Computer Notes
Computer Notes
1. DATA
Data is defined as raw facts and figures that have less meaning to the end user.
1. Student’s marks
2. Employee salary and wedges.
2. INFORMATION
Examples of information
1. A students report
2. Payroll for employees
1. To acquire general knowledge and skills in the use of a computer and related
technologies.
2. To use the knowledge acquired in computer studies to other fields like Banking,
Education etc.
3. To use variety of computer technologies to access, analyze and interpret information.
4. To exhibit basic computer skills for employment.
5. To acquire knowledge as a foundation for further studies in computer technology.
1
HISTORY & EVOLUTION OF COMPUTERS
Evolution of computers
Evolution is the gradual development of computers in terms of technology and physical
size from the 1st generation to the present generation.
History of Computers
Abacus.
Napier’s Bones.
Slide rule.
The era of the mechanical computer, was between 1623 and 1942. The mechanical
computers are machines that are characterized with mechanical gears, wheels, moving
parts, electro-mechanical relays, and dials and could use punched cards and tapes for data
storage.
2
Arithmetic Machine/Calculator.
In 1642, a French man Blaise Pascal was given a credit for the
first mechanical adding and subtracting machine that used
a system of gears and wheels. It had digits from one to
nine (1-9) arranged on wheels similar to odometer on
motor car.
Leibniz stepped/calculator
Arithmometer.
Analytical engine
3
A lady called Ada Lovelace was the world’s first computer programmer i.e she came up
with the idea of programming and worked with Babbage and later on developed the idea
of programming loops.
Hollerith’s Tabulator
4
COMPUTER GENERATION
OR
In earliest general purpose computer, most input and output devices were punched cards
and magnetic tapes. They were mainly made up of loops of vacuum tubes and magnetic
drum. They could run only one program at a time.
UNIVAC - Universal Automatic Computer. This was used by USA bureau of census from
1953.
1. They used vacuum tubes as their active element for internal operations.
2. They were large in size that is they could fill several rooms.
3. They were slow and could run one program at time.
4. They used punched cards and magnetic tapes to input and output data.
5. They used a great quantity of electricity and generated a lot of heat.
6. Programming was done in machine and assembler language.
7. They could not store much information i.e. they had limited primary memory.
8. They were expensive and terminals could be rented.
5
SECOND GENERATION [1959-1963]
By early 1960’s, computers were improved instead of using vacuum tubes they used
transistors which were much smaller than vacuum tubes therefore they reduced in size.
In the third generation, the integrated circuits [I.Cs’] replaced the transistors which are
small electronic components. The IC is so effective because its components do not need
to be wired directly to computer system board. Magnetic discs were used for secondary
storage and computers began to support multi programming and time storing.
6
FOURTH GENERATION
The fourth generation, Large Scale Integrated Circuits [LSIC] and Very Large Scale
Integrated Circuit [VLSIC] were developed whereby a special IC can contain a loop of up to
10,000,000 of transistors. In 1971 Ted Hoff of Intel Company developed a micro processor
which acted as CPU (Central Processing Unit).
1. They use micro processors as their active elements e.g. 386, 486 Pentium 1,2,3,4
2. They are small in size since were made by using LSIC and VLSIC
3. They are fast and reliable.
4. They have a high primary memory.
5. They led to introduction of wide variety of software e.g. windows, Jet audio e.t.c.
6. They led to the development of inter computer communication e.g. internet (is a global
system of interconnected computer networks)
7. The price of computers dropped considerably and affordable
FIFTH GENERATION
The fifth generation is under development whereby, they will be using very large scale
micro processor circuits in a parallel architecture and highly sophisticated operating
system. In this generation, it is believed that computer will be sophisticated to extent that
it may be possible to talk to it in a human like manner.
Conclusion:
Computers are becoming increasingly smaller, more powerful and less expensive.
7
COMPUTERS TODAY
1. SPEED
Computers are quite fast in their operation in that their speed is measured in millions
of instructions per second (MIPs). It is capable of doing work assigned to it within a
short time.
2. ACCURACY
Computers are very accurate machines and they hardly make any mistake. But
mistakes depend on the user. A computer is capable of detecting and correcting the
mistakes made by user. Therefore this applies if wrong data is entered into a
computer, wrong results are expected i.e. Gabbage in Gabbage out
3. STORAGE
For a computer to be able to work, it must have some form of work space where data
is stored before being output to particular devices like hard disk/drive, floppy diskette,
and flash disks e.t.c. A computer can store data temporally during processing and
permanently in its secondary storage devices for future reference.
5. VERSATILE
A computer is versatile i.e. it has capabilities of performing tasks in many different
ways. They can be used as personal computers, for home uses, for business oriented
tasks, weather forecasting, space explorations, teaching, railways, banking, medicine
etc. All Modern computers can perform different kind of tasks simultaneously.
6. COMMUNICATIVE
A computer is communicative were by information from one computer can be
accessed via another computer.
7. AUTOMOTION
A computer is an automatic electric device which can perform several programmed
routines without supervision e.g. Booting (is the process of powering on and starting
the operating system of the computer)
8
8. ARTIFICIAL INTELLIGENCE
Computers have artificial intelligence i.e. they can respond to requests given to them
and provide solutions to them. They are capable of doing so by use of programs to
make decisions and functions accordingly.
1. Industrial use.
Today modern industries use computers in the processing of good, quality control and
inventory management i.e in production planning, scheduling and reporting were by a
computing system will provide real time information on production.
2. Process Control
Computers are widely used in an environment to control chemical and mechanical
processes.
3. Business purposes
Very many businesses have realized the benefits of a computer i.e. stock exchange
(Money markets). You only need to sit in front of your computer and start to trade
shares worldwide without going there physically.
4. Scientific Research
Recent advancement in scientific research have been possible due to the use of
computers i.e. New drugs have been introduced, exploration in space has been
possible and in places where human beings can survive, architectural construction has
been greatly improved through the use of computers. It is possible to look at a plan for
a house you want to build on the outside and inside.
5. Recreation Purpose.
When bored in the office, you can just use your computer to play some games such as
golf, car- racing e.t.c. With this you don’t need to have those big cars to enjoy the sport
probably like Susan Muwonge. All this is possible with computer games. Some which
exist are share ware (Free software)
Shareware programs are supposed to be shared freely while other programs need a
license to be run.
6. Education Purpose.
With the development of a computer the Internet has emerged. Many local institutions
have been linked with those big universities and libraries overseas hence facilitating
education and research. This further led to the creation of virtual universities i.e.
universities with low physical buildings, lecture rooms or homes of residence but off
course giving the necessary lectures on the internet thus the term Virtual Reality.
9
7. Banking
It is also used in efficiency management control in insurance and banking system to
manage their large volume of task or work. Some other commercial application of
computers is ATM (Automatic Teller Machine) which is used for 24 hours banking
services.
9. Computers are also used in health line services i.e consultation to expensive foreign
experts without traveling to their premises/countries.
11. Communications
Computers provide cheap convenient means of communications by use of E-mail
(Electronic Mail).
12. Employment
Employment opportunities in computing industries worldwide are at an increasing
rate and many countries have developed because of their computing industry.
Moral decay
Today the youth are glued on internet watching immoral Pictures, movies and magazines
etc i.e. pornography and coping western culture.
Forgery
Computers are misused by some people to create or make fake money, certificates,
reports, passports, e.t.c. using sophisticated printers
Power Consumption
Computers are electric devices therefore they need power to operate which is costly and
cannot be afforded by many people.
10
Computer Virus (Destruction Programs)
Computers especially on internet can easily be attacked by computer virus which is so
destructive to useful data and programs. Hence may lead to total loss to
company/organization.
Eye Defects
Computers can affect human eye sight especially to those users who are frequently using
the computer hence they might end up putting on spectacles.
Unemployment
Computers are mainly used by literate people hence cannot be used by illiterate people
hence causing unemployment amongst people in a society.
Body Fatigue
This is as a result of using of improper computer chairs and computer tables when using a
computer.
This comes as a result of bad siting posture
11
COMPUTER CLASSIFICATION
It refers to categorizing computers depending on certain factors as explained below.
There are four categories/classifications of computers namely
1. Classification by process
2. Classification by purpose.
3. Classification by size and capacity
4. Classification by processor power
CLASSIFICATION BY PROCESS:
These perform arithmetic and logical functions. They process data that is represented in
form of discrete values (they are numbers that can be defined like 1, 2, 3, etc)(discreet
values are whole numbers with out points) examples of digital computers include;
- Digital watches,
- Digital calculators.
Most computers are digital.
These are computers that have the combined features of both the digital and analog
computers. The hybrid computers are further classified according to the purpose / the
work that they were designed for.
12
CLASSIFICATION BY PURPOSE:
Computers are also classified according to there purpose. These purposes include
These are categorized in to two classes;
- Special purpose computers.
- General purpose computers.
These are designed to handle only a particular task. This form of operation is restricted in
nature. They are designed to perform a particular task and there no other tasks that they
can perform. E.g.
- Digital watches, -ATM machines
- Pocket calculators. – Barcode readers
Currently special purpose computers are employed in devices like missiles; Lifts in tall
buildings also employ special purpose computers.
These are designed to solve a wide range of tasks/ problems. However, they can be
adopted to perform a particular task/solve specific problem by means of a special
program.
In the past, computers used to be classified according to the use they were put to, e.g.
- Word processing computers were used for only word processing,
- Desktop publishing computers for desktop publishing and
- Rational database computer for a database management.
With a trend in technology, this has been reserved (stopped) and now you can have a
single computer with word processing, desktop publishing and database application
capabilities.
CLASSIFICATION BY SIZE
Computer systems can be classified according to their size as follows:
- Micro computers
- Mini computers
- Main frame computers
- Super frame computers
Micro Computers
A micro computer is a single user general purpose computer that can perform all inputs,
process, output, and then storage activities by itself. They can be used by one person at a
time and they are also known as personal computers (P.Cs)
13
- They are small in size.
- There more reliable then modular.
EXAMPLES OF MICRO COMPUTERS INCLUDE;
- Desktop computers
- Tower model computers
- Note book computer (laptop)
- Handheld computers (palmtop)
(i) Laptop
A Laptop is also referred to as a notebook computer. It is a personal computer small
enough to fit on the lap. It has features that are being incorporated.
Characteristics of laptop
- It fast in processing data.
- It consumes less compared to desktop computers.
- It is portable and mainly used for mobility.
- It has limited support of peripheral devices.
Note: A peripheral is any device that can be connected to the computer system unit, like
mouse, keyboard, projector etc.
14
(iv) Hand Held Computers.
These are sometimes called palmtop computers. These are small/ portable computers
that can fit in the palm of the user.
They are designed for those users that are always on the move (travelers).
They can easily be put in the shirt pocket and any time one can check on e-mails, take few
notes and keep schedules and appointments with these palmtop computers.
They are also referred to as personal digital assistant (PDA). Modern PDA’s have been
integrated with cellular phones.
MINI COMPUTERS
A mini computer is larger than a micro computer which is powerful enough and widely
used in real time applications e.g. air traffic, factory automation. A mini computer is multi
user computer that support many users at time. It falls in the range of 50-500 users at a
time depending on the model.
E.g. DECS VAX range and IBM AS400 range.
Terminals
Server.
15
- It is physically bigger than the micro computer but smaller than the main frame.
- They can support moderate range of peripherals.
- They are more powerful than micro computers.
- They can support 50 to 500 users at time model.
- They have a large storage than micro computers.
This is the largest computer so far and fast enough with a large storage capacity. It can
support thousands of users at the same time. The main frame computers are used in
banks, airlines, and insurance companies. Each user works separately with a separate
keyboard and monitor but they all use the same processor/ Central Processing Unit (CPU)
E.g. IBM4381, ICL39 series, CDC cyber series.
SUPER COMPUTER
16
This is the fastest, most powerful, most expensive and highest capacity computer. They
are used for applications that are scientific and complex mathematical computations.
They require a special air conditioned room. They are often used for research, among
other uses are Worldwide weather forecasting and analysis of weather, oil exploitation,
air craft design, Invasion of nuclear weapon system, predications of the spread of
epidemic e.t.c. Unlike a micro computer a super computer has several processors hence
too powerful.
Therefore computers with high processing power require more system resources such as
system memory, hard disk space including modern programs. All these put together
makes computers with higher processing power better productive tools.
17
COMPUTER SYSTEM
OR
SYSTEM
A system is a group of many inter related parts which work together to achieve a common
goal.
A COMPUTER
18
COMPUTER HARD WARE
These are the physical components of a computer that can physically be touched and felt
(tangible). Parts you can see, feel then touch e.g. keyboard, mouse, C.P.U (system unit)
Input devices are hardware that are used to enter/ capture data then convert it into a
suitable form (digital form) for computer processing e.g. keyboard, mouse, scanner, digital
camera, light pen, touch screen, web cam, sensors, joystick, microphone, touch pad.
1. KEY BOARD
This is an input hard ware/ device that is used to type and enter instructions into a
computer. It looks like the keyboard of an ordinary typewriter but with some special keys
like:-The control key (CTRL), the Alter key (ALT), the Escape key (ESC), the Arrow keys, and
the function keys ranging from F1 to F12 and each key has its function.
19
POINTING INPUT DEVICES
2. MOUSE
A mouse is an input device that acts as an electronic finger that is used to select icons and
applications on a computer screen (monitor). It complements the keyboard as regards
input of data.
The mouse employs the principle of moving a ball in which turn moves rollers adjacent to
it. The rollers then translate the electrical codes that relocate the pointer or cursor on the
different points or parts of the screen, to select icons.
Icons are graphics or pictures that represent a program or folder or a file on a computer.
Point
It is to move a pointer to a desired spot on the screen such as over a particular object or
word.
Click
It is to press and quick release the left mouse button. A click often selects an item on
screen
Double click
It is to press and release the left mouse button twice as quickly as possible. Double click
often opens a document or it starts a program.
Drag
It is to press and hold down the left mouse button and move it in different locations on
the screen.
Drop
It is to release the mouse button after drag therefore drag and drop is an activity that
moves item on different positions on the screen.
Right click
20
It is to press the right mouse bottom and release which brings up popup menu with
oppositions to chose from.
ADVANTAGES OF USING A MOUSE
WAYS THROUGH WHICH MOUSE CAN BE PROTECTED FROM THE ABOVE PROBLEMS
3. TRACK BALL
This is another pointing device that functions like a mouse. A track ball has a movable ball
on top of stationary device that is rotated with finger or palm of a hand. A track ball is in
built into the key board especially on some portable devices like laptop, phones e.t.c.
21
3. TOUCH PAD
A touch pad is a flat rectangular device that has weak electric fields to sense the touch as
the users moves the finger tips. It used to control the pointer with a finger. The Cursor
follows the movement of the finger on the pad. You can click by tapping the pad surface.
4. JOYSTICK
This is a pointing device that consists of a vertical handle which looks like a gear shift lever
mounted on a base with two buttons. It mainly used in video games in some computer
aided design system and in accomplished robot system.
5. LIGHT PEN
This is a pointing device that can detect the presence of light. These are used in high
technological designs. They have a beam of light that is radiated into different parts of a
specialized screen to input data. These beams of light are very small and sharp and
therefore much précised. They are used in the designing of integrated circuits (I Cs), also
used by health care professionals e.g. doctors and dentists work
6. TOUCH SCREENS
A touch screen is an electronic visual display that can detect the presence and location of
a touch within the display area. The term generally refers to touch or contact to the
display of the device by a finger or hand. Touch screens can also sense other passive
objects, such as a pen.
22
Areas where touch screens are used
- Touch screens are often used for information kiosks located in department.
- Touch screens are also used for ATM machines to allow easy access of bank accounts.
- Touch screens are also used in some places like stores, hotels, air ports, museums.
7. DIGITIZER:
This looks like the mouse except that it has a glass with a cross hair in the middle. The
cross hair acts as a guide during the input of data. It is used in conjunction with a digitizing
tablet. It is mainly used in cartography (map making and architectural drawing to
accurately trace the outlines on a map.
A stylus is a pen like pointing device which uses pressure to write texts and drawing.
Graphic Tablet is a flat rectangular electronic plastic board on which a stylus writes and
draws.
A graphic tablet corresponds to a specific location on screen. A graphic tablet can be used
to digitize drawing with great accuracy. Styles and graphics tablet are mainly used for
computer aided design and drafting by architects, map maker, artists and designers.
23
ADVANTAGES OF STYLUS AND GRAPHICS TABLET
DISADVANTAGES
- A stylus and graphics tablet normally has to work together and can it work
separately.
These are hard ware that capture images of hard copy and converts them into a digital
form for a computer processing.
9. OPTICAL SCANNERS
This is a device that can read text or illustrations printed on paper and translate the
information into a form the computer can use (digital form). It uses a laser beam and
reflected light to translate hard copy image of text, drawings, and photos in to the
computer in a digital form. The image can then be processed into the computer, displayed
on the monitor and then stored on the storage devices like a flash disk.
Bar codes are vertical strips or line marks or striped marks printed on retail products and
other items.
24
A barcode reader is a photo electric scanner that translates the barcode symbols into
digital form of which the corresponding information about the items is relived from store
computer and printed out for a customer as a receipt.
Barcodes
Records of sales are easily input into a computer which in return may be used for
accounting and restocking.
Plac
25
This is scanning technology that reads pencil marks and converts them to the computer.
OMR readers are often used for making multi choices, answer sheets; capturing data from
questionnaires, interviewed environment forms, mark sheets etc
- O M R has a better recognition rattan and fewer mistakes are made by machines to
read marks than OCR.
- A large volume of data can be collected easily and quickly without the need of trained
staff
It uses a scanning technology that reads special pre – printed characters and converts
them into a computer in a digital form. OCR readers are often used to turn around
documents e.g. electricity bill. OCR can also recognize hand human characters but
generally must be block printed
Pre-printed
Characters
ADVANTAGES OF OCR
DISAVANTAGES OF OCR
26
- It doesn’t work well with hand written character or those unusual fonts.
Magnetic Ink Character Recognition (MICR) is a technology that allows details from bank
cheques to be read into a computer quickly and accurately. The cheque number and bank
account number are printed at the bottom of each bank cheque in special magnetic ink using
a special font. These numbers can be detected by an MICR reader.
Special font
Used on the cheques
- The error rate for the magnetic scanning of a typical cheque is smaller than with
optical character recognition system.
- The use of magnetic printing allows the characters to be read reliably even if they
have been overprinted or obscured by other marks, such as cancellation stamps.
- The "can't read" rate is usually less than 1% while the substitution rate (misread rate)
is in the order of 1 per 100,000 characters.
ADVANTAGES
- Reading accurate and fast
27
DISADVANTAGES
- The amount of data that can be stored on strips is limited.
- The magnetic strips can be damaged by exposal to a strong magnetic field
15. VOICE RECONITIION DEVICE
Voice
recognition
on Samsung
phone
A digital camera is an input device that takes video or still photographs, or both, digitally
by recording images via an electronic image sensor. It stores the images on a flash
memory card or compact disc (C.D) or micro drive
28
- unwanted image taken can be deleted quickly
- Photographic images can be digitized directly without using a scanner
- Digital cameras are best for 3 dimensional objects while scanners are best for
dimensional objects
18. MICROPHONE
A microphone is an input device that allow user to speak to the computer to enter data
and instructions into the computer
29
20. SENSOR & REMOTE SENSOR
A sensor is an input device that detects external changes in an environment. An external
change includes; levels of light, temperature, Sound, position PH value and humidity. The
data received can be processed indirectly to influence the out of the system. When
sensors are located at some distance from the computer system they are known as
remote sensors.
Remote sensor
Physiological Traits are related to the shape of the body. Examples include, but are
not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris
recognition, which has largely replaced retina, and scent.
Behavioral traits are related to the behavior of a person. Examples include, but are
not limited to typing rhythm, gait, and voice. Some researchers[1] have coined the
term behaviometrics for this class of biometrics
30
COPUMTER OUTPUT DEVICES
These are computer hardware that converts processed data into a usable form. The
outputs are mainly categorized as printed output. (By use of Printers and plotters)
examples of outputs include; screen displays, speech output e.t.c.
i) MONITIORS
These are devices which are used to display the computer output. Information on a
display device is called a “soft copy” because it exists electronically. There are two
types/kinds of monitors which include
- Monochrome (One color)
- Color monitors
31
ADVANTAGES OF CRT MONITORS
- They emit more EMR (Electro Magnetic Radiations) than LCD monitors.
- They consume more electricity than LCD monitors.
- They occupy more space.
- Doesn’t break easily
LCD of flat panel screen use liquid and crystals to create images on the screen normally
used on portable computers such as Laptops, digital watches, Calculators, phones e.t.c
32
A PLASMA DISPLAY
A plasma display is an emissive flat panel display where light is created by phosphors
excited by a plasma discharge between two flat panels of glass. The gas discharge contains
no mercury a mixture of noble gases (neon and xenon) is used instead. This gas mixture is
inert and entirely harmless.
A video card is required to display colour on monitor. It converts digital output from the
computer in to analog video signal that is sent through cable to display devices. The
number of colors that a video card displaces is damaged by its BIT depth
33
ii) PROJECTORS
A projector is an output device that takes the image on a computer screen and cast it on
to a large screen for audience to see it clearly.
OR
Is a device that receives a signals from the computer and projects the corresponding data
signal on a projection screen using a lens system.
3. PRINTERS
A printer is an output device that produces texts and graphics on a physical medium such
as paper. The printer information output on a physical medium is called hard copy which
is more permanent than screen display (soft copy)
34
PRINTING MECHANISM
i) CHARACTER PRINTER
These are low speed printers that mimic the action of type writers by printing one
character at a time. The characters are output on the print heads directly. This means the
character font type cannot easily be modified e.g.
- Daisy wheel printer
- Thimble printer
They are relatively cheap and are commonly found in small business systems
These also use the same principle during printing just like the characters except that these
are much faster unlike character printers. Line printers print the whole line of characters
at once i.e. they print on one end of the paper to the other end of the line hence line
printers.
IMPACT PRINTERS
These are printers that produce a hard copy output with the print mechanism/heads
physically touching the print media.
35
DOT MATRIX
A dot matrix printer is an impact printer that produces printed images which a print head
striking mechanisms
DIASY WHEEL
BALL PRINTER
This is an impact printer that uses a rotating ball as a printer as a print head.
Impact printers have direct contact with the paper and non impact printers don’t have
direct contact with the paper.
36
NON IMPACT PRINTER
Non-impact printers are those printers that produce a hard copy output without the print
head touching the printing surface.
They use techniques such as ink spray, heat, xerography or laser to form printed copy.
INK JET
An inkjet printer is a non impact printer that forms characters and graphics by spreading
tiny drops of liquid ink on to a piece of paper
LASER PRINTER
The mechanism of a laser printer is similar to that of photo copier. Laser printers are also
known as page printers because they process and store the entire page before they
actually print it.
1. The initial cost of buying laser printers is high compared to other printers
2. They are more expensive than dot matrix printers and ink jet printers.
THERMAL PRINTERS
It generates images by posting electrically heated pins against a heat sensitive paper.
37
6. Screen display can include text, graphics and colour.
7. Scrolling enables focus on a particular or part of the document.
4. PLOTTER
A plotter is a sophisticated printers used to produce high quality drawings that can be
quite large (e.g. width up to 60 inches)
ADVANTAGES OF PLOTTER
1. Information produced is permanent
DISADVANTAGES OF PLOTTER
1. The time to get the print output is slow when compared with display devices
2. Paper is wastage for obtaining out put
3. They are generally nosier than displays devices
38
ADVANTAGES OF FAX MODEM
1. I t saves paper.
2. It allows the user to store received faxes on a computer received faxes can be
emailed to others.
This is a single piece of equipments that provides the functioning of printer, screen, photo
coping machines and fax mail
ADVANTAGES
1. A multi functioning device takes up less space than having a separate printer, scanner
, copy machines and fax machines
2. It is also significantly less expensive than purchasing each device separately
DISADVANTAGES
1. If a malfunctioning machine breaks down it loses all its functions
7. TERMINAL
39
A terminal is a device with a monitor and key board. The term terminal can also refer to
any device that sends and receives computer data.
1. DUMB TERMINAL
It has no processing power and cannot act as a standalone computer and must be
connected to server to operate
2. INTELLIGENT TERMINAL
It has memory and processor so it can perform some functions independent of host
computer.
Uses of terminals
i) An EPOS (electronic point of sell)
Terminal is used to lead purchase at the point where the consumer purchases the
produce or services
8. HEADPHONES.
These are a pair of small speakers, or a single small speaker, used to output sound from
the computer. They are similar to speakers, except they are worn on the ears, so only one
person can hear the output at a time.
9. SPEAKERS.
40
These are output used to output sound from the computer. Most of PCs have small
internal speaker that output only low quality sound. Users who need high quality sound
out put may use a pair of speakers for example Sub woofer connected to parts on so card
ADVANTAGES
1. They are ideal for visually impaired people
DISAVANTAGES
1. They are not suitable for use in noisy environment
2. No permanent copy is produce
Storage refers to a media on which data, instructions and information are kept.
STORAGE DEVICES
These are physical materials on which a computer keeps data, instructions for later
retrieval or for future references
UNITS OF DATA
Summary;
1 Character = 8 bits
1 byte = 8 bits
1 Kilobyte = 1024 bytes
1 Megabyte = 1024 kilobytes
1 Gigabyte = 1024 Megabytes
41
1 Terabyte = 1024 Gigabytes
= 0.000128MB
Example1.
Convert 128bytes to kilobytes Therefore 128bytes = 0.000128 MB
Solution
= 1.28KB = 56 bits
42
Convert 0.000127 MB to bytes (KB)
Solution
= 127 Bytes
43
CONVERTING DATA UNITS TO BINARY BASE
Exampel1
Convert 128 to binary base
Solution
Base Number Remender
2 128 0
2 64 0
2 32 0
2 16 0
2 8 0
2 4 0
2 2 0
1
Example 1
Convert 10000000two to base ten
Solution
= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0
= 128ten
Example 1
Convert 10000000two to base ten
Solution
Here you have to convert the binary base to decimal base then to a desired base in this case base four
44
= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0
= 128ten
Base Number Remender
4 128 0
4 32 0
4 8 0
2
128ten = 2000four
There are two types of storage devices namely primary storage devices, secondary storage
devices
Primary storage is the main memory which is also referred to as the internal memory.
This is a type of memory/ storage on a computer which can immediately be accessed by the
computer’s CPU.
RAM is the working area during the processing of data. The data and instructions are
temporally held in RAM during processing and after processing and it disappears when you turn
off the power of computer hence RAM is volatile.
NB: You always save regularly to avoid your work \ data to be wiped off when power is off
Saving is process of transferring data\information from RAM to a secondary storage device.
Execution is the process of carrying out the interpreted commands.
45
TYPES OF RAM
ROM CHIP
ROM CHIPS
It is also called firm ware which is a term used for software permanently stored on a chip.
ROM chips in micro computer contain instructions used to transfer information between
keyboard, screen, printer, and other peripherals and the processor. These instructions are
called ROM BIOS (Basic Input Output System)
It is a blank chip on which the user/buyer can write a program on it with a special equipment
once is written it can’t be modified or changed.
46
EPROM – Erasable Programmable Read Only Memory
This is a chip or a content that can be written on it and erased once using special equipment.
These are ROM chips that are designed to be modified by the user for more than one time.
Note: Volatile means that it is not permanent and can be change. It needs power supply to keep
the data stored in it
READING
Is the process of transferring information, data instructions from device into RAM
OR
Reading is the process of transferring information from memory (RAM) to storage media i.e.
using a save command.
This is also known as auxiliary storage which are designed to retain data and instructions and
programs in a relatively permanent form.
47
EXAMPLES OF STORAGE DIVICES
1. Floppy disks.
2. Hard disks.
3. Magnetic tapes.
4. Flash memory.
5. Punched cards.
6. MP3 player and MPEG player.
7. Zip disk.
8. iPod.
9. Compact disks.
EXAMPLES OF OPTICAL STORAGE DISKS
Compact disks e.g. CD-ROM, CD-R, CD- RW, DVD-ROM, DVD-R, DVD-RW.
There are two methods of which information is transferred from the computer and written to a
storage device namely;
These are secondary storage devices that have magnetic writing on the disc surface (tapes) for
storing data as magnetic spots.
MAGNETIC TAPE.
This is a thin plastic tape that has been magnetically watting for storing data as magnetic spot
and large computer tapes are used only in a cartilage. Since tapes a sequential access media
using them for pad up a slow process.
48
FLOPPY DISKATTE.
This is also called a diskette. It is a removable secondary storage medium that consists of a
thin, circular flexible plastic disc with a magnetic coating enclosed in a square shape plastic
shell.
A diskette is called a floppy because the plastic disc is flexible and not rigged. There are mostly
four types of diskettes but the common ones are;
Each size works only with a device made for its size.
Some diskettes are referred to as low density (single sided version). The single sided are
designed such that the data can be only recorded on one side.
Some diskettes are referred to as high density (Double sided version). The high density
diskettes are double sided and data can be recorded or stored on both sides hence high
density accommodates or stores more data.
A floppy disc drive is a slot (an opening) on the computer system unit where a diskette is
inserted in order to read from and write to it. The drive is labeled “A:”
If the computer has two floppy disc drives, the second one becomes “Drive B:”
49
CHARACTERISTICS OF FLOPPY DISCKETTES
Tracks are concentric rings which are invisible. Each track is divided into sectors under
intersection of tracks and sectors setup the file allocation table (FAT) where data is located.
Diskettes have features to prevent someone from accidentally write, erase or making changes
to the program files. To right protect the diskette press or push towards the edged of the
diskette and the hole opens.
Data capacity,
Not all diskettes hold the same amount of data, diskettes capacity depends on its recording
density e.g. the bytes per inch that can be written on the surface of the diskette e.g. High
density (HD) diskette can store 1.44MB
Formatted Diskettes,
Unformatted diskettes are manufactured without tracks and a sector therefore “Formatting” is
a process of preparing a diskette so that the operating system can write information on it. This
process includes defining the tracks and sectors on the disk as well as setting up FAT (File
Allocation Table)
NOTE: If you reformate a diskette with data already written on it, all the data will be lost
during the reformatting.
Step 1:
Insert 3½ inch floppy diskette into the drive
Step 2:
Click on Start and select My Computer
Step 3:
In the Window which appears, right click on
3½” floppy (A)
50
Step 4:
From the shortcut menu which appears, select Format
Step 5:
- Don’t touch the diskette surface; don’t touch anything visible through the protective case
such as the data, accessed area on the disc surface.
- Handle the disc gently, i.e. don’t throw diskettes into your pockets or back pocket because
the protective plate can easily slide away from the plastic case.
- Don’t put weights on floppy diskettes.
- Don’t try to bend them.
- Don’t use floppy diskettes for coffee and soft wastes because moisture can spoil and
damage the disc surface.
- Avoid risks with physical environment e.g. heat
51
- Don’t expose the disc in to direct sunlight
- Don’t expose the floppy diskettes to chemical substances such as cleaning solvents and
alcohol
- Always keep the floppy diskette in its jacket.
- Do not expose it to an X- RAY.
- Do not insert or remove it from its drive when the drive active light is on.
- Do not force it into its drive. It should slip in with little or no resistance.
- Do not scrub a diskette to label it
- Don’t leave a floppy diskette into the drive. Take the diskette from the drive because if you
leave it in the drive, the read and write head remains resting on the surface.
- Keep diskettes away from magnetic fields i.e. near radio speakers, on top of the system
unit case, near electric motor etc-
- Store the disks in their boxes after use.
HARD DISC
It’s made up of inflexible material and consists of several rigged metal discs called platters.
Platters are covered with substance that allows data to be held in form of magnetized spot.
Data can be recorded on both sides of the disc platters.
The hard disc is also tightly sealed and enclosed in the system unit to prevent any foreign
matter which may result into head crush
52
ADVANTAGES OF HARD DISCS OVER FLOPPY DISCS
- Hard disc is not portable accept removable hard disc which is very expensive.
- Data becomes less secure if left on the hard disc
- Hard disc can easily crush due to extreme shock contaminators.
- The disk is fixed inside the computer and cannot easily be transferred to another
computer.
OPTICAL DISCS
This is a removable disc on which data is written and read by means of a laser beam. The most
optical discs are CD-ROM. Examples of optical disks include;
53
iii) CD-RW This stands for Compact Disc Writeable.
This is a CD format that allows the user to erase data so that the disc can be used over and
over again. A CD-RW acts as a floppy disc since it allows re-writing on it multiple times.
DISADVANTAGES OF A CD
54
- Never touch the underside of the CD.
- Never stuck disc on top of each other.
- Never expose the disc to excessive heat or sunlight.
This combines the basic features of magnetic and optical disk technology. MO disk has a high
storage capacity like an optical disk and can be written on over and over like a magnetic disk.
SMART CARD
It is similar in size to ATM or credit cards, it stores data on a thin micro processor embedded in
the card. When it inserted in the card reader the information on it can be read and up to date.
ZIP DISK.
It is slightly larger and about twice as thick as a floppy disk. A Zip disk can be of 100MB, 250MB,
and 700MB of storage capacity.
55
ONLINE STORAGE
It is also called internet hard drive. It is a service on the web that provides the user with storage
for free or for minimal monthly fee.
It is also a USB (Universal Serial Bus) flash drive typically a removable and a rewritable disk. It
has a high storage capacity to several gigabytes (GB). The capacity of a flash disk is always
indicated on it.
The computer control centre is made up of processing and main memory devices which are
housed in a computer system unit or system cabinet.
A system unit contains a CPU, Motherboard e.g. adaptors like network card, VGA card.
PROCESSOR
56
The two components are connected by a kind of electronic path called a BUS.
Control Unit
This is a part of the CPU that tells the rest of the computer system how to carry out programs
instruction, i.e. directs the movement of electronic signals between RAM and input and output
devices.
It performs arithmetic operation e.g. addition, subtraction, multiplication and division and logic
operations ALU compares two data items to see whether one is equal to, greater than, or less
than the other. The other includes;
>= Greater than or Equal to
<= Less than or equal to
< > Less or Equal
NOTE: ALU & CU contain register that connects to the main memory (RAM) by the bus.
Registers are temporary storage holding processed and unprocessed data. It also provides
working area for processing.
57
FUNCTIONS OF THE MAIN MEMORY (RAM)
It holds data for processing.
It holds functions for processing the data.
It holds data after it processed
It aids the booting process of the computer.
RAM CAPACITY
The main memory capacity is stated in bytes i.e. megabytes (MB) however, the RAM capacity of
the main frame computers and super computers is measured in gigabytes (GB) and Terabytes
(TB)
1KB – 210
1MB – 220
1GB - 230
1TB – 240
WORD SIZE
This refers to the numbers of bytes a processor can hold in its register during the processing;
therefore a 64 byte word processor is faster than a 32bit can process a byte in the same given
time.
PROCESSING SPEED
Computers with large word size can process more data in each instruction cycle, micro
computer speed are measured in megahertz. The speed of large computers are measured in
millions of instruction per second (MIPS) and Floating Point Operation Per Second (FLOP)
1. Intel Chips; Intel makes chips for personal computers such as Compaq, Dell, Gateway,
Toshiba. INTEL used to identify its chips by numbers 8086, 8088, 8286, 8386, 8486, 8086
family series
2. Motorola Chips; Motorola produces the family of apple, Macintosh computers.
3. The Intel succession to x86 chips is the Pentium family. The list of Pentium family from the
slowest to the fastest from Intel are Pentium1, Pentium MMX, Pentium Pro, Pentium 2,
Pentium 3, Pentium 4
4. Today the most popular micro processers are CORE 2 DUE & DUAL2CORE.
58
SYSTEM UNIT
This is a box or cabinet containing the electrical component that carry out computer’s
processing, it contains the following;
i) Power Supply
It is a device that converts power from Alternating Current (AC) to Direct current DC to run the
computer.
59
ii) Motherboard
It is a system board which is the main socket board that can hold chips such as processor, ROM,
RAM and expansion slot. OR it is a circuit board where all computer peripherals
(input/output/communication/Memory and storage devices) are connected.
60
CMOS (Complementary Metal Oxide Semi-conductor).
Ports
These are connecting sockets outside a computer processing unit that are connected to the
main board (motherboard). Ports are of several types and they include the following;
1. Parallel Ports.
2. Serial Ports
4. SCSI
61
(Small Computer System Interface)
It is used to transfer data at high speed especially for external hard disk, magnetic tapes, CD-
ROM, Scanner.
5. Game Port
It is used to connect a game playing device such as joy stick on system unit.
SOFTWARE
Software is made up of group of related programs written in a special code called programming
language. Therefore software is a set of programs in a computer system.
NOTE; the software acquired to perform a general business function is often referred to as
software package.
System software
This is the software designed to allow the computer to manage its own resources and run the
hardware and basic operations of the computer.
Application software
This is software designed to perform specific tasks which benefit or assist the end user.
Examples of application programs include word processing, desktop publisher.
62
COMPUTER SOTWARE CLASSIFICATION
SYSTEM SOFTWARE
1. UTILITY PROGRAMS
These are system software component which are used to support, enhance or expand the
existing programs in a computer system.
OR
Utility programs are referred to as service programs which improve the performance of a
computer.
Many operating system have utility programs built in for a common purposes. However, some
utility programs are available separately and the common examples of utility programs include
the following;
63
(ii) Data recovery Utility
This is a system software utility used to restore data that has been physically damaged or
corrupted on a disk. Data can be damaged by viruses, bad software, hardware failure and
power fluctuation which occur while data is being written or recorded.
Note: When a file is stored on a disk, usually the data elements are put next to one another, after
the user has saved but due to deletion of many files in different locations there remain many
scattered areas of deleted data which are too small to be used efficiently. This is called
fragmentation.
Note: It is always important to update the anti-virus software frequently in order to detect new
viruses.
64
(ix) Debuggers
These are used during testing of the program. They are able to trace the flow of the program
and display various values as requested; therefore errors are traced and removed from a
program.
Other utilities
A physical problem is on the media such as a scratch on the surface of the disk while the logical
problem is on the computer, such as corrupted FAT (File Allocation Table).
(xii) Uninstaller
Uninstaller is a utility that removes an application as well as any associated entries in the
system file e.g. MCAfee’s Uninstaller.
2. OPERATING SYSTEM:
This is the most important system software component that contains master programs called
the supervisor that manages the basic operations of computer.
65
FUNCTIONS OF OPERATING SYSTEM (OS).
Note: -
An OS can be classified as a single user system which acts as an interface for only one user e.g.
DOS (Disk Operating System) and it can also be classified as a multiple user system which acts
as an interface of more than one user, this implies more than one person can use the computer at
the same time e.g. NOS (Network Operating System)
Kernel is the piece or pieces of software that is responsible for servicing resource requests from
applications and the management of resources.
OR
Kernel is the main component of most computer operating systems; it is a bridge between
applications and the actual data processing done at the hardware level.
Note: Kernel's responsibilities include managing the system's resources (the communication
between hardware and software components)
SOFTWARE INTERFACE
This where a user and computer have to get together to communicate. Therefore user interface
controls how the user uses data and instruction and how information is displayed on the
screen.
66
VARIOUS USER INTERFACES
- Command line interface.
- Menu driven interface.
- Graphical user interface.
MENU INTERFACE
This is an interface where commands are issued through menus. A menu is on screen list of
options where a user can choose from by the use of either a mouse or a keyboard. The menu
driven interface is the one which was improved to a graphical user interface.
67
DISK OPERATING SYSTEN WINDOWS OPERATING SYSTEM
It is a single user operating system It is multi-tasking operating system
It doesn’t offer a graphical user interface It offers modern improved graphical user
interface
Cannot take full advantage of modern It takes full advantage of modern 32bit
32bit micro processor micro processor
Uses command line interface Uses graphical user interface
DOS is stable cannot easily corrupted or Windows is unstable and can easily be
damaged corrupted or damaged
This refers to several single user operating systems that were developed in early 1980’s for
personal computers. They include the following;
There are two types of DOS currently in use in micro computers and they include
- PC DOS which was by the IBM Corporation and
- MS DOS which were developed by Microsoft Corporation to complete the desktop
applications environment.
Earlier versions of DOS used a command line interface while the later versions of DOS included
a menu driven user interface as well as improved memory and disk management. DOS is not
widely used today because it does not offer a graphical user interface and cannot take full
advantage of modern 32-bit micro processors.
2. Window 3x
68
Windows 3x refers to the three earlier versions of Microsoft windows i.e. windows 3.0,
windows 3.1, windows 3.11. These versions of windows 3x were not actually operating systems
but operating environments. An operating environment is a graphical user interface that works
in combination with an operating system e.g. DOS
The Microsoft corporation developed these new operating systems as a result of technological
advancement over the windows 3x. The 32 bit operating system provided better multi-tasking
(working with various applications at the same time) and faster video displays for games. Their
ability for plug and play provided a better way of installing new peripherals (general term that
refers to other parts connected to the computer e.g. keyboard and the mouse.)
They also entail improved network support, power management and file management. They
also offered improved power battery life and productivity for the laptop computers.
This is another desktop operating system which offers multi tasking abilities. It was initially
created by Microsoft and IBM, and then later developed by IBM exclusively. OS/2 is no longer
marketed by IBM, and IBM standard support for OS/2 was discontinued on 31 December 2006.
This is one of the most recent developments in operating systems. It was built due to the
increased demands in the multi-media industry for large file handling abilities. Its 64 bit system
can handle files up to Million terabytes. This makes it ideal to handle files that include videos,
sound and other three dimensional images (3D-Images.)
These are designed to be used on several computers that exist on a network. At times they can
be installed on stand-alone computers. Examples include
1. NOVEL NETWARE.
2. WINDOWS NT4.0.
69
This has all the features, which were conceived from 32bit Operating system of Windows 95 &
windows 98 but with integral security and networking abilities thereby offering a more stable
and secure platform, which is ideal for corporate enterprises.
3. UNIX.
This is multi-user, multi-tasking, time sharing operating system which was developed by the bell
laboratories for the mini and main frame computers.
4. LINUX:
This is UNIX everywhere except for the name. It encompasses free software foundation;
currently it is increasing being used as a back end server. Companies support it like bell and IBM
making it an industrial strength operating system.
These are operating systems, which are specifically designed for hand held computers (PDA).
Normally these operating systems, which are pen-driven, or touch sensitive, come when they
are already loaded in the computer ROM-BIOS. Common examples include window CE
(computer edition). It has a familiar interface similar to the normal windows environment with
a task bar, icons and many recently have come with version for the keyboard PDA.
Originally called Windows NT 5, it is an operating system from Microsoft. It’s a desktop as well
as a network operating system for both the small and big corporate organizations. It has many
features than earlier Microsoft operating systems.
WINDOWS ME
Windows millennium is an updated version of windows 98 for consumers that uses a computer
to surf the internet or for entertainment. Windows Me is designed for home users.
These include operating system that are designed especially for particular computers by their
manufacturer examples include
70
This was the first commercially successfully graphical user interface. It was released with
Apple’s Macintosh computers. Mac o/s has the capability of opening, editing, and saving files
created by windows and DOS platform.
System 7 operating system for Macintosh computers was developed by digital researchers for
use on the 8 bit micro computers. These have now been over taken by the 16 bit and 32 bit
microprocessor.
3. Windows XP
Windows XP is an operating system that was produced by Microsoft for use on personal
computers, including home and business desktops, laptops, and media centers. It was first
released to computer manufacturers on August 24, 2001, and is the most popular version
of Windows, based on installed user base. The name "XP" is short for "eXPerience”.
4. Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for
use on personal computers, including home and business desktops, laptops, tablet PCs,
and media center PCs.
5. Windows 7.
Windows 7 is the latest release of Microsoft Windows, a series of operating systems produced
by Microsoft for use on personal computers, including home and business
desktops, laptops, notebooks, tablet PCs, and media center PCs.
3. PROGRAMING LANGUAGES
The computer language is a mean of communication used in designing a computer program.
This program is accomplished by designing a list of words and symbols according to a particular
syntax (Grammatical rules related to use of a command or programming language). It can be a
pre-determined rule of grammar into logical manner to form a computer program.
These are called low level languages because they are associated with the processor than high
level languages which are nearer to the programmers.
71
There are two types of low level languages namely;
1. Machine code (Object code).
2. Assembly language
It is very difficult to learn and very unfamiliar to humans. It is not user friendly at all.
Programming in machine code is very tiresome and very many errors are likely to occur, all
instructions in machine code language are represented in binary format and an example of
machine code instruction would look like this 1010000000001001 – 16bits machine.
Assembly language
It was invented to assist machine code programmers. However much as it looks like a machine
code language at least for it, it is more easily understood and remembered by human. An
example of the assembly language instruction looks like;
These were produced as a further refinement in the assembly language. They made
programming much easier to user and shielded programmers from knowing the natural
registers and memory addresses which are vital in the assembly language.
In high level language, fewer instructions are written and therefore a lot is done in less time.
They are classified as 3 generation language (3GLS), they were originally built for specific
operations that is say scientific or business purpose e.g. FORTRAN & COBOL.
They are problem oriented languages and have a wide vocabulary of valid words, symbols and
sentences.
PROGRAM TRANSLATION.
Translation of a high level program into the machine code is equivalently done by compilers and
interpreters.
72
COMPILERS
These translate a program written in a high level language into machine code or into an
assembly language or program. The entire program is translated into machine code at
compilation time.
INTERPRETERS
An interpreter translates the source program line by line while the program is running. This is
done each time the program is executed; as a result a program running under an interpreter
runs very slowly as compared to the compiled program.
LINKERS
These programs combine compiled programs and determine where the program will be located
in memory. The linker has transformed an object code, an executable file is generated. These
normally result in to the file with the extension “.exe”.
Most modern compilers automatically link the object code generated from the source program
therefore one may fail to note the linking process.
Common types of programming languages include FORTRAN, COBOL, PASCAL, ALGOL, and C++.
TERMINOLOGIES USED UNDER SOFTWARE
1. File:
A file is a collection of related information that is given a name. it is stored on a disk so that it
can be retrieved when needed.
Types of Files
Filename. Extension File type
***.doc Word document
***.xls Excel file
***.mdb Access file
***.ppt Power point file
***.sys System file
73
***.exe Executable file
***.ini Object file
***.bak Backup file
***.gif OR ***.jpg OR ***.Jpeg Image file
2. Folders:
A folder is a named storage area in a windows operating system. A folder can be either
opened or closed. A group of files can be kept in one folder.
In MS-DOS, folders are referred to as directories and the directories hierarchy is called
directory tree or directory structure.
3. Directory:
This is a way of arranging files on a machine e.g. all marketing files put together in a
marketing file therefore a directory is a collection of files. It has another directory referred to
as sub directory.
OR
A directory is a named storage area in a non windows operating system e.g. DOS. A group of
files and sub directories can be kept in a directory, therefore a directory is the arrangement of
files on a given storage device.
4. Path:
A path is a route taken to a particular direction or a file. A path statement may include
A drive letter, the main directory and any of the sub directories. For the path to
KABOWA you write C:\KAMPALA\LUBAGA\KABOWA.
The path statement means that a file named KABOWA is a folder named LUBAGA (sub
directory) and in a folder named KAMPALA on drive C:\.
5. Desktop:
A desktop is a work area on which you see your programs. The desktop can contain windows,
icons, and the taskbar.
6. Icons:
An icon is a little picture on a computer screen (Monitor). Icons on the desktop that have a
small white box in the lower left corner of the icons are shortcuts and represent files and
programs on the computer.
Typical icons on the desktop include;
1. My computer: -
It shows the disk drives and hardware connected to the computer
74
2. Recycle bin :-
It contains file and folders that you have deleted
3. Network Neighborhood:-
It provides access to the computers and devices connected to the network.
7. Taskbar:
A taskbar is a row of buttons and icons that usually appear along the bottom of the screen.
The taskbar has several parts namely: -
1. The start button: - Is usually at the left end of the taskbar.
2. The task manager: - Contains buttons for each window that is open on the
desktop.
3. The system tray: - Contains items for some windows 95 programs and folders,
including system clock.
8. Start menu:
Lists commands and additional menus that list most or all the programs that you can run on
your computer. You can use the start menu to run almost any program installed on the
computer.
9. Task manager:
Is a part of the taskbar that shows a button(s) for each program that is running if a program
displays more than one window, number of buttons will appear on the task manager.
POWERING ON A COMPUTER
Most micro computers are switched on or powered on by the switch on the system unit and the
monitor.
As the system unit is switched on, it does the “POST” (Power on Self Test) before it starts. The
POST consists of RAM check, the disk drive controller check and the keyboard check.
If any of the checks is impossible (fails) then an appropriate error message is displayed on the
screen. Sometimes an error code is displayed with the message or an abnormal number of
beeps are sounded and this is called Booting.
The process of turning on the system (computer) and loading operating systems in memory
(RAM) is known as “booting”.
75
Booting refers to the starting and restarting of a computer system. Booting is of two types
namely;
- Cold booting.
- Warm booting.
Cold booting is the starting of the computer from the power socket while warm booting is the
restarting of the computer.
Warm booting is restarting of the computer system using the keyboard by pressing a
combination of buttons or keys “CTRL+ALT+DEL” or pressing the RESET button/switch on a
computer system unit.
There are two ways of booting a computer loaded with DOS or windows:-
Today, computers boot from windows loaded on to your hard disc. The booting process is
complete under windows when a stable desktop is attained with a task bar.
DOS or windows systems diskette contain the DOS or window’s commands is needed to start
and use the computer.
Insert the system’s diskette in a drive and then switch on the computer. The sequence of
operations on boot up is:-
1. The computer performs Power on Self Test (POST). The POST consists of the Ram check
(memory), the hard disk controller, the keyboard check etc.
2. Default drive A: checks for disk operating system (DOS) followed by loading of the DOS
from drive A to RAM.
3. Display of information from auto executable file (Auto exec) and windows logon screen
appears if the computer is using windows operating system otherwise you go to DOS
command prompt.
Computers can be booted up from the hard disk if DOS has already been installed on the hard
disk.
76
In this case you simply switch on the computer to start it up after making sure that there is no
diskette in the drive A. The sequence of operation on boot up is as follows:-
1. The computer performs Power On Self Test (POST). The POST consists of the RAM check,
Keyboard check, the hard disk check controllers etc.
2. Drive C check for the DOS followed by loading of DOS from drive C to the memory (RAM).
3. Display of information from auto exec batch file and the windows logon appears if the
computer is using windows otherwise you go to DOS command prompt.
Users whose computers have a hard disk always prefer to boot their computers using the C:
drive (Hard disk). Booting of two types which include:-
The main cause of power disruptions are amplitude fluctuations, low voltage, high voltage,
power frequency variation etc.
All power defects are largely eliminated by the use of power correction equipment known as
the uninterrupted power supply and other utility power conditioning equipments.
Line conditioners
These consist of surge suppressors, voltage stabilizers etc. Surge suppressors are only able to
reduce power line noise. Voltage stabilizers are capable of correcting voltage surges. They are
purposely meant for reducing the amount of current that is supplied to the system.
Stand By UPS
77
This is a power conditioner with ability to generate its own battery. The stand by UPS has time
limitations and this is referred to as “Transfer time”.
Online UPS
This operates like a Standby UPS, The online UPS is ideal for environments where electrical
isolation is necessary or for equipment that is very sensitive to power fluctuations.
The online UPS is generally more expensive but may be necessary when the power
environment is "noisy" such as in industrial settings, for larger equipment loads like data
centers, or when operation from an extended-run backup generator is necessary.
A true online UPS also has an isolating transfer for eliminating power line noise. These are
available with ratings of varying kilo watts. However, the big ones are expensive and bulky, for
that matter therefore power systems such as computers, a small UPS is sufficient.
The period of time that the UPS can provide backup also varies from a few minutes to half an
hour. The online UPS are more expensive than others.
1. Brown out.
Is the lowered output voltage (power) from the wall socket.
2. Black out.
Is the total loss of electrical power from the wall socket.
3. Power transients.
Is the large and potentially dangerous voltage spikes appearing on the wire e.g. due to
lightening, loose connections e.t.c.
78
PC CONFIGURATION
The hardware and software specification required for a PC or any other type of computer is
termed as computer configuration.
Like all electronic components, micro computers need to be serviced regularly to maintain their
normal operation. Below are some of the measures that should be taken:-
1) Before you Switch on your computer, make sure that other components are switched on
e.g. UPS, stabilizers, Hub, the computer peripherals etc.
2) Avoid making connections when the computer is already on e.g. keyboard, mouse,
printer etc
3) Avoid abrupt switching on and off the computer system. Follow the right procedures
when switching on the computer.
4) Place the micro computer in a dust free environment with good ventilation.
5) Dust covers should be used to protect the micro computer from moisture and when you
are using polyethylene covers, then do not cover the computer immediately after
shutting down because it will trap heat.
6) The computers should regularly be serviced at least twice a year or more often if the
environment is dusty.
79
The service should normally include;
- Blowing the dust from the system unit,
- Cleaning the keyboard including all keys.
- Cleaning the monitor.
- Cleaning the mouse.
- Externally, also clean your computer equipment regularly with wet rug or cloth.
Note: Make sure you don’t drop water in a computer system, if water drops in accidentally, do
not use the computer immediately. Wait until water dries completely.
8) Floppy disks used for installation of programs and backups should be safely kept in disk
banks and safely kept away from sunlight and magnetic media.
9) Floppy diskettes should be right protected all the time especially for installation
diskettes (using the protection tab) and remove the right protect tab when writing on
the diskette if they are used for backups.
10) In areas where power fluctuates, it is vital to use a stabilizer, UPS to ensure a steady
input of power to a computer system.
80
COMPUTER VIRUSES
Computer Viruses are destructive programs designed to affect, or infect a computer negatively
by altering the way it normally works without the knowledge or permission of the owner.
Massive destruction:- Attacks the formats of diskettes whereby any program or damage will be
unrecoverable
Partial destruction:- modifies a specific portion of disk affecting any files stored in that location.
Random havoc: - randomly changing data or data in memory during normal program execution,
or changing key stroke values, or data from other input/output devices.
CLUSTER VIRUSES
This type of virus makes changes to a disk file system. If any program is run from the infected
disk, the program causes the virus to run as well. This technique creates the illusion that the
virus has infected every program on the disk.
E-MAIL VIRUSES
These types of viruses can be transmitted via e-mail messages sent across private networks or
the internet. Some e-mail viruses are transmitted as an infected attachment (a document file or
program that is attached to the message). This type of virus is run when the victim opens the
file that is attached to the message.
81
FILE INFECTING VIRUSES
File infectors operate in memory and usually infect executable files with the following
extensions: *.COM, *.EXE, *.DRV, *.DLL, *.BIN, *.OVL, *.SYS. They activate every time the
infected file is executed by copying themselves into other executable files and can remain in
memory long after the virus has activated.
OVERWRITING VIRUSES
These viruses infect by overwriting part of their target with their own code but, by doing so,
they damage the file. The file will never serve another purpose other than spreading the virus
further. Because of this they are usually detected quickly and do not spread easily.
PDA VIRUSES
The increasing power of PDAs has spawned a new breed of viruses. Maliciously creative
programmers have leveraged the PDA's ability to communicate with other devices and run
programs, to cause digital mayhem. Their effects vary from the harmless flashing of an
unwanted message or an increase in power consumption, to the deletion of all installed
programs. But the threat is growing, and the destructiveness of these viruses is expected to
parallel the development of the devices they attack.
MULTIPARTITE VIRUSES
A virus that combines two or more different infection methods is called a multipartite virus.
This type of virus can infect both files and boot sector of a disk. Multi-partite viruses share
some of the characteristics of boot sector viruses and file viruses: They can infect .com files,
.exe files, and the boot sector of the computer’s hard drive.
BOMBS
The two most prevalent types of bombs are time bombs and logic bombs. A time bomb hides
on the victim’s disk and waits until a specific date before running. A logic bomb may be
activated by a date, a change to a file, or a particular action taken by a user or a program.
Bombs are treated as viruses because they can cause damage or disruption to a system.
PARASITIC VIRUSES
These viruses attach themselves to executables without substantially changing the contents of
the host program. They attach by adding their code to the beginning, end, or even middle of
the file and divert program flow so that the virus is executed first. When the virus has finished
its job, control is passed on to the host. Execution of the host is a little delayed but this is
usually not noticeable.
MACRO VIRUSES
Many older applications had simple macro systems that allowed the user to record a sequence
of operations within the application and associate them with a specific keystroke. Later, the
user could perform the same sequence of operations by merely hitting the specified key.
82
POLYMORPHIC VIRUSES
This type of virus can change itself each time it is copied, making it difficult to isolate. Most
simple viruses attach identical copies of themselves to the files they infect. An anti-virus
program can detect the virus’s code (or signature) because it is always the same and quickly
ferret out the virus.
STEALTH VIRUSES
Stealth viruses actively seek to conceal themselves from attempts to detect or remove them.
They also can conceal changes they make to other files, hiding the damage from the user and
the operating system.
COMPANION VIRUSES
A companion virus is the exception to the rule that a virus must attach itself to a file. The
companion virus instead creates a new file and relies on a behavior of DOS to execute it instead
of the program file that is normally executed. These viruses target EXE programs. They create
another file of the same name but with a COM extension containing the virus code.
PROGRAM VIRUSES
Like normal programs, program viruses must be written for a specific operating system. The
vast majority of viruses are written for DOS but some have been written for Windows 3.x,
Windows 95/98, and even UNIX. All versions of Windows are compatible with DOS and can host
DOS viruses with varying degrees of success. Program viruses infect program files, which
commonly have extensions such as .COM, .EXE, .SYS, .DLL, .OVL, or .SCR.
TROJAN HORSES
Trojans, another form of malware, are generally agreed upon as doing something other than
the user expected, with that “something” defined as malicious.
WORM
A worm is a computer program that has the ability to copy itself from machine to machine.
Worms normally move around and infect other machines through computer networks. An
entire LAN or corporate e-mail system can become totally clogged with copies of a worm,
rendering it useless. Worms are commonly spread over the internet via e-mail message
attachments and through internet relay chat channels.
83
In today's increasingly interconnected workplace (Internet, intranet, shared drives, removable
drives, and email), virus outbreaks now can spread faster and wider than ever before.
Contact with contaminated systems; any diskettes used on a contaminated system could
become contaminated. If the diskettes are used on another system, then the virus will spread.
Pirated software- the use of pirated software introduces the risk that the software may be
contaminated by virus code.
Fake games- many people like playing games on computers and for the same reason games
programs spread virus very fast.
Freeware and shareware- Both freeware and shareware programs are commonly available
from bulletin Board systems (BBS)
A macro virus: uses the macro language of an application (e.g. word processor or spreadsheet)
to hide the virus code
A worm: copies itself repeatedly in memory or a disk drive until no memory or disk space
remains, which makes a certain condition or action is triggered.
A polymorphic virus: modifies its program code each time it attaches itself to another program
or file, so that even an anti virus utility has difficulty in detecting it.
84
10. Strange sounds come from the computer.
11. Failure for the Computer to boot up.
12. Some viruses take control of the keyboard and occasionally substitute a neighboring key for
the one actually pressed. Another virus "swallows" key presses so that nothing appears on
the screen.
13. Also interesting are system time effects. Clocks going backwards are especially frightening
for workers who cannot wait to go home. More seriously though, this type of virus can
cause chaos for programs which depend on the system time or date.
14. Some viruses can cost the user dearly by dialing out on his modem. We do not know of one
which dials premium telephone numbers but no doubt we shall see one soon. One
particularly malicious virus dials 911 (the emergency number in the USA) and takes up the
valuable time of the emergency services.
ANTIVIRUS UTILITY
Is a program that prevents, detects, and removes viruses from a computer’s memory or storage
devices. One of the popular antivirus is Norton Antivirus.
Antivirus utilities normally look for various signatures to identify a virus. Examples of antivirus
utilities include the following:
- MacAfee antivirus.
- Dr. Solomon
- Norton
- Node32
- Penicillin antivirus.
- Avira antivirus
85
BENEFITS/ADVANTAGES OF ANTIVIRUS SOFTWARE
1. It prevents a virus from damaging your PC or network.
2. Protects your PC or network from viruses and other forms of malware.
3. Prevents downtime, i.e. valuable working time could be wasted if you can not access your
PC due to a virus infection.
4. Protects valuable information on your PC.
5. Prevents other people outside your organization being able to access your information
whether it is business or personal data. A firewall is a device or set of devices designed to
permit or deny network transmissions based upon a set of rules and is frequently used to
protect networks from unauthorized access while permitting legitimate communications to
pass.
6. Potentially prevents emails being sent by your system thereby damaging you and your
organization’s reputation. Some viruses access your email folders and send an email to all of
your contacts with the virus attached.
7. Prevents the time consuming and unnecessary task of having to clean or remove the virus
after the damage has been done.
8. Reduces the potential financial implications – getting the technical support required to
achieve removal of the virus and to restore your lost information.
9. Legal implications – in some instances it is required to demonstrate that your organization
has taken reasonable measures to protect the information you hold about your customers
and the email you exchange with them.
DISAVANTAGES OF ANTIVIRUS SOFTWARE
1. Some antivirus packages can slow down the speed of your PC or network.
2. Antivirus software can require a great deal of hard disk and memory.
3. Antivirus checks must be run regularly. Again, ideally you should run your antivirus software
daily as internet access and email can potentially cause problems.
4. Not all antivirus software is capable of being effective at dealing with viruses, spyware and
adware so you may need to run two or more packages. However, be sure that you are not
running two systems that conflict and prevent each other working properly.
5. Antivirus software needs to be updated regularly. It is very important that the antivirus
software is updated, preferably on a daily basis, because new viruses and malware are
developed and the antivirus vendors will develop counter measures to deal with them. This
86
can be achieved by automatically connecting to your supplier’s website via the internet and
downloading the necessary files. You can normally set this up to happen automatically.
COMMUNICATION
Communication or Telecommunication
Refer to transfer of data from a transmitter (sender/source) to the receiver across a distance.
Data communication:-
This is the process of transmitting data signal from one point to another through a network
Data signal
Data signal is an electromagnetic energy which represents the data flow. Data transmitted can
be voice, text, video, sound, image or a combination of these (Multimedia).
87
Half-duplex transmission refers to communication in both directions but one direction at a
time. A sender must first send the data before the recipient can reply. An example, if two police
officers are communicating using a ‘walkie talkie’ radio, one has to say “over” to mark the end
of every statement in order for other to respond.
Mode of transmission
Asynchronous transmission
In asynchronous transmission data is sent one byte (or character) at a time. It is also called
start-stop transmission, where “start” bit represents the beginning of a character, and a “stop”
bit represents its end. At rate of only one byte at a time, with start and stop pulses, this is
relatively slow method and it is not used when great amounts of data must be sent rapidly.
Synchronous transmission
Synchronous transmission sends data in blocks. Start and stop bit patterns called sync bytes,
are transmitted at the beginning and end of the blocks.
Bandwidth:- This is the maximum amount of data that a transmission medium (network cables)
can carry at given period of time per second OR this is the measure of how much
information/bits that can flow from one place to another per second.
Modem short for modulator/demodulator: A device that converts the data signal from one form
to another. The process of converting digital signal into analog form for transmission over
phone lines is called Modulation. A receiving modem converts the analog signal back to digital
signal in a process known as Demodulation.
Figure below shows how an external modem is used in data transmission over telephone lines.
An internal modem performs the same function and is built on the motherboard inside the
system unit.
88
Narrowband describes a channel in which the bandwidth of the message does not significantly
exceed the channel's coherence bandwidth.
Coherence bandwidth is a statistical measurement of the range of frequencies over which the
channel can be considered "flat", or in other words the approximate maximum bandwidth
A baud is a data transmission speed of a bit per second over telephone line using a modem.
ISDN line
ISDN stands for Integrated Services Digital Network, which is hardware and software that allow
voice, video and data Transmission digital signals over ordinary telephone copper wire.
It is five time faster than phone modem.
It also supports two phone lines so that you can talk on the phone on one line while connection
on the internet on the other. Many telephone companies provide ISDN line which perhaps 2 or
3 times costly compared to a regular monthly phone service.
Broadband is used to refer to data transmission using ADSL (Asymmetric Digital Subscriber
Line)
ADSL is a means of transmitting digital signals using telephone lines and can be faster than
narrowband. Coaxial cables, fibre optic cables, microwaves and satellites are commonly used to
provide broadband. ADSL is considered to be the successor to ISDN
Baseband signal:- is a digital signal that is generated and applied to the transmission medium
directly without modulation.
Attenuation: - This is the decrease in magnitude and energy as a signal progressively moves
along a transmission medium. Or refer to as signal loss in strength as it is transmitted along the
media. If the signal is not boosted (amplified), it will be lost along the way and may never reach
the destination. Attenuation or signal loss is corrected by placing a signal amplifier called a
Repeater.
89
Packet is a maximum-fixed length block of data for transmission. A packet also contains
instructions about its destination.
Packet switching: - Packet Switching is a technique for dividing electronic messages into
packets for transmission over a wide area network to their destination through the most
expedient routes.
The benefits of packet switching are
-It can handle high volume, traffic in a network. it is used in large networks such Tele net.
-It also allows more users to share a network.
-Messages are sent over a long distance, E.g.
COMPUTER NETWORK
The term Transmission media refers to the physical or non-physical link between two or more
computers in which a signal can be made to flow from source to destination.
90
Local Area Network (LAN)
This is a computer network that covers (spans) a relatively small geographical area, like one
building or a group of buildings close together such as school campus.
o A WAN covers a wide geographical area than a LAN users are within confined geographical
area
o WANs unlike LANs usually send data over telecommunication links.
o In the recent past, WANs often used larger computers as file servers well as LANs used
typical file servers
o WANs are often larger than LANs and have more terminals or computers liked to the
network.
o A WAN can link two or more LANs using gate ways and bridges. A gate way or bridge is a
device that is used to connect two separate networks e.g. two LANs in separate buildings.
Intranet:
An intranet is a local version of internet within a company or organization. It offers same
features as global internet (www, TCP/IP), but in a localized environment such as factory site or
university campus whereby the authorized users are employee of the company.
Extranets:
If a company has an intranet and allows limited access to it by people outside the company,
then the intranet is referred to as an extranet.
Resource sharing
A resource in the network environment means any component that can be attached to the
network for access by users. This includes
- Hardware sharing: sharing of expensive peripheral devices such as laser printers, scanner,
and fax machine among many users of company.
91
- Program and data sharing: in most organizations, people use the same software and need
access to the same information, which could expensive to a copy of software for each
employee
- Access of same data on a shared storage device hence updates are easily made nd
accurately,
- Network links all employees using groupware hence work together online on shared project.
Better communication
- Remote communication refers to transmission of data signals between two communication
devices at different geographical locations, through remote communication people can share
ideas and gives freedom to network users who can work from home just if they were in their
offices(Telecommuting)
- One of the greatest feature of networks is electronic mails which cheap, fast and convenient
means of communication.
Cost effectiveness
Networks are cost effective in organization. Although the initial purchase and laying down of
components may be expensive.
Access to databases
Networks also enable users to tap into many databases whether private or public databases of
on line services, hence making research simple.
Security of information
Today data backed up on a networked storage device shared by users to avoid data loss.
Computer network is reliable because data is transferred with minimum error from source to
destination
92
- The internet has chat-rooms and messaging services that may enable teenagers to meet
peers and adults on the net whom may have bad intentions.
- Access to pornographic and other bad material has made the fight against social problems
such HIV/AIDS, bad sexual behavior and drug abuse more complicated.
- There is greater risk from viruses. Because they are easily spread between computers are part
of a network.
- Organization finds it very challenging to guard information system from constant threats of
illegal access.
A computer network is made up of several standard components which are classified into three
categories namely:
DATACOMMUNICATIONS MEDIA
A data communication medium is a pathway used to for carrying data/information from one
point to another, which is from source to destination. Various devices on the network are
linked together by means of communications media (channels / paths).
Data communication media can be divided into two namely:-
1. Communication Using Cables.
2. Wireless Communication.
93
This is a data communication media where data signals are transmitted through physical
pathway.
There are several types of network cables but the most common ones are:-
Twisted pair cables
Coaxial cable
Fibre Optic Cables
The difference between the UTP and STP is that STP has a brand shield which is wrapped
around the wires to protect them from electromagnetic interferences called ‘Electric Noise’.
Twisted pair
Brand shield
Coaxial Cable
Coaxial cable has a central inner copper core and an outer sheath of copper mesh that are
94
insulated from each other. It resembles a cable which connects a TV to an antenna. Coaxial
cable is more expensive than twisted pair and is used to transmit voice, video and data.
95
- It smaller and lighter than copper cable.
WIRELESS COMMUNICATION
This is type of communication medium that is used to transport data signals from one point to
another without physical connections.
COMMUNICATION DEVICES
These are devices used as interfaces or junctions between terminal devices. Terminal
equipments are devices at both ends of the communication link such as a computer.
96
Hubs
A hub is a hardware that connects a large number of computers and broadcasts received data
to all the computers or other devices attached on the same network. That is, a hub consists of
multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.
Bridges
Bridges connect one LAN to another. A bridge can forward data from one LAN to another, and
can filter out data not intended for the destination LAN.
The purpose of using a bridge therefore is to:
- Extend the length and number of stations
- Reduce overall traffic flow by allowing broadcasts only in destination LAN.
Switches
A network switch can perform similar functions to hubs and bridges. Unlike hub, a switch
forwards a packet directly to the address of network device it is intended for without
broadcasting.
97
Repeaters
A repeater receives signal from one segment of network, cleans it to remove any distortion,
boosts or amplifies it to another segment of LAN.
The repeater enables the network to eliminate attenuation problems.
Router
The router interconnects different networks and directs the transfer of data packets from
source to destination. Each network has a unique identifier or address called the network
address or IP address.
Gateways
A gateway is any device that can be configured to provide access to wide Area Network (WAN)
or internet. One of the devices is router. However a gateway may not be necessarily a router, it
may be a computer configured to provide access to the internet.
Connector: The RJ45 are attached to the terminals of the twisted pair cables.
NETWORK SOFTWARE
It is communication software that manages the transmission of data between computers and
other devices attached on the network. Network software can be classified in two main groups
namely: -
1. Network Operating system (NOS).
2. Network Protocol
98
Network Operating System (NOS)
These are operating systems designed to manage the network, computers ability to respond to
services request. Examples include, Windows NT, XP, Vista , Window Server 2003, Novel
Netware, Unix, Linux.
FUNCTIONS OF NOS
- It provides access to network resource e.g. printer and all folders.
- It enables nodes on the network to communicate with each other more efficiently.
- It supports inter-process communication i.e. enables the various processes of the network
to communicate with one another.
- It responds to request from application programs running on the network.
- It supports network services like network card drivers and protocols
- It used to implement security features.
- It monitors the operation of the network. It is possible for the network administrator to
tell who is using what and when.
- It records and fixes errors in the networks communication.
Network protocols
Protocols are set of rules and procedures that govern communication between two different
devices or computers on the network.
For instance, protocol in your communication software, for example, will specify how receiving
devices will acknowledge sending devices, a matter called hand shaking.
Protocols will also specify the type of electrical connections used the timing of message
exchange, error-detection techniques, and so on.
Examples of protocols include:
Simple mail transfer protocol (SMTP)- An internet protocol for transferring e-mail
File transfer protocol (FTP) - an internet protocol for file transfer.
Transmission control protocol (TCP)-This is responsible for delivery of sequenced data
over the network.
NetBEUI- A local area network protocol that establishes communication sessions
between computers. It is for Microsoft or IBM networks only.
Internet protocol (IP) and Netware protocols are for packet forwarding and routing.
Sequential Packet exchange (SPX), is a part of Novel internet work packet exchange for
sequenced data.
NETWORK TOPOLOGY.
This refers to the way in which computers and other devices have been arranged OR how data
is passed from one computer to another on the network. A network topology can either be
logical or Physical
99
LOGICAL TOPOLOGY.
This is also called signal topology. It refers the way data is passed from one device to another
on the network.
Logical topology is divided into two categories:
Ethernet topology; is when all the computers listen to the network media when one
computer is sending data.
Token ring topology; this uses a token which is used to exchange data from one PC to
another. Token is viewed as an envelope where data is placed in it and it is addressed to
a particular PC on the network, and then returns in the ring.
PHYSICAL TOPOLOGY
This is the physical layout or arrangement of components on the network.
For example
● Ring topology
● Bus topology
● Star topology
● Hierarchical topology.
● Mesh topology.
1. Bus Topology
This is a single line or cable with nodes at different points. i.e. all devices are connected to a
central cable called bus or backbone cable.
Data is transmitted in any direction along the central cable. As one sends, the rest listen
(medium access control address).
100
- Data travels in both directions along the network cable so that packets of data may
collide.
2. Star topology
A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually
connected to a central connection point, like a hub or a switch. A star takes more cable than
e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.
Ring topology
A ring topology, all the devices are connected to one another in a shape of a closed loop. There
is no central host computer in the ring network though one node may control overall access to
the network
101
- It difficult to identify the problem if the entire network shuts down.
- Not meant to be used as a stand-alone solution in a large building.
4. Hierarchical/Tree Topology
This is a hybrid topology. Groups of star-configured networks are connected to a linear bus
back-bone.
5.Mesh Topology
This is the most common type of topology used in wide area network, where there many paths
between different locations.
102
TYPICAL CABLED LAN OVER VIEW
A SERVER
A server is a powerful computer that runs the network operating system and allows resources
shared over the network.
OR
Servers are dedicated computers on a network that perform one or more functions on behalf of
the other computers.
WORK STATION
A workstation is simply a personal computer connected to a LAN. The basic difference between
a stand alone computer and a workstation is that the latter has communications capabilities
added to enable it to exchange information with other computers and devices on network
(nodes).
WLAN
Wireless local area network (WLAN) differs from a cabled LAN in that computers use wireless
link to connect to network instead of using a cable. The wireless connection is made possible by
two set of components: wireless access points and wireless NICs
Wireless LAN can be used in places that are difficult or impractical to use a cabled LAN for
examples building with many rooms or a large hall. Hence it more flexible; users can be in any
location in a building or outside still accessing the internet services.
103
Types of LAN
LAN can be divided into two categories based on how the computers communicate with one
another:
Client/Server network
Peer-to-peer network
a) File server:
A file server is a computer that stores the programs and data files shared by users on LAN. It
acts like a disk drive but in a remote location, whereby network users store files or retrieve files
on the server as if they were using their own hard disk.
b) Print servers:
A print server coordinates the printing on the network. However, in small networks both file
and print management functions are performed by the file server.
c) Database server is a computer on a LAN that stores data. Unlike file server, it does not store
program files.
d) Other servers:
All kinds of servers can be installed on the network e.g. the fax service i.e. connected to a
shared facsimile machine. A LAN user can create a document to a fax server which in turn
facilitates transmission of the document via the fax machine.
.
Peer-to-peer LAN
It allows every computer to communicate directly with every other computer on the network
without relying on the server. A user can access data from any computer on the network and
vice versa. Peer-to-peer LANs are limited to about ten machines, after which the performance
drops and the system becomes cumbersome. They are mainly in small businesses and
departments.
104
INTERNET
The Internet is an international network of networks that connects computers worldwide.
It connects universities, research facilities, governmental organizations, businesses, non-profit
making organizations and individuals, allowing them to access, share and exchange
information.
HISTORY OF INTERNENT.
In 1969, a research body in USA called Advanced Research Project Agency (ARPA) setup a
computer network and named it ARPA net.
It was built to serve two purposes; the first was to share research among military, industry, and
university sources.
It was to provide communication among military units in event of nuclear attacks. By 1980’s
many people had seen the importance of computer networking and internet.
Therefore, American government decided to access the internet.
By 1990’s 3,000,000 million computers were connected, today the internet has grown and
covered the whole world whereby the governments, private organizations and individuals are
using the internet in all spheres of daily life like sending massages and conducting business.
This is a company that provides direct connection and access to the internet services for a
monthly fee. Some of the ISP in East Africa are: Uganda Telecom, MTN, Warid Uganda, Broad
band company, Africa online, Afsat, Swiftkenya, etc
105
The most common methods to connect to the internet
1. Dial-up connection
2. Dedicated connection (through ISDN or ASDL)
DIAL-UP CONNECTION.
A computer dials a phone number to connect to your internet service provider (IPS) using
telephone line
Dedicated connection: This is means that a user has permanent connection of internet services
at all times.
USES OF INTERNET
1. RESEARCH: Internet provides access to a vast amount of research material including
resource from libraries, research institutions. It lets the user to search through reference
materials like online encyclopedia, magazines, catalogs
2. BUSINESS: Internet provides various business facilities such as E-commerce where by many
companies today use internet to sell and buy goods and services on .
3. E-LEARNING: Internet provides a distance education and home schooling through a process
known as virtual reality. Learning through interaction with special programs on the
computer is called electronic learning.
4. MASS MEDIA: with internet you can expect to get latest news were by most of the major
root sites are updated throughout the day. Some of the news sites include BBC, CNN,
Aljazera, Sports zone, Bukedde, New Vision e.t.c.
5. HEALTH: Internet provides latest medical news and research, it provides the patient with
medical information about the different diseases.
106
6. ENTERTAIMENT: it’s also possible to listen to music on the web and to watch video clips if
your computer is multimedia.
7. DOWN LOADING: It is possible for a user to download software, pictures, music files, video
clips from the web and this is possible for the computers connected to the internet.
INTERNET SERVICES
ONLINE BANKING
it now possible to bank your money in the bank by the use of computers without you going
physical to the bank and this has helped to avoid congestion.
Online banking is a banking service via internet whereby the customers of the bank can access
their accounts using the web instead of visiting the bank’s branches.
Main disadvantage
Thieves may obtain your banking details by phishing, which is sending a customer an e-
mail asking for his/her bank details as if it has been sent by the bank.
ON LINE SHOPPING
Online shopping is increasingly popular in some developed countries, where one can order
goods online and pay for them using a credit or debit card. The goods will be delivered to the
address specified by the customer.
107
One can still shop regardless of bad weather.
It is helpful to people who are disabled or hand capped.
It is flexible since one can acquire goods as far as abroad.
There is much greater potential market online.
Goods online are globally advertised.
Mailing list is a group of people using e- mail to communicate their views on common issues or
interest by subscribing to be a member.
Newsgroup or bulletin board enables group of people to discuss on specific topics, where by
the subscribers of newsgroup can post the messages on the internet for all users to access.
GOPHER
Gopher is an old browsing tool or Internet program that allows users to use a system of menus
to browse through and retrieve (open) files stored on different computers.
INTERNET ADDRESSES
Internet addresses are used to identify an individual or resource on the network. Each internet
address must be unique; therefore the internet’s addressing scheme was developed in 1984
and is called Domain Name Scheme (DNS).
108
E-MAIL ADDRESS
An e-mail address directs the computer on the internet to the destination of the e-mail
message. A typical e-mail should look like this:
[email protected]
1. ninsiima is a user name or user ID, it is created by the user during e-mail account
registration.
2. @ is a symbol for “at”, it separates the user name from Domain name.
3. Yahoo.com is a domain name of the host computer i.e. the computer on which the e-mail
account is hosted or located.
4. The period “.” Is read as dot and it separates the domain name components
5. com is a domain type that identifies the type of institution offering a particular service,
meaning commercial institution
1. HTTP stands for Hypertext Transfer Protocol which is a protocol for transferring web files.
2. WWW is a portion of the address that stands for World Wide Web which is the
interconnected system of sites on the internet that store information in a multimedia form.
3.The last part of the address is google.com is a Domain name of host computer, .com being the
root domain
ACCESSING INTERNET
Web Browser: Is software that enables a person to access information available on the web. OR
it is software that translates HTML documents and allows you view web pages on the screen.
Examples of popular web browser are:
Microsoft Internet Explorer,
109
Netscape Navigator
others
Mozilla fire fox
Opera
Google chrom
Address Bar
Web page
Layout
110
7. Address bar allows the user to type the address of website to be visited.
8. Favorite button, displays all web addresses in the favorite folder where a user may store
frequently visited websites
9. Search button, enables a person to search for words on the website
10. Print button, enables the user to print the current page of the website.
11. Mail button enables the user to view and send mails
12. The Go button tells the browser to load the current web page whose address is in the
address bar.
Hyper links: These are underlined or highlighted texts on the website page that indicate links to
other sites. Hyper link can be identified by the fact that the mouse pointer changes to hand icon
when it passes over it. A picture that used as hyper link is called Hotspot.
111
- Feed back: Data transmitted is confined to its destination hence user is convinced of
his/her massages unlike ordinary mail were user is uncertain.
- Real-time: The E-mail is convenient and time saving when sending same e-mail to many
recipients in real time.
- Available 24hrs One can access the e-mail any where at any time of the day, unlike the
traditional mail which has a specific time of operation.
- Attachments: it supports multimedia attachment such as big documents, video, music
graphics.
Disadvantages of E-mail over ordinary Post mail
- Expensive: Incase of initial cost setting up the network and internet. It is more
expensive than traditional mail which requires buying a stamp for postage.
- Needs a media to be delivered: E-mail can only be accessed through a computer device
that is connected to a network or internet.
- E- mail may be corrupted by a computer virus hence it may not open
- It doesn’t support the sending of parcels. Physical items can’t be sent with e-mail while
with post, one can.
- E-mail favors one who knows how to use the computer while post favors only those who
can write.
E-mail facilities
E-mail server: This is the computer that receives incoming messages and delivers
outgoing messages. It allocates a certain amount of storage to hold mail for registered
user called mailbox.
Mail client: This is a program that enables the user to read and compose e-mail
messages, send and access e-mail from the server, e.g. Ms Outlook Express.
To compose a message,
Simply click the compose button. A blank screen opens on which you can type the new
message.
112
3. BCC (Blind Carbon copy) textbox: - Is a field in an e-mail header that enables a sender
to send a copy of an e-mail to other recipients but each recipient cannot view e-mail
address of the other recipients.
4. Subject: textbox: - Is a field where a sender enters a phrase that describes what an e-
mail is about.
5. Type the message and finally click the send Button.
Forwarded messages can be read and sent to other people. Most of such messages are
fun pages, poems, e-cards, gifts etc after reading you further forward to people by simply
click forward button and then provide the addresses of the recipients. Then click Send
button to send.
File attachment
You can also send attachments along with the original e-mail. An attachment can be a
word processed document, spreadsheet file, a database file, picture, sound or video file
To attach a file
in the mail client window i.e. Ms outlook express
click New or compose button
specify the recipient’s address and the subject
click the attach files button then a dialog box appears, where files are browsed
from their location and scanned for attachment
WEB DESIGN
Web design is the process of planning and creating a website.
Text, images, digital media and interactive elements are used by web designers to produce the
page seen on the web browser.
A Web design program is a computer program used to create, edit, and update web pages and
websites.
Examples of Web designing software
1. CoffeeCup Visual Site Designer
2. Serif WebPlus
3. Web Easy Professional
4. NetObjects Fusion
5. Evrsoft First Page
6. HTML-Kit Tools
7. AceHTML 6 Pro
8. Adobe dreamweaver cs5.5
9. UltraEdit
10. TopStyle/ HTML editor
113
11. HTML Editor
12. Xsitepro
13. Web studio 5.0
A web page can be made up of one or several separate documents. A web page is usually a
collection of documents that make up a web site.
A home page is usually the main or cover page of a web document that contain and index or
table of contents to the rest of the document.
What makes a good web page?
1. Using the right combination of text, links and multimedia
2. Making the page accessible and useful to as many users as possible.
A website is hosted on at least one web server, accessible via a network such as
the Internet or a private local through an Internet address known as a Uniform Resource
Locator
What is URL?
URL in full is Uniform resource Locator previously known as Universal resource Locator.
A Uniform resource Locator is the unique address for a file that is accessible on the Internet.
A common way to get to a Web site is to enter the URL of its home page file in your
Web browser's address line e.g. www.facebook.com
114
What is an HTML file?
Steps followed;
- Click start on you task bar
- Select All Programs then accessories
- Click on Notepad.
The first tag in your HTML document is <html>. This tag tells your browser that this is the start
of an HTML document.
The last tag in in your document is </html>. This tag tells your browser that this is the end of
the HTML document.
The text between the <head> tag and </head> tag is the header information. Header
information is not displayed in the browser window.
The text between the <title> tag and </title> tag is the title of your document. The title is
displayed in your browser’s caption (title bar)
The text between the <body> tag and </body> tag is the text that will be displayed in your
browser.
Example;
<html>
<head>
<title>Title of the page</title>
</head>
<body>
This is my first homepage. <b>This text is bold</b>
</body>
</html>
115
In the above example <b> tag and </b> tag make the text between bold.
Open the file you have just created by using any browser on your computer (internet explorer,
Firefox, Opera),
Now you should see an address in the dialog box for example “C:/desktop/homepage.htm” if
you are using windows XP and “file:///C:/users/Username/Desktop/ homepage.htm” if you
are using windows 7.
The above address will always specify where that file is located on a computer or server.
Qn.1
After I have edited an HTML file, I cannot view the result in my browser. Why?
Answer:
Make sure that you have saved the file with a proper name and extension.
Qn.2
I have edited an HTML file, but the changes don’t show in the browser. Why?
Answer:
When you have modified a page, the browser doesn’t know that. Use the browser’s
refresh/reload button/ press F5 on the keyboard to force the browser to load the page again.
HTML ELEMENTS
HTML documents are text files made up of HTML elements. HTML elements are defined using
HTML tags.
The most important tags in HTML are tags that define headings, Paragraphs and line breaks.
116
HEADINGS
Headings are defined with the <h1> up to any number.
PARAGRAPHS
Paragraphs are defined with the <P> tag
<p> This is a paragraph</p>
<p> This is another paragraph</p>
HTML automatically adds an extra blank line before and after a paragraph.
COMPUTER ETHICS
Computer Ethics is a branch of practical philosophy which deals with how computing
professionals should make decisions regarding professional and social conduct.
Information security means protecting information and systems from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruction.
Private data or information is that which belongs to an individual and must not be accessed by
any person unless with direct permission from the owner.
117
A computer virus is a computer program that can copy itself and infect a computer negatively
without the permission of the owner by altering the way it normally works.
Data and information is always under constant threat from people who may want to access it
without permission. Such people will usually have either to commit fraud, steal the information
and corrupt or destroy data. Unauthorized access may take the following forms
i. Eavesdropping
Note: - Hackers mainly use eavesdropping e.g. to obtain numbers of credit cards. A hacker is a
person who breaks into computers and computer networks for profit, in protest, or because
they are motivated by the challenge
Control Measures
1. Use authentication mechanisms that do not transmit the password over the network
such as Kerberos protocol or Windows authentication.
118
2. Make sure passwords are encrypted (if you must transmit passwords over the network)
or use an encrypted communication channel, for example with SSL (Secure Sockets
Layer). SSL is the standard security technology for establishing an encrypted link
between a web server and a browser.
ii. Surveillance (Monitoring)
This is where a person may keep a profile of all computer activities done by another
person or people. The information gathered may be used for one reason or the other e.g.
spreading propaganda or sabotage.
Spying on your competitor to get information that you can use to counter or finish the
competitor. This is mostly done with an aim to get ideas on how to counter by developing
similar approach or sabotage.
119
4. Theft
The threat of theft to data and information is real. Some data and information is so valuable the
business competitor or some governments can pay a fortune to somebody who can steal the
information for them to use.
Control measures.
1. Reinforce weak access points to the computer lab like windows and doors with metallic
grills and strong padlocks.
2. Create backups in locations away from the main computing centre.
3. Employ guards to keep watch over data and information centre and backups.
4. Burglar proof the computer room.
5. Install security cameras for surveillance 24 hours.
COMPUTER CRIMES
Computer crimes are criminal activities, which involve the use of information technology to
gain an illegal or an unauthorized access to a computer system with intent of damaging,
deleting or altering computer data.
OR
Computer crime or super crime refers to any crime that that involve the use of a computer and
a network
Computer crimes include the following;
1. Hacking
A hacker is a person who intentionally breaks codes and passwords to gain unauthorized entry
to computer system and information.
The most vulnerable computers to this crime are the networked computers face with hackers
working remotely.
2. Cracking.
Cracking refers to the use of guesswork over and over again by a person until he\she finally
discovers a weakness I the security policies or codes of the software.
Cracking is usually done by people who have some idea of passwords or user names of
authorized staff.
3. Trespass
Trespass is of two types namely
120
i) Illegal physical entry to restricted places where computer hardware, software and backed
up data is kept.
ii) Accessing information illegally on a local or remote computer over a network.
4. Tapping.
This involves the sending of an intelligent program on a host computer that sends him
information from the computer.
Another way is to “Spy” on a network using special programs that are able to intercept
messages being sent and received by the unsuspecting computer.
5. Piracy.
Piracy means making illegal copies of the copyrighted software, information or data. Software,
information or data are protected by the copyright law.
There are several ways of reducing piracy which include the following;
i. Use license and certificates to identify originals.
ii. Make software cheap enough to increase affordability.
iii. Set installation passwords or key that deters illegal installation of the software.
iv. Enact laws that protect the owners of data and information against piracy.
6. Fraud
Computer fraud is the use of computers to conceal information or cheat other people with the
intention of gaining money or information.
Fraudsters can be either employees in the company or outsiders who are smart enough to
defraud unsuspecting people.
Some fraud may involve production and use of fake documents.
7. Sabotage
This is the illegal destruction of data and information with the aim of crippling service delivery
or causing great loss to an organization.
Sabotage is usually carried out by disgruntled employees or those sent by competitors to cause
harm to the organization.
8. Alteration.
This is the illegal changing of data and information without permission with the aim of gaining
or misinforming the authorized users.
Alteration is usually done by people who wish to hide truth. To avoid this, do not give data
editing capabilities to just anybody without vetting.
121
The person altering data may be forced to sign in order for the system to accept altering the
information.
Alteration of data compromises the qualities of good data like reliability, relevance and
integrity.
9. Phishing
Phishing is the act of attempting to acquire sensitive information like usernames, passwords
and credit card details by disguising as a trustworthy source.
Phishing is carried out through emails or by luring the users to enter personal information
through fake websites.
10. Cyberstalking:
The use of communication technology, mainly the Internet, to torture other individuals is
known as cyberstalking. False accusations, transmission of threats and damage to data and
equipment fall under the class of cyberstalking activities.
1. Data encryption
Encryption is the conversion of data into a form, called a cipher text, which cannot be easily
understood by unauthorized people.
The massage to be encrypted is called plain text document, after encryption it is sent as cipher
text on the net work up to its destination and then decrypted.
Decryption is the process of converting encrypted data back into its original form, so it can be
understood.
The massage is encrypted using a particular order called algorithm or key and it sent to the
receiver as cipher text. The recipient receives it and decrypts it using a reverse algorithm to the
one used during encryption called a decryption key to get the original plain text document.
Hence without a decryption key nobody can be able to reconstruct the initial message.
2. Firewalls
A firewall is a set of related programs, located at a network gateway server that protects the
resources of a private network from users from other networks.
122
OR
A firewall is a device or software system that filters the data and information exchanged
between different networks by enforcing the host network access control policy.
The main aim of a firewall is to monitor and control access to or from protected networks.
People who do not have permission cannot access the network.
3. Log files
A log file is a recording of everything that goes in and out of a particular server/computer. This
is because each user is assigned a user name and password or account.
The information system administrator can therefore easily track ho accessed the system, when
and what they did on the system.
4. Audit trial
A record showing who has accessed a computer system and what operations he or she has
performed during a given period of time.
Audit trails are useful both for maintaining security and for recovering lost transactions.
123