0% found this document useful (0 votes)
29 views105 pages

Form 5,6 Edited Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views105 pages

Form 5,6 Edited Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 105

UACE Subsidiary ICT

Subsidiary
Information and
Communication
Technology

UACE SUBSIDIARY ICT

pg. i
UACE Subsidiary ICT

List of Acronyms
ALU – Arithmetic Logic Unit
ASCII –American Standard Code for Information Interchange
BIOS – Basic Input Output System
BPS – Bits per Second
CAD/M – Computer Aided Design/ Manufacturing
CAL – Computer Aided Learning
CAT 5 – 'Category 5' cable
CD – Compact Disc
CD-R – Compact Disc Recordable
CD-ROM – Compact Disc Read Only Memory
CD-RW – Compact Disc Re- Writable
CPU – Central Processing Unit
CRT – Cathode Ray Tube
DBMS – Data Base Management System
DDR – Double Data Rate
DFD – Data Flow Diagrams
DOS – Disc Operating System
DSL – Digital Subscriber Line
DTP – Desktop publishing
DVD – Digital Versatile Disc
EFT – Electronic Funds Transfer
EULA – End User License Agreement
FAQ – Frequently Asked Questions
FIFO - First in First Out
FNF – First Normal Form
FTP – File Transfer Protocol
GB – Gigabyte
GIF – Graphic Interchange Format
GIGO – Garbage In Garbage Out
GPS – Global Positioning System
GUI – Graphical User Interface
GW – Gateway
HCI – Human Computer Interaction
H/D – Hard Disc
HTML – Hyper Text Mark-up Language
HTTP – Hyper Text Transfer Protocol
IC – Integrated Circuit
ICT – Information and Communication Technology
IP – Internet Protocol
IRC – Internet Relay Chat

pg. ii
UACE Subsidiary ICT

TABLE OF CONTENTS
TOPIC 1: INTRODUCTION TO COMPUTING ………………………….......... 1
SUB TOPIC 1; INTRODUCTION TO COMPUTERS ……………………. 1
SUB TOPIC 2; WORLD OF ICTS ………………………………………… 2
SUB TOPIC 3: IMPLICATIONS OF ICTS ……………………………….. 3

TOPIC 2: COMPUTER MANAGEMENT ……………………………………… 6


SUB TOPIC 1: BOOTING PROCESS OF A COMPUTER ………………. 6
SUB TOPIC 2: FILE MANAGEMENT …………………………………… 8
SUB TOPIC 3: COMMON UTILITIES …………………………………… 12

TOPIC 3: COMPUTER LABORATORY CARE AND MAINTENANCE …… 13


SUB TOPIC 1: COMPUTER LITERACY ………………………………… 13
SUB TOPIC 2: SECURE LABORATORY ENVIRONMENT …………… 13
SUB TOPIC 3: SERVICING & MAINTENACE OF COMPUTER SYSTEMS … 16

TOPIC 4: WORD PROCESSING ………………………………………………… 18


SUB TOPIC 1: INTRODUCTION TO WORD PROCESSING …………... 18
SUB TOPIC 2: WORKING WITH WORD PROCESSING ………………. 19

TOPIC 5: COMPUTER HARDWARE …………………………………………... 20


SUB TOPIC 1: INPUT DEVICES …………………………………………. 20
SUB TOPIC 2: OUTPUT DEVICES ………………………………………. 26
SUB TOPIC 3: STORAGE DEVICES …………………………………….. 28
SUB TOPIC 4: PROCESSOR COMPONENTS …………………………… 33

TOPIC 6: COMPUTER SOFTWARE …………………………………………… 39


SUB TOPIC 1: APPLICATION SOFTWARE …………………………….. 39
SUB TOPIC 2: SYSTEM SOFTWARE ……………………………………. 40

TOPIC 7: ELECTRONIC SPREADSHEET …………………………………….. 47


SUB TOPIC 1: INTRODUCTION TO SPREADSHEETS ………………… 47
SUB TOPIC 2: WORKING WITH SPREADSHEETS ……………………. 52

TOPIC 8: INTERNET AND WORLD WIDE WEB …………………………….. 50


SUB TOPIC 1: INTRODUCTION TO THE INTERNET ………………….. 50
SUB TOPIC 2: INTERNET SERVICES …………………………………… 51
SUB TOPIC 3: WORLDWIDE WEB ……………………………………… 52

TOPIC 9: ELECTRONIC PRESENTATION …………………………………... 56


SUB TOPIC 1: INTRODUCTION TO ELECTRONIC PRESENTATION
SUB TOPIC 2: WORKING WITH PRESENTATION SOFTEARE

TOPIC 10: DATA COMMUNICATION & NETWORKING ………………….. 58


SUB TOPIC 1: INTRODUCTION TO DATA COMMUNICATION
SUB TOPIC 2: COMPUTER NETWORKS ………………………………… 63

pg. iii
UACE Subsidiary ICT

TOPIC 11: ELECTRONIC PUBLISHING ………………………………………. 68


SUB TOPIC 1: INTRODUCTION TO ELECTRONIC PUBLISHING
SUB TOPIC2: PUBLISHING BASICS

TOPIC 12: DATABASES ………………………………………………………….. 70


SUB TOPIC 1: INTRODUCTION TO DATABASES
SUB TOPIC 2: WORKING WITH DATABASES

TOPIC 13: SECURITY, ICT E THICAL ISSUES & EMERGING TECHNOLOGIES


SUB TOPIC 1: COMPUTER SYSTEM SECURITY ………………………. 73
SUB TOPIC 2: PRIVACY & ICT ETHICAL ISSUES ……………………... 74
SUB TOPIC 3: EMERGING TECHNOLOGIES …………………………… 76
SUB TOPIC 4: CARRERS IN THE ICT INDUSTRY ……………………… 79

CONTENTS
Acronyms ...................................................................................................... ii
Topic 1: Introduction to Computing ........................................................... 1
Topic 2: Computer Management ................................................................ 6
Topic 3: Computer Laboratory Care and Maintenance ................................ 13
Topic 4: Computer Word Processing .......................................................... 18
Topic 5: Computer Hardware ...................................................................... 20
Topic 6: Computer Software ....................................................................... 39
Topic 7: Electronic Spreadsheets I .............................................................. 47
Topic 8: Internet and World Wide Web ....................................................... 50
Topic 9: Computer Word Processing II .......................................................
Topic 10: Electronic Presentation ............................................................... 56
Topic 11: Data Communication and Networking ....................................... 58
Topic 12: Electronic Publication ................................................................. 68
Topic 13: Electronic Spreadsheets II ..........................................................
Topic 14: Databases .................................................................................... 70
Topic 15: System Security, ICT Ethical Issues and Emerging Technologies 73

pg. iv
UACE Subsidiary ICT

TOPIC 1: INTRODUCTION TO COMPUTING

SUB TOPIC: Introduction to computers

What is a computer?
The word "Computer" is derived from the word "Compute" which means to calculate. In the past,
the computer was normally considered to be a calculating device used to perform arithmetic
operations. But today, a computer is used in every field of our daily life to solve most of the
problems.

Definition of a computer: A computer is an electronic device which processes information based


upon the instructions provided and generates the desired output.

A computer can also be defined as an electronic device (machine) that accepts the input of data,
processes or manipulates the given data according to the predefined instructions, stores the data
and outputs the desired output for future use.

Like any other system, a computer system also requires an input which is processed to get a
desired output. In the case of computers, two kinds of inputs are required. One; the basic or raw
data, and two: a set of instructions containing the methodology (way) to process this data. This set
of instructions is called program or software.

Difference between data and information:


Data refers to raw and unprocessed facts, figures or symbols. Such facts are of little meaning or
significance until are sorted or put in more useful way.
Information: It refers to the processed data that has meaning and very useful.

This can be illustrated as follows:

INPUT PROCESSING OUTPUT


STAGE STAGE STAGE

STORAGE
STAGE

A Processing Information cycle

An illustration above shows a series of information processing cycle commonly known as input,
processing, output and storage (IPOS).

Computer instructions are entered into the computer and input devices like keyboard, scanner etc
are used to feed data into the computer. At the processing stage, processing devices like the central
processing unit (CPU), motherboard etc process data into information. Then data/information
output and displayed using output devices such as printer, monitor among others. At the storage
pg. 1
UACE Subsidiary ICT

stage, data/information is stored on storage devices for future use. Such devices include compact
disks, hard disks among others.
In summary
Input: Computer receives data from input device.
Processing: Computer’s central processing unit (CPU) processes the data into information.
Output: Meaningful information displayed on monitor or printed out.
Storage: Saves results to computer’s hard drive or other types of secondary storage.
REVIEW QUESTIONS:
1. Define IPOS cycle.
2. Describe an IPOS cycle?

CHARACTERISTICS OF COMPUTERS
a. Computers store data (storage): A computer can store large volumes of data permanently.
Users can use this data at any time. Thus text, graphics (pictures), audio and video files can
be stored easily.
Memory (power of remembering): a Computer has a brain, but unlike human (Man) beings.
A computer can store data and information, and recalled as long as you require it, for any
number of years because of its secondary storage capability. A data and information can be
retrieved as long as desired by the user and can be recalled, as when required. The
information recalled would be as accurate as on the day when it was fed to the computer.

b. Computers process data: computers can perform different types of processing like addition,
subtraction, multiplication and division. They can also perform logical functions like
comparing two numbers to decide which is bigger and which smaller.
c. Computers are accurate (accuracy): The word accuracy means providing results without
any error(s).Computers can process large amounts of data and generate error-free results.
Thus, a modern computer performs millions of operations in one second without any error.
d. Computers are speedy: Computers can work at very high speed and are faster than human
beings. The time used by the computer to perform an operation is known as processing
speed. The computer speed is best measured in mega hertz (MHz) or gigahertz (MHz).
e. Computers are automatic (automation): Computers are automatic machines, because they
start any given task, they carry on until the task is finished without any human assistance.
However, computers being machines cannot operate themselves. For instance, they cannot
start printing the work without being instructed by any person.
f. Computers are versatile (versatility or flexibility): Versatility is the most characteristic of
computers. Computers are capable doing more than one task at the same time. This is also
known as multi-tasking. For instance one may use a computer to print out documents. In the
next time you may use a computer to re-print the same documents and playing computer
games as well.
g. Computers are diligent (diligence or consistency): Computers have the ability to perform
the same task over for long time without getting tired. Therefore, computing devices must be
able to perform the same routines repeatedly. This is evidenced in industrial robotics like
those in car assembly lines.
h. Processing: A computer can process the given instructions. It can perform different types of
processing like addition, subtraction, multiplication and division. It can also perform logical
functions like comparing two numbers to decide which one is the bigger etc.
i. Communication: Most computers today have the capability of communicating with other
computers. We can connect two or more computers by a communication device such as

pg. 2
UACE Subsidiary ICT

modem. These computers can share data, instructions, and information. The connected
computer are called network.
REVIEW QUESTIONS:
1. Define and explain the characteristics of a computer.
2. Differentiate a computer from a type writer.
SUB-TOPIC 2: WORLD OF ICTs
ICT is a short form (acronym) which stands for Information and Communications Technology or
technologies.
Definition of ICT:
ICT is the study or business of developing and using technology to process information and aid
(support) communications.
ICT is the comprehensive term that includes any communication device or application that
covers:-
- Radios - Cellular phones
- Television - Satellite systems
- Computer and network hardware and software etc

Computers are widely used in our everyday life to accomplish various tasks. Their uses are wide as
the user can imagine and include the following:

a. ICTs are used in business environment; many businesses have realized the benefits of
computers. For instance, with most stock exchanges (money markets), you can only need to
sit in front of your computer, whether in your office or at home and carryout business with
various companies worldwide.
b. Are used to carryout Scientific Research; recent advancements in scientific research have
been possible mainly due to the use of computers. New drugs have been introduced,
exploration into space is possible and in places where human beings cannot survive. In
addition, machines equipped with various computers are sent in space and data transmitted
back to earth.
c. Education purposes; with the development of computers, the Internet has emerged. Many
local institutions have linked up with big universities and libraries overseas, hence
facilitating education and research. This has further led to the creation of Virtual
Universities. Virtual universities are universities with no physical buildings for lecture rooms
or halls of residence, but of course giving the necessary lectures on the computer via the
Internet. Thus the term “Virtual Reality”.
d. Communication: We use computers to send and receive messages from one place to another
using E-mail service, thus files and folders can be attached onto e-mail messages.
In addition, people use computers to call others using electronic gadgets like mobile phones,
fax machines and this allows business to be carried on smoothly.
e. Banking: Computer users can know how different bank accounts operate while using
computers as well as transferring money from one account to another using Internet. This is
at times known as Internet banking.
People are able to check on their bank statements from their homes without necessarily going
to banks. This reduces on the time that one would have spent going to line- up in banks.

f. Security: Computers are of great advantage in keeping law and order in fighting crime and
maintaining stability. For example; the police are now able to keep a database of finger prints
(biometrics) which are automatically analyzed by the computers.
pg. 3
UACE Subsidiary ICT

g. Research: Businessmen are able to know various prices of commodities while using
computers. This enables them to produce the commodities of high quality to compete with
others on the market.
In agriculture, researchers use computers to determine fertilization programs that optimize
yields of various crops.
h. Employment opportunities: Computer users are able to find jobs by visiting different
websites that provide job tips and numerous online job listings. Such websites include;
www.jobsonline.com
Computers have also provided career chances such as database administrators, computer
trainers, web designers, network administrators, system analysts and computer programmers.

i. Transport: Passengers are able to know the flight schedules by visiting the websites of
different travel companies. Such travel companies include; British Airways, Air Uganda etc.
Travel tickets are always computerized which enable transport officers to enter passengers’
data who traveled in a given period of time, say weekly or monthly journeys.

j. Marketing: Different business organs and companies use computers to know how best their
products are competing with other competitors. This is done by checking on business
websites like; www.amazon.com to know which companies are booming and which ones
have gone out business.
More to that, different websites provide a list of catalogues where customers are able to
choose their best commodities and prices as well. These include; www.wansung.com,
www.jomayi.co.ug among others.

k. Commerce and E-business: This refers to the buying and selling of goods and services.
Thus people are able to carry out commerce over the Internet by placing orders of goods they
want. This is also known as the Electronic Commerce (E-commerce).
l. Health care: Computers have greatly been used to maintain patients’ records, where by
health workers are able to know relevant information about their patients. These include;
patient’s name, place of birth and the diagnosis to be examined.
Doctors use computers to monitor patients’ vital signs in hospital rooms. They also use
computer-controlled devices during operations like heart surgery.
m. Data storage: Computers can store large volumes of data for the users. This helps
businessmen to keep business related records for future reference.
n. Entertainment: Computers have played a big role in entertainment. A Musical Instrument
Digital Interface (MIDI) exists to link a musical instrument to a computer to control very
many instrumental sounds.
o. Automated production: It involves computerization of production in factories. In other
words, it is computer-aided production which does not require high man power. This also
reduces on the costs of production because of the efficiency of machines.

USES OF ICTs IN EDUCATION


a. ICTs facilitate sharing of resources, expertise and advice between students, teachers and
parents on the local and international scene.
b. E-learning is made possible by ICTs. This is where by a teacher in Kenya or Rwanda can
teach students in Uganda using a video conferencing facility.
c. Communication channels are increased through e-mail services, online discussion groups and
chat rooms among teachers, students and parents.

pg. 4
UACE Subsidiary ICT

d. ICT tools like computers, projectors, smart boards etc help in teaching ICT literacy skills
among all people which builds confidence in them.
e. Easier planning and presentation of lessons and designing learning materials for example
using presentation softwares like Microsoft power point.
f. ICTs have provided wide access to up to date online students’ and school data, anytime and
anywhere by teachers and students through using computer systems.

DISADVANTAGES
- ICT facilities like computers are expensive to buy and maintain.
- Health problems resulting from using computers for a long period of time. Such health
issues may include; eye strains, backache among others.
- ICTs have caused moral degeneration. This is as a result of watching pornographic movies
and pictures mainly on computers and television sets.
- ICTs need special training to be able to use some of these equipments.
-

USE OF ICTs IN BUSINESS


i. ICTs are used for e-banking in business. It is impossible now to run a banking facility
without ICTs.
ii. ICTs are used in mobile money transfer services. This is money transfer mostly done on
mobile phones as long as you are in an area covered by network of the service provider.
iii. They are used for E-commerce. E-commerce is the buying and selling of goods and services
on the Internet.
iv. With ICT advertisement is now done online, on radios locally and internationally, on
television and over the internet (websites).
v. ICTs have created career jobs for example; software engineers, network administrators,
computer trainers, satellite engineers among others.
vi. ICTs make payment for online insurance services possible through computer and phone
based services.

DISADVANTAGES
i. There are conmen and women who practice phishing and pharming especially on internet
who host websites claim to have genuine business and end up robbing people of their
money.
Phishing is the act of attempting to acquire sensitive information like user names,
passwords and credit card details by disguising as trustworthy source.
Pharming is a practice in which malicious codes are installed on computers misdirecting
users to fake (fraudulent) websites without their knowledge.
ii. It is less secure: The information carried on ICT channels especially on the internet has no
guaranteed security. Hackers gain access to secret and important information. For example;
hackers can gain access to your credit card PIN number during online payments.

USES OF ICTs IN ENTERTAINMENT


- There is free music editing software readily available on internet help to organize music in
a more entertaining way.
- Most ICT equipments like televisions, radios and mobile phones provide great
entertainment to their audiences.
- There is a variety of online computer games that provide entertainment to their users.
pg. 5
UACE Subsidiary ICT

- Internet provides online audio and video search engines like YOUTUBE.com to its users.

USES OF ICTs IN SECURITY


a. ICTs especially telecommunication systems and voice tracking systems help track
criminals and terrorists.
b. ICTs especially computers make robots and drones technology in military operations
possible by allowing a remote control platform.
c. The CCTV (Circuit Closed televisions) surveillance cameras installed on ATMs, banking
malls, buildings and supermarkets help to reduce crime and theft.
d. The sophisticated biometric equipments and systems for storing finger prints of a
company’s workers control access to company premises.
e. ICTs especially satellite monitoring systems, GPRS, navigation trucking systems installed
for example Security Group cars transporting money considerably improve security of
money, people and vehicles from attack by robbers on roads, sea pirates and aeroplane
hijackers.

USES OF ICTs IN HEALTH CARE


Computers are very useful in the education medical sector due to the following reasons:-
- Computers are used in research and diagnose medical conditions.
- Computers help to maintain patients’ records in hospitals and clinics.
- They monitor patient’s vital signs in hospital rooms and at home.
- They help to implant computerized devices like pacemakers that allow patients to live longer.
- Computers are used in telemedicine with videoconferencing capabilities.
- They help in computer-aided surgery for training prior to performing surgery on live humans.
- Computers carryout computer-assisted medical tests.
- They use computer-controlled devices during operations that require great precision e.g.
laser-eye surgery and heart surgery.

REVIEW QUESTIONS
1. Define the term computer and various characteristics associated with them.
2. Discuss the role of computers in the society today.
3. What is “Virtual Reality”?
4. What do you understand by the term “Computerisation?”

TOPIC-2: COMPUTER MANAGEMENT

SUB-TOPIC 1: BOOTING PROCESS OF A COMPUTER


What is booting?
Booting is the process of starting or resetting a computer which involves loading an operating
system into memory.
TYPES OF BOOTING THE COMPUTER
Booting is of two types namely:
 Cold boot
 Warm boot

Cold boot: Cold boot is the starting of a computer which has not been in use.
pg. 6
UACE Subsidiary ICT

How cold boot is carried out:


- When we turn on the computer, it switches on its ROM
- Then checks the RAM part and it also performs a test on the peripherals to ensure that all
are working properly say; mouse, keyboard etc.
- If anything is wrong, it displays a message; else it copies DOS from the secondary memory
i.e. a floppy diskette or it copies DOS from the secondary memory that is; from the floppy
disk or from the hard disk.

Warm boot: This is the process of restarting or resetting a computer that is already turned on.
The warm boot; sometimes the computer stops responding to the commands given by the user. In
such cases, we need not switch the power off to restart the computer.
We can restart the computer by pressing CTRL + ALT + DEL keys together. On some computers,
RESET switch is there; the reset switch can be used to restart or reboot the system.
In warm boot, ROM does not test RAM or the peripherals. This is known as warm booting.
Boot sequence:
i) The power supply sends an electric signal to the motherboard and other devices located
in the system unit.
ii) The CPU resets itself and looks for the ROM that contains the BIOS.
iii) The BIOS executes the Power On Self Test (POST) to make sure that the computer
hardware is connected properly and operating correctly.
iv) The results of the POST are compared with data in a CMOS chip on the motherboard.
v) If the POST is completed successfully, the BIOS looks for the boot program that loads
the operating system.
vi) Once located, the boot program is loaded into memory and executed, which then loads
the kernel of the operating system into RAM.
vii) The operating system loads system configuration information, and the remainder of
the operating system is loaded into RAM, and the desktop and the icons display on the
screen.

In summary, the boot process is as follows:


1. The central processing unit (CPU) activates the basic input/output system (BIOS). BIOS is
the program that manages the data between the operating system and all the input and
output devices attached to the computer, hence its name. BIOS is also responsible for
loading the operating system from its permanent location on the hard disk drive into RAM.
2. BIOS conducts a power-on-self-test (POST) to check all attached devices are in place and
in working order.
3. BIOS then loads the operating system from the hard drive to RAM.
4. The registry is checked for further configurations and customizations. If everything has
checked out and is loaded properly, important utilities like diagnostic and disk scanner
utilities are started. The desktop appears on the monitor and the computer system is ready
to accept the instructions.

COMPUTER SYSTEM START UP AND SHUTDOWN


This has to do with starting and turning off the computer.
How to start a computer
- Make sure you have a stable power source
- Ensure that all hardware components are firmly connected
- Turn on power from the wall socket, the UPS, the system unit and finally the monitor

pg. 7
UACE Subsidiary ICT

- The booting process (cold boot) then starts


- The first screen i.e. the desktop appears on the screen.
How to turn off or shutdown the computer
- Click the start button on the Desktop
- Choose to turn off or shutdown the computer depending on the type of operating system
- Then you choose to turn off or shut down the computer.

THE CONCEPT OF A COMPUTER PROGRAM


A computer program is a set of instructions written to perform a specific task with a computer. In
other words, computer programs enable us carry out day to day business problems e.g. Microsoft
word, Excel among others.
A collection of computer programs and related data is referred to as the software.

Starting an application program using a mouse


- Click on start button on the desktop
- Click All programs
- Then choose Microsoft office
- Click on any program that you want e.g. Microsoft Excel
How to use a compatible keyboard to open an application program
- Press the windows key on the keyboard
- Use the arrow keys to move up and the start menu
- Press enter when all programs is selected
- Use arrow keys to move to the program you want to open
- Press enter key when Microsoft office is selected
- Use arrow key to move to any program i.e. Microsoft Word
- Press enter key to open any programs needed
Using command prompt to open programs
- Click on start button
- Then choose “Run”
- On the Run dialog box type in winword and press “OK” or “Enter” button to open
Microsoft Word
- On the Run dialog box type in excel and press “OK” or “Enter” button to open Microsoft
Word
- On the Run dialog box type in msaccess and press “OK” or “Enter” button to open
Microsoft Word
- On the Run dialog box type in powerpnt and press “OK” or “Enter” button to open
Microsoft Word
- On the Run dialog box type in mspub and press “OK” or “Enter” button to open Microsoft
Word

SUB-TOPIC2: FILE MANAGEMENT


What is file management?
File management refers to the system that an operating system or program uses to organize and
keep track of files.
Most windows operating systems use a hierarchical file system and it is one that uses directories to
store files in a tree- like structure inside folders.

pg. 8
UACE Subsidiary ICT

What is a file?
A file is a collection of data on a single memory location unit given a unique name.
OR: a file is a collection of related information store on a disk.
A file can be a word document, music, video or photo file. Text files normally contain written text
and are called word documents.
A file can also be defined as a collection of data or information that has a unique name called the
file name.

FILE EXTENSIONS
A file extension is the last part of a file name after the dot (.) and they may include:-
.doc Microsoft Word document
.xls excel file
.db Microsoft database file
.ppt Microsoft power point file
.command Command file
.txt text file
.htm Web file
.gif graphics file
.sys system file
.bat batch file
.exe Executable file

Batch file: These are usually programs or utilities or virus guards or even DOS commands.
System files are usually drivers or programs that help other programs to run
Executable file: These are usually files or programs that use the same operating system.

A DOS file has three (3) parts i.e.


- The file name
- The period
- The extension

A period is a dot (like a full stop) that separates the file name and the extension.
An extension: It is an identifier of a particular file with a group of files made from the same
application or designed to execute the same command
E.g. My work . doc

File name Period Extension

Files are stored in directions organized in 3 levels i.e.


o The Root directory, (upper level),
o Main directory and
o Sub directory (low level)
- The root directory should never be removed because if removed, all files and directory will be
removed.
- The main directory branches from the root directory and the main directory contains sub
directories which then contain folders in which files are stored.

pg. 9
UACE Subsidiary ICT

Illustration of the DOS file structure


Desktop Root directory

My computer Main directory

31/2 Floppy (A:)


Local Disk (C:)
Local Disk (D :) Sub directory
Removable Disk (E:)

My Documents

My Network places

Online services

The directory is a list of files on a disk that gives file names and sizes.

Types of files in a windows operating system


Windows operating system has two main types of files namely:

EXERCISE
Given the file path C:\user\desktop\Mugisha\Letter.doc, identify the following:-
 Filename: …………………… Letter
 File type: ……………………. .doc
 Profile: ………………………. Desktop
 Folder: ………………………. Mugisha
 Location: ……………………. C:/user

Types of files in a windows operating system


There are two main types of files namely:-
 System files
 Application files
A system file is an executable file (in machine language) that is part of the operating system or
other control program that contains critical files for the smooth running of the operating system.
For example; system.ini, system.dll
Application files also called program files are files that hold application program data or
directions e.g. .xls file in an application file for Microsoft Excel program.

Define the following:


 A folder is a directory that contains other folder within it.
 Sub folder: It is a folder or directory in another folder or directory.
 Storage location: It is a location on the computer where files and folder are stored. E.g. My
documents, My Network place, shared documents etc.
 Icon: It is a picture on a computer screen that represents a pecific file, hardware resource or
a program.

WORKING WITH FILES AND FOLDERS


pg. 10
UACE Subsidiary ICT

How to create a file on the windows desktop:


- Go to the windows desktop
- Right click on any blank portion of the desktop
- In the menu that appears, click “New” and then “Folder”
- A new folder will appear and type the name of the folder you want to use and then press the
enter key.

Other ways of creating a folder:


- Open My Computer or Windows explorer
- Open the drive or folder you wish to create a folder on; e.g. the C:/ drive
- Right click on a blank portion of the folder
- Click New and then Folder
How to delete a file or folder:
- Right click on the file or folder
- Select delete
- Then OK
Alternatively:
- Select the file of folder you want to delete
- Press the delete key on the keyboard
- Then press the enter key
The Recycle Bin
It is a temporary storage area for files that you have deleted. Files can either be recovered or
permanently removed from the Recycle Bin.
How to restore a file/folder
- Open the recycle bin by double clicking on its icon
- Right click on the file or folder to select delete or restore

Customizing the Windows Desktop


Definition of a Windows Desktop:
A Windows Desktop is the working area of the Windows XP screen consisting of program icons,
a taskbar and a Start menu.

Customizing the Desktop refers to changing the desktop appearance to what you want to look like.
One can customize the desktop by:
 Changing the background image or theme
 Change which icons or shortcuts to appear on the desktop
 Resize the task bar
 Change the appearance position of the start menu
 Font size of desktop icon names
 Screen resolution desktop colour quality
 Selecting screen savers and screen saver wait time
 Screen refresh rate etc
To do all these, right click on any free space on the desktop and select properties option. Use the
dialog box that appears to customize your desktop.

Major icons on the Desktop


What is an icon? An icon is a graphic representation of an object that you can select and open;
such as a drive, a disk, a folder, a document or a program.
pg. 11
UACE Subsidiary ICT

Most computers will show:


 My Documents icon: It is a short cut that accesses documents created on the computer
 Recycle bin icon: It is a temporary storage area for files that you have deleted.
 My Computer icon: It is an icon that provides access to the drives, folders and files on
your computer.
 Mozilla Firefox/Internet explorer icon: These are short cuts for opening the web browser
in order to access internet.
 Short cut icons: These are icons that show installed programs or folders. Short cut icons
always have a curved arrow on them.
 My Network places icons: It shows shortcuts to network computers, websites and FTP
sites.
Define the following:
Start Button: It is the button on the left side of the taskbar that is used to start programs, change
system settings, fond Windows help or shutdown the computer.
Task Bar: It displays the start button and the name of any open documents. The taskbar may also
display shortcut buttons for other programs.
Notification Area: An area on the right side of the taskbar, formerly called the system tray or
status area, where the clock and system notifications display. These notifications keep you
informed about processes that are occurring in the background such as network connections,
antivirus software checking and other utility programs.
Mouse Pointer: An arrow; I-beam or other symbol that moves when one moves the mouse or
other pointing device; and which indicates a location or position on your screen.

Shortcut Menu: Shortcut menus list commands that are context-sensitive, i.e. commands
commonly used when working with the selected object.

SUB-TOPIC 3: COMMON UTILITIES


What are utility programs?
These are software programs that add functionality to the computer. In other words they help a
computer to perform better.
These include:-
i. Data sorting: This involves taking in data and re-arranging in order as specified by the
user.
ii. Anti-virus utility: It is a program that prevents, detects and removes viruses from a
computer’s memory or storage devices, for example Norton Antivirus.
A type of software used to detect and remove viruses is called anti-virus software.
A virus is a program that negatively affects the health of your computer.

iii. Merging: It is a utility that involves combining data.


iv. Screen saver utility: A utility that causes the monitor’s screen to display a moving image
or blank screen if no keyboard or mouse activity occurs for a specified period of time.
Screen savers originally were developed to prevent a problem called ghosting, in which
images could be permanently etched on a monitor’s screen. They can also be used for
security reasons, business or entertainment.

v. File viewer utility: it is a utility that displays and copies the contents of a file.
vi. File Compression utility: This reduces or compresses the size of a file.
pg. 12
UACE Subsidiary ICT

A compressed file takes up less storage on a hard disk or floppy disk, which frees up room
on the disk and improves system performance.
Compressed files sometimes are called zipped files because they usually have a .ZIP
extension, and therefore they must be unzipped or restored to its original form before
being used.
vii. Diagnostic utility: This compiles technical information about a computer’s hardware and
certain system software programs and then prepares a report outlining any identified
problems.
viii. Disk scanner utility: It is a utility that detects and corrects both physical and logical
problems on a hard disk or floppy disk, and searches for and removes unwanted files.
A physical problem is one with the media, such as a scratch on the surface of the disk.
A logical problem: It is the one with the data, such as a corrupted file allocation table
(FAT).

ix. Disk defragmenter utility: It is a utility that reorganizes the files and unused spaces on a
computer’s hard disk so that data can be accessed more quickly and programs can run
faster.
When the contents of a file are scattered across two or more non-contiguous sector, the file
is fragmented.

x. Uninstaller utility: It is a utility that removes an application, as well as any associated


entries in the system files.
xi. Backup utility: This allows a user to copy or backup selected files or the entire hard disk
onto another disk or tape.
How to search for files or folders in Windows operating system
- Click the start button then choose “Search”
- In the search companion, choose what you want to search for..
- Either pictures and music
- Documents e.g. Microsoft word document
- All files and folders
- Computers or people etc

TOPIC 3- COMPUTER LABORATORY CARE AND MAINTENANCE

SUB-TOPIC 1: COMPUTER LITERACY

Computer literacy is defined as the knowledge and ability to use computers and related
technology efficiently. It ranges from skills covering levels from elementary use to programming
and advanced problem solving.

Computer skills: It refers to the ability to use the software and hardware of a computer.

Aspects of computer literacy include:


 what is a computer
 computer viruses

pg. 13
UACE Subsidiary ICT

 computer security
 social implications of computers
 how to use a computer
 managing files and editing pictures
 composing, editing and printing documents

Why should someone become a computer literate?


- Greater access to resources
- Multitude of information
- For entertainment
- To stay in touch with the world
- Carry out E-commerce

Disadvantages
- there is pornography associated with the use of computers
- people at times waste time on useless chats
- computers cause health hazards like eye strains.

SUB-TOPIC 2: SECURE LABORATORY ENVIRONMENT


A computer laboratory is a room where computers are learned and trained from.
Basic equipments that should be found in a computer Laboratory
a. The server: A server stores a copy of each workstation’s operating system. The workstation
can be made to connect to that server to reinstall the operating system.
b. The student stations; are the computers that the students use on regular basis.
c. The management station: is the computer that the teacher will use. The management station
will have direct access to the server and the management station of the switch, be able to
monitor the client stations and have a better access to external resource such as Internet.
d. Switch: It is the network equipment to which all the computers are connected
e. Optional equipments which include; printers, projectors, cameras, headsets etc.

Areas of laboratory security


1. First aid boxes: these hold kits to give first help in case of an accident. They should give
first help to any victim of either power shocks, computer breakdown among others.
2. Fire extinguisher: these hold carbon dioxide which can be used to combat(fight) fire
outbreak
3. Air conditioning: This is a system that provides a cool environment for both users and
computers. And thus, air conditioners are very helpful in cooling down the processing
computers and for comfort of the computer users.
4. Backup systems for all software and data. This handles having copies of all software
systems, their setups and data they hold on other separate storage locations to be able to
recover them in case of system or software breakdown. This is done by having updated
anti-virus software programs, servicing and maintenance of computers.
5. Security cameras: this deals with having CCTV (Closed Circuit Television) cameras fixed
in roof corners, at entrances to computer Labs so as to look at the users remotely from a
control room.
6. Electric power security: this handles the safety of both users and the electric equipment
used like computers, projectors etc. For this therefore, the UPSs (Uninterruptible Power

pg. 14
UACE Subsidiary ICT

Supply) units to power all equipments must be there, proper cabling using trunks should be
done and working with an experienced electrician.
7. Physical security: this deals with safety of the physical equipments and how they are
protected from both the internal external thieves. This should be done by using locking
equipments like metallic doors and windows, use of burglar proofs in windows and doors.
In addition, there must be a laboratory attendant to guide users all the time.

SAFETY PRECAUTIONS WHEN USING A COMPUTER LABORATORY


1. Switch off the computer every after use. This should be done by following the exact
procedures. These include; clicking on windows “start” button and then choose to “Turn
Off” completely.
2. Avoid making connections when the computer is on power e.g. keyboard connections,
mouse, monitor, printer etc.
3. Avoid abrupt switching off and on of the computer system; thus one should follow the proper
way of shutting down all the programs then shut down the computer from the start button.
4. Switch on your computer hardware system starting from the wall socket switch, UPS
(Uninterruptible Power Supply), or stabilizer, computer and then printer.
5. Food or drinks should not be allowed near the computer. This is done to avoid food from
pouring into the computer hardware components.
6. The microcomputer should not be exposed to direct sunlight or heat.
7. Place the computer in a dust-free environment with good ventilation. Thus dust covers should
be used to cover the computer when not in use; and if you are using polythene covers then do
not cover the computer immediately after switching off because it will trap the heat.
8. The computers should be regularly serviced for at least once or more frequently if the
environment is dusty. The service should include blowing the dust from the system unit and
other hardware components.
9. Always use anti-virus software to scan all viruses from your computer. This helps to safe
guard your files.
10. In areas where the power fluctuates, it is important to use either a stabilizer or uninterruptible
Power Supply (UPS), to ensure a steady input power to the computer system.
11. Diskettes from outside should not be allowed to enter in the computer lab. This is done to
prevent the virus from entering your computer.
12. Computer should not be kept in a hot environment. It is advisable to have air conditioners in
every computer lab.
13. Do not open the computer for inside cleaning; this should be handled by a qualified
personnel.
14. The floppy disks or compact disks for installation of programs and backups should be kept
safely in disk banks and kept away from sunlight and magnetic media.
15. It is a good practice to keep a record of the daily condition in case of computer failure.
16. Never obstruct (cover) the ventilators on the computer since they allow in cool air and give
out warm air.
17. A computer must be rest on a firm table, i.e. it must not be shaking to damage some devices.

COMPUTER LABORATORY RULES AND PROCEDURES


1. Do not use the facilities in the computer Lab unless you are told to do so.
2. Students are prohibited to enter the Lab unless authorized by the teacher.

pg. 15
UACE Subsidiary ICT

3. Do not attempt to open the system case or any other computer components. This is done to
avoid the damaging of computer hardware components, and must be done by computer
technical personnel.
4. Do not attempt to make any repairs to any of the computer components. This must be done
by a technical person who has the knowledge about computer repair and maintenance.
5. Leave your bags and other baggage at the help desk.
6. If you get any difficulties of any nature, seek assistance from the teacher or systems
administrator.
7. Any software brought in the Lab should be cleared first with the Systems Administrator or
the teacher, otherwise they will be confiscated
8. Do not attempt to delete work that is not yours.
9. Do not start the computer when the floppy/CD-ROM is inside the floppy drive/ CD-Rom
drive.
10. Access to pornographic materials or websites is strictly prohibited.
11. When you finish working remember to shutdown the computer properly by choosing the
shutdown option from the start menu.
12. Students are not allowed to create accounts or change passwords on any of the computers
in the Lab.
13. LOG on your computer as STUDENT. This is done to ensure that students cannot install
(put) in other computer software programs which are not authorized in the computer Lab.
14. Turn off the computer accordingly after use. In order to turn off the computer, click on
Windows start button and choose TURN OFF COMPUTER. This one depends on which
operating system you are working with.
15. Switch off all power supplies before leaving the computer lab.
16. Internet facility is strictly for educational purposes only.
17. Save all your work in external storage device and not in the computer.
18. The computer Lab should be kept clean and tidy. This is done to make sure that the
computer lab is free from any dust that may harm the computer systems.

SUB- TOPIC 3: COMPUTER SERVICING AND MAINTENANCE


The following are some of the ways how one can keep a computer clean for maximum
performance:-
- Location of the computer: When one is considering a location for the computer in an office
or at home, the place should be cool and preferably, air conditioners or in a place that is free
from dust although this cannot be prevented. A computer should not be placed near open
windows because it makes computer vulnerable to wind, rain and dust.
- Dust covers: When one is purchasing a computer, he or she should also buy dust covers.
These help to prevent dust on your computer keyboards, monitors and the Central Processing
Unit (CPU).
- The use of updated antivirus protection and detection software: A virus is a computer
program designed deliberately (intentionally) to harm a computer system. Viruses are
designed daily and spread from one computer to another. Thus, without the appropriate
software, the virus can cause disastrous results to a computer's hard drive.
- Managing computer files on the computer's hard drive: Keeping files over two or three
years old means slowing down the speed of the computer. Once a file(s) has been used and

pg. 16
UACE Subsidiary ICT

will not be needed for now then that files can be deleted or saved onto any storage medium
like external disk drives, floppy diskettes or on CDs.
- Cleaning computers on regular basis: This includes cleaning inside the system unit,
keyboard, monitors and other hardware components. For one to undertake this task, he/she
should utilize the appropriate tools like electric blowers and must have the proper
understanding of what is to be done.

HOW TO KEEP A COMPUTER CLEAN


- The use of computer specific vacuum cleaners is an excellent way to clean the system
units, keyboard and other computer hardware.
- The rubber ball inside the bottom of a mouse may need occasional cleaning. For the case of
optical mouse, one should ensure that he or she operates it on a smooth and clean table.
- One should never remove the cover on your computer to clean inside. Instead, take it to any
technical personnel for cleaning.
- One should always remember to install and regularly update antivirus software.
- One should keep all liquids and food items away from computers. This is because liquids
and food crumbs can damage delicate electronic circuits. Also, mixing liquids and
electronic components can cause serious electrical shock.
- Never open an E-mail attachment unless you know and trust the person who sent it.
- One should never accept downloads from Internet sites that you do not know and trust as
well.

HOW TO PHYSICALLY PROTECT YOUR COMPUTER


To physically protect your computer, there are a variety of guidelines that should do and should
not do as well, and they include the following:-
- One should not move a computer when it is turned on. Before one can move a computer,
he/she must sure that it is turned off.
- One should not smoke around the computer: This is done to avoid cigarettes to accumulate
on fans. This causes them to jam and the system to overheat.
- Computer air vents must not be covered. This is because proper air circulation is important
to keep a computer system cool.
- One should avoid extremely humid areas for computer operation. High humidity can be
extremely harmful to hard drives. This is because moisture gets into the hard drive even if
it is adequately sealed.
- Storage media like CDs and others must not be exposed to direct sunlight, heat and extreme
cold. Data access area of CDs and DVDs must be protected from scratches to avoid data
loss.
- Magnets should be kept away from computers. One should not work inside the computer
case with magnetized screw-drivers or put the magnets on top of the computer cases.
- Data should be kept safely. One can use all kinds of security methods to encrypt, protecting
passwords and even hiding data. It is also very important to store the data on a removable
storage device such an external disk.
Data encryption; It is the process of covering readable data into unreadable characters to
prevent unauthorized access.

IMPORTANCE OF SERVICING AND MAINTAINING A COMPUTER

pg. 17
UACE Subsidiary ICT

a. Prevents loss of information: This can be done by hackers (intruders) who may get familiar
with the computer system s as they monitor them over time and end up getting access to
unauthorized information.
b. Increases productivity of software and hardware: It should be noted that new versions of
software and hardware perform better than older ones. And therefore, they are more
productive and work properly.
c. It speeds up your computer: this should be done by running scheduled tasks such as disk
cleanup and defragmentation.
De-fragmentation makes your files to be put to where they are supposed to be and speeds up
your computer.
d. Protects a computer from viruses: Having updated antivirus software programs enable you to
detect and delete any viruses in your computer.
e. A computer lasts longer: Regular servicing of computers make them stay for a long period of
time.
f. Reduces on operational costs: It is important to perform regular maintenance because if it
accumulates, it costs a lot when you carryout maintenance at once.
g. It prevents CPU from overheating: When a CPU is kept within a stable range that is
conducive; the system functionality remains more consistent. And thus, the CPU’s power-
saving options should be set for maximum performance without risk of overheating.

TOPIC 4: WORD PROCESSING


The word processor is application software that helps in the production of documents or is a
program that helps the user to create, edit, format, save and print documents that contain texts and
graphics.
The word processor can be used to form text (data) to produce letters, reports, memo or any other
letter, number or any other type of correspondence.

TERMS USED IN WORD PROCESSOR


Text: A text is any text, letter, symbol that you sum numbers on the keyboard. The grouping of
text or result in the creation of documents through a word processor, you modify, store and retrieve
and print document.

pg. 18
UACE Subsidiary ICT

Editing: It is the process of making changes to the existing content of the document.

Formatting: It is the changing the appearance of a document.

Printing: This is the processing of sending a file to a printer to generate output on a medium such
as paper.

COMMON EDITING FEATURES

a) Inserting: It is when text is added to a document and the surrounding words automatically
move to make room for the inserted text.
b) Deleting: When text is deleted or removed from a document, the surrounding words
automatically move to fill in the gaps left by the deleted text.
c) Cutting: When text is cut, it is stored in a temporary location called the Clipboard; the
original text is removed from its place.
d) Copying: When text is copied, it is duplicated and stored in the in the Clipboard. However,
the original text remains in place.
e) Pasting: When text is pasted, it is placed from the Clipboard into the document.

POPULAR FEATURES OF WORD PROCESSING SOFTWARE

- Word wrap: Allows a user to type continually without pressing the enter key at the end of
each key.
- Spell checker: Allows a user to check the spelling of a whole document one time.
- Grammar checker: This reports grammatical errors and suggests ways to correct them.
- Mail merge: This creates form letters, mailing labels and envelopes.
- Macros: It allows a user to record or save frequently used key strokes and instructions,
which can be executed later by running the corresponding macros.
- Templates: Allows a user to create documents which are frequently used.
- Clip art gallery: Allows a user to insert drawings, diagrams and photographs into a
document.
- Thesaurus: It suggests alternative words with same meaning (i.e. synonyms) for use in the
document.
- Automatic page numbering: This numbers the pages automatically.
- Find and search: This allows the user to locate all occurrences of a particular character,
word or phrase.

Examples of Word processing applications programs


- Microsoft word
- Lotus notes Perfect writer
- Word pad Word perfect
- Word star Office pro

Advantages of Word processor


- Word processor helps the users to read and revise documents on the screen.
- Documents can be previewed before being printed.
- It facilitates change by formatting to get the desired visual effect
- It enables the user to produce as many copies as needed.

pg. 19
UACE Subsidiary ICT

- It allows the saving on document and thus makes work easy.


- It can be used in architectural design and Computer Aided Designs.
- It is easy and fast to make changes to the document.
- It has many features to create documents that look professional.

Disadvantages
- Word application can only be operated by people who are computer literate.
- Word processing applications have so many commands that cannot be learnt with in a short
period of time.
- It can lead to unemployment since a single computer can do work for many people.
- Data can easily be lost in case of power failure.

TOPIC 5: COMPUTER HARDWARE

Definition of computer hardware:


Computer hardware refers to all physical or tangible components of a computer.

Computer hardware can also be defined as; a term that describes all input hardware, processing,
storage and output tangible components of a computer.

SUB-TOPIC 1: THE CENTRAL PROCESSING UNIT (CPU)

pg. 20
UACE Subsidiary ICT

The Central Processing Unit (CPU) also called the processor or the microprocessor is the main
component of the computer. The CPU is the main brain of the computer and provides the ability to
computer for executing any given instruction and also tells the computer how to control the flow of
instructions.
Components/parts of the CPU
1. The Arithmetic Logic Unit
2. The control unit
3. Memory unit

1. THE ARITHMETIC LOGIC UNIT (ALU): This performs the calculations and operations of
the data. The ALU also performs the execution part of a machine cycle.

Specifically, the ALU performs the arithmetic, comparison and logical operations.
i. Arithmetic operations include addition, subtraction, multiplication and division.
ii. Comparison operations involve comparing one data item to another, and determine if
the first item is greater than, equal to, or less than the other item.
iii. Logical operations work with conditions and logical operators such as AND, OR, and
NOT.

2. THE CONTROL UNIT (CU): It is the part of the CPU, which controls the activities of other
components both with in and outside the CPU. The control unit also directs and coordinates most
of the operations in the computer.
For every instruction, the control unit repeats a set of four basic operations called the machine
cycle or instruction cycle.

3. MEMORY UNIT: A processor has its own memory inside it in the shape of small cells. Each
memory cell is called a “Register”. Registers are used to carry data temporarily for performing
operations. Thus, the ALU gets data from registers and stores it in registers to perform arithmetic
and logical operations.
A memory unit is a chip (fragment) that holds programs and data either temporarily or
permanently. RAM chips are the computer’s temporary workspace, while ROM chips (flash
memory chips) are used like disk drives which store data until they are erased.

TYPES OF COMPUTER PROCESSORS


Currently, wide varieties of computer types are available on the market. Both Intel and AMD
(Advanced Micro Devices), the largest microprocessor manufacturers in the world, have
introduced types of computer processors.
Each processor type is different from the other in performance and technology.
These include:-
1. High-End processors: These are designed for intensive applications and require high
processing power.
Other than the normal usage of computer applications, if you are into statistical analysis,
intensive (serious) graphics, creating and editing professional video and extreme 3D gaming,
then your choice should be high- end processors.
Both Intel and AMD introduced processors categorized as high-end. The latest Intel core I
series processors are: i3, i5, i7 and i9. While AMD Phenom family processors are among
high-end CPUs.

pg. 21
UACE Subsidiary ICT

2. Mid-End computer processor: These are meant for middle intensive (serious/demanding)
tasks. Beyond the standard work you do with mid-end processors, one can do tasks such as
Basic 3D Gaming, casual photo editing, home video creating and multimedia applications.
Some of the common mid-end Intel processors include; Intel core 2 Quad, Intel Pentium
Dual core and Intel core Duo.
AMD Phenom 1x3, AMD Turion family and AMD Athlon family procesors are categorized
into mid-end CPUs.

3. Economy/Basic computer processors: The processors in this group are low performing
CPUs with cheap price. If you are into non-intensive tasks such as simple gaming, office
applications, Internet browsing, E-mail and common graphics, then your choice of processor
is grouped as budget CPUs.
AMD Sempron, AMD Athlon Neo and Intel Atom are grouped into economy processors.

MEMORY AND STORAGE SIZES


Unit Abbreviation Exact amount (bytes) Approx. No. of pages
Kilobyte KB 1,024 ½
Megabyte MB 1,048,576 500
Gigabyte GB 1,073,741,824 500,000
Terabyte TB 1,099,511,627,776 500,000,000

HOW CAPACITY IS EXPRESSED


In a computer system, data is represented using the binary system, combinations of binary digits
(bits). There are two binary digits: 1 (on) and 0 (off). These digits can be arranged in such away
that they represent characters, digits and other values.

 Bit: In binary system, each 0 or I is called a bit, which is short for binary digit. Thus a bit is
the smallest unit of measurement of information.
 Byte: It is a group of 8 bits. And a byte represents one character, digit, but the figure is
commonly rounded.
 A kilobyte (KB): It is about 1000 bytes (1,024 bytes)
 A megabyte (MB): It is about 1 million bytes (1,048,576 bytes)
 A gigabyte (GB): It is about 1 billion bytes (1,073,741,724 bytes)
 A terabyte (TB): It is about 1 trillion bytes (1,099,511,627,776 bytes)

THE SYSTEM UNIT


The system unit is the rectangular case that houses the electronic components inside the computer.
The system unit contains the electrical components that make a computer to work.

Thus the system unit contains the following components:-


1) The power supply - Expansion slots and boards
2) The processor chip or CPU - Bus lines
3) The motherboard - The ports
4) The system clock - PC slots and cards
5) RAM chips - ROM chips etc.

An illustration of a system unit

pg. 22
UACE Subsidiary ICT

A system unit

3.7.1 COMPONENTS OF THE SYSTEM UNIT


1) The Power supply: This converts the wall outlet AC power into DC power to run the
computer.

2) The Motherboard (system board): This is the main circuit board in the system unit and
this houses the CPU chip, main memory chips and expansion slots.

3) The Central Processing Unit (CPU): This is the brain of a computer.

This includes 3 main types namely:-


 The Intel-type Pentium series chips
 Motorola-type ‘6800’ series- type
 RISC chips (RISC-Reduced Instruction Set Computing)
 AMD series (the latest) seen in the above diagram

4) The System Clock: This control how fast all the operations within a computer are
performed. The faster the clock, the more instructions the CPU can execute (perform or
carry out) in a second. The speed is measured in megahertz (MHz), with 1 MHz equal to
1million bits (cycles) per second.

5) RAM Chips: These are chips that temporarily hold data and instructions that will be
needed shortly by the CPU. These chips are plugged into the motherboard.

Question: What is the difference between computer memory and computer storage?

Computer memory refers to the computer chips that store information for quick retrieval;
for example RAM.
Computer storage: It refers to the permanent storage place of a computer. That is, where
information can be kept for future use, for example ROM.

RAM chips may be fixed (mounted) on a small circuit board, such as a SIMM (Single
inline Memory Module).
However, modern computers have RAM chips fixed on small circuit board, such as DIMM
(Double inline Memory Module).

pg. 23
UACE Subsidiary ICT

RAM (Random Access Memory): RAM temporarily stores data and instructions for quick
retrieval or access.
RAM is said to be a Volatile memory; i.e. it can lose data when power is switched off.

Types of RAM
 DRAM (Dynamic RAM) is a type of memory that must be re-energised
(strengthened/boost) constantly or else its contents will be lost.
 SDRAM (Synchronous DRAM) is a faster version of DRAM because it is synchronized
(coordinated) to the system clock.

 RDRAM (Rambus DRAM) is a newer type of DRAM that is even faster than SDRAM.
 SRAM (Static RAM) is faster and more reliable than any form of DRAM, but are more
expensive.

6) ROM Chips: These contain data which is recorded permanently by the manufacturers.
ROM (Read Only Memory): It contains critical information and software that must be
permanently available for the computer. ROM is also known as the Non-volatile memory;
i.e. it cannot lose data when power is switched off.
Examples of non-volatile memory include; ROM, flash memory and CMOS.

ROM chips contain data, instructions or information which is recorded permanently by the
manufacturers and are known as firmware.
BIOS; is a firmware that contains the computer's startup instructions.

BIOS (Basic Input/Output System): It should be noted that ROM contains the Basic
Input/Output System (BIOS); which is a sequence of instructions the computer follows to
load the operating system and other files when the computer is turned on.

Variations (kinds) of ROM chips include:-


 Programmable Read Only Memory (PROM); which is a type of ROM chip on
which permanently items can be placed.
 Erasable Programmable Read-only Memory (EPROM).
 Electrically Erasable Programmable Read-only Memory (EEPROM); are ROM
chips designed to be modified by users.

Other forms of memory


- Cache memory
- Video memory or VRAM
- Flash memory

i) Flash memory, also known as Flash ROM or Flash RAM is a kind of non-volatile
memory that can be erased electronically and reprogrammed.
Flash memory is used to store programs and data on personal computers, cellular
phones, printers, digital cameras, pagers and personal digital assistants (PDAs).

CMOS (Complementary Metal-oxide Semiconductor) is used to store configuration


information about the computer, which includes amount of memory, types of disk drives,
current date and time keyboard, monitor etc.
pg. 24
UACE Subsidiary ICT

CMOS chips use battery power to retain information even when the computer is turned off.
Unlike ROM, the information stored in CMOS can be changed. The CMOS is updated
whenever new components are installed.

ii) Cache memory: It is a high speed memory that the CPU can access (find or get)
quickly.
Cache memory is used in computers with very fast CPUs so that the CPU does not have
to wait for data to be delivered from RAM. Thus the most frequently used instructions
are kept in the cache memory.

iii) Video memory (VRAM): These are chips used to store and display images for the
monitor. The amount of VRAM determines how fast images appear and how colors are
available.

VIRTUAL MEMORY: With virtual memory (VM), the operating system allocates a
portion of a storage medium, usually the hard disk, to function as additional RAM.
The area of the hard disk used for virtual memory is called a swap file. The amount of data
and program instructions swapped or exchanged at a given time is called a page.

DIFFERENCES BETWEEN RAM AND ROM


RAM ROM
Ram is volatile It is non-volatile
Ram is read and write it is read only
Ram is temporally it is permanent
Ram can be increased is normally not increased

7) Expansion slots and boards: Expansion slots are sockets on the motherboard into
which you can plug expansion cards.
Among the types of expansion cards are expanded memory, display adapter or graphics
adapter cards, controller cards etc.
8) THE BUS: It is an electrical channel that allows the various devices inside and attached to
the system unit to communicate with each other.

ALL BUSES consist of two (2) parts namely:


▪Data bus; which transfers actual data
▪Address bus; that transfer information about where the data should go in memory.
There are two types of buses found in the computer namely:-
- System bus
- Expansion bus

A system bus; it connects the CPU to memory.


An expansion bus; this allows the CPU to communicate with peripheral devices.
Expansion buses include; AGP bus (Accelerated Graphics Port), ISA bus (Industry
Standard Architecture), USB bus, Local bus, 1394 bus etc.

9) PORTS:

pg. 25
UACE Subsidiary ICT

Ports are sockets on the outside of the system unit that are connected to an expansion
board on the inside of the system unit.
These include the following:
▪Serial Ports: These transmit only one bit of data at a time. Serial ports are used to connect
devices that do not require fast data transmission rates, such as Mouse, keyboard or
modem.
▪Parallel Ports: These are capable of transferring more than one bit of data at a time.
Many printers connect to the system unit using a parallel port. And thus, it can transfer 8
bits of data simultaneously through 8 separate lines in a single cable with a 25-pin female
connector.
▪USB Ports (Universal Serial Bus): These can connect up to 127 different peripheral
devices daisy-chained to one general-purpose port.
USB also supports hot plugging/hot swapping (the ability to add or remove devices while
a computer is running) as well as Plug and Play.

female parallel port male serial port USB port

▪SCSI Ports (Small Computer System Interface): These are special high-speed parallel
ports used to attach peripheral devices such as printers and disk drives to the system unit.

▪The 1394 Ports: These are also called FireWire, and can connect multiple types of
devices requiring faster data transmission speeds. Such devices connected to these ports
include; Digital Video Camcorders, Digital VCRs, colour printers, Scanners, Digital
cameras and cellular phones.
The 1394 ports also support Plug and Play (the computer’s capability to recognize any new
devices and assisting in the installation of the device by loading the necessary drivers
automatically.

Fig 8: FireWire 6-pin cable

▪MIDI Ports (Musical Instrument Digital Interface): Are designed to connect the system
unit to a musical instrument, such as electronic keyboard.

▪Games Ports: These allow you to attach a joystick or similar game playing device to the
system unit.

PRIMARY AND SECONDARY STORAGE


Primary storage (main memory) refers to RAM, where both data and instructions are temporarily
held for immediate access and used by the computer’s microprocessor.

pg. 26
UACE Subsidiary ICT

Secondary storage (auxiliary storage): It is any storage device designed to retain data and
instructions (programs) in a relatively permanent form.
Secondary storage is non-volatile; meaning that saved data and instructions remain intact
(together) when the computer is turned off.

SUB-TOPIC 2: STORAGE DEVICES

STORAGE MEDIA AND STORAGE DEVICES


Storage media: It refers to the media on which data, instructions and information are written and
stored: These include:-
 Hard disk, Floppy disk, Compact disk, Magnetic tape, Memory cards, zip disks etc.

Storage devices (storage hardware): Are devices that record and retrieve (get back) items to and
from a storage medium.
Thus storage devices act as input devices when they read and act as output devices when they
write.
Such examples of storage devices include;
 Zip drive, Tape drive, Hard disk drive, Floppy disk drive, Compact disk drive

OTHER SECONDARY STORAGE DEVICES


1. FLOPPY DISK:
A floppy disk is a thin, circular, flexible plastic disk with a magnetic coating enclosed in a square-
shaped plastic shell.
Advantages of floppy disks
ii) Floppy disk is portable and inexpensive
iii) Data on a floppy disk can be accessed randomly (indiscriminately).
iv) Data on a floppy disk can be write-protected from being changed accidentally.
v) Floppy disk can be used to transfer data from one computer to another.
Disadvantages of floppy disks
- A floppy disk is not durable and can be destroyed by magnetic field.
- The storage capacity of floppy disk is limited to only 1.44 MB.
- The access time of floppy disk is slow (about 84 milliseconds or 1/12 seconds)
Taking care of diskettes
 Floppy diskettes should not be bent neither sticking them with sharp objects.
 Do not touch the disk surface i.e. the data access area.
 By avoiding risky physical environment

2. HARD DISK
A hard disk usually consists of several inflexible, circular disks called platters on which items
are stored electronically.
Advantages of hard disks over floppy disks
i. Hard disks provide far larger storage capacities.
ii. They have a much faster access time than floppy disks
iii. A hard disk is cheaper than floppy disk per megabyte
iv. Hard disks usually are more reliable (dependable) than floppy disks (i.e. have a better
protection against dust and dirt).
v. Because they reside inside the system unit, there are fewer chances of them being
misplaced or stolen

pg. 27
UACE Subsidiary ICT

Disadvantages
- Head crash may occur due to extreme shock or contaminants.
- Hard disks are not portable (except removable hard disk) which is not the case with floppy
disks.
- Data becomes less secure if left on the hard disks
- Disks may fail due to violet shaking (vibrations).
- Have a problem of virus attack and thus causing data loss.

3. COMPACT DISK
A compact disc is a flat, round, portable, storage medium that is usually 4.75 inches in
diameter and less that one-twentieth of an inch thick.
Variations (kinds) of Compact Disks include:-
- CD-ROM (Compact Disc Read-Only Memory) is a compact disc that uses the same laser
technology as audio CDs for recording music. The contents of standard CD-ROMs are
written or recorded by the manufacturer and cannot be modified by the user.
A CD-ROM drive or CD-ROM player is required to read items on a CD-ROM.
- CD-R (Compact Disc-Recordable) is a technology that allows a user to write on a
compact disc using his or her own computer.
- A CD-RW (Compact Disc Rewritable) is an erasable compact disc that can be written
and rewritten onto it multiple times.
CD-RW software and a CD-RW drive are required in order to write and rewrite on a CD-
RW.
- A DVD-ROM (Digital Video Disc-ROM) is an extremely high capacity compact disc
capable of storing from 4.7 GB to 17 GB.
- DVD-RAM; is the recordable and rewritable versions of DVD-ROM, which allows items
to be erased and recorded on it multiple times.
- DVD-R; is a recordable version of DVD-ROM, which can be written once and read (play)
for many times.
- DVD+RW; is the recordable and rewritable versions of DVD-ROM, which can be written
and read (play) for many times.
A DVD+RW; is similar to a CD-RW, except that it has storage capacities up to 4.7 GB.
- A PhotoCD; is a type of CD that contains digital photographic images saved in the
photoCD format developed by Eastman Kodak.

CARE FOR COMPACT DISKS


i) Always store the compact disc in a jewel box when not in use.
ii) Always hold a compact disc by its edges.
iii) Never touch the underside of the compact disc.
iv) Never stack discs on top of each other.
v) Never expose the discs to excessive heat or sunlight.

NOTE: Floppy disks, compact disks and hard disks all use direct access, or random access;
which means that a particular data item or file can be located immediately without having to move
consecutively through items stored in on it.
4. MAGNETIC TAPE: A magnetic tape is similar to cassette tapes. This is a magnetically
coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
It is one of the first storage media used with mainframe computers.

pg. 28
UACE Subsidiary ICT

NOTE: Tape storage requires sequential access; which refers to reading or writing data
consecutively, that is; one after another. They are also used most often for long-term storage and
backup.

5. TAPE DRIVE: A tape drive is used to read from and write data and information onto a tape.
Three common types of tape drives are QIC (Quarter-inch cartridge), DAT (Digital audio tape)
and DLT (Digital linear tape).

6. ZIP DRIVE: A zip drive is a special high-capacity disk drive developed by Iomega that uses a
3.5-inch zip disk, which is slightly larger than and about twice as thick as a standard 3.5-inch
floppy disk.
A Zip drive can be 100 MB, 250 MB or 750MB in storage capacity.

OTHER TYPES OF STORAGE MEDIA INCLUDE:-


 PC card
 Magneto-optical (MO) card
 Smart card
 Online storage
 Microfilm & micro fiche
1) PC card: A PC card (personal computer); is a thin credit card-sized device that is used to add
capabilities to a laptop computer.
2) Magneto-optical (MO) disk: This combines the best features of magnetic and optical disk
technologies.
3) A smart card, this is similar in size to a credit card or ATM card; stores data on a thin
microprocessor embedded (fixed) in the card.

Applications of smart cards


 Stores a prepaid dollar amount e.g. a prepaid telephone calling card
 Stores patient records and other health-care information
 Tracks information of customers and employees
4) Online storage: This is sometimes called an Internet hard drive; it is a service on the
Website that provides storage to computer users for free or for a minimal monthly fee.

SUB-TOPIC 3: INPUT DEVICES


Input is any data or instructions entered into the memory of a computer, e.g. voice, words,
graphics etc.

Memory is a temporary area for holding data, instructions and information


Memory is also known as main store or primary memory.

An input device is any hardware component that allows a user to enter data and instructions into a
computer.
The input devices include;
o Keyboard, - Mouse, - Scanner
o Digital camera - Joystick

pg. 29
UACE Subsidiary ICT

o Pc camera - Scanner
o Microphone - Bar Code Reader
o Light pen - Web Cam
o Track ball - Touch screen
o Touch pad - Digital video camera

1. KEYBOARD: This contains keys that allow a user to enter data and instructions into the
computer.
All computer keyboards have a typing area that includes; the letters of the alphabet, numbers,
punctuation marks and other basic keys.
A standard computer keyboard is sometimes called a QWERTY keyboard because of the
layout of its typing area.
A standard keyboard has three (3) significant areas. These include;
o The keyboard area
o The Function key area
o The Numeric keypad area including the cursor control keys.

With the development of the Internet and multimedia capable computers, two other areas were
added t this 105-button keyboard. These areas include;
- the multimedia buttons area
- and the Internet shortcut buttons area.

1. The keyboard area:


The keyboard area is the basic area on a keyboard because it consists of all the alphabetical
characters. It is arrangement of characters was adapted from the QWERTY typewriter. It is called
the QWERTY arrangement because this is how the keys are arranged from the study of
convenience of key placement. Thus, from the left of the keyboard the letter “Q” comes first, then
“W”, “E”, “R”, “T” and “Y” follows.

Other keys in this area include the following:-


 Enter key: This key also known as the carriage return is almost the basic key since almost
all computer commands end with this key. It is used for various purposes depending on the
application being used. In Word processors, it is used to mark the end of a paragraph.
 Shift keys: The shift keys are used in combination with other keys in the typewriter area
thus; you press and hold down this key then press another key in this area. For example,
when you hold down the shift key and press any of the alphabetical keys, you get an
uppercase (CAPITAL) letter corresponding to that key if the Caps Lock is off.
In addition, when you hold a Shift key down and press any of the keys labeled with more
that one character then you get the top most character on that key.
 Caps Lock key: This special key permanently locks the alphabetical character keys into
only uppercase letters whenever they are pressed if this key is on. The lowercase letters are
also obtained if it off. When the Caps Lock is on, a green LED light, labeled “Caps Lock”
is lit the reverse is true.
 Back space key: The back space is a special key located at the top-right of the typewriter
area. This key is used to delete a single character to the left of the cursor position whenever
it is pressed.

pg. 30
UACE Subsidiary ICT

 Tab key: This key shifts the cursor position usually by five characters to the right when
pressed. It can also be configured to shift the cursor by a specified number of characters
depending on the application in use.

 The Alt and Ctrl keys: These are specialised keys referred to as system keys. They are
commonly used in combination with other keys in order to work directly with the system.
E.g. when you press the Alt + Ctrl + Delete key combination, you restart your computer.
 The Application key ( ): It is one of the keys that were added to the standard
keyboards. When this key is pressed, it acts exactly like what would happen if one pressed
the right mouse button at the cursor position when working with Microsoft Windows.

 The Windows key ( ): This is a Microsoft Windows logo and it one of the
keys that were added on the standard keyboard after the introduction of Microsoft
Windows95. It is also one of those keys used in combination with other keys to accomplish
shortcuts. E.g. when one is working in a windows environment and you press this key with
the D key, all open windows will be minimised to display the desktop.
The Function key area:
This area consists of the Function keys F1 to F12 inclusive of the Esc (Escape) key. These keys
are usually left for application programmers to use as utility keys that control their customized
application programs. For most Microsoft applications, the F1 key is frequently used to invoke
(call for) the help system.

The Numeric keypad area:


The numeric key area offers convenience with entry of numerical digits. It features the following
type of keys:-
The Numeric keypad area consists of the following areas:-
o the ten numeric digit keys, i.e. 1,2,3,4,5,6,7,8,9 keys
o the arithmetic operation keys; (+), (-), (*), (/) and the decimal point (•) keys.

Cursor control keys


These keys are mainly used to navigate the cursor in applications. This area includes ten (10) keys
which behave as follows when pressed once in a text editor.

CURSOR KEY FUNCTION


Left Arrow Moves the cursor one character position to the left
Right Arrow Moves the cursor one character position to the right
Up Arrow It moves the cursor to the previous line
Down arrow Moves the cursor down to the next line
Page Up Moves the cursor up one screen-full or 24 lines up
Page Down Moves the cursor down one screen-full or 24 lines down from the
current cursor position
Home It repositions (relocates) the cursor to the beginning of the line
End It repositions (moves) the cursor to the end of the line
Delete It erases the next character to the right of the cursor position
Back space It deletes the next character to the left of the cursor position
Print screen It captures a snap-short of the current screen
Pause This key freezes the active screen when browsing a list or display like
pg. 31
UACE Subsidiary ICT

those from a DIR command


Insert It enables characters to be inserted at the current cursor position
without deleting the adjacent characters.
Scroll Lock It locks the cursor in the current position when scrolling through a
spreadsheet
Numeric Lock This key locks the numeric keypad area found at the right side of the
keyboard.

Shortcuts Key Area:


This area is an addition to the standard keyboard for the easy access and browsing of the Internet
and the easy control of frequent tasks on computers equipped with multimedia capabilities. This
area consists of some or all of the following buttons:-
 The Power buttons like Sleep, Standby and Power.
 The Internet browse buttons like the Refresh, Back, Next and Home.
 The Up and Down volume control; Play, Next and Pause/Stop buttons.
 Other Accessory buttons like the Calculator, My Computer and several other buttons.

2. MOUSE: It is a pointing device used to manipulate (control) onscreen objects; it also inputs
data or instructions into the computer.
Types of mouse/mice
 A mechanical mouse: this has a rubber ball on its underside to detect movement of
the mouse.
 An optical mouse; this uses devices that emits (produces) and senses light to detect
the mouse’s movement.
 A cordless /wireless mouse (either mechanical or optical) transmits data using
wireless technology such as radio waves or infrared waves.

Mouse operations
CURSOR: Also called the Insertion point, this denotes the place where text, graphics or any other
item would be placed when you type, overwrite or insert them. This looks like a tall skinny
toothpick and keeps blinking so that you can locate it easily.
MOUSE POINTER: When your mouse pointer looks like an I-beam you should be able to move
it freely around the screen. This is used for either placing the cursor at the desired place or
choosing any command either from the menu or from tool bars.
POINTING: It is an act of moving the mouse pointer until the pointer is on the desired item.
CLICKING: By default, the left mouse button is considered the primary button. When instructed
to click the mouse, it means the left mouse button should be pressed once. Clicking is done to
position the insertion point or select an object on the screen.
DOUBLE CLICK: Double clicking is performed by pressing the left mouse button twice in rapid
succession (sequence /series). It is important that the mouse does not move while double clicking.
CLICK AND DRAG: To accomplish this, press the left mouse button and hold it while dragging
or moving the mouse. This action can be used to select large blocks of text.
RIGHT CLICK: Pressing the right mouse button once will open a short-cut menu. The right
mouse button is also known as the secondary button and it is not typically pressed more that once
at a time.
SCROLL WHEEL: When a mouse is equipped with a scroll wheel, it can be used to quickly
move a page up or down. It is an easy way to navigate through lengthy documents or Websites.

pg. 32
UACE Subsidiary ICT

3. JOYSTICK: It is a pointing device with a vertical lever mounted on a base for playing
computer games.
A joystick is also an input device consisting of a stick that pivots on a base and reports its
angle or direction to the device it is controlling. Joysticks are often used to control video
games, and usually have one or more push-buttons whose state can also be read by the
computer.
4. DIGITAL CAMERA: It takes pictures and stores the images digitally rather than on
traditional films.

5. DIGITAL VIDEO CAMERA: It records video as digital signals rather than analog signals.
Many video devices e.g. video camera, television etc use analog video signals and require a
video capture card to convert the analog video signal into digital signal so that the computer
can understand.
6. PC CAMERA:
It is a kind of Digital video camera that allows home user to record, edit and capture video
and still images and to make phone calls on the Internet.
PC cameras can be set to take digital photographs at present time intervals or whenever it
detects motion.

7. SCANNER: It is a light-sensing input device that converts printed text and graphics into a
digital form that can be further processed by the computer.
Popular types of scanner
 A handheld scanner; this can be manually passed over the images to be scanned.
 A flatbed scanner: this works like a copy machine except that it creates a file of the
document rather than a paper copy.
 A sheet feed scanner; this has motorised rollers that can feed the source document
across the scanning head during the scanning process.

8. MICROPHONE: An input device that allows a user to speak to the computer to enter data
and instructions into the computer.
9. BAR CODE READER: A bar code reader reads a bar code by using light patterns that pass
through the bar code lines. It is widely used in supermarkets, pharmacies, department stores,
libraries etc.
A barcode reader, also called a price scanner or point-of-sale ( POS ) scanner; is a hand-held or
stationary input device used to capture and read information contained in a bar code . A barcode
reader consists of a scanner , a decoder (either built-in or external), and a cable used to connect the
reader with a computer.

10. LIGHT PEN: It is a pointing device that can detect the presence of light. Light pens are used
by health care professionals such as doctors and dentists.
A light pen is an input device that utilizes a light-sensitive detector to select objects on a
display screen. A light pen is similar to a mouse, except that with a light pen you can move

pg. 33
UACE Subsidiary ICT

the pointer and select objects on the display screen by directly pointing to the objects with
the pen.

11. Voice recognition device or speech recognition: It is the computer’s capability to


distinguish spoken words.
12. WEB CAM: It is a video camera whose output displays on a Web page.
13. Magnetic Ink Character Recognition Reader (MICR): it reads text printed with
magnetized ink and they are used most exclusively by the banking industry for processing
cheques.
14. TRACK BALL: It is a stationary pointing device with a ball mechanism on its top for
feeding data into the computer.
A track ball is an electronic device consisting of a rotatable ball in a housing used to
position the cursor and move images on a computer screen; "a trackball is essentially an
upside-down mouse''.
15. TOUCH SCREEN: It is a type of display screen that has a touch-sensitive transparent panel
covering the screen. Instead of using a pointing device such as a mouse or light pen, you can
use your finger to point directly to objects on the screen.
A touch screen is also is a touch-sensitive display device and is used for ATM machines to
allow easy access of bank accounts.
16. TOUCH PAD: It is a small, flat and rectangular pointing device that is sensitive to pressure
and motion.
It is also is a pointing device consisting of specialized surface that can translate the motion
and position of a user's fingers to a relative position on screen.
They are a common feature of laptop computers and also used as a substitute for a computer
mouse where desk space is scarce.

17. Stylus and graphics tablet:


A stylus is a pen-like pointing device, which uses pressure to write text and draw lines.
A graphics tablet is a flat, rectangular, electronic plastic board on which stylus write or
draw.
Stylus and graphics tablet are mainly used for computer-based design and drafting by
architects, map makers, artists and designers.

18. Optical Mark Recognition Reader (OMR): It is used to sense hand-drawn marks such
as small circles or rectangles made on pre-printed forms in certain places.
The OMR reader first reads the answer key sheet to record the correct answers based on the
patterns of light, and then reads the remaining documents and matches their patterns of light
against the answer key sheet.

19. Optical Character Recognition Reader (OCR): These include a small optical scanner for
reading characters and sophisticated OCR software for analyzing what is read.
OCR readers are often used for turnaround documents e.g. electricity bills.

pg. 34
UACE Subsidiary ICT

20. Sensor and Remote Sensor: It is an input device that can detect external changes in an
environment. External changes include levels of light, temperature, sound, position and humidity.

SUB-TOPIC 4: OUT PUT DEVICES

Output is data that has been processed into a used form, called information.
An output device is a hardware component that displays information to a user.
Examples of output devices;
1) Display device
2) Printer
3) Audio output device
4) Data projector
5) Facsimile machine (fax)
6) Multifunction machine
7) Terminal

1. DISPLAY DEVICE (the monitor):


A display device is an output device that conveys text, graphics and video information to a user.

Information on a display device is sometimes called a soft copy because it exists electronically and
displays only for a temporary period.

Display devices can be monochrome or colour.


Monochrome means that information displays in one colour on a different colour background (e.g.
black and white).
Some display devices use gray scaling, which involves using many shades of gray from white to
black for better contrast on the images.

Types of display devices


 Cathode Ray Tubes (CRT)
 Liquid Crystal Display (LCD)

a) Cathode ray tube CRT)


A CRT monitor works like a standard television because it also contains a cathode ray tube
(CRT).
The front of the CRT is the screen, which is coated with tiny dots of phosphor material.
Each dot consists of a red, a green and a blue phosphor, and the three dots combine to make
up each pixel.

Advantages of CRT monitors


o Can produce fast and rich color output
o Can be viewed from a very wide angle
o They are cheaper than LCD monitors in general
o Technical personnel to repair CRT monitors are many unlike the LCD monitors.
Disadvantages of CRT monitors
o They consume more energy than LCD monitors

pg. 35
UACE Subsidiary ICT

o Emit higher electromagnetic radiation (EMR) than LCD monitors (i.e. the light causes
eye defects or problems).
o They consume much more power/energy than the LCD monitors.

b) Liquid Crystal Display (LCD) monitor; this uses liquid crystal rather than a cathode ray
tube to create images on the screen.
LCD monitors produce color using either passive matrix or active matrix technology.

Advantages of LCD monitors


o LCD monitors do not produce much heat.
o They take up less desk space unlike the CRT monitors.
o Radiation emitted by LCD monitors is neglectable (the light does not affect eyes).
o LCD monitors consume less power (one-third of power) than traditional CRT monitors.

Disadvantages
o LCD monitors can only be viewed from a very narrow angle.
o LCD monitors are usually more expensive than CRT monitors.
o They need trained personnel to repair them in case they get mechanical problems.

A video card is required to display colour on a monitor.


A video card, also called a graphics card or video adapter, converts digital output from the
computer into an analog video signal that is sent through a cable to the display device.

CRT monitors use an analog signal to produce a picture while LCD monitors use a digital signal
to produce a picture.
Thus the quality of a display device depends on its resolution, dot pitch and refresh rate; and
resolution is often expressed in dots per pitch (dpi).
2. PRINTERS
A printer is an output device that produces text and graphics on a physical medium such aas
paper, plastic boards etc.
Printed information is often called hard copy because the information exists physically and in a
more permanent form of output that is presented on a display device.

CATEGORIES OF PRINTERS
IMPACT PRINTERS: These are types of printers that produce a hard copy output with their print
heads that physically touch the print media. These print media include; papers, plastics, clothes etc.
That is to say; they form characters and graphics on a piece of paper by striking a mechanism
against an ink ribbon that physically contacts the paper.

Common types of Impact printers


a. Dot-matrix: These produce individual characters on a page by means of series of dots.
The speed of a dot-matrix printer is normally measured by the number of characters per
second (cps) it can print.
The dot-matrix printers can be found in some business settings because they are useful for
printing multi-page forms such as invoices or purchase orders.

Advantages of dot-matrix printers

pg. 36
UACE Subsidiary ICT

 Dot-matrix printers can print multipart forms.


 They can withstand dusty environment, vibrations and extreme temperature.

Disadvantages
- They are generally noisy because of the striking mechanism.
- Print quality of dot-matrix printers is not as good as those from ink-Jet and laser printers.
-
b. Line printer
A line printer is a high-speed impact printer that prints an entire line at a time.
The speed of a line printer is measured by the number of lines per minute (lpm).
Line printers are often used with mainframes, microcomputers or with a network in
applications such as manufacturing or shipping.
c. Daisy wheel printer:
It is an impact printer that uses a wheel as a print head against the paper to print a character.
d. Plotter
A plotter is a sophisticated (stylish) printer used to produce high-quality drawings that can be
quite large e.g. with width up to 60 inches.
Two basic types of plotters are;
o Pen plotters
o Electrostatic plotters

e. Ball printer
A ball printer is an impact printer that uses a rotating ball as a print head. The printing
characters are on the surface of the ball, which strikes a ribbon to transfer the character
onto paper.
f. Braille printer:
A Braille printer outputs information in Braille onto paper so that it can be read by blind
people (visually impaired people).
The printing speed of a printer is usually expressed in pages per minute (ppm); and printer
resolution is often expressed in dpi (dots per inch). Thus, the large the number of dots the
higher the colour output (resolution).

Other printers include;


 Large format printer
 Portable printer
 Label printer
 Photo printer
Factors to consider when buying a printer
i) The memory of at least 2 MB
ii)Page per minute print out (ppm)
iii)
Price of the cartridge or toner
iv)Printer drivers (i.e. a driver is a small program that tells the operating system how to
communicate with the printer or device).
v) Purpose for which the printer is going to be put to use

pg. 37
UACE Subsidiary ICT

NON-IMPACT PRINTERS: These are types of printers that produce a hard copy output without
the print heads physically hitting the print media. The print media include; plastics, clothes etc. i.e.
they form characters and graphics on a piece of paper without actually striking the paper.

Examples of Non- Impact printer:


- Inkjet printers
- Laser printers
- Bubble jet printers
- Thermal printers
Types of Non-impact printers
(A). Inkjet printers
It is a non-impact printer that forms characters and graphics by spraying tiny drops of liquid
ink onto a piece of paper.
Inkjet printers can produce letter-quality (LQ) text and graphics in both black and white
colours.
The speed of an ink-jet printer is measured in pages per minute (ppm).

Advantages of ink-jet printers


i. ink jet printers are generally quiet
ii. They can produce high quality colour output

Disadvantages
- The ink may smear when printed on ordinary paper
- The ink cartridges and specialized papers are expensive
- Specialized papers are required to produce high quality colour output

(B). Laser printers


These produce high quality output.
Laser printers are also known as page printers because they process and store the entire
page before they print it.
Two common page description language of laser printers are PCL (Printer Control
Language) and Postscript.
Advantages of laser printers
i. They are generally quiet and fast
ii. They can produce high quality output on ordinary papers
iii. The cost per page of toner cartridges is slower than other printers
Disadvantages
- the initial cost of laser printers can be high
- laser printers are more expensive than ink-jet printers and dot-matrix printers

C) Bubble jet printer


Bubble jet printers are non-impact printers which work by their nozzles in the print heads
spraying tiny droplets of ink onto a print surface. Unlike the inkjets, these ink pumps work by
forcing out a droplet of ink.
This is done as follows:
The ink pump heats up the ink in the ink channel causing a bubble to form. Such printers include;
the Canon BJC200 printer.

D) Thermal printers:
pg. 38
UACE Subsidiary ICT

Thermal printers are types of non-impact printers with thermal technology; the printer’s head
contains dot heaters (heating elements) which cause dots to appear on a paper.

Features of thermal printers


i) They are expensive to maintain because their print heads have a life span limited to only 10
million characters and not repairable.
ii) They are slow printers because they need a specific time interval for the print heads to cool
before the next print cycle.
iii) They only print to special papers because the heat generated may burnout ordinary paper.

REVIEW QUESTIONS:
1) Differentiate between impact printers and non-impact printers…

3. DATA PROJECTOR
This displays photographic slides on a screen in bigger size. It works like a film projector only
that it is connected to the computer from which it derives/gets the information.
An LCD projector, which uses liquid crystal display technology, can produce lower-quality
images only.
A DLP (digital light processing) projector, which uses tiny mirrors to reflect light, can
produce much better images even in a well lit room.

4. FACSIMILE MACHINE
A facsimile (fax) machine is a device that transmits and receives documents over telephone
lines.
Documents sent or received via a fax machine are called faxes.
Fax capability can also be added to the computer using a fax modem.
A fax modem is a communication device that allows a user to send and receive electronic
documents as faxes.
5. Audio output devices:
These are components of a computer that produce music, speech and other sounds.
Two common used audio output devices are speakers and headsets.

6. Multifunction machine:
A multifunction device is a single piece of equipment that provides the functionality of a
printer, scanner, copy machine and a facsimile machine
Advantages of a multifunction machine
- It takes up less space than having a separate printer, scanner, fax machine and a copy machine.
- It is less pensive than purchasing each device separately.

7. Terminals: These are devices with a monitor and a keyboard.


The term ‘terminal’ can also refer to any device that sends and receives computer data.

Different kinds of terminal include;


 A dumb terminal; this has no processing power, cannot act as a stand-alone computer and
must be connected to a server to operate.
 An intelligent terminal; this has memory and a processor so that it can perform some
functions independent of the host computer.
pg. 39
UACE Subsidiary ICT

TOPIC 6: COMPUTER SOFTWARE

Computer software refers to all programs which enable computer hardware to operate effectively.
Computer software is broadly categorised into two namely;
 Application software
 System software

SUB-TOPIC 1: APPLICATION SOFTWARE


Application software is a program that performs specific tasks as required by the user.

FORMS OF APPLICATION SOFTWARE


Application packages are made available to purchase from the Application Service Provider
(ASP) either on the website or from written stores. The Software is made available in the
following forms:-

pg. 40
UACE Subsidiary ICT

1. Packaged software: This is the application software that is commercial, copyrighted and
designed to meet the needs of a wide range of users.
2. Custom software: This is tailor-made software or the software developed at the user's
request to perform specific functions as required by that particular user.
3. Freeware: This is software that is copyrighted and provided to the user at no cost.
4. Shareware: This is also copyrighted software distributed free of charge for a trial period
and payment is required after the trial period expires.
5. Public-domain software: This is free software donated for public use and has no copyright
restrictions.

Application software falls into two main categories namely:-


(A). Custom made software (special purpose) is a type of software written to meet the specific
needs of an organization that cannot be usually satisfied by other sources of software. E.g.
the School Management Information System (SMIS). I.e. it is a type of software developed
specifically and specially to customers on orders.

(B). Off the shelf or canned software (general purpose) packages, is a type of software written to
be used for a wide variety of purpose. These include; Spreadsheet programs, database
programs, Adobe PageMaker etc. i.e. it is a type of software developed and sold on open
market to customers who need them.

TYPES OF APPLICATION SOFTWARE


a. Word processing software
b. Spreadsheet software
c. Database software
d. Presentation software
e. Web software , Communication software
f. Desktop publishing software , Accounting software
g. Network and Internet software, Paint & image editing software
h. Educational software , Multimedia authoring s/w
i. Project management software , Web page authoring s/w
j. Video and audio editing software , Personal finance software
k. Integrated software , Reference software
l. Computer aided-design software, Entertainment software

SUB TOPIC 2: SYSTEM SOFTWARE


System software consists of programs that control the operations of the computer and its devices.
It is also a type of software, which performs the control function on the computer system.

Examples of system software include; the


 Operating System (O/S),
 Programming languages
 Utility programs

System software also serves as the interface between the user, the application software and
hardware.

pg. 41
UACE Subsidiary ICT

The user interface controls how users enter data and instructions into the computer and how
information is displayed on the screen.

UTILITY PROGRAMS:
These are programs designed to support the operation of application programs and computer
systems; for example Anti-virus utility, uninstaller utility etc.

TYPES OF UTILITY PROGRAMS


xii. Data sorting: This involves taking in data and re-arranging in order as specified by the
user.
xiii. Anti-virus utility: It is a program that prevents, detects and removes viruses from a
computer’s memory or storage devices, for example Norton Antivirus.
xiv. Merging: It is a utility that involves combining data.
xv. Screen saver utility: A utility that causes the monitor’s screen to display a moving image
or blank screen if no keyboard or mouse activity occurs for a specified period of time.

Screen savers originally were developed to prevent a problem called ghosting, in which
images could be permanently etched on a monitor’s screen. They can also be used for
security reasons, business or entertainment.

xvi. Detection and removal of virus: A virus is a computer program that interferes in the
computer operating system. Thus the utility program helps to heal the virus.
xvii. File viewer utility: it is a utility that displays and copies the contents of a file.
xviii. File Compression utility: This reduces or compresses the size of a file.
A compressed file takes up less storage on a hard disk or floppy disk, which frees up room
on the disk and improves system performance.

Compressed files sometimes are called zipped files because they usually have a .ZIP
extension, and therefore they must be unzipped or restored to its original form before
being used.

xix. Diagnostic utility: This compiles technical information about a computer’s hardware and
certain system software programs and then prepares a report outlining any identified
problems.
xx. Disk scanner utility: It is a utility that detects and corrects both physical and logical
problems on a hard disk or floppy disk, and searches for and removes unwanted files.
A physical problem is one with the media, such as a scratch on the surface of the disk.
A logical problem: It is the one with the data, such as a corrupted file allocation table
(FAT).
xxi. Disk defragmenter utility: It is a utility that reorganizes the files and unused spaces on a
computer’s hard disk so that data can be accessed more quickly and programs can run
faster.
When the contents of a file are scattered across two or more non-contiguous sector, the file
is fragmented.
xxii. Uninstaller utility: It is a utility that removes an application, as well as any associated
entries in the system files.
xxiii. Backup utility: This allows a user to copy or backup selected files or the entire hard disk
onto another disk or tape.

pg. 42
UACE Subsidiary ICT

PROGRAMMING LANGUAGES
Programming languages are coded instructions used when designing computer programs.
It is the only language that a computer understands. A programming language combines words,
symbols and rules of grammar known as the syntax of the language.

PROGRAMMING: This is the process of writing a program to solve a given problem, testing it to
ensure it is accurate or correct and preparing documents to support it.
Programming languages also have vocabulary, grammar and syntax just like any other natural
language. However, natural languages cannot be used for programming because they are too
complex i.e. the grammar and vocabulary can be interpreted in very many ways yet programming
languages bust have simple logical structure and must be precise.

Characteristics of programming languages


- they instructions for calculations
- Have instructions for data movements
- Every programming language has instructions for input and output

CLASSIFICATION OF PROGRAMMING LANGUAGES


The highest level is occupied by languages that make it easy for people who are not necessary
trained programmers to develop computer applications.
Going from lowest to the biggest, the classifications are:-
 Machine languages
 Assembly languages
 Low Level Languages
 High Level Languages
 Application generators

1. LOW LEVEL LANGUAGES: These are languages which the computer can easily
understand and are strongly related to the processor since they can easily be memorized.
Low level languages are machine oriented and very difficult for programmers to
understand.
They are categorized into two:-
i) Assembly Languages
ii) Machine Code Languages: These are first generation languages consisting on 0s
and 1s. Machine language is written in binary codes i.e. digits of 0s & 1s. It is a
language that consists of binary numbers that represent instructions normally
locations and data which can be processed.

2. ASSEMBLY LANGUAGE:
This is a language that uses a group of letters to represent a whole group of words instead
of presenting a binary operation of zeros and ones (0s & 1s). They use more English words
and therefore easily understood by the programmers. E.g. "ADD" for addition, "SUB" for
subtraction.
However, each assembly language instruction is eventually translated into machine
language by the compiler.
pg. 43
UACE Subsidiary ICT

Advantages of Assembly languages


o It has closer control of the computer hardware and executes officially.
o It is useful for writing operating systems and game programs which require the fast and
efficient use of the Central Processing Unit (CPU).
Disadvantages
- Execution may be too slow since the language has to be translated into machine code which
can easily be understood by the computer.
- It is designed for a specific machine and specific processor thus not easily compatible with
every machine.
-

3. HIGH LEVEL LANGUAGES


These are language which programmers can easily understand but not immediately
understood by the computer.
These languages are user-friendly and problem oriented rather than machine based. Just
like machine language, instructions in high level languages are written in English like
words. E.g. phrases, symbols etc.

They consist of phrases that are closer to human language or mathematical notations. They
are later translated into low level languages for the computer to easily understand. High
level languages are also referred to as Third (3rd) Generation Languages.

EXAMPLES OF PROGRAMMING LANGUAGES (HIGH LEVEL LANGUAGES)


ii) VISUAL BASIC
iii) JAVA
iv) Hyper Text Markup Language (HTML)
v) BASIC: Beginners All Purpose Symbolic Instruction Code. This is used for training
computer programmers. Today; is a common language in Micro computers and can
almost do all the processing tasks.
vi) COBOL: Common Business Oriented Language. This is an international accepted high
level language used for general commercial purposes. It is known for its capability to
handle the input and output of very large volumes of data, and it came into in 1960’s.
vii) FORTRAN (Formula Translation)
This is a procedure oriented language used for mathematical and engineering services.
It is known for its simplicity /conciseness, efficiency and accuracy.
viii) PASCAL (Pascaline Arithmetic):
This language was named after Blaise Pascal a French mathematician who invented a
mechanical calculator commonly known as a Pascaline. It is used for fast execution for
mathematical problems.
ix) ALGOL (Algorithmic Language)
This is suitable for scientific and engineering computations; and it is suitable for
scientific and engineering computations.
x) ADA: This language was named after Lady AUGUSTA ADA LOVERACE. This
language was used on the first commercial computer invented by Charles Babbage at
the University of Cambridge in England. It is suitable for both scientific and
commercial purposes.
pg. 44
UACE Subsidiary ICT

xi) C- Language: This is also a high level program oriented language used for software
development. C is a concise versatile and portable general purpose language and
compatible with many operating systems and application programs.

Other Programming Languages include


- C++
- LISP (List Processing): This was developed in the late 1950’s by John McCarthy and it is a
prominent language used in artificial intelligence.
- PROLOG (Programming in Logic):; is a language from LISP by the Japanese and it is
designed for use with expert systems and artificial intelligence.
- LOGO: This was developed for educational use in which children can explore and develop
concepts through programming the movement of a pen.
- DBASE etc.

LANGUAGE PROCESSORS, COMPILERS & INTERPRETERS (programming tools)


A compiler: A compiler is a program which translates a source program from high level language
to low level language which can easily be understood by the computer.
Interpreters: This is a program that translates the source program line by line while the program
is running from high level language to low level language.
Assembler: This translates assembler instructions from assemble language to machine code
language or the binary code.
Linkers: These combine compiled programs and determine where the program will be located in
the memory.
Debugger: It is also a programming tool.
LANGUAGE PROCESSORS: These have to translate high level languages to machine code languages
which the processor can understand. They are used to work backwards to the processor.

OPERATING SYSTEM
An operating system is a set of programs containing instructions that coordinate all the activities
among computer hardware devices.

It also refers to all programs which coordinate the operation of all hardware and software
components of a computer.

The operating system relies on device drivers to communicate with each device in the computer.
A device driver is a small program that tells the operating system how to communicate with a
device.
Thus each device on a computer such as keyboard, printer etc has its own specialized set of
commands and thus requires its own specific driver.

EXAMPLES OF OPERATING SYSTEM


 Disk Operating System (DOS)
 WINDOWS, e.g. Win98, Win2000 etc
 Mac OS (Macintosh)
 Windows NT Server
 UNIX
 LINUX
 OS/2 Wrap
pg. 45
UACE Subsidiary ICT

 Novel NetWare OS
 Solaris
 Palm OS
 Pocket PC 2002

1) Disk Operating System (DOS): DOS is a collection of programs and commands that are
used to control the overall computer operations in a disk-based system.
The two more widely used versions of DOS were PC-DOS and MS-DOS, both developed by
Microsoft in 1980s. DOS is not widely used today because it does not offer a graphical user
interface (GUI) and it cannot take full advantage of modern 32-bit micro-processors.

2) WINDOWS, and these include;


i. Windows 95: It is a multi-tasking operating system that does not require DOS to run.
ii. Windows 98: This is an upgrade to the Windows 95 operating system.
iii. Windows 2000 professional: This is a standalone version for business desktop or
laptop computers, as well as for computers connected to the Internet. It is an upgrade
to the Windows NT operating systems.
The two basic versions of Windows are; Windows 2000 Server family and Windows
2000 professional.
iv. Windows Millennium: It is an upgraded version of Windows 98 for the consumer
that uses a computer to surf the Internet or for entertainment. Windows millennium is
designed mainly for home users.
v. Windows XP Home: It is an upgrade to Windows ME
vi. Windows XP Professional: It is an upgrade to Windows 2000 professional. Added
features of Windows XP professional Edition include:
 Greater data security through encryption of files and folders.
 Remote access to computers
 Support for secured wireless network access
3) Mac OS (Macintosh): Mac OS was first commercially successfully graphical user interface.
4) Windows NT Server: It is an operating system designed for client-server networks.
5) UNIX: It is a multi-user, multi-tasking operating system developed in the early 1970s by
scientists at Bell Laboratories.
UNIX is capable of handling a high volume of transactions in a multi-user environment and
working with multiple CPUs using multiprocessing.
6) LINUX: It is a popular free UNIX-like multi-tasking operating system.
Linux is open- source software, which means its code is made available to the public.
7) OS/2 Wrap: It is an IBM’s multi-tasking graphical user interface operating system designed
to work with 32-bitt micro-processors.
8) Novel NetWare OS: It is a widely used network operating system designed for client-server
networks. It is a widely used network operating system deigned for client-server
networks.
9) Solaris: Solaris is a version of UNIX developed by Sun Microsystems. It is a network
operating system designed specifically for E-commerce applications.
10) Palm OS: It is an operating system for PDAs that can manage schedules and contacts and
easily synchronize this information with a desktop computer.
11) Pocket PC 2002: It is a scaled down operating system developed my Microsoft that works
on a specific type of handheld computer, called a Pocket PC.

pg. 46
UACE Subsidiary ICT

POPULAR OPERATING SYSTEM FOR MICROCOMPUTERS include:-


Standalone operating systems are;
 DOS, Windows 3.X, Windows 95, Windows NT Workstation, Windows 98,
 Windows 2000 professional, Windows ME, Windows XP Home, Windows XP
Professional, Mac OS, OS/2 Wrap
 UNIX, LINUX

Network operating systems are;


 NetWare, Windows NT Server, windows 2000 Server
 Windows.Net Server, OS/2 Wrap for E-Business, UNIX, LINUX, Solaris

Command Line Interface operating systems are;


 DOS, UNIX, LINUX and Solaris

Graphical User Interface operating systems are;
 DOS, Windows 3.X, Windows 95, Windows NT Workstation, Windows 98,
 Windows 2000 professional, Windows ME, Windows XP Home, Windows XP
Professional, Mac OS, OS/2 Wrap
 Windows NT Server, Windows 2000 Server
 Windows.NET Server, OS/2 Wrap for E-Business
 Windows CE, Palm OS and Pocket PC 2002

Multi-taking operating systems are;


 DOS, Windows 3.X, Windows 95, Windows NT Workstation, Windows 98,
 Windows 2000 professional, Windows ME, Windows XP Home, Windows XP
Professional, Mac OS, OS/2 Wrap
 Windows NT Server, Windows 2000 Server
 Windows.NET Server, OS/2 Wrap for E-Business
 UNIX, LINUX, Solaris, Windows CE and Pocket PC 2002

Multi-user operating systems are;


 NetWare, Windows NT Server, Windows 2000 Server
 Windows.NET Server, OS/2 Wrap for E-Business
 UNIX, LINUX, Solaris

FUNCTIONS OF THE OPERATING SYSTEM


An operating system has a lot of functions which includes the following:-
1. Support for built-in utility programs: The O/S uses utility programs for maintenance and
repairs. Utility programs help identify problems, locate lost files and backup data.
2. Rescheduling of a computer processor.
3. Starts set up: When a computer is switched on, an O/S initially sets up, i.e. helps in the
process of booting a computer.
4. It manages hardware errors and loss of data
5. It coordinates the flow of data between the various application programs and the user.
6. The O/S enables the user to load programs into the computer.

pg. 47
UACE Subsidiary ICT

7. Memory management: This is used to optimise the use of RAM. The operating system
has to allocate or assign items to areas of memory called buffers.
A buffer is an area of memory or storage in which data and information is placed while
waiting to be transferred to or from an input or output device.
8. Spooling print jobs: With spooling, the print jobs are placed in a buffer instead of being
sent immediately to the printer.
As soon as the print job is placed in the buffer, the CPU is available to process the next
instruction and the computer can be used for other tasks.
9. Configuring devices (build-up): In the past, installing a new device often required setting
switches and other elements on the motherboard.
Most of the operating systems today support plug and play and can configure devices
automatically.
Occasionally (rarely), the user needs to know the IRQ device should use for
communications.
An Interrupt Request (IRQ): it is a communications line between a device an d the CPU.

10. Monitoring system performance: A performance monitor is a program that accesses and
reports information about various system resources and devices.

11. Administering security:


Most multi-user operating systems require each user to log on. Some operating systems
also allow a user to assign passwords to files so that only authorized users can open them
Log on: It is the process of entering a user name and a password into the computer.
A password; is a combination of characters associated with a username that allows a user
to access a computer or a network.

12. Managing storage media and files:


Most operating systems include a file manager program that performs functions related to
storage and file management.
A file manager; is a program that performs functions related to storage and file
management.

Functions of a storage manager


 Copying and formatting disks
 Displaying a list of files on a storage medium
 Copying, renaming, deleting, moving and sorting files
 Checking the amount of used or free space on a storage medium.

pg. 48
UACE Subsidiary ICT

TOPIC 7: ELECTRONIC SPREADSHEET

SUB TOPIC 1: Introduction to spreadsheet


A Spreadsheet is an application program/package used for manipulating figures.
Spreadsheet software can also be defined as the type of program used to organize data in rows and
columns and perform calculations on the data.

A Spreadsheet is commonly used for budgets, forecasting and other finance related tasks. It covers
entering data, formatting, cell alignment, fonts, mathematical calculations, functions and much
more.
TERMINOLOGIES IN SPREAD SHEET PROGRAM
 Work book: A work book is where records are stored in the spread sheet. A work book
may contain one or more sheets limited only the memory available.
 Work sheet: It is a primary document used in spread sheet programs.
Each work sheet is a rectangular array consisting of 256 columns labeled from A- Z.
On each worksheet, data is organized vertically in columns and horizontally in rows.
Each column is identified by a letter (i.e. A, B, C,…) and each row is identified by a
number (i.e. 1, 2, 3,…)
 A range: It refers to a group of cells. A range may vary from a single cell, a row, column,
rectangular block of cell as the entire worksheet.
 A cell: A cell is an intersection of rows and columns.
Each cell has a unique cell address (e.g. A1) to define its location on the worksheet.
 Cell reference: Cell reference identify a cell or range of cells got in a worksheet
 Formula bar: This is normally a space below the format table.
 Labels are text that identify the data and help organize the worksheet.
 Values are numbers to be used for calculations.
 Relative addressing: This is where a cell address (e.g. B1+C1) is self-adjusted when the
formula is moved or copied to another cell (e.g., B2+C2).
 Absolute addressing: It is where a cell address (e.g. $B$2) is always fixed.

FEATURES OF SPREAD SHEET PROGRAMS


o It is composed of grid structures rows and columns.
o It has got a formula bar where functions are entered or inserted.
o Spread sheet are used for calculations only.
o It has built-in mathematical formulae and functions which manipulate numbers.
o It is made up of cells, cell addresses and cell references.

Functions of a spread sheet


Microsoft Excel has a variety of functions that can be used to computer complicated tasks. The
most commonly used functions include the following:-
i) It is used to keep accurate financial records.
ii) It helps accountants to track daily income and expenditures and analyze the
performance of business.
iii) It is used in accounting marketing finance and business planning.
iv) For data sorting
pg. 49
UACE Subsidiary ICT

v) They allow drawing of charts, graphs etc.


vi) Enable data formatting
vii) They help to create, edit, save and retrieve worksheets.

Examples of spreadsheet programs:


- Microsoft Excel Visual Calc
- Lotus 1-2-3 Office pen calc
- Quattro pro Office pro
- Tally programs Super Calc
- Microsoft works

TYPES OF GRAPHS
 Bar graph
 Pie charts
 3D-bar graph
 Line graphs
 Surface graphs
 XY-scatter
 Pyramids
Examples of operations in a spreadsheet cell:
Symbol Description Example
 * Multiplication =B1*B2
 / Division =B1/C5
 + addition =(B1+B2)
 – subtraction =(B2-B7)
 % percentage =C5*50%
 () Parentheses =B2*(C3+D4)
Types of data types of entries in spreadsheet cell:
o Number - General
o Currency - Date/time
o Fraction - Accounting
o Text - Special

Spreadsheet programs have enormous functions, which are predefined formulae to perform
common calculations:
MATHEMATICAL INT (number) Rounds a no. down to the nearest integer
FORMULAE ABS (number) Returns the absolute value of a number
LN(number) Calculates the natural logarithm of a number
LOG(number, Calculates the logarithm of a no. to a specified
base) base
ROUND(number, Rounds a number to a specified number of
no. of digits) digits
SQRT(number) Calculates the square root of a number
SUM(range) Calculates the total of a range of numbers

STATISTICAL AVERAGE(range) Calculates the average value of a range of


FORMULAE numbers
pg. 50
UACE Subsidiary ICT

COUNT(range) Counts how many cells in the range have


entries
MAX(range) Returns the maximum value in a range of
numbers
MIN(range) Returns the minimum value in a range of
numbers
STDEV(range) Calculates the standard deviation of a range of
numbers.

LOGICAL IF(logical test, Performs a test and returns one value if the
FORMULAE value if true, value result of the test is true and another value if the
if false) result is false

FINANCIAL FV(rate, no. of Calculates the future value of an investment


FORMULAE periods, payment)
NPV(rate, range) Calculates the net present value of an
investment based on a discount
PMT(rate, no. of Calculates the periodic payment for a loan
periods, present based on constant payments $ a constant
value) interest rate
PV(rate, no. of Calculates the present value of an investment
periods, payment)
RATE(no. of Calculates the periodic interest rate of an
periods, payment, annuity (income)
present value)

DATE $ TIME DATE Returns the current date


FORMULAE NOW Returns the current date and time
TIME Returns the current time

SUB TOPIC 2: WORKING WITH SPREADHEETS (Microsoft Excel)


How to start Microsoft Excel
- Click on start
- All programs
- Click on Microsoft office
- Then choose Microsoft Excel
How to save a workbook
 Click on office button and then choose Save As
 The Save As dialog box appears and then type in a specific file name. End by selecting the
SAVE button.

pg. 51
UACE Subsidiary ICT

TOPIC 8: INTERNET & WORLD WIDE WEB

SUB TOPIC 1: Introduction to the Internet

The Internet is a worldwide collection of networks linked together.


Imagine a network of five (5) computers in your office that are linked up together in a manner that
you can exchange data, correspondence (mails) and even software between these computers. Now
imagine all these computers are spread over different locations linked up in such a way that they
can communicate between each other. This is what Internet is all about.
The Internet is the largest wide area network in the world.

An Internet Service Provider (ISP) is a company that supplies connections to the Internet,
usually for a monthly fee.
SERVICES OF ISPS
- Managing application hosting
- Provide internet services to subscribers
- They host websites
- They manage E-mail services
- They provide domain names (websites) to people
- They manage network technical support in communication
- They design websites
A domain name is the text version of an IP address, which makes the all numeric IP address easier
to remember and use.
The domain name system (DNS) is the system on the Internet that stores the domain names and
their corresponding IP address.
The domain name server (DNS): This translates the domain name into its associated IP address,
so that data can route to the correct computer.

A domain name includes:


www.monitor.co.ug
www.jomayi.co.ug
Each domain name contains a Top-level domain (TLD) abbreviation that identifies the type of
organisation that is associated with the domain.

Top Level Domain Type of domain

com Commercial organizations, business and companies


org Non-profitable organisation
net Network providers
pg. 52
UACE Subsidiary ICT

edu Educational institutions


gov Government agencies
mil Military organisation

REQUIREMENTS OF INTERNET CONNECTION


To connect a computer to the Internet, one has to do the following: -
1) A computer with browser software, e.g. Internet explorer that allows you to communicate
with a company that provides you access to the Internet.
2) A computer must have a Network Interface Card (NIC)
3) Technical support i.e. setting up connection to the Internet can sometimes be confusing.
And therefore, you need to hire technical personnel from the service provider to connect
you to the Internet.
4) A modem. This is a device that helps a computer to communicate through a telephone line.
5) Use of Internet accounts, user names and password.

ADVANTAGES OF USING INTERNET


a. It facilitates advertisements; People can launch their own sites on the Internet or put up
banner (posters/placards) on other people’s websites.
b. Distance learning: Several distance learning courses are available on the Internet through
which you can study and complete courses on different subjects.
c. It provides entertainment and leisure, such as online games and music, magazines and
vacation planning guides.
d. It facilitates E-commerce: Through Internet, one can shop for various products and pay
through your credit card, ask your bank to transfer money to the different accounts; all this
without leaving your desk.
e. Internet facilitates E-chat: Nowadays you can even make national and international
telephone calls through the Internet at practically the cost of a local call.
f. Easy access to huge information and research. For example news, weather reports and
airline schedules.
g. E-mail services: Though E-mail (Electronic Mail), mail messages can be sent to, or
received from anywhere in the world, in a matter of few minutes and even fewer rupees
(money)!
h. Internet supports Wide Area Networks: Using the Internet, organizations can collect and
compile information from their offices spread over a huge geographical area.
i. People can communicate with each other through chatting, e-mails among others.
j. Shareware software (free): Internet enables downloading shareware (free) software, music,
games and other utilities.
k. Central Repository (storage) of Data: The Internet is like a huge central warehouse of data
that can be accessed and queried (asked) by people from all over the world.

Disadvantages of using an Internet


a. It promotes immorality
b. It promotes conmen. These are people who take advantage of the Internet and take away
people’s money.
c. Bargaining cannot take place since there are no physical people.

Advantages of having Internet at school


m. Students are able to learn at their pace (at their wish) since lessons will not be supervised.
pg. 53
UACE Subsidiary ICT

n. Topics can be accessed on the Internet by the students.


o. Instruction materials like homework, presentations and assignments can be made available
online.
p. Students will access current information on the Internet
q. It provides interactive programs like games, chatting, E-mails etc.
r. It enables getting long term contacts from other countries (Pen pals).
Disadvantages of having Internet at school
 Virus threat: Internet users have a problem of virus attacks on their computer systems.
Virus programs may get activated if one clicks on harmless links.
 Internet is associated with pornography: Internet allows one to access and millions of
pornographic photos, videos and movies. Such unrestricted access to porn can lead moral
decay in young generation.
 Spamming: This refers to sending unwanted e-mails in bulk. Such illegal activities can
very frustrating for one as it makes the internet slower and less reliable.
 Theft of personal information: If you uses internet for online banking, social networking
or other services, you may risk a theft to your personal details such as names, address,
phone number etc. Thus, people can access this information through unsecured connections
and then use your personal details for their benefit and hence trouble may happen/arise.
 Internet addiction: Internet users spend much time surfing instead of doing some other
activities and this makes them addicted to the Internet.
 Social disconnect: People have nowadays drifted apart from their friends and families
because of Internet use. The children also prefer playing computer games rather than going
out to play around with their fellow kids.

SUB-TOPIC 2: WORLD WIDE WEB

The World Wide Web (WWW) also called the Website, consists of a worldwide collection of
electronic documents.
Each of these documents on the Web is called a Web page.

A Web page can contain text, graphics, animations, audio and video i.e. multimedia elements, as
well as built-in connections called hyperlinks to other documents.

Common terms used in Website


a. HTML: This stands for Hyper Text Markup Language, which is one of the main languages
used to create WebPages for the Internet and the Intranet.
b. Website: It a collection of related web pages.
c. Web page: This contains texts, graphics, animations, audio and video.
d. Home page: It is the starting page of a Website.
e. Web Server: It is a computer that delivers web pages requested by the users
f. Web master: It is a person responsible for developing web pages and maintaining a
website.
g. Web browser: It is a software program used to access and view web pages. These
include:
 Internet explorer - Google chrome
 Mozilla Firefox - Arora
 Opera - Netscape Navigator

pg. 54
UACE Subsidiary ICT

h. Hyper link: It is a built-in connection to another related web page or part of a web
page.
i. Search engine: It is a software program that can be used to find Web sites, Web pages and
files on the Internet. Such examples include; www.google.com, www.Ask.com,
www.mywebsearch.com, www.webcrawler.com, www.bing.com etc.
j. Surfing: It is the activity of jumping from one Web page to another.

TYPES OF WEBSITES

What are the Various Types of Websites?


Originally, websites were purely informational. Before the web was opened to the public,
educational and research institutions and government agencies were able to make information
available to each other via text-only websites. Now that we have the World Wide Web, there are
more types of websites than you can shake a stick at. Here we will discuss the basic types, noting
that we will not include all and that there are hybrids of all those we will discuss.

Basic Website Types:


1. Personal Websites
2. Photo Sharing Websites
3. Community Building Websites
4. Mobile Device Websites
5. Blogs Websites
6. Informational Websites
7. Online Business Brochure/Catalog
8. E-commerce Websites

1. Personal Websites. These are types of websites that are built by individuals. The theme and
content of these websites is based mostly around personal information. This type of site is
useful for a family, teenagers, grandparents, etc. to stay in touch with each other. This type is
not advisable for a small business because the URL is not search engine friendly and the
limited server capabilities your ISP offer may not be sophisticated enough for a small business
website.
2. Photo Sharing Websites
These are types of websites that offer free photo sharing paid for by their online advertising
companies. Such web companies like, Flickr.com, Photosite.com, and Google's Picasa. Also,
many digital cameras and photo printers now come with software enabling people to create
digital photo slide shows and upload them to the website.
3. Social Networking Websites: These are websites that enable Internet users to meet and
interact with other people to share a common interest. The most common examples of Social
Websites are Face book, Twitter, E-Harmony among others. Face book was originally built to
only be for college students, but is now open to the public. All you have to do is create an
account and you are able to interact with friends and other people that may share common
interest.
Advantages of social sites
a. It facilitates open communication leading to enhanced information delivery.
b. One has the opportunity to connect with friends and families wherever you are.
c. Allows people to discuss ideas, post news and ask questions.
pg. 55
UACE Subsidiary ICT

d. It provides an opportunity to widen business contacts through using social networking sites.
e. Free business promotion. This is the biggest advantage for business owners using social
networking sites.
f. Advertising costs are low: Some social networking sites provide people with the opportunity
to advertise their products and services at low costs.
Disadvantages of using social sites
a. It makes internet users to spend much time communicating with friends.
b. Social sites open up the possibility for hackers to commit fraud and launch spam and virus
attacks.
c. Social sites have no privacy however much the information shared is private.

5. File Sharing Websites: Are websites that provide space for people to post files like photos or
videos so that other people may view them, save them and sometimes buy them. Some good
example of File Sharing websites are YouTube, Shutter fly, Flicker, and Google's Picasa.
6. Community Building Websites
These are websites that build online communities of people who want to interact with other people
socially or meet people who share their interests. The best known website of this type is
MySpace.com. There is also FaceBook.com and a myriad of similar sites. For sharing and
discussing mutual interests, there are online forums for practically any subject you can think of.
Forum websites can be a great source of information and help for the small business person
7. Mobile Device Websites
Although it is in its infancy (early stage), mobile device websites are used by mobile devices such
as cell phones, PDAs, iPods, iPhones among others. The use of mobile devices will become much
more widespread and prevalent (common) on the Internet. A new domain designation has been
created to identify websites that are "mobile friendly".
8. Blog (Forum) Websites
Blog websites are the ones on which an individual or group of users record opinions or
information. Blogging is the newest impression (sensation) to hit the Internet in the past few years.
People took the words Web Logs and shortened it to Blogs. The blog may include; online diaries,
journals, or editorials. A blog owner will log-on daily, weekly, or whenever, and write about
whatever is going on in their lives or business, or they may comment on politics and news.
9. Informational Websites: Are types of websites that are built for the purpose of providing
information to the Internet users. A major informational site is wikipedia.org, the online
encyclopedia. Such websites can include anything like; News websites, science websites, medical
information websites, educational websites among others.
10. Online Business Brochure/Catalog Websites: Are types of websites that allow users to
find the information of products and services. In the days before the Internet, we used the radio,
and television media to spread the word about our businesses.
OTHER TYPES OF WEBSITES:

1) Web portal: A web portal is an organized gateway to structure the access of information
on the Internet.
pg. 56
UACE Subsidiary ICT

2) Wiki website: A wiki is a website which allows its users to add, modify, or delete its
content via a web browser usually using a simplified markup language or a rich-text editor.
3) Content aggregator: Aggregator refers to a web site or computer software that aggregates
a specific type of information from multiple online sources.

Such websites may include:-

- Data aggregator, an organization involved in compiling information from detailed


databases on individuals and selling that information to others
- News aggregator, a computer software or website that aggregates news from other
news sources
- Poll aggregator, a website that aggregates polling data for upcoming elections
- Review aggregator, a website that aggregates reviews of movies or other products or
services
- Search aggregator, software that runs on a user's computer and fetches, filters, and
organizes a specific search from various search engines
- Social network aggregation, the collection of content from multiple social network
services
- Video aggregator, a website that collects and organizes online video sources

NETIQUETTE: Netiquette refers to the correct or acceptable way of communicating on the


Internet. Netiquette is a short form of network or Internet etiquette.

Netiquette rules:

1) One should follow the core rules while using internet or computer network. E.g. spamming is

not allowed, spell check e-mail messages, one should not send e-mails at night, one should

visit secure sites, one should not over react when replying a message etc.

2) You should treat other people the way you want to be treated.

pg. 57
UACE Subsidiary ICT

TOPIC 9- ELECTRONIC PRESENTATION

SUB TOPIC 1: Introduction to Electronic Presentation


Definition of electronic presentation:
It is an application software that enables the user to create computer based slide shows using
graphics and animations (moving pictures) to enhance images.

OR: It refers to a computer-based program capable of communicating ideas in form of text,


photos, audio and video or a combination of all to achieve a common objective.

A presentation is the collection of slides, handout, speaker notes, sounds and videos organized in
a single file.
Presentation software is the program which allows the user to create presentations and handouts.

Examples of presentation software programs


 Microsoft PowerPoint
 Corel Presentations
 Apple Keynote
 KPresenter
 Lotus Freelance Graphics
Features of presentation software
i. It has the ability to add sounds and graphics to enhance the presentation.
ii. It has the ability to run the slides automatically.
iii. It deals with slides rather than pages in data presentation.
iv. It allows the user to display the presentation in a slide show.
v. It contains design templates which define how the presentation will look like.

TERMS USED IN POWER POINT


1. Slide: It is a one page used in a power point presentation called a slide.
2. Slide transition: These are visual movements as one slide changes to another.

pg. 58
UACE Subsidiary ICT

3. Master slide: It is the top slide in a hierarchy of slide that stores information about the
presentation.
4. Animations and animation schemes: Animations are visual effects applied to individual
items on the slide such as graphics, titles or bullet points.
5. Bullets: these are small dots, squares, dashes or graphic objects that design a short descriptive
phrase.
6. Slide show: They display slides in a sequence moving from one slide to another.
7. Slide sorter view: This provides a light table for viewing multiple slides.
8. Slide layout: Refers to a single slide.
9. Normal view: Normal view splits your screen into three major sections: the Outline and
Slides tabs, the Slide pane, and the Notes area.
10. Slide view: It is the most common view to use for building a presentation.
11. Outline view: It helps the user to organize and develop the textual content for a
presentation.
12. Notes page view: This allows to insert, edit and delete reminder notes on each slide.

Advantages of electronic presentation


- They are used for visual aid communication
- Used for summarizing content for presentation
- Are used in advertisements as a means of attracting customers.
- It helps in computer aided planning where by students can easily read and take the notes
without teacher's instructions
- They help in making illustrations that can make the audience easily understand a certain
presentation.

PRINCIPLES FOR A GOOD PRESENTATION


i. Avoid the funny fonts: One should avoid using font types which are hard to read.
ii. Use large text (words): You should be able to use big font sizes for better reading.
iii. A good title slide can attract an audiences’ attention. As a guide, one should stick to a
maximum of one slide for every 2 minutes to present.
iv. Use related diagrams where appropriate. You can save a lot of explaining and your voice as
well by using diagrams.
v. Avoid distracting your audience. If the audience is distracted, they will not follow your
presentation.

COMMON TYPES OF PRESENTATIONS


a. Arousing or motivational presentation: This is intended to arouse (awaken) the listeners’
emotions so that they can respond positively.
b. Analysing presentation: This helps the audience to critically analyse certain issues and to
devise (plan) a way forward.
c. Informative presentation: This gives the audience certain affairs that are happening.
d. Decision making presentation: This moves the audience to take your suggested action.
e. Persuasive presentation: This is intended to convince your listeners to accept the proposal
of the presenter.
f. Instructional presentation: This gives specific directions or orders.

Microsoft Power point has a number of ways to deliver a presentation such as:-

pg. 59
UACE Subsidiary ICT

i. On-screen presentation: This is a presentation made for viewing on a personal


computer.
ii. 35mm (millimeter) slides: These are like photo camera negatives which are printed out
for use in 35mm projectors.
iii. Over head transparencies: This is a printed out presentation to be used as film for
over head projectors.
iv. Hand-outs: These are notes that are given out to the students or audience
v. Paper print-outs: These are printed slides in black and white or coloured.

SUB-TOPIC 2: WORKING WITH MICROSOFT POWER POINT


How to start a Microsoft Power point
- Click on start
- All programs
- Click on Microsoft office
- Then choose Microsoft Power point

TOPIC 10- DATA COMMUNICATION AND NETWORKING

SUB TOPIC 1: Introduction to Data communication

Definition of Data communication:


It is where by one computer transfers data or information to another computer and other electronic
devices via physical cables or wireless.
A communication technology used in data communications includes; wires, optic fibers and radio
frequencies.
Elements of data communication (Modes)
There are five (5) elements of data communication namely:-
- Message
- Sender
- Medium
- Receiver
- Protocols
1. MESSAGE: In a data communication system, the message is the information sent out through
the computer system. The message may include numbers, words, photos, sound, video, audio
or a combination of any of these.
2. SENDER: The sender in a data communication sequence is the device that generates
(produces) the message. Sometimes these devices are called sources or transmitters instead of
sender. Some sending devices are; computers, video cameras, smart phones, telephones and fax
machines.
In this case, radio stations, television stations and short wave radios are also considered sender
or transmitters in a data communication system.
pg. 60
UACE Subsidiary ICT

3. MEDIUM: It is a means by which the message is transmitted from the sender to the receiver.
This includes the wires, Local Area Network cables, fiber optic cables, microwave signals and
Satellite signals.
4. RECEIVER: It is the device on the other end of the data communication transmission that gets
the message. Many of the same devices that work as receivers also work as senders such as
smart phones, computers and telephone handsets. Some however, are only receivers such as
televisions and radios.
5. PROTOCOLS: A protocol is a set of rules and procedures for exchanging information among
computers on a network. Some of the protocols include:-
 Transmission Control Protocol (TCP/IP): It is a set of protocols widely used on the
Internet.
 File Transfer Protocol (FTP): It is a protocol that enables computer users to upload and
download computer files with other computers or servers.
 Simple Mail Transfer Protocol (SMTP): It is a protocol for sending E-mail messages
between computers and servers.
 Telnet: It is the main protocol for creating connections with remote computers.
 HTTP: This stands for Hyper Text Transfer Protocol: A protocol that enables web pages to
be transferred on the websites.

DATA TRANSMISSION MEDIA


This is the way through which data is transmitted from one device to another.

Categories of transmission media


There are two (2) categories of transmission media used in computer communications and these
are;
1. GUIDED/WIRED MEDIA: These are the physical links through which signals are confined
(restricted) to narrow path from one device to another.
Examples of Guided/Wire media include;
 Coaxial cable: It is very common and widely used communication medium e.g. a TV wire.

-- A coaxial cable

 Twisted paired cable: It is the most popular network cabling and consists of one or more
twisted-pair wire bundled (collected) together.
There are two (2) types of twisted-paired cable cables e.g. The Shielded Twisted Pair cable
(STP); it has a metal wrapper around each twisted pair wire to reduce noise. The
Unshielded Twisted Pair (UTP) cable does not have the metal wrapper for shielding noise.

pg. 61
UACE Subsidiary ICT

Shielded Twisted Pair cable (STP)


Unshielded Twisted Pair cable (UTP) (STP)

 Fiber optic cables: These use electrical signals to transmit data and use light.

2. UN-GUIDED MEDIA (WIRELESS): These do not use any physical connectors between the
two devices communicating. Usually, the transmission is sent through the atmosphere.
There are three (3) types of wireless media namely;
A. Radio waves
B. Micro waves
C. Infrared waves

A. Radio waves: It has a frequency between 10 KHz to 1GHz. Radio waves has the following
types:
 Short waves
 Very high frequency (VHF)
 Ultra high frequency (UHF)
B. Micro waves:
Micro waves travel at high frequency than radio waves and provide throughput as a
wireless network media. Micro wave transmission requires the sender to be inside the
receiver.
Types of Micro waves:
 Terrestrial micro waves
 Satellite micro waves
- Terrestrial micro waves: Are used to transmit wireless signals across a short
distance e.g. the Blue tooth. A blue tooth is a wireless technology that can connect
two devices such as mobile phones to share data or information.
- Satellite micro waves: Satellite micro wave transmission is used to transmit signals
throughout the world. Satellite dishes are sued to send the signals to the satellite
where it again sends back down to the receiver satellite.
A communications Satellite is a station in the space that receives microwave signals
from an earth-based station and broadcasts the signals back over a wide area to
many earth-based stations.

C. Infrared waves: It is a wireless transmission media that sends signals using infrared light
waves. The infrared technology is similar to the use of a remote control for a television
(TV).
ADVANTAGES OF BLUE TOOTH

pg. 62
UACE Subsidiary ICT

b. It is easy to access: Unlike a wireless Local Area Network (WLAN), Bluetooth does not need
any configuration (construction or arrangement) to start a connection and perform file
transfers.
c. It is secured: The Bluetooth connection can be securely established without interference from
unrecognized devices by entering an identification number for the connection. The user can
opt to enter a PIN which creates the secure usage loop (ring or cycle).
d. It is easy to control: Unless a device is already paired to your device, one has the option to
accept or reject the connection and file transfer. This prevents unnecessary or infected files
from unknown users from transferring to your device.
e. Bluetooth can be freely accessed: Accessing Bluetooth device does not cost money. All you
need is the Bluetooth capability.
f. It does not require internet connection: Bluetooth is not recommended for establishing
Internet connections because of its limited transfer rate.

DISADVANTAGES
a. Bluetooth is slow in speed: The data sent between two Bluetooth devices has a maximum
transfer rate speed of 1 megabyte per second (1 MB/s). Infrared is capable of transferring
data at 4MB per second, and Wi-Fi is capable is higher than the two technologies.
b. Bluetooth covers a mall range: Bluetooth covers a range of 15 to 30 feet depending on the
device. The small range is a disadvantage for someone who may need to use a Bluetooth
device outside of that 30-foot radius.
c. It is less secure: Since data is transferred over radio waves using Bluetooth, it is much easier
for a hacker to break into than secure wireless networks. For that reason, Bluetooth should
not be used to transfer data that needs to remain private and secure.
d. Bluetooth uses much battery: Bluetooth uses the battery power of a particular device in
order to operate. Many cell phone makers send phones out with Blue tooth powered off in
order to maximize the battery life of the phone. By tuning the Blue tooth on can drain a cell
phone or computer battery.

DATA COMMUNICATION TOOLS


Data communication tools include the following:-
- Electronic mails
- Mobile phones
- Social networking sites
- Faxing
- Voice mail
- Instant messaging
- Chat rooms
- Newsgroups
- Internet telephony
- Videoconferencing
- Groupware
- Global positioning system
pg. 63
UACE Subsidiary ICT

- Telecommuting.

1. Electronic mails: It is the transmission of messages via a computer network such as a local
area network or the Internet.
So data communication enables electronic messages to be sent over a network.
OR: It is a service that enables exchange of electronic messages to clients over communication
devices like computers.
Or: The transfer of electronic messages from one geographical location to another using
computers and other related computerized devices.
Components of an E-mail message
To: It carries the e-mail address of the recipient
Cc: (Carbon copy): It allows the sending of a message to the receiver while allowing other
recipients to view the message sent.
Bcc: (Blind carbon copy): Allows sending of messages to the receiver without allowing other
recipients to view the message sent.
Subject: contains the theme of an E-mail message e.g. Re: application, Re: greetings etc
Message Box: It contains the message (information) of the sender.

Advantages of E-mail over ordinary mails:


i) Ability to send messages to multiple recipients.
ii) It is convenient when receiving and delivering messages.
iii) It is cheap compared to ordinary mails
iv) Enables sending large files through attachments.
v) E-mails can be used for advertising
vi) Messages can be sent anywhere in the world.
vii) E-mail messages can be sent at any time
viii) Records and copies are kept automatically

Disadvantages of using E-mails


i) There is always a risk of virus
ii) Information overload. Many people send too much information which takes time read
and reply as well.
iii) It is not secure to send an e-mail message.
iv) Lack of personal touch. E-mail messages will never beat hand written letters when it
comes to relationships.
v) E-mails are associated with spam. Spam is the use of electronic messaging systems to
send unsolicited bulk messages especially adverting aimlessly (indiscriminately).

2. MOBILE PHONES: The use of wireless phones is a dominant form of communication in day-today
life. Mobile users are able to send text messages as well as sending pictures and video files.
Advantages of using phones:
i. Ability to send and receive text messages all the time.
ii. One can play games; listen to audio and video music when you are bored.
iii. Employees can keep in touch all the time.
iv. Mobile phones are portable and can fit in everyone’s pocket of hand bag.
v. You can surf the Internet and connect with the whole world.
vi. If one is lost along the journey, he/she can call for directions or assistance.

Disadvantages of using phones

pg. 64
UACE Subsidiary ICT

i) They are hard for illiterate people to use.


ii) Mobile phones can damage our ears.
iii) They are expensive to buy and maintain.
iv) They can get misplaced easily because of their portability.

3. Social networking sites. Face book and Twitter are common examples of social sites where
Internet users are able to share ideas of common interests.
4. FAX
A fax (facsimile) machine is a device that transmits and receives documents over telephone
lines.
5. VOICE MAIL
A voice mail functions like an answering machine and allows a caller to leave a voice
message, which is stored in a voice mailbox for the called party.
A called party can listen to the message, add comments to a message and reply or forward a
message to another voice mailbox in the voice mail system.
6. INSTANT MESSAGING (IM)
Instant messaging (IM) is a real-time communications service that notifies a user when one or
more people ate online and then allows the user to exchange messages or files with them.
7. CHAT ROOMS
A chat room is a location on an Internet server that permits users to chat with each other by
typing lines of text on the computer.
8. VIDEO CONFERENCING
A video conferencing in a meeting between two or more geographically separated people who
use a computer network or the Internet to transmit audio and video data.
A videoconference conducted over the Internet using Web browsers and Web servers to deliver
the service is called a Web conference.
9. NEWS GROUPS
A newsgroup also called a discussion group, is an online area where users conduct written
discussions about a particular subject.
The entire collection of Internet newsgroups is called Usenet.
9. GLOBAL POSITIONING SYSTEM (GPS)
A Global positioning system (GPS) consists of one or more earth-based receivers that accept
and analyse signals sent by satellites in order to determine the receiver’s geographic location.
10. TELECOMMUTING:
Telecommuting is a work arrangement so that employees may work away from the standard
workplace of a company, but communicate with the office using some kinds of
communications technology.
SUB-TOPIC 2: INTRODUCTION TO COMPUTER NETWORKS
What is a computer network?
A computer network is a collection of computers and devices connected together via
communications devices and media.
Communications devices enable two or more computers to exchange items such as data,
instructions and information with each other.

TYPES OF NETWORKS:
i. Local Area Network (LAN): It is a network covering a small geographic area, like a home,
office, or building. Current LANs are most likely to be based on Ethernet technology.

pg. 65
UACE Subsidiary ICT

ii. Wide Area Network (WAN): A WAN is a data communications network that covers a
relatively broad geographic area (i.e. one city to another and one country to another country)
and that often uses transmission facilities provided by common carriers, such as telephone
companies.
iii. Wireless Local Area Network (WLAN): It is a LAN that uses no physical wires, but
wireless media such as radio waves.
iv. Personal Area network (PAN): It is a computer network used for communication among
computer devices close to one person. Some examples of devices that are used in a PAN are
printers, fax machines, telephones or scanners.
v. Virtual Private Network (VPN): It is a network accessed by the employees in any given
company. A Virtual Private Network provides the user with a secure connection to the
network using the Internet as if the user had a private line.
vi. Metropolitan Area Network (MAN): A Metropolitan Area Network is a network that
connects two or more Local Area Networks or Campus Area Networks together but does not
extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are
connected to create a Metropolitan Area Network.
vii. Campus Area Network (CAN): A network that connects two or more LANs but that is
limited to a specific and contiguous geographical area such as a college campus, industrial
complex, or a military base.
viii. Global Area Network (GAN): Global area networks (GAN) specifications are in
development by several groups, and there is no common definition. In general, however, a
GAN is a model for supporting mobile communications across an arbitrary number of
wireless LANs, satellite coverage areas, etc

Advantages of Local Area Network (LAN)

 Files can be stored on a central computer (the file server) allowing data to be shared
throughout an organisation.
 Files can be backed up more easily when they are all on a central fileserver rather than when
they are scattered across a number of independent workstations.
 Networks also allow security to be established, ensuring that the network users may only
have access to certain files and applications.
 Software and resources can be centrally managed.
 Network versions of software often allow for their speedy installation on workstations from
the file server.
 Expensive devices such as laser printers or scanners can be shared.
 Users can access their files from any workstation

Advantages of Wide Area Network (WAN)


Some of the advantages and disadvantages of WAN networks are as followed. Advantages can be
that;
o Messages can be sent very quickly to anyone else on the network,

o Printers can be used by more than one computer,

o You won’t have to install some software on each computer;

o All computers can use the same software and you can share larger files over a larger area.

pg. 66
UACE Subsidiary ICT

Some of the disadvantages can be that;


- are expensive and complicated to set up,
- Security is a big issue with LAN, i.e. it has many security threats.
- Once it is set up it will require a set of techs to service it regularly and can leave you
vulnerable (exposed) to hackers.
Advantages of Wireless Local Area Network (WLAN):
a. It is convenient. Wireless LANs have one huge advantage over wired networks. Connecting
to them is as simple as logging onto a website. Most modern laptops come with a wireless
card that can connect to any network.
b. It is easy to connect network hardware. Wireless LANs are easy to the internet and network
resources. An Ethernet cable is not required for every device.
c. It is mobile. Wireless LANs are advantageous when using mobile devices such as laptops
because they allow users to move around while maintaining their network connection.
d. Wireless network is easy to expand and cheap. With wireless networks, adding more
connections is as easy as adding another router to handle network traffic.

Disadvantages of WLANs
a. It is less secure. Wireless networks are less secure than wired networks both in terms of
access and user information. Because the information sent and received from the network is
broadcast instead of travelling over a wire, it is much easier to intercept.
b.
c.

Advantages of using a network


- Speed. Networks provide a very rapid method for sharing and transferring files.
- Cost. Networkable versions of many popular software programs are available at
considerable savings when compared to buying individually licensed copies.
- Security. Files and programs on a network can be designated as "copy inhibit," so that you
do not have to worry about illegal copying of programs.
- Centralized Software Management. All the software can be loaded on one computer
known as the File Server.
- Resource Sharing. Sharing resources is another area in which a network exceeds stand-
alone computers.
- Electronic Mail. The presence of a network provides the hardware necessary to install an
e-mail system.
- Workgroup Computing. Workgroup software (such as Microsoft BackOffice) allows
many users to work on a document or project concurrently.
- Flexible Access. School networks allow students to access their files from computers
throughout the school.

Disadvantages of installing a school Network


 Expensive to Install. Although a network will generally save money over time, the initial
costs of installation can be prohibitive. Cables, network cards, and software are expensive,
and the installation may require the services of a technician.
 Requires Administrative Time. Proper maintenance of a network requires considerable
time and expertise.
pg. 67
UACE Subsidiary ICT

 File Server May Fail. Although a file server is no more susceptible to failure than any
other computer, when the files server "goes down," the entire network may come to a halt.
 Cables May Break. The Topology chapter presents information about the various
configurations of cables.

COMPONENTS AND DEVICES OF THE COMPUTER NETWORK


Local Area Network can be made of several standard components namely:-
a) Computers with Network Interface Cards: Two or more computers are required along
with network interface card (NIC).
b) Cables and connectors: LANs do not use the telephone network, they instead use some
other cabling or connection system, either wired or wireless.
c) Network operating system: The network operating system software manages the activity of
the network.
d) Modem: A modem enables you to connect your computer to the available internet
connection over the existing telephone line. Like the Network interface card (NIC), modem
is not integrated with a computer motherboard. It comes as separate part which can be
installed on the PCI slots found on motherboard.
e) Hub: Hub is a device that splits a network connection into multiple computers. It is like a
distribution center. When a computer requests information from a network or a specific
computer, it sends the request to the hub through a cable. The hub will receive the request
and transmit it to the entire network.
f) Switch: Switch is a communication device grouped as one of computer network
components. Switch is like a Hub but built in with advanced features.
g) Router: When we talk about computer network components, the other device used to
connect LAN with an internet connection is called Router. When you have two distinct
networks (LANs), or want to share a single internet connection to multiple computers, we
use a router.
h) Bridges and gateways: A Local Area Network may stand alone, but it may also connect to
other networks either similar or different in technology.
A bridge is an interface that enables similar networks to communicate.
A gateway is an interface that enables similar networks to communicate such as a LAN
with a WAN.

COMPUTER NETWORK MODELS


1. Peer-to-peer network
A Peer-to-peer network is a network where by each computer can share the hardware, data or
information located on any other computer on the network.
 Each computer on a peer-to peer network stores files on its own storage devices.
 Each computer on the network contains both the network operating system and application
software.
 A peer-to-peer network is a simple, inexpensive network that typically connects less than
10 computers together.
 It is ideal for home and small business users.

Peer-to-peer environment

pg. 68
UACE Subsidiary ICT

Computer Computer Computer

Fig. 4: peer to peer illustration

Advantages of using peer to peer


a. Computers can communicate easily
b. They are easy to configure
c. Users can manage their own resources.
d. They do not require a network administrator
e. They reduce total cost of network setup

Disadvantages of using peer to peer


- They do not allow any central management
- They offer very poor security
- Users are responsible for managing resources.
- They offer a limited number of connections for shared resources.

2. Client-Server Network
A client/Server Network is a network that has one or more computers acting as a server while the
other computers. i.e. clients on the network can request services from the server.
 A client/Server network typically provides an efficient means to connect 10 or more
computers together.
 Most client/server networks have a network administrator who is in charge of the
network.

Client/Server environment

Server
Computer Computer Computer
Fig. 5: peer to peer illustration

Advantages of client-server network


a. It is flexible: New technology can be easily integrated into the system. Security: All major
server-based systems provide sophisticated security.
b. The server is accessible: The server can be accessed remotely and across multiple
c. It is stable: Server-based systems are designed to support a wide range of organization
sizes.

pg. 69
UACE Subsidiary ICT

d. Files can be backed up: they offer a centralized backup where data can be stored in one
server.

TOPIC- 11 ELECTRONIC PUBLICATION

pg. 70
UACE Subsidiary ICT

SUB TOPIC 1: ELECTRONIC PUBLISHING


What is publishing?
It is the process of production and dissemination of literature, music or information.
Electronic publishing also referred to digital publishing, is the publication of digital libraries and
catalogs on the internet.
Electronic publishing involves:
- Web publishing i.e. having content on the website
- Online publishing i.e. putting content on the internet
- Desktop publishing i.e. the production of printed information by means of a printer linked
to the computer.

Examples of Electronic publications:


- Electronic books
- Electronic journals
- Online magazines
- Online newspapers
- CD-ROMs - PDF
Examples of electronic publishing software programs:
 Adobe Frame Maker
 Adobe InDesign
 Adobe PageMaker
 Adobe Home Publisher
Uses or application areas of electronic publishing
g. They help to produce electronic books: these are electronic versions of books which are
delivered to customers via internet or CD-ROMs in digital formats.
h. Help to design e-mail published content. i.e. through receiving news items, articles and short
newsletter in e-mail boxes.
i. It helps to produce journals. Journals refers to a record, or periodical magazine especially
one published for a special group or learned society.
j. They sued in developing digital content. This is done through electronic delivery of fiction,
where by publishers of digital contents deliver it via download to handheld and other
wireless technologies.
k. They are in web publishing: This is the designing of content to host on websites.
l. They are used in electronic ink: It is to create newspapers or books that update themselves.
Features of an electronic publishing software
- Fonts and styles: It has a wide range of fonts and styles
- Page Layout: this is the ability to define the layout of a page using frames to place text and
pictures in the document.
- It has accurate positioning: this is the ability of positioning objects extremely accurately on
the page using grids.
- It drawing facilities
- Importing pictures and text

Advantages of using electronic publishing


i. The content is easy to navigate by using hyperlinks
pg. 71
UACE Subsidiary ICT

ii. Products are easy to produce and edit


iii. The content can be very rich in form of video, text and audio
iv. The content (Products) can be made available immediately on the internet
v. The content can be used on many devices such as computers, smart phones, tablet media
players etc.
vi. The saves time to publish an electronic book than a traditional publication.
Disadvantages of electronic publishing
 Electronic media can easily stolen
 Securing media is possible but more expensive
 Consumers are most likely to pirate media than traditionally published materials.
 A computer and other electronic devices are required for use

What kinds of publications can one create in Publisher?
The MS Publisher has pre-designed publications (publication wizards for many types of business
and marketing publications. Each of these pre-designed publications is available in many different
designs. And now, one can browse through the selection of pre-designed publications by
publication type or by design style.

Pre-designed publications in MS Publisher


a) Print publications and these include:
Award certificates, banners, brochures
Business cards, calendars, catalogs
Gift certificates etc
b) Web publications such as easy website builder
c) E-mail such as product list, letters and newsletters etc.

How to start Microsoft Publisher:


 Go to start menu
 All programs
 Then Microsoft Office
 Click on Microsoft Publisher

pg. 72
UACE Subsidiary ICT

TOPIC 12- DATABASES

Definition of a Database:
Database is a collection of related data organized in a way that allows access, retrieval and use of
the data.
Database can also be defines as a systematic organization of data.

A database Management System (DBMS): This is a software that allows the users to create,
access and manage a database.

What is the difference between Microsoft Access & Database?


A Database is a collection of data organized in a way that allows access, retrieval and use of the
data.
Where as
Microsoft Access is a database software program used to manage files and records.

Examples of Database (common “paper databases”) include:-


o Telephone books
o School grade book
o Customer address book
o Library catalogue
o Employee salary book

Computerized Databases are:-


o Flight information system
o Students’ Records Management Systems (SMIS)
o Database for Insurance company
o Database system in the public libraries (online catalogue public libraries)

Examples of Database software programs:


o Microsoft Access
o Microsoft Visual Fox Pro.
o Microsoft Visual Basic 6.0
o Borland database
o Lotus Approach
o My SQL
o Oracle
o File Makeup Pro.
o Corel paradox

COMMON TERMS USED IN DATABASES:


i) File: A collection of related records.
ii) Field: It is a column in a database table that contains specific piece of information within a
record, i.e. a piece of information in a record.
Or it is a unit data consisting of one or more characters. E.g. YOUR NAME or ADDRESS

pg. 73
UACE Subsidiary ICT

iii) Record: It is a row in a database table that contains information about a given person, product
or event, i.e. an individual entry in a table. For example; student’s name is Agaba.
OR: A collection of related fields

iv) Table: It is a fundamental building block of an access database.


v) Query: A query is a filter through which data is evaluated.
vi) Form: A form simplifies data entry of work.

TABLES:
A table is a fundamental building block of an access database.

Relating tables in database are of 2 types;


i. Relational database
ii. Flat file database

1. Relational database: This stores information in a number of separate tables and then
relationships are created between the tables to combine the information.

2. Flat file database: This stores all the information in one table. This type of database is easy to
set up but is not very flexible when it comes to storing large amount of data.

Steps to create a database:


 Plan your Access program
 Design layout
 File structure creation
 Defining the fields.

A PRIMARY KEY:
 A primary key is used to ensure that there are no duplicate fields in table
 It avoids redundancy in table since it can be represented as a foreign key in other tables.
Types of relationship
i) One-to-one relationship: This is where one record in table A, there is only one
corresponding record in table B.
ii) One-to-many relationship: It is where each record in table A there are many
corresponding records in table B.

DATA TYPES: The data type of a field specifies the type of data that the field can contain.
Functions of data types in a record
 Text type: This may hold letters, numbers or special characters
 Memo Type: This may contain text of any type
 Number; (Numeric type): This may hold numbers.
 Date/Time Type: This hold day, month and year information.
 Currency type: which may hold money such as dollar, shillings etc.
 Boolean type, which may hold values that are either true or false.
 OLE Object- OLE (Object Linking and Embedding) objects, graphics or other binary data.
 Auto number may hold a number
 Hyperlink may hold a link between files.
 Logical data types (Yes/No, True/False)
pg. 74
UACE Subsidiary ICT

 Lookup Wizard: When the value you need exists in another table or from a list of static
values, you use the lookup wizard to help you establish a link to the table or to define a
combo.

Characteristics of Database applications


- Each column has similar data entries (data type).
- Each row also contains information on a particular item
- Data is organized in columns and rows
- It facilitates sharing of data
- Allows data backup and storing of data
- It contains tools known as database objects such as tables, forms, queries and reports.

Functions of Databases:
- It provides the user with the means of managing and manipulating large amounts of data.
- It is used to organize and manage a collection of related information.
- They are used in scientific and research data management.
- They can store a summarized data
- They are used to store data.

Advantages of Electronic Databases over manual databases:


a) Improvement of access to data.
b) Reduction of data redundancy: Storing most of data in one place means les duplication
and less required space.
c) Ensured data dependence: This means that changes made to data structures usually do not
require changes in programs that access the databases.
d) Centralization of security and this limits access to the information for unauthorized users.
e) Reduction on costs: Data entry and storage of new application programs are all made more
economical.
f) Database can be used for easy administration
g) Data backup is ensured in databases.

Disadvantages of Databases
- They are expensive to manage
- Electronic databases are difficult to develop
- They require highly trained experts to manage the database.
- Data can be corrupted by unauthorized data managers.
- Data security may not be ensured in case of data sharing.

REVIEW QUESTIONS:
1) a. Define a Database Management System (DBMS).
2) b. Give two application of using a DBMS in each of the following environments:
 school
 office/factory
3) Give two examples of paper database and two examples of computerized databases.

pg. 75
UACE Subsidiary ICT

pg. 76
UACE Subsidiary ICT

TOPIC 11- SYSTEM SECURITY, ICT ETHICAL ISSUES & EMERGING TECHNOLOGIES

List of sub topics:


- Introduction
- Defining computer security and explain various forms computer security.
- Explain various ways of protecting data in a computer.
- Explain various forms of network attacks.
- Discuss computer virus and suggest ways of protecting against the virus.
- Define computer crime, various forms of computer crimes and measures to protect against them.
- Explain ethical issues in ICTs such as plagiarism, software piracy, copyright infringement and
misuse.
- Explain various intellectual property groupings such as copyright.
- Explain emerging technologies such as 4G mobile communication devices, virtual reality etc.
- Explain careers in ICT such as web designers, database administrators among others.

11.1 COMPUTER SYSTEM SECURITY

System security refers to techniques for ensuring that data stored in a computer cannot be read by
any individual(s) without authorization as well as protecting computer from physical theft.
OR: Computer system security refers to all the processes and techniques for ensuring that data
stored in a computer cannot be accessed by unauthorized users.
The purpose of computer security is to protect an organization’s valuable resources such as
information, hardware and software.

11.1.2 DATA PROTECTION IN A COMPUTER

Therefore computer system security is divided into two namely:-


 Data security
 Physical security

1) DATA SECURITY: It is the protection of data stored on a computer network or standalone


device from unauthorized accidental modification, destruction or disclosure. Data security
concerns the protection of data from accidental or intentional but unauthorized modification or
destruction through the use of physical security so as to limit accessibility.
Thus in a computer system, data can be protected using any of the following ways:-
i. Make a backup copy: This is storing of information on a secondary storage medium such as
an external hard disk. There are also other various backup programs that can offer good
options such as windows backup and online backup.
ii. Keep a copy of your data offsite. Backing up your data is a good practice but one should
keep a copy of his/her data away from the working place. In case of fire outbreak or other
disaster, your onsite data backup could be lost as well.
iii. Save your work/information. One should endeavor to save his/her work and need to learn
how to use the ‘Auto Save’ feature in an application.
pg. 77
UACE Subsidiary ICT

iv. Use of passwords to protect data. Data files should be protected by use if usernames and
passwords. A number of applications such as Microsoft Office Word will allow you to set
passwords to individual documents.
v. Hardware-based mechanisms for protecting data. Hardware-based security solutions can
prevent read and write access to data and hence offers very strong protection against
tampering and unauthorized access.
vi. Use of software-based mechanisms. Software-based security solutions help to protect data
(encrypt) from being stolen. However, a malicious program of hacker may corrupt the data to
make it unrecoverable.
vii. Data masking: This is the process of covering (obscuring) data with in a database table or
cell to ensure that data security is maintained.
viii. Installing updated antivirus software programs: Make sure to protect your information by
using reliable and genuine antivirus software on your computer system. Hence antivirus
software helps to scan or remove malware, worms and healing infected files.
ix. Perform regular computer maintenance. One should learn how to use some utilities to
diagnose or check a computer for problems. It is a good idea for one to run a disk-scanning
program and defragmenting a hard disk.
x. Erasing important information (data erasure): Data erasure is a method of software based
overwriting that completely destroys all electronic data found on a hard disk or other storage
media. This helps to ensure that sensitive data is not leaked when a computer is used by other
people.
xi. Never open an e-mail attachment. If your e-mail has an option that automatically opens
attachments, you should disable that feature. It is advisable to scan any e-mail attachments
and downloaded files before opening them.
xii. Never trust external storage devices. External storage devices like memory cards and flash
disks should be scanned for the possibility of malware (viruses).

The basic Data security standards which data management technology must ensure include:-
- Confidentiality: This allows only individuals to see only the data which they are
supposed to see.
- Integrity: This enables data to be protected from deletion and corruption, booth while it
resides with in the computer.
- Availability: A secure system makes data available to authorized users without delay.

Ways through which data can be protected with administrative controls:


These include the following:
A) System Access controls: This is where by unauthorized users don’t get into the computer
systems and by encouraging authorized users to be security conscious. This can be effected
by changing their passwords on regular basis.
B) Data Access controls: This is the monitoring of who can access what data and for what
purpose.
C) System and security administration: This is done by training users appropriately and by
monitoring users to make sure that security policies are observed.
pg. 78
UACE Subsidiary ICT

2) Physical security: This is where by computers are kept in a secure physical environment and
well protected from unauthorized users.
Physical security describes security measures that are designed to deny access to unauthorized
personnel including attackers or even accidental intruders from physically accessing a
building, facility, resource or stored information.
PHYSICAL MEASURES TO PROTECT COMPUTERS & DATA
i. Use of burglar proofs in windows and doors in rooms where computers and data are
kept
ii. Make sure the room in which computers and data equipments are stored is well locked
with modern doors and windows.
iii. Hire trusted personnel to physically keep data and computer equipments e.g. Database
administrators, security personnel or Network administrators.
iv. The data should be backed-up on different physical location, say on separate discs and
on flash disks.
v. Video monitoring of data and computer equipment location using Closed Circuit
Television (CCTv) and Live transmitting on IP camera networks.
vi. Protect computers from fire outbreaks, rain water and other natural calamities.
vii. Keep antivirus software updated to scan out the virus from computers.

11.1.3 INTERNET AND NETWORK ATTACKS


In computer and computer networks, an attack is any attempt to destroy, expose, alter, steal or
gain unauthorized access to computer systems.
Computer network attack: This refers to operations to disrupt, deny or destroy information in
computers and computer networks.
HACKING: It is the practice of modifying computer hardware and software to accomplish ones
interests. People who engage in computer hacking activities are often called hackers. Hackers may
be motivated by a number of reasons such as profit, protest or challenge.

EXAMPLES OF COMMON ATTACKS ON DATA STORED ON COMPUTERS


(1) Denial-of-Service Attacks (DoS): This prevents access to resources by users authorized to
use those resources.
Denial of services attacks can be evidenced in the following ways:
- Denial of service attacks are common on the Internet where they have hit large
companies such as Amazon, Microsoft etc.
- An attacker may try to bring down an E-commerce website to prevent or deny usage by
legitimate customers.
- These attackers can deny access to information, application or communications.

(2) Snooping: This is when someone looks through your files in the hopes of finding something
interesting whether it is electronic or paper. In the case of physical snooping, people might
inspect the computers’ recycle bins and even files.

(3) Back door Attacks: This refers to gaining access to a network or system and inserting a
program or utility that creates an entrance for an attacker. The program may allow a certain
user to log in without a password or gain administrative privileges.

pg. 79
UACE Subsidiary ICT

(4) Spoofing Attacks: This is an attempt by someone or something to impersonate (masquerade)


as someone else. This type of attack is usually considered as an access attack and the most
popular spoofing attacks today are IP spoofing and DNS spoofing.
o The goal of IP spoofing is to make the data look like it came from a trusted host
when it really didn’t.
o With DNS spoofing, the DNS server is given information about a name server that it
thinks is legitimate (rightful) when it isn’t. This is effected by sending users to a
website other than the one they wanted to go to.

11.1.4 COMPUTER VIRUS


What is a virus?
A virus is a small software programs that are designed to spread from one computer to another and
disrupt its operation.
A good way to describe viruses is to call them “malware” or software programs that have
malicious intent (aim). Malware is from malicious software.

Viruses or malware are commonly broken down into classic viruses, Trojans, worms, adware and
spyware.

An illustration below shows how a virus spreads from an infected computer using a network or a
removable storage medium.

An infected computer A newly infected computer

Virus

Virus
A storage
medium
Explanation:
When an infected storage medium such as memory card or hard disk is moved and used with any
computer, the virus code is executed (run) first. The computer code typically performs four
actions such as replication, event watching, delivery and camouflage there by infecting the new
computer.
When an attachment to an e-mail is accessed by the user, the virus infects the target computer
system. This virus may in turn attach itself to all e-mails the newly infected computer sends, which
later infects all other attachments of these e-mails.

WAYS THROUGH WHICH VIRUSES ARE SPREAD


i. Through infected discs like compact discs, flash discs etc.
ii. Through E-mail attachments that are sent by different people.

pg. 80
UACE Subsidiary ICT

iii. Through phishing schemes: A phishing scheme starts when you receive an e-mail from a
website claiming to be your bank or credit card company. You are always to click a link
and log in, but the truth is that you have just given away all of your personal information.
iv. Through infected software which come as free games and software applications.
v. Fake anti-virus software: This is one of the most frustrating ways to become infected with a
virus or worm.
vi. Through mobile devices like memory cards.
vii. Through friends and relatives. In most cases we are sent viruses through our e-mails from
people that we know and trust.

SYMPTOMS OF A VIRUS ATTACK


i. The computer starts to display unusual error messages such as a computer is at risk or it is
about to burst.
ii. The computer can restart on its own without the user restarting it.
iii. The computer stops responding or it locks up frequently.
iv. The computer runs slower than usual. This happens as the virus is spreading to other files
in the computer system.
v. Application programs like Microsoft Excel or MS Word on the computer do not work
properly.
vi. Disk drives and other system resources are inaccessible. This is because the virus has
changed the settings on a device to make it unusable.
vii. An antivirus software program cannot be installed on the computer, or the antivirus
program will not run.
viii. Antivirus software programs are disabled for no reason and may not be restarted.
ix. The computer may shut down unexpectedly or crashes frequently.
x. The computer starts to experience memory problems or runs out of disk space.
xi. There is always a double extension of an attachment that you recently opened such as
a .doc, .xls or .jpg extension.
xii. Unusual files or directories start to appear on the computer.

TYPES OF VIRUSES
It should be noted that computer viruses can be categorized into two namely:-
A) Non-memory resident viruses that are activated when an infected application runs.
B) Non-resident viruses which immediately search for other hosts that can be infected when
they are executed or run on the computer.

The resident virus which does not search for hosts load themselves into memory on
execution. They also stay active in the background and infect new hosts when those files
are accessed by other programs.

Thus, the types of viruses include the following:-

pg. 81
UACE Subsidiary ICT

1. Macro virus. This infects files that are created using certain application programs that
contain macros.
2. Polymorphic virus. This changes (encrypts) itself in a different way every time it infects a
computer. Such a virus also changes forms in order to avoid detection.
3. Resident virus. This is a permanent type of virus that stays in the computer’ RAM
memory. Such a virus can interrupt application programs that are opened, closed or copied.
4. Trojan horses. These are malicious (hateful) programs that enter a computer or a network
that pretend to be other programs. In other words, the Trojan horses may be installed as
part of an installment process or as attachment.
5. Direct Action Viruses. The main purpose of this virus is to duplicate (replicate) and take
action when it is executed (run) on the computer. When a specific condition is met, the
virus will go into action and infect files in the directory of folder.
6. Directory virus. This changes the paths that indicate the location of a file. By executing a
program (file with an extension .doc or .exe) which has been infected by the virus, while
the original file and program has been previously moved by the virus.
7. Boot virus (Stealth virus). It is a type of virus that affects the boot sector of a hard disk.
This virus camouflage (changes) itself to avoid detection by the antivirus software
program.
8. FAT virus. The File Allocation Table or FAT is a part of a disk used to connect
information and is a vital part of the normal functioning of the computer.
This type of virus prevents access to certain sections of the disks where important files are
stored.
9. File infectors. This type of virus infects programs or executable files, i.e. files with an .exe
or .htm extension. When one of these programs is run directly or indirectly, the virus is
activated, producing the damaging effects it is programmed to carry out.
10. Companion viruses. These can be considered as file infector viruses like resident or direct
action types. Such virus are known as companion viruses because once they get into the
computer, they accompany (join) other files that already exist in the computer.
11. Retro virus. This type of virus attacks the antivirus software installed on a computer. It
directly attacks antivirus software there by destroying the virus definition file.

11.2 HACKING
What is hacking?
Hacking refers to the process of accessing computer systems or computer networks illegally.
A hacker is a person who exploits weakness in a computer system or computer network. Hackers
may be motivated by a number of reasons such as protest, challenge or profit gains. Hacking is
also referred to as Trespassing.

Hacking can be done in the following ways:-


1) Through password cracking. It is a process of recovering passwords from data or
information that has been stored or transmitted by the computer. This is effected by trying
to guess the passwords put in a computer.

pg. 82
UACE Subsidiary ICT

2) Through vulnerability scanner. This is a tool used to quickly check the computer on a
network for known weakness. Hackers commonly use port scanners to check and see which
ports on a specified computer are open.
3) Root kit. Root kit is a computer program designed to take control of a computer system
without being authorized by computer owners. Root kits may include replacements for
system binaries so that it becomes impossible for authorized user to detect the presence of
the intruder on the computer.
4) Pocket Snoffer. This is an application computer program that captures data packets which
can be used to capture passwords and other data found on a network.
5) Denial of Service.

11.3 COMPUTER CRIME


Computer crimes are criminal activities which involve the use of information technology to gain
an illegal or unauthorized access to computer systems. Computer crimes often involve a computer
and a network.

11.4.1 DIFFERENT FORMS (TYPES) OF COMPUTER CRIMES


a. Phishing: Phishing is the act of attempting to acquire sensitive information like user
names, passwords and credit card details by disguising as trustworthy source. Phishing is
carried out through e-mails or by luring (attracting) the user to enter personal information
through fake websites.
b. Pharming: It is a scamming practice (kind of cheating) in which a malicious code is
installed on personal computers or servers misdirecting users to false/fake (fraudulent)
websites without their knowledge or consent.
c. Spamming: It refers to the use of electronic messaging system to send unsolicited bulk
messages especially advertising aimlessly.
d. Hacking: The activity of breaking into a computer system to gain unauthorized access is
known as hacking.
e. Cyber stalking: This is the use of communication technology mainly the Internet to torture
other individuals is known as cyber stalking. False accusations, transmission of threats and
damage to data and equipment fall under the class of cyber stalking.
f. Writing or spreading computer viruses or worms is a computer crime.
g. Making and digitally distributing child pornography
h. Fraud achieved by the manipulation of computer records.
i. Identity theft. This is one of the most serious frauds as it involves stealing money and
obtaining other benefits through the use of a false identity.

pg. 83
UACE Subsidiary ICT

SUB TOPIC 2:

EMERGING TECHNOLOGIES
These are new technologies that are currently developing or will be developed over the next 5 to
20 tears and which will substantially alter the business and social environment.
The concept of emerging technologies include:
- Artificial intelligence
- Digital forensics
- Atomtronics
- 4G Cellular communication
- Artificial brain
- Machine translation
- Machine vision etc

Digital forensics: These are also called computer forensics or cyber forensics. It is the process of
uncovering and interpreting electronic data for use in a court of law.
It involves application of computer investigations and analysis techniques to gather evidence
suitable for presentation in courts of law.
Atomtronics: It is the branch of science, engineering and technology that deals with the creation
of analogues and electronic circuits and devices by the use of atoms.
Atomtronic devices are still in the experimental stage, and for the future, the properties of
condensed atoms offer a wide range of possible applications.

Artificial Intelligence (AI) is the intelligence of machines and robots and the branch of computer
science that aims to create it. AI textbooks define the field as "the study and design of intelligent
agents" where an intelligent agent is a system that perceives its environment and takes actions that
maximize its chances of success. John McCarthy, who coined the term in 1955, defines it as "the
science and engineering of making intelligent machines."

Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses
radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the
purposes of automatic identification and tracking. Some tags require no battery and are powered
and read at short ranges via magnetic fields (electromagnetic induction). Others use a local power
source and emit radio waves (electromagnetic radiation at radio frequencies).

OPTICAL COMPUTING: Today's computers use the movement of electrons in-and-out of


transistors to do logic. Optical or Photonic computing is intended to use photons or light
particles, produced by lasers or diodes, in place of electrons. Compared to electrons, photons have
a higher bandwidth.

Most research projects focus on replacing current computer components with optical equivalents,
resulting in an optical digital computer system processing binary data.

SPEECH RECOGNITION: In computer science, speech recognition (SR) is the translation of


spoken words into text. It is also known as "automatic speech recognition", "ASR", "computer
speech recognition", "speech to text", or just "STT". Some SR systems use "training" where an
individual speaker reads sections of text into the SR system. These systems analyze the person's
specific voice and use it to fine tune the recognition of that person's speech, resulting in more
pg. 84
UACE Subsidiary ICT

accurate transcription. Systems that do not use training are called "Speaker Independent" systems.
Systems that use training are called "Speaker Dependent" systems.

VOICE RECOGNITION: The term voice recognition refers to finding the identity of "who" is
speaking, rather than what they are saying. Recognizing the speaker can simplify the task of
translating speech in systems that have been trained on specific person's voices or it can be used to
authenticate or verify the identity of a speaker as part of a security process.

VIRTUAL REALITY (VR): It is a term that applies to computer-simulated environments that


can simulate physical presence in places in the real world, as well as in imaginary worlds. Most
current virtual reality environments are primarily visual experiences, displayed either on a
computer screen or through special stereoscopic displays, but some simulations include additional
sensory information, such as sound through speakers or headphones.

US Navy personnel using a VR parachute trainer

MACHINE TRANSLATION: It is sometimes referred to by the abbreviation MT (not to be


confused with computer-aided translation, machine-aided human translation (MAHT) or
interactive translation) is a sub-field of computational linguistics that investigates the use of
software to translate text or speech from one natural language to another.

MACHINE VISION (MV): It is the technology and methods used to provide imaging-based
automatic inspection and analysis for such applications as automatic inspection, process control,
and robot guidance in industry. The scope of MV is broad. MV is related to, though distinct from,
computer vision.

Applications of machine vision:

The primary uses for machine vision are automatic inspection and industrial robot guidance.
Common MV applications include quality asurance, sorting, material handling, robot guidance,
and optical gauging.

pg. 85
UACE Subsidiary ICT

Early Automatix (now part of Microscan) machine vision system


Autovision II from 1983 being demonstrated at a trade show

MOBILE COLLABORATION is technology-based process of communicating using electronic


assets and accompanying software designed for use in remote locations. Newest generation hand-
held electronic devices feature video, audio, and telestration (on-screen drawing) capabilities
broadcast over secure networks, enabling multi-party conferencing in real time (although real time
communication is not a strict requirement of mobile collaboration and may not be applicable or
practical in many collaboration scenarios)

ARTIFICIAL BRAIN is a term commonly used in the media to describe research that aims to
develop software and hardware with cognitive abilities similar to those of the animal or human
brain. Research investigating "artificial brains" plays three important roles in science:

 An ongoing attempt by neuroscientists to understand how the human brain works, known
as cognitive neuroscience.
 A thought experiment in the philosophy of artificial intelligence, demonstrating that it is
possible, in theory, to create a machine that has all the capabilities of a human being.
 A serious long term project to create machines capable of general intelligent action or
Artificial General Intelligence. This idea has been popularised by Ray Kurzweil as strong
AI (taken to mean a machine as intelligent as a human being).

CELULLAR PHONES: In telecommunications, 4G is the fourth generation of mobile phone


mobile communications standards. It is a successor of the third generation (3G) standards. A 4G
system provides mobile ultra-broadband Internet access, for example to laptops with USB wireless
modems, to smartphones, and to other mobile devices. Conceivable applications include amended
mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing,
3D television and Cloud Computing.

Other emerging technologies include:-


 Internet will be as universal as radio and television today
 The Internet will continue to expand and change in several ways: i.e. faster connections,
more users, new multimedia and virtual reality services.
 More interactive services such as multimedia newspapers
 Impact of information technology to the society, morally, unemployment, vision laxity and
entertainment.
 Learning will become any time and where.

pg. 86
UACE Subsidiary ICT

SUB TOPIC 3:
CAREERS IN THE ICT INDUSTRY

INTRODUCTION
Information and Communication Technology (ICT) has created new job titles such computer
operators, computer technician, system analyst, computer programmers, software Engineer,
computer engineer, information systems manager, database administrator, computer trainer, web
administrator, network administrator among others. This section explains some responsibilities of
these professionals who are generally called Information Technology workers.

What is a career? The word career may mean a job or profession.


The following are career opportunities in ICT and can be discussed below:-
i. Computer operators:
 These are responsible for entering in data into the computer.
 A computer trainer also keeps up to date records of all information processing activities.

ii. Computer Technician:


 He troubleshoots both hardware and software related problems.
 Assembles and upgrades computers and their components.
 They help computer engineers in designing and creating computer hardware
components.

i. Systems Analyst:
 He has business knowledge & also designs business systems,
 Co-ordinates training for users of the new system.
 He also works with programmers to construct & test the system.

ii. Computer programmer: Big organizations like banks, manufacturing firms, government
agent, schools etc hire computer programmers to work together with system analysts in
order to:-
 Develop (write) in-house application programs.
 He customizes commercial application package to suit the organization needs.
 He also tests, debugs, install and maintains programs developed for the organization.

iii. Computer Engineer: A software engineer is one who is skilled in software development
and technical operation of computer hardware. Some of the responsibilities of the software
engineer are:-
 He designs & develops computer components such as storage devices.
 Determines the electrical power requirement of each computer component.
 Re-engineers computer components to enhance it functionality and efficiency.
 Designs and develops engineering and manufacturing computer controlled devices such
as robots.
iv. Database Administrators (DBS): The major purpose of computerizing an organization is
to sore data/information in an organised way for easy access, retrieval and update. An
organization requires a person who should be responsible for updating records in an
information system database. For this reason, a database administrator is responsible for:-
 He designs database application programs for organizations.
pg. 87
UACE Subsidiary ICT

 He sets up security measures needed to control access to data & information.


 He keeps the data up-to-date by adding new records, modifying or deleting unnecessary
records.
 He installs new computers to the network.

v. Information Systems manager:


 He/she makes sure that all tasks of the IT department are done correctly and on time
in order to support business planning and decision making process.
 He/she controls & plans system activities.
 Keeps the department inventory records up-to-date.
 Manages the human resource with in the department.

vi. Software Engineers: A software engineer is one who is skilled in software development
and technical operation of computer hardware. He does the following:-
 He develops system and application software.
 He maintains & upgrades new software.
 He develops user & technical documentations for the new software

vii. Network administrators: A network administrator is a specialist whose responsibilities


are:-
 Setting up a computer network and its resources.
 Maintains and enforces security measures on the network.
 Maintaining and troubleshooting network related problems.

viii. Web administrators/Webmaster: Business organizations, individuals and other


institutions put their information on the Internet by developing websites. Most
organizations hire the services of a web developer who is given the role of the company’s
web administrator also referred to as a Webmaster. He/she is responsible for the
following:-
 He develops & tests websites.
 Maintains, updates and modifies information on the Websites to meet new demands by
the users.
 Monitors the access & use of Internet connection by enforcing security measures.
 Downloads information needed by an organization from Internet Websites.

ix. Computer trainer: Due to dynamic (lively/ going ahead) nature of computers and
information technology, there is a high demand for qualified ICT trainers. Some of the
responsibilities of an ICT trainer are:-
 He trains people on how to use a computer & various applications programs.
 He develops training reference materials.
 He guides learners on how to acquire knowledge through carrying out research.
 He advises the learners on the best career opportunities in the broad field of ICT.
 He prepares learners for ICT examinations (Computers exams).

x. Self-employment: Self employment can be achieved by using a computer or other ICT


devices such as internet services, starting up bureau services, consultancy services and
software and hardware repair services.

pg. 88
UACE Subsidiary ICT

xi. Graphics designers: Graphics designers are required in order to design graphical objects
and professional publications.

pg. 89
UACE Subsidiary ICT

REVISION QUESTIONS
SAMPLE QUESTIONS - PAPER 1

1. (a) State the difference between data and information (1 mk)

(b) Computers can cause health problems. Identify two of these problems and for each
problem write down a method which would help you avoid it. Do not use the same method
for both answers. (4 mks)
Problem 1
……………………………………………………………………………………......................
Method 1
……………………………………………………………………………………......................
Problem 2
……………………………………………………………………………………......................
Method 2
……………………………………………………………………………………......................
2. Briefly describe one way how ICT can be applied in each of the following areas. (5mks)
(a) Education
(b) Health
(c) Business
(d) Security
(e) Politics and governance

3. A systems administrator has been asked to prepare a list of requirements for setting up a
school computer laboratory. In his list of requirements he included a UPS per computer, Air
Conditioner, wool carpet, internet gateway and burglar proofing among others. What is the
importance of each of the items requested? (5 mks)

i. UPS
ii. Air Conditioner
iii. wool carpet
iv. Internet gateway
v. burglar proofing

4. Given the file path C:\user\desktop\Abu\Letter.doc identify the following


(5 mks)
i. Filename
ii. File type
iii. Profile
iv. Folder
v. Location

5. Describe the steps you would take when saving a word processed document with file mane
“letter” in a new folder named Abu on the desktop. (5 mks)

pg. 90
UACE Subsidiary ICT

6. (a) Explain what is meant by the term „hardware device(s)‟. (1mk)


……………………………………………………………………………………......................
……………………………………………………………………………………......................
……………………………………………………………………………………......................
(b) Name the output devices A, B, C and D. (4 mks)

A B C D
i) A: ............................................................................................
ii) B: ............................................................................................
iii) C: ............................................................................................
iv) D: ............................................................................................

7. Complete each sentence below using one item from the list. (5 mks)
 A bar code reader
 A buzzer
 A dot matrix printer
 A graph plotter
 A graphics tablet
 An inkjet printer
 A pressure sensor
 OCR
 A tracker ball
 A webcam

a) ……………….……..is used to input a hand drawn image to the computer.


b) ……………………...is used to input data to a microprocessor controlled weighing scale.
c) …... …………………is an input device used by people with limited motor skills.
d) ……………………....is an output device used to produce large hard copies of car designs.
e) ………………………is an output device used in microwave ovens.
8. (a) What do you understand by the term “removable storage”? (1 mk)
.....................................................................................................................................................
....................................................................................................................................................

(b) A student wishes to store data on an optical storage medium. List two optical media and
give one advantage and one disadvantage of using optical media when compared with fixed
hard discs. (4 mks)
Optical medium 1

Optical medium 2

pg. 91
UACE Subsidiary ICT

Advantage

Disadvantage

9. A group of car mechanics has decided to buy a new printer for their workshop. The different
options which are available are a laser printer, inkjet printer and dot matrix printer. How
would you advise them to choose an appropriate printer for their work? (5 mks)

……………………………………………………………………………………......................
……………………………………………………………………………………......................

10. Tick TRUE or FALSE next to each of these statements. (5 mks)


TRUE FALSE

TRU FALSE
E
Measuring software is used to write letters
DTP software is used magazines
create
to
A working knowledge of HTML is helpful when creating web pages
Presentation software is used to write letters
A Graphical User Interface uses icons to represent applications

11. (a) Tick three features of spreadsheet software which make it suitable for creating and using
computer models. (3 mks)


What ifs
Queries
Automatic recalculation
Internet browsing
Animation
Data and formulae replication

(b) Name any two spreadsheet application software. (2 mks)


i. .........................................................................................................................................
ii. .........................................................................................................................................
12. Define the following terms in relation to computer communication. (5 mks)
a) Internet
………………………………………………………………………………………………
………………………………………………………………………………………………

pg. 92
UACE Subsidiary ICT

………………………………………………………………………………………………

b) Web browser
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
c) Search Engine
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
d) Online social network
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
e) Website
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………....

13. Describe each of the following types of websites; (5 mks)


a) Web portal
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b) Content aggregator
…………………………………………………………………………………………………
…………………………………………………………………………………………………
c) A wiki
…………………………………………………………………………………………………
…………………………………………………………………………………………………
d) A blog
…………………………………………………………………………………………………
…………………………………………………………………………………………………
e) Media sharing website
…………………………………………………………………………………………………
…………………………………………………………………………………………………
14. A large company has a LAN. The manager of the company wants to replace it with a WLAN.
Explain three differences between a LAN and a WLAN, giving an advantage and a
disadvantage of a WLAN. (5 mks)
Differences:
(i) ……………………………………………………………………………………..........
............………………………………………………………………………………….
…………………..............................................................................................................
(ii) ……………………………………………………………………………………..........
......................……………………………………………………………………………
……….............................................................................................................................
(iii) ……………………………………………………………………………………..........
......................……………………………………………………………………………
…………………………………………………………………………………………

pg. 93
UACE Subsidiary ICT

Advantage:
……………………………………………………………………………………......................
……………………………………………………………………………………......................
Disadvantage:
..........……………………………………………………………………………………............
……………………………………………………………………………………......................

15. Describe five advantages of using mobile phones to speak with other people rather than
sending emails using a laptop. (5 mks)
(i) ……………………………………………………………………………………..........
............………………………………………………………………………………….
…………………..............................................................................................................
(ii) ……………………………………………………………………………………..........
......................……………………………………………………………………………
……….............................................................................................................................
(iii) ……………………………………………………………………………………..........
......................……………………………………………………………………………
(iv) ……………………………………………………………………………………..........
......................……………………………………………………………………………
……….............................................................................................................................
(v) ……………………………………………………………………………………..........
......................……………………………………………………………………………

16.

Car make and model Number of cars sold Air conditioning (Y/N)
Ford Mondeo 45 Y
Opel Corsa 52 N
BMW Series X 35 N
Nissan Micra 39 N

A car showroom uses a database to store information about the cars it has sold. Part of this
database is shown above.
a) (i) Which field stores Boolean data? (1 mk)
………………………………………………………………………………………………
(ii) Give one reason why Boolean data type is used. (1 mk)
……………………………………………………………………………………................
b) (i) Which field stores numeric data? (1 mk)
………………………………………………………………………………………………
(ii) Give one reason why numeric data type is used. (1 mk)
……………………………………………………………………………………................
c) Identify one other data type used in the database above. (1 mk)

pg. 94
UACE Subsidiary ICT

……………………………………………………………………………………................

17. Multi-national companies often use video conferencing rather than face to face meetings.
a) Give three advantages of video conferencing. (3 mks)
Advantage 1:
……………………………………………………………………………………................
Advantage 2:
……………………………………………………………………………………................
................……………………………………………………………………………………
Advantage 3:
……………………………………………………………………………………................
................……………………………………………………………………………………

b) Give two disadvantages of video conferencing. (2 mks)


Disadvantage 1:
……………………………………………………………………………………................
Disadvantage 2:
……………………………………………………………………………………................
................……………………………………………………………………………………

18. Mobile telephones are used for accessing the internet.


(a) Give two advantages and two disadvantages of using a mobile telephone rather than
using a PC to access the internet. (4 mks)
Advantage 1
……………………………………………………………………………………......................
Advantage 2
……………………………………………………………………………………......................
Disadvantage 1
……………………………………………………………………………………......................
Disadvantage 2
……………………………………………………………………………………................
..............................................................................................................................................
(b) Other than communication, give one other use of mobile telephones. (1 mk)
……………………………………………………………………………………................
..............................................................................................................................................
19. Michael suspects his laptop to be carrying a computer virus because it has reduced its
functionality speed. He however chooses to continue using it without servicing because it
still functions anyway.
(a) Give any two possible risks that Michael is exposed to. (2 mks)
i. ……………………………………………………………………………………..........
.........................................................................................................................................
ii. .........................................................................................................................................
.........................................................................................................................................
(b) As an A „level subsidiary ICT student, explain any three safe computer practices to
guard against computer viruses. (3 mks)
i. .........................................................................................................................................
ii. .........................................................................................................................................

pg. 95
UACE Subsidiary ICT

iii. .........................................................................................................................................
20. In online banking data can be misused by hackers. Name two types of security measure
which can be used to help to prevent this. For each security measure, give an advantage and a
disadvantage. (3 mks)

Measure 1
.....................................................................................................................................................
Advantage...................................................................................................................................
Disadvantage...............................................................................................................................
.....................................................................................................................................................
Other than hacking, describe any two online security treats that connected devices are
exposed to. (2 mks)
(i) .........................................................................................................................................
..............................................................................................................................................
Candidate’s Name: Random No. Personal No
…………………………………………..
Signature:
…………………………………………………….

(Do not write your school/center Name or Number anywhere on this booklet)

S850/2
SUB. ICT
Paper 1
Nov. /Dec. 2013
21/2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
PAPER 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES
Answer all questions in this paper
The paper is made up of twenty equally weighted questions.
All answers should be written in blue or black ink in the space provided on the Question paper.

For Examiners’ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Total

pg. 96
UACE Subsidiary ICT

SAMPLE QUESTION PAPER


Answer all questions in this paper

1. Modern computers transform data into information.


(a) List the four stages involved in transforming data into information. (4 marks)
i. ………………………………………………………………………………………………………………………………..
ii. ………………………………………………………………………………………………………………………………..
iii. ………………………………………………………………………………………………………………………………..
iv. ………………………………………………………………………………………………………………………………..

(b) Identify one device that can facilitate any one of the stages listed above. (1 mark)
………………………………………………………………………………………………
2. State any five characteristics of a computer. (5 marks)
a) ………………………………………………………………………………………………………………………………..
b) ………………………………………………………………………………………………………………………………..
c) ………………………………………………………………………………………………………………………………..
d) ………………………………………………………………………………………………………………………………
e) ………………………………………………………………………………………………………………………………

3. (a) What is computer literacy? (2 marks)


……………………………………………………………………………………………….
……………………………………………………………………………………………….
(b) Servicing computer is an activity which should be done regularly. Give three
reasons why computers should be regularly serviced. (3 marks)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
4. (a) What is a folder in computer file management? (2 marks)
………………………………………………………………………………………………
………………………………………………………………………………………………
(b) Identify the file extensions for the following files.
i. A word processor document …………………………………………………………………… (1 mark)
ii. A spreadsheet file …………………………………………………………………………………… (1 mark)
iii. A presentation file ………………………………………………………………………………….. (1 mark)

5. The following are functions of the Operating Systems. Indicate True or False. (5 marks)

(a) To process a word document


(b) To manage storage of documents
(c) To monitor system performance
(d) To administer security
(e) To enter data

6. (a) With the help of an example, define a soft copy. (2 marks)


………………………………………………………………………………………………
pg. 97
UACE Subsidiary ICT

………………………………………………………………………………………………
(b) Judith wants to transfer a file from one computer to another. Suggest any three
devices she could use. (3 marks)
i. ………………………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………………………………

7. Use the following terms to complete the statements (a) – (e). (5 marks)
A Universal Serial Bus An Arithmetic Logic Unit
A control Unit A serial port
A cache memory
a) ………………………………………….. is a high speed memory built into the Central
Processing Unit that temporarily stores data during processing.
b) …………………………………………… is part of the Central Processing Unit that
coordinates its operations.
c) …………………………………………… is a fast memory chip located on or near the Central
Processing Unit to help speed up processing.
d) …………………………………………… is used to connect up to 127 peripheral devices to a
computer without additional expansion.
e) …………………………………………… is the part of the Central Processing Unit that
performs logical operations.

8. List five elements that can be displayed on the desktop of a normal working computer.
(5 marks)
a) ………………………………………………………………………………………………………………………………
b) ………………………………………………………………………………………………………………………………
c) ………………………………………………………………………………………………………………………………
d) ………………………………………………………………………………………………………………………………
e) ………………………………………………………………………………………………………………………………

9. (a) Distinguish between a Local Area Network and a Wide Area Network. (2 marks)
………………………………………………………………………………………………
………………………………………………………………………………………………
(b) Give three advantages of computer networks. (3 marks)
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………………………………

10. What suitable application programs would you use to perform the following tasks?
a) To prepare an invitation letter ……………………………………………………… (1 mark)
b) To prepare a budget. ……………………………………………………………………. (1 mark)
c) To produce business cards ……………………………………………………………. (1 mark)
d) To prepare an employee data bank ……………………………………………… (1 mark)

11. (a) What is social networking website? (2 marks)


………………………………………………………………………………………………
(b) List two examples of social networking websites. (1 mark)

pg. 98
UACE Subsidiary ICT

i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………

(c ) State one disadvantage of social networking website. (1 mark)


………………………………………………………………………………………………
12. Outline any five services that are offered by the Internet Service Providers. (5 marks)
a) ………………………………………………………………………………………………………………………………
b) ………………………………………………………………………………………………………………………………
c) ………………………………………………………………………………………………………………………………
d) ………………………………………………………………………………………………………………………………
e) ………………………………………………………………………………………………………………………………

13. (a) State two advantages of using E-mail software over ordinary postal letters. (2 marks)
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………

(b) What are the uses of the following features of E-mail software? (2 marks)
i. To: …………………………………………………………………………………………………………………………
ii. BCC: ………………………………………………………………………………………………………………………

14. Indicate True or False for the following statements. (5 marks)


a) Visual display units can be either input or storage devices …………………………………………………
b) Output devices provide feedback to the users ……………………………………………………………………
c) Dot-matrix printers produce better images than inkjet printers …………………………………………
d) Secondary storage media is volatile ……………………………………………………………………………………
e) The more pixels per square inch on a computer monitor the higher the resolution
……………………………………………………………………………………………………………………………………………

15. (a) Define the term Bluetooth? (2 marks)


………………………………………………………………………………………………...
………………………………………………….......................................................................
(b) Name any three networking protocols. (3 marks)
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………………………………

16. Identify one purpose of each of the following utilities. (5 marks)


a) File viewer:
………………………………………………………………………………………………………………………………
b) Disc defragmenter:
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………

c) Diagnostic:
………………………………………………………………………………………………...
d) Anti-virus:
………………………………………………………………………………………………

pg. 99
UACE Subsidiary ICT

e) File compression:
………………………………………………………………………………………………………………………………

17. (a) State any three computer security risks in the computer laboratory. (3 marks)
i. …………………………………………………………………………………………………………………………………
ii. …………………………………………………………………………………………………………………………………
iii. …………………………………………………………………………………………………………………………………
(b) Outline any two ways to enforce computer laboratory security. (2 marks)
i. …………………………………………………………………………………………………………………………………
ii. …………………………………………………………………………………………………………………………………

18. Give one role of each of the following ICT specialists.


a) Database administrator: (1 mark)
………………………………………………………………………………………………
b) Programmer: (1 mark)
………………………………………………………………………………………………
c) Computer technician: (1 mark)
………………………………………………………………………………………………...
d) Systems administrator: (1 mark)
………………………………………………………………………………………………
e) Computer instructor: (1 mark)
………………………………………………………………………………………..

19. The table below displays information about some KB employee’s data. Study it and answer
the questions below:

ID NO. EMPLOYEE DOB TELEPHONE


NAME NO.
(a) U01 ARINDA RUTH 03/04/1990 0773-129000 Which
O02 NAMBA SSALI 21/11/1991 0752-254800
suitable application package might have been used to capture the information?
(1 mark)

………………………………………………………………………………………………

(b) Name the data types for the following entries. (2 marks)
(i) ID No. ………………………………………………………………………………………………………………..
(ii) DOB: …………………………………………………………………………………………………………………

(c) What is the appropriate primary key? (1 mark)


……………………………………………………………………………………………………………………………………

pg. 100
UACE Subsidiary ICT

(d) How many records are shown in the table? (1 mark)


………………………………………………………………………………………………………………………………………

20. (a) Define electronic publishing. (2 marks)


………………………………………………………………………………………………
………………………………………………………………………………………………

(b) Name any three electronic publications. (3 marks)


i. ……………………………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………………………
iii. ……………………………………………………………………………………………………………………………………………

*END*

pg. 101

You might also like