Form 5,6 Edited Notes
Form 5,6 Edited Notes
Subsidiary
Information and
Communication
Technology
pg. i
UACE Subsidiary ICT
List of Acronyms
ALU – Arithmetic Logic Unit
ASCII –American Standard Code for Information Interchange
BIOS – Basic Input Output System
BPS – Bits per Second
CAD/M – Computer Aided Design/ Manufacturing
CAL – Computer Aided Learning
CAT 5 – 'Category 5' cable
CD – Compact Disc
CD-R – Compact Disc Recordable
CD-ROM – Compact Disc Read Only Memory
CD-RW – Compact Disc Re- Writable
CPU – Central Processing Unit
CRT – Cathode Ray Tube
DBMS – Data Base Management System
DDR – Double Data Rate
DFD – Data Flow Diagrams
DOS – Disc Operating System
DSL – Digital Subscriber Line
DTP – Desktop publishing
DVD – Digital Versatile Disc
EFT – Electronic Funds Transfer
EULA – End User License Agreement
FAQ – Frequently Asked Questions
FIFO - First in First Out
FNF – First Normal Form
FTP – File Transfer Protocol
GB – Gigabyte
GIF – Graphic Interchange Format
GIGO – Garbage In Garbage Out
GPS – Global Positioning System
GUI – Graphical User Interface
GW – Gateway
HCI – Human Computer Interaction
H/D – Hard Disc
HTML – Hyper Text Mark-up Language
HTTP – Hyper Text Transfer Protocol
IC – Integrated Circuit
ICT – Information and Communication Technology
IP – Internet Protocol
IRC – Internet Relay Chat
pg. ii
UACE Subsidiary ICT
TABLE OF CONTENTS
TOPIC 1: INTRODUCTION TO COMPUTING ………………………….......... 1
SUB TOPIC 1; INTRODUCTION TO COMPUTERS ……………………. 1
SUB TOPIC 2; WORLD OF ICTS ………………………………………… 2
SUB TOPIC 3: IMPLICATIONS OF ICTS ……………………………….. 3
pg. iii
UACE Subsidiary ICT
CONTENTS
Acronyms ...................................................................................................... ii
Topic 1: Introduction to Computing ........................................................... 1
Topic 2: Computer Management ................................................................ 6
Topic 3: Computer Laboratory Care and Maintenance ................................ 13
Topic 4: Computer Word Processing .......................................................... 18
Topic 5: Computer Hardware ...................................................................... 20
Topic 6: Computer Software ....................................................................... 39
Topic 7: Electronic Spreadsheets I .............................................................. 47
Topic 8: Internet and World Wide Web ....................................................... 50
Topic 9: Computer Word Processing II .......................................................
Topic 10: Electronic Presentation ............................................................... 56
Topic 11: Data Communication and Networking ....................................... 58
Topic 12: Electronic Publication ................................................................. 68
Topic 13: Electronic Spreadsheets II ..........................................................
Topic 14: Databases .................................................................................... 70
Topic 15: System Security, ICT Ethical Issues and Emerging Technologies 73
pg. iv
UACE Subsidiary ICT
What is a computer?
The word "Computer" is derived from the word "Compute" which means to calculate. In the past,
the computer was normally considered to be a calculating device used to perform arithmetic
operations. But today, a computer is used in every field of our daily life to solve most of the
problems.
A computer can also be defined as an electronic device (machine) that accepts the input of data,
processes or manipulates the given data according to the predefined instructions, stores the data
and outputs the desired output for future use.
Like any other system, a computer system also requires an input which is processed to get a
desired output. In the case of computers, two kinds of inputs are required. One; the basic or raw
data, and two: a set of instructions containing the methodology (way) to process this data. This set
of instructions is called program or software.
STORAGE
STAGE
An illustration above shows a series of information processing cycle commonly known as input,
processing, output and storage (IPOS).
Computer instructions are entered into the computer and input devices like keyboard, scanner etc
are used to feed data into the computer. At the processing stage, processing devices like the central
processing unit (CPU), motherboard etc process data into information. Then data/information
output and displayed using output devices such as printer, monitor among others. At the storage
pg. 1
UACE Subsidiary ICT
stage, data/information is stored on storage devices for future use. Such devices include compact
disks, hard disks among others.
In summary
Input: Computer receives data from input device.
Processing: Computer’s central processing unit (CPU) processes the data into information.
Output: Meaningful information displayed on monitor or printed out.
Storage: Saves results to computer’s hard drive or other types of secondary storage.
REVIEW QUESTIONS:
1. Define IPOS cycle.
2. Describe an IPOS cycle?
CHARACTERISTICS OF COMPUTERS
a. Computers store data (storage): A computer can store large volumes of data permanently.
Users can use this data at any time. Thus text, graphics (pictures), audio and video files can
be stored easily.
Memory (power of remembering): a Computer has a brain, but unlike human (Man) beings.
A computer can store data and information, and recalled as long as you require it, for any
number of years because of its secondary storage capability. A data and information can be
retrieved as long as desired by the user and can be recalled, as when required. The
information recalled would be as accurate as on the day when it was fed to the computer.
b. Computers process data: computers can perform different types of processing like addition,
subtraction, multiplication and division. They can also perform logical functions like
comparing two numbers to decide which is bigger and which smaller.
c. Computers are accurate (accuracy): The word accuracy means providing results without
any error(s).Computers can process large amounts of data and generate error-free results.
Thus, a modern computer performs millions of operations in one second without any error.
d. Computers are speedy: Computers can work at very high speed and are faster than human
beings. The time used by the computer to perform an operation is known as processing
speed. The computer speed is best measured in mega hertz (MHz) or gigahertz (MHz).
e. Computers are automatic (automation): Computers are automatic machines, because they
start any given task, they carry on until the task is finished without any human assistance.
However, computers being machines cannot operate themselves. For instance, they cannot
start printing the work without being instructed by any person.
f. Computers are versatile (versatility or flexibility): Versatility is the most characteristic of
computers. Computers are capable doing more than one task at the same time. This is also
known as multi-tasking. For instance one may use a computer to print out documents. In the
next time you may use a computer to re-print the same documents and playing computer
games as well.
g. Computers are diligent (diligence or consistency): Computers have the ability to perform
the same task over for long time without getting tired. Therefore, computing devices must be
able to perform the same routines repeatedly. This is evidenced in industrial robotics like
those in car assembly lines.
h. Processing: A computer can process the given instructions. It can perform different types of
processing like addition, subtraction, multiplication and division. It can also perform logical
functions like comparing two numbers to decide which one is the bigger etc.
i. Communication: Most computers today have the capability of communicating with other
computers. We can connect two or more computers by a communication device such as
pg. 2
UACE Subsidiary ICT
modem. These computers can share data, instructions, and information. The connected
computer are called network.
REVIEW QUESTIONS:
1. Define and explain the characteristics of a computer.
2. Differentiate a computer from a type writer.
SUB-TOPIC 2: WORLD OF ICTs
ICT is a short form (acronym) which stands for Information and Communications Technology or
technologies.
Definition of ICT:
ICT is the study or business of developing and using technology to process information and aid
(support) communications.
ICT is the comprehensive term that includes any communication device or application that
covers:-
- Radios - Cellular phones
- Television - Satellite systems
- Computer and network hardware and software etc
Computers are widely used in our everyday life to accomplish various tasks. Their uses are wide as
the user can imagine and include the following:
a. ICTs are used in business environment; many businesses have realized the benefits of
computers. For instance, with most stock exchanges (money markets), you can only need to
sit in front of your computer, whether in your office or at home and carryout business with
various companies worldwide.
b. Are used to carryout Scientific Research; recent advancements in scientific research have
been possible mainly due to the use of computers. New drugs have been introduced,
exploration into space is possible and in places where human beings cannot survive. In
addition, machines equipped with various computers are sent in space and data transmitted
back to earth.
c. Education purposes; with the development of computers, the Internet has emerged. Many
local institutions have linked up with big universities and libraries overseas, hence
facilitating education and research. This has further led to the creation of Virtual
Universities. Virtual universities are universities with no physical buildings for lecture rooms
or halls of residence, but of course giving the necessary lectures on the computer via the
Internet. Thus the term “Virtual Reality”.
d. Communication: We use computers to send and receive messages from one place to another
using E-mail service, thus files and folders can be attached onto e-mail messages.
In addition, people use computers to call others using electronic gadgets like mobile phones,
fax machines and this allows business to be carried on smoothly.
e. Banking: Computer users can know how different bank accounts operate while using
computers as well as transferring money from one account to another using Internet. This is
at times known as Internet banking.
People are able to check on their bank statements from their homes without necessarily going
to banks. This reduces on the time that one would have spent going to line- up in banks.
f. Security: Computers are of great advantage in keeping law and order in fighting crime and
maintaining stability. For example; the police are now able to keep a database of finger prints
(biometrics) which are automatically analyzed by the computers.
pg. 3
UACE Subsidiary ICT
g. Research: Businessmen are able to know various prices of commodities while using
computers. This enables them to produce the commodities of high quality to compete with
others on the market.
In agriculture, researchers use computers to determine fertilization programs that optimize
yields of various crops.
h. Employment opportunities: Computer users are able to find jobs by visiting different
websites that provide job tips and numerous online job listings. Such websites include;
www.jobsonline.com
Computers have also provided career chances such as database administrators, computer
trainers, web designers, network administrators, system analysts and computer programmers.
i. Transport: Passengers are able to know the flight schedules by visiting the websites of
different travel companies. Such travel companies include; British Airways, Air Uganda etc.
Travel tickets are always computerized which enable transport officers to enter passengers’
data who traveled in a given period of time, say weekly or monthly journeys.
j. Marketing: Different business organs and companies use computers to know how best their
products are competing with other competitors. This is done by checking on business
websites like; www.amazon.com to know which companies are booming and which ones
have gone out business.
More to that, different websites provide a list of catalogues where customers are able to
choose their best commodities and prices as well. These include; www.wansung.com,
www.jomayi.co.ug among others.
k. Commerce and E-business: This refers to the buying and selling of goods and services.
Thus people are able to carry out commerce over the Internet by placing orders of goods they
want. This is also known as the Electronic Commerce (E-commerce).
l. Health care: Computers have greatly been used to maintain patients’ records, where by
health workers are able to know relevant information about their patients. These include;
patient’s name, place of birth and the diagnosis to be examined.
Doctors use computers to monitor patients’ vital signs in hospital rooms. They also use
computer-controlled devices during operations like heart surgery.
m. Data storage: Computers can store large volumes of data for the users. This helps
businessmen to keep business related records for future reference.
n. Entertainment: Computers have played a big role in entertainment. A Musical Instrument
Digital Interface (MIDI) exists to link a musical instrument to a computer to control very
many instrumental sounds.
o. Automated production: It involves computerization of production in factories. In other
words, it is computer-aided production which does not require high man power. This also
reduces on the costs of production because of the efficiency of machines.
pg. 4
UACE Subsidiary ICT
d. ICT tools like computers, projectors, smart boards etc help in teaching ICT literacy skills
among all people which builds confidence in them.
e. Easier planning and presentation of lessons and designing learning materials for example
using presentation softwares like Microsoft power point.
f. ICTs have provided wide access to up to date online students’ and school data, anytime and
anywhere by teachers and students through using computer systems.
DISADVANTAGES
- ICT facilities like computers are expensive to buy and maintain.
- Health problems resulting from using computers for a long period of time. Such health
issues may include; eye strains, backache among others.
- ICTs have caused moral degeneration. This is as a result of watching pornographic movies
and pictures mainly on computers and television sets.
- ICTs need special training to be able to use some of these equipments.
-
DISADVANTAGES
i. There are conmen and women who practice phishing and pharming especially on internet
who host websites claim to have genuine business and end up robbing people of their
money.
Phishing is the act of attempting to acquire sensitive information like user names,
passwords and credit card details by disguising as trustworthy source.
Pharming is a practice in which malicious codes are installed on computers misdirecting
users to fake (fraudulent) websites without their knowledge.
ii. It is less secure: The information carried on ICT channels especially on the internet has no
guaranteed security. Hackers gain access to secret and important information. For example;
hackers can gain access to your credit card PIN number during online payments.
- Internet provides online audio and video search engines like YOUTUBE.com to its users.
REVIEW QUESTIONS
1. Define the term computer and various characteristics associated with them.
2. Discuss the role of computers in the society today.
3. What is “Virtual Reality”?
4. What do you understand by the term “Computerisation?”
Cold boot: Cold boot is the starting of a computer which has not been in use.
pg. 6
UACE Subsidiary ICT
Warm boot: This is the process of restarting or resetting a computer that is already turned on.
The warm boot; sometimes the computer stops responding to the commands given by the user. In
such cases, we need not switch the power off to restart the computer.
We can restart the computer by pressing CTRL + ALT + DEL keys together. On some computers,
RESET switch is there; the reset switch can be used to restart or reboot the system.
In warm boot, ROM does not test RAM or the peripherals. This is known as warm booting.
Boot sequence:
i) The power supply sends an electric signal to the motherboard and other devices located
in the system unit.
ii) The CPU resets itself and looks for the ROM that contains the BIOS.
iii) The BIOS executes the Power On Self Test (POST) to make sure that the computer
hardware is connected properly and operating correctly.
iv) The results of the POST are compared with data in a CMOS chip on the motherboard.
v) If the POST is completed successfully, the BIOS looks for the boot program that loads
the operating system.
vi) Once located, the boot program is loaded into memory and executed, which then loads
the kernel of the operating system into RAM.
vii) The operating system loads system configuration information, and the remainder of
the operating system is loaded into RAM, and the desktop and the icons display on the
screen.
pg. 7
UACE Subsidiary ICT
pg. 8
UACE Subsidiary ICT
What is a file?
A file is a collection of data on a single memory location unit given a unique name.
OR: a file is a collection of related information store on a disk.
A file can be a word document, music, video or photo file. Text files normally contain written text
and are called word documents.
A file can also be defined as a collection of data or information that has a unique name called the
file name.
FILE EXTENSIONS
A file extension is the last part of a file name after the dot (.) and they may include:-
.doc Microsoft Word document
.xls excel file
.db Microsoft database file
.ppt Microsoft power point file
.command Command file
.txt text file
.htm Web file
.gif graphics file
.sys system file
.bat batch file
.exe Executable file
Batch file: These are usually programs or utilities or virus guards or even DOS commands.
System files are usually drivers or programs that help other programs to run
Executable file: These are usually files or programs that use the same operating system.
A period is a dot (like a full stop) that separates the file name and the extension.
An extension: It is an identifier of a particular file with a group of files made from the same
application or designed to execute the same command
E.g. My work . doc
pg. 9
UACE Subsidiary ICT
My Documents
My Network places
Online services
The directory is a list of files on a disk that gives file names and sizes.
EXERCISE
Given the file path C:\user\desktop\Mugisha\Letter.doc, identify the following:-
Filename: …………………… Letter
File type: ……………………. .doc
Profile: ………………………. Desktop
Folder: ………………………. Mugisha
Location: ……………………. C:/user
Customizing the Desktop refers to changing the desktop appearance to what you want to look like.
One can customize the desktop by:
Changing the background image or theme
Change which icons or shortcuts to appear on the desktop
Resize the task bar
Change the appearance position of the start menu
Font size of desktop icon names
Screen resolution desktop colour quality
Selecting screen savers and screen saver wait time
Screen refresh rate etc
To do all these, right click on any free space on the desktop and select properties option. Use the
dialog box that appears to customize your desktop.
Shortcut Menu: Shortcut menus list commands that are context-sensitive, i.e. commands
commonly used when working with the selected object.
v. File viewer utility: it is a utility that displays and copies the contents of a file.
vi. File Compression utility: This reduces or compresses the size of a file.
pg. 12
UACE Subsidiary ICT
A compressed file takes up less storage on a hard disk or floppy disk, which frees up room
on the disk and improves system performance.
Compressed files sometimes are called zipped files because they usually have a .ZIP
extension, and therefore they must be unzipped or restored to its original form before
being used.
vii. Diagnostic utility: This compiles technical information about a computer’s hardware and
certain system software programs and then prepares a report outlining any identified
problems.
viii. Disk scanner utility: It is a utility that detects and corrects both physical and logical
problems on a hard disk or floppy disk, and searches for and removes unwanted files.
A physical problem is one with the media, such as a scratch on the surface of the disk.
A logical problem: It is the one with the data, such as a corrupted file allocation table
(FAT).
ix. Disk defragmenter utility: It is a utility that reorganizes the files and unused spaces on a
computer’s hard disk so that data can be accessed more quickly and programs can run
faster.
When the contents of a file are scattered across two or more non-contiguous sector, the file
is fragmented.
Computer literacy is defined as the knowledge and ability to use computers and related
technology efficiently. It ranges from skills covering levels from elementary use to programming
and advanced problem solving.
Computer skills: It refers to the ability to use the software and hardware of a computer.
pg. 13
UACE Subsidiary ICT
computer security
social implications of computers
how to use a computer
managing files and editing pictures
composing, editing and printing documents
Disadvantages
- there is pornography associated with the use of computers
- people at times waste time on useless chats
- computers cause health hazards like eye strains.
pg. 14
UACE Subsidiary ICT
Supply) units to power all equipments must be there, proper cabling using trunks should be
done and working with an experienced electrician.
7. Physical security: this deals with safety of the physical equipments and how they are
protected from both the internal external thieves. This should be done by using locking
equipments like metallic doors and windows, use of burglar proofs in windows and doors.
In addition, there must be a laboratory attendant to guide users all the time.
pg. 15
UACE Subsidiary ICT
3. Do not attempt to open the system case or any other computer components. This is done to
avoid the damaging of computer hardware components, and must be done by computer
technical personnel.
4. Do not attempt to make any repairs to any of the computer components. This must be done
by a technical person who has the knowledge about computer repair and maintenance.
5. Leave your bags and other baggage at the help desk.
6. If you get any difficulties of any nature, seek assistance from the teacher or systems
administrator.
7. Any software brought in the Lab should be cleared first with the Systems Administrator or
the teacher, otherwise they will be confiscated
8. Do not attempt to delete work that is not yours.
9. Do not start the computer when the floppy/CD-ROM is inside the floppy drive/ CD-Rom
drive.
10. Access to pornographic materials or websites is strictly prohibited.
11. When you finish working remember to shutdown the computer properly by choosing the
shutdown option from the start menu.
12. Students are not allowed to create accounts or change passwords on any of the computers
in the Lab.
13. LOG on your computer as STUDENT. This is done to ensure that students cannot install
(put) in other computer software programs which are not authorized in the computer Lab.
14. Turn off the computer accordingly after use. In order to turn off the computer, click on
Windows start button and choose TURN OFF COMPUTER. This one depends on which
operating system you are working with.
15. Switch off all power supplies before leaving the computer lab.
16. Internet facility is strictly for educational purposes only.
17. Save all your work in external storage device and not in the computer.
18. The computer Lab should be kept clean and tidy. This is done to make sure that the
computer lab is free from any dust that may harm the computer systems.
pg. 16
UACE Subsidiary ICT
will not be needed for now then that files can be deleted or saved onto any storage medium
like external disk drives, floppy diskettes or on CDs.
- Cleaning computers on regular basis: This includes cleaning inside the system unit,
keyboard, monitors and other hardware components. For one to undertake this task, he/she
should utilize the appropriate tools like electric blowers and must have the proper
understanding of what is to be done.
pg. 17
UACE Subsidiary ICT
a. Prevents loss of information: This can be done by hackers (intruders) who may get familiar
with the computer system s as they monitor them over time and end up getting access to
unauthorized information.
b. Increases productivity of software and hardware: It should be noted that new versions of
software and hardware perform better than older ones. And therefore, they are more
productive and work properly.
c. It speeds up your computer: this should be done by running scheduled tasks such as disk
cleanup and defragmentation.
De-fragmentation makes your files to be put to where they are supposed to be and speeds up
your computer.
d. Protects a computer from viruses: Having updated antivirus software programs enable you to
detect and delete any viruses in your computer.
e. A computer lasts longer: Regular servicing of computers make them stay for a long period of
time.
f. Reduces on operational costs: It is important to perform regular maintenance because if it
accumulates, it costs a lot when you carryout maintenance at once.
g. It prevents CPU from overheating: When a CPU is kept within a stable range that is
conducive; the system functionality remains more consistent. And thus, the CPU’s power-
saving options should be set for maximum performance without risk of overheating.
pg. 18
UACE Subsidiary ICT
Editing: It is the process of making changes to the existing content of the document.
Printing: This is the processing of sending a file to a printer to generate output on a medium such
as paper.
a) Inserting: It is when text is added to a document and the surrounding words automatically
move to make room for the inserted text.
b) Deleting: When text is deleted or removed from a document, the surrounding words
automatically move to fill in the gaps left by the deleted text.
c) Cutting: When text is cut, it is stored in a temporary location called the Clipboard; the
original text is removed from its place.
d) Copying: When text is copied, it is duplicated and stored in the in the Clipboard. However,
the original text remains in place.
e) Pasting: When text is pasted, it is placed from the Clipboard into the document.
- Word wrap: Allows a user to type continually without pressing the enter key at the end of
each key.
- Spell checker: Allows a user to check the spelling of a whole document one time.
- Grammar checker: This reports grammatical errors and suggests ways to correct them.
- Mail merge: This creates form letters, mailing labels and envelopes.
- Macros: It allows a user to record or save frequently used key strokes and instructions,
which can be executed later by running the corresponding macros.
- Templates: Allows a user to create documents which are frequently used.
- Clip art gallery: Allows a user to insert drawings, diagrams and photographs into a
document.
- Thesaurus: It suggests alternative words with same meaning (i.e. synonyms) for use in the
document.
- Automatic page numbering: This numbers the pages automatically.
- Find and search: This allows the user to locate all occurrences of a particular character,
word or phrase.
pg. 19
UACE Subsidiary ICT
Disadvantages
- Word application can only be operated by people who are computer literate.
- Word processing applications have so many commands that cannot be learnt with in a short
period of time.
- It can lead to unemployment since a single computer can do work for many people.
- Data can easily be lost in case of power failure.
Computer hardware can also be defined as; a term that describes all input hardware, processing,
storage and output tangible components of a computer.
pg. 20
UACE Subsidiary ICT
The Central Processing Unit (CPU) also called the processor or the microprocessor is the main
component of the computer. The CPU is the main brain of the computer and provides the ability to
computer for executing any given instruction and also tells the computer how to control the flow of
instructions.
Components/parts of the CPU
1. The Arithmetic Logic Unit
2. The control unit
3. Memory unit
1. THE ARITHMETIC LOGIC UNIT (ALU): This performs the calculations and operations of
the data. The ALU also performs the execution part of a machine cycle.
Specifically, the ALU performs the arithmetic, comparison and logical operations.
i. Arithmetic operations include addition, subtraction, multiplication and division.
ii. Comparison operations involve comparing one data item to another, and determine if
the first item is greater than, equal to, or less than the other item.
iii. Logical operations work with conditions and logical operators such as AND, OR, and
NOT.
2. THE CONTROL UNIT (CU): It is the part of the CPU, which controls the activities of other
components both with in and outside the CPU. The control unit also directs and coordinates most
of the operations in the computer.
For every instruction, the control unit repeats a set of four basic operations called the machine
cycle or instruction cycle.
3. MEMORY UNIT: A processor has its own memory inside it in the shape of small cells. Each
memory cell is called a “Register”. Registers are used to carry data temporarily for performing
operations. Thus, the ALU gets data from registers and stores it in registers to perform arithmetic
and logical operations.
A memory unit is a chip (fragment) that holds programs and data either temporarily or
permanently. RAM chips are the computer’s temporary workspace, while ROM chips (flash
memory chips) are used like disk drives which store data until they are erased.
pg. 21
UACE Subsidiary ICT
2. Mid-End computer processor: These are meant for middle intensive (serious/demanding)
tasks. Beyond the standard work you do with mid-end processors, one can do tasks such as
Basic 3D Gaming, casual photo editing, home video creating and multimedia applications.
Some of the common mid-end Intel processors include; Intel core 2 Quad, Intel Pentium
Dual core and Intel core Duo.
AMD Phenom 1x3, AMD Turion family and AMD Athlon family procesors are categorized
into mid-end CPUs.
3. Economy/Basic computer processors: The processors in this group are low performing
CPUs with cheap price. If you are into non-intensive tasks such as simple gaming, office
applications, Internet browsing, E-mail and common graphics, then your choice of processor
is grouped as budget CPUs.
AMD Sempron, AMD Athlon Neo and Intel Atom are grouped into economy processors.
Bit: In binary system, each 0 or I is called a bit, which is short for binary digit. Thus a bit is
the smallest unit of measurement of information.
Byte: It is a group of 8 bits. And a byte represents one character, digit, but the figure is
commonly rounded.
A kilobyte (KB): It is about 1000 bytes (1,024 bytes)
A megabyte (MB): It is about 1 million bytes (1,048,576 bytes)
A gigabyte (GB): It is about 1 billion bytes (1,073,741,724 bytes)
A terabyte (TB): It is about 1 trillion bytes (1,099,511,627,776 bytes)
pg. 22
UACE Subsidiary ICT
A system unit
2) The Motherboard (system board): This is the main circuit board in the system unit and
this houses the CPU chip, main memory chips and expansion slots.
4) The System Clock: This control how fast all the operations within a computer are
performed. The faster the clock, the more instructions the CPU can execute (perform or
carry out) in a second. The speed is measured in megahertz (MHz), with 1 MHz equal to
1million bits (cycles) per second.
5) RAM Chips: These are chips that temporarily hold data and instructions that will be
needed shortly by the CPU. These chips are plugged into the motherboard.
Question: What is the difference between computer memory and computer storage?
Computer memory refers to the computer chips that store information for quick retrieval;
for example RAM.
Computer storage: It refers to the permanent storage place of a computer. That is, where
information can be kept for future use, for example ROM.
RAM chips may be fixed (mounted) on a small circuit board, such as a SIMM (Single
inline Memory Module).
However, modern computers have RAM chips fixed on small circuit board, such as DIMM
(Double inline Memory Module).
pg. 23
UACE Subsidiary ICT
RAM (Random Access Memory): RAM temporarily stores data and instructions for quick
retrieval or access.
RAM is said to be a Volatile memory; i.e. it can lose data when power is switched off.
Types of RAM
DRAM (Dynamic RAM) is a type of memory that must be re-energised
(strengthened/boost) constantly or else its contents will be lost.
SDRAM (Synchronous DRAM) is a faster version of DRAM because it is synchronized
(coordinated) to the system clock.
RDRAM (Rambus DRAM) is a newer type of DRAM that is even faster than SDRAM.
SRAM (Static RAM) is faster and more reliable than any form of DRAM, but are more
expensive.
6) ROM Chips: These contain data which is recorded permanently by the manufacturers.
ROM (Read Only Memory): It contains critical information and software that must be
permanently available for the computer. ROM is also known as the Non-volatile memory;
i.e. it cannot lose data when power is switched off.
Examples of non-volatile memory include; ROM, flash memory and CMOS.
ROM chips contain data, instructions or information which is recorded permanently by the
manufacturers and are known as firmware.
BIOS; is a firmware that contains the computer's startup instructions.
BIOS (Basic Input/Output System): It should be noted that ROM contains the Basic
Input/Output System (BIOS); which is a sequence of instructions the computer follows to
load the operating system and other files when the computer is turned on.
i) Flash memory, also known as Flash ROM or Flash RAM is a kind of non-volatile
memory that can be erased electronically and reprogrammed.
Flash memory is used to store programs and data on personal computers, cellular
phones, printers, digital cameras, pagers and personal digital assistants (PDAs).
CMOS chips use battery power to retain information even when the computer is turned off.
Unlike ROM, the information stored in CMOS can be changed. The CMOS is updated
whenever new components are installed.
ii) Cache memory: It is a high speed memory that the CPU can access (find or get)
quickly.
Cache memory is used in computers with very fast CPUs so that the CPU does not have
to wait for data to be delivered from RAM. Thus the most frequently used instructions
are kept in the cache memory.
iii) Video memory (VRAM): These are chips used to store and display images for the
monitor. The amount of VRAM determines how fast images appear and how colors are
available.
VIRTUAL MEMORY: With virtual memory (VM), the operating system allocates a
portion of a storage medium, usually the hard disk, to function as additional RAM.
The area of the hard disk used for virtual memory is called a swap file. The amount of data
and program instructions swapped or exchanged at a given time is called a page.
7) Expansion slots and boards: Expansion slots are sockets on the motherboard into
which you can plug expansion cards.
Among the types of expansion cards are expanded memory, display adapter or graphics
adapter cards, controller cards etc.
8) THE BUS: It is an electrical channel that allows the various devices inside and attached to
the system unit to communicate with each other.
9) PORTS:
pg. 25
UACE Subsidiary ICT
Ports are sockets on the outside of the system unit that are connected to an expansion
board on the inside of the system unit.
These include the following:
▪Serial Ports: These transmit only one bit of data at a time. Serial ports are used to connect
devices that do not require fast data transmission rates, such as Mouse, keyboard or
modem.
▪Parallel Ports: These are capable of transferring more than one bit of data at a time.
Many printers connect to the system unit using a parallel port. And thus, it can transfer 8
bits of data simultaneously through 8 separate lines in a single cable with a 25-pin female
connector.
▪USB Ports (Universal Serial Bus): These can connect up to 127 different peripheral
devices daisy-chained to one general-purpose port.
USB also supports hot plugging/hot swapping (the ability to add or remove devices while
a computer is running) as well as Plug and Play.
▪SCSI Ports (Small Computer System Interface): These are special high-speed parallel
ports used to attach peripheral devices such as printers and disk drives to the system unit.
▪The 1394 Ports: These are also called FireWire, and can connect multiple types of
devices requiring faster data transmission speeds. Such devices connected to these ports
include; Digital Video Camcorders, Digital VCRs, colour printers, Scanners, Digital
cameras and cellular phones.
The 1394 ports also support Plug and Play (the computer’s capability to recognize any new
devices and assisting in the installation of the device by loading the necessary drivers
automatically.
▪MIDI Ports (Musical Instrument Digital Interface): Are designed to connect the system
unit to a musical instrument, such as electronic keyboard.
▪Games Ports: These allow you to attach a joystick or similar game playing device to the
system unit.
pg. 26
UACE Subsidiary ICT
Secondary storage (auxiliary storage): It is any storage device designed to retain data and
instructions (programs) in a relatively permanent form.
Secondary storage is non-volatile; meaning that saved data and instructions remain intact
(together) when the computer is turned off.
Storage devices (storage hardware): Are devices that record and retrieve (get back) items to and
from a storage medium.
Thus storage devices act as input devices when they read and act as output devices when they
write.
Such examples of storage devices include;
Zip drive, Tape drive, Hard disk drive, Floppy disk drive, Compact disk drive
2. HARD DISK
A hard disk usually consists of several inflexible, circular disks called platters on which items
are stored electronically.
Advantages of hard disks over floppy disks
i. Hard disks provide far larger storage capacities.
ii. They have a much faster access time than floppy disks
iii. A hard disk is cheaper than floppy disk per megabyte
iv. Hard disks usually are more reliable (dependable) than floppy disks (i.e. have a better
protection against dust and dirt).
v. Because they reside inside the system unit, there are fewer chances of them being
misplaced or stolen
pg. 27
UACE Subsidiary ICT
Disadvantages
- Head crash may occur due to extreme shock or contaminants.
- Hard disks are not portable (except removable hard disk) which is not the case with floppy
disks.
- Data becomes less secure if left on the hard disks
- Disks may fail due to violet shaking (vibrations).
- Have a problem of virus attack and thus causing data loss.
3. COMPACT DISK
A compact disc is a flat, round, portable, storage medium that is usually 4.75 inches in
diameter and less that one-twentieth of an inch thick.
Variations (kinds) of Compact Disks include:-
- CD-ROM (Compact Disc Read-Only Memory) is a compact disc that uses the same laser
technology as audio CDs for recording music. The contents of standard CD-ROMs are
written or recorded by the manufacturer and cannot be modified by the user.
A CD-ROM drive or CD-ROM player is required to read items on a CD-ROM.
- CD-R (Compact Disc-Recordable) is a technology that allows a user to write on a
compact disc using his or her own computer.
- A CD-RW (Compact Disc Rewritable) is an erasable compact disc that can be written
and rewritten onto it multiple times.
CD-RW software and a CD-RW drive are required in order to write and rewrite on a CD-
RW.
- A DVD-ROM (Digital Video Disc-ROM) is an extremely high capacity compact disc
capable of storing from 4.7 GB to 17 GB.
- DVD-RAM; is the recordable and rewritable versions of DVD-ROM, which allows items
to be erased and recorded on it multiple times.
- DVD-R; is a recordable version of DVD-ROM, which can be written once and read (play)
for many times.
- DVD+RW; is the recordable and rewritable versions of DVD-ROM, which can be written
and read (play) for many times.
A DVD+RW; is similar to a CD-RW, except that it has storage capacities up to 4.7 GB.
- A PhotoCD; is a type of CD that contains digital photographic images saved in the
photoCD format developed by Eastman Kodak.
NOTE: Floppy disks, compact disks and hard disks all use direct access, or random access;
which means that a particular data item or file can be located immediately without having to move
consecutively through items stored in on it.
4. MAGNETIC TAPE: A magnetic tape is similar to cassette tapes. This is a magnetically
coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
It is one of the first storage media used with mainframe computers.
pg. 28
UACE Subsidiary ICT
NOTE: Tape storage requires sequential access; which refers to reading or writing data
consecutively, that is; one after another. They are also used most often for long-term storage and
backup.
5. TAPE DRIVE: A tape drive is used to read from and write data and information onto a tape.
Three common types of tape drives are QIC (Quarter-inch cartridge), DAT (Digital audio tape)
and DLT (Digital linear tape).
6. ZIP DRIVE: A zip drive is a special high-capacity disk drive developed by Iomega that uses a
3.5-inch zip disk, which is slightly larger than and about twice as thick as a standard 3.5-inch
floppy disk.
A Zip drive can be 100 MB, 250 MB or 750MB in storage capacity.
An input device is any hardware component that allows a user to enter data and instructions into a
computer.
The input devices include;
o Keyboard, - Mouse, - Scanner
o Digital camera - Joystick
pg. 29
UACE Subsidiary ICT
o Pc camera - Scanner
o Microphone - Bar Code Reader
o Light pen - Web Cam
o Track ball - Touch screen
o Touch pad - Digital video camera
1. KEYBOARD: This contains keys that allow a user to enter data and instructions into the
computer.
All computer keyboards have a typing area that includes; the letters of the alphabet, numbers,
punctuation marks and other basic keys.
A standard computer keyboard is sometimes called a QWERTY keyboard because of the
layout of its typing area.
A standard keyboard has three (3) significant areas. These include;
o The keyboard area
o The Function key area
o The Numeric keypad area including the cursor control keys.
With the development of the Internet and multimedia capable computers, two other areas were
added t this 105-button keyboard. These areas include;
- the multimedia buttons area
- and the Internet shortcut buttons area.
pg. 30
UACE Subsidiary ICT
Tab key: This key shifts the cursor position usually by five characters to the right when
pressed. It can also be configured to shift the cursor by a specified number of characters
depending on the application in use.
The Alt and Ctrl keys: These are specialised keys referred to as system keys. They are
commonly used in combination with other keys in order to work directly with the system.
E.g. when you press the Alt + Ctrl + Delete key combination, you restart your computer.
The Application key ( ): It is one of the keys that were added to the standard
keyboards. When this key is pressed, it acts exactly like what would happen if one pressed
the right mouse button at the cursor position when working with Microsoft Windows.
The Windows key ( ): This is a Microsoft Windows logo and it one of the
keys that were added on the standard keyboard after the introduction of Microsoft
Windows95. It is also one of those keys used in combination with other keys to accomplish
shortcuts. E.g. when one is working in a windows environment and you press this key with
the D key, all open windows will be minimised to display the desktop.
The Function key area:
This area consists of the Function keys F1 to F12 inclusive of the Esc (Escape) key. These keys
are usually left for application programmers to use as utility keys that control their customized
application programs. For most Microsoft applications, the F1 key is frequently used to invoke
(call for) the help system.
2. MOUSE: It is a pointing device used to manipulate (control) onscreen objects; it also inputs
data or instructions into the computer.
Types of mouse/mice
A mechanical mouse: this has a rubber ball on its underside to detect movement of
the mouse.
An optical mouse; this uses devices that emits (produces) and senses light to detect
the mouse’s movement.
A cordless /wireless mouse (either mechanical or optical) transmits data using
wireless technology such as radio waves or infrared waves.
Mouse operations
CURSOR: Also called the Insertion point, this denotes the place where text, graphics or any other
item would be placed when you type, overwrite or insert them. This looks like a tall skinny
toothpick and keeps blinking so that you can locate it easily.
MOUSE POINTER: When your mouse pointer looks like an I-beam you should be able to move
it freely around the screen. This is used for either placing the cursor at the desired place or
choosing any command either from the menu or from tool bars.
POINTING: It is an act of moving the mouse pointer until the pointer is on the desired item.
CLICKING: By default, the left mouse button is considered the primary button. When instructed
to click the mouse, it means the left mouse button should be pressed once. Clicking is done to
position the insertion point or select an object on the screen.
DOUBLE CLICK: Double clicking is performed by pressing the left mouse button twice in rapid
succession (sequence /series). It is important that the mouse does not move while double clicking.
CLICK AND DRAG: To accomplish this, press the left mouse button and hold it while dragging
or moving the mouse. This action can be used to select large blocks of text.
RIGHT CLICK: Pressing the right mouse button once will open a short-cut menu. The right
mouse button is also known as the secondary button and it is not typically pressed more that once
at a time.
SCROLL WHEEL: When a mouse is equipped with a scroll wheel, it can be used to quickly
move a page up or down. It is an easy way to navigate through lengthy documents or Websites.
pg. 32
UACE Subsidiary ICT
3. JOYSTICK: It is a pointing device with a vertical lever mounted on a base for playing
computer games.
A joystick is also an input device consisting of a stick that pivots on a base and reports its
angle or direction to the device it is controlling. Joysticks are often used to control video
games, and usually have one or more push-buttons whose state can also be read by the
computer.
4. DIGITAL CAMERA: It takes pictures and stores the images digitally rather than on
traditional films.
5. DIGITAL VIDEO CAMERA: It records video as digital signals rather than analog signals.
Many video devices e.g. video camera, television etc use analog video signals and require a
video capture card to convert the analog video signal into digital signal so that the computer
can understand.
6. PC CAMERA:
It is a kind of Digital video camera that allows home user to record, edit and capture video
and still images and to make phone calls on the Internet.
PC cameras can be set to take digital photographs at present time intervals or whenever it
detects motion.
7. SCANNER: It is a light-sensing input device that converts printed text and graphics into a
digital form that can be further processed by the computer.
Popular types of scanner
A handheld scanner; this can be manually passed over the images to be scanned.
A flatbed scanner: this works like a copy machine except that it creates a file of the
document rather than a paper copy.
A sheet feed scanner; this has motorised rollers that can feed the source document
across the scanning head during the scanning process.
8. MICROPHONE: An input device that allows a user to speak to the computer to enter data
and instructions into the computer.
9. BAR CODE READER: A bar code reader reads a bar code by using light patterns that pass
through the bar code lines. It is widely used in supermarkets, pharmacies, department stores,
libraries etc.
A barcode reader, also called a price scanner or point-of-sale ( POS ) scanner; is a hand-held or
stationary input device used to capture and read information contained in a bar code . A barcode
reader consists of a scanner , a decoder (either built-in or external), and a cable used to connect the
reader with a computer.
10. LIGHT PEN: It is a pointing device that can detect the presence of light. Light pens are used
by health care professionals such as doctors and dentists.
A light pen is an input device that utilizes a light-sensitive detector to select objects on a
display screen. A light pen is similar to a mouse, except that with a light pen you can move
pg. 33
UACE Subsidiary ICT
the pointer and select objects on the display screen by directly pointing to the objects with
the pen.
18. Optical Mark Recognition Reader (OMR): It is used to sense hand-drawn marks such
as small circles or rectangles made on pre-printed forms in certain places.
The OMR reader first reads the answer key sheet to record the correct answers based on the
patterns of light, and then reads the remaining documents and matches their patterns of light
against the answer key sheet.
19. Optical Character Recognition Reader (OCR): These include a small optical scanner for
reading characters and sophisticated OCR software for analyzing what is read.
OCR readers are often used for turnaround documents e.g. electricity bills.
pg. 34
UACE Subsidiary ICT
20. Sensor and Remote Sensor: It is an input device that can detect external changes in an
environment. External changes include levels of light, temperature, sound, position and humidity.
Output is data that has been processed into a used form, called information.
An output device is a hardware component that displays information to a user.
Examples of output devices;
1) Display device
2) Printer
3) Audio output device
4) Data projector
5) Facsimile machine (fax)
6) Multifunction machine
7) Terminal
Information on a display device is sometimes called a soft copy because it exists electronically and
displays only for a temporary period.
pg. 35
UACE Subsidiary ICT
o Emit higher electromagnetic radiation (EMR) than LCD monitors (i.e. the light causes
eye defects or problems).
o They consume much more power/energy than the LCD monitors.
b) Liquid Crystal Display (LCD) monitor; this uses liquid crystal rather than a cathode ray
tube to create images on the screen.
LCD monitors produce color using either passive matrix or active matrix technology.
Disadvantages
o LCD monitors can only be viewed from a very narrow angle.
o LCD monitors are usually more expensive than CRT monitors.
o They need trained personnel to repair them in case they get mechanical problems.
CRT monitors use an analog signal to produce a picture while LCD monitors use a digital signal
to produce a picture.
Thus the quality of a display device depends on its resolution, dot pitch and refresh rate; and
resolution is often expressed in dots per pitch (dpi).
2. PRINTERS
A printer is an output device that produces text and graphics on a physical medium such aas
paper, plastic boards etc.
Printed information is often called hard copy because the information exists physically and in a
more permanent form of output that is presented on a display device.
CATEGORIES OF PRINTERS
IMPACT PRINTERS: These are types of printers that produce a hard copy output with their print
heads that physically touch the print media. These print media include; papers, plastics, clothes etc.
That is to say; they form characters and graphics on a piece of paper by striking a mechanism
against an ink ribbon that physically contacts the paper.
pg. 36
UACE Subsidiary ICT
Disadvantages
- They are generally noisy because of the striking mechanism.
- Print quality of dot-matrix printers is not as good as those from ink-Jet and laser printers.
-
b. Line printer
A line printer is a high-speed impact printer that prints an entire line at a time.
The speed of a line printer is measured by the number of lines per minute (lpm).
Line printers are often used with mainframes, microcomputers or with a network in
applications such as manufacturing or shipping.
c. Daisy wheel printer:
It is an impact printer that uses a wheel as a print head against the paper to print a character.
d. Plotter
A plotter is a sophisticated (stylish) printer used to produce high-quality drawings that can be
quite large e.g. with width up to 60 inches.
Two basic types of plotters are;
o Pen plotters
o Electrostatic plotters
e. Ball printer
A ball printer is an impact printer that uses a rotating ball as a print head. The printing
characters are on the surface of the ball, which strikes a ribbon to transfer the character
onto paper.
f. Braille printer:
A Braille printer outputs information in Braille onto paper so that it can be read by blind
people (visually impaired people).
The printing speed of a printer is usually expressed in pages per minute (ppm); and printer
resolution is often expressed in dpi (dots per inch). Thus, the large the number of dots the
higher the colour output (resolution).
pg. 37
UACE Subsidiary ICT
NON-IMPACT PRINTERS: These are types of printers that produce a hard copy output without
the print heads physically hitting the print media. The print media include; plastics, clothes etc. i.e.
they form characters and graphics on a piece of paper without actually striking the paper.
Disadvantages
- The ink may smear when printed on ordinary paper
- The ink cartridges and specialized papers are expensive
- Specialized papers are required to produce high quality colour output
D) Thermal printers:
pg. 38
UACE Subsidiary ICT
Thermal printers are types of non-impact printers with thermal technology; the printer’s head
contains dot heaters (heating elements) which cause dots to appear on a paper.
REVIEW QUESTIONS:
1) Differentiate between impact printers and non-impact printers…
3. DATA PROJECTOR
This displays photographic slides on a screen in bigger size. It works like a film projector only
that it is connected to the computer from which it derives/gets the information.
An LCD projector, which uses liquid crystal display technology, can produce lower-quality
images only.
A DLP (digital light processing) projector, which uses tiny mirrors to reflect light, can
produce much better images even in a well lit room.
4. FACSIMILE MACHINE
A facsimile (fax) machine is a device that transmits and receives documents over telephone
lines.
Documents sent or received via a fax machine are called faxes.
Fax capability can also be added to the computer using a fax modem.
A fax modem is a communication device that allows a user to send and receive electronic
documents as faxes.
5. Audio output devices:
These are components of a computer that produce music, speech and other sounds.
Two common used audio output devices are speakers and headsets.
6. Multifunction machine:
A multifunction device is a single piece of equipment that provides the functionality of a
printer, scanner, copy machine and a facsimile machine
Advantages of a multifunction machine
- It takes up less space than having a separate printer, scanner, fax machine and a copy machine.
- It is less pensive than purchasing each device separately.
Computer software refers to all programs which enable computer hardware to operate effectively.
Computer software is broadly categorised into two namely;
Application software
System software
pg. 40
UACE Subsidiary ICT
1. Packaged software: This is the application software that is commercial, copyrighted and
designed to meet the needs of a wide range of users.
2. Custom software: This is tailor-made software or the software developed at the user's
request to perform specific functions as required by that particular user.
3. Freeware: This is software that is copyrighted and provided to the user at no cost.
4. Shareware: This is also copyrighted software distributed free of charge for a trial period
and payment is required after the trial period expires.
5. Public-domain software: This is free software donated for public use and has no copyright
restrictions.
(B). Off the shelf or canned software (general purpose) packages, is a type of software written to
be used for a wide variety of purpose. These include; Spreadsheet programs, database
programs, Adobe PageMaker etc. i.e. it is a type of software developed and sold on open
market to customers who need them.
System software also serves as the interface between the user, the application software and
hardware.
pg. 41
UACE Subsidiary ICT
The user interface controls how users enter data and instructions into the computer and how
information is displayed on the screen.
UTILITY PROGRAMS:
These are programs designed to support the operation of application programs and computer
systems; for example Anti-virus utility, uninstaller utility etc.
Screen savers originally were developed to prevent a problem called ghosting, in which
images could be permanently etched on a monitor’s screen. They can also be used for
security reasons, business or entertainment.
xvi. Detection and removal of virus: A virus is a computer program that interferes in the
computer operating system. Thus the utility program helps to heal the virus.
xvii. File viewer utility: it is a utility that displays and copies the contents of a file.
xviii. File Compression utility: This reduces or compresses the size of a file.
A compressed file takes up less storage on a hard disk or floppy disk, which frees up room
on the disk and improves system performance.
Compressed files sometimes are called zipped files because they usually have a .ZIP
extension, and therefore they must be unzipped or restored to its original form before
being used.
xix. Diagnostic utility: This compiles technical information about a computer’s hardware and
certain system software programs and then prepares a report outlining any identified
problems.
xx. Disk scanner utility: It is a utility that detects and corrects both physical and logical
problems on a hard disk or floppy disk, and searches for and removes unwanted files.
A physical problem is one with the media, such as a scratch on the surface of the disk.
A logical problem: It is the one with the data, such as a corrupted file allocation table
(FAT).
xxi. Disk defragmenter utility: It is a utility that reorganizes the files and unused spaces on a
computer’s hard disk so that data can be accessed more quickly and programs can run
faster.
When the contents of a file are scattered across two or more non-contiguous sector, the file
is fragmented.
xxii. Uninstaller utility: It is a utility that removes an application, as well as any associated
entries in the system files.
xxiii. Backup utility: This allows a user to copy or backup selected files or the entire hard disk
onto another disk or tape.
pg. 42
UACE Subsidiary ICT
PROGRAMMING LANGUAGES
Programming languages are coded instructions used when designing computer programs.
It is the only language that a computer understands. A programming language combines words,
symbols and rules of grammar known as the syntax of the language.
PROGRAMMING: This is the process of writing a program to solve a given problem, testing it to
ensure it is accurate or correct and preparing documents to support it.
Programming languages also have vocabulary, grammar and syntax just like any other natural
language. However, natural languages cannot be used for programming because they are too
complex i.e. the grammar and vocabulary can be interpreted in very many ways yet programming
languages bust have simple logical structure and must be precise.
1. LOW LEVEL LANGUAGES: These are languages which the computer can easily
understand and are strongly related to the processor since they can easily be memorized.
Low level languages are machine oriented and very difficult for programmers to
understand.
They are categorized into two:-
i) Assembly Languages
ii) Machine Code Languages: These are first generation languages consisting on 0s
and 1s. Machine language is written in binary codes i.e. digits of 0s & 1s. It is a
language that consists of binary numbers that represent instructions normally
locations and data which can be processed.
2. ASSEMBLY LANGUAGE:
This is a language that uses a group of letters to represent a whole group of words instead
of presenting a binary operation of zeros and ones (0s & 1s). They use more English words
and therefore easily understood by the programmers. E.g. "ADD" for addition, "SUB" for
subtraction.
However, each assembly language instruction is eventually translated into machine
language by the compiler.
pg. 43
UACE Subsidiary ICT
They consist of phrases that are closer to human language or mathematical notations. They
are later translated into low level languages for the computer to easily understand. High
level languages are also referred to as Third (3rd) Generation Languages.
xi) C- Language: This is also a high level program oriented language used for software
development. C is a concise versatile and portable general purpose language and
compatible with many operating systems and application programs.
OPERATING SYSTEM
An operating system is a set of programs containing instructions that coordinate all the activities
among computer hardware devices.
It also refers to all programs which coordinate the operation of all hardware and software
components of a computer.
The operating system relies on device drivers to communicate with each device in the computer.
A device driver is a small program that tells the operating system how to communicate with a
device.
Thus each device on a computer such as keyboard, printer etc has its own specialized set of
commands and thus requires its own specific driver.
Novel NetWare OS
Solaris
Palm OS
Pocket PC 2002
1) Disk Operating System (DOS): DOS is a collection of programs and commands that are
used to control the overall computer operations in a disk-based system.
The two more widely used versions of DOS were PC-DOS and MS-DOS, both developed by
Microsoft in 1980s. DOS is not widely used today because it does not offer a graphical user
interface (GUI) and it cannot take full advantage of modern 32-bit micro-processors.
pg. 46
UACE Subsidiary ICT
pg. 47
UACE Subsidiary ICT
7. Memory management: This is used to optimise the use of RAM. The operating system
has to allocate or assign items to areas of memory called buffers.
A buffer is an area of memory or storage in which data and information is placed while
waiting to be transferred to or from an input or output device.
8. Spooling print jobs: With spooling, the print jobs are placed in a buffer instead of being
sent immediately to the printer.
As soon as the print job is placed in the buffer, the CPU is available to process the next
instruction and the computer can be used for other tasks.
9. Configuring devices (build-up): In the past, installing a new device often required setting
switches and other elements on the motherboard.
Most of the operating systems today support plug and play and can configure devices
automatically.
Occasionally (rarely), the user needs to know the IRQ device should use for
communications.
An Interrupt Request (IRQ): it is a communications line between a device an d the CPU.
10. Monitoring system performance: A performance monitor is a program that accesses and
reports information about various system resources and devices.
pg. 48
UACE Subsidiary ICT
A Spreadsheet is commonly used for budgets, forecasting and other finance related tasks. It covers
entering data, formatting, cell alignment, fonts, mathematical calculations, functions and much
more.
TERMINOLOGIES IN SPREAD SHEET PROGRAM
Work book: A work book is where records are stored in the spread sheet. A work book
may contain one or more sheets limited only the memory available.
Work sheet: It is a primary document used in spread sheet programs.
Each work sheet is a rectangular array consisting of 256 columns labeled from A- Z.
On each worksheet, data is organized vertically in columns and horizontally in rows.
Each column is identified by a letter (i.e. A, B, C,…) and each row is identified by a
number (i.e. 1, 2, 3,…)
A range: It refers to a group of cells. A range may vary from a single cell, a row, column,
rectangular block of cell as the entire worksheet.
A cell: A cell is an intersection of rows and columns.
Each cell has a unique cell address (e.g. A1) to define its location on the worksheet.
Cell reference: Cell reference identify a cell or range of cells got in a worksheet
Formula bar: This is normally a space below the format table.
Labels are text that identify the data and help organize the worksheet.
Values are numbers to be used for calculations.
Relative addressing: This is where a cell address (e.g. B1+C1) is self-adjusted when the
formula is moved or copied to another cell (e.g., B2+C2).
Absolute addressing: It is where a cell address (e.g. $B$2) is always fixed.
TYPES OF GRAPHS
Bar graph
Pie charts
3D-bar graph
Line graphs
Surface graphs
XY-scatter
Pyramids
Examples of operations in a spreadsheet cell:
Symbol Description Example
* Multiplication =B1*B2
/ Division =B1/C5
+ addition =(B1+B2)
– subtraction =(B2-B7)
% percentage =C5*50%
() Parentheses =B2*(C3+D4)
Types of data types of entries in spreadsheet cell:
o Number - General
o Currency - Date/time
o Fraction - Accounting
o Text - Special
Spreadsheet programs have enormous functions, which are predefined formulae to perform
common calculations:
MATHEMATICAL INT (number) Rounds a no. down to the nearest integer
FORMULAE ABS (number) Returns the absolute value of a number
LN(number) Calculates the natural logarithm of a number
LOG(number, Calculates the logarithm of a no. to a specified
base) base
ROUND(number, Rounds a number to a specified number of
no. of digits) digits
SQRT(number) Calculates the square root of a number
SUM(range) Calculates the total of a range of numbers
LOGICAL IF(logical test, Performs a test and returns one value if the
FORMULAE value if true, value result of the test is true and another value if the
if false) result is false
pg. 51
UACE Subsidiary ICT
An Internet Service Provider (ISP) is a company that supplies connections to the Internet,
usually for a monthly fee.
SERVICES OF ISPS
- Managing application hosting
- Provide internet services to subscribers
- They host websites
- They manage E-mail services
- They provide domain names (websites) to people
- They manage network technical support in communication
- They design websites
A domain name is the text version of an IP address, which makes the all numeric IP address easier
to remember and use.
The domain name system (DNS) is the system on the Internet that stores the domain names and
their corresponding IP address.
The domain name server (DNS): This translates the domain name into its associated IP address,
so that data can route to the correct computer.
The World Wide Web (WWW) also called the Website, consists of a worldwide collection of
electronic documents.
Each of these documents on the Web is called a Web page.
A Web page can contain text, graphics, animations, audio and video i.e. multimedia elements, as
well as built-in connections called hyperlinks to other documents.
pg. 54
UACE Subsidiary ICT
h. Hyper link: It is a built-in connection to another related web page or part of a web
page.
i. Search engine: It is a software program that can be used to find Web sites, Web pages and
files on the Internet. Such examples include; www.google.com, www.Ask.com,
www.mywebsearch.com, www.webcrawler.com, www.bing.com etc.
j. Surfing: It is the activity of jumping from one Web page to another.
TYPES OF WEBSITES
1. Personal Websites. These are types of websites that are built by individuals. The theme and
content of these websites is based mostly around personal information. This type of site is
useful for a family, teenagers, grandparents, etc. to stay in touch with each other. This type is
not advisable for a small business because the URL is not search engine friendly and the
limited server capabilities your ISP offer may not be sophisticated enough for a small business
website.
2. Photo Sharing Websites
These are types of websites that offer free photo sharing paid for by their online advertising
companies. Such web companies like, Flickr.com, Photosite.com, and Google's Picasa. Also,
many digital cameras and photo printers now come with software enabling people to create
digital photo slide shows and upload them to the website.
3. Social Networking Websites: These are websites that enable Internet users to meet and
interact with other people to share a common interest. The most common examples of Social
Websites are Face book, Twitter, E-Harmony among others. Face book was originally built to
only be for college students, but is now open to the public. All you have to do is create an
account and you are able to interact with friends and other people that may share common
interest.
Advantages of social sites
a. It facilitates open communication leading to enhanced information delivery.
b. One has the opportunity to connect with friends and families wherever you are.
c. Allows people to discuss ideas, post news and ask questions.
pg. 55
UACE Subsidiary ICT
d. It provides an opportunity to widen business contacts through using social networking sites.
e. Free business promotion. This is the biggest advantage for business owners using social
networking sites.
f. Advertising costs are low: Some social networking sites provide people with the opportunity
to advertise their products and services at low costs.
Disadvantages of using social sites
a. It makes internet users to spend much time communicating with friends.
b. Social sites open up the possibility for hackers to commit fraud and launch spam and virus
attacks.
c. Social sites have no privacy however much the information shared is private.
5. File Sharing Websites: Are websites that provide space for people to post files like photos or
videos so that other people may view them, save them and sometimes buy them. Some good
example of File Sharing websites are YouTube, Shutter fly, Flicker, and Google's Picasa.
6. Community Building Websites
These are websites that build online communities of people who want to interact with other people
socially or meet people who share their interests. The best known website of this type is
MySpace.com. There is also FaceBook.com and a myriad of similar sites. For sharing and
discussing mutual interests, there are online forums for practically any subject you can think of.
Forum websites can be a great source of information and help for the small business person
7. Mobile Device Websites
Although it is in its infancy (early stage), mobile device websites are used by mobile devices such
as cell phones, PDAs, iPods, iPhones among others. The use of mobile devices will become much
more widespread and prevalent (common) on the Internet. A new domain designation has been
created to identify websites that are "mobile friendly".
8. Blog (Forum) Websites
Blog websites are the ones on which an individual or group of users record opinions or
information. Blogging is the newest impression (sensation) to hit the Internet in the past few years.
People took the words Web Logs and shortened it to Blogs. The blog may include; online diaries,
journals, or editorials. A blog owner will log-on daily, weekly, or whenever, and write about
whatever is going on in their lives or business, or they may comment on politics and news.
9. Informational Websites: Are types of websites that are built for the purpose of providing
information to the Internet users. A major informational site is wikipedia.org, the online
encyclopedia. Such websites can include anything like; News websites, science websites, medical
information websites, educational websites among others.
10. Online Business Brochure/Catalog Websites: Are types of websites that allow users to
find the information of products and services. In the days before the Internet, we used the radio,
and television media to spread the word about our businesses.
OTHER TYPES OF WEBSITES:
1) Web portal: A web portal is an organized gateway to structure the access of information
on the Internet.
pg. 56
UACE Subsidiary ICT
2) Wiki website: A wiki is a website which allows its users to add, modify, or delete its
content via a web browser usually using a simplified markup language or a rich-text editor.
3) Content aggregator: Aggregator refers to a web site or computer software that aggregates
a specific type of information from multiple online sources.
Netiquette rules:
1) One should follow the core rules while using internet or computer network. E.g. spamming is
not allowed, spell check e-mail messages, one should not send e-mails at night, one should
visit secure sites, one should not over react when replying a message etc.
2) You should treat other people the way you want to be treated.
pg. 57
UACE Subsidiary ICT
A presentation is the collection of slides, handout, speaker notes, sounds and videos organized in
a single file.
Presentation software is the program which allows the user to create presentations and handouts.
pg. 58
UACE Subsidiary ICT
3. Master slide: It is the top slide in a hierarchy of slide that stores information about the
presentation.
4. Animations and animation schemes: Animations are visual effects applied to individual
items on the slide such as graphics, titles or bullet points.
5. Bullets: these are small dots, squares, dashes or graphic objects that design a short descriptive
phrase.
6. Slide show: They display slides in a sequence moving from one slide to another.
7. Slide sorter view: This provides a light table for viewing multiple slides.
8. Slide layout: Refers to a single slide.
9. Normal view: Normal view splits your screen into three major sections: the Outline and
Slides tabs, the Slide pane, and the Notes area.
10. Slide view: It is the most common view to use for building a presentation.
11. Outline view: It helps the user to organize and develop the textual content for a
presentation.
12. Notes page view: This allows to insert, edit and delete reminder notes on each slide.
Microsoft Power point has a number of ways to deliver a presentation such as:-
pg. 59
UACE Subsidiary ICT
3. MEDIUM: It is a means by which the message is transmitted from the sender to the receiver.
This includes the wires, Local Area Network cables, fiber optic cables, microwave signals and
Satellite signals.
4. RECEIVER: It is the device on the other end of the data communication transmission that gets
the message. Many of the same devices that work as receivers also work as senders such as
smart phones, computers and telephone handsets. Some however, are only receivers such as
televisions and radios.
5. PROTOCOLS: A protocol is a set of rules and procedures for exchanging information among
computers on a network. Some of the protocols include:-
Transmission Control Protocol (TCP/IP): It is a set of protocols widely used on the
Internet.
File Transfer Protocol (FTP): It is a protocol that enables computer users to upload and
download computer files with other computers or servers.
Simple Mail Transfer Protocol (SMTP): It is a protocol for sending E-mail messages
between computers and servers.
Telnet: It is the main protocol for creating connections with remote computers.
HTTP: This stands for Hyper Text Transfer Protocol: A protocol that enables web pages to
be transferred on the websites.
-- A coaxial cable
Twisted paired cable: It is the most popular network cabling and consists of one or more
twisted-pair wire bundled (collected) together.
There are two (2) types of twisted-paired cable cables e.g. The Shielded Twisted Pair cable
(STP); it has a metal wrapper around each twisted pair wire to reduce noise. The
Unshielded Twisted Pair (UTP) cable does not have the metal wrapper for shielding noise.
pg. 61
UACE Subsidiary ICT
Fiber optic cables: These use electrical signals to transmit data and use light.
2. UN-GUIDED MEDIA (WIRELESS): These do not use any physical connectors between the
two devices communicating. Usually, the transmission is sent through the atmosphere.
There are three (3) types of wireless media namely;
A. Radio waves
B. Micro waves
C. Infrared waves
A. Radio waves: It has a frequency between 10 KHz to 1GHz. Radio waves has the following
types:
Short waves
Very high frequency (VHF)
Ultra high frequency (UHF)
B. Micro waves:
Micro waves travel at high frequency than radio waves and provide throughput as a
wireless network media. Micro wave transmission requires the sender to be inside the
receiver.
Types of Micro waves:
Terrestrial micro waves
Satellite micro waves
- Terrestrial micro waves: Are used to transmit wireless signals across a short
distance e.g. the Blue tooth. A blue tooth is a wireless technology that can connect
two devices such as mobile phones to share data or information.
- Satellite micro waves: Satellite micro wave transmission is used to transmit signals
throughout the world. Satellite dishes are sued to send the signals to the satellite
where it again sends back down to the receiver satellite.
A communications Satellite is a station in the space that receives microwave signals
from an earth-based station and broadcasts the signals back over a wide area to
many earth-based stations.
C. Infrared waves: It is a wireless transmission media that sends signals using infrared light
waves. The infrared technology is similar to the use of a remote control for a television
(TV).
ADVANTAGES OF BLUE TOOTH
pg. 62
UACE Subsidiary ICT
b. It is easy to access: Unlike a wireless Local Area Network (WLAN), Bluetooth does not need
any configuration (construction or arrangement) to start a connection and perform file
transfers.
c. It is secured: The Bluetooth connection can be securely established without interference from
unrecognized devices by entering an identification number for the connection. The user can
opt to enter a PIN which creates the secure usage loop (ring or cycle).
d. It is easy to control: Unless a device is already paired to your device, one has the option to
accept or reject the connection and file transfer. This prevents unnecessary or infected files
from unknown users from transferring to your device.
e. Bluetooth can be freely accessed: Accessing Bluetooth device does not cost money. All you
need is the Bluetooth capability.
f. It does not require internet connection: Bluetooth is not recommended for establishing
Internet connections because of its limited transfer rate.
DISADVANTAGES
a. Bluetooth is slow in speed: The data sent between two Bluetooth devices has a maximum
transfer rate speed of 1 megabyte per second (1 MB/s). Infrared is capable of transferring
data at 4MB per second, and Wi-Fi is capable is higher than the two technologies.
b. Bluetooth covers a mall range: Bluetooth covers a range of 15 to 30 feet depending on the
device. The small range is a disadvantage for someone who may need to use a Bluetooth
device outside of that 30-foot radius.
c. It is less secure: Since data is transferred over radio waves using Bluetooth, it is much easier
for a hacker to break into than secure wireless networks. For that reason, Bluetooth should
not be used to transfer data that needs to remain private and secure.
d. Bluetooth uses much battery: Bluetooth uses the battery power of a particular device in
order to operate. Many cell phone makers send phones out with Blue tooth powered off in
order to maximize the battery life of the phone. By tuning the Blue tooth on can drain a cell
phone or computer battery.
- Telecommuting.
1. Electronic mails: It is the transmission of messages via a computer network such as a local
area network or the Internet.
So data communication enables electronic messages to be sent over a network.
OR: It is a service that enables exchange of electronic messages to clients over communication
devices like computers.
Or: The transfer of electronic messages from one geographical location to another using
computers and other related computerized devices.
Components of an E-mail message
To: It carries the e-mail address of the recipient
Cc: (Carbon copy): It allows the sending of a message to the receiver while allowing other
recipients to view the message sent.
Bcc: (Blind carbon copy): Allows sending of messages to the receiver without allowing other
recipients to view the message sent.
Subject: contains the theme of an E-mail message e.g. Re: application, Re: greetings etc
Message Box: It contains the message (information) of the sender.
2. MOBILE PHONES: The use of wireless phones is a dominant form of communication in day-today
life. Mobile users are able to send text messages as well as sending pictures and video files.
Advantages of using phones:
i. Ability to send and receive text messages all the time.
ii. One can play games; listen to audio and video music when you are bored.
iii. Employees can keep in touch all the time.
iv. Mobile phones are portable and can fit in everyone’s pocket of hand bag.
v. You can surf the Internet and connect with the whole world.
vi. If one is lost along the journey, he/she can call for directions or assistance.
pg. 64
UACE Subsidiary ICT
3. Social networking sites. Face book and Twitter are common examples of social sites where
Internet users are able to share ideas of common interests.
4. FAX
A fax (facsimile) machine is a device that transmits and receives documents over telephone
lines.
5. VOICE MAIL
A voice mail functions like an answering machine and allows a caller to leave a voice
message, which is stored in a voice mailbox for the called party.
A called party can listen to the message, add comments to a message and reply or forward a
message to another voice mailbox in the voice mail system.
6. INSTANT MESSAGING (IM)
Instant messaging (IM) is a real-time communications service that notifies a user when one or
more people ate online and then allows the user to exchange messages or files with them.
7. CHAT ROOMS
A chat room is a location on an Internet server that permits users to chat with each other by
typing lines of text on the computer.
8. VIDEO CONFERENCING
A video conferencing in a meeting between two or more geographically separated people who
use a computer network or the Internet to transmit audio and video data.
A videoconference conducted over the Internet using Web browsers and Web servers to deliver
the service is called a Web conference.
9. NEWS GROUPS
A newsgroup also called a discussion group, is an online area where users conduct written
discussions about a particular subject.
The entire collection of Internet newsgroups is called Usenet.
9. GLOBAL POSITIONING SYSTEM (GPS)
A Global positioning system (GPS) consists of one or more earth-based receivers that accept
and analyse signals sent by satellites in order to determine the receiver’s geographic location.
10. TELECOMMUTING:
Telecommuting is a work arrangement so that employees may work away from the standard
workplace of a company, but communicate with the office using some kinds of
communications technology.
SUB-TOPIC 2: INTRODUCTION TO COMPUTER NETWORKS
What is a computer network?
A computer network is a collection of computers and devices connected together via
communications devices and media.
Communications devices enable two or more computers to exchange items such as data,
instructions and information with each other.
TYPES OF NETWORKS:
i. Local Area Network (LAN): It is a network covering a small geographic area, like a home,
office, or building. Current LANs are most likely to be based on Ethernet technology.
pg. 65
UACE Subsidiary ICT
ii. Wide Area Network (WAN): A WAN is a data communications network that covers a
relatively broad geographic area (i.e. one city to another and one country to another country)
and that often uses transmission facilities provided by common carriers, such as telephone
companies.
iii. Wireless Local Area Network (WLAN): It is a LAN that uses no physical wires, but
wireless media such as radio waves.
iv. Personal Area network (PAN): It is a computer network used for communication among
computer devices close to one person. Some examples of devices that are used in a PAN are
printers, fax machines, telephones or scanners.
v. Virtual Private Network (VPN): It is a network accessed by the employees in any given
company. A Virtual Private Network provides the user with a secure connection to the
network using the Internet as if the user had a private line.
vi. Metropolitan Area Network (MAN): A Metropolitan Area Network is a network that
connects two or more Local Area Networks or Campus Area Networks together but does not
extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are
connected to create a Metropolitan Area Network.
vii. Campus Area Network (CAN): A network that connects two or more LANs but that is
limited to a specific and contiguous geographical area such as a college campus, industrial
complex, or a military base.
viii. Global Area Network (GAN): Global area networks (GAN) specifications are in
development by several groups, and there is no common definition. In general, however, a
GAN is a model for supporting mobile communications across an arbitrary number of
wireless LANs, satellite coverage areas, etc
Files can be stored on a central computer (the file server) allowing data to be shared
throughout an organisation.
Files can be backed up more easily when they are all on a central fileserver rather than when
they are scattered across a number of independent workstations.
Networks also allow security to be established, ensuring that the network users may only
have access to certain files and applications.
Software and resources can be centrally managed.
Network versions of software often allow for their speedy installation on workstations from
the file server.
Expensive devices such as laser printers or scanners can be shared.
Users can access their files from any workstation
o All computers can use the same software and you can share larger files over a larger area.
pg. 66
UACE Subsidiary ICT
Disadvantages of WLANs
a. It is less secure. Wireless networks are less secure than wired networks both in terms of
access and user information. Because the information sent and received from the network is
broadcast instead of travelling over a wire, it is much easier to intercept.
b.
c.
File Server May Fail. Although a file server is no more susceptible to failure than any
other computer, when the files server "goes down," the entire network may come to a halt.
Cables May Break. The Topology chapter presents information about the various
configurations of cables.
Peer-to-peer environment
pg. 68
UACE Subsidiary ICT
2. Client-Server Network
A client/Server Network is a network that has one or more computers acting as a server while the
other computers. i.e. clients on the network can request services from the server.
A client/Server network typically provides an efficient means to connect 10 or more
computers together.
Most client/server networks have a network administrator who is in charge of the
network.
Client/Server environment
Server
Computer Computer Computer
Fig. 5: peer to peer illustration
pg. 69
UACE Subsidiary ICT
d. Files can be backed up: they offer a centralized backup where data can be stored in one
server.
pg. 70
UACE Subsidiary ICT
pg. 72
UACE Subsidiary ICT
Definition of a Database:
Database is a collection of related data organized in a way that allows access, retrieval and use of
the data.
Database can also be defines as a systematic organization of data.
A database Management System (DBMS): This is a software that allows the users to create,
access and manage a database.
pg. 73
UACE Subsidiary ICT
iii) Record: It is a row in a database table that contains information about a given person, product
or event, i.e. an individual entry in a table. For example; student’s name is Agaba.
OR: A collection of related fields
TABLES:
A table is a fundamental building block of an access database.
1. Relational database: This stores information in a number of separate tables and then
relationships are created between the tables to combine the information.
2. Flat file database: This stores all the information in one table. This type of database is easy to
set up but is not very flexible when it comes to storing large amount of data.
A PRIMARY KEY:
A primary key is used to ensure that there are no duplicate fields in table
It avoids redundancy in table since it can be represented as a foreign key in other tables.
Types of relationship
i) One-to-one relationship: This is where one record in table A, there is only one
corresponding record in table B.
ii) One-to-many relationship: It is where each record in table A there are many
corresponding records in table B.
DATA TYPES: The data type of a field specifies the type of data that the field can contain.
Functions of data types in a record
Text type: This may hold letters, numbers or special characters
Memo Type: This may contain text of any type
Number; (Numeric type): This may hold numbers.
Date/Time Type: This hold day, month and year information.
Currency type: which may hold money such as dollar, shillings etc.
Boolean type, which may hold values that are either true or false.
OLE Object- OLE (Object Linking and Embedding) objects, graphics or other binary data.
Auto number may hold a number
Hyperlink may hold a link between files.
Logical data types (Yes/No, True/False)
pg. 74
UACE Subsidiary ICT
Lookup Wizard: When the value you need exists in another table or from a list of static
values, you use the lookup wizard to help you establish a link to the table or to define a
combo.
Functions of Databases:
- It provides the user with the means of managing and manipulating large amounts of data.
- It is used to organize and manage a collection of related information.
- They are used in scientific and research data management.
- They can store a summarized data
- They are used to store data.
Disadvantages of Databases
- They are expensive to manage
- Electronic databases are difficult to develop
- They require highly trained experts to manage the database.
- Data can be corrupted by unauthorized data managers.
- Data security may not be ensured in case of data sharing.
REVIEW QUESTIONS:
1) a. Define a Database Management System (DBMS).
2) b. Give two application of using a DBMS in each of the following environments:
school
office/factory
3) Give two examples of paper database and two examples of computerized databases.
pg. 75
UACE Subsidiary ICT
pg. 76
UACE Subsidiary ICT
TOPIC 11- SYSTEM SECURITY, ICT ETHICAL ISSUES & EMERGING TECHNOLOGIES
System security refers to techniques for ensuring that data stored in a computer cannot be read by
any individual(s) without authorization as well as protecting computer from physical theft.
OR: Computer system security refers to all the processes and techniques for ensuring that data
stored in a computer cannot be accessed by unauthorized users.
The purpose of computer security is to protect an organization’s valuable resources such as
information, hardware and software.
iv. Use of passwords to protect data. Data files should be protected by use if usernames and
passwords. A number of applications such as Microsoft Office Word will allow you to set
passwords to individual documents.
v. Hardware-based mechanisms for protecting data. Hardware-based security solutions can
prevent read and write access to data and hence offers very strong protection against
tampering and unauthorized access.
vi. Use of software-based mechanisms. Software-based security solutions help to protect data
(encrypt) from being stolen. However, a malicious program of hacker may corrupt the data to
make it unrecoverable.
vii. Data masking: This is the process of covering (obscuring) data with in a database table or
cell to ensure that data security is maintained.
viii. Installing updated antivirus software programs: Make sure to protect your information by
using reliable and genuine antivirus software on your computer system. Hence antivirus
software helps to scan or remove malware, worms and healing infected files.
ix. Perform regular computer maintenance. One should learn how to use some utilities to
diagnose or check a computer for problems. It is a good idea for one to run a disk-scanning
program and defragmenting a hard disk.
x. Erasing important information (data erasure): Data erasure is a method of software based
overwriting that completely destroys all electronic data found on a hard disk or other storage
media. This helps to ensure that sensitive data is not leaked when a computer is used by other
people.
xi. Never open an e-mail attachment. If your e-mail has an option that automatically opens
attachments, you should disable that feature. It is advisable to scan any e-mail attachments
and downloaded files before opening them.
xii. Never trust external storage devices. External storage devices like memory cards and flash
disks should be scanned for the possibility of malware (viruses).
The basic Data security standards which data management technology must ensure include:-
- Confidentiality: This allows only individuals to see only the data which they are
supposed to see.
- Integrity: This enables data to be protected from deletion and corruption, booth while it
resides with in the computer.
- Availability: A secure system makes data available to authorized users without delay.
2) Physical security: This is where by computers are kept in a secure physical environment and
well protected from unauthorized users.
Physical security describes security measures that are designed to deny access to unauthorized
personnel including attackers or even accidental intruders from physically accessing a
building, facility, resource or stored information.
PHYSICAL MEASURES TO PROTECT COMPUTERS & DATA
i. Use of burglar proofs in windows and doors in rooms where computers and data are
kept
ii. Make sure the room in which computers and data equipments are stored is well locked
with modern doors and windows.
iii. Hire trusted personnel to physically keep data and computer equipments e.g. Database
administrators, security personnel or Network administrators.
iv. The data should be backed-up on different physical location, say on separate discs and
on flash disks.
v. Video monitoring of data and computer equipment location using Closed Circuit
Television (CCTv) and Live transmitting on IP camera networks.
vi. Protect computers from fire outbreaks, rain water and other natural calamities.
vii. Keep antivirus software updated to scan out the virus from computers.
(2) Snooping: This is when someone looks through your files in the hopes of finding something
interesting whether it is electronic or paper. In the case of physical snooping, people might
inspect the computers’ recycle bins and even files.
(3) Back door Attacks: This refers to gaining access to a network or system and inserting a
program or utility that creates an entrance for an attacker. The program may allow a certain
user to log in without a password or gain administrative privileges.
pg. 79
UACE Subsidiary ICT
Viruses or malware are commonly broken down into classic viruses, Trojans, worms, adware and
spyware.
An illustration below shows how a virus spreads from an infected computer using a network or a
removable storage medium.
Virus
Virus
A storage
medium
Explanation:
When an infected storage medium such as memory card or hard disk is moved and used with any
computer, the virus code is executed (run) first. The computer code typically performs four
actions such as replication, event watching, delivery and camouflage there by infecting the new
computer.
When an attachment to an e-mail is accessed by the user, the virus infects the target computer
system. This virus may in turn attach itself to all e-mails the newly infected computer sends, which
later infects all other attachments of these e-mails.
pg. 80
UACE Subsidiary ICT
iii. Through phishing schemes: A phishing scheme starts when you receive an e-mail from a
website claiming to be your bank or credit card company. You are always to click a link
and log in, but the truth is that you have just given away all of your personal information.
iv. Through infected software which come as free games and software applications.
v. Fake anti-virus software: This is one of the most frustrating ways to become infected with a
virus or worm.
vi. Through mobile devices like memory cards.
vii. Through friends and relatives. In most cases we are sent viruses through our e-mails from
people that we know and trust.
TYPES OF VIRUSES
It should be noted that computer viruses can be categorized into two namely:-
A) Non-memory resident viruses that are activated when an infected application runs.
B) Non-resident viruses which immediately search for other hosts that can be infected when
they are executed or run on the computer.
The resident virus which does not search for hosts load themselves into memory on
execution. They also stay active in the background and infect new hosts when those files
are accessed by other programs.
pg. 81
UACE Subsidiary ICT
1. Macro virus. This infects files that are created using certain application programs that
contain macros.
2. Polymorphic virus. This changes (encrypts) itself in a different way every time it infects a
computer. Such a virus also changes forms in order to avoid detection.
3. Resident virus. This is a permanent type of virus that stays in the computer’ RAM
memory. Such a virus can interrupt application programs that are opened, closed or copied.
4. Trojan horses. These are malicious (hateful) programs that enter a computer or a network
that pretend to be other programs. In other words, the Trojan horses may be installed as
part of an installment process or as attachment.
5. Direct Action Viruses. The main purpose of this virus is to duplicate (replicate) and take
action when it is executed (run) on the computer. When a specific condition is met, the
virus will go into action and infect files in the directory of folder.
6. Directory virus. This changes the paths that indicate the location of a file. By executing a
program (file with an extension .doc or .exe) which has been infected by the virus, while
the original file and program has been previously moved by the virus.
7. Boot virus (Stealth virus). It is a type of virus that affects the boot sector of a hard disk.
This virus camouflage (changes) itself to avoid detection by the antivirus software
program.
8. FAT virus. The File Allocation Table or FAT is a part of a disk used to connect
information and is a vital part of the normal functioning of the computer.
This type of virus prevents access to certain sections of the disks where important files are
stored.
9. File infectors. This type of virus infects programs or executable files, i.e. files with an .exe
or .htm extension. When one of these programs is run directly or indirectly, the virus is
activated, producing the damaging effects it is programmed to carry out.
10. Companion viruses. These can be considered as file infector viruses like resident or direct
action types. Such virus are known as companion viruses because once they get into the
computer, they accompany (join) other files that already exist in the computer.
11. Retro virus. This type of virus attacks the antivirus software installed on a computer. It
directly attacks antivirus software there by destroying the virus definition file.
11.2 HACKING
What is hacking?
Hacking refers to the process of accessing computer systems or computer networks illegally.
A hacker is a person who exploits weakness in a computer system or computer network. Hackers
may be motivated by a number of reasons such as protest, challenge or profit gains. Hacking is
also referred to as Trespassing.
pg. 82
UACE Subsidiary ICT
2) Through vulnerability scanner. This is a tool used to quickly check the computer on a
network for known weakness. Hackers commonly use port scanners to check and see which
ports on a specified computer are open.
3) Root kit. Root kit is a computer program designed to take control of a computer system
without being authorized by computer owners. Root kits may include replacements for
system binaries so that it becomes impossible for authorized user to detect the presence of
the intruder on the computer.
4) Pocket Snoffer. This is an application computer program that captures data packets which
can be used to capture passwords and other data found on a network.
5) Denial of Service.
pg. 83
UACE Subsidiary ICT
SUB TOPIC 2:
EMERGING TECHNOLOGIES
These are new technologies that are currently developing or will be developed over the next 5 to
20 tears and which will substantially alter the business and social environment.
The concept of emerging technologies include:
- Artificial intelligence
- Digital forensics
- Atomtronics
- 4G Cellular communication
- Artificial brain
- Machine translation
- Machine vision etc
Digital forensics: These are also called computer forensics or cyber forensics. It is the process of
uncovering and interpreting electronic data for use in a court of law.
It involves application of computer investigations and analysis techniques to gather evidence
suitable for presentation in courts of law.
Atomtronics: It is the branch of science, engineering and technology that deals with the creation
of analogues and electronic circuits and devices by the use of atoms.
Atomtronic devices are still in the experimental stage, and for the future, the properties of
condensed atoms offer a wide range of possible applications.
Artificial Intelligence (AI) is the intelligence of machines and robots and the branch of computer
science that aims to create it. AI textbooks define the field as "the study and design of intelligent
agents" where an intelligent agent is a system that perceives its environment and takes actions that
maximize its chances of success. John McCarthy, who coined the term in 1955, defines it as "the
science and engineering of making intelligent machines."
Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses
radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the
purposes of automatic identification and tracking. Some tags require no battery and are powered
and read at short ranges via magnetic fields (electromagnetic induction). Others use a local power
source and emit radio waves (electromagnetic radiation at radio frequencies).
Most research projects focus on replacing current computer components with optical equivalents,
resulting in an optical digital computer system processing binary data.
accurate transcription. Systems that do not use training are called "Speaker Independent" systems.
Systems that use training are called "Speaker Dependent" systems.
VOICE RECOGNITION: The term voice recognition refers to finding the identity of "who" is
speaking, rather than what they are saying. Recognizing the speaker can simplify the task of
translating speech in systems that have been trained on specific person's voices or it can be used to
authenticate or verify the identity of a speaker as part of a security process.
MACHINE VISION (MV): It is the technology and methods used to provide imaging-based
automatic inspection and analysis for such applications as automatic inspection, process control,
and robot guidance in industry. The scope of MV is broad. MV is related to, though distinct from,
computer vision.
The primary uses for machine vision are automatic inspection and industrial robot guidance.
Common MV applications include quality asurance, sorting, material handling, robot guidance,
and optical gauging.
pg. 85
UACE Subsidiary ICT
ARTIFICIAL BRAIN is a term commonly used in the media to describe research that aims to
develop software and hardware with cognitive abilities similar to those of the animal or human
brain. Research investigating "artificial brains" plays three important roles in science:
An ongoing attempt by neuroscientists to understand how the human brain works, known
as cognitive neuroscience.
A thought experiment in the philosophy of artificial intelligence, demonstrating that it is
possible, in theory, to create a machine that has all the capabilities of a human being.
A serious long term project to create machines capable of general intelligent action or
Artificial General Intelligence. This idea has been popularised by Ray Kurzweil as strong
AI (taken to mean a machine as intelligent as a human being).
pg. 86
UACE Subsidiary ICT
SUB TOPIC 3:
CAREERS IN THE ICT INDUSTRY
INTRODUCTION
Information and Communication Technology (ICT) has created new job titles such computer
operators, computer technician, system analyst, computer programmers, software Engineer,
computer engineer, information systems manager, database administrator, computer trainer, web
administrator, network administrator among others. This section explains some responsibilities of
these professionals who are generally called Information Technology workers.
i. Systems Analyst:
He has business knowledge & also designs business systems,
Co-ordinates training for users of the new system.
He also works with programmers to construct & test the system.
ii. Computer programmer: Big organizations like banks, manufacturing firms, government
agent, schools etc hire computer programmers to work together with system analysts in
order to:-
Develop (write) in-house application programs.
He customizes commercial application package to suit the organization needs.
He also tests, debugs, install and maintains programs developed for the organization.
iii. Computer Engineer: A software engineer is one who is skilled in software development
and technical operation of computer hardware. Some of the responsibilities of the software
engineer are:-
He designs & develops computer components such as storage devices.
Determines the electrical power requirement of each computer component.
Re-engineers computer components to enhance it functionality and efficiency.
Designs and develops engineering and manufacturing computer controlled devices such
as robots.
iv. Database Administrators (DBS): The major purpose of computerizing an organization is
to sore data/information in an organised way for easy access, retrieval and update. An
organization requires a person who should be responsible for updating records in an
information system database. For this reason, a database administrator is responsible for:-
He designs database application programs for organizations.
pg. 87
UACE Subsidiary ICT
vi. Software Engineers: A software engineer is one who is skilled in software development
and technical operation of computer hardware. He does the following:-
He develops system and application software.
He maintains & upgrades new software.
He develops user & technical documentations for the new software
ix. Computer trainer: Due to dynamic (lively/ going ahead) nature of computers and
information technology, there is a high demand for qualified ICT trainers. Some of the
responsibilities of an ICT trainer are:-
He trains people on how to use a computer & various applications programs.
He develops training reference materials.
He guides learners on how to acquire knowledge through carrying out research.
He advises the learners on the best career opportunities in the broad field of ICT.
He prepares learners for ICT examinations (Computers exams).
pg. 88
UACE Subsidiary ICT
xi. Graphics designers: Graphics designers are required in order to design graphical objects
and professional publications.
pg. 89
UACE Subsidiary ICT
REVISION QUESTIONS
SAMPLE QUESTIONS - PAPER 1
(b) Computers can cause health problems. Identify two of these problems and for each
problem write down a method which would help you avoid it. Do not use the same method
for both answers. (4 mks)
Problem 1
……………………………………………………………………………………......................
Method 1
……………………………………………………………………………………......................
Problem 2
……………………………………………………………………………………......................
Method 2
……………………………………………………………………………………......................
2. Briefly describe one way how ICT can be applied in each of the following areas. (5mks)
(a) Education
(b) Health
(c) Business
(d) Security
(e) Politics and governance
3. A systems administrator has been asked to prepare a list of requirements for setting up a
school computer laboratory. In his list of requirements he included a UPS per computer, Air
Conditioner, wool carpet, internet gateway and burglar proofing among others. What is the
importance of each of the items requested? (5 mks)
i. UPS
ii. Air Conditioner
iii. wool carpet
iv. Internet gateway
v. burglar proofing
5. Describe the steps you would take when saving a word processed document with file mane
“letter” in a new folder named Abu on the desktop. (5 mks)
pg. 90
UACE Subsidiary ICT
A B C D
i) A: ............................................................................................
ii) B: ............................................................................................
iii) C: ............................................................................................
iv) D: ............................................................................................
7. Complete each sentence below using one item from the list. (5 mks)
A bar code reader
A buzzer
A dot matrix printer
A graph plotter
A graphics tablet
An inkjet printer
A pressure sensor
OCR
A tracker ball
A webcam
(b) A student wishes to store data on an optical storage medium. List two optical media and
give one advantage and one disadvantage of using optical media when compared with fixed
hard discs. (4 mks)
Optical medium 1
Optical medium 2
pg. 91
UACE Subsidiary ICT
Advantage
Disadvantage
9. A group of car mechanics has decided to buy a new printer for their workshop. The different
options which are available are a laser printer, inkjet printer and dot matrix printer. How
would you advise them to choose an appropriate printer for their work? (5 mks)
……………………………………………………………………………………......................
……………………………………………………………………………………......................
TRU FALSE
E
Measuring software is used to write letters
DTP software is used magazines
create
to
A working knowledge of HTML is helpful when creating web pages
Presentation software is used to write letters
A Graphical User Interface uses icons to represent applications
11. (a) Tick three features of spreadsheet software which make it suitable for creating and using
computer models. (3 mks)
What ifs
Queries
Automatic recalculation
Internet browsing
Animation
Data and formulae replication
pg. 92
UACE Subsidiary ICT
………………………………………………………………………………………………
b) Web browser
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
c) Search Engine
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
d) Online social network
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
e) Website
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………....
pg. 93
UACE Subsidiary ICT
Advantage:
……………………………………………………………………………………......................
……………………………………………………………………………………......................
Disadvantage:
..........……………………………………………………………………………………............
……………………………………………………………………………………......................
15. Describe five advantages of using mobile phones to speak with other people rather than
sending emails using a laptop. (5 mks)
(i) ……………………………………………………………………………………..........
............………………………………………………………………………………….
…………………..............................................................................................................
(ii) ……………………………………………………………………………………..........
......................……………………………………………………………………………
……….............................................................................................................................
(iii) ……………………………………………………………………………………..........
......................……………………………………………………………………………
(iv) ……………………………………………………………………………………..........
......................……………………………………………………………………………
……….............................................................................................................................
(v) ……………………………………………………………………………………..........
......................……………………………………………………………………………
16.
Car make and model Number of cars sold Air conditioning (Y/N)
Ford Mondeo 45 Y
Opel Corsa 52 N
BMW Series X 35 N
Nissan Micra 39 N
A car showroom uses a database to store information about the cars it has sold. Part of this
database is shown above.
a) (i) Which field stores Boolean data? (1 mk)
………………………………………………………………………………………………
(ii) Give one reason why Boolean data type is used. (1 mk)
……………………………………………………………………………………................
b) (i) Which field stores numeric data? (1 mk)
………………………………………………………………………………………………
(ii) Give one reason why numeric data type is used. (1 mk)
……………………………………………………………………………………................
c) Identify one other data type used in the database above. (1 mk)
pg. 94
UACE Subsidiary ICT
……………………………………………………………………………………................
17. Multi-national companies often use video conferencing rather than face to face meetings.
a) Give three advantages of video conferencing. (3 mks)
Advantage 1:
……………………………………………………………………………………................
Advantage 2:
……………………………………………………………………………………................
................……………………………………………………………………………………
Advantage 3:
……………………………………………………………………………………................
................……………………………………………………………………………………
pg. 95
UACE Subsidiary ICT
iii. .........................................................................................................................................
20. In online banking data can be misused by hackers. Name two types of security measure
which can be used to help to prevent this. For each security measure, give an advantage and a
disadvantage. (3 mks)
Measure 1
.....................................................................................................................................................
Advantage...................................................................................................................................
Disadvantage...............................................................................................................................
.....................................................................................................................................................
Other than hacking, describe any two online security treats that connected devices are
exposed to. (2 mks)
(i) .........................................................................................................................................
..............................................................................................................................................
Candidate’s Name: Random No. Personal No
…………………………………………..
Signature:
…………………………………………………….
(Do not write your school/center Name or Number anywhere on this booklet)
S850/2
SUB. ICT
Paper 1
Nov. /Dec. 2013
21/2 hours
INSTRUCTIONS TO CANDIDATES
Answer all questions in this paper
The paper is made up of twenty equally weighted questions.
All answers should be written in blue or black ink in the space provided on the Question paper.
pg. 96
UACE Subsidiary ICT
(b) Identify one device that can facilitate any one of the stages listed above. (1 mark)
………………………………………………………………………………………………
2. State any five characteristics of a computer. (5 marks)
a) ………………………………………………………………………………………………………………………………..
b) ………………………………………………………………………………………………………………………………..
c) ………………………………………………………………………………………………………………………………..
d) ………………………………………………………………………………………………………………………………
e) ………………………………………………………………………………………………………………………………
5. The following are functions of the Operating Systems. Indicate True or False. (5 marks)
………………………………………………………………………………………………
(b) Judith wants to transfer a file from one computer to another. Suggest any three
devices she could use. (3 marks)
i. ………………………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………………………………
7. Use the following terms to complete the statements (a) – (e). (5 marks)
A Universal Serial Bus An Arithmetic Logic Unit
A control Unit A serial port
A cache memory
a) ………………………………………….. is a high speed memory built into the Central
Processing Unit that temporarily stores data during processing.
b) …………………………………………… is part of the Central Processing Unit that
coordinates its operations.
c) …………………………………………… is a fast memory chip located on or near the Central
Processing Unit to help speed up processing.
d) …………………………………………… is used to connect up to 127 peripheral devices to a
computer without additional expansion.
e) …………………………………………… is the part of the Central Processing Unit that
performs logical operations.
8. List five elements that can be displayed on the desktop of a normal working computer.
(5 marks)
a) ………………………………………………………………………………………………………………………………
b) ………………………………………………………………………………………………………………………………
c) ………………………………………………………………………………………………………………………………
d) ………………………………………………………………………………………………………………………………
e) ………………………………………………………………………………………………………………………………
9. (a) Distinguish between a Local Area Network and a Wide Area Network. (2 marks)
………………………………………………………………………………………………
………………………………………………………………………………………………
(b) Give three advantages of computer networks. (3 marks)
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………………………………
10. What suitable application programs would you use to perform the following tasks?
a) To prepare an invitation letter ……………………………………………………… (1 mark)
b) To prepare a budget. ……………………………………………………………………. (1 mark)
c) To produce business cards ……………………………………………………………. (1 mark)
d) To prepare an employee data bank ……………………………………………… (1 mark)
pg. 98
UACE Subsidiary ICT
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………
13. (a) State two advantages of using E-mail software over ordinary postal letters. (2 marks)
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………
(b) What are the uses of the following features of E-mail software? (2 marks)
i. To: …………………………………………………………………………………………………………………………
ii. BCC: ………………………………………………………………………………………………………………………
c) Diagnostic:
………………………………………………………………………………………………...
d) Anti-virus:
………………………………………………………………………………………………
pg. 99
UACE Subsidiary ICT
e) File compression:
………………………………………………………………………………………………………………………………
17. (a) State any three computer security risks in the computer laboratory. (3 marks)
i. …………………………………………………………………………………………………………………………………
ii. …………………………………………………………………………………………………………………………………
iii. …………………………………………………………………………………………………………………………………
(b) Outline any two ways to enforce computer laboratory security. (2 marks)
i. …………………………………………………………………………………………………………………………………
ii. …………………………………………………………………………………………………………………………………
19. The table below displays information about some KB employee’s data. Study it and answer
the questions below:
………………………………………………………………………………………………
(b) Name the data types for the following entries. (2 marks)
(i) ID No. ………………………………………………………………………………………………………………..
(ii) DOB: …………………………………………………………………………………………………………………
pg. 100
UACE Subsidiary ICT
*END*
pg. 101