Computer Applications
Computer Applications
Booting
Types of Booting
Q. Explain the circumstances that may prompt a computer user to perform warm
booting.
Classification of Computers
Based on Purpose
General purpose computers – they can perform a wide range of tasks e.g., creating
Word documents, listening to music, browsing the internet etc.
Special purpose computers – are specialized to perform a specific task e.g., aircraft
flight control, patient diagnosis, process control in factories etc.
Based on Size
Computer Ergonomics
It is the practice of making sure the computer design and the workspace
arrangement are set up in way that reduces the risk of pain, fatigue or injury on the
part of the user. The measures that can contribute to reduced pain, fatigue or injury
on the user include:
❖ Lock the computer room while not in use to prevent from theft.
❖ Close the windows when it rains to prevent entry of draughts (rain droplets).
❖ Blow dust from the computer equipment regularly.
❖ Use a piece of cloth and a cleaning agent to wipe out dust from the external
parts of computer.
❖ Do not place drinks or food near the computer.
❖ Safely keep discs (CDs and DVDs) in their casings and store them in
shelves.
1. Processor type and speed – latest processor types are more efficient than the
previous ones. For example, a core i7 processor is more efficient than a core
i5 processor, which in turn is more efficient than a corei3 processor. Speed is
measured in terms of Hertz. A 2 GHz is faster than a 1 GHz computer.
2. Memory (RAM) capacity – the bigger the RAM capacity the better the
computer performance. Memory is measured in terms of Bytes. For
example, a computer with 4 GB of memory capacity is more powerful than
that with 3 GB of memory capacity.
3. Hard disk capacity – bigger storage means more data stored.
4. Cost – the computer to be bought should be affordable.
5. User needs – the user needs to know what the main needs for buying the
computer are. For instance, if the computer is mainly for producing
engineering drawings or playing video games then it should have a highly
effective graphics card, have large enough monitor size, large RAM and disk
capacities, and be of very high speed. A computer bought by a student
mainly for things like browsing the internet, listening to music, typing class
assignments needs not to be a powerful computer.
6. Portability – if your work involves a lot of movement then you should buy a
portable computer.
7. Warranty –
This is the brain of the computer. It is where data processing takes place. It is made
up of Control Unit and Arithmetic Logic Unit (ALU).
Computer Memory
Computer Memory refers to the physical devices in a computer used to store data
and/or instructions either temporarily or permanently. It is classified into Primary
memory and Secondary memory.
Primary Memory
It is a type of memory that temporarily stores data and instructions that are
currently being processed.
Characteristics of RAM
Characteristics of ROM
This is memory that stores data permanently for future use. It is non-volatile. There
are three types of secondary storage devices:
These include hard disk drive, magnetic tape, floppy disk (diskette). They store
data by means of electromagnetism. Hard disk drive, or simply hard disk, is also
known as magnetic disk and is normally used as the internal secondary storage for
computers. There are also external hard disk drives available in the market.
Magnetic tape is cheaper than magnetic disk but is much slower because it uses the
sequential method of data access. It is rarely used nowadays.
NB: Floppy disk (diskette) had a storage capacity of 1.44MB. It is now obsolete.
These include CDs, DVD and Blu-ray discs. They store data by means of light
from a laser beam.
They are a new generation of storage devices. They are slowly replacing the
traditional hard disks. They use flash memory to store data.
They have no moving parts, unlike the magnetic disks, hence, they are significantly
faster than the hard drives. They are, however, more expensive per MB than hard
disks.
Computer Bus
A computer bus is an electronic path within the computer that allows components
to communicate with each other.
The main types of Computer Bus are: Data Bus, Address Bus and Control Bus.
1. Data Bus – transmits data and instructions to and from the processor (CPU).
2. Address Bus – transmits address of the memory location or peripheral
devices where data is to be fetched.
3. Control Bus – transmits command/control signals from the processor to the
other components in the computer, i.e., main memory, I/O devices,
secondary storage.
Input Devices
An input device is a peripheral which receives data from the user and sends it to
the computer for processing. They are classified into: keyboard, pointing and touch
devices, scanning devices, point-of-sale devices, document readers, speech
recognition.
Keyboard
It has keys which are categorized into: Alphanumeric keys, Special keys, Function
keys, Navigation keys, Arrow keys, Numeric keypad.
Mouse
It is used for pointing at, selecting and clicking on text, objects, commands, icons.
Parts of a Mouse
Mouse Techniques
1. Point 4. Double-click
2. Left-click 5. Click-and-drag (drag-and-drop)
3. Right-click
Q. State the uses of the following input devices: MICR, OMR, OCR, stylus,
joystick, barcode reader, scanner, light pen, touchscreen, voice input (microphone),
touchpad, webcam, smart card, graphics tablet, card reader, sensor.
Output Devices
These are peripheral devices that are used to produce computer output either in
hardcopy or softcopy. Hardcopy output is produced on a physical medium while
softcopy output is displayed on screen or listened to.
These monitors employ CRT technology, which was used most commonly in the
manufacturing of television screens.
While CRT monitors can still be found in some organizations, many offices have
stopped using them largely because they are heavy, bulky, and costly to replace
should they break.
The advantages of LCD monitors include their compact size which makes them
lightweight. They also don’t consume much electricity as CRT monitors, and can
be run off of batteries which makes them ideal for laptops.
Images transmitted by these monitors have little flicker. However, this type of
monitor does have disadvantages, such as its relatively high price, an image quality
which is not constant when viewed from different angles, and a monitor resolution
that is not always constant.
LED monitors are the latest types of monitors on the market today. These are flat
panel, or slightly curved displays. LED monitors are said to use much lesser power
than CRT and LCD and are considered far more environmentally friendly.
The advantages of LED monitors are that they produce images with higher
contrast, have less negative environmental impact when disposed, are more durable
than CRT or LCD monitors, and features a very thin design. They also don’t
produce much heat while running. The only downside is that they can be more
expensive, especially for the high-end monitors like the new curved displays that
are being released.
Printer
Printers vary in size, speed, sophistication and cost. More expensive printers are
used for higher-resolution color printing.
Classification of Printers
Impact printer: are printers that form characters through direct physical contact
between the ink ribbon and the paper. Non-impact printers: are printers that form
characters and images without direct physical contact between the ink ribbon and
the paper.
Plotter
They mainly produce large graphical output, e.g., diagrams, maps, engineering
drawings, etc. Plotters can print on A1 sized paper, unlike printers which can be
used to print on A3 sized paper at most. The two types of plotters are: flatbed
plotter and drum plotter.
Software refers to all programs which enable the computer hardware to operate
effectively, and also help the user to perform various tasks on the computer.
Without software a computer cannot operate.
1. System software
2. Application software
System Software
This refers to software that manages the operations of a computer and makes sure
that the computer works efficiently. System Software is installed in the computer
during manufacture.
Application Software
These is a software that are developed to perform a specific task for the user e.g.,
creating a text document, performing financial calculations, drawing architectural
designs, etc.
These are programs developed to carry out specific tasks for a specific
organization, company or individual and may not suit the needs of other
organizations, companies or individuals. Types: business process automation
system, automated invoicing, etc.
These are software developed and supplied by software companies like Microsoft,
Adobe, at a price. They are designed for many users and can meet the requirements
or needs of the many users in the market. Types include: Word processors,
database applications, presentation applications, email applications, web
browsers, spreadsheets, graphics software, desktop publishing applications.
Operating System
User Interface
It is the oldest type. The user interacts with the computer system by typing
commands. It is used in MS-DOS.
Pros
Cons
Menu-driven Interface
This interface comprises a series of menus and sub-menus which the user access by
pressing buttons. It is usually used in ATMs, ticket machines, etc.
Pros
Con
In this type of interface, the user interacts with the computer by using a pointing
device such as mouse, trackball or touchpad. GUI uses a WIMP system.
Merits of GUI
i. Many programs use GUI hence use a similar interface. It is, therefore, easy
to learn how to use a new program
ii. Most operations are self-explanatory, so the user does not have to memorize
commands like in command line interface
iii. GUI supports multiprogramming where multiple programs can run
concurrently, each having its own window
iv. Most GUIs provide good help facilities
v. It is easier and faster to use than command line interface
vi. The interface has a more appealing look than command line interface
Demerits of GUI
Form-based Interface
This allows the user to interact with the computer through voice or speech
commands.
Introduction
Data Security
Data security refers to the protection of data and information from accidental or
international disclosure to unauthorized persons.
Data Privacy
Private data is the data which belongs to an individual and must not be accessed
by or disclosed to any other person, without direct permission from the owner.
COMPUTER VIRUSES
A computer virus is a destructive program thar attaches itself to other files when
the files are opened for use, and also installs itself on the computer, without the
knowledge of the user. It is a program designed specifically to damage other
programs or interfere with the proper functioning of the computer system. It is able
to replicate itself and spread in the computer system.
i. It can delete or modify data and files on storage devices (disks) or memory
during normal program execution
ii. May attack the format of a disk making any program or data on it impossible to
recover.
iii. Systematically destroy all the data in the computer memory.
iv. Can change keystroke values or data from other I/O devices, e.g., change the
effect of the SHIFT key.
v. Consumes computer memory space, hence, slowing down its performance or
causing the system to crash.
vi. It can change colour of the display.
vii. Can cause boot failure.
a) Boot failure
b) Files and programs disappearing mysteriously
c) Unfamiliar graphics or messages appearing on the screen. For example, the
virus might flash a harmless message such as Merry Christmas on the computer
display
d) Gradual filling of the free space on the hard disk
e) Corruption of files and programs
f) Program taking longer than usual to load
g) Some programs may fail to open
h) Slowing down of computer system performance e.g., files and applications
taking too long to load, or booting process becoming too slow
i) Unusual error messages occurring more frequently
j) Frequent read/write errors
k) Unknown programs starting on your computer
l) Computer hangs anytime when running a program
m) Less memory available than usual
n) Change in the size of files
o) Computer may reboot itself several times
p) Frequent crashes. Does your computer randomly crash on you? Does your
screen freeze and become the infamous ‘blue screen of death’? This could be a
sign that your device has been infected with a virus.
q) Computer battery draining quickly – as the virus continues to multiply, it uses
resources from your computer and creates more activity on your computer. As a
result, your battery life is diminished.
❑ Restrict the movement of foreign storage media e.g., diskettes in the computer
❑ Do not boot your computer from disks which you are not sure are free from
viruses
❑ Avoid pirated software; if possible, use the software from the major software
houses
Computer worm
A computer worm is a type of malware that spreads copies of itself from computer
to computer. A worm can replicate itself without any human interaction, and it
does not need to attach itself to a software program in order to cause damage.
Worms can modify and delete files, and they can even inject additional malicious
software onto a computer. Sometimes a computer worm’s purpose is only to make
copies of itself over and over — depleting system resources, such as hard drive
If you suspect your devices are infected with a computer worm, run a virus scan
immediately. Even if the scan comes up negative, continue to be proactive by
following these steps.
✓ Keep an eye on your hard drive space. When worms repeatedly replicate
themselves, they start to use up the free space on your computer.
✓ Monitor speed and performance. Has your computer seemed a little sluggish
lately? Are some of your programs crashing or not running properly? That
could be a red flag that a worm is eating up your processing power.
✓ Be on the lookout for missing or new files. One function of a computer worm
is to delete and replace files on a computer.
Q. Explain the meanings of the term malware and the term spyware.
Unauthorized Access
Data is always under constant threat from people who may want tom access it
without permission. Such persons will usually have bad intentions, either to
commit fraud, steal information and destroy or corrupt the data. Unauthorized
access may take the following forms:
a) Enforce data and information access control policies on all the employees to
control access to data
b) Keep the computer room closed when nobody is using it
c) Reinforce weak access points e.g., doors and windows with metallic grills and
burglar alarms
d) Use file passwords to prevent any person from getting access to the electronic
files
e) Enforce network security measures e.g., use of firewalls
f) Encrypt the data and information during transmission
g) Perform frequent audit trails to identify threats to data and information
Theft
➢ Create backups and store in locations away for the main computing center
➢ Reinforce weak access points e.g., the windows, doors and roofing with
metallic grills and strong padlocks
➢ Put burglar proofs in the computer room
➢ Employ guards to keep watch over data and information centers and backups.
Computer Crime
Q. Discuss measures that can be taken to protect computers and computer users
against cyber crimes
Computer Security
It is the safeguarding the computer and the related equipment from the risk of
damage or fraud. It can also be defined as protection of data against accidental or
deliberate threats which might cause unauthorized modification, disclosure or
destruction.
Q. Explain the possible precautions that can be taken against data loss in
computers.
NETWORKING
a) Client-server Network
b) Peer-to-Peer Network
Each device on the network acts as server and client, there is no central computer
acting as the server.
Advantages
1. Resource sharing - a single resource e.g., printer, scanner etc., can be shared
among many users on the network.
2. File sharing – files stored on one device can be accessed among different
users connected to the network.
3. Increased file storage and backup – data can be stored or backed up on the
server or the other connected computers and can still be accessed by
everyone on the network. One standalone computer may not have enough
storage capacity to store all the required data, hence the need to utilize the
storage on the other computers on the network.
4. Network users can communicate by email, instant messenger, video
conferencing, etc.
Disadvantages
3. Overdependency on the server: If the server breaks down then the network
will be disabled, hence unable to offer the needed services.
Network Topology
The types of network topology include: star topology, mesh topology, tree
topology, bus topology, bus topology.
1. Star topology: all the devices are connected through a central hub.
2. Mesh topology: each device is connected to every other device, i.e., there
exists a link between any two devices.
3. Bus topology: all the nodes are connected to a single cable known as bus
which is responsible for transmitting data between from one to another.
4. Ring topology: each node is connected to the two adjacent nides in a circular
fashion.
5. Tree topology: all the nodes are linked together like tree branches. It is a
combination of bus and star topologies.
INTERNET
HTTP – provides a procedure for a web browser to request information (web page
or file) from a web server, so as to display that information to the user.
Telnet – Telnet provides a connection to the remote computer in such a way that a
local terminal appears to be at the remote side.
Internet of things –
Web server – refers to the computer where the web content is stored. It is used in
running (hosting) websites.
Website – refers to a set of web pages usually containing hyperlinks to each other
and made available online by the website owner.
Cloud computing –
Home page – it is the page that provides the introduction or content of a website
with links to other web pages of the website.
Search engine – is a software that helps people to carry out web searches.
Browsing/Surfing –
Blog –
Wi-Fi –
Hotspot –
This is a method of sending and receiving messages and file electronically from
one device to another through the internet.
Email users usually have email addresses. An email address is divided into 3
parts: username, at sign and domain.
Example: [email protected]