics may be demonstrated using a special computer programs that
can depict them on the screen through a process called simulation.
Library services
In a computerized library, a computer enables library personnel to easily access
and keep updated records of books and other library materials. Library users can
also use computers to search for titles instead of using the manual card catalogue.
10
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
users, damage of computers or lack of a conducive environment for teaching and
learning. The safety precautions and practices include:
Behavior in the computer laboratory
The following rules must be followed in and around a computer laboratory.
1. Avoid smoking or exposing computers to dust. This is because smoke and dust
contain small abrasive particles that can damage computer components and cause
wearing of moving parts.
2. Avoid carrying food and beverages to the computer room. Food may fall into the
moving parts of the computer and damage them. Liquids may spill into computer
parts causing rusting or electrical defaults.
3. Avoid unnecessary movements because you may accidentally knock down
peripheral devices.
4. At all times follow the correct procedure for starting and shutting down the
computer to avoid loss of data and damage to computer Programs.
5. Do not open up the metallic covers of computers or peripheral devices without
permission and particularly when the computers power is still on.
Cables insulation
All power cables in the computer room must be properly insulated and laid away
from busy pathways in the room. Lay them preferably along the wall in trunks.
This avoids the danger of exposing the user to electric shock and power
interruptions caused by stumbling on cables.
The UPS charges when mains power is on and has power surge and. brownout
protection capabilities. When the mains
power goes off, it gives some sound alert
(usually a beeping sound) to alert the user.
11
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The UPS performs two main functions namely:
1. It regulates power from an unstable power source to the required Clean stable
voltage by eliminating surges and brownouts.
2. It temporarily provides power to the computer in case of a sudden power failure
hence allowing the user to store his/her work and shut down the computer using
the correct procedure
To enable continuity of work even in the absence of mains power, organizations
that give critical services like banks, schools and hospitals usually install a standby
generator that automatically comes on in case of a power failure. Power from the
generator must pass through a UPS before being fed to the computer because it is
also not stable.
NB: Generally speaking, devices that provide alternative source of power are
usually referred to as power backups.
Burglar proofing
To deter unauthorized access to the computer room, it is important to implement
the following controls.
1. Fit strong metallic grills and locks on doors, windows and roof in Case the
roofing is weak.
2. Do not welcome strangers into the computer room.
3. Consider installing security alarms at strategic access points that would alert the
security
personnel in case of a break in.
Ventilation
There must be good air circulation in the computer room to avoid suffocation and
overheating. Remember that both computers and human beings emit heat energy
into the environment. Proper ventilation enables the computer to cool and hence,
avoids damage to electronic parts that can be caused By overheating. Proper
ventilation can be ensured by:
1. Ensuring that the room has enough ventilation points like windows.
2. Installing an air-conditioning system.
3. Avoiding overcrowding of either machines or people in the room.
12
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
high humidity of over 70% cause rusting of the metallic parts of the computer
system. To prevent both high and low humidity place humidifiers in the room
Lighting
a well lit computer room prevents eyestrain that eventually leads to headaches,
stress and fatigue. It is important to adjust the brightness of the computer monitor
until the eyes feel comfortable before using a computer to avoid damaging your
eyes:
fit radiation filter screens. Which are specially tinted to reduce the light that
reaches the eye. Avoid using a flickering monitor because this can cause extreme
eyestrain that can damage eyesight.
Standard furniture
The table on which a computer is placed must be strong and wide enough to bear
the weight and accommodate all the peripheral devices. The chair for the user must
be comfortable, and have a straight backrest for one to sit upright as illustrated
below to avoid muscle pains and backaches caused by poor posture. The seat must
be high enough relative to the table for comfortable use of the hands on the
keyboard and the eyes must be the same level as the top of the screen when the
user is seated
When the power is on, the computer automatically goes through a process of self-
test and preparation
for use. This process is called booting. There are two types of booting namely:
* cold booting
* warm booting.
Cold booting
This happens when the computer, originally off, is switched on by pressing the
power button of the system unit.
The computer starts by checking all its components to determine whether they are
functioning correctly and whether they are available for use. This process is called
the power-on-self-test (POST). During this process, the monitor will display
information showing the status of each device being tested. In case one of the
13
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
devices is faulty or missing, this process will halt and a message alerting the user is
displayed on the screen. The special program that directs the POST process is
When the POST process is over, the computer displays a prompt message
requesting one to start using it.
Some computers have programs that require a person to identify them selves by
providing a user name and a password (a secret word given to the user) before it
can allow one to use them. The process of providing such information is called
logging on and it is a security measure meant to deter unauthorized users from
using the computer.
NB: Some system units switch themselves off automatically when you do steps 3
(a), (b) and (c) above.
Keyboard layout
The keys on the keyboard can be categorized into five groups as shown in Figure
1.11.
14
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Alphanumeric keys
Keys are labeled with alphabetic letters A-Z, numbers arranged in a line 1,2,
……..0 respectively and symbols like:?,], % etc. This group also includes the
following keys: cap lock, enter tab. space bar and backspace.
Caps lock key: Pressing this key let's the user type in upper case-letters,(capitals)
To switch back to lower case letters simply press the same key again.
Enter key (return key): Pressing this key forces the text cursor to move to the
beginning of the next line. A cursor is a blinking underscore (-) or a vertical beam
(I) that shows where, the next character to be typed will appear. The enter key is
also used to instruct .the computer to execute a command that has been selected on
the screen.
Tab key: This key is used to move the text cursor at set intervals on the same line
e.g. 10 mm, 20 mm etc.
The space bar: This bar creates a space between words during typing.
The backspace key: This key deletes characters from right to left on the same line.
Function keys
Function keys are usually located along the top of the keyboard. They are labeled
FI, F2 up to FI2. They are used for tasks that occur frequently in various programs.
For example pressing FI key in J most programs starts the HELP MENU.
Otherwise, they can be used as cursor movement and editing keys when num lock
key is turned off. It is important to note that not all keyboards have the numeric
keypad. For example portable
Mouse skills
Mice (the plural of mouse) comes in various shapes, colors and designs. Today one
can even get a mouse that uses wireless technology that is, it does not have a
connection cable. Most mice have two buttons but some may have three. Figure
1.12 is an illustration of a mouse.
Drag and drop: This is whereby the user drags an item from one location on the
screen to another. The procedure to accomplish this operation is as follows:
17
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
COMPUTER SYSTEMS
Chapter outline
2.1 Introduction
2.2 Input devices
2.3 The central processing unit (CPU)
2.4 Output devices
2.5 Secondary (auxiliary) storage devices and media 2.6 Power and
interface cables
2.7 Basic computer setup and cabling
2.8 Computer software
2.9 Criteria for selecting a computer system
Introduction
In the previous chapter, you were introduced to some of the parts or devices that
make up a computer. However, a computer system requires more than just a
collection of devices. The term system can be defined as a collection of
independent entities that collectively work together to achieve a desired goal.
The systems approach to computing was borrowed from the social scientists who
believe that all things can be viewed as being made up of small independent
components(subsystems) that come together to form a bigger more complex
system. For example, a school can be seen as a system with the students, teachers,
accounts department and the administration as subsystems. The school system
itself is a subsystem of the ministry of education! Therefore, the term computer
system refers to a collection of entities that work together to process and manage
information using computers. It is important to note that, systems exist whether
computerized or manual. However, the computer is replacing many manual
processes hence the need to study the idea of a computer system. For example, a
document processing system in the secretary s office can be made more efficient
by computerizing it.
A computer system consists of three main components namely the hardware, the
software and the computer user (liveware). All the physical components both
mechanical and electronic that make up a computer system such as the monitor, the
system unit, keyboard and mouse etc. are called hardware. Software is a set of
computer programs that guides the computer in each and every activity that
happens inside the computer during data processing operations. Human beings by
themselves have the ability though limited, to process data and manage
information. Computers have been designed to help human beings to enhance the
efficiency of processing and managing information. It is the human being who
issues commands to a computer depending on his or her needs.
18
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The hardware elements of a computer are generally grouped into
four major categories namely input devices, central processing
unit, output devices and storage devices.
Input devices
'Data may be entered into a computer using keying devices such as the keyboard, or
using pointing devices such the mouse, or by devices that automatically capture
data from the source referred to as data capture devices e.g. scanners and digital
cameras, or by voice recognition devices such as microphones. The main purpose
of input devices is to convert the human readable data into electronic or machine
readable form.
Input devices can be classified according to how they are used to enter data. This
includes:
1. Keying devices such as the keyboard, keypad etc.
2. Pointing devices such as mouse, trackball etc.
3. Scanning and other data capture devices.
4. Speech recognition or voice input devices.
5. Touch screen, digitizer and digital cameras.
Keying devices
Pointing devices
These are the input devices that enter data or instructions by controlling a pointer
on the screen. Apart from the mouse, the other pointing devices include the
trackball, joystick and light pen.
Trackball
A trackball works just like the mouse but instead of moving it on a flat surface, a
ball fixed on its top is rolled using the index finger. As the ball rotates, it moves a
pointer on the screen; one can then click its button to execute the selected
command. Figure 2.1 shows a drawing of a trackball. The advantage of a trackball
over the mouse is that it neither requires an extra space nor a flat surface for
movement. Today some computers are coming with a track ball on top of a
keyboard and a mouse.
19
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Joystick
A joystick is an input device that looks like a car
gear lever which can be moved sideways, upwards or downwards to control the
position of the cursor. Just like the mouse, it has a button which is used for
selecting an item. It is commonly used in playing video games.
Light pen
A light pen is a hand held pen-like device that has a light sensitive point. A light
pen can make selections, place images, draw and indicate dimensions by simply
touching the screen. A light pen does not emit light 'but instead, it reacts to the
light emitted by the display using a photosensitive. detector at its base.
Scanning devices
These are devices that enter (capture) data into the computer directly. Scanners can
be classified according to the technology they use to capture data. These are
optical scanners and magnetic ink scanners.
Optical scanners
These types of scanners capture data using light. A special type of concentrated
beam of light is passed over the object, image or text which needs to be entered
into the computer. The scanner converts the data into digital form and then passes
it to the computer for processing. There are three types of optical scanners:
Magnetic scanners
These types of scanners capture data by using magnetic technology. The data being
read can either be in form of special magnetic characters or a continuous magnetic
strip. The following are some of the common examples of magnetic scanners.
Touch Screen
Touch screen input method utilises the technology of a touch sensitive screen.
When the user touches the screen, the computer detects the position of the finger
and responds accordingly. Touch screens are mostly used in public places like in
banking halls, hotels, in airports (to provide guidance information) etc.
Digitisers
21
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
A digitiser or a graphic tablet is almost similar to a light pen but instead it has a
graphic tablet on which the user writes on using a device similar to a pen, called a
stylus. (Figure 2.6). As the stylus moves on the tablet, it s drawing is directly
reflected on the screen. Digitisers are mostly used for architectural and engineering
designs.
Digital cameras
A digital camera stores its images in digital form.
These images can then be streamed (entered) directly into
a computer for editing or printing by connecting the camera to a computer using a
special cable. As with the ordinary camera, there are two types of digitals cameras:
One that can takes still images i.e. photographs and another that takes motion
pictures (video).
In order for the ALU to be able to process data, it has special temporary storage
locations called registers, which holds the data just before processing. It also holds
the results after processing.
22
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Control unit
Control unit coordinates all processing activities in the CPU as well as input,
storage and output operations. It determines which operation or instruction is to be
executed next. To coordinate these activities, the control unit uses a system clock.
The system clock sends electric signals as its means of communication, just like
the way the traffic signals or a traffic officer does in a round about or junction to
direct motorists and other road users. The number of pulses per second determines
the speed of a microprocessor. The faster the clock pulses, the faster the CPU
hence the faster the computer can process data.
Depending on permanence of the instructions or data written on it, there are four
types of read only memory namely;
Mask read only memory: Once the content is written on it by the manufacturer, it
cannot be changed.
Programmable read only memory (PROM): This allows the user to alter it only
once after the content is written on it.
Erasable programmable read only memory (EPROM): This has a transparent
quartz window through which its contents, can be erased by exposing it to ultra
violet (UV) light, and then reprogrammed for another use.
Electrically erasable programmable read only memory (EEPROM): This type of
ROM can be erased and reprogrammed using electricity. An example of EEPROM
is the memory that stores the basic input/output system (BIOS).
Characteristics of read only memory (ROM) are;
1. One can only read its content but you cannot write on it unless it is
a special type of ROM.
2. It is non-volatile i.e. its content is not lost when the computer is switched off
23
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
3. Stores permanent or semi permanent instructions from the manufacturer called
firmware. It can store semi permanent instructions because some variations of
ROM chips can be programmed according to the user s specification.
Types of RAM
There are two types of-RAM namely, static RAM (SRAM) and dynamic RAM
(DRAM). Static RAM is very fast compared to dynamic RAM and holds its content
as long as there is power. Dynamic RAM on the other hand can only hold its
content for a short while even when power is all. To maintain the content of
dynamic RAM, the memory chip is designed in a way that its content is refreshed
(automatically rewritten) severally per second. Static RAM is more expensive. It is
mostly used to make special types of memories.
Special purpose memories
Apart from ROM and RAM there are several types of special purpose memories
found insijkde the CPU or in the input and output devices. These memories are
vital because they increase the overall performance of data and instructions moving
in and out of the CPU. These memories include buffers, registers and cache
memory.
Buffers
This is a temporary holding place that may be part of the CPU or built in an input
or output device. Because the CPU is very fast compared to the input or output
devices, buffers provide temporary storage so that the CPU is set free to carry out
other activities instead of waiting for all data to be entered or information to be
output. For example since a printer cannot work at the speed of a CPU, the printer
buffers temporarily holds the output to be printed hence freeing the CPU to
perform other functions. Buffers can hold more than one piece of data at a time.
Registers
24
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
As opposed to buffers, registers hold one piece of data at a time and are inside the
CPU. Examples of registers are:
An accumulator: This temporarily holds the results of the last processing step of
the ALU.
Cache Memory
Most modem processors incorporate small high-speed type of SRAM called cache
memory. The purpose of cache memory is to allow the processor to access data and
instructions even faster than it would have taken to fetch it from the relatively slow
DRAM.
Memory capacities
Memory and storage capacity is measured in special units called bytes. A byte is
equivalent to a single character. Characters can be a number from 0 to 9, letters A
to Z or a special symbo1. For example, a number like 2545 has four bytes while
the words, My Home has seven bytes since, and the space between them has 1 byte.
Memory quantities can be expressed in;
1. Kilobytes (kB): Approximately one thousand bytes.(1024)
2. Megabytes (MB): Approximately one million bytes.
3. Gigabytes (GB): Approximately one billion bytes.
4. Terabytes: Approximately one trillion bytes.
25
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
unit
Gives instructions
Instructions Instructions
to each
device after
interpreting
program
instructions
Arithmetic and
logic unit
Calculates and
compares
data
Results of Data to be
processing processed
Input Main
Output
data memory
data
I Input Stores data and Output
unit instructions to unit I
be processed
temporally.
Output to be Data to be
stored processed
Secondary storage
devices
Stores data and
instructions to
be processed
permanently.
Processors
In 1971, a company called Intel that specialises in manufacturing central
processing units managed to combine the arithmetic-logic unit and the control unit
on a single tiny processor called microprocessor and called it Intel 4004. This
microprocessor was used in electronic calculators. The first microprocessor to be
used on microcomputers was called Intel 8086 developed in 1974. Since then,
26
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
there has been a tremendous growth in microprocessor technology marked by great
increase in processing capability and speed.
Until 1989, Intel corporation enjoyed monopoly in the field of microprocessor
technology with her famous Intel processors. Since then other players joined in
and started manufacturing cheaper alternatives. These include: Advanced Micro
Devices (AMD), Cyrix and Motorola companies
Output devices
Output devices are peripheral devices that a computer uses to give out information
produced after the processing operations. There are two types of output devices namely the
softcopy and the hardcopy output devices. Softcopy refers to the intangible output mainly
displayed on the screen or through other output devices such as speakers. A hardcopy is a
tangible output produced mostly on papers by devices such as printers.
Monitors
A monitor or a video display unit (VDU) is the most common output device. It displays
information on its screen thus helping the user to monitor operations carried out by the
computer.
For a long time, monitors have been designed using a long tube called the cathode ray tube
(CRT at emits light. The screen of a cathode ray tube is curved slightly outward forming a
convex shape. However, new flat displays have come which do not use CRT technology.
Flat display are more comfortable to use, portable and do not consume a lot of power
compared to CRT. Figure 2.9 shows a CRT monitor and flat panel display monitor.
The sharpness or clarity of an image on the screen depends on the type of monitor being
used. Monitors that display sharp clear images are said to have high resolution. The images
on the screen are formed by small dots called picture elements (pixels). The higher the
number of pixels per square centimeter the higher the resolution hence the clarity.
There are two types of monitors namely monochrome and colour monitors Monochrome
monitors display images and text in only one colour mostly black and white. Colour
monitors can display images and text in multiple colours. For a monitor to display
information it must be connected to a separate piece of circuit board, plugged into the
motherboard called the video card or graphics adapter. However, some motherboards have
onboard video capability therefore there is no need for a video card.
28
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Monochrome display adapter (MDA): This was the first video card that was used in early
computers. MDA displayed text only in one colour.
Hercules graphics card (HGC): One weakness of the original MDA display was that, it
could not support images of any kind. Hercule graphic card supports monochrome images
in addition to text.
Color graphics adapter (CGA): This can display text and images using up to 16 colours.
Enhanced graphics adapter (EGA): This is an improvement over colour graphic adapter
but also displayed text and images using 16 colours.
Video graphics array (VGA): This offers at most 256 colours.
Super video graphics array (SVGA): This is an enhancement of video graphic array
capabilities offering over 256 colours.
Small portable laptops, notebooks and even desktop PCs use flat-panel display. Common
types of this display are:
Liquid crystal display (LCD): Liquid crystal displays do not display by emitting light of
their own. Instead they have tiny liquid crystals that reflect light falling on them from the
environment. Liquid crystal displays are widely used in watches, calculators, cell phones
and digital cameras.
Electro luminescent (EL): These displays are an improvement on LCDs. Electro
luminescent emits light when electrically charged. This makes them clear, sharper and
easier to read.
Gas-plasma: These use a gas that emits light in the presence of electric current.
Thin film transistor (TFT): This is the latest technological advancement in displays. It
provides high quality output than all the others.
Sound output
Speakers are used to output sound from a computer. Sound may be in form of music,
warning, video, interactive communication with a computer etc.
Dot matrix printers produce a hardcopy by arranging patterns of dots on the paper using
pins held in the printing head. Figure 2.10 (a) shows an example of an impact printer.
Figure 2.10 (b) shows print characters formed by a dot matrix
printer.
a daisy-wheel printer has a wheel with petals on which characters are mounted. It is so
called because it resembles a daisy flower. When printing, the wheel rotates allowing the
petals to hit a ribbon with different
characters as they are received from the computer.
Non-impact printers
These printers do not use the striking mechanism to produce characters on a piece of paper.
They do not hammer the ribbon hence they are much quieter. The major non-impact
printers are inkjet, thermal transfer and laser printers.
Inkjet printers
Inkjet printers form characters by spraying ink from tiny nozzles through an electrical field
that arranges the charged ink particles into characters. Inkjets are cheap to buy but
expensive to run because of the high cost of ink cartridges. Figure 2.12 shows an inkjet
printer.
Thermal printers
Thermal printers use heat to transfer characters onto a piece of paper i.e. they bond
characters onto a piece of paper by using hot pins which presses
against a special ribbon. They are inexpensive alternative to inkjets.
30
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Laser printers
Laser printers prints by passing a laser beam back and forth over a rotating drum. The laser
beam draws the image on the drum by static electricity. An example of a laser printer is
shown in Figure 2.13. The charged areas pick up the ink toner from a cartridge, and press it
onto the paper. Although these printers are more expensive to buy, they are faster, and
cheaper to run than the inkjets.
Plotters
A as shown in Figure 2.14, a plotter resembles a printer but specialises in producing big
charts such as maps, pictures and drawings. They are mostly used for printing
geographical, architectural and engineering drawings e.g. maps, advertisement posters to
be placed on billboards, machine parts etc.
31
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
2.5. Secondary (auxiliary) storage devices and media
There is need to have an alternative long-term storage location for data and information
other than the main memory. These alternative storage devices that are not part of the main
memory are called secondary or auxiliary storage devices. These devices are not directly
accessible by the cpu. Secondary storage devices that are not housed inside the system unit
and hence can be carried around to be used with another computer are called removable
storage devices and media. In order to read or store data from a storage media, a device
called a drive is required.
Secondary storage devices can be classified according to the technology used to record
data. The technology could be magnetic or optical. The data and instructions held in these
devices must first be moved into RAM before processing.
Magnetic tapes
A magnetic tape is a ribbon of Mylar (plastic-like) material coated with a thin layer of iron
oxide. The tape resembles the music cassette used in home tape recorders.
In order to read/write data records on the tape, the tape must be inserted in a tape drive that
rotates the tape allowing a read/write head to perform
5.1. the operation. Most computers today don t has tape drives because of the advent of
better storage devices. Examples of magnetic tapes include: reel to reel tapes, cassette tapes
and cartridge tapes.
Magnetic disks
They have a magnetic disk platter that stores data. Examples of magnetic disks are floppy
disks (diskettes), zip disks and jaz disk.
Floppy disks are inserted in a floppy drive, which has a read-write head that runs over the
magnetised spots that contain data. Floppy disks come in different sizes with different
32
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
storage capacities. Initial floppy disks were large in size but with smaller storage capacities
than the presently available 3t-inch which has a maximum storage capacity of about
1.44MB. Figures. 2.15 (a) shows a typical 3t-floppy diskette while Figure 2.15 (b) shows
parts of floppy disk.
The structure of a floppy disk platter
If the protective plastic casing of a floppy disk is removed, a circular flexible disk, coated
with magnetic material will be revealed. The surface of the disk is divided into tiny
invisible concentric circles called tracks that store data. The tracks are further divided into
units called sectors as shown in Figure 2.16.
Zip disks
These are high capacity disks that resemble the floppy disks. They are, however, slightly
larger and thicker in size. A zip disk can hold as much as 250 MB. Zip disks mostly come
with separate-portable external zip drive.
Jaz disks
These are small portable disks with high storage capacity of about 1 GB to 2GB. They are
used for storing data that require large storage. Like jaz disk comes with a portable jaz
drive. Figure 2.17 below shows jaz and zip disks and their drives.
Care of magnetic storage media
To care for magnetic media the following rules are to be observed.
1. Do not expose them to strong magnetic fields. This would erase the magnetically
recorded data on the disk. Hence do not carry magnets to the computer room.
2. Keep magnetic media away from excessive heat because heat energy
weakens magnetic media s ability to store data.
3. Do not drop the disk on the ground.
NB: Both CD-ROMs and CD-Rs are referred to as WORM (Write Once Read Many)
because they allow the user to record data on them once but read the data as often as
necessary.
Optical card
An optical card resembles the magnetic-ink character recognition card but instead of
having a magnetic stripe, it has an optically recordable stripe that stores information. These
types of cards are mostly used in banking and other business organisations to record
customer details.
Optical tape
This is similar to a magnetic tape only that data is stored on it by using optical technology.
Today computers can be used to tune to any of the favorite FM or TV channels as long as
an FM/TV card is installed in the computer.
2.20.
As the disk rotates, the read/write head moves in and out over the surface to record or read
data.
Hard disks have gained widespread
popularity because:
35
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
1. They provide permanent, cheap and large storage capacity that is rewritable. For example a
computer can have one hard disk of 40 GB storage space.
2. They are very fast compared to other secondary s rage devices in terms of data transfer.
Care of the hard disk
Because of the high rotational speed of the disks, it is important to observe the following
precautions to avoid permanent destruction to the hard disk also called disk crash.
1. Keep the disk away from smoke and dust. Dust and smoke particles can cause damage to
the surface of the disk by scratching it as the head attempts to read data.
2. Switch off the computer using the correct procedure. This allows the read/write head to
move off the disk surface before power is switched off. Improper procedure would risk
heads crashing on rotating disks hence scratching them.
2.6
Power cables
Inside the system unit is a special power supply unit that supplies power to the
motherboard and other internal devices. In order to connect the computer to the
mains power outlet, you need power cables that link the power supply unit to the
outlet.
Interface cables
All peripheral devices are connected to the motherboard hence to the CPU by
special cables called interface cables. An interface cable is connected to the device
on one end, and to the motherboard via ports on the other end.
The difference between the power cables and the interface cables is that the power
cable supplies power to a component while interface cables transmit data signals.
simultaneously using a set of many conductors (wires). For example if a cable uses
8 conductors to transmit data at the same time, it is said to be an 8-bit parallel
cable. The advantage of using such cables is that they transmit data faster over a
short distance. These cables are mostly used to connect printers and removable
storage drives like the zip drive. Figure 2.23 shows an illustration of a parallel port
and cable.
cable.
If a computer does not have a universal serial bus port, it can be bought and fitted
on the motherboard.
2.7`
Before attempting to carry out any setup activity, observe the following
precautions should be observed.
38
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
1. Disconnect all devices from power source before starting to work on them.
2. Do not work on any peripheral device without the guidance of the teacher.
3. Never work alone because you may need help in case of an emergency.
4. Discharge any static electricity that might have built up on the hands by
touching an earthed metallic object and then wearing an anti-static wrist member.
This is because your body can hold as much as 200 volts of static charge that can
damage sensitive components on the motherboard.
Step 1: Identifying
motherboard slots and components. Before you connect any device to the
motherboard, carefully study the manufacturer s manual in order to identify the
components labeled in
Step 2: Connecting the hard disk, floppy drive and optical drive. These
devices are connected to the motherboard using special ribbon cables like the one
shown in Figure 2.30.
39
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The following instructions should
be observed while connecting the
devices:
1. Wear antistatic wrist member to
discharge any static charge on the
body.
2. Check that a free drive bay
exists to hold the disk drive.
3. Slide the disk into its bay and
screw it into place.
4. Ensure that there is a free power connector from the power supply unit and connect
it to the drive. Notice that it is designed to fit in its socket in only one direction.
5. Identify pin 1 as labeled on the drives socket and match it with the red or brown
continuous line of the ribbon cable. Most cables will only fit in one direction.
6. Connect the cable both to the drive then to the motherboard.
7. Repeat this for all the drives.
8. If installation is complete replace the system unit cover.
System software
40
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
System software performs a variety of fundamental operations that avails computer
resources to the user. These functions include:
1. Booting the computer and making sure that all the hardware elements are
working properly.
2. Performing operations such as retrieving, loading, executing and storing
application programs.
3. Storing and retrieving files.
4. Performing a variety of system utility functions.
Firmware
Firmware, also referred to as stored logic is a combination of both the software and
hardware recorded permanently on electronic chips. Usually, a firmware is a read-
only memory chip that is mounted or plugged into the motherboard. Firmware may
hold an operating system, utility programs, language processors etc.
Utility software
Utility software is a special program that performs commonly used services that
make certain aspects of computing to go on more smoothly. Such services include
sorting, copying, file handling, disk management etc. The two basic types of utility
software are:
1. System-level utility software: These help the user to work with the operating
system and its functions. For example, a utility software tells the user when he/she
enters a wrong command and gives suggestions how the error can be corrected.
2. Application utility software: These make the use of an application program
smoother and efficient. These utility programs are commonly purchased separately
or may be part of an operating system.
Networking software
41
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
This type of software is mostly used to establish communication between two or
more computers by linking them using a communication channel like cables to
create a computer network. Networking software enables the exchange of data in a
network as well as providing data security. Network software may come as
independent software or integrated in an operating system. An example of
networking software is novel Netware.
Application software
Application software, also called application packages are programs that are
designed to help the user accomplish specific tasks.
.Table 2.2 gives examples and uses of common application packages
42
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
available in the shops and once developed for one company or user may not
address the needs of other users.
Suite, Microsoft-Office and Corel WordPerfect while those of single purpose are
QuickBooks and Sage Line 50.
The word package is sometimes used to refer to these types of software that are
packaged and sold by vendors.
Advantages of standard software over the in-house developed programs are:
5. They can easily be modified (customised) to meet specific user’s needs without
involving expert programmers
Hardware considerations
Some factors considered when selecting computer hardware are;
43
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Processor speed
The processing power and speed of a computer mainly depends on the processor
speed. A good computer must have high processor speed. For example a few years
ago, processors used to have speeds of less than 100 MHz. However, today s
Pentium processors are operating at very high clock speeds of over 4 GHz.
Scientists and engineers are aiming at producing a processor that operates at
terahertz (trillion hertz). However, it is important to buy a processor that suits ones
need not necessarily the fastest.
Memory capacity
As earlier mentioned, primary memory, mainly random access memory (RAM) is
measured in megabytes (MB). For example, a computer may have 32MB of RAM.
Although, a computer may have a very fast processor, it may not perform as
expected if it has low memory capacity. Because of the current multimedia driven
applications, a good computer should have sufficient memory to handle the heavy
applications that require a lot of memory space in order to run. A computer with at
least 128 MB of RAM is recommended for most contemporary applications.
RAM is packaged as either dual in-line memory Module. (DIMM) or single in-line
memory module (SIMM).
Therefore, before one buys a memory module for the computer the following
factors have to be considered:
1. The type of module supported by the computer s motherboard.
2. Does the motherboard have an empty memory slot?
3. Will the module work well (be compatible) with the other existing modules on
the motherboard?
4. What is the capacity of the module?
Warranty
A warranty is an agreement between the buyer and the seller that spells out terms
and conditions of, after selling a product in case of failure or malfunction.
The most important consideration to make is whether the seller is ready to actually
provide after sales services. On top of the actual cost of the item, most
manufacturers and suppliers include a certain percentage charge to cover the
warranty.
A good warranty should cover the following points:
1. Scope of cover for example six months, one year etc.
2. Callout response and liability agreement. For example how long should the
supplier take to repair a fault or replace the product, and if he/she delays who bears
the cost.
3. Preventive maintenance for example regularity of service, at intervals etc.
Cost
44
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The cost of a computer system depends on:
1. Its processing capability.
2. Whether it is branded or a clone. Branded computers are more expensive than
their equivalent clones. This is because of their reliability and good after sale
services.
3. Its size. Portable computers are more expensive than their desktop equivalents
because of the superior technology involved in manufacturing smaller components
without losing performance abilities.
Portability
The size of electronic devices including computers has become a major
consideration because smaller devices enhance mobility.
User needs
When selecting computer hardware, consider the unique needs of the user. For
example if the users have special disability like inability to use their hands,
consider buying input devices that capture data through voice input.
The user needs also determine the type of data that will be processed hence, the
choice of the type of hardware most appropriate to satisfy the needs. For example
in a supermarket a special computerized devise called a point of sale (POS)
terminal is most suitable to record transactions.
Other considerations
Other considerations for selecting computer hardware are;
Monitor
Depending on preference, your choice for a monitor may depend on size,
resolution and the technology used to make it. Currently flat panel displays have
become a new market standard quickly replacing the cathode ray tube (CRT).
Multimedia capability
45
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
This is the combination of video, audio, text and images to provide an interactive,
creative and effective way of producing and communicating information. A
multimedia system should have speakers, CD/DVD drive, sounds card and a
SVGA monitor. It should also have software that supports multimedia capability.
Software considerations
Although one may have a good computer with the best hardware, the actual real
determinant of a computer s value to the user is the software in it that can run to
solve the day to day data and information processing needs.
The following factors should be considered when selecting software:
Authenticity
The term authenticity refers to genuineness, validity and or legitimacy of an item.
When you acquire software from the vendor, make sure it is an original copy that
is accompanied by the developer s license and certificate of authenticity. This is
because some people illegally produce pirated copies which is an offence.
Documentation
It refers to the manuals prepared by the developer having details on how to install,
use and maintain the software. These include installation guide, maintenance guide
and a user guide. This documentation enables the user to work with the software
with minimum guidance.
User needs
The needs of the user determines the type of operating system and application
programs that should be considered for acquisition. For example, if the user needs
to type documents most often he/she would go for a word-processor.
People with special disability will require software that recognizes other forms of
input like voice and natural sound. A good example is software used in mobile
phones to store voice and allow the user to make a call by just calling a name
instead of keying in the number.
User friendliness
One of the most important features normally considered when using a computer
program is its user-friendliness. This is a measure of how easily the users can be
able to operate the computer. Some programs are more user- friendlier than others.
A lot of research and effort has been dedicated in trying to come up with more
user-friendly software. The ease of use of a program will most likely influence
whether the user will prefer it or not.
46
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Cost
The cost of software is perhaps one of the most controversial issues that must be
considered carefully. One cannot just go for software because it is cheap. Many
other factors may force a person to buy far much more expensive software even
with cheaper alternatives available. However it is illogical to buy expensive
software if there is a reliable cheaper alternative that will meet ones needs.
In case the off- the-shelf software does not fit the needs of the users it would be
advisable to develop in-house software solutions even though they may be a bit
more expensive.
Compatibility and system configuration
Software compatibility refers to the ability of the computer to run the software
depending on the system setup (configuration). For example some software may
only run on a computer that has 32MB of RAM and above. Any computer with
lower than this, will be said to be incompatible. It is important that one reads the
installation guide and system requirements that comes with the software in order to
avoid disappointment.
Portability
Portability in this aspect refers to whether a program can be copied or installed in
more than one computer. Although, most software in the market today are portable
some developers produce software which can be installed on one machine only.
This means that if one has twenty computers, one should buy a license for each.
47
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
3.1 OPERATING SYSTEMS (OS)
Chapter outline
3.1 Introduction
3.2 Resources under operating systems control 3.3 Functions of an operating
system
3.4 Types of operating systems
3.5 Factors to consider when choosing an operating system
3.6 How Windows organizes information
3.7 Managing files and folders
3.8 Disk management using Windows
3.9 Installing Windows operating system
Introduction
As mentioned earlier, an operating system is the main program that controls the
execution of user applications and enables the user to access the hardware and
software resources of the computer. In a data processing environment, the user
sees a computer as a group of application programs that enables him/her to
accomplish specific tasks. Application programs do not directly utilize the
hardware devices. They send messages through the operating system which has the
capability to give instructions to the hardware to perform a particular task. An
operating system therefore, supervises all the other programs in the computer and
manages access to the hardware as shown in Figure 3.1.
3.2
The processor
The processor is a scarce resource. It executes tasks called processes. At anyone
time several tasks may require processing hence creating competition. The
operating system arranges the tasks according to priority and has the ability to stop
a particular task to allow the processor to service another one.
Because the operating system is large and very important, it is usually installed on
the hard disk but must be loaded to RAM during the booting process. Not all the
operating system can fit in RAM so a small special part that contains the most
necessary commands and procedures called the kernel is the one that is loaded.
on it that were in RAM ready for processing but have to wait for some time.
Job scheduling
The processor can only handle one task at a time. Therefore, the operating system
has to determine which task will be processed first and makes sure that the one that
is currently being processed is closely monitored to avoid wasting time in the
processor. The criteria for selecting which task will come before the other depends
on many factors. For example, the operating system may decide to process smaller
tasks before larger ones.
Memory management
All data and instructions must be temporarily held in the main memory before and
after processing. The operating system may organize the main memory into blocks
of sizes called partitions. It constantly assigns main memory storage partitions to
data and instructions. To access a piece of data or instruction, the operating system
knows where to find each piece of data as long as the correct address of the
partition is used.
Error handling
The operating system has many ways of alerting the user, of errors he or she
makes. Many op rating system usually express what the error is, and where
possible make suggestions on how to correct the error. The operating system does
this by monitoring the status of the computer system and performing error checks
on both hardware and the software.
Job sequencing
The operating system keeps a list of jobs or tasks currently being run and clocks
them in and out of the processor. It also arranges them in a particular order to make
it easy for the processor to execute them and to know how and when to fetch
instructions and data for each task.
Interrupt handling
An interrupt is a break from the normal sequential processing of instructions in a
program. An external request causes the processor to stop executing the current
50
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
task, and do something else before returning the control back to the program that
was interrupted.
51
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The term human computer interface refers to the method of interaction between the
computer and the user and determines how easily the user can operate the
computer. The underlying principle in operating system design is to make complex
tasks very simple for the user to carry out. This is the reason why a lot of time has
been spent by software developers in trying to come up with user friendly
interfaces.
For example, if you are using MS DOS operating system, you can copy a file
called Fruits.Dat from a hard disk C to floppy disk A as follows: COPY
C:\Fruits.Dat A:\
NB: The user must press the enter key for the command to be executed.
Examples of command line interface are the early versions of MS DOS, PC DOS,
OS/2, and UNIX.
MS DOS Interface
Some operating systems present the user with simple menus while others have
sophisticated menus.
The user makes a selection `by typing any of the letters I, V, E, D or Q to activate a
submenu.
Later versions of DOS came with a menu driven interface called the DOS shell or
DOS editor
Menu
52
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The DOS shell
Introduction
Microsoft Corporation is a software company that specializes in the development
of both operating systems and application programs. Some of its popular operating
systems include; Windows 95, 98, 2000, NT, Millennium (Me) and XP. These
operating systems have gained wide popularity with many PC users because of
their friendly graphical user interface.
Other operating systems that rival Microsoft products include Linux, UNIX, Mac
OS and OS/2.
53
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
procedure of carrying out Tasks. However, extra details on specific versions are
discussed in appendices L II and III.
The good thing about all the versions of Windows discussed in this book is that
once you acquire basic skills in using one version, you can easily transfer the same
to other versions.
Files
A file is a collection of related data or information stored in one location and given
a unique name that enables the operating system to identify it during storage and
retrieval process. Every file has details that indicate the following:
1. A unique name and an optional set of maximum three characters called an
extension e.g. a file named JUNE.DOC has JUNE as the name and DOC as the
extension. The file name and the extension are separated by a period (.). The
extension usually suggests the type of information held by the file e.g. DOC
suggests that it is a document file created in an application program called
Microsoft Word.
There are two types of files namely; system file and application files.
System files
These of files contain information that is critical for the operation of the computer.
For example, all hardware devices are tested and made ready (initialised) during
boot up by having the computer read information
From special system files. These files in Windows would have name extensions
like .sys, .ini and .dll. An example of a system file is system.ini
Application files
54
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
They are also called program files because they hold programs or application files.
They may have extensions such as .exe.
The following list gives some common file name extensions and suggests the type
of information that could be held in the file.
When naming files, it is important to give meaningful names and extensions that
suggest its content. For example when saving a letter written to John, give it a
name such as Johnletter. The name extension is automatically added by the
application being used.
Folders
A folder or a directory is a named storage area where the user can store related files
to enable easy access. Like with an ordinary file cabinet, a folder is meant to help
the user divide a large storage media into small manageable storage locations.
Subfolders
A large folder may be divided into smaller units called subfolders. Therefore, a
subfolder or subdirectory is folder/directory within another folder/directory.
In Windows, folders and subfolder icons mostly appear in yellow color while file
icons are mostly white with a fold at the top right hand corner
Storage media
When saving a file or creating a folder, identify a storage location, which is more
reliable and sufficient. For example, if a file or folder requires more than 1.44MB
of storage space, you can not use a 1.44MB 3 inch. floppy disk instead use a
storage media with larger space.
Windows desktop
Once you switch on the computer, Windows is automatically loaded into the main
memory and a mostly empty screen called the desktop appears. This shows that the
computer is ready for use.
Some versions of Windows e.g. Windows XP, prompt the user to press Ctrl +Alt
+Delete to gain access to desktop features through a process called Log on.
55
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Desktop features
On the desktop are icons and a long thin bar called the task bar. Figure 3.8 shows a
Windows Me desktop.
Icons
Icons are mostly manipulated using a pointing device e.g. the mouse. Some of the
common icons on the desktop are My Computer; Recycle bin, Internet Explorer,
and My Documents.
Whenever the user starts a program or opens a file, its button appears on the
taskbar and stays there until the user exits from the program see Figure 3.9. You
can switch between various programs and documents in Windows by clicking
these buttons. This process is called multi tasking.
Programs
This menu displays a list of all programs installed in the computer. The menu has a
small solid arrow. When you point at it, another list of menus called a sidekick
menu will be displayed as shown in Figure 3.10 (a) and (b).
Run
It enables the user to:
1. Install programs on the hard disk.
2. Open files and folders from a storage location.
3. Run programs from removable media without necessarily installing it on the
hard disk.
Shutdown
This menu lets the user shut down, restart the computer, or restart in MS-DOS
mode. Windows Me and Windows XP do not have MS-DOS in their shut down
dialog box, see appendix II and III.
Every time you finish using the computer you must first shut it down before
turning it off. To do this you need to:
1. Click the start button
2. Point and click shutdown a prompt for Windows 98 will appear.
3. If you want to shut down, click the shutdown button
4. Finally, click ok or simply press enter
5. Wait for the computer to display a message, It is now save to turn off . Some
computers automatically switch themselves off once you click ok.
57
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
3.7
Windows explorer
Windows explorer lets the user display the drives and folders in a hierarchy or tree
structure. The computer tree is an up side down structure with the highest level
being the root. The explorer divides the window into two panes. The left pane
displays a tree of drives and folders while the right pane displays a list of files and
sub folders contained in a particular open drive or folder.
To display the Windows explorer in some versions of Windows like 95/98 carry
out the following procedure:
1. Click the start button then
2. Point to the programs menu
3. From the Programs go to the sidekick menu, click windows explorer
An explorer window such as the one shown in Figure 3.12 will be displayed.
NB: In some operating systems, Windows explorer command may not necessarily
be located on the program s menu. The other method of displaying the explorer
window is to:
1. Right click' my computer icon on the desktop.
2. Point and left click explorer from the shortcut menu.
This method of displaying the explorer window has been adopted as the standard
way of displaying the explorer window throughout this book to take care of various
versions of Windows operating systems.
In Figure 3.12, the highest item in the tree is the desktop then followed by My
Computer. If you observe keenly, you will notice that some items have a small box
on their left with a plus or minus sign inside. If an item has the plus sign on its left,
it contains other lower level items e.g. My Documents folder in the above figure,
has subfolders inside. To display the subfolders, click the plus sign and the sign
will change to minus meaning that all subfolders in that level have been displayed.
You can reduce (collapse) the tree by clicking minus sign.
Using My computer
58
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Double clicking on my computer icon, gives you a graphical view of what is inside
the computer. This includes the drives, the control panel and other resources as
shown in Figure 3.13 (a).
To display files and folders from a particular drive proceed as follows:
1. Double click a drive icon. A window appears displaying files and folders stored
in the root of the drive in question. The root is considered to be the highest level of
the directory tree where all directories/folders start.
2. Double click a folder to display its contents.
3. Double click the hard disk (drive C). Its content will be displayed as shown in
Figure 3.13 (b).
4. From this window you can start manipulating your files and folders.
4.
Parts of a Window
Title bar
This is a bar across the top of the window that displays the name of the current
application program or task.
On the right of the title bar are three tiny buttons namely:
Minimize button: It reduces a window by pressing a button which is placed on the
taskbar.
The restore/maximize button: It stretches the window to cover the entire desktop or
restore it to its original size.
The close button: It is used to exit an application.
Menu bar
Menu bar provides a list of commands that can be used to manipulate a task. For
example, to save a document, click file and then save.
Too/bars
These are buttons arranged in a row that are shortcuts to menu commands.
Work area
This is the working area where you can create your documents.
Status bar
This is an interactive strip at the bottom of the application window that acts as a
communication link between the user and the operating system. Such interactive
activities include saving, opening a file, printing, cursor position etc.
60
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Scrolling is the moving up, down, left or right of a document window on the screen
if it is too large to fit. Scroll buttons and arrows are horizontal and vertical buttons
at the borders of a window used to scroll through long document.
The recycle bin is a default icon on the desktop therefore it cannot be removed.
Warning
1. One should not attempt to delete system and application files from the hard disk.
2. Items deleted from removable storage are not held in the recycle bin and are
completely lost.
To delete a file or folder proceed as follows:
1. Using My computer icon display the Explorer window.
2. From the folder tree on the left pane, select the item that is to be deleted.
3. On the File menu, click delete
4. A message appears on the screen asking whether you actually want to delete the
item.
5. Confirm by clicking yes
61
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
To restore a file or folder from the recycle bin to its original location proceed as
follows:
1. Double click the recycle bin icon.
2. Select the deleted item (or items) to be restored.
3. Click file then restore
NB: You can also delete selected items in the recycle bin by clicking file then
delete
Copy progress dialog will be displayed on the screen as shown in Figure 3.16
below
To move a file or a folder proceed as follows:
1. Using My computer icon display the Explorer window.
2. On the edit menu click cut.
3. Select the drive or folder where you want the item moved.
4. From the edit menu click paste.
5. Move progress dialog will be displayed on the screen similar to that of copying
in Figure 3.16 but with the word moving in the title bar.
If you want to select all files in an open folder, click edit then select all. This will
highlight all files in the folder. To manipulate the selected items, use the menu bar
or the shortcut.
3.8
63
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Disk management using Windows
Windows operating system provides the user with tools that help him/her to
manage storage devices and media. It is important to have a routine check of all the
storage devices otherwise one may end up losing very vital data and programs.
Warning: Do not attempt these operations on disks without the guidance of the
teacher. It is preferable to use the floppy disk rather than the hard disk to perform
these operations because some of them can easily lead to loss of data and
information stored on the hard disk.
Formatting disks
Before using a floppy disk, it must be formatted. Formatting is the process of
preparing a new disk for use by imprinting empty sectors and tracks on the surface
of the disk so that the operating system can recognize and be able to access it. Most
diskettes today are sold readily formatted. Each operating system has its own
special way of formatting a disk that may make the disk not to be read by another
operating system. To format a new floppy disk proceed as follows:
1. Put a new unformatted disk into the floppy drive.
2. Double click my computer icon.
3. Right click the icon labeled 3 1/2-floppy (A:) then select: Format.
4. Select the disk capacity e.g. 1.44MB, format type i.e. either quick erase or full
5. Give the diskettes an internal name (label).
6. Click start to begin formatting.
7. Once the process is over, click Close.
1. Double click my computer icon to display the storage devices installed on the
computer.
2. Right click a drive icon e.g. 31/2-floppy disk (A:).
3. From the shortcut menu, click properties then click Tools tab, to display a dialog
box
4. Click the check now button
5. A prompt appears requesting the user to specify scandisk options like whether
errors found should be corrected automatically.
6. Once scan disk is complete, Windows will give a summary statistics on errors
encountered if any.
64
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Disk defragmenter is a tool that is used to rearrange scattered folders and files on a
storage media in order to speed up access to files and folders. This enables the
read/write head not to waste time looking for the same item all over the disk.
Figure 3.20 shows a disk before and after defragmentation. Notice that the
fragmented disk has related data elements spread all over it but the defragmented
one has related data consolidated close to each other.
DriveSpace can use the free space on an uncompressed drive to create. a new,
empty compressed drive called a host. To compress a disk proceed as follows:
1. Double click my computer icon to display the storage devices installed on the
computer.
2. Right click a drive icon e.g. 3 1/2-floppy disk (A:)
3.From the shortcut menu, properties If you are using windows XP select the
Compress drive to save disk space, check box then click ok as shown in Figure
3.21 (a). If using windows 98 click the compression tab then click compress drive
button. (Figure 3.21 (b))
4. In confirm attribute changes, select the option, you want
NB: If you are using Windows 95/ 98, click the start button, point to programs,
accessories, then system tools and select compression agent or DriveSpace.
66
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
To boot up a computer using the start up disk insert it in the floppy drive then
switch on the computer. The computer reads the boot up instructions from the
diskette then displays a command prompt such as A:> - that enables the user to
type commands. The commands help the user diagnose the problems that might
have led to boot failure.
Partitioning a disk
Partitioning a disk refers to the process of dividing a large physical disk into two
or more partitions called logical drives. A logical drive is a drive that can be
accessed as if it is a separate disk but in actual sense, it is a partition of one large
physical disk.
Partitioning process
To create partitions, you must have a startup or bootab1e diskette and proceed as
follows.
1. Before you switch on the computer, insert the system disk into the floppy disk
drive.
2. Switch on the computer and let it boot to A: > prompt.
3. Type FDISK command at the prompt and press the enter key.
4. A prompt Do you wish to enable large disk support (YIN) appears. Press Y to
enable the computer to support large capacity hard disks of 500MB and above
otherwise press N.
5. From the menu displayed, Choose 1 (Create DOS partition or Logical DOS
Drive) as shown in Figure 3.23.
6. From the sub menu displayed:
(a) Choose option 1 to create primary DOS partition that will be treated at the
bootab1e disk or drive C.
(b) Choose option 2 to create extended (other) DOS partitions.
(c) Choose option 3 to give your extended DOS partitions drive labels.
Once you finish partitioning the disk, reboot the computer for the changes to be
effected then format the drives created. If you do not format the drives, the
computer will not be able to access the storage media.
NB: You can also use the other FDISK options to display partition information or
Delete partitions.
The term installation refers to the process of copying program files onto the hard
disk. Installation differs from copy paste process in that it is specifically meant to
copy executable files in a format that allows the computer to run the program.
Installation process
In order to install Windows 98 on a computer that does not have an operating
system, the user must have a Windows 98 Startup disk. This disk gives the user
options for loading with or without the CD-ROM support.
Because Windows 98 comes on a CD-ROM, you must boot the computer With
CD-ROM support in order for the computer to recognise the CD-ROM drive.
The prompt should change to the letter that was typed to represent the CD drive
e.g. D: \>
This means that the computer is able to read whatever is in the CD-ROM drive.
2. Type SETUPEXE e.g. D :\> SETUP then press the enter key.
First Setup scans the available disks for errors and if an error is encountered, it is
fixed but if it is more serious, the setup process is halted.
After this, the setup program (Wizard) asks you a few questions, gets you accept
the license agreement and enter the product key. See Figure 3.24.
68
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
The rest of the installation is automated. All you need to do is just relax and let the
wizard complete the installation task.
113
4. Reinstall the operating system if the problems above persist. In case the problem
is beyond repair.
APPENDIX I
Beyond basics
Tiling windows
Tile horizontally
This arranges all running programs one below the other as shown in Figure AI.I.
The program in focus will have its title bar highlighted. To switch to another
program, simply click its title bar. To tile horizontally:
1. Right click the task bar
2. Click tile windows horizontally
Tile vertically
Applications can be arranged down the screen beside each other as shown
in Figure AI.2. To tile vertically:
1. Right click the task bar
2. Click tile windows vertically
Undoing tile
You can undo tiling by right clicking the from the shortcut menu.
then click
Cascading
Each window is placed on top of the other with the active program being foremost
as shown in Figure A1.3. To cascade:
1. Right click the task bar.
70
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
2. Click cascade windows
Undoing Cascade
You can undo cascade by right clicking the taskbar, then click undo cascade from
the shortcut menu.
To customise the desktop, right click the desktop to display properties dialog box
as shown in Figure A.1.4 and make the appropriate changes by clicking each tab.
The background
To set the background
1. Click the back ground tab
2. In Wallpaper list, select a wallpaper pattern.
3. Click on tile to cover entire screen with small wallpaper images or
stretch to fill the wallpaper with one large image or center to let the wallpaper
occupy only the centre of the desktop.
4. Click apply to see the changes before you close the dialog box,
5. Click ok to effect the changes and close the dialog box.
NB: To clear the screen saver press the mouse button or any keyboard key.
71
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
1. Click the appearance tab
2. From the schemes list box, select the color scheme such as rose, storm,
Windows standard etc.
3. From the items list box, select the item that the scheme will apply to i.e. icon,
desktop, menu bars etc.
4. Click apply to see the changes before you close the dialog box,
5. Click ok to effect the changes and close the dialog box.
Web
With Windows 98 you can customise the desktop by integrating the Web
features on it. You can also turn the Web elements into desktop elements and
update them at any time, this is done by:
1. Click the web tab to apply web effects on the desktop.
3. Click apply to see the changes before you close the dialog box.
4. Click ok to effect the changes and close the dialog box.
72
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Mouse settings
To change the default mouse button, double click speed and the pointer appearance
to set a mouse:
1. Click the, Start button, point to Settings then; control panel.
2. In the control panel, double click the mouse icon.
3. Change the mouse properties the click ok.
APPENDIX III
APPENDIX IV
Glossary
Access time: The length of time needed to write or read data from storage.
73
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
Arithmetic and Logic Unit (ALU): A part of the central processing unit that
performs computations and makes comparisons as instructed.
Bits (binary digits): Since digital computers and computer accessories circuitry
represent data as a pattern of on and off state of electric current, a bit is a 1 or a 0
used to represent the two states respectively.
Byte: A group of bits used to store a single character. A byte usually consists of
seven or eight bits, which the computer handles as a unit.
Central processing unit (CPU): This is the brain of a computer, which apart from
performing processing tasks; it controls all other activities of a computer system.
Computer hardware: The physical computer equipment one can see and touch.
Such equipment includes the system unit, input devices, storage devices and output
devices.
Computer program: A set of instructions that direct the computer what tasks to
perform and how to perform it. These instructions are specially written using a
computer programming language.
Computer system: A computer system refers not only to the physically attached
devices to the computer but also to software and the user.
Control unit: The part of the CPU that interprets the instructions and controls all
the operations in a computer system. The control unit monitors on the input,
storage, the arithmetic and logic operations, and the output operations to have the
instructions carried out.
Data: This are the raw facts represented by numeric, alphabetic characters and
special symbols that are processed into information by the computer.
Data processing: The varied activities performed to convert data into useful
information.
Drive: Devices used to read and/or write (store) data on a storage media.
Electronic mail (e-mail): A type of mail system that uses computers and the
telecommunication facilities to transmit messages. Messages may be in the form of
letters, memos, reports, or graphic displays.
Electronic spreadsheet: Computer software that has rows and columns used for
doing a number of calculations and forecasting future trends.
Floppy disk: A floppy disk or simply a diskette is made up of a small flexible disk
coated with iron oxide. This disk is covered with a plastic protective case. It is
portable thus making it the most common type of storage device used with
microcomputers.
Hard copy: Hardcopy refers to the tangible output produced mostly on a piece of
paper by devices such as printers and plotters.
Hard disk: Also referred to as a hard drive or a Winchester disk, is a sealed unit in
which are shiny, metallic disk platters and read/write heads that reads and records
data on the disks.
Information processing cycle: The full set of operations that take place, from
collection of input data to the availability of output (information).
Input/output (I/O) devices: Devices used for entering data to be processed and for
reporting the results of processing.
Menu: A program s list of user choices or possible actions usually shown on the
screen. Choices are usually expressed in simple language statements for ease of
use.
Microcomputer: The name given to a small, low cost computer system with a
microprocessor as its brain. A microcomputer can perform input, processing,
75
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366
storage and retrieval, and output operations rapidly, accurately, automatically, and
economically despite its relatively small physical size.
127
Optical disk: These are disks on which data is recorded using a laser beam (a very
strong concentrated light). The beam bums the thin shiny reflective surface to
record data.
Plotter: One type of graphics printer used to provide hard copy of graphical output.
The output appears in such forms as multicolored charts, graphs, diagrams and
maps.
Random-Access Memory (RAM): A type of main memory that holds data and
information temporarily before and after processing. It is called random access
memory because the data contained in each storage address can be directly
retrieved without regard for the sequence in which it was, stored.
Read-Only Memory (ROM): The other type of main memory with data or
instructions permanently or semi permanently recorded in it. This means that no
new data can be transferred in to ROM during processing. ROM is used to store
program instructions that the computer always needs to operate. '
Storage: The storing of data and information for future us. The length of time the
data is stored can vary from less than a second to months or even years.
Supercomputer: The largest, fast, and most expensive type of computer available.
They can perform hundreds of millions of complex scientific calculations in a
second.
Volatile memory: The term applied to semi-conductor memory because its content
is lost when the electric current is turned off. The content must be stored on an
auxiliary storage if it is to be used again.
77
VOEA CYBER AND COMPUTER SERVICES- 07467076/0751488366