Computer Notes
Computer Notes
Kwambiana
Education Background
• BSc with education (Math’s & ICT)
• MSc. Information Technology and System (ITS)
Contact
Phone: 0745854660
Email: [email protected]
Course Information
Code: GSU 07102
Number of Credits: 12
Integrated Method of Assessment:
Continuous Assessment: 40%
Semester Examination: 60%
Meaning of Computer
A Computer is defined as an electronic
machine that accepts input (data), processes it
and gives out results (information).
These are:
1. Input
- It accepts data or instructions by way of input
2. Storage
- It stores data
3. Processing
- It can process data as required by the user
4. Output
- It gives results in the form of output, and
5. Control
- It controls all operations inside a computer.
Components of a computer
Components of a computer
A computer is divided into two main components
namely; Hardware and Software:-
CPU
system unit Mother Board
Power Cable
Data Cable
Fan CMOS battery Power Supply
Components of a computer
Processing Devices.
-For example central processing unit and fan
Output Devices.
-For example Monitor, printers, projector,
speaker, etc
Storage Devices.
Are divided into primary and secondary storage
Primary storage, this memory is for execution;
RAM – Random Access Memory
ROM - Read only Memory
A ROM Chip
RAM
ROM
Components of a computer
CD ROMS
BIOS
- BIOS (Basic Input Output System) is the
program of personal computer's
microprocessor uses to get the computer
system started after you turn it on. It also
manages data flow between the computer's
operating system and attached devices such as
the hard disk, video adapter, keyboard, mouse
and printer.
Components of a computer
Utility programs
- A program that performs a specific task
related to the management of computer
functions, resources, or files, password
protection, memory management, virus
protection, and file compression
Components of a computer
Assignment 1:
Individual assignment – 100% Marks
Alternative-2
• On the Desktop Select the Shortcut for the
program
• Press Enter(or Double click the icon) to execute the
program (or Right click the icon then click open)
FILES MANAGEMENT
FILES MANAGEMENT
• File Management is the organization of folders
and files in the Computer.
• It is important to organize your files and
documents well so that you can easily manage
them in the future. Files can be stored directly
in the Hard Disk (Drive), in the folders within
the Hard Disk or in the subfolders.
FILES MANAGEMENT
Drive
• Drive is defined as a media or device used for
data storage. Examples of drives include all
secondary storage.
• The operating system usually name installed
Drives with letters A, B, C, D……Z as follows.
FILES MANAGEMENT
Folder/Directory
• Folder/Directory is defined as a named storage
location which can contain files and/or
subfolders/Subdirectories. While Subfolder is
defined as a folder inside another folder.
File
• File is defined as a collection of related data
given a unique name.
FILES MANAGEMENT
File extension
BACK UP DATA
1. Mainframe Computers:
Highly critical applications such as bulk data
processing
Multiple operating systems and operate as a
number of virtual machines
6 feet tall
COMPUTER CLASSIFICATIONS
2. A supercomputer :
Mainframe computer that has been optimized
for speed and processing power.
Supercomputers are used for extremely
calculation-intensive tasks such simulating
nuclear bomb and global weather patterns
COMPUTER CLASSIFICATIONS
3. Microcomputers or Personal computers (PC’s) :
Microprocessor (central processing unit - CPU)
They do not occupy space as much as
mainframes do
A monitor, a keyboard and other similar input-
output devices, computer memory and power
supply unit come packaged in a Microcomputer
Best choice for single-user tasks
COMPUTER CLASSIFICATIONS
The following are categories of Microcomputer/
personal computer
1. Desktops: A desktop is intended to be used on
a single location
COMPUTER CLASSIFICATIONS
2. Laptops: Similar in operation to desktops,
laptop computers are miniaturized and
optimized for mobile use
Their portability and capacity to operate on
battery power have proven to be of great help
to mobile users.
COMPUTER CLASSIFICATIONS
3. Netbooks: They fall in the category of laptops,
but are inexpensive and relatively smaller in
size.
COMPUTER CLASSIFICATIONS
4. Personal Digital Assistant (PDA): It is a
handheld computer and popularly known as a
palmtop. It has a touch screen and a memory
card for storage of data.
COMPUTER CLASSIFICATIONS
5. Tablet Computers: Tablets are mobile
computers that are very handy to use. They
use the touch screen technology. Tablets come
with an onscreen keyboard or use a stylus or a
digital pen.
COMPUTER CLASSIFICATIONS
6. Servers: They are computers designed to
provide services to client machines in a
computer network
A Server
COMPUTER CLASSIFICATIONS
7. Smartphones: They are computers designed to
provide Communication between users.
COMPUTER EVOLUTION
Historical background of Computers
The history of computers can be traced back to
the time when human were struggling to
invert tools that could perform mathematical
Calculations such as addition, Subtraction,
Division, Multiplication. The following are
tools developed for the purpose of performing
mathematical calculations.
COMPUTER EVOLUTION
• Abacus
Abacus means a calculating board. It was
invented by Chinese people back in 3000 BC.
Abacus is a mechanical counting device invented
to count large numbers by early man.
COMPUTER EVOLUTION
• Napier’s bones
Napier’s bones was developed by a Scottish
mathematician called John Napier in the 17th
century. It performed calculations of products
and quotients of numbers. It is made up of
marked strips of wood or bones, placed side by
side to each other.
COMPUTER EVOLUTION
• Slide ruler
Slide ruler is a mechanical machine used to
perform arithmetic operations. It was inverted
by William Oughtred in 17th century. Slide ruler
was commonly used to perform arithmetic
operation up to 1970’s when electronic
calculators was invented and took over.
COMPUTER EVOLUTION
• Slide ruler
COMPUTER EVOLUTION
• The Mark I
It was invented in 1944 by Howard Aiken who was
funded by IBM Company. In this project Howard
Aiken approached IBM for funding and received
$1Mil (1 million US-Dollars). Mark-I Launched IBM
into business machine development. IBM stands
for International Business Machines
COMPUTER EVOLUTION
COMPUTER EVOLUTION
COMPUTER GENERATIONS
• After the design of Analytical engine by Charles
Babbage it took some years before emergence of
electronic computers. Computer evolution is
classified into five generations depending on the
technology used.
COMPUTER EVOLUTION
(ENIAC) Computer
COMPUTER EVOLUTION
(UNIVAC I
Computer full view)
COMPUTER EVOLUTION
Characteristics:
a) Emitted less heat compared to first generation
computers.
b) Transistors were used in place of vacuum tubes
c) Relative smaller in size compared to first
generation computers
d) Used assembly language programming
e) Relied on magnetic core memories.
COMPUTER EVOLUTION
Characteristics
a) IC was used instead of transistors in the third
generation computers.
b) Third generation computers were smaller in size
and cheaper as compare to the second generation
computers.
c) They were fast and more reliable.
d) High level language was developed.
e) Magnetic core and solid states as main storage.
f) They were able to reduce computational time and
had low maintenance cost.
g) Input/Output devices became more sophisticated.
COMPUTER EVOLUTION
PDP-8, PDP-11, ICL 2900, IBM 360 and IBM 370 are
the examples of third generation computers.
(IBM 360 Computer)
COMPUTER EVOLUTION
• Fourth Generation Computers (1971-1990)
After 1971 the fourth generation computers were
built. The fourth generation computers were
the extension of third generation technology. The
fourth generation computers emerged with
development of the VLSI (Very Large Scale
Integration).With the help of VLSI technology
microprocessor came into existence. The
computers were designed by using microprocessor,
as thousands of integrated circuits were built onto a
single silicon chip.
COMPUTER EVOLUTION
Characteristics
1) The fifth generation computers will use super large
scale integrated chips.
2) They will have artificial intelligence.
3) They will be able to recognize image and graphs.
4) Fifth generation computer aims to be able
to solve highly complex problem including decision
making, logical reasoning.
5) They will be able to use more than one CPU for
faster processing speed.
6) Fifth generation computers are intended
to work with natural language.
7) Massive connectivity to Internet and Intranet
COMPUTER EVOLUTION
COMPUTER SECURITY
Note:
• To prevent your computer from virus attack you
need to install Antivirus software and update it
frequently. Examples of antivirus software are
Window defender, Avast, AVG, MacAfee,
Kaspersky, Norton etc.
Advantages of using Computers
• Data Storage
• Education
• Research
• Marketing
• Creating and Editing of Business documents
• Transfer of information
• Communication
• Human Resources Management
Disadvantages of computers in an organization.
• Requires Training
• Computer Crime
System
Is a collection of various components
that solve specific problems.
Explain information systems; types of
information systems
Information System
Is an interrelated components working
together to collect, process, store, and
disseminate information to support
coordination and decision making in
an organization.
Explain information systems; types of
information systems
Explain information systems; types of
information systems
Role of TPS
• Produce information for other systems
• Cross boundaries (internal and external)
• Used by operational personnel and
supervisory levels
• Efficiency oriented
Explain information systems; types of
information systems
Examples of TPS
• Payroll processing
• Sales and order processing
• Inventory management
• Accounts payable and receivable
Explain information systems; types of
information systems
Explain information systems; types of
information systems
OBJECTIVES OF TPS
• Efficient and effective operation of the
organization
• Provide timely documents and reports
• Increases the competitive advantage
• Provides necessary data for tactical and
strategic systems such as DSS
• Provide a framework for analyzing an
organization’s activities
Explain information systems; types of
information systems
Role of DSS
• Support ill- structured or semi-structured
decisions
• Have analytical and/or modelling capacity
• Used by more senior managerial levels
• Are concerned with predicting the future
• Are effectiveness oriented
Explain information systems; types of
information systems
Role of EIS
• Are concerned with ease of use
• Are concerned with predicting the future
• Are effectiveness oriented
• Are highly flexible
• Support unstructured decisions
• Use internal and external data sources
• Used only at the most senior management levels
Explain information systems; types of
information systems
Some examples:
Executive Information Systems tend to be highly
individualized and are often custom made for a
particular client group.
• Integrity:
- Information system should not have/create any
adverse side effects.
• Reliability:
- Information system should be defect-free. It should
not fail during execution.
• Efficiency:
- Information system should make effective use of
resources.
Describe the characteristics of
information systems
• Security:
- Information system should not cause ill effects on data
and hardware. The data should be kept secure from
external threats.
• Maintainability:
- Information system maintenance should be easy for
any kind of user.
• Flexibility:
-Changes in information system should be easy to make.
Describe the characteristics of
information systems
• Testability:
-Testing the information system should be easy.
• Scalability:
-Easily upgradeable for more work or for larger number
of users
• Extensibility:
-Accessible across multiple platforms/devices
Explain the importance of information
systems in real world
By definition:
Information systems development, is the
systematic approach of engineering the
Implementation of information system.
1. Planning
The planning phase is the fundamental process of
understanding why an information system should be
built and determining how the project team will go
about building it. It has two steps:
– Project initiation, Most ideas for new systems come
from outside the IS area (e.g., from the Procurement
and Logistic department, accounting department,
etc.) in the form of a system request.
Describe steps for developing information
systems
2. Analysis
The analysis phase answers the questions of who
will use the system, what the system will do, where
and when it will be used. During this phase, the
project team investigates any current system(s),
identifies opportunities for improvement, and
Describe steps for developing information
systems
3. Design
The design phase decides how the system will
operate, in terms of the hardware, software, and
network infrastructure; the user interface, forms
and reports; and the specific programs, databases,
and files that will be needed.
• Waterfall Development,
This is the original structured design methodology (still
used today). With waterfall development–based
methodologies, the analysts and users proceed in
sequence from one phase to the next. This methodology is
referred to as waterfall development because it moves
forward from phase to phase in the same manner as a
waterfall
Develop information systems using
information technology methods and
techniques
• Parallel Development
Parallel development methodology attempts to
address the problem of long delays between the
analysis phase and the delivery of the system. Instead
of doing design and implementation in sequence, it
performs a general design for the whole system and
then divides the project into a series of distinct
subprojects that can be designed and implemented in
parallel.
Develop information systems using
information technology methods and
techniques
• Phased Development
A phased development-based methodology breaks an
overall system into a series of versions that are
developed sequentially.
The analysis phase identifies the overall system
concept, and the project team, users, and system
sponsor then categorize the requirements into a
series of versions.
Develop information systems using
information technology methods and
techniques
• Prototyping
A prototyping-based methodology performs the
analysis, design, and implementation phases
concurrently, and all three phases are performed
repeatedly in a cycle until the system is completed.
With these methodologies, the basics of analysis and
design are performed, and provide system prototype.
(system prototype is a quick-and-dirty program that
provides a minimal amount of features).
Develop information systems using
information technology methods and
techniques
• Throwaway Prototyping
Throwaway prototyping-based methodologies are
similar to prototyping-based methodologies in that
they include the development of prototypes;
however, throwaway prototypes are done at a
different point in the SDLC. These prototypes are used
for a very different purpose than those previously
discussed, and they have a very different appearance.
Develop information systems using
information technology methods and
techniques
3. Agile Development
A third category of systems development
methodologies is still emerging today is agile
development. All agile development methodologies
are based on the agile manifesto.
agile methodologies focus on streamlining the
system-development process by eliminating much of
the modeling and documentation overhead and the
time spent on those tasks.
Develop information systems using
information technology methods and
techniques
System quality
-is the process of ensuring requirements and standards are met.
•Unauthorized Access
Hackers and crackers gain unauthorized access by finding
weaknesses in the security protections employed by Web
sites and computer systems, often taking advantage of
various features of the Internet that make it an open
system that is easy to use.
•Scams
These are usually in the form of ads or spam emails that
include promises of rewards or offers of unrealistic
amounts of money.
Identify security threats to organization
information and information systems
•Computer Viruses
Viruses includes
Worms - destroy data and programs as well as disrupt the
operation of computer
Trojan - appears as a legitimate in order to gain access to
computer, the use of Trojans are to gain access to confidential
information of a company.
Identify security threats to organization
information and information systems
•Phishing
This type of attack involves hackers sending malicious
email attachments or URLs to users to gain access to their
accounts or computer.
• Social Engineering
Social engineering involves criminals making direct
contact with the system user usually by phone or email.
They want to gain your confidence and usually pose as a
customer service agent so you’ll give the necessary
information needed.
Identify security threats to organization
information and information systems
•Theft
Theft includes Physical theft (theft of hardware and
software).
Data theft normally involves making copies of important
files without causing any harm to the originals .This can
involve stealing sensitive information and confidential
data or making unauthorized changes to computer
records .Such data can include passwords activation keys
to software, sensitive correspondence, and any other
information that is stored on a victim’s computer.
Describe techniques for avoiding/prevent security
threats