Computer Applications
Computer Applications
DEFINITION OF A COMPUTER
A computer is an electronic machine that has ability to accept data (or
information) as input, internally store and automatically execute a program of
instructions, perform mathematical and logical operations on the data (or
information), and report the results as output. It can also be defined as an
electronic machine that accepts information/data, stores it until the
information is needed, processes the information according to the instructions
provided by the user, and finally returns the results to the user. Computers
has become an indispensable tool in the office, home, or school. Two of the
things that give a computer its flexibility are its memory and its ability to De
programmed.
Features
Ø It is an electronic machine.
Ø It has ability to accept input.
Ø It has ability to process data.
Ø It has ability to store information.
Ø It has ability to give out results of computation.
Ø It acts under the control of stored program
Computers can also do the following:
Ø Arithmetic operations (+, -, *, I)
Ø Logical comparisons of relationships among values (<, >, =)
Ø Storage and retrieval of information.
Attributes of Computer:
Speed & complexity of operation: Computer is a very fast device. It
carry out instructions at a very high speed. Its speed is measured in MHz-one
million instructions per second. No matter how complex, its speed is not
negotiated
Accuracy: its accuracy, though dependent on the instructions and
processor types, it produces solutions to all problems accurately.
Versatility-the multi-processing features of the computer makes it very
versatile in nature. Different tasks can be performed with same ease and
accuracy.
Reliability: Computers never make mistakes on their own. They are very
reliable
Recalling information stored: It remembers stored information or data.
Storage- It can store a very large volume of data both in the Primary
and secondary storage devices of the computer. It can also retrieve the date
Sharing same data: it has the capability of using same data for different
processing by a number of different people. Note that Computers do
whatever human instruct (programme) it to do.
Advantages of Computers
One can write more effectively by means of a computer. There are tools like
spelling and grammar checker, thesaurus and dictionary, installed in the
computer. Thus, it takes less time to proofread a written document and also,
there is no need to open up a dictionary book to look for meanings of words.
Typing is much faster than writing on a paper. If there is a need for
reorganizing the sentences or paragraphs, one can cut and paste and make
the necessary changes. Thus, overall a computer allows the user to create
documents, edit, print, and store them so that they can be retrieved later.
Using a computer, one can remain connected to the world through Internet.
Internet is a network of computers that communicate via the Internet Protocol
Suite (TCPIIP). The World Wide Web (WWW) or simply web is a huge
resource of information that can be accessed via the Internet. To mention a
few of the resources, there are electronic mail (e-mail), file transferring and
sharing, online chat, and gaming. The Internet allows people from around the
world to share knowledge, ideas, and experiences in any field. But, there are
both advantages and disadvantages of Internet. E-mail is a method of
communication used globally, between friends, colleagues, business
partners, and so on. The electronic mail is provided with a system of creating,
storing, and forwarding mails. It may consist of text messages with
attachments of audio-visual clips. One can also download or upload files
using the Internet. There are also facilities like online chatting available on the
Internet. As compared to telephonic conversation, both e-mail and online chat
are cost saving. Online gaming is another important resource of the WWW.
Many online games are available, which are of common interest for any age
group.
Right from banking to investment, a user can accomplish the task by sitting
within the comfort zone of his/her home. With this, one no longer needs to
stand in the line for money withdrawing, depositing, or conducting other
transactions. The same facility is available for making investments. In
addition, one can read current news, check weather conditions, plan
vacations, and make hotel and travel reservations, find out about diseases
and treatment methods, learn about specific countries and their cultures, seek
jobs, etc. via the Internet. If the computer has Internet connection, one can
shop and that too in discounted rates. The purchased products will be
delivered to the provided address, thus saving both time and money.
Nowadays, computers are widely used for education and training purposes.
In schools, computer education has been made compulsory to spread
awareness about computers. As a matter of fact, computers have become a
learning tool for children. Indeed, a student can use the PC as a storage
system for many books. Also, there are many universities that provide online
degrees, which are very advantageous for those people staying in the remote
areas and for the disabled. In fact, online education is one of the most flexible
and convenient forms of learning. One can take the benefit of such online
degree programs staying at home without the need of relocation. Computers
are also used for training purposes. Many companies use them to train their
staffs.
Disadvantages
Ø initial cost of installation is high
Ø it is prone to breaking down, therefore, there is the need to obtain
standby facilities.
Input Unit: This is the conduit through which data and instructions enter a
computer. It is a means of communication between user and the computer.
A computer would be useless without some way for you to interact with it
because the machine must be able to receive your instructions and deliver
the results of these instructions to you. Input devices accept instructions and
data from the user. Some popular input devices are: Keyboard, Mouse,
Scanner, Microphone, CD-ROM, Joystick, etc.
Keyboard
A keyboard is used mainly for typing text into your computer. Like the
keyboard on a typewriter, it has keys for letters and numbers, but it also has
special keys:
· The function keys, found on the top row, perform different functions
depending on where they are used.
· The numeric keypad, located on the right side of most keyboards,
allows you to enter numbers quickly.
·The navigation keys, such as the arrow keys, allow you to move your
position within a document or webpage.
You can also use your keyboard to perform many of the same tasks you can'
perform with a mouse.
Mouse
A mouse is a small device used to point to and select items on your computer
screen. Although mice come in many shapes, the typical mouse does look a
bit like an actual mouse. It's small, oblong, and connected to the system unit
by a long wire that resembles a tail. Some newer mice are wireless.
A mouse usually has two buttons: a primary button (usually the left button)
and a secondary button. Many mice also have a wheel between the two
buttons, which allows you to scroll smoothly through .screens of information.
When you move the mouse with your hand, a pointer on your screen moves
in the same direction. (The pointer's appearance might change depending on
where it's positioned on your screen.) When you want to select an item, you
point to the item and then click (press and release) 'the primary button.
Output Unit: This unit allows computers to communicate with users. Output
device are as listed below:
Printers: Produce printed copy of information. This kind of output is known as
Hard-copy output.
Terminals: For showing the output on a screen. It is TV -like. The output by a
terminal is known as soft-copy.
Plotters: For drawing computer output
Voice Output Devices: Convert digital output into intelligible speech.
Output machines are necessary for communicating computerized results from
the computer to the user. Just as in the case of input, the efficiency of the
output machines has a significant influence on the efficiency of the computer
system. PRINTERS constitute the most popular output device for a computer.
They serve a basic function out of which printing processed data in a form
human can read. This permanent, readable copy of computer output is
termed HARD COPY. Various types of printers exist:
Impact Printers
Ø Dot - matrix printer (or wire - matrix printer) ~ Daisy - wheel printer
Ø Chain printer
Ø Drum Printer.
Non-Impact Printers
These constitute a new development, and they use laser technology, or
photographic techniques to print output.
Ø Electrostatic Printer
Ø Electro- Thermal Printer
Ø Ink - Jet Printer
Ø Laser Printer
Ø Xerographic Printer.
Visual Display Terminals (VDT) are output devices that display data on
cathode-ray tubes. VDTs supply only SOFT Copy output.
The Register
Registers are group of flip-flops use to store data within the Central
Processing Unit. Examples of registers within the CPU include Accumulator
(ACC), Program Counter, Instruction Decoder, Instruction Register, Stack
Pointers, Etc.
System unit
The system unit is the core of a computer system. It is made up of two parts:
Hardware and Software. A computer system is a rectangular box placed on
your desk; or a tower case system usually placed on the floor beside your
desk or a mini tower case system usually placed underneath your desk.
Inside this box are many electronic components that process information. The
most important of these components is the central processing unit (CPU), or
microprocessor, which acts as the "brain" of your computer. Another
component is random access memory (RAM), Which temporarily stores
information that the CPU uses while the computer is on. The information
stored in RAM is erased when the computer is turned off. Almost every other
part of your computer connects to the system unit using cables. The cables
plug into specific ports (openings), typically on the back of the system unit.
Hardware that is not part of the system unit is sometimes called a peripheral
device or device.
COMPONENTS OF A CPU
Central procession unit has three main components: the arithmetic logic unit
(ALU), the control unit and the memory. These parts are interconnected by
buses, often made of groups of wires.
Inside each of these parts are thousands to trillions of small electrical circuits
which can be turned off or on by means of an electronic switch. Each circuit
represents a bit (binary digit) of information so that when the circuit is on it
represents a “1”, and when off it represents a “0” (in positive logic
representation). The circuits are arranged in logic gates so that one or more
of the circuits may control the state of one or more of the other circuits.
The control unit, ALU, registers, and basic I/O (and often other hardware
closely linked with these) are collectively known as a central processing unit
(CPU). Early CPUs were composed of many separate components but since
the mid-1970s CPUs have typically been constructed on a single integrated
circuit called a microprocessor.
CONTROL UNIT
The control unit (often called a control system or central controller) manages
the computer's various components; it reads and interprets (decodes) the
program instructions, transforming them into a series of control signals which
activate other parts of the computer. Control systems in advanced computers
may change the order of some instructions so as to improve performance.
A key component common to all CPUs is the program counter, a special
memory cell (a register) that keeps track of which location in memory the next
instruction is to be read from.
The control system's function as follows, note that this is a simplified
description, and some of these steps may be performed concurrently or in a
different order depending on the type of CPU:
1. Read the code for the next instruction from the cell indicated by the
program counter.
2. Decode the numerical code for the instruction into a set of commands
or signals for each of the other systems.
3. Increment the program counter so it points to the next instruction.
4. Read whatever data the instruction requires from cells in memory (or
perhaps from an input device). The location of this required data is typically
stored within the instruction code.
5. Provide the necessary data to an ALU or register.
6. If the instruction requires an ALU or specialized hardware to complete,
instruct the hardware to perform the requested operation.
7. Write the result from the ALU back to a memory location or to a register
or perhaps an output device.
8. Jump back to step (1).
Since the program counter is (conceptually) just another set of memory
cells, it can be changed by calculations done in the ALU. Adding 100 to
the program counter would cause the next instruction to be read from a
place 100 locations further down the program. Instructions that modify
the program counter are often known as “jumps” and allow for loops
(instructions that are repeated by the computer) and often conditional
instruction execution (both examples of control flow).
The sequence of operations that the control unit goes through to
process an instruction is in itself like a short computer program, and
indeed, in some more complex CPU designs, there is another yet
smaller computer called a micro sequencer, which runs a microcode
program that causes all of these events to happen.
Batch System
In a batch processing environment, all the programmes from the various
'users are collected and fed into the computer later by the operator one after
the other and are thus executed in sequence. With this arrangement,
programmers no longer have to run their own programmes by themselves. As
a result, the user may have to wait for hours or even days before getting
computer response.
The Computer has to run a complete programme without stopping so
that the other programmes have to wait for long periods before gaining
access to the computer. And if there is a bug in the programme, the job may
be shorted and will have to be resubmitted after correction.
It should be noted that in a batch processing system not only is data for
a given application accumulated into batches but also a number of different
application are accumulated into batches. They are then processed
periodically according to a predetermined schedule for the efficient use of the
computer system.
REAL-TIME SYSTEMS
A real-time processing system is an on-line system with quick response
capability. Such a system has the capability of accessing and updating
computer files using terminal equipment quickly enough to affect decision
making. Here input data are processed as it become available, regardless of
the order in which the data arrives. '
A typical example of the real-time system is an airline reservation
system. This is a real time application, where customer can request airline
information and receive responses quickly enough to make a decision
concerning the reservation of an airplane seat.
TIME-SHARING SYSTEMS
Time-sharing may be defined as a situation where many users have
simultaneous conversational interaction with a single computer system or as
an orderly organization of computers and communication equipment
(hardware) and specialized programming (software) that permits concurrent
utilization of the facility by a large number of users working at remote on-line,
typewriter like terminal.
In a time-sharing environment, each user is able to enter his programme at
any time and form any terminal and can expect the computer to react and
reply instantaneously.
To process a job, the user transmits his number (pass word) through the
terminal. The communication controller received and identified the user as a
legitimate paying customer and connects the user to the CPU.
The user now has access to the CPU which processes the programmes in
accordance to a predetermined algorithm.
COMPUTER APPLICATIONS
USES OF COMPUTER
The merging of the gains of VLSI with those of telecommunications
gave birth to a new revolution in the computer industry called information
technology (IT). Today we can talk of an information age. Instead of the
traditional concepts of data processing linked with the application of
computer, we now talk of data delivery.
The application area of computer is unlimited. Some of the areas in
which computers are making tremendous impart are transaction processing,
telebanking, teleconferencing and videoconferencing, telemedicine, text
handing (DTP) Document, Image Processing, teletext/view data, electronic
mail, voice mail and networks.
The application area of computer is unlimited. Some of the areas in
which computers are making tremendous impart are transaction processing,
telebanking, teleconferencing and videoconferencing, telemedicine, text
handing (DTP) Document Image Processing, teletext/view data, electronic
mail, voice mail and networks.
The ultimate, referred to as the killer, is the Internet-and World Web
(WWW) - which has turned the whole world into one global information
village. The development world has harnessed the power of the computer
and to revolutionize their own world for the benefit of their citizens. How has
Nigeria fared? What development has taken place in Nigerian since Von-
Newuman invented the stored-program concept?
Application of computers in Nigeria has been mainly in the areas of
transaction processing. Notable areas are banking automation, personnel and
payroll records, financial systems, census, examination processing, oil
exploration, scientific computing, and text handing (DTP) to mention a few.
Information presentation
Computers facilitate effective presentation of information. Presentation
software like PowerPoint and animation software like Flash among others can
be of great help to teachers while delivering lectures. Computers facilitate
audio-visual representation of information, thus making the process of
learning interactive and interesting. Computer-aided teaching adds a fun
element to education. Teachers hardly use chalk and board today. They bring
presentations on a flash drive, plug it in to a computer in the classroom, and
the teaching begins. There's color, there's sound, there's movement - the
same old information comes forth in a different way and learning becomes
fun. The otherwise not-so-interesting lessons become interesting due to
audio-visual effects. Due to the visual aid, difficult subjects can be explained
in better ways. Things become easier to follow, thanks to the use of
computers in education.
Computer hard drives and storage devices are an excellent way to store data.
Computers enable storage of data in the electronic format, thereby saving
paper. Memory capacities of computer storage devices are in gigabytes. This
enables them to store huge chunks of data. Moreover, these devices are
compact. They occupy very less space, yet store large amounts of data. Both
teachers and students benefit from the use of computer technology.
Presentations, notes and test papers can be stored and transferred easily
over computer storage devices. Similarly, students can submit homework and
assignments as soft copies. The process becomes paperless, thus saving
paper. Plus, the electronic format makes data storage more durable.
Electronically erasable memory devices can be used repeatedly. They offer
robust storage of data and reliable data retrieval.
This was about the role of computers in education. But we know, it's not just
the education sector which computers have impacted. They are of great use
in every field. Today, a life without computers is unimaginable. This
underlines the importance of computer education. Knowledge of computers
can propel one's career in the right direction. Computers are a part of almost
every industry today. They are no longer limited any specific field. They are
used in networking, for information access and data storage and also in the
processing and presentation of information. Computers should be introduced
early in education.
Computers have brought about a revolution across all industries. They have
changed the face of society. They are no longer specialized tools to be used
by specially trained people. They are ubiquitous and used in almost every
sphere of life. Computers are the best means for storage and management of
data, they can serve as huge knowledge bases and can be harnessed for all
sorts of financial transactions owing to their processing power and storage
capacities. As computers are a daily utility, they have gained immense
importance in day-to-day life. Their increasing utility has made computer
education the need of the day.
Computer education helps one manage one's own business assets and
personal finances. Computers serve as efficient means for management of
information. Personal financial assets, medical records and important
documents can be stored in an electronic format in a computer system.
Today, banking transactions and payments of bills can be done over the
Internet. Similarly, online shopping is becoming widely popular. To be in the
race, it is very important to take computer education.
Computers, which have such a wide variety of applications, are indeed ruling
society. To keep up the pace in this fast life of today, computer education is
extremely important. Computers are an integral part of life and so is computer
education.
COMPUTER APPLICATION IN SCHOOL ADMINISTRATION
This section forms the foundation of the school section and it has to be
taken care of and nurtured with every available modern material in order to
improve its standard and development. Administrative section in school
comprises of many sub-sections, which are directly responsible to it.
ACCOUNTING DEPARTMENT
In the accounting aspect of an administration computer enables the
organization to determine their work force at a glance. Amount being paid
(annually, monthly or weekly) number of hours worked per day and total tax.
Records for each employee are stored on the system as permanent
files (using magnetic tape or disk)
The payroll processing involves only simple calculation like hour worked
time rate. But in manual processing of salaries valuable time are spent on
retrieving information. Updating and sorting files, and printing out individual
pay slips, computer also helps in determine the financial position of the
institution and it also aids budgeting.
The above mentioned function of computer in accounting can be
achieved through the use of accounting package like lotus 1-2-3 and also
some financial packages like financial modelling.
ELECTRONIC BANKING
For many consumers, electronic banking means 24-hour access to
cash through an automated teller machine (ATM) or Direct Deposit of pay
checks into checking or savings accounts. But electronic banking now
involves many different types of transactions.
Electronic banking, also known as electronic fund transfer (EFl), uses
computer and electronic technology as a substitute for checks and other
paper transactions. EFTs are initiated through devices like cards or codes
that let you, or those you authorize, access your account. Many financial
institutions use ATM or debit cards and Personal identification Numbers
(PINs) for this purpose. Some use other forms of debit cards such as those
that require, at the most, your signature or a scan. The federal Electronic
Fund Transfer Act (EFT Act) covers some electronic consumer transactions.
The Internet is the largest set of computer networks that use the Internet
Protocol. The invention and development of the Internet was the biggest
discovery by mankind in the 20th century that lead to a revolution. Today, the
Internet is used by more than 50% of the world population as its applications
are found in nearly every fields of life, be it communication, knowledge, news,
shopping, marketing, entertainment, education, etc. So, how exactly does the
Internet technology benefit students for education? Let us take a look at it in
detail.
✔ Easy Contact
As mentioned above, communication is one of the biggest advantages of the
Internet in education. Students can contact other students or their teachers
via the E-mail if they have queries about any information. Sharing of
information, discussions on a particular subject, etc., can be easily carried out
using the Internet. At the same time, teachers can also contact parents and
guardians easily using Internet.
✔ School/College Projects
The Internet can be most useful for completing projects in schools and
colleges. As the Internet is an ocean of information, covering nearly all
subjects known to man, one can find information, research work, etc.,
required for one's projects. Going through the information on the Internet is
definitely faster than reading an entire book on the subject. Homework is also
made easier with the help of the Internet which is also one of the important
uses of computers in education.
Encyclopedia
Sometimes, an encyclopedia may not always be available to students and
they may have difficulty in gaining access to the books in the library. In that
case, the encyclopedia of various subjects available on the Internet can be
helpful. This is more useful for students who belong to communities not
having English as their mother tongue. Kids and younger children can also be
benefited by the Internet by using the pictures, videos, etc., which is one of
the major advantages, when comparing textbooks versus computer teaching.
News
All the latest news are constantly updated on the Internet on news sites.
Students learning politics, can have an access to all the current affairs
through the Internet in the school campus, at home, or at any other place.
Historical accounts like speeches, biographies, etc., are also easily available
on the Internet in detailed and accurate versions.
Online Learning
Another positive effect of Internet in education is the onset of distance
education or online learning. With this facility, you can take up short-term
courses with the course material available online, learn, and give exams. One
of the benefits of online learning is that people from any part of the world can
gain knowledge on different subjects, complete courses, etc.
Using Multimedia
Arguably, it is believed that visual data has a greater impact on learning and
memorizing than plain text. Therefore, images, graphics, animation, pictures,
slides, documentaries, etc., have a greater appeal than a plain textbook.
Using multimedia and Internet provides an opportunity for children to gain
knowledge about a particular subject in depth. Students can now see the
actual photographs of rare bird species, or see animated graphics of a
volcanic eruption to understand it in detail.
Affordable Knowledge
Investing in research material may be tedious and unaffordable for some. But,
now, thanks to the Internet, we have content websites, web encyclopedias,
and dictionaries whenever we want them. Today, able as well as less-able
students can be benefited to the sea of knowledge through the Internet.
University courses and learning is now easy for people belonging to all strata
of the society with the help of online courses.
Word Processing
A Word Processing software automatically corrects spelling and grammatical
mistakes. If content needs to be replicated, there are options known as 'copy'
and 'paste' that allow you to do this without re-typing the content. You can
print documents and make several copies too. It is easier to read a word-
processed document than a handwritten one, making it effectual for
paperwork. You can add images to your document as well, provided by
certain features on word processors.
Internet
It is a network that connects computers worldwide, to an information source
that is free to all, at a minimal fee per month from one's service provider. You
can browse through much more information than you could do in a library.
That is because computers can store enormous amounts of information. You
also have very fast and convenient access to information. Through 'email',
you can communicate with a person sitting thousands of miles away, within a
few seconds. Chat software applications enable one to speak to another
person in real time. Video conferencing tools are becoming readily available
to the common man, making it a convenient feature for one-on-one meetings.
RESEARCH
The most basic function of a computer is to compute or calculates and
that is its greatest asset as it can do it fast and accurately (Ayeni 1992).
In the development of theory or hypothesis, a researcher is often
confronted with masses of data he wants to work on. If he has access to
computer, he can store the data somewhere in the computer and make use of
the high-speed computation offered by the computer to examine as many
hypotheses as possible on the data in his pursuance of a possible theory
relating to the data.
Statistical analysis of data derived from experiments can be very
tedious and cumbersome especially when the quantity of data involved in
very large and many variable are involved in the analysis.
Through the procedures for analyzing these data (standard in most
cases), a manual analysis would involve hours and possibly days of
computational efforts due to care that needs to be taken for accurate results
to be obtained and margin of errors that must be achieved. And the accuracy
can be relied upon.
Computers are also very useful in simulation studies. Also programmed
instruction set on the computer can be used a learning tool for studies. Such
a programmed instruction set is called computer aided instruction (CAL).
The computer program would display a lecture on the screen of a visual
display unit for student to study and would thereafter pose questions for
students to answer.
PROFESSIONS
Computers are being used extensively in accounting, architecture,
engineering, law and medicine among others. Ayeni (1992) emphasized on it
as follows:
In architecture and engineering, computers are used to aid in design of
bridges, buildings, machines and so on, by combining various basic elements
and evaluating their capabilities in terms of measurement, physical
properties, stresses and so on, some numerical calculations that can be
refined in estimating parameters used for evaluating some of the designs
involve large-sized differential equations, which are too difficult to solve
manually.
In law, computers are used mostly for information retrieval. Abstracts of
cases are stored and indexed in the computers when a new case comes up,
similar cases are retrieved from the data bank and listed. The lawyer can then
study the new case along with some or all retrieval which may serve as
references.
Also some lawyers use computers to keep diary of cases that are listed
for hearing in the immediate future.
In medicine, a popular use of computers in medical records for storing
the history of patients. These records are updated from time to time. The
history of patient and his degree of response to past treatment enable the
doctor determine whether the present mode of treatment should be
discontinued or not. Also computers can be used to aid diagnosis. In this
case, current data such as temperature reading, blood pressure, symptoms
and so on, of patient are entered into the computer. The data is analyzed by
the computer and the computer suggests what type of ailment the patient
suffers from. Finally, in large hospital environments, computers are used for
scheduling nurses on duty.
OFFICE AUTOMATION
Ayeni (1992) in his work stated that computers are now being used in
the office to assist in the office work. The greatest attention has been paid to
computer assisting in typing documents and letters involving addresses in
form of labels to be affixed to envelopes.
Word processors and micro computer are used to store documents.
Many pages of documents could be stored. The processor in particular has
facilities to format the document in a desirable manner. An office secretary
who has to use the word processor should have a minimum exposure to the
use of computer.
The word processor has the advantages of being able to print several
copies of the same document and also being able to make minor changes in
the text of the document very easily before printing the entire document.
Hartley (1990), stated in their work that the catalyst for the use
computers as automation aids in offices came when microprocessor
technology enabled manufacturers to produce word processing machine at
prices low enough to become practical altemative to typewriters. Word
processors allow the typist to create a document using an image in a VDU
screen.
The earlier word processors were specialized machines.
However, the current trend is to use a conventional personal computer
with a word processing package. In this way the personal computer can be
used for a variety of functions.
The second major office automation (unction introduced on PC' is the
spread sheet. A spread sheet program such as Lotus 1-2-3 or Microsoft Excel
allows the screen to image a large sheet of paper, broken into rows and
columns.
Data can be typed into cells in the matrix but the others can be filled in
by calculation. By using a shared microcomputer or by networking Pc's, users
can share resources such as high quality laser printers, main frame
communication links and databases. Given a share able systems, new office
automation functions becomes possible examples are electronic mail and
messaging EMM whereby a user can create a note or document using word
processing facilities and then either send it direct to another user or place it
into an e-mail box. Users are then responsible for checking their mail box.
BUSINESS
Computers in Business
Nowadays, the use of computers in industries is quite commonplace, owing to
the fast processing of information and timely deliverables. In this article, let us
explore the significant role that computers play in the business world.
Almost everyone is aware that Information Technology (IT) has played a very
significant role in taking businesses to new heights. Before the advent of
computers and relevant technology, business were totally done using manual
resources. As a result, the time taken to complete a task was more, quality of
work was not up to the mark, and the procedures also tended to be more
complicated. However, as computers started to be used in businesses
establishments, the processing of work got more stabilized.
GOVERNMENT
Ayeni (I 992) in his work was of the opinion that computers are
generally used in providing public services in the government, although a
great number of departments use computers for conventional business
applications such as payroll, personnel records and economic planning.
Economic models are used in planning and forecasting. The economic
model of a large state or country can be very complex, as it would involve
very many parameters such as various products or groups of products, their
load of productions and consumption.
Computers can also be used for compiling census and survey data. The
amount of data that is required to be recorded and processed in the conduct
of census is very enormous in large populations but is much less in surveys.
In Government, computers are also used for licensing operations; various
licenses are issued, reversed or revoked by government from time to time.
Manual processing of relevant data is sufficiently localized to avoid long
queues or delays at the local offices.
The use of computers in the military is more prominent in research and
development and in solving problems on games and operations. It is noted
that at the arrival of computers in the forties, one of the first successful areas
where computers were used was in the military during the second world war
1939-1945,. Computers were used in solving problems on allocation of
resources to competing units during the war.
COMMUNICATIONS
Hartlely (1990), stated that communication systems carry mixtures of
voice, data and image signals, occasionally they are simple point-to point
system such as the cable joining a VDU to a computer port, More often,
however, systems need a switching facility to make and break connections
and to share a single physical system among a number or separate logical
services. These computers can be used effectively as intelligent nodes in
communications system acting as switches. multiplexes demultiplexers and
protocol converters. In the latter case. messages Can be received in one
format and transmitted in another. thus acting as a bridge between different
systems. As an example of computer controlled communication switch,
consider the private automatic branch exchange PAAX) which provides
telephone services within a building and access to external public service
lines, the earlier PABX used analogue circuits with relays to create
connections.
A computer sensed the dialling pulses or multi-tone frequency signals
decoded this as address information and activated signals to close the
required relays.
Nowadays, the PABX is totally digital. The voice signals as well as the
dialling arc converted to digital form and addressing packets of data within the
computers performs the routing. Because of the computerized control of the
circuits. many extended functions became available such as abbreviated
dialling conferencing automatic redial. dial-back e.t.c.
Specialized data communication equipment for joining computers
networks for connecting terminals to computers, for protocol conversion
multiplexing all use specialized digital computing techniques.
According to Dennis P. Curting et. al, you can use your computer to call
another computer anywhere in the world by using a modem and the
telephone line. This process is called telecommunication. He further stated
that exchange of electronic mail with other users, transfer of public domain
software from another computer onto one of your own disks so that you can
run those programs on your computer, holding of conferences with a number
of other users as major application of computer in communications.
HEALTH
According to Richard (1986), Ethical dilemmas have always been
present in 'the care. Critical decisions affecting human life and welfare are
integral to the medical profession. When computers are introduced, however,
many of these decisions became more complicated methods and devices for
prolonging life, using artificial or severely damaged limbs and diagnosing and
treating disease have been greatly enhanced by computing technologies.
Millions of people have greater hope for leaving more normal lives, Some
areas of computer aided biomedical engineering are pacemakers, artificial
hearts, and prosthetic and monitoring devices.
Pacemakers are microprocessor controlled programmable devices,
which help persons suffering from hear disease by maintaining a regular
heartbeat and keeping steady flow of blood throughout the body.
In 1992, the first programmable pacemaker was implanted. It costs
1250 dollars, was considerably smaller than earlier ones and could be
reprogrammed to alter pulse rate and output current without being removed
form the patient, with them physicians can alter 40 different parameters,
obtain and display heart performance data gathered by the implanted
pacemaker and check to see that the-device is functioning properly.
Another area of application is the artificial heart. Considering the
advances and successes with pacemakers, it does not seem far-fetched to
imagine an artificial heart run by a microprocessor entirely contained in a
person's body and enabling that person to function as though the original
heart were in place. Later in 1982, the first artificial heart was successfully
implanted into a patient.
Another area is the use of prosthetic and monitoring devices. Design
and implementation of artificial limbs have shown marked advances, as
medical professionals understand better how the brain, neural networks,
muscles and other part of the body work together to cause movement.
Richard (1986) also stated further that, research in combination with
medical prosthetic designers are now integrating microprocessor technology
to simulate circuitry within the human body.
Successful experiments have been conducted to replace or support
damaged neural networks and restore movement previously paralyzed knee.
In 1982 a young female paraplegic was able to make a few paces after
being equipped with a rather elaborate device consisting or approximately 30
sensors and electrodes in contact with the leg's major muscle groups and
triggered by electrical bursts controlled by a micro computer. A teed back
system provided input so that connections could be made as movement took
place.
Diagnostic devices could signal an impending stroke, indicate which
body parts that need more exercise, warn of possible malfunctioning of
organs and generally contribute to a person's health.
Automobiles already utilize diagnostic devices for a variety of functions
including easily warning of potential dangers such as excessive brake wear.
Other devices can monitor the location o fan individual at all time.
A system termed "home incarceration" has been in New Mexico. The
device used is cigarette. Pack-sized transmitter worn on a probationer ankle.
It sends signals to a computer. Probation officers can tell where the
probationer is by monitoring the computer output.
MANUFACTURING
Richard (1986), noted that since the beginning of the industrial
revolution, the factory has been a source of employment for thousand of men
and women. The need to have many workers in a particular factory has led to
the development of dense population centres. The output of the factory has
strengthened the national economy and brought a high standard of living to
the majority of the citizens of the developed nation. Direct intervention of the
computer into the manufacturing process is most noticeable in the form of
computerized controls and more recently robots.
In process designing, computer plays an important role in the design
stage of production. Computer aided design and drafting (CADD) system are
used to automate the production of design drawings and design changes.
Such system allows one person to produce the drawings that would have
required from two to eight persons without the aid of automation.
In process control, specially designed computers have been used to
read temperature and pressures in manufacturing process and to adjust
valves and other equipment according to the needs of the process.
Large oil refiner, plants require very little human labour to produce
gasoline and heating oil: from the candle oil they reuse. Telephone exchange
offices put through calls automatically under control of special computers,
process control computers automatically under control of special computers.
Process control computers automatically adjust the level of electricity to meet
the demands of electric power consumers on a continuous, real-time basis.
In robotics, Richard (1986), stated that devices called robots art' being
designed and purchased to do the work for which there is an insufficient
supply of human workers. In particular the use of robots in the operation of
unmanned night shifts in the machine tool industry has been tried as a way of
overcoming the shortage of machinists. Sick leave vacation and strikes arc
not issues with a robot,
It works any number of hours without tiring or complaining or requiring
breaks. Long hours do not lead to reduce quality of work.
One reason for the advance use of robots is that they are becoming
capable of performing useful tasks. In the past a major limitation to their
usefulness was its inability to feel and see. Artificial intelligence has led to
advances in the way a robot is now able to process image and respond as if it
could see.
The use of computers to aid the manufacturing process that includes
integration of data, process control and robots is referred to as computer-
aided manufacturing.
LAW-ENFORCEMENT
Military, Navy, and the Air Force (Security)
In the military, these systems are used to store confidential information. They
are used to develop, test, and debug important programs. They are used as a
surveillance equipment to check the enemy territory. In the navy, they are
used for logistics, personnel, and pay records. They are used in the
applications of SONAR and RADAR, for example, in tracing lost airline debris
or sunken ships. For the air force, they are used to develop standardized
tools and interfaces in accordance with the Air Force Network Operations
(AFNETOPS) guidance to transform raw data into actionable C2 information.
They are used to develop, test, and analyze crucial programs with regards to
the working mechanism of different kinds of airplanes. They are used for
information processing, storage, and rescue operations.
CRIME
To an economist, a banker or an accountant, the act of deceiving
somebody to acquire money, goods e.t.c. illegally is known as fraud.
According to Mr. Odoh, an information technologist, "fraud is an act of
changing figures for personal gains". From the foregoing, one can begin to
have an idea of what computer crime is. Computer fraud, which is any
dishonest or criminal act perpetrated or aided by the use of a computer
system. This crime in question includes fax piracy, illegal use of credit
cards/facilities, cellular cloning, signature forgery fake entries into customer
accounts in blanks and finance houses, illegal transfer of money from one
account to the other and so on.
CASES
Although cases of Computer Crime are not rampant in Nigeria and
Africa at large, the reason is not that computer Criminal are not on the
continent of Africa but the crippling technological growth. Computer Crime is
no longer news in places like America and the United Kingdom. The Guardian
of 21st April, 1998, reported a case of one Smart Alec who paid the sum of
ten million dollars into an account in New York and requested the sum to be
transferred to an account in London, where the money must have transited
into a whopping sum of one hundred million dollars, just in a mater of
seconds!
What he expected was no magic but a mere addition of a zero to the
existing ten (two digits) to make a hundred (three digit) by an official of the
hank who was in connivance with him. The fraudsters were unlucky: the
attempt failed!
Also in the U.S.A. imagine another fraudster who defrauded more than
ten super markets in ten cities through the use of credit facilities. This
fraudster succeeded in wreaking tins havoc in less than five hours.
With the rise in computer dependency these days, one will definitely
expect computer crime to be on the increase in the next millennium.
particularly with the advent of the Internet.
STAGES
According to Dr. Paul Otunbusin. Computer Crime can occur in five
different stages in the operation of a computer. These stages are:
1. The input stage: When data are entered into the computer, crime mayor
perpetrated by supplying false data or altered information to the computer.
2. The programming stage: This involves alteration and for manipulation of
the program intended to control the operations of the computer.
3. The processing stage: This involves alteration or manipulation to the
computer input processor through improper instructions.
4. The output stage: This involves stealing or selling to competitor.
Confidential print-outs by criminal minded insiders of computer based firms
and companies
5. The data communication stage: At this stage, un unauthorized person
could break into telephone circuits, thereby having access to-confidential
information.
EFFECTS
The effects of computer crime include:
(a) Loss of huge amount of money, which might force some, films or
companies into liquidation;
(b) Severe and irreparable destruction ofvita documents in a bid to cover
up crime by computer criminals;
(c) Exposure of sensitive and! or confidential information of firms,
companies and government parastatals, thereby making them prone to
criminal attacks.
SOLUTION
To curb computer crime the following solutions are proffered:
1. In cases of data transfer, data encryptioning should be adopted so as to
protect stored data and forestall any forgery. alteration or removal by an
unauthorized person or device.
NOTE
Data encryptioning means transformation of plain text to cipher text which is
secret writing, usually in codes, with an associated key or code books(s):
such code book(s) is/are normally kept secret. The act of encyptioning is
cryptography.
2 . When a computer crime is detected, such a case must be reported and
given immediate attention to avert its prolonged effect.
3. In all computer dependant firms, companies and government
parastatals should be clearly defined, thereby enhancing easy and effective
tracing of criminals if and when there are cases of computer crime.
4. Severe punishment should be imposed on crime perpetrators so as to
deter intending criminals.
5. For each firm, company e.t.c., external auditors should be appointed,
whose visits will not be. announced to the workers of such a firm or company.
6. Imposition of standard measures of checks at various points such that
before u transaction is completed, it must have gone through two or more
hands.
7. Staff of firms and companies must be transferred from one unit to the
other, within a short time, say 1½ to 2 years and without them knowing their
next department prior to the transfer.
8. Passwords and other security measures in computers should be
changed at intervals.
9. Restriction of computer users to their particular operations, thereby
disallowing unnecessary accesses to computer systems.
CHAPTER FIVE
INTERNET
(1) Telnet
The terminal emulation protocol allows users to connect to a remote
host and run programs on it. You must have authority to access a file before
you can use Telnet
It provides the users with the ability to connect to a computer in the
Internet and act as local user in the remote server, but a lot of public services
(Archie, gopher, e.t.c) are accessible via telnet without the need of being
registered in the remote machine.
The format for the telnet protocol is: Telnet host (Telnet IBM 306A-
Name of machine)
Where host is either the name of the machine one wishes to use or its
'numerical address, also known as IP address.
(3.) Mail
Electronic Mail: it allows the exchange of text messages between users
throughout the world. It uses the SMTP protocol (Simple Mail Transference
Protocol) from the TCP/IP protocols suite. It tries to establish a direct
connection in order to send the e-mail message, if the connection cannot be
established it saves the message in a file and at a later time tries again. This
method makes for a highly reliable service.
SMTP does not acknowledge the reception of e-mail messages. The e-
mail service is a fast and efficient way to exchange information amongst more
than 40 million users in the world. Internet delivers email to all these users
using Domain Name System (DNS) which is a hierarchical method that
combines geographic and organizational data to identify a host.
(4.) Talk
It is an interactive communication service that allows two users to
engage in an on-line "conversation" screen to screen from different
computers. While in a talk session the computer screen splits in half forming
two windows, one of the windows displays the characters being sent, while
the other shows the one being received. Here before you use this, you must
have informed the other party that he should log on at a particular time.
(5.) News
There are two ways to participate in discussion groups over the internet:
one is by means of Usenet Newsgroups, and the other is using mailing lists
(also called mail reflectors). Both of them have the capability to create large
communities of users that share a special interest in a particular subject.
Usenet (User Network) is a public network made up of thousands of
newsgroup and organized by topics. Although its origin is outside the internet,
nowadays is one of the milestones.
The News, as are informally called, use the NNTP protocol (Network
New Transport Protocol) which is part of the TCP/IP stack of pro to cols and
described how the messages from the different news groups are exchanged
between collaborating servers.
In order to be able to read message from a newsgroup an NNTP reader
is needed as well as access to an NNTP server. The newsgroups are
organized by categorized such as: misc (miscellaneous), soc (social
activities), talk (political discussion)sci (science and technology), rec
(recreational), comp (computers) and flews (general information about Usenet
news).
The users can browse through the different news groups available,
reading messages, replying to them or posting new ones if they wish.
E-mail lists or mail reflectors offer the same opportunities to the user;
the main difference is that users must subscribe to this service. After
subscribing to a list of interest every message sent to it will be automatically
sent to each of the subscribers.
(6) Web:
The World Wide Web is a network of severs that use hypertext to
establish a link and to access files, often with lavish graphics. It is currently
the most popular service information exchange in the internet.
When we have a web server that means other servers can access it. A
lot of web sites are even capable of supporting video and audio.
The WWW was born at CERN (European Laboratory of Particle
Physics) and it uses hypertext to link pieces of information that can be in any
part of the network. To access the information available on the Web it is
necessary to have a Web browser. The most popular browsers available at
the moment are Netscape, Internet Explorer and Mosaic. Any of these
browsers will allow access to services like Gopher and FTP, and even e-mail.
Mosaic was created at the National Centre for Super Computing
applications at lllinois University and lets users navigate through the internet
using a very comfortable graphical windows interface. The other browsers are
refinements of mosaic.
What makes the WWW pages so amazing is that the hyperlinks that are
in them can take us to another document that can be in a server anywhere in
the world. A lot of businesses have WWW pages in the internet, providing an
excellent way to meet the interests of vendors and buyers alike.
(7) Gopher
It is a service offered in the internet that allows the user to search and
retrieve information in a user - friendly way.
Gopher is a search tool developed at the University of Minnesota that
shows the information in a series of hierarchical menus, kind of like the table
of contents in a book. The Gopher servers are limited to text display whereas
the WWW pages can publish text, graphics, and video. But in order to be
able, to access the web one need to have a full Internet connection with least
14400 bps of bandwidth and a powerful machine with graphic capabilities.
While using Gopher, we do not need the mouse and a slow speed
connection to Internet makes do. When we selects a specific topic - using
Gopher we jump from one link to another. The Gopher servers have a lot of
useful information. In order to obtain more information about the 3,000 plus
Gopher servers available at this time the users should visit the Gopher Server
University of Minnesota.
The way to access this service is through client software installed on
the local machine. Several sites offer public Gopher clients that are
accessible through telnet.
(8) Archie
It is used to locate files that are stored in FTP servers. It is a database
with information and servers that offer anonymous FTP services. Archie
servers can be accessed through telnet using as a login the name "Archie".
Two of the most popular Archie servers around are the Taiwan Archie. telnet
archie. ncu. edu. tw, and the SuraNet Archie: tenet archie suranet. The
different Archie servers communicate with each other and therefore share
essentially the same information.
(9) Veronica
(Very Easy Rodent-Oriented Netwide Index to Computerized Archives) -
a search tool similar to Archie with the difference that VERONICA looks for
text found in Gopher menus. This may sound as a small domain, but since
there are Gopher servers that include e-mail listings, newsgroups, and more,
the results of a search using VERONICA can be amazingly ample. The usual
way to access VERONICA is by selecting the service from one of the menus
is a Gopher server, by doing this. a small. dialogue box will appea,r asking for
the keyword we are looking for. Afterwards we-will see another menu that
displays related articles as the result of the search, from this list we select a
site that has-the information we are looking for.
(12) E-Commerce
Electronic commerce (e-commerce) is already a reality. It is attractive
because it reduces cost of ding business. Sending a few bytes of data over
the network is cheaper, faster and more convenient than sending a
messenger or even making a phone call. Unfortunately, e-commerce has
suffered from the fact that there are no readily available secure means of
payment for the goods and services ordered for. Payment has been made by
credit card whereby customer would have to provide credit card details using
e-mail. However, given the open structure of the Internet, there is a general
unwillingness to make personal credit card details available in this form
because both buyer and the seller are exposed to fraud or nefarious third
parties. Also the emergence of the many businesses on the Internet offering
services to customers has caused the need for a secure online payment
system.
Furthermore, there is a lot of trust involved in buying goods or services
in the virtual world of e-commerce. You do not just trust that the quality of the
goods or services will be satisfactory; you may also have to trust that the
quality of the goods or services will be satisfactory; you may also have to trust
that you will even receive them. The question of trust is very important in the
virtual world than in the real world. This is because the two parties are not in
the same place, and hence one can not depend on things like physical
proximity, hand-shakes and body signals. In addition, the other party may be
in another country or even in cyberspace, hence transaction might not be
subject to the laws of the country or state at all.
CHAPTER SIX
COMMUNICATION
Communication major dimensions scheme