Notes 2017
Notes 2017
A computer;
A computer is an electronic device, operating under the control of instructions stored in its own memory,
that can be programmed to accept data (input), process it into useful information (output), and store it in
a secondary storage device (store) for safekeeping or future use.
Or
It is an electronic device that converts raw data into meaningful information.
CHARACTERISTICS OF MODERN COMPUTERS
1. Speed
Computers are quite fast in their operation in that their speed is measured in Millions of
Instructions Per Second (MIPS) or Megahertz (MHz)
Inside the computer's system unit, the processing occurs through electronic circuits.
Data and program instructions travel through these circuits at speeds close to the speed of light.
Many computers process billions or trillions of operations in a single second.
NB: Processing involves computing (adding, subtracting, multiplying, dividing), sorting,
organizing, formatting, checking spelling and grammar, charting, displaying pictures,
recording audio clips, playing music, and showing a movie.
2. Accuracy
Computers are known to be accurate. They can process large amounts of data and generate error-
free results, provided the data entered is correct.
They hardly make any mistake. They are capable of detecting and correcting any mistakes made.
It follows therefore, that if wrong data is fed into the computer, the resulting output will be
incorrect..
Hence the saying; Garbage In Garbage Out (GIGO)
3. Storage
For a computer to be able to work, it must have a work space where data is stored before being
processed or where information is stored before being output to particular devices.
This storage space is known as Memory.
4. Automation
Computers work automatically.
They do not need any supervision in order to perform programmed routines.
This is because of the instructions (programs) installed in them.
5. Diligence (Consistency)
Computers have the ability to perform the same task over and over for a long time without getting
bored and with nor mistakes (errors).
6. Artificial intelligence
Computers are artificially intelligent.
They can respond to requests given to them and provide solutions. This is because of the programs
installed in them.
Evidence is seen in industrial Robots.
7. Versatility / Flexibility
Computers are capable of performing different kinds of tasks provided the specified task is
followed in a proper order.
LIMITATIONS OF COMPUTERS
* Unlike human beings, Computers cannot think.
* If wrong data is entered, wrong results will be output.
* Computers do not learn from experience.
* Computers do not provide alternative ways of doing jobs in case one fails.
* In case the program used to execute correct data has errors, the results are likely also to contain
errors.
ADVANTAGES OF COMPUTERS
i) Computers can be used to share data and information with other computers unlike the
manual systems.
ii) Computers are very fast. Therefore, tasks can be completed faster.
iii) They can process large amounts of data.
iv) Computers can store enormous (large) amounts of data for future reference/use.
v) Computers generate only error free results provided that the data entered is correct.
vi) Computers are efficient which increases their productivity.
vii) The running costs of computers become lower in the long run.
viii) Data in computers is more secure due to less human intervention.
ix) Since computers are automatic, very many tasks can be completed with little human
intervention (automatic)
DISADVANTAGES OF COMPUTERS
i) Unemployment
Computers have brought about unemployment in the society.
Although computers have improved productivity in many ways and created an entire industry with
hundreds of thousands of new jobs, the skills of millions of workers and managers have been
replaced by computers.
Most people who are illiterate about the new technologies have lost their jobs.
ii) High maintenance costs
Hardware and software costs are too high and not affordable to some individuals.
This has left some people poor.
iii) Moral degeneration
Youth and children are being exposed to ill – material via the internet.
They spend much of their time watching pornographic films which have led to increase in lesbians,
cults, hackers, etc.
iv) Computer crime and fraud
Computers are being used to forge documents like certificates, receipts, invoices, tax tickets, report
cards, stamps, company seals, etc.
v) Health risks
Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists, elbows,
eyes, necks, and back.
Computer users can protect themselves from these health risks through proper workplace design,
good posture while at the computer, use of anti – glare screens and taking appropriately spaced
work breaks.
vi) Training of staff
For one to use a computer has to be having some prior knowledge about it. Therefore, introduction
of computers in an organization requires training or retraining of the staff which may be costly and
time consuming,
vii) Computer virus
- Many computer systems get infected by the viruses
- These are normally produced and sent over the internet, through use of contaminated disks etc.
- These viruses in turn infect the computers and lead to loss of useful information and data in
storage.
viii) Reduced human interaction;
Face – to – face interactions among staff members may be reduced because they have to spend
much of their time interfacing with computers.
ix) Violation of Privacy:
Nearly every life event is stored in a computer somewhere, for example in medical records, credit
reports, tax records, etc.
In many instances, where these records are not properly protected, individuals have found their
privacy violated and identities stolen.
x) Public Safety:
Adults, teens, and children around the world are using computers to share publicly their photos,
videos, journals, music, and other personal information.
Some of these unsuspecting, innocent computer users have fallen victim to crimes committed by
dangerous strangers.
Protect yourself and your dependents from these criminals by being cautious.
For example, do not share information that would allow others to identify or locate you.
xi) Impact on Environment:
Computer manufacturing processes and computer waste are depleting natural resources and
polluting the environment.
The amount of resources required to manufacture a personal computer equals that of a midsized
car.
When computers are discarded in landfills, they release toxic materials and potentially dangerous
levels of lead, mercury, and flame retardants which can degrade the environment.
This can be minimized by recycling, regulating manufacturing processes, extending the life of
computers, and immediately donating replaced computers.
xii) Forgery
People use high quality printers to try forge sensitive documents such as money notes, passports,
driving permits, national Identity cards, etc.
a) Repetitive Strain Injury • Typing on a computer for • Take breaks to rest your
(RSI) too long. hands.
RSI causes painful swelling of • Using a mouse for long • Use an ergonomic
the wrist and fingers. periods. keyboard/mouse.
• Holding the mouse • Arrange your workspace
Sufferers with really bad RSI are incorrectly. so you are not cramped.
unable to use their hands at all. • Working in a cramped • Use a wrist rest.
RSI is caused by doing the same workspace.
small movements over and over
again across a long period of time.
For example, clicking a mouse
button repeatedly.
NOTE!
The key to reducing wrist, finger, neck and back pains is ergonomics.
Ergonomics focuses on creating comfortable environments for people. Adjustable chairs, Wrist
restsetc are examples of ergonomics.
Safety Issues
There are a number of safety issues that can arise from using ICT devices.
Some of these safety issues include:
• Electrocution
• Tripping over wires
• Heavy equipment falling on you
• Fire risks
Software safety
The most important (vital) part of a computer system is the data.
However, data in storage is exposed to a number of risks which include;
Accidental loss
Accidental damage or corruption
Theft by hackers / crackers
Deliberate damage or corruption especially by viruses
Un authorized disclosure
CATEGORIES OF COMPUTERS
Computers are categorized according to how the processed data is represented.
There are three categories i.e.
(a) Digital Computers
(b) Analog Computers
(c) Hybrid Computers
123456789
(b) Analog Computers
- These are computers that process data that is presented in a continuous form or measurable
quantities/units.
- These units can be pressure, electrical voltage, speed, current, etc.
- These computers are less accurate.
Examples of analog computers;
Thermometers, Voltmeters, Tide predictors, Speedometers etc
(c) Hybrid Computers
- These are computers that have the combined features of both the digital and analog
computers.
- They are used in specific applications e.g. industrial control processes such as Robots.
CLASSIFICATION OF COMPUTERS
Computers are further subdivided into three major classes according to their;
(i) Purpose/Function
(ii) Size
(iii) Processor power
th
- The first computing device was known as the ABACUS in the 16 Century
- It was used to compute volume in China and Japan for thousands of years Before Christ.
- It was made of beads strung on threads in a wooden rack.
ii. Napier’s Bones
- This was a table of logarithms made from ivory sticks used for multiplication.
- It was developed by John Napier in 1617
MECHANICAL ERA (1623 – 1945)
The machines invented in this era had moving parts, mechanical gears and greatly used punched
cards and tapes for storage.
Examples of machines in this era;
i. Pascal’s arithmetic machine
- It was invented by Blaise Pascal in 1642
- It was the first mechanical adding machine which used a system of gears and wheels.
ii. Leibniz calculator
- It was invented by Gottfried Wilhelm Leibniz in 1671
- He improved Pascal’s Arithmetic machine so that it could perform addition, subtraction,
multiplication and division.
iii. Slide rule
-
iv. Jacquard Weaving Loom
- It was developed by Joseph Jacquard in 1801
- It was a textile weaving equipment whose instructions were stored on punched paper cards.
- These instructions could automatically control this machine.
v. Babbage’s Analytical Engine and Difference Engine
- These two machines were partially developed by Charles Babbage.
- Charles Babbage was the first to propose the concept of the modern computer hence called the
Father of Computing.
- In 1823, with the help of a grant from the British Government, he partially built a steam driven
mechanical calculator called the Difference Engine to compute logarithms tables.
- He then thought of an Analytical engine which was a mechanical steam driven mechanical
machine.
- This had many characteristics of a modern computer.
- He then died in 1871 before completing any of his machines.
COMPUTER HARDWARE
DEFINITION;
Hardware refers to the physical and tangible components of a computer.
These are devices you can see, touch and feel.
Hardware can be
• Input hardware • Processing hardware
• Output hardware • Communicating hardware.
• Storage hardware
1. PROCESSING HARDWARE
CENTRAL PROCESSING UNIT (CPU)
- It is an electronic device that interprets and carries out the basic instructions that tell the
computer how to work.
- It is the main part (“Brain”) of the computer.
- It is normally called a microprocessor on a personal
computer
Parts of a CPU
(a) Control Unit
- The control unit is the component of the processor that directs and coordinates most of
the operations in the computer.
- It interprets each instruction issued by program and then initiates the appropriate action
to carry out the instruction.
- It directs data from storage to memory.
- It sends data required for mathematical operations from the memory to the ALU.
- It sends the data processed to the printer or a storage device.
- It erases/deletes/rubs data from memory when instructed to do so.
For every instruction, the control unit repeats a set of four basic steps:
• Step 1: Fetching the instruction. The
instruction to be executed is obtained from
memory by the control unit.
• Step 2: Decoding the instruction. The
instruction is translated into commands the
computer understand. Relevant data is moved
from memory to the register, and the location of
the next instruction is identified.
• Step 3: Executing the instruction. The commands are carried out. This could involve making
either an arithmetic computation or a logical comparison in the ALU.
• Step 4: Storing results. The results are stored in registers or memory.
• Data
Is collection of raw unorganized facts that can include words, numbers, images, sounds, and videos.
Data is the raw material to be processed by a computer, such as grades in a class, bar codes, light
and dark areas in a photograph, or speech that enter the computer through a microphone.
• Information
Is processed data that is organized, meaningful and useful.
• A program
Is a series of instructions that directs a computer how to perform the tasks necessary to process data
into information.
Programmers write a program and then store the program in a file that a user can execute (run).
When a user runs a program, the computer loads the program from a storage medium into memory.
• A command
Is an instruction given to a computer program to perform a specific action.
Commands can be issued by typing keywords, pressing special keys on the keyboard, selecting
menu choices, clicking the mouse on a graphical user interface, speaking into a microphone, or
touching an area on a screen.
• A user response
Is an instruction users issue to the computer by replying to a question posed by a computer
program.
A response to the question instructs the program to perform certain actions.
NB; The alternative to the QWERTY keyboard is the Dvorak keyboard developed by Dr. Dvorak in
1936. With the Dvorak, the most used letters are positioned in the middle row of the keyboard,
intending to reduce typing time and finger movements.
Types of keyboards
- 82 key keyboard
- 102 keyboard
- 102/3 enhanced keyboard (the most commonly used type today)
- 105 (developed from 102/3 enhanced keyboard)
Parts of a Computer Keyboard
i. Functional keys
These are keys found across the top row of the keyboard.
Each key is composed of letter F and a number ranging from 1 to 12.
Each functional key performs a specific operation based upon the software being used.
A pointer often takes the shape of a block arrow ( ), an I-beam (I), or a pointing hand ( ).
Using a pointing device, you can position the pointer to move or select items on the computer
Mouse
This is a hand operated device used to position the cursor, point, select and move objects on
the computer screen.
Secondary/Right
mouse button
Primary/Left mouse button
Connecting cable
The top and sides of a mouse have one to four buttons; some also have a small wheel. The
bottom of a mouse is flat and contains a mechanism, such as a ball or a light, that detects
movement of the mouse.
Types of mice
Mechanical mouse
Trackball
A trackball is like an upside-down mouse.
It is a stationary pointing device with a ball mechanism on its top.
You roll the ball directly with your hand.
It usually has one or more buttons around the trackball that
work just like mouse buttons.
A trackball requires frequent cleaning because it picks up oils
from fingers and dust from the environment.
Touchpad
A touchpad is a small, flat, rectangular pointing device that
is sensitive to pressure and motion.
To move the pointer using a touchpad, you slide your
fingertip across the surface of the pad.
Some touchpad have one or more buttons around the edge of the pad that work like mouse
buttons.
They are found most often on notebook and laptop computers.
iii. Pointing Stick
A pointing stick is a pressure-sensitive pointing device shaped like a
pencil eraser.
Because of its small size, the pointing stick is conveniently positioned
between the GBH keys on the keyboard.
To move the pointer using a pointing stick, you push the pointing stick
with your finger.
The pointer on the screen moves in the direction that you push the pointing stick.
By pressing buttons below the keyboard, users can click and perform other mouse-type
operations with a pointing stick.
A light pen
Is handheld input device that can detect the presence of light.
To select objects on the screen, a user presses the light pen against the surface of the screen or
points the light at the screen and then presses a button on the pen.
Advantages of Light pen
- It is direct and precise than using a mouse.
- It is convenient for applications with limited desktop space.
Disadvantages of a light pen
• It normally requires a specially designed monitor to work with.
A light gun
This is used to shoot targets and moving objects after you pull the trigger on the
weapon.
Instead of emitting light, most light guns work by detecting light. When the user
pulls the trigger, the screen sends light, which is received by a receptor in the
barrel of the gun.
A dance pad
This is a flat electronic device divided into panels that users press with their feet in response
to instructions from a music video game.
These games test the user’s ability to step on the correct panel at the correct time, following a
pattern that is synchronized with the rhythm or beat of a song.
Sheet-fed,
This has motorized rollers that can feed the source document
across the scanning head during the scanning process
Drum, and
Items to be scanned are rotated around a stationary scanning mechanism.
It is very large and expensive and commonly used in publishing industry.
Handheld
This can be manually passed over the image to be scanned.
Many scanners include OCR (optical character recognition) software, which can read and
convert text documents into electronic files.
NB: The quality of a scanner is determined by its resolution and color depth.
Disadvantages of Scanners
- It is best for only two - dimensional objects
- Scanned images usually take up a lot of storage space.
Optical Readers
An optical reader is a device that uses a light source to read characters, and codes and then
converts them into digital data that a computer can process.
Two technologies used by optical readers are optical character recognition and optical mark
recognition.
Optical character recognition (OCR) readers
These are input devices used to read typewritten, computer-
printed, or handwritten characters from ordinary documents
and translate the images into a form that the computer can
understand.
Most OCR devices include a small optical scanner for reading
characters and sophisticated software (OCR software) for
analyzing what is read.
During the scan of a document, an OCR device determines the shapes of characters by
detecting patterns of light and dark.
OCR software then compares these shapes with predefined shapes stored in memory and
converts the shapes into characters that computer can understand.
Application of OCRs
They are used to read characters on turnaround documents (documents that you return to the
company that creates and sends it e.g. electricity bills, you tear off a portion of the bill and
send it back to the electricity company with your payment).
Advantages of OCR readers
- Written data and printed data can be read at the same time.
- Hard copies of documents can be read directly into a computer without retyping.
- The characters converted can later be edited by word processing software.
Disadvantages of OCR readers
• Often don’t work well with hand written characters or those in unusual fonts.
codes by using light patterns that pass through the bar code
lines.
A Smart terminal
In addition to a monitor and keyboard, a smart terminal also has a
processor that has the capability of performing some functions
independent of the host computer.
Special-purpose terminals
Theseperform specific tasks and contain features uniquely
designed for use in a particular industry.
Two common special-purpose terminals are;
- Electronic Point-Of-Sale (EPOS) and
- Automated Teller Machines (ATM).
POS terminals are used by clerks and salespeople in retail stores, restaurants, and other establishments
that sell goods and services.
When the checkout clerk scans the bar code on the item, the computer uses the manufacturer and item
number to look up the price of the item and the complete product name in a database.
Some EPOS terminals are Web-enabled, which allows updates to inventory at geographically separate
locations.
An ATM is a self-service banking machine that connects to a host computer through a network.
You insert a plastic bankcard with a magnetic strip into the ATM and enter your personal
identification number (PIN), to access your bank account.
Some ATMs have a touch screen; others have special buttons or keypads for entering input.
NB:
A smart card;
Output devices
These are devices used to bring out information from the computer and present it in a suitable
form to the user.
Output from a computer can either be is a softcopy form or hardcopy form.
Softcopy
Advantages of a hardcopy
It cannot easily be changed without trace.
It can be read off-line without a computer.
It doesn’t require computer devices in order to read the output hence becoming cheap.
Hardcopies last longer if stored in a safe place compared to a softcopy which must all
the time be changed with the technological developments taking place.
Hardcopies cannot be attacked by viruses as the case with the softcopy.
Examples of output devices;
Display devices Multifunction peripherals
Printers Data projectors
Speakers Interactive whiteboards
Headsets Terminals
Earphones 3D – Spectacles
Fax machines
Display Devices
A display device is an output device that visually conveys text, graphics, and video
information.
Information shown on a display device often is called soft copy, because the information exists
electronically and is displayed for a temporary period of time.
Display devices consist of a screen and the components that produce the information on the
screen.
Most display devices show text, graphics, and video information in color.
Desktop computers typically use a monitor as their display device.
Kinds of Monitors
a. Monochrome Monitors
These display only one color on a different color background (e.g. white on a dark
background).
Advantages of Monochrome Monitors
- They are relatively cheap.
- They are suitable for word processing and other applications where color is not much
applicable.
b. Color Monitors
They are most often called Graphics Monitors
They display text and graphics in color.
Examples of color monitors
- CGA (Color Graphics Adapter)
- EGA (Enhanced Graphics Adapter)
- VGA (Video Graphics Array)
- SVGA (Super Video Graphics Array)
Advantages of using colors
- They make the screen displays more attractive.
- Colors can be used to highlight error messages and menu options.
Disadvantages of using colors
* Screens with a lot of colors take too long time to process.
* More memory is required to display a lot of colors.
Flat-Panel Displays
A flat-panel display is a lightweight display device with a shallow depth and flat screen that typically
uses LCD (liquid crystaldisplay) or gas plasma technology.
Types of flat -panel displays;
LCD monitors,
LCD screens,
Plasma monitors.
An LCD monitor
It is a desktop monitor that uses a liquid crystal display (LCD) to
create images on the screen.
These monitors produce sharp, flicker-free images.
They are available in a variety of sizes, with the more common being
17, 19, 20, 22, 24, 27, 45 or 65 inches.
Many are widescreen, which are much wider than they are tall.
The size of a monitor is measured diagonally from one corner to the
other.
LCDs typically contain fluorescent tubes that emit light waves towards
the liquid-crystal cells, which are sandwiched between two sheets of
material.
When an electrical charge passes through the cells, the cells twist. This twisting causes
some light waves to be blocked and allows others to pass through, creating images on the
display.
Color display in LCD displays
LCD displays produce color using either passive matrix or active matrix technology.
Active-matrix display;
An active-matrix display, also known as a thin-film transistor (TFT) display, uses a separate
transistor for each color pixel and thus can display high-quality color that is viewable from all angles.
A newer type of TFT technology, called organic LED (OLED), uses organic
molecules that produce an even brighter, easier-to-read display than standard TFT
displays.
OLED are less expensive to produce, consume less power, and can be
fabricated on flexible surfaces.
Passive-matrix display
A passive-matrix display, also called a dual-scan display, uses fewer transistors and requires less
power than an active-matrix display.
The color on a passive-matrix display often is not as bright as an active matrix display.
You can view images on a passive-matrix display best when working directly in front of the display.
Advantages of LCD Monitors
Requires little power.
Take up less desk space that CRT.
Very little radiation is emitted.
Disadvantages of LCD Monitors
• More expensive than CRT monitors
• Can only be viewed from a very narrow angle.
A plasma monitor
This is a display device that uses gas plasma technology, which sandwiches a layer of gas between
two glass plates.
When a voltage is applied, the gas releases ultraviolet (UV) light.
This UV light causes the pixels on the screen to glow and form an image.
Advantages of plasma monitors
Plasma monitor offer screen sizes up to 60 inches wide
Have a richer color display than LCD monitors
Disadvantages of plasma monitors
They are more expensive.
Printer
A printer is an output device that produces text and graphics on a physical medium such as paper or
transparency film.
Printed information is called hard copy.
It exists physically and in a more permanent form.
Connecting a printer to the system unit
Printers are either connected to a computer via a USB or parallel port.
Today, some printers are connected to notebook computer, Tablet PC, PDA, digital camera, or smart
phone via wireless technology (i.e. Bluetooth and infrared).
Categories of printers;
- Impact printers
- Non impact printers
Impact Printers
a) Impact printers
These are printers that produce a hard copy output by the print heads physically touching the print
media.
Print media include paper, transparencies, cloths, some plastics, etc.
Impact printers form characters and graphics on a piece of paper by striking a mechanism against
an ink ribbon that physically makes contact with the paper.
Examples of impact printers;
- Character printers
- Line printers (High speed printers)
- Dot matrix printers
i. Character printers
- These are low speed printers that mimic the action of typewriters by printing one character at a time.
- The characters are directly engraved on the print heads.
- This implies that the font type cannot be easily modified
- Their speed is measured in characters per second (CPS)
Examples include;
Daisy wheel printers and thimble printer
ii. Line printers
- A line printer is a high-speed impact printer that prints an entire line at atime. This makes them to be
speedy
- They print from one end of a paper to the other end, hence the name line printers.
- Their speed is measured in lines per minute (LPM)
Types of line printers
Band matrix printers
Shuttle-matrix printers
iii. Dot Matrix Printers
- A dot-matrix printer produces printed images when tiny wire pins on a print head mechanism
strike an inked ribbon.
- These form characters by print heads forming a pattern of dots on paper to make out a character.
- When the ribbon presses against the paper, it creates dots that form characters and graphics. Most
dot-matrix printers use continuous-form paper, in which thousands of sheets of paper are
connected together end to end.
- Their speed is measured in characters per second and ranges from 375 to 1100 cps.
Examples of dot matrix printers
Epson LQ1170 ESC/P2 (24pin)
Epson LQ2170 ESC /P2 (24pin)
Epson FX880 (9pin)
Operation
The print head mechanism in an ink-jet printer contains ink-filled print cartridges.
Each cartridge has fifty to several hundreds of small ink holes, or nozzles.
The ink propels through any combination of the nozzles to form a character or image on the paper.
Most ink-jet printers have two or more print cartridges: one containing black ink and the other(s)
containing colors.
Some color cartridges contain a variety of ink colors; others contain only a single color. The
number of pages a single cartridge can print varies by manufacturer and the type of documents you
print.
A photo printer
This is a color printer that produces photo-lab-quality pictures.
Some photo printers print just one or two sizes of images. Others print up to letter size, legal size,
or even larger.
Most photo printers are PictBridge enabled, so that you can print pictures without a computer.
A laser printer
This is a high-speed, high quality non impact printer.
Operation
It creates images using a laser beam and powdered ink, called toner, which is packaged in a
cartridge.
- They have the greatest NLQ (Near Letter Quality) capability and a high speed output
- They can print text and graphics in very high quality resolutions, usually 1200 dpi for black-
and white printers and up to 2,400 dpi for color printers.
- They are also known as page printers because they process and store the entire page before
they actually print it.
They have some memory where the page is first stored.
Examples include
HP Laser Jet 100 series printer HP
LaserJet 5M (color) printer Epson
EPL – N2000PS printer
Advantages of LaserJet printers
Are generally quiet and fast.
Can produce high quality output on ordinary papers.
Cost per page of toner cartridges is lower for than for other printers.
Disadvantages of LaserJet printers
• The initial cost of LaserJet printers can be high.
A thermal printer;
These are printers which generate images by pushing electronically heated pins against heat
sensitive paper.
Types of thermal printers
A thermal wax-transfer printer
This generates rich, non-smearing images by using heat to melt colored wax onto heat-sensitive
paper.
A dye-sublimation printer
This is sometimes called a digital photo printer, uses heat to transfer colored dye to specially
coated paper, which can create image that are of photographic quality.
Advantages of Thermal Jet printers
They are inexpensive.
They are nearly noiseless
They consume very little power compared to other printers
They don’t experience inconveniences like paper jams or blocked nozzles.
They can produce clear and crisp images with very high resolutions.
Disadvantages of Thermal Jet printers
• Needs a special temperature sensitive paper which may be expensive.
• Over heats during printing.
• The papers have limited shelf lives. They are easily damaged by sunlight, humidity and
chemical vapors.
• The papers have to be specially prepared before they can be used in printing
• Their print heads cannot be serviced or repaired even if a single dot heater fails.
• The print speed is so slow because the heads have to be allowed time to cool before the next
printing cycle.
• The print heads also have a short life span than for the other printers.
A mobile printer
This is a small, lightweight, battery-powered printer that allows a mobile user to print from a
notebook computer, Tablet PC, PDA, smart phone or other personal mobile device while traveling.
Barely wider than the paper on which they print, mobile printers fit easily in a briefcase
alongside a notebook computer.
Mobile printers mainly use ink-jet, thermal, thermal wax-transfer,
or dye-sublimation technology.
Many of these printers connect to a parallel port or USB port.
Others have a built-in wireless infrared port through which they communicate with the computer
wirelessly.
A label printer
This is a small printer that prints on an adhesive type material that can be placed on a variety of
items such as envelopes, packages, DVDs, photographs, file folders, and toys.
Most label printers also print bar codes.
Most label printers typically use thermal technology.
A postage printer is a special type of label printer that prints postage stamps.
Plotters
These are sophisticated printers with a pen like print head that can accurately draw straight, thin
and meandering lines.
They are used to produce high-quality architectural drawings such as blueprints, maps, circuit
diagrams, posters, and signs.
Because blueprints, maps, and other such drawings can be quite large, these printers typically can
handle paper with widths up to 98 inches.
These printers are usually very costly.
They are used in specialized fields such as engineering, drafting, and graphiccart.
A fax machine
This is a device that transmits and receives documents over telephone lines.
The documents can contain text, drawings, or photos, or can be handwritten.
A stand-alone fax machine scans the original document, converts the image into digitized data,
and transmits the digitized image.
A fax machine at the receiving end reads the incoming data, converts the digitized data into an
image, and prints or stores a copy of the original image.
Fax capability also can be added to your computer using a fax modem.
A multifunction peripheral
This looks like a copy machine but provides the functionality
of a printer, scanner, copy machine, and perhaps a fax
machine.
Advantages
It takes up less space and is significantly less expensive than
if you purchased each device separately.
Disadvantages
If it breaks down you lose all functions.
An interactive whiteboard
This is a touch-sensitive device that displays the image on a connected computer screen.
A presenter controls the computer program by clicking a remote control, touching the whiteboard,
drawing on or erasing the whiteboard with a special digital pen and eraser, or writing on a special
tablet.
Notes written on the interactive whiteboard can be saved directly on the computer.
Three basic technologies exist for displaying computer images on an interactive whiteboard:
Front projection: separate projector displays an image from the computer screen on the
interactive whiteboard;
Rear projection: a projector built into the back of interactive whiteboard displays an
image from the computer screen on the whiteboard; and
An interactive whiteboard fits over an LCD screen or a plasma display.
3D – SPECTACLES
- These are common in modern computer games especially on fights.
- The user wears the glasses like ordinary sun glasses except that here, instead of seeing through
the glasses, one will be treated with high quality three – dimensional pictures.
- It is similar to being in a cinema hall.
Terminals
A terminal can work as an input device and as an output device. (See input devices).
A storage medium
This is the physical material on which a computer keeps data, instructions, and information.
Storage capacity
This is the number of bytes (characters) a storage medium can hold.
Data and information access
Data and information access can be sequential or Direct (Random);
- Sequential access means that data must be accessed consecutively.
Magnetic tapes allow only sequential access; the tape must be forwarded or rewound to a
specific point to access a specific piece of data.
- Direct (Random) access means that data can be accessed directly without the need to pass
by other data in sequence.
Magnetic disks and optical disks provide direct access.
Access Time
This refers to the speed of a storage device and memory.
It measures;
The amount of time it takes a storage device to locate an item on a storage medium, or
The time required to deliver an item from memory to the processor.
Compared to main memory, storage devices are slow.
Transfer rate
This is the speed with which data, instructions, and information transfer to and from a device.
Transfer rates for storage are stated in KBps (kilobytes per second) and MBps (megabytes per
second).
A storage device
This is the instrument used to record and retrieve items to and from a storage medium.
Storage devices can function as sources of input and output.
They can act as input devices when they read and act as output devices when they write.
Reading and writing on a storage device
Reading
This is the process of transferring data, instructions and information from a storage device into
memory.
Writing
This is the process of transferring data, instructions and information from memory to a storage
media.
Types of storage devices
- Primary storage devices
- Secondary storage devices
a. Primary storage devices are devices which store data and instructions temporarily for
immediate access and use by the computer’s microprocessor.
Examples; RAM
b. Secondary storage devices
It refers to the media on which data, instructions, and information are kept, as well as
the devices that record and retrieve these items.
These devices store data permanently in a computer.
Similar to a tape recorder, a tape drive, also called tape backup units (TBUs), is used to
read from and write data and information onto a tape.
Although older computers used reel-to-reel tape drives, today's tape drives use tape
cartridges.
A tape cartridge is a small, rectangular, plastic housing for tape.
An external hard disk is a separate free-standing hard disk that connects with a cable to a
USB port or FireWire port on the system unit.
A removable hard disk is a hard disk that you insert and remove from either a dock or a
drive.
Internet hard drive, also called online storage, is a service on the Web that provides storage
to computer users, usually for a minimal monthly fee.
COMPUTER MEMORY
Memory refers to the area or space in the computer where programs and data reside during computer
operations.
• It is a temporary store or space where instructions to be executed by the processor and the data
to be processed are placed while performing the processing operation.
• A computer's memory in the system unit, located physically close to the CPU (to decrease
access time), provides the CPU with a working storage area for program instructions, data and
information.
• Memory is also known as primary storage or internal storage.
• Memory usually consists of one or more chips on the motherboard or some other circuit board
in the computer.
• It rapidly provides the instructions and data to the CPU.
• It stores three basic categories of items:
the operating system and other system software that control or maintain the computer
and its devices;
application programs that carry out a specific task such as word processing; and
the data being processed by the application programs and resulting information.
i) Volatile memory
The contents of volatile memory are lost when the computer power is turned off.
Characteristics of ROM
- The user can read the contents of ROM but can’t make modifications or write to it.
- It is a permanent memory
- It is a non – volatile memory.
- It cannot be increased.
Other terms related to ROM
i. BIOS (Basic Input / Output System)
- It resides in the ROM.
- It is a sequence of instructions the computer follows to load the operating system and
other files when the computer is turned on.
iii) CMOS (Complementary Metal Oxide Semiconductor)`
- It is used to store configuration information about the computer.
- This information includes;
the amount of memory installed,
types of disk drives, type of keyboard,
monitor,
current date and time e.t.c.
- CMOS technology uses a CMOS battery power to retain its information even when
the computer is turned off.
- Its contents can be changed.
- It provides high speeds and consumes little power.
Memory management
1. A Buffer is an area of memory or storage in which data and information is placed while
waiting to be transferred to or from an input or output device.
Importance of the buffers
They help the operating system to carefully monitor the contents in memory.
It helps the operating system to clear these items from memory when they are
no longer required by the CPU.
2. Spooling print job
- With spooling, the print jobs are placed in a buffer instead of being sent immediately
to the printer.
- When the print job is placed in the buffer, the CPU is available to process the next
instruction and the computer can be used for other tasks.
Definitions;
i. Bit;
- Is the smallest unit of measurement of computer memory.
- Each 0 or 1 is called a “Bit”
ii. Nibble
- Is a group of four (4) binary digits.
iii. Byte;
- It is a group of eight binary digits.
- A byte represents one character or digit.
- It is the fundamental (basic) unit for measuring computer’s memory.
iv. A kilo byte (KB);
10
- Is a group of 1000 bytes (or exactly 2 or 1024 bytes)
v. Megabyte (MB);
20
- Is a group of 1,000,000 bytes (or exactly 2 bytes)
vi. Giga byte (GB);
30
- Is a group of 1,000,000,000 bytes (or exactly 2 bytes)
vii. Terabyte (TB);
40
- Is a group of one trillion bytes (2 bytes)
The binary coding (System) scheme
a) ASCII (American Standard Code for Information Interchange)
- It was developed by the American National Standards Institute to provide a standard
code that could be used by many different computer manufacturers to make
machinery compatible.
- It is usually used to represent data for microcomputers.
- It consists of asset of 256 characters represented by this code.
- It is the most commonly used code for information communication though some
characters in the code do other purposes like the control of printing and system bell.
- Characters like E are represented as 01000101. Its decimal value is character 69.
b) EBCDIC (Extended Binary Coded Decimal Interchange Code)
- It was developed by IBM in the 1950s and represents character with 8 bits.
- EBCDIC is used in IBM and other mainframe computers.
- It employs the 8 – bit character.
- Character E would be represented as 11000101
c) Unicode
- Was been developed for more complex languages.
- Unicode allows twice as many bits as ASCII does.
- Unicode is implemented in several operating systems, including Windows XP, Mac
OS, and Linux.
- Unicode-enabled programming languages and software products include Java, XML,
Microsoft Office, and Oracle.
d) BCD (Binary Coded Decimal)
- It employs the 6 – bit combination
- Characters are represented with a 6 – bit combination; e.g. character E is represented
as 110101.
Character ASCII EBCDIC
A 0100 11000001
B 0100 11000010
C 0100 11000011
D 0100 11000100
0 0011 11110000
1 0011 11110001
2 0011 11110010
3 0011 11110011
COMPUTER SOFTWARE
SOFTWARE:
It is a program that consists of step by step instructions that tell the computer how to perform a given
task.
NB:
A program;
A computer program is a sequence of instructions, written to perform a specified task with a
computer.
Characteristics of software
Computer software is intangible
Computer software gives instructions/procedures to computers
Computer software is copyrighted
Computer software can be installed
Computer software is executable
Loads into Memory when running
All software has a source Code written by a programming Language.
a) OPERATING SYSTEM;
Is a set of programs that coordinate the operation of all hardware and application software
components of a computer
The operating system relies on device drivers to communicate with each device in the
computer.
Definition;
A device driver is a small program that tells the operating system how to communicate with a
device.
NB;
USER INTERFACE
This controls how users enter data and instructions into the computer and how information is
displayed on the screen.
Types of User Interfaces
a) Command Line Interface (CLI)
This is a kind of interface which allows a user to type key wards or press special keys on
the keyboard to enter data and instructions into a computer.
Advantages of CLI
Takes up little space
Doesn’t require a very fast processor.
Operation is quite fast because commands can be entered directly through the key board.
Many commands can be grouped together as a batch file so that repetitive tasks can be
automated.
Disadvantages of CLI
• A command language has to be learnt and memorized.
• It is not user friendly.
• The interface may vary from application to application.
Advantages of a GUI
It is user friendly
No need to type or memorize any command language
The interface is similar for any application.
Disadvantages of a GUI
• Requires more memory
• Requires a very fast processor.
• It is difficult to automate functions for expert users.
• Occupies more disk space to hold the files for all the different applications.
iv) UNIX
- It is a multi user O/S.
- It can run multiple applications at the same time (multitasking)
- It was developed in 1970s by scientists at Bell laboratories.
- It has a command line interface and most of its commands are difficult to remember.
v) Linux
- It is an “Open Source” software i.e. its code is made available to the public.
- It is a popular, free UNIX – like multitasking operating system.
vi) Palm O/S
Is an operating system designed for the hand – held computers (Personal Digital Assistants
– PDAs)
Examples of palm O/S; Pocket PC 2002
vii) Windows CE
Is a windows operating system designed for use on wireless communication devices and
hand – held computers.
Utility programs
A utility program is a type of system software that allows a user to perform maintenance-type tasks,
usually related to managing a computer, its devices, or its programs.
Utility programs included with most operating systems provide the following functions:
Managing files, searching for files,
Viewing images,
Securing a computer from unauthorized access,
Uninstalling programs,
Scanning disks,
Defragmenting disks,
Diagnosing problems,
Backing up files and disks,
Setting up screen savers.etc
Examples of utility programs
i) A file manager;
It is a utility that performs functions related to file and disk management.
Windows Vista and XP include file managers called Explorers (Documents Explore, Pictures
Explore, and Music Explore).
Functions performed by file managers
Formatting and copying disks
Organizing files in folders
Displaying a list of files on a storage medium
Checking the amount of used or free space on a storage medium
Organizing, copying, renaming, deleting, moving, and sorting files; and
Creating shortcuts.
NB: A folder is a specific named location on a storage medium that contains related documents.
A shortcut is an icon on the desktop that provides a user with immediate access to a program
or file.
Formatting is the process of preparing a disk for reading and writing.
ii) A search utility
Is a program that attempts to locate a file on your computer based on the criteria you specify.
The criteria could be a word or words contained in a file, date the file was created or modified,
size of the file, location of the file, file name, author/artist, and other similar properties.
iii) An image viewer
Is a utility that allows users to display, copy, and print the contents of a graphics file.
With an image viewer, users can see images without having to open them in a paint or image
editing program.
iv) A personal firewall
Is a utility that detects and protects a personal computer from unauthorized intrusions.
Personal firewalls constantly monitor all transmissions to and from a computer.
When connected to the Internet, your computer is vulnerable to attacks from hackers (people
who tries to access a computer or network illegally).
v) An uninstaller
Is a utility that removes a program, as well as any associated entries in the system files.
In Windows Vista and Xp, you are able to access the uninstaller for many installed programs
through the "Uninstall a program" command in the Control Panel.
You also are able to access the uninstaller for some programs through that programs folder on
the Start menu, or on the program's installation media.
The uninstaller deletes files and folders from the hard disk, as well as removes program
entries from the system files.
Examples of uninstallers;
McAfee’s uninstaller
vi) A disk scanner
Is a utility that searches for and removes unnecessary files from the hard disk.
Windows Vista and XP includes a disk scanner utility, called Disk Cleanup, which searches
for and removes unnecessary files such as temporary files.
It is used to detect and correct both physical and logical problems on a hard disk or floppy
disk and searches for and removes the unwanted files.
A physical problem is one with the media e.g. any scratch on the surface of the disk.
A logical problem is one with the data e.g. corrupted File Allocation Table (FAT)
Examples of disk scanner
Scan
Disk
Disk Clean Up.
vii) A disk defragmenter
Is a utility that reorganizes the files and unused space on a computer's hard disk so the
operating system accesses data more quickly and programs run faster.
When an operating system stores data on a disk, it places the data in the first available sector
on the disk. It attempts to place data in sectors that are contiguous but this is not always
possible.
When the contents of a file are scattered across two or more noncontiguous sectors, the file is
fragmented. Fragmentation slows down disk access and thus the performance of the entire
computer.
Disk defragmentation enables data to be accessed more quickly and programs to be run
faster.
Examples of defragmenter in windows is the Disk defragmenter
NB;
Defragmentation
Is the process of reorganizing the disk so that the files are stored in contiguous sectors.
viii) A diagnostic utility
‐ This compiles technical information about your computer's hardware and certain system
software programs and then prepares a report outlining any identified problems.
‐ For example, Windows Vista includes the diagnostic utility Problem Reports and
Solution, which diagnoses problems as well as suggests courses of action.
‐ Information in the report assists technical support staff in remedying any problems.
‐ Windows Xp has Dr. Watson as a diagnostic utility.
ix) A backup/Copy utility
‐ This allows users to copy, or back up, selected files or an entire hard disk to another
storage medium. During the backup process, the backup utility monitors progress and
alerts you if it needs additional media, such as another CD or tape.
‐ Many backup programs compress, or shrink the size of files during the backup process.
‐ Because they are compressed, you usually cannot use backup files in their backed up
form. In the event you need to use a backup file, a restore program reverses the process
and returns backed up files to their original form.
‐ Backup utilities include restore programs.
‐ You should back up files and disks regularly in the event your originals are lost, damaged,
or destroyed.
x) A screen saver
This is a utility that causes a display device's screen to show a moving image or blank screen
if no keyboard or mouse activity occurs for a specified time.
When you press a key on the keyboard or move the mouse, the screensaver disappears and the
screen returns to the previous state.
Importances of screen savers
‐ Screen savers originally were developed to prevent a problem called ghosting, in which
images could be permanently etched on a monitor's screen.
‐ Screen savers also are popular for security. They prevent unwanted lookers from accessing
information or data from your computer.
To secure a computer, users configure their screen saver to require a password to
deactivate.
‐ Business – advertisements on the screen.
‐ Entertainment- in which digital photos can be put on your screen as moving pictures.
xi) Debuggers
‐ These are utility programs used during the testing of a program.
‐ They help in tracing and removing of errors from newly installed programs.
xii) Sorting Utility
‐ These are utility programs used to take in data and re – arrange it in any order as specified
by the user.
‐ The order can be ascending or descending order.
xiii) Merging Utility
‐ These programs are used to combine two or more files to produce one file.
xiv) Antivirus Software
‐ This is used to prevent, detect and remove viruses from a computer’s memory or storage
devices.
‐ Examples include; Norton Antivirus, Avira, Panda, Pc – Cillin, Dr. Solomon, McAfee,
Avast antivirus, AVG antivirus, Kaspersky antivirus, Escan antivirus, F – secure
antivirus, Netqin antivirus, Eset – Nod 32 antivirus, e.t.c.
xv) A file compression utility;
‐ It is used to reduce or shrink the size of a file.
‐ A compressed file takes up less storage space on a hard disk than the original file.
‐ Compressing files frees up room on the storage media and improves system performance.
‐ In order to reduce transmission time, email attachments, and files to be uploaded or
downloaded should always be compressed.
‐ When you receive or download a compressed file, you must uncompress it.
‐ Some operating systems such as Windows XP and Vista include uncompress capabilities
‐ Compressed files are sometimes called zipped files because they have a .zip extension.
‐ Examples of compression utilities; PKzip, WinZip, Winrare.t.c.
xvi) A media player;
‐ Is a program that allows you to view images and animation, listen to audio, and watch
video files on your computer.
‐ Media players may also include the capability to organize media files, convert them to
different formats, connect to and purchase media from an online media store, download
podcasts and vodcasts, burn audio CDs, and transfer media to portable media players.
‐ Windows Vista and XP include Windows Media Player.
‐ Three other popular media players are iTunes, RealPlayer, and Rhapsody.
xvii) CD/DVD burning software;
‐ This writes files on a recordable or rewritable CD or DVD, including Blu-ray and HD
DVD.
‐ This software enables the home user easily to back up contents of their hard disk on a
CD/DVD and make duplicates of uncopyrighted music or movies.
‐ When you buy a recordable or rewritable CD or DVD, it typically includes CD/DVD
burning software.
xviii) A personal computer maintenance utility;
‐ Identifies and fixes operating system problems, detects and repairs disk problems, and
includes the capability of improving a computer’s performance.
‐ Some personal computer maintenance utilities continuously monitor a computer while you
use it to identify and repair problems before they occur.
‐ Norton System Works is a popular personal computer maintenance utility designed for
Windows operating system.
b) PROGRAMMING LANGUAGES
A programming language is a set of instructions used to direct the operation of a
computer.
d) PASCAL
- It was named in remembrance of the inventor of the mechanical adding calculator, Pascal
Blaise.
- It was developed to teach the concepts of structured programming.
Advantages of Pascal
It reinforces the principles of structured programming.
It is not limited to business or scientific applications.
e) ADA
- It was developed and named in honor of Lady Augusta Lovelance Ada.
- It was developed for the U.S department of defense to improve software reliability,
portability and maintainability.
f) LISP (List Processing)
- It was developed in the late 1950s by John McCarthy of M.I.T.
- It is the prominent language used in artificial intelligence.
- Both programs and data are sorted as lists.
- Not suitable for commercial data processing.
- It is not widely available or known by many programmers.
g) LOGO
- It was developed for educational use.
- It could allow children to explore and develop concepts through programming the movement
of a “turtle” or pen.
- It has no commercial purpose.
h) ALGOL (Algorithmic Language)
It is suitable for scientific and engineering computations.
i) C
- It is a high level language
- It is the most portable general purpose language
+ ++
- Derivatives of C are; C , C
j) PL/1 (Programming Language 1)
- It was developed for mainframe computers
- It is suitable for both scientific and commercial work.
k) PL/M (Programming Language Microcomputer);
- It was developed purposely for use with the Intel Microcomputers.
- It has a compiler.
l) APL (AProgramming Language)
3. Fourth generation Languages (4GLs / Application generators / program generators)
- Are languages designed to make the process of creating a computer – based application
easier by doing the programming themselves.
- The user defines certain tasks and then the application generators will create the program
code that will perform the tasks that have been defined.
Examples of 4GLs
Structured Query Language
4. Artificial Intelligence Languages (Fifth Generation Languages / 5GLs)
- These are languages used in intelligent knowledge based systems (IKBs) such as robots.
- They “think” and reason like human beings because of the programs installed on them.
- They are extremely used in artificial intelligence projects like space exploration.
5. Web development languages
- These include HTML and JAVA
- HTML (Hypertext Markup Language) is one of the programming languages used to create
web pages for the internet and intranets.
- JAVA is an Object Oriented Programming (OOP) language that resembles a simplified form
++
of C .
- Object Oriented Programming (OOP) uses objects which combine data and behavior.
- OOP enables rapid program development. Examples include; Visual Basic.
APPLICATION SOFTWARE
Application software are programs that perform specific tasks for users.
Or
They are programs designed to enable a computer to do a particular job.
Types of Application software
1. Off - shelf software (general purpose software)
2. Customized software (special purpose software)
1. OFF – SHELF SOFTWARE (general purpose software)
These are software programs ready to run when purchased.
e.g. word processors, spreadsheets, presentation software etc.
2. CUSTOMISED SOFTWARE (specialized software)
These are tailor made software which are developed at a user’s request to perform
specific functions.
E.g. accounting packages
Stock control programs
Library software programs
NB:
A cross platform application
Is one that runs identically on multiple operating systems.
An Application Service Provider
Is a third party organization that manages and distributes software and services on the web
ix. Copying
Is the process of duplicating and storing text on the clipboard.
NB; When text is cut, the original text is removed from its place while when text is
copied, the original text remains in its original place.
x. Pasting
Is the process of removing the text from the clipboard into the document.
xi. Word wrap
This is an Ms word feature which allows a user to type continually without pressing the
enter key at the end of each line.
xii. Find and Search
This feature allows the user to locate all occurrences of a particular character, word or
phrase.
xiii. Replace
Allows a user to substitute existing characters, words or phrases with new ones
xiv. Spelling checker
Allows a user to check the spelling of a whole document at one time or check and correct
the spelling or individual words as they are typed (Autocorrect).
xv. Grammar checker
It helps to report grammatical errors and suggests way to correct them.
xvi. Character map
Is a group of symbols not found on the keyboard
xvii. Thesaurus
Helps to suggest alternative words with the same meaning (synonyms) for use in the
document.
xviii. Mail Merge
Create form letters, mailing labels, and envelopes.
Used when similar letters have to be sent to several people.
The names and addresses of each person can be merged with one single standard
document and then printed out.
xix. Automatic page numbering
Numbers the pages automatically in a document
xx. Tables
This is an Ms Word feature which allows a user to organize information into rows and
columns.
xxi. Multi columns
Arranges text in two or more columns that look similar to a newspaper or magazine.
xxii. Macros
Allows a user to record or save frequently used keystrokes and instructions which can be
executed later by running the corresponding macros.
xxiii. Clip art gallery
Clip art gallery allows a user to insert drawings, diagrams and photographs into a
document.
xxiv. Mathematical formulae typesetting
Allows a user to typeset complex mathematical formulae with the program
xxv. Templates
Allows a user to create documents which are frequently used
xxvi. Footnotes and endnotes
- Are used in printed documents to explain, comment on, or provide references for text in
a document.
- You might use footnotes for detailed comments and endnotes for citation of sources.
xxvii. Headers;
A header is the area in the top margin of each page where text can be entered.
xxviii. Footers;
A footer is the area in the bottom margin of each page where text can be entered.
2. PRESENTATION SOFTWARE
This is the type of software used to create presentations which can communicate ideas and other
information to a group or audience
Or
It is a software program that helps you to organize and present information to an audience.
The presentation can be viewed as a slide show on a large monitor or a projection screen.
Examples of presentation software;
Microsoft power point Harvard Graphics
Corel presentations Micro media Director etc.
Lotus Freelance graphics
NB;
‐ A presentation; this is a collection of slides, handouts, speaker’s notes and outlines in a
single file.
‐ A slide; is an individual page in a presentation
Microsoft power Point
Presentation Elements
1. Slides
‐ A slide is an individual page in a presentation.
‐ They are normally viewed using projectors
2. Handouts
A handout is a combination of 2 to 6 slide images on a single page.
3. Speaker’s notes
‐ These help in the actual delivery of a presentation.
‐ Power point lets you enter and print a notes page for each slide
4. Outlines
‐ They help in brainstorming and organizing one’s thoughts.
‐ In the outline form, the headings and the main body text appears without the slide’s
background, colors and graphics.
5. Templates
‐ Power point provides over 100 professionally designed templates containing proven
layouts, color schemes and background textures.
‐ NB: A template defines what your presentation will look like, where text and other
objects will appear the foreground and the background colors to be used, etc.
6. Auto features
‐ These make it easier for one to perform his or her work.
‐ They include the clip art commands which enable the user to include clip arts in his or
her presentation.
7. Wizards
‐ Power point employs many wizards to help in simplifying work.
Viewing a presentation
Power point provides five different presentation views i.e.
‐ Slide show ‐ Notes page view
‐ Outline view ‐ Slide show view
‐ Slide sorter view
a) Slide view
‐ It shows you how the slide will appear when printed or displayed.
‐ It is similar to page layout in a word processor for windows
‐ All text, graphics and other media elements appear in slide view.
‐ One can perform the following in slide view;
• Insert, edit and delete text.
• Add a clip art, charts, scanned photographs and other media elements.
• Draw lines, squares, ovals, polygons and other objects.
• Add graphs, charts or data from other applications.
• Change the appearance of text and objects.
• Change a template’s style or color scheme.
b) Outline view
‐ It is useful in organizing one’s thoughts and developing textual content for a presentation.
‐ It enables one to outline view much as you would in a word processor to enter, arrange
and edit textual information.
‐ One can perform the following in outline view;
• Insert, arrange and edit textual information.
• Display a slide’s title with or without formatting.
• Show a slide’s title only or show titles and full text.
• Promote and /or demote textual content in your outline.
c) Slide sorter view
‐ It provides a light table for viewing multiple slides.
‐ When selected, this view arranges small thumbnail presentations of your slides, complete
with text and graphics, rows and columns.
‐ One can perform the following with the slide sorter view;
• Manipulate the order of the slides
• Add transition effects from one slide to another.
• Incorporate special “build effects” for a particular slide such as high lighting each
point in turn.
• Hide slides from being displayed in a computer – based slide show.
• Set timing options for rehearsing your presentation.
d) Notes page view
‐ This allows you to insert, edit and delete reminder notes for yourself on each slide.
‐ It allows you to use a slide’s notes page for creating extended notes as an audience
handout.
‐ It lets you enter text and graphics in a notes place holder located below the image of the
slide.
‐ It can allow you to perform the following;
• Insert, edit and delete text.
• Add a clip art, charts, scanned photographs and other media elements.
• Draw lines, squares, ovals, polygons and other objects.
• Add graphs, charts or data from other applications.
• Change the appearance of text and objects.
• Change a template’s style or color scheme.
3. SPREADSHEET SOFTWARE
A spreadsheet is an electronic worksheet that is used to organize data in rows and columns and
perform calculations on the data.
Or
It is an electronic worksheet that is used to organize, manipulate and graph data.
Uses of spreadsheets
It can be used by business men to record sales
It can be used by business men to produce invoices
It can be used to compile statements (e.g. Bank statements)
Managers use them to keep track of the current payments from customers.
It helps researchers to compile and analyze their results quickly
Teachers can use them to create tables of figures and manipulate them quickly as required.
Types of formulae
(a) Numeric (Arithmetic) formulae
These perform calculations on values and use +, -, *, ^ and % numeric operators for
calculation.
Examples
=25+5, =A15*B1/B5
(b) Text formulae
‐ These are used to manipulate text.
‐ The text is normally enclosed in “” (quotation marks) and to combine strings of text,
use & (ampersand)
Example
A3 B3 C3
Term one Term two Term three
xi) Functions;
‐ A function is a predefined formula that helps to perform common mathematical functions.
‐ Each function has a specific order, called a syntax which must be strictly followed for the
function to work correctly.
‐ Functions include; SUM, AVERAGE, SQRT, LOG, ROUND, MAX, MIN etc.
Syntax order
a. All functions begin with the = sign.
b. After the = sign, define the function name (e.g. SUM)
c. One or more arguments, numbers, text or cell references enclosed in parentheses.
If these are more than one argument, separate each by a comma.
An example of a function with one argument that adds a range of cells B2 through B12
=SUM (B2:B12)
= (equal sign)
SUM (Function)
:( Argument)
An example of a function with more than one argument that calculates the average of
numbers in a range of cells, B2 through B12 and C2 through C12
=AVERAGE (B2:B12, C2:C12)
= (equal sign)
AVERAGE (Function name)
, (Argument)
b) Statistical functions
AVERAGE (range) Calculates the average value of a range of
numbers
COUNT (range) Counts how many cells in the range have entries
MAX (range) Returns the maximum value in a range of
numbers
MIN (range) Returns the minimum value in a range of
numbers
STDEV (range) Calculates the standard deviation of a range of
numbers
c) Logical functions
IF (logical test, value if result of the test is true, Performs a test and returns one value if the result
value if false of the test is true and another value if the result is
false)
d) Financial functions
FV (rate, no. of periods, payments) Calculates the future value of an investment
NPV (rate, range) Calculates the net present value of an investment
4. DATABASE SOFTWARE
A database
It is a collection of related information stored for a particular purpose.
Examples of databases
‐ Telephone books (directories) ‐ Dictionaries
‐ Customer address books ‐ Television guides e.t.c.
‐ Employee information forms
ii. A record
Is a row in a table that contains information about a given person, product or event.
E.g. one which contains 1, Mary, F, Kampala, 10,000/=
iii. A field
It is a column in a able that contains a specific piece of information within a record.
E.g. Sex, F, M, M, M.
iv. The table structure
Is the number of fields, field names, field lengths and data types in the database table.
v. Field name (Field Labels)
Is a title of a particular column (field).
E.g. titles like ID No, Name, Sex, District, Allowance.
vi. Field Length
Is the maximum number of characters that can be stored for data in a particular field.
vii. Data type (Field Type)
It specifies the type of data that the field can contain
ix. Queries
These are tools used to locate specific records within the table or ask questions to your
database.
x. Forms
These are tools that enable one to enter and display records from the database tables
easily.
They can be used to enter data in many tables at the same time.
xi. Reports
Are tools that enable one to preview and print data in a meaningful format.
xii. Macros (Mini programs)
These are tools used to automate the way one uses his database.
Macros can be used to instruct the computer to print specific reports at a given time.
xiii. Modules
These do the same work as a macro.
They enable one to automate work processes.
CHARACTERISTICS OF DATABASES
The data is arranged in columns (fields) and rows (columns)
Each column has similar data items.
Each row contains information belonging to a single individual.
Qualities of a good database
Should make use of the computer resources
Should be fast
Should interface smoothly with existing facilities
Should be updatable
Should provide easy access to authorized users
Should preserve data integrity
Should ensure the privacy of data
Functions of databases
i) Sorting
It involves organizing a set of records in a particular order
The order can ascending or descending order and by alphabetic or numeric order.
ii) Browsing (searching)
It involves the ability to extract information of general interest from a database
iii) Report generation
A report generator allows one to create formatted reports which include headings, sub
– headings, columns of data from the database, columns of data that are compiled from
existing fields in the database and final totals e.t.c.
iv) Databases are powerful and easy to use when creating information.
v) They are used to organize and manage a collection of related information (data)
vi) They provide the user with the means of managing and manipulating large amounts of
data.
Factors to consider when designing a database
• The number of tables needed.
• The number of fields and the field names.
• Unique identifiers of fields with unique vales.
• Relationships between the tables if any.
• Practicability of the database.
Types of databases
1. Flat file database
‐ It is a database made up of only one table
‐ It is easy to set up and use
2. A relational database
‐ It is a database which can take information from two or more database tables and combine
them into a new table or report.
NB: A relationship
It determines the way in which the details in one table are related to the details in
another table.
It can be a one to one relationship, one to many or many to many relationship.
3. Hierarchical database
It uses a structure in which records are divided into segments.
Each record contains one root segment and a variable number of subordinate segments
that define a field within a record.
4. The network databases (Online databases)
‐ It uses a linked list structure
‐ Combines records with links which are called pointers
‐ The pointers physically establish the relationships between records.
Initial expense
Because of their complexity and efficiency, database systems can be expensive to set up.
Vulnerability
Data in a database may be more susceptible to sabotage, theft or destruction
Need for substantial conversion effort
‐ Changing from a traditional file oriented system to a database system can often involve
large scale reorganization of data and programs.
‐ This normally creates user resistance.
5. DESKTOP PUBLISHING SOFTWARE (DTP)
‐ It is a software used to design and produce complicated documents that contain text, graphics
and brilliant colors.
‐ It is ideal for creating high – quality colored documents such as
o Newsletters
o Catalogs
o Textbooks
o Banners
o Annual reports
‐ It normally requires a powerful microcomputer, graphics display, mouse, laser printer.
o Microsoft Publisher
o Adobe PageMaker
o Adobe InDesign
o QuarkXPress
o Broderbund Print Shop Pro.
Uses of electronic publication software
It is ideal for the production of high quality colour documents such as text books, corporate
newsletters, marketing literature (adverts), product catalogues, business cards, gift certificates,
flyers, brochures and annual reports, etc.
It is used in creating of web pages.
It is also used to share the above documents over the internet.
From the Start menu, select All Programs » Microsoft Office » Microsoft Office Publisher 2003.
Publisher opens and the New Publication task pane appears, offering many pre-formatted designs to
use in creating your publication.
Menu Bar The Menu Bar contains menus with additional commands in the form of a drop-down list.
Standard Toolbar The Standard Toolbar contains frequently used buttons that are common
functions in Publisher and throughout Microsoft Office. This toolbar is similar in most Office 2003
programs.
Formatting Toolbar The Formatting Toolbar contains buttons for common text formatting options in
Publisher and throughout Microsoft Office. This toolbar is similar in most Office 2003 programs.
Object Bar The Object Bar contains each of the tools you will use to create and manipulate text and
graphics in Publisher.
Task Pane The task pane provides quick access for complicated functions and can include Help, Clip
Art, Find and Replace, Graphics Manager, Publication Designs, Styles and
Formatting, and many others.
Status Bar The Status Bar shows the size and position of the object on the Work
Pane.
6. SOFTWARE SUITE
‐ Software suite; this is a collection of individual application software packages sold as a
single package.
Examples of software suite;
Microsoft office
Lotus smart suite
Corel word perfect suite
Advantages of software suite
‐ Its cost is relatively less than purchasing each of the application packages separately.
‐ It is easy to use because applications within the suite usually have the same interface and
share common features.
7. INTEGRATED SOFTWARE
‐ It is a software the combines applications such as word processing, spreadsheet and database
into a single, easy to use package.
‐ Applications in the integrated software use a similar interface and share some common
features.
‐ Unlike a software suite, applications in the integrated software cannot be purchased
individually.
Examples of integrated software
o Microsoft works
Advantages of integrated software
Costs less than a software suite or each individual application.
It is easy to use because all applications have a similar interface and share similar features.
Disadvantages of integrated software
Applications within the integrated software normally do not have all the capabilities of a stand
– alone application software of the same kind.
Applications may share some resources.
8. COMPUTER AIDED DESIGN SOFTWARE (CAD)
‐ It is a software which is mainly used for creating engineering, architectural and scientific
drawings.
‐ It can be used in drawing plans for buildings, etc.
Examples of CAD software;
o AutoCAD
o Autodesk
o Microsoft Visio Technical
9. PROJECT MANAGEMENT SOFTWARE
It is a kind of software used to plan, schedule, track and analyze the events, resources and
costs of a project.
It helps people such as a publisher or general contractors to complete projects on time and
within budget.
Examples of this software;
o Microsoft Project
Definitions
Simulations;
These are computer based models of real – life situations
Virtual reality (VR)
This is the use of computer to create an artificial environment that appears and feels like a
real environment
Computer Based Training (CBT)
Allows students to learn and complete exercises with instructional software.
SYSTEM START – UP AND CONFIGURATION
COMPUTER BOOTING
Powering on the computer
- Most microcomputers are switched on by the switch on the system unit and the monitor.
- As the computer is switched on, it does the Power – On Self Test (POST) before it starts.
- The POST consists of RAM check, CMOS check, HDD controller check (Disk Drive controller
check)
- In case one of the checks fails, then an appropriate error message is displayed on the screen or
- An abnormal number of beeps are sounded.
- The whole process is called BOOTING.
Definition
Booting is the process of starting or restarting a computer which involves loading an operating
system into memory.
Types of booting
There are two types of booting;
a. Cold booting
b. Warm booting
a. Cold booting
It is the process of starting a computer which has been totally off which involves loading the
operating system into memory.
b. Warm booting
It is the process of restarting (resetting) a computer that is already turned on.
In the windows environment, it is normally performed by pressing Ctrl+Alt+Del keys on the
keyboard.
Application of booting
Booting is done in the following cases;
- Cold booting is done always when one is starting up the computer which has been totally off.
Warm booting is done;
- Whenever the computer devices such as keyboards, mouse, etc. stop responding to commands
issued to them.
- After installing a software or hardware onto your computer.
- After scanning for viruses.
NB;
Booting can be done from a booting diskette or a hard disk.
Steps that occur during a cold boot using the windows operating system
- The power supply sends an electrical signal to the motherboard and other devices located in the
system unit.
- The CPU resets itself and looks for the ROM that contains the BIOS.
- The BIOS executes the Power On Self Test (POST) to ensure that all the computer hardware is
connected properly and operating properly.
- The results of the POST are compared with the data in the CMOS chip on the motherboard.
- If the POST is completed successfully, the BIOS looks for the boot program that loads the
operating system.
- Once located, the boot program is loaded into memory and executed, which then loads the kernel
of the operating system into RAM.
- The operating system loads system configuration information and the remainder of the operating
system is loaded into RAM and the desktop and the icons display on the screen.
NB:
1. Kernel
This is the core of an operating system responsible for;
- managing memory,
- Managing files and devices,
- maintaining the computer’s clock,
- starting applications and
- assigning the computer’s resources such as printers, scanners, etc.
The kernel is referred to as a memory resident because it remains in memory while
the computer is running.
SYSTEM CONFIGURATION
System (Computer) Configuration refers to the hardware and software specifications
required for a PC or any other type of a computer.
Below is a typical system configuration;
Microprocessor of Pentium series type
Hard disk in range of gigabytes
Floppy disk drive 3.5”, 1.44MB
104 Qwerty Keyboard
15” or 17” color digital monitor
Desktop version of inkjet or laser jet printer
Multimedia kit with the following;
CD ROM drive or DVD drive
Speakers and a sound card
A 3-button mouse with a wheel
System software with the latest windows version
Application software with the latest Ms. Office version.
THE SYSTEM UNIT
The system unit is a box-like case that houses the electronic components such as the processor,
memory and other electronic components of the computer that are used to process data.
All other computer system devices, such as the monitor, keyboard, and mouse, are linked either
directly or indirectly into the system unit.
(ii) Motherboard
The motherboard, is a single circuit board that provides the path through which the
processor communicates with memory components, other components, and peripheral
devices.
- It is the main circuit board in the system unit.
- It houses the CPU chip, Main memory chips
and expansion slots into which other circuit boar ds
can be inserted for the expansion of the computer
system.
Parts of a CPU
(d) Control Unit
- The control unit is the component of the processor that directs and coordinates
most of the operations in the computer.
- It interprets each instruction issued by program and then initiates the appropriate
action to carry out the instruction.
- It directs data from storage to memory.
- It sends data required for mathematical operations from the memory to the ALU.
- It sends the data processed to the printer or a storage device.
- It erases/deletes/rubs data from memory when instructed to do so.
For every instruction, the control unit repeats a set of four basic steps:
• Step 1: Fetching the instruction. The instruction to be executed is obtained from
memory by the control unit.
• Step 2: Decoding the instruction. The
instruction is translated into commands the
computer understand. Relevant data is moved
from memory to the register, and the location
of the next instruction is identified.
• Step 3: Executing the instruction. The
commands are carried out. This could involve
making either an arithmetic computation or a
logical comparison in the ALU.
• Step 4: Storing results. The results are stored
in registers or memory.
Figure shows how USB and FireWire are replacing other ports completely.
Special purpose ports
There are five special-purpose ports available:
MIDI,
eSATA,
SCSI,
IrDA, and
Bluetooth.
These ports are not included in typical computers.
For a computer to have these ports, you often must customize the computer purchase order.
(f) MIDI (Musical Instrument Digital Interface) port
- It is designed to connect the system unit to a musical instrument such as an electronic
keyboard.
- It is connected to the sound card inside the system unit to enable one play and manipulate
computer sounds that were originally created on another computer.
‐ Software installati n
The learners should be guided on how to install and uninstall computer software, both
application and system software
‐ Computer troubleshooting
The learners should be guided on how to identify and explain software and hardware
problems, and how to provide solutions to the problems.
COMPUTER NETWORKS & COMMUNICATIONS
DATA COMMUNICATION
Is the process of transferring data, instructions and information from one computer to another
computer.
COMMUNICATION DEVICES
‐ These are devices which enable one or more computers to exchange data, instructions and
information with each other.
‐ They are used to convert or format signals so that they become suitable for the communications
channel or a receiving device.
A digital signal consists of individual electrical pulses that represent bits grouped
together into bytes.
For communications channels that use digital signals, the modem transfers the digital signals
between the computer and the communications channel.
If a communications channel uses analog signals, however, the modem first converts between
analog and digital signals.
i. Dial – up modem
‐ This is the communications device that performs the function of modulation / demodulation.
‐ The word modem comes from two words i.e. “MOdulation” and “DEModulation”
Modulation: Is the process of converting digital signals into analog signals
Demodulation: Is the process of converting analog signals into digital signals.
‐ A dial-up modem usually is in the form of an adapter card that
one inserts in an expansion slot on a computer's motherboard.
‐ Dial-up modem can automatically dial telephone numbers,
originate message sending, and answer incoming calls and messages.
‐ Both the sending and receiving ends of a standard telephone line
must have a dial-up modem for data transmission to occur.
One end of a standard telephone cord attaches to a port on the modem card and the other end plugs
into a telephone outlet.
Examples of devices that use modems
‐ Computers
‐ Fax machines
‐
DATA TRANSMISSION
Modes of transmission
Note;
- Broadband transmission transmits only one signal at a time
- Baseband transmission transmits multiple signals simultaneously.
DIRECTION OF TRANSMISSION
(i) Simplex transmission
‐ Here, data flows in only one direction from the
sending device to the receiving device.
‐ It is used only when the sending device doesn’t
require a response from the receiving device.
‐ It is applied in security alarms and fire alarms
that contain sensors, television broadcasting, etc.
(ii) Half duplex
‐ Data can flow in either direction from the
sending device to the receiving device and back but not
simultaneously.
‐ It is used in radio calls, ATM machines, Fax
machines, credit card verification systems, etc,
(iii) Full duplex
‐ Data can flow in both directions at the same
time.
‐ E.g. with modern telephone system, the sender
can be able to talk while listening to the receiver on the
other side.
Synchronous transmission
This is a mode of transmission in which data is transmitted as groups of bytes simultaneously at
regular intervals.
The beginning and ending of a block of bytes is determined by the timing circuitry of the sending
device and receiving devices.
NB:
Synchronous transmission;
• Requires more sophisticated and expensive communications devices,
• Provides much higher speeds and greater accuracy than asynchronous transmission.
Advantages of telecommuting
Reduces time and expenses for travelling to and fro work.
Eliminated travelling during bad weather conditions.
Allows flexibility in the work schedule.
Reduces air pollution by vehicles driven to and fro work.
Employers reduce costs due to less office space and furniture required.
Favors the disabled employees.
Disadvantages of telecommuting
Reduces human face – to – face interactions among the working staff.
If any device of the communications system fails, the work has to stop.
Leisure time at home may be replaced by work.
There is less security over the company’s information.
12. Global positioning (GPS)
It consists of one or more earth based receivers that accept and analyze signals sent by satellites in
order to determine the receiver’s geographical location.
Uses of GPS
To locate a person or an object
To find the best route between two points
Monitor the movement of a person or object.
Create a map
To get weather information
Used by cars and ships to provide directions.
COMPUTER NETWORKS
A network is a collection of computers and devices connected by telecommunications
channels that allows users to facilitate communications, share data, information, software, and
hardware with other connected users.
Advantages of using a network
Enables sharing of resources such as printers, scanners, storage devices hence reducing costs.
Enables sharing of data and information stored on other computers on the network.
Facilitates communication between people via e-mail, instant messaging, chat rooms,
telephony, videoconferencing, etc.
Allows tight control over who has access to what data
Disadvantages of using networks
The hardware, software and expertise required to set up a network are expensive.
They are vulnerable to security problems
If a server fails, the whole network may fail hence inconveniencing all the users
They easily spread viruses which can damage information on the network.
Components of a network
Network Administrator;
This is the person who manages and troubleshoots the computer network.
Internet Service Provider (ISP);
Is a company that supplies connections to the internet usually for a monthly fee.
Clients;
These are independent computers connected to a server in a network.
Servers;
A server is a computer that controls access to the hardware (e.g. printers, scanners)
and software on the network and provides a centralized storage area for programs, data,
and information.
It provides shared services such as network security measures with other
machines.
The other computers (clients) on the network rely on the servers for these resources,
such as files, devices, processing power, and storage.
Examples of servers;
DNS server (Domain Name Server)
It translates the domain name into its associated IP address so that data can go to the
correct computer.
Dedicated Server
Is a server that performs a specific task independently in a network.
File server
It stores and manages files on the network
Print server
Manages printers and print jobs.
Database server
Stores and provides access to a database stored on the network
Network server (e.g. DNS)
It manages all the traffic on the network.
NETWORK ARCHITECTURES
i) Peer to Peer network
In this architecture, several personal computers are connected together with each being
able to access the resources of other computers.
All computers access resources equally.
Each computer stores files on its own storage devices.
Each computer has its own network operating system and application software.
It normally connects less than 10 computers together.
It is suitable for home and small scale business users.
NB:
The major difference between peer – peer and client – server network lies in how the data and
information is stored.
NB; To prevent unauthorized access to data and information, intranets and extranets are often
protected by firewalls.
Definition;
A FIREWALL is the hardware and software used to restrict access to data and information
on a network.
NETWORK TOPOLOGIES
A network topology is the physical arrangement of the devices in a communications network.
Types of Network Topologies
i. Bus topology
ii. Ring topology
iii. Star topology
iv. Tree topology
v. Mesh topology
i. Bus Topology
It consists of a single central cable (Backbone or Bus) to which all the network nodes
are attached.
The bus in a bus network transmits data, instructions, and information in both directions.
When a sending device transmits data, address of the receiving device is included with
the transmission so that the data is routed to the appropriate receiving device.
or
or
Data travels from device to device around the entire ring in one direction only.
The node examines any data that passes by to see if it is the addressee; if not, the data is
passed on to the next node in the ring.
If one device fails, all the devices before the failed device are not affected but those after
the failed device cannot function.
It can span a larger distance than a bus network, but it is more difficult to install.
It is primarily is used for LANs, but also is used in wide area networks (WAN).
Advantages of ring topology
Can span a larger distance than a bus network.
Since data is only in one direction, no collisions can occur.
Speed of data transmission is fast.
Failure of one device only affects the devices after the failed node but doesn’t
affect the nodes before.
Disadvantages of ring topology
Difficult to install
If the cable fails, the whole network goes down.
iii. Star Topology
Here, all the computers and devices are connected to a central device (hub or switch) thus
forming a star.
or
All the data from one computer to another passes through
Advantages of a star topology the central point.
Fairly easy to install and maintain.
nodes can be added to or removed from the network with little
network. or no disruption to
If one node fails, its only that node that is affected.
Any connection failure between a node and the hub will not af
Disadvantages of a star topology the fect the overall
∗ A lot of cables are needed hence becoming expensive.
∗ If the central point fails, the entire network fails.
iv. Mesh Topology system.
All devices are connected to each other.
Data sent on a mesh network can take any of the several
p destination.
or
Computer
Disadvantages of the Mesh topology
Much cabling is needed hence expensive
Not easy to troubleshoot incase of failure
Not easy to install.
v. Tree (Hybrid) Topology;
It is a combination of star and bus networks.
While none of these organizations has actual control over the Internet and how it functions, they can
and do influence government agencies, major network owners, ISPs, corporations, and software
developers with the goal of keeping the Internet operating as efficiently as possible.
Why people connect to the internet
- To access a wealth of information such as news, weather reports, and airline schedules
- To shop for goods and services through e – commerce
- To use online banking services and managing investments
- To do research across long distances.
- To take online courses (Cyber Schools)
- To download files, programs, etc.
- To send and receive messages to and from other connected users
- To communicate with other uses around the world.
- To access sources of entertainment and leisure such as online games, magazines, etc.
- To share network resources such as printers, scanners etc.
- Getting new information such as news and information
- For electronic discussions through teleconferencing.
- To enjoy online employment system
- To use the online internet library which has a lot of useful academic material
Disadvantage of using the internet
- personal insecurity
- data insecurity across networks
- moral and cultural degradation such as pornography.
- high initial costs of setting up a network
- spread of terrorism and drug trafficking
- over reliance on networks
- spread of viruses
- addiction especially among the youth leading to laziness
- requires expensive skilled personnel to maintain the network which makes it
costly.
It is an Internet communication service which allows Internet users to create, send and receive
mail messages electronically.
In order for any two users to receive or exchange E-mail messages online, they must have E-
mail addresses
E – mail address
An email address is a set of characters that are required to send and receive emails
Parts of an email address
For email addresses outside the United States, there is often a [DOT] followed by two letters
representing the country.
Country-codes Country
.ca Canada
.au Australia
.nz New Zealand
.ug Uganda
.uk United Kingdom
.za South Africa
The Message Header comprises of specified information which appears in the following fields:
From: Contains the E-mail address and in some cases the actual name of the sender of
the e-mail message.
To: Contains the E-mail address and in some cases the actual name of the recipient of
the e-mail message
Date: Contains the date and time when the E-mail message was sent.
This information is automatically generated by the e-mail client software on the server.
Subject: Contains a phrase or statement summarizing the main theme/topic of the mail message.
In some cases it is recommended that it is preceded by the prefix RE:
e.g, RE: Mum’s Health
Advantages of email
It is very quick in delivering files. You can communicate quickly with anyone on the Internet.
Email usually reaches its destination in a matter of minutes or seconds.
It is a cheap means of transferring files.
The cost to you for email has nothing to do with distance, and in many cases, the cost doesn't
depend on the size of the message. Most Internet access charges are based on the number of
hours per month you access the Internet, or you pay a flat monthly fee.
Other computer files can be attached to the email.
Records and copies are kept automatically online.
Can be picked up anywhere in the world.
Can be sent at any time to its destination (it works 24-7)
You can deal with your email at a convenient time. You don't have to be interrupted when
email arrives, and you can read it or work with it when you have the time. Also, you can send it
at a convenient time. It doesn't have to be written or sent at a time when you know the recipient
will be available. This is what we mean by the term asynchronous communication.
You can send letters, notes, files, data, or reports all using the same techniques. Once you learn
how to use your email program, everything is sent the same way.
You don't have to worry about interrupting someone when you send email. The email is sent
and delivered by one computer system communicating with the Internet. Although it is put into
someone's mailbox, the recipient isn't interrupted by the arrival of email.
You don't have to be shy about using email to communicate with anyone. Email isn't
anonymous-each message carries the return address of the sender-but you can write to anyone
with an Internet address. All the messages appear the same to the person who gets the email.
The messages are generally judged on what's in them, not where they're from.
Disadvantages of an email
• A computer and other hardware such as a modem are required.
• It is not secure
• It is easy to get on junk (useless) mail lists.
• Email isn't necessarily private. Since messages are passed from one system to another, and
sometimes through several systems or networks, there are many opportunities for someone to
intercept or read email. Many types of computer systems have protections built in to stop
users from reading others' email, but it's still possible for a system administrator to read the
email on a system or for someone to bypass the security of a computer system.
• Some email systems can send or receive text files only. Even though you can send and
receive images, programs, files produced by word processing programs, or multimedia
messages, some folks may not be able to properly view your message.
• It's possible to forge email. This is not common, but it is possible to forge the address of the
sender. You may want to take steps to confirm the source of some email you receive.
• It's difficult to express emotion using email. The recipient doesn't have the benefit of seeing
your facial expressions or hearing your voice. You have to be careful with humor or sarcasm,
since it's easy for someone to take your message the wrong way.
• You can receive too much or unwanted email. You can receive "junk" email in the same
way you receive other types of junk mail. On the Internet, junk mail is called spam. You may
have to take active steps to delete the email you receive and try to stop it from being sent to
you in the first place
• You may not know about the person with whom you are communicating. The
communication is often al in text and it's possible for us to get an incorrect impression of the
person sending us email. Also, some people misrepresent themselves.
NETIQUETTE
It is short form for Internet etiquette.
It is the code of acceptable behaviors users should follow while on the Internet.
Netiquette includes rules for all aspects of the Internet, including the World Wide Web, e-
mail, FTP, newsgroups and message boards, chat rooms, and instant messaging.
Rules of Netiquette
Golden Rule: Treat others as you would like them to treat you.
a) In e-mail, chat rooms and news groups;
Keep messages brief. Use proper grammar, spelling and punctuation.
Be careful when using sarcasm and humor as it might be misinterpreted.
Be polite. Avoid offensive language.
Read the message before you send it.
Use meaningful subject lines.
Avoid sending or posting flames, which are abusive or insulting messages. Do not
participate in flame warms, which are exchanges of flames.
Avoid sending spam, which is the internet’s version of junk mail.
Do not use all capital letters which is equivalent to SHOUTING!
Use emoticons to express emotion. Popular emoticons include;
:) Smile :│ Indifference :O Surprised
:( Frown :\ Undecided etc.
Use abbreviations and acronyms for phrases:
BTW By the way
FYI For your information
FWIW For what it’s worth
IMHO In my humble opinion
TTFN Ta ta for now
TYVM Thank you very much
Clearly identify a spoiler, which is a message that reveals a solution to a game or
ending a movie or program.
b) Read the FAQ (Frequently Asked Questions), if one exists. Many news groups and
web pages have a FAQ.
c) Do not assume material is accurate or up-to-date. Be forgiving of other’s mistakes.
d) Never read someone’s e-mails.
v) A web server
It is a computer that keeps and delivers web pages requested by users.
vi) A web master
Is the individual responsible for developing web pages and maintaining a website.
vi) Videoconferencing
- A videoconference is a meeting between two or more geographically separated people who use a
network or internet to transmit audio and video data.
- It allows participants to collaborate as if they were in the same room.
- A videoconferencing software along with a microphone, speakers and a digital video camera
attached to the computer are required to participate in a video conference.
vii) Electronic Commerce (e – commerce)
- It is the buying and selling of goods and services over the internet (Online)
- It is a financial business transaction that occurs over an electronic network such as the internet.
E-business is the conducting of business on the Internet, not only buying andselling, but
also serving customers and collaborating with business partners.
Examples of transactions conducted online
Online shopping
Online banking
NB: E – Money: it is a means of paying for goods and services over the internet.
Models of Electronic Commerce Business
i. Business – to - Consumer (B2C)
This model applies to any business that sells its products or services to consumers over the
Internet.
This model usually includes e-shops and e-malls.
An e-shop or e-store is a version of a retail store where customers can shop at any hour of the
day without leaving their home or office.
Such businesses include;
o Amazon.com
o Gap and Best Buy
An e-mallconsists of a number of e-shops.
It serves as a gateway through which a visitor can access other e-shops.
ii. Consumer – to Consumer (C2C)
This model applies to sites primarily offering goods and services that assist consumers
interacting with each other over the Internet.
eBay, the Internet’s most successful C2C online auction Web site, links like-minded buyers and
sellers for a small commission.
iii. Business – to – Business (B2B)
Is the e – commerce which consists of businesses buying from and selling to each other over the
internet.
iv. Consumer – to – Business (C2B)
Applies to any consumer that sells a product or service to a business over the Internet
NB:
Intermediaries
These are agents, software, or businesses that bring buyers and sellers together that provide a
trading infrastructure to enhance e-business.
They include;
New York-based e-Steel Corp. and
Philadelphia-based PetroChemNet Inc.
They bring together producers, traders, distributors, and buyers of steel and chemicals,
respectively, in Web-based marketplaces.
Advantages of e – commerce
It operates 24 hours a day hence transactions can be conducted at any time.
Information about a product can be changed and be available quickly (i.e. it is easy to update)
It gives immediate feedback
Allows manufacturers to buy and sell directly hence avoiding the cost of middle men.
Customers can easily compare prices.
It allows business to gather customer information, analyze it and react appropriately.
Businesses have access to millions of people with internet connections.
It widens the market easily. It can work globally hence saving time for participants on both ends.
Distribution costs for information is reduced or completely eliminated.
NB: Netiquette; is the code of acceptable behaviors users should follow while using services on
the internet.
MULTIMEDIA
Is the use of computers to integrate text, graphics, audio, animations and videos into one
application in order to convey messages.
A web page can contain text, graphics, animations, audio, video, and hyperlinks to other
documents.
These are called multimedia elements.
a) Graphics
A graphic is a digital representation of non text information such as a drawing, a chart or a
photo.
Graphics formats
i. JPEG (Joint Photographic Expert Group)
- It is a format that compresses graphics to reduce their file size, which means the file takes up
less storage space.
- Smaller file sizes result in faster downloading and uploading of Web pages because small files
transmit faster than large files.
- It is often used for scanned photographs, art work, and other images that include smooth
transitions of colors.
ii. GIF (Graphics Interchange Format)
- It is also saved using compression techniques to reduce its file size for downloading.
- It works best for images with only a few distinct colors, such as line drawings, logos, single-
color borders, and simple cartoons
MP3
It is a popular technology that compresses an audio file to about one – tenth of its original
file size while preserving the original quality of the sound.
d) Video
- On the Web, you can view video clips or watch live video.
- Video consists of full-motion images that are played back at various speeds.
- Most video also has accompanying audio.
-
You can use the Internet to watch live and/or pre-recorded coverage of your favorite
television programs or enjoy a live performance of your favorite vocalist.
- You can upload, share, or view video clips at a video sharing Web site such as You Tube.
Educators, politicians, and businesses are using video blogs and video podcasts to engage
students, voters, and consumers.
- MPEG (Moving Picture Experts Group) is a popular video compression standard a widely
used one called MPEG-4, or MP4.
e) Hyperlink
- It’s also called a link.
- It is a built – in connection to another related web page or part of a web page.
- A link can be a word, a phrase or an image.
f) Simulations
- These are computer based models of real life situations.
- They often replace costly and sometimes hazardous demonstrations in teaching and learning.
g) Virtual reality (VR)
- Is the simulation of a real or imagined environment that appears as a three-dimensional (3-D)
space.
- On the Web, VR involves the display of 3-D images that you can explore and manipulate
interactively.
- Using special VR software, a Web developer creates an entire 3-D environment that contains
infinite space and depth, called a VR world.
- A VR world might show a room with furniture. Users walk through such a VR room by
moving an input device forward, backward, or to the side.
- Science educators create VR models of molecules, organisms, and other structures for
students to examine.
WEB DESIGNING
Terms used:
i) A web page
• It is an electronic document or files of information stored on the web / website.
• It can contain text, animations, audio, and video (i.e. multimedia elements), as well as
built – in connections (called hyperlinks) to other documents.
ii) A website
• It is a collection of web pages where information of a particular organization or company
is stored.
• Or it is a group of files that are interconnected by hyperlinks that allow a user to jump
from one page to another, usually by a mouse click.
iii) Home page
• It is the first page (starting page) of a web site.
• It is the table of contents for a website.
• It normally has a name “index.htm” or “index.html”
iv) Hypertext
It is a text document containing links to other documents and pages
v) HTML (Hypertext Markup Language)
It is a language made up of text codes used to create web pages.
vi) Favorites or Bookmarks
These are features that are used to save addresses of your favorite web pages
vii) History
This is a feature that is used to find the recently visited sites
viii) HTML Editors
These are used to help in keeping the HTML tags or codes e.g. Microsoft FrontPage, Micro
media Dreamweaver etc.
q) Password field
Is an input field that a user can enter a password into
e.g.
Password:
r) Radio buttons
These are buttons in a web page that lets a user to select only one of a limited number of
choices.
They look like;
Male
Female
s) Check box
This lets a user select one or more options of a limited number of choices. E.g.
I have a bike
I have a car
t) Submit button
This is a button used to send data to a server.
E.g.
Username:
u) Drop down arrows
NB:
Do not assume that information presented on the Web is correct or accurate. Any person,
company, or organization can publish a Web page on the Internet. No one oversees the content
of these Web pages. Therefore, a lot of caution should be taken when acquiring information
from the web.
Questions
1. The internet has given rise to a number of developments, including blogs and wikis.
a. Give two features of a blog. [2]
b. Give two features of a wiki. [2]
2. Describe three ways to evaluate the reliability of information found on a website.
LIMITATIONS OF A WEBSITE
- Websites are expensive to be constructed. Therefore, some institutions may not be in position to
come up with one.
- They require a lot of maintenance and update hence becoming expensive and time consuming.
- They limit customers from directly interfacing with the business men. This makes customers to
sometimes be cheated.
- Very many people and organizations are creating websites with a lot of information which is not
legitimate and some organizations lie the public through the websites.
COMPUTER SECURITY RISKS
A computer security risk is any event or action that could cause a loss or damage to computers,
software, data or information.
NB:
Computer crime: is any illegal act involving a computer.
Cyber crime: is the online or internet – based illegal acts.
Computer security risks include;
1. Internet and network attacks
2. Unauthorized access and use of computer systems.
3. Hardware and software theft
4. Information theft and information piracy
5. System failure.
b) Worms
• A worm is a computer program that sits in the computer’s memory, rewrites itself
continuously into the memory until the system runs out of memory and crushes.
• It differs from a virus in that the “reproduced” segments keep communicating with the
“mother” code to function.
c) Trojan Horse
• It is a small program code hidden within legitimate software.
• Unlike a virus or a worm, a Trojan horse doesn’t have the ability to replicate itself but it
is often a way for viruses or other malicious code such as bots to be introduced into a
computer system.
• They continue to operate as legitimate software until at such a time that they are
activated to cause trouble.
d) Bots
Are a type of malicious code that can be covertly (secretly) installed on your computer
when attached to the Internet.
Once installed, the bot responds to external commands sent by the attacker, and your
computer becomes a “zombie,” and is able to be controlled by an external third party.
NB: A Botnet is a group of compromised computers connected to a networks such as the
Internet that are used for malicious activities such as sending spam, participating in a
Distributed Denial of Service attack, stealing information from computers, and storing
network traffic for later analysis.
Other forms of malicious code include;
e) Time bomb
• It is a program code that is activated when it detects a certain condition or event.
• These events can be famous days like Valentine, Fools – day, etc.
f) Droppers
• These are programs that have been written to perform useful tasks like compressing
files, previewing video clips, etc. and in the process of performing those tasks, they
introduce viruses in the system.
g) Failed viruses
• These are viruses that have not met their would be goals.
• This may be due to poor programming by the authors.
h) Packagers
• These hide the existence of a virus from virus guards by masking some codes around the
actual software programs.
• It is only when the virus has been triggered off that you realize that the software had a
virus.
i) Jokes
• A joke is a harmless program that does amusing actions on the screen.
• They can display messages like “Your computer is about to explode in five minutes.
Please run away”.
j) Test viruses
• These are viruses written to test some virus guards (antivirus software)
• They are not harmful, just for learning purposes only.
k) Bugs:
• A bug is unintentional fault in a program that is normally misinterpreted as a real virus.
• Moat complex software in computer systems normally contain bugs.
• Minor bugs normally cause simple inconveniences while major bugs can cause loss of
data.
How are viruses activated?
• By opening an infected file
• By running an infected program
• By starting up the computer with an infected floppy diskette.
Sources of viruses
o Fake games
Virus programmers utilize the ability of games spreading so fast to design fake games and attach
viruses on them.
These games keep infecting systems as they are installed.
Such games are normally the irresistible like I LOVE YOU, HOTSEX.exe, JACKPOT.com,
ROMANCE.exe etc.
o Through use of contaminated diskettes on several computers.
o Through using pirated software.
o Through using freeware and shareware from the internet.
Since these are free, they are good grounds for distributing viruses.
They also in most cases contain bugs which may turn into viruses unintentionally
o Through software updates most especially over the internet or other networks.
o Through sharing of data in a network.
2. Unwanted Programs:
These are programs on the internet that install themselves on a computer without the user’s
consent.
They include;
- Adware
It is a program that displays an online advertisement in a banner or pop-up window on Web
pages, email, or other Internet services.
- Browser parasite
It is a program that can monitor and change the settings of a user’s browser.
- Spyware
It is a program placed on a computer without the user's knowledge that secretly collects
information about the user e.g. email address, instant messages, etc.
3. Phishing and Identity Theft:
Phishing is any deceptive (misleading/false), online attempt by a third party to obtain confidential
information for financial gain.
Some phishing email messages ask you to reply with your information; others direct you to a
phony Web site, or a pop-up window that looks like a Web site, that collects the information.
4. Hacking and Cybervandalism:
A hacker is an individual who intends to gain unauthorized access to a computer system.
Some hackers are satisfied merely by breaking into the files of an e-commerce site. Others have
more malicious intentions and commit Cybervandalism, intentionally disrupting, defacing, or
even destroying the site.
5. Credit Card Fraud/Theft:
Theft of credit card data is one of the most feared occurrences on the Internet.
Fear that credit card information will be stolen frequently prevents users from making online
purchases.
6. Spoofing (Pharming) and Spam (Junk) Web Sites:
Spoofing a Web site is also called “pharming,”
It involves redirecting a Web link to an address different from the Intended one, with the site
masquerading as the intended destination.
Spam Web sites are the sites that promise to offer some product or service, but in fact are a
collection of advertisements for other sites, some of which contain malicious code.
7. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks:
A denial of service (DoS) attack is an assault whose purpose is to disrupt computer access to an
Internet service such as the Web or e-mail.
It may involve Perpetrators using an unsuspecting computer to send an influx of confusing data
message or useless traffic to a computer network.
The victim computer network eventually jams, blocking legitimate visitors from accessing the
network.
DoS attacks typically cause a Web site to shut down, making it impossible for users to access the
site.
8. Sniffing:
A sniffer is a type of eavesdropping (spying) program that monitors information traveling over a
network.
When used legitimately, sniffers can help identify potential network trouble-spots, but when used
for criminal purposes, they can be damaging and very difficult to detect.
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-
mail messages, company files, and confidential reports.
9. Back Doors and Insider Attacks:
A back door is a program or set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network.
Once perpetrators gain access to unsecure computers, they often install a back door or modify an
existing program to include a back door, which allows them to continue to access the computer
remotely without the user’s knowledge.
How backdoors are installed into the computers
Some warms leave back doors, which have been used to spread other worms.
Programmers often build back doors into programs during system development which help
them save development time because the programmer can bypass security controls while
writing and testing programs.
A computer repair technician may install a back door while troubleshooting problems on a
computer.
Insider attacks
We tend to think the security threats to a business originate from outside the organization.
In fact, the largest threats to business institutions come from insiders.
Normally organizations tend to allow employees access to privileged information, and in the
presence of sloppy internal security procedures, they may cause severe damage.
10. Spoofing:
Spoofing is a technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network.
Types of spoofing
- E-mail spoofing;
This occurs when the sender’s address or other components of the e-mail header are altered so
that it appears the e-mail originated from a different sender.
- IP spoofing;
This occurs when an intruder computer fools a network into believing that its IP address is
associated with a trusted source.
Perpetrators of IP spoofing trick their victims into interacting with the phony Web site.
For example, the victim may provide confidential information or download files containing
viruses, worms, or other malware.
11. Poorly Designed Server and Client Software:
Many security threats prey on poorly designed server and client software, sometimes in the
operating system and sometimes in the application software.
Given their complexity and design objectives, all operating systems and application software have
vulnerabilities or (flaw) weaknesses that hackers can exploit.
AVOID
× Using your name, birthday, ID card number or telephone number.
× A password of all digits or all the same letter.
Software theft
Forms of software theft;
• Physical stealing of the media (e.g. floppy diskette, CD ROM e.t.c) that contains the
software
• Software piracy
This is the unauthorized and illegal duplication of copyrighted software.
4. SYSTEM FAILURE
This is a prolonged malfunctioning of a computer that can cause hardware, software, data or
information loss.
Causes of system failure
i. Aging hardware
ii. Natural disasters (such as fires, floods, storms or earthquakes etc)
iii. Electrical power variations
COMPUTER ETHICS
Computer ethics are moral guidelines that govern the use of computers and information systems.
It encompasses the following areas;
a. Unauthorized access and use of computer systems.
b. Software piracy
c. Information privacy
d. Intellectual property rights
e. Codes of conduct
a. Unauthorized access and use of computer systems.
Definitions;
Unauthorized access is the use of a computer system or a network without permission of
the owner.
Unauthorized use is the use of a computer or its data for unapproved or illegal activities.
These activities include;
• An employee using a company’s computer to send personal email without permission
from the managers.
• Gaining access to a bank’s computer and perform unauthorized money transfer.
b. Software piracy
This refers to the unauthorized and illegal duplication of copyrighted software.
This may involve duplicating someone’s movie, song, book, etc, without his/her permission.
NB:
Whenever a consumer purchases a software, he/she is only provided with a license agreement
which gives him/her the right to use the software.
a) Cookies
A cookie is a small text file that a Web server stores on your computer that allows a site to
track the actions of its visitors.
E-commerce, Webcasting, and other Web applications often rely on cookies to identify users
and track information about viewers, customers, and subscribers.
NB; Although the cookie resides on an individual’s hard drive, it does not interact with
other information store on the system.
Uses of cookies
• Web sites that allow for personalization often use cookies to track user preferences. On
such sites, you may be asked to fill in a form requesting personal information, such as
your name, postal code, or site preferences.
• A news Web site, for example, might allow users to customize their viewing preferences
to display certain stock quotes. Your preferences are stored in cookies on your hard disk.
• Many Web sites use cookies to store users' passwords, so they do not need to enter it
every time they log in to the Web site.
• Online shopping sites generally use session cookies to keep track of items in your
shopping cart. This way, you can start an order during one Web session and finish it on
another day in another session. Session cookies usually expire after a certain time, such
as a week or a month.
• Some Web sites use cookies to track how regularly you visit a site and the Web pages
you visit while at the site.
• Web sites may use cookie to target advertisements. Your interests and browsing habits
are stored in the cookie.
d. Information accuracy
Millions and millions of information reside on websites of certain organizations. But in some
instances, the website providing access to information may not be the one which created it.
Some of the information on these websites may not be 100% accurate.
Therefore, it is always good to evaluate and analyze the information provided on a web page
before using it.
GREEN COMPUTING
Green computing is the study and practice of environmentally sustainable use of computers and
related IT resources.
Or
Green computing is the study and practice of designing, manufacturing, using, and disposing of
computers, servers, and associated subsystems such as monitors, printers, storage devices, and
networking and communications systems efficiently and effectively with minimal or no impact on
the environment.
Goals of green computing
Reduce the use of hazardous materials,
Maximize energy efficiency during the product's lifetime,
Promote the recyclability or biodegradability of malfunctioning products and factory
waste.
The work habits of computer users and businesses can be modified to minimize adverse impact on
the global environment. Here are some steps that can be taken:
• Create a power plan which allows the system to automatically turn off components such as
monitors and hard drives after set periods of inactivity.
• Try to do computer-related tasks during contiguous, intensive blocks of time, leaving
hardware off at other times. Avoid using the computers for long periods of time as this
may lead to health and safety problems.
• Power-up and power-down energy-intensive peripherals such as laser printers, scanners,
etc. according to need.
• Use liquid-crystal-display (LCD) monitors rather than cathode-ray-tube (CRT) monitors.
This is because, CRT monitors emit a lot of electromagnetic radiations.
• Use notebook computers rather than desktop computers whenever possible. Notebooks
computers consume less energy, emit very little heat and other electromagnetic radiations.
• Minimize the use of paper and properly recycle waste paper.
• Recycle computing equipment as this can keep harmful materials such as lead, mercury,
and hexavalent chromium out of landfills.
• Dispose of e-waste according to federal, state and local regulations.
• Implement telecommuting (in which workers can accomplish much of their work away
from their standard work places preferably from home). This reduces greenhouse gases
emitted during travel, increases worker satisfaction and increases profit margins as a result
of lower costs for office space, heat, lighting, etc.
• Terminal servers should be used instead of standalone computers. This cuts down power
consumption to around 1/8 the amount of energy of a normal workstation, resulting in a
decrease of energy costs and consumption.
Questions
1. Explain what is meant by the following terms.
a. Phishing
b. Pharming
c. Spam [3]
ICT INDUSTRY
Careers in computer and computing (People or Users)
The high rate of growth of computers has resulted in many new kinds of jobs and careers.
These include;
i. Computer operators
Responsibilities
• Entering data into the computer for processing
• Keeping up-to-date records (log files) of all information processing activities.
ii. Computer technician
Is a person responsible for the maintenance, upgrading and repairing of computers and related
devices
Responsibilities
• Troubleshooting computer hardware and software related problems
• Assembling and upgrading computers and their components
• Ensuring that all computer related accessories such as printers, modems, storage media
and devices are in a good working condition.
• In big computer companies, Technicians normally help hardware engineers in
designing and creating some computer components such as storage devices,
motherboards, etc.
iii. Systems analyst
This is a person who is responsible for analyzing a company’s needs or problems, then designs
and develops a computer based information system to help prevent the problem.
Responsibilities
• Reviewing the current manual or redundant information system and making
recommendations on how to replace it with a more efficient one.
• Working with programmers to construct and test the system.
• Coordinating training for users on how to use the new system.
iv. Computer programmer
Large organizations such as insurance companies, banks, manufacturing firms and
government agencies hire programmers to work together with systems analyst in order to;
• Write in – house application programs or system programs.
• Customize commercial application package to suite the organization needs.
• Test, debug, install and maintain programs developed or customized for the
organization.
v. Software engineer
Is a person who is skilled in software development and technical operation of computer
hardware.
Responsibilities
• Developing system and application software
• Developing user and technical documentations for the new software.
• Maintaining and updating the software to meet day to day requirements while
overcoming challenges.
vi. Computer engineer
Responsibilities
• Design and develop computer components such as storage devices, motherboards, and
other electronic components.
• Determine the electrical power requirement of each computer component.
• Re – engineer computer components to enhance its functionality and efficiency.
• Design and develop engineering and manufacturing computer controlled devices such
as robots.
vii. Information systems manager
Responsibilities
• He controls, plans, staffs, schedules and monitors all the activities of the ICT
department in the organization.
• Using computerized management system (MIS). The manager can test the impact that
an alternative course of action might have on the business.
• Ensures that all tasks in the IT department are done correctly and on time in order to
support business planning, control and decision making process.
• Prepares budgets for the ICT department.
• Keeps the department’s inventory records up-to-date.
• Manages the human resource within the ICT department.
viii. Database administrators (DBA)
Responsibilities
• Designing and developing database applications for the organization.
• Setting up security measures needed to control access to data and information.
• Keeping the database up-to-date by adding new records, modifying or deleting un
necessary records.
ix. Computer trainer/Instructor/Teacher
Due to the dynamic nature of computers and information technology, there is a high demand
for qualified ICT trainers.
Responsibilities
• Training people on how to use a computer and various application programs.
• Developing training reference materials
• Guide learners on how to acquire knowledge through carrying out research.
• Advising the learners on the best career opportunities in the broad field of ICT.
• Preparing learners for ICT examinations.
x. Website administrator / Webmaster
Responsibilities
• Developing and testing websites
• Maintaining, updating and modifying information on the websites to meet new
demands by the users.
• Monitoring the access and use of internet connection by enforcing security measures.
• Downloading information needed by an organization or institution from the internet
websites.
xi. Computer graphics designer