Computer Notes
Computer Notes
A COMPUTER
A computer is an electronic device that accepts data input, process it according to some specified
instructions, output the information and store the results for future use.
A computer is an electric device that accepts information in form of instructions called a program and
character called data, processes information and output the results
A computer is an electric device which works under control of stored programs automatically accepting data,
processing it, stores it and produces information which is a result of processing.
The computer started with the origin of calculation in the 19th Century with a man invented machine called
the Abacus. It was used for volume computing in China and Japan.
In 1614, logarithm tables were developed by a Scottish Mathematician known as John Napier. He
subsequently invented a rod of bones which was in use 3 (three) years later after his logarithm invention
called Napier’s bones.
In the year 1620, slide rule was invented by William Oughtred an English man
In 1623 Francis Bacon developed the idea of using binary numbers which are described as the binary codes.
The Mechanical Era (Early Discovery)
In 1642 a French Man called Blaise Pascal invented a calculating machine which had got both the ability to
add and subtract numbers however it had difficult in multiplication and division. It was called the Pascal’s
Arithmetic Machine.
In 1671 another calculating machine with abilities of multiplying and dividing numbers was invented by a
German mathematician Gottfried Von Leibniz called the Leibniz calculator.
Analytical engine, in 1822 Charles Babbage a professor of mathematics invented a machine which he
completed in 1834 called the Analytical Engine which was able to combine arithmetic and process data on its
own.
Lady Ada produced programs to be used by this analytical engine and she is claimed to be the first
programmer and it was names after her honour called Ada Programming Language.
Between 1847-54 George Bole discovered the Boolean Algebra.
The Tabulator, in the mid 1880’s Dr. Herman Hollerith discovered a machine which had capabilities of
detecting data stored in terms of punched holes on the cards called the Hollerith’s Tabulator. It used punched
Page1
In 1938 Claude Shannon established how the Boolean Algebra could be applied in the design of computers
logical circuits.
In 1937 automatic sequence controlled calculator (ASCC) was developed, punched paper tape to be used as
an input medium.
In 1941, the calculating machines, the Z3 and Z4 were developed by Ronald Zuse and the machines had the
ability to use programs. Colossus was developed by Alan Turing and the machines were value based.
In 1946 ENIAC (Electronic Numeric Integrator and Calculator was in use. It consumed a lot of power and
was cooled by water.
In 1946 Von Neumann gave a report on the design of the computer today.
Computer generations
Computer generations refer to the technological advancement of computers which has been characterised
into four generation.
First Generation
These were the earliest time computers which were in use from around the mid 1950’s to late 1950’s. They
had the following characteristics
- They used vacuum tubes for to store and process information.
- They used magnetic drum memories.
- They had low memory of about 2 kilobytes
- They used punched cards for input and output.
- Programming was done in machine and assembly language
- The consumed a lot of power and generated a great deal of heat.
- They were short lived and needed a standby technician
- They did not use operating system
- They were slow when processing information.
transistors.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Characteristics
- They used transistors for internal operation.
- They used magnetic core memories
- They were more reliable than those of the first generation.
- They consumes less power compared to those of the first generation
- Their memory size increased to 32 kilobytes and stored much information
- They had high speed when processing information than those of the first generation.
- They were smaller in size than the first generation.
- They generated less heat.
- They had no operating system.
- They used high level programming languages fro programming like COBOL-Common Business
Oriented Language, FORTRAN- Formula Translation
- There was the introduction of super computers like the LARC – Livermore Automix Research
Computer and IBM 300 series, ATLAS, IBM 7030.
Examples of computers in the second generation include.
- NCR 501
- IBM 7094
- CDC 6600 Mainframe computers.
Transistor is an electric switch which allows electricity to pass through a tune moment sometime it does
not allow electricity to pass through.
Fourth Generation
These existed between 1971 to date
Characteristics
- They used Large Scale Integrated Circuits (LSIC)
Page3
The next generation of computers will be the fifth generation, and computers are expected to be; thinking
like human beings, use of automatic robotics, to have parallel processing, voice recognition, decreased size
and cost, to have self organisation, to have an improved speed and power processing.
Characteristics of computers
For a device to be characterised as a computer it must manifest some or all of the following characteristics.
i) Speed. Computers are quite fast in their operations in that their speed is measured in millions of
instructions per second (MIPS).
ii) Accuracy. Computers hardly make mistakes, they are capable of detecting and correcting any
mistakes made. It is therefore follows that if wrong data is fed into the computer, wrong results
are expected out hence a saying “Garbage in, Garbage out”.
iii) Diligence. This is the ability of a computer to perform the same task over and over again for a
long time without getting tired or bored
iv) Artificial intelligence. Computers are artificially intelligent . they can respond to requests given
to them and provide solutions . this is accomplished by its program ability that it can be taught to
make a decision and function
v) Automation. Computers also work automatically, they do not need any supervision in order to
perform programmed routines.
vi) Versatility. A computer can perform a number of tasks at the same time
Uses of computers
i) Computers maintain and control business operations.
ii) Computer provide the required information more effectively and accurately
iii) The are used to store data
iv) They provide employment to people
v) They are used for research
vi) They are used for entertainment like playing music, games and movies
vii) They can be used to safeguard information
viii) They are used in weather forecasting.
ix) They are used in document processing.
x) They can be used to calculate numbers
xi) They are used for stealing
In industry machines are controlled by the computers which has reduced on the time lag between
Page4
important events. Computerised systems eliminate a number of error that could be made by
human beings
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
iii) Computers in transport.
Computers are used in providing guidance to vehicles in braking, acceleration, routing and
measurements.
Today landing air crafts are controlled by computers. Traffic jam is controlled by computerised
lights which are put in most busy junctions like round abouts.
iv) Computers games. Computers provide amusement facilities rather than in business applications.
Some computer games are based on traditional games like chess. Some games like adventure,
dangerous and dragons provide the opportunity to test your memory and ability to think.
v) Computers and medical science
Blind people can read from ordinary books by using a laser scanner, which recognises the shape
of printed letters and converts them into speech using a voice synthesizer. Blind people can also
know by and calculations through the voice synthesizer.
In hospitals computers are used for monitoring patients, raising the alarms of the heart stops
beating or if breathing fails beyond a certain level.
Computer controlled scanners can built up a picture of a patient slice by slice measuring the
strength of rays which have been sent through the body. A computer uses the graph to show the
abnormalities which can’t be seen from outside.
Computers could also be useful as medical experts helping to diagnose and treat illness where
there are no fully qualified doctors available.
vi) Computers in schools. Teachers use computers in carrying out research and they use computers
to make their lessons interesting.
v) The running cost of computers became very cheap in the long run compared to the force of
human beings.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
vi) Computers can work on any problem provided relevant instructions set (programs) are used or
input.
vii) Computers are flexible that is to say they can adopt to any workload without much strain.
viii) Computers produce reliable information.
ix) Computers do not need fulltime supervision when doing the operation because they are
automatic.
x) Computers can be used for research because they can draw lots of facts.
xi) Computers simplify work for man.
Repetitive stress injury, this is a king of muscle skeletal disorder of the muscles, nerves, tendons, ligaments
and joints on that tendon.
Page6
Carpal tunnel syndrome (CTS), is the inflammation of the nerve that connects the forearm to the palm of the
wrist
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Factors causing disorders
- Prolonged typing
- Prolonged mouse usage.
- Continual shifting between the mouse and the keyboard
Computer Ethics
Computer ethics are moral guidelines that govern the use of computers and information system
Software piracy
It refers to as the unauthorised and illegal duplication of copyrighted software. Software piracy is the most
common form of software theft.
Buying or purchasing software only provides a consumer with a licence agreement or the right to use the
software.
A single user licence agreement or end user licence agreement is the most common type of licence included
with software packages purchased by individual users.
A single user licence agreement usually permits a consumer to;
- Install the software on only one computer.
Page7
Classification of computers
Computers can be classified in three bread categories
i) By functionality
ii) By purpose
iii) By size and processing power
Classification by functionality/process
In this classification computers are categorised according to how data is presented and processed. They are
three kinds of computers which include
i) Digital Computers. These are computers which process data that is represented in form of
discrete values or separate form.
Discrete values are numbers that can be defined like 1, 2, 3,.. etc. examples include digital
watches etc.
Characteristics of digital computers
- Not continuous (discrete) pulses
- Can only have one of the voltage levels
- Voltage jumps between levels
ii) Analog Computers. These are computers which process data that is in continuous form or
measurable quantities/units like pressure, thickness of steel plates, electrical voltages.
Analog computers are normally used for scientific work and to engineer functions such as
- The control of temperatures
Page8
iii) Hybrid Computers. These are computers which have combined features of digital and Analog
computers.
The Hybrid computers are further classified according to the work that they are designed for. These are
categorised into two classes
i) Special purpose computers. These are computers designed to handle a particular task. Their
form of operation is restricted in a relative like Digital watches and pocket calculators.
ii) General purpose computers. These are computers designed to solve a wide range of problems.
They can be adopted to perform a particular task or solve specific problems by means of
specially written programs
A typical computer of this type can perform calculations, keep date and time, process documents, store
databases
i) Super Computers. A super computer is the fastest, largest, most powerful and most expensive
computer used for applications that requires complex and sophisticated mathematical
calculations. Super computers are mainly used for scientific research, weather forecasting and
weapons research
- They are used in large scientific research centres and weather forecasting centres
- They use many applications compared to other computers.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
ii) Mainframe computers. These are general purpose computers with high capacity of main
storage, having a range of input and output devices, used by 500-1000 users at the same time and
in most cases several CPU’s
They are very expensive computers. They can be used by 500-1000 users at a time. They are
therefore used by governments, big companies and banks
Characteristics of minicomputers
- They can be used by 50 – 500 people at a time
- They are smaller in size
- They are kept in air conditioned places
- They are slower than the mainframe
- They are used in medium sized companies
- They do not need special power supply
- They are less powerful than the mainframes
Microcomputers
This is a small sized computer used by one person at a time and can perform all its input, process, output and
storage activities by its self
Characteristics
- They have microprocessors used in processing
- They have rechargeable batteries
- They are used during conferences and meetings
- They have better applications compared to the 1st computers
Types of microcomputers
i) Desktop computer. This is designed so that the system unit, input devices, output devices and
any other device fit entirely on a desk or a table.
Page10
iii) Notebook computer/laptops. This is a portable personal computer, small enough to fit or to be
held on the laps that even if on is moving, he/she can work
- They are held the laps
- They are smaller than the desktops
- Its CPU, monitor, keyboard and a mouse are combined together.
- They carry several functions
- They can be used while one is moving
-
iv) A handheld computer/Palmtops/PDA. This is a small computer, portable that can fit in the
hand of the user like cell phones.
- They are extremely small
- They are designed to be held in the palm.
- They are used by one person.
- They are wireless
- They can perform several tasks
- They are used to make calls, fax and numbers.
-
v) An internet appliance is a computer with limited functions whose main purpose is to connect to
the internet. From home.
vi) Network computers. These are computers without their own local storage disks but instead use
another big computer called a server for their storage and processing. They are the cheapest in all
forms of computers
vii) Servers. These are computers with high processing and large storage on which other computers
are connected like the network computers.
V. LIGHT PEN
This is an electronic pointer that allows the user to modify designs on screen. This is defined as a
machine with a light sensitive tip that is used to draw directly on the computer’s video screen. Light
pens have light sensors that identify with [portion when the screen is passed over light pens are
often used in computer aid manufacture technology because of their flexibility .
Other input devices include;
VII. MODEM
This stands for Modulation Demodulation. This is a device that connects a computer to a
telephone ;line and allows information to be transmitted or received from one computer to
another Each computer that receives information should be connected to a modem .
A modem converts digitals signals that are transmitted by a telephone line to the receiving
modem which converts them back to digital that the receiving computer can understand.
OUTPUT HARDWARE
These are computer hardware which bring out information on the user’s disposal.
Monitor
Printer
Loud speakers
Plotters
Spectacles
a) MONITOR
This is a device that gives or shows information on the computer . most computers today display
information using the monitor ( a part from portable laptops)
They display information using the Cathode Ray tube (CRT)
TYPES OF MONITORS
Page13
i. monochrome monitor
This is a single color monitor . It is like a black and white television.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
ii. Colour Monitors.
These are also known as graphic monitors which display text and graphics in colours
b) PRINTERS
These are devices used to produce hard copies of information on paper.
There are four types of printers commonly used namely;
Dot matrix printers
Daisy wheel printers
Inkjet / DeskJet printers
Laser jet printers
Dot matrix printers
These use a series of dots to form character, pictures and drawing. They are very lust and
expensive.
i) Daisy wheel printers
These produce the best letter quality output equivalent to that of a typewriter . They are slower
and more expensive than dot matrix.
ii) inkjet/DeskJet printers.
These spray small droplets of ink to create characters or pictures.
They produce fine quality prints at a high speed. They can even print color and very expensive
to purchase and operate.
iii) LaserJet printers.
These produce a high quality prints at a very high speed and they combine pictures and text.
They are somehow cheap to buy.
CLASSIFICATION OF PRINTERS
Printers are classified into two ways. i.e.
Impact printers and Non impact printers
IMPACT PRINTERS
These are printers that use a hammer method of printing of characters. They are very energetic
and hence much force is applied. They can print on papers, transparencies, clothes, plastic
materials.
They include dot matrix, Epson Daisy wheel e.tc
THEIR ADVANTAGES
They can be used in commercial printing because they are flexible and capable of printing
various and heavy graphics.
These printers are easier to maintain.
They are cheap
THEIR DISADVANTAGES
They are noisy during operation.
They have a lower print resolution compared to other types.
Page14
COMPARISON OF PRINTERS
PRINTER COST SPEED NOISE QUALITY
Dot matrix Inexpensive Fast Whisper Very High
Daisy wheel More expensive Slower Quiet Higher
Inkjet Expensive High Quiet Fine
Laser jet Cheap High Quiet High
C) LOUD SPEAKERS
These produce sound output. With today’s multimedia programmes, speakers have been such an
important necessity.
The quality is mainly measure in walls of power output.
Most speakers use a cone – shaped diagram to produce sound.
D) PLOTTERS
These are used to print best graphics called diagrams.
They are used by engineers , architects e.t.c.
They function like rizonic hands by drawing on papers. They are also used in hospitals.
E) SECTACLES.
These are common in modern computer games especially on flight wars like ordinary sun glasses.
STORAGE DEVICES
Storage devices are devices that help the computer user to store information in or outside the
computer for future use. Storage devices are divided into two ways namely;
i) Primary storage devices.
ii) Secondary storage devices
HARD DISK
A hard disk is the brain of the computer . It is where all necessary programs that are required in
the computer are stored.
A hard disk is a metallic magnetic media housed in a rigid box free from contamination residing
inside the computer.
NB(i) No computer can function/work without a hard disk.
(ii) No program can be run in the computer when it is not stored on the hard disk.
Page15
A computer without a hard disk is like a human being without the brain.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
ADVANTAGES OF A HARD DISK
i) It acts as the brain of the computer .
ii) It has a wider storage capacity / store a lot of data.
iii) It provides a safe storage of data since it is metallic.
iv). Helps to access files / many programmes.
v) . It gives out information at a high speed.
e) ZIP DRIVE
These are related to diskettes but they are larger than diskettes in terms of size and storage capacity.
They have a storage capacity of 1000MB to 20GB
Page16
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
f)PUNCHED CARDS
This is a rectangular card used to store data . These cards were first used in the first generation computers
before disks were introduced. To store data , these cards were inserted in a computer drive and the computer
could punch a number of holes in rows to represent the stored data . The cards would get destroyed easily
and they could keep a few sentences.
(g)MAGNETIC TAPES
These look like video tapes . They are made up of plastic and coated with magnetic iron oxide.
Processor speed:
A good computer must have a higher processor speed.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Memory capacity:
A good computer hard ware should have sufficient memory to handle heavy applications that
require a lot of memory space in order to run.
Warranty:
This is an agreement between the buyer and the seller that spells out terms and conditions of
selling a product in case of mal functions or failure.
Cost:
The cost of the Hard ware matters a lot when making the selection for the computer hard ware.
Upgradeability and compatility:
When buying a computer , the best option would be to get one that can be easily upgraded to
accommodate emergent technologies.
Portability:
The size of electronic devices including computers has become a major consideration because
smaller devices enhance mobility.
User needs:
When selecting computer hard ware , consider the unique needs of the user. For example , if a
user has a special disability like inability to use their hands, consider buying input devices that
capture data through voice input.
PRIMARY
MEMORY
SECONDARY
MEMORY
i) COMPUTER MEMORY
This is a mechanism that allows a computer to store many programs that allow it to perform tasks.
TYPES OF MEMORY
Page18
PRIMARY MEMORY
This is the most important fundamental or basic memory for immediate processing needs.
It is classified into two types.
a) RAM – Random Access Memory
b). ROM- Read Only Memory
RAM
This is known as a temporary memory . With this type of memory data get lost when power is
switched off . It can be compared to a small calculator where calculations are done and when it is
switched off , the figures get lost. RAM is also known as Volatile Memory because the information
is lost when power is switched off .
TYPES OF RAM
Static RAM – It holds data/ content as long as there is power.
Dynamic RAM – This is ram that can hold data / content for a short period of time even when power is
on.
CHARACTERISTICS OF RAM
- IT is a primary memory device that stores results after processing .
- It is a\ Lesser memory because data in it can be accessed any time.
- You can read and write on it .
- It is volatile because it loses its content when power is switched off.
-It is applied in application packaged like ms – word , ms excel.
ROM.
ROM contains programs that are permanently coded / stored in the computer. It stores the soft ware
that runs the computer . With this memory even if power is switched off , the content cannot be lost
as Rom is non volatile memory.
The difference between Ram and Rom is that Ram is temporary while Rom is permanent .
TYPES OF ROM
Mask read only memory, once written by the manufacturer, cannot be changed.
Programmable read only memory (PROM), This allows the user to alter it only once after
content is written on it.
Erasable programmable read only memory(EPROM). This is a transparent quartz window that
allows content to be erased by exposing it to ultra violent.
Electronically erasable read only memory (EEPROM), this kind of ROM can erased and re
programmed using electricity.
CHARACTERISTICS OF ROM
1. You can read from it but you cannot write on it or change it .
2. It stores computer languages or programs
3. It is non volatile because information cannot get lost when power is off .
4. It is applied in systems soft ware like DOS (Disk Operating System), windows etc
5. It gives the CPU the start up procedure
Page19
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
SPECIAL PURPOSE MEMORIES
BUFFERS – This is a temporary holding place that may be part of the central
processing unit or in-built in put or output.
REGISTERS – These hold one piece of data at a time and are found inside the central
processing unit.
CACHE memory - this allows the processor to access data and instructions even more
faster than it would have taken to fetch it from a relatively slow dram.
SECONDARY MEMORY
This is the memory found outside the CPU box .
The secondary memory devices include ;
i)Floppy disk
ii)Flash disk
iii)CD-ROM
THE ARITHEMATIC LOGIC UNIT
This is a component in a CPU that handles or deals with all arithmetic and logic operation in the
computer.
This part of the CPU performs all mathematical operations such as addition, subtraction etc
1). ARITHMETIC OPERATIONS.
These include addition, subtraction, multiplication and division.
2). COMPARISON OPERATIONS
This involves comparing one data item to another and determine if the first
item is greater than, equal to or less than the other item.
3). LOGICAL OPERATIONS.
This works with conditions and logical operations such as AND, OR and NOT
DATA ENCODING
To encode in computer terms is to translate data from the form it is entered into the computer to a form
that can be processed by the computer i.e. Binary form.
Page20
Although there are many types of encoding systems that can be processed by computers to represent data
, only two have become mostly commonly used i.e.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
b)EBCDIC
This encoding system is basically used in very big computers
BOOTING A COMPUTER.
This refers to the starting or restarting a computer.
There are two types of booting namely
i)Cold booting
ii)Warm booting
a)COLD BOOTING; This refers to the starting of the computer by switching it on directly from the
main power supply i.e. the wall switch, then stabilizer , the Un Interruptable Power Supply (UPS) , the
system unit and monitor.
b)WARM BOOTING; This refers to the restarting of a computer simply pressing Ctrl + Alt + Del keys
on the key board at the same time.
NB: Boot disk is a floppy disk that contains certain operating system commands that will start up the
computer.
2x2x2x2x2x2x2x2x2x2
= 16x64
= 1024
30
2 = 1024 x 1048576
= 1073741824
Example IV
Mathematically calculate the number of bytes in 147 GB
1 GB = 230 bytes
147 GB = 147 (230) bytes
147GB = 147 (2X2X2X2X2X2X2X2X2X2)
= 64X16 =1024
2X2X2X2X2X2X2X2X2X2
=1024
2X2X2X2X2X2X2X2X2X2
=1024
= 147(1024X1024X1024)
= 147X1073741824
147GB = 157840048128 bytes
Page22
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
THE PROCESSOR SPEED
The speed at which the computer processor executes command/ instructions is determined by its
clock speed . The system clock speed is measured in hertz.
A hertz is a unit of frequency which measures the number of cycles per second in a signal.
1 Kilo hertz (KHz) = 1000Hz
1 Mega hertz(MHz) = 1000000Hz
1 Giga hertz (GHz) = 10000000000Hz
COMPUTER SOFTWARE
These are various programs that control the operation of computer in its day today running.
It can also be defined as the computer programs that enable the hard ware to work.
Computer software is called LIFE of a computer
A PROGRAM; These are instructions that provide solutions and tell a computer what to do e.g.
micro soft office
A PACKAGE; This refers to a set of programs that can be brought to perform various duties e.g.
Accounting packages, spread sheets , ms word
SOFTWARE
APPLICATION SOFTWARE
SYSTEM SOFTWARE
SOFTWARE
Low level
programming
languages
Operating system
for standalone
computers
High level
programming
languages
Operating system
for networked
Custom/tailo
computers Off
red packages shelf/canned
Page23
packages
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
FACTORS CONSIDERED WHEN CHOOSING A SOFTWARE
Authenticity: The soft ware must be original and accompanied by the developer’s license.
Documentation : The soft ware must have manuals prepared by the developers having
details on how to install, use and maintain the soft ware.
User needs: The needs of the people determines the type of operating system and
Application programs. E.g. if a user wants to type a document most often he or she should go
for a word processor.
Reliability and security: people are more comfortable with soft ware that offers good
security to confidential and private information.
User friendliness: the measure of how easy one can user can be able to operate the computer
using such or any soft ware. Some programmes are more user friendly than others.
Cost: Many people go for soft ware (specific) because it is cheap.
Compatibility and system configuration the computer should always be able to run soft ware
according to its system set up.
Portability: this aspect refers to whether a program can be copied or installed on more than one
computer. This is why most soft ware developers now produce soft ware that can be installed on many
computers
a) SYSTEMS SOFTWARE
This is the basic software that allows the computer to carry out operations.
OR
These are programs that control the way a computer operates.
These programs facilitate the computers general operations
The systems software is grouped into these categories;
i) Firm ware language.
ii) Utility programs iv) Net working software
iii) The programming v) The operating system
FIRM WARE:
This is also referred to as stored logic . It is a combination of soft ware and hard ware recoded
permanently on the electronic chip . Usually a firm ware is read only memory (ROM).
UTILITY PROGRAMS
These are software tools that carryout system organization and maintainace activities eg deleting
unwanted programs that may cause abnormal operation of a computer.
In other words these programs perform tasks related to the maintainance of of the computer.
Utility programs include the following
i) File management program
ii) Disk maintenance program
Virus protection program(Antivirus)
COMPUTER VIRUSES
A virus is a program that copies itself into other programs and spreads through multiple computers.
Page24
Viruses are often designed to affect , or infect , a computer negatively by altering the way it
normally works without the knowledge or permission of the owner.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
TYPES OF COMPUTER VIRUSES.
Worms: These sit in the computers’ memory , re-write themselves constantly into the memory until
when the system runs out of memory and crushes.
Trojan Horse: These are small program s that hide within the lawful software and looks like a
legitimate program but executes when a certain condition or action is triggered.
Time bombs: These are kinds of logic bombs that are set off at a particular date. They always execute
when that time comes.
Polymorphic virus: This modifies its program code each time it attaches itself to another program
/ file that even an antivirus has difficulty in detecting it.
Boot sector virus: It resides in the boot sector of a floppy disk or the master boot record of a hard
disk and executes when the computers starts up.
Trojans: These are failed / incomplete computer games which can make the screen go off and some
times make the cursor disappear.
Jokes: These are amusing things on the screen e.g. messages like your computer is about to explode,
Please run away. They appear and disappear about a few seconds.
Droppers: This on the other hand, they are good. This is because the perform tasks like compressing
files, previewing video clips etcetera.
File Virus: This attacks itself to program files and is loaded into memory when the infected
program file is running.
Macro virus: This uses macro language of an application e.g. Word processors or spreadsheets to hide
the virus code.
SOURCES OF VIRUSES
-Contact with contaminated systems
These include diskettes used on contaminated system and could become contaminated . If the same
diskettes are used on another system , the virus will spread.
Pirated software
This introduces a risk of virus spread if contaminated and destruct the system.
-Fake games
Through these, Virus spread very fast.
-Freeware and shareware programs.
Commonly available on the bulletin Board system (BBS). Generally a registered to be sent directly to
the author .These should be treated with care.
-Updates of software distributed via internet or other networks.
Software distributed via Netware fairly obvious target for virus programs as they provide a built
in method for wide spread and anonymous propaganda.
PRECAUTIONS TO PREVENT VIRUS INFECTIONS
1. Do not use secondary storage devices like diskettes , cds e.t.c. from un known sources.
2. Always scan external storage devices for viruses using virus guards before using them.
3. Isolate any devices suspected of having the virus.
4. Always scan for viruses on all computers at least once every month.
5. Always create backup (Duplicate ) copies of all programs and files kept safely such that
when the system crushes , one use those copies.
6. Always take care when downloading anything from the Internet.
7. Never start up the computer when the floppy disk is in the drive.
8. Ensure that all E-mails are from a trusted source before opening or executing any e-mail
attachment.
Page25
9. Install an anti – virus utility and update its virus components frequently for detecting and
removing viruses.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
ANTI- VIRUS : This is a utility program that prevents , detects and removes viruses from
the computer’s memory or storage devices. Examples include;
V- Shield
Norton Anti virus
MacAfee
Dr Solomon.
- CRACKER: This is a person who breaks into someone else's computer system, often on a
network, bypasses passwords or a license in computer programs; or in other ways intentionally
breaches computer security. A cracker can be doing this for profit, maliciously, for some
altruistic purpose or cause, or because the challenge is there.
- PIRATE: He is a person who steals away computers documents that are valuable to an
organization.
A BUG
Refers to an error in the computer system that causes unnecessary actions.
Page26
There are two types of bugs i)Soft ware bug ii)Hardware bugs
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
A DEBUGER
This is the utility software used during testing of new programs and may tress the flow of the program
and display various values as requested.
PROGRAMMING LANGUAGES.
This is the media used by programmers to write com programs in a language that can be understood by
both computers and man . Computers can only understand one language called
a)Machine code
This is a 1st generation language consisting of binary digits (Os and Is) only .
One character is represented by 8 binary digits eg character A can appear as 01000001. This language is
very difficult to understand by human beings.
b)Assembly languages
This is a 2nd generation language and the first to use alphabetical symbol to write codes . It translates the
assembly codes into machine language to be understood by the computer.
INTERPRETERS/ ROUTINES
This is a language used to change high level languages to Machine code. They include;
i. Compilers
These change a program written in a high level language into a machine code.
ii. Interpreters.
These change the source program line by line while the program is running.
iii. Assemblers.
These change / translate assembly instructions into binary code/ machine code.
iv. Linkers.
These combine compiled programs and determine where a program will be located
in memory.
C,C+,C++
These are structured languages used in object oriented programming for developing windows and
Macintosh soft ware.
DADA: This was named after Augusta Ada Bryon for the United States Department of Defense for
developing weapons systems and in industry environment for controlling time system and audio
formation.
PASCAL:
Page28
Named after a noted Mathematician and philosopher who invented a [particular calculating machine
at the age of 19. It was used as a teaching tool to teach the concept of a structured programming.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Systems Analyst: This is a person who is responsible for the analysis, design and implementation of a
business system on the computer.
SYSTEMS ANALYSIS
Systems Analysis is the way of solving business problems using computer technology. So we need
someone who is good at problem-solving, who knows about business operations and who has a strong
background in relevant areas of computer science.
Thus, in order to be successful, a systems analyst must possess at least the following attributes:-
1) Communication skills. Effective communication is vital to the success of any systems project.
The analyst is the medium through which communication should flow smoothly.
2) Problem-solving skills: Systems are developed to solve problems. An analyst must have wide
experience in solving problems by:
Defining the problem, if necessary, break up a complex problem into smaller ones.
Analyzing the problem; try to determine its cause.
Consider alternatives for removing the cause.
Evaluate these alternatives; what are their benefits and disadvantages.
Choose the best alternative
3) Business knowledge: It is important for the analyst to completely understand the business
environment for which the system is being developed.
4) Technical knowledge: Analysts should be well–trained in relevant area of computer
1) A school has decided to use a computer for its store stock control. Describe the process of
system analysis from the time the decision was made to proceed with computerization until
final testing.
- Specify the output requirements
- Design documents or screen displays
- Gather data for input and storage
- File structure/access/design
- Data security/Backup files
- Design system flow chats
- Implementation stage i.e. pilot/intermediate/parallel running
- Testing strategy and Training
- Hardware/software requirements
- Programming / algorithm
- Validation / user manuals
- Technical and user documentation
2) Give two reasons why it may be necessary to modify this system in the future.
i) There could be new government legislation
ii) Changes in hardware
iii) Changes in software
iv) Improved operating efficiency/ease of use
1) Investigation
2) Analysis
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
3) Design phase
4) Coding
5) Testing
6) Implementation
7) Maintenance
1. Preliminary Investigation (Feasibility study): For a system to be started, one should decide
whether a computer system is needed. One of the most tedious tasks is to recognize the real
problem of the pre-installed system. The analysis has to spend hours and days for understanding
the fault in the system. This fault could have however overcome if the Preliminary Investigation
before installing the system was properly done. This is the first stage of the development of the
system. In this stage the analyst makes a survey by gathering all the available information needed
for the system elements and allocation of the requirements to the software.
2. Analysis of the requirement: An analyst has to specify what the new system needs to be able to
do. The analyst understands the nature of the information and the functions of the software which
is required for the system. The analyst makes a brief survey of the requirements and tries to analyze
the performance of the system which is to be developed. He also makes sure that he gets enough
information and resources for building the appropriate system.
3. System Design: This is where the details are drawn up on input and output. The analyst actually
makes number of designs of the system on paper or on the computer and sees to it that the rough
image made of the system comprises of all the requirements or not. Once this is done, the analyst
selects and finalizes a best suited design for the development of the system.
4. System Coding: The analyst translates the code or the programs in such a way that they become
in machine readable form. The coding step is very time consuming and involves number of rooms
for errors.
5. System Testing: Once the analyst is through with the coding stage he tests the systems and sees to it
that it is working as per the expectations or not. He corrects the flaws in the system if any.
6. System Implementation: This is one of the most vital phase as in this phase the analyst actually gives
the system to the customer and expects for a positive feedback.
7. System Maintenance: The last stage of the SDLC is that the analyst needs to maintain the system and
see to it that it working within the standards set. He needs to maintain the system by removing the
defects of flaws occurred
execution of user applications and enable the user access the Hard ware and soft ware resources of the
computer.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
The operating system ensures that the computer operates in reliable way.
SECTION B: Paper 1
DOS & WINDOWS OPERATING SYSTEM
Getting started with Windows XP
The Windows desktop; is the working area of the Windows XP screen. It is called a desktop because on
it, you can place electronic versions of things you have on your regular desk.
A Windows Desktop is shown as follows:
Page32
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
My
Computer
Icon
Recycle
Bin
ICO
N
Toolbar
Address
bar
LEFT
PANE
Status bar
SCREEN ELEMENT DESCRIPTION
ADDRESS It is a toolbar that displays the organizational path to the active file,
folder or Window.
CLOSE BUTTON It is a shortcut button in a title bar that closes a Window or a
program.
LEFT PANE In the My Computer window, a pane at the left that displays
information and commonly used tools.
MENU It is a list of commands with in a category.
MENU BAR It is the bar beneath the blue title bar that lists the names of menu
categories for example; File, Edit; View and so on.
SCREEN TIP It is a small box activated by pointing to a button or other screen
object, which displays the name of the screen element.
STATUS BAR It is a horizontal bar at the bottom of the document which provides
information about the current state of what you are viewing in the
window for example; the page number of a document.
TITLE BAR It displays the program icon, the name of the document and the
name of the program. In addition, the Minimize, Maximize/Restore
Down and Close buttons are grouped on the right side of the title
bar.
TOOL BAR It is a row of buttons that activate commands such as Undo or Bold,
with a single click of the left mouse button.
Page34
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Status bar
Status
bar
Screen
Tip
Screen
Tips
Shortcut menu
Sub menu
Shortcut menu
- List Box: It offers a list of choices that can be selected from. Usually list boxes contain options
to the text boxes.
- Control panel: is a nifty control panel applet that allows you to easily configure which
programs run when your computer starts.
- Screen saver: It is a utility that causes the monitor’s screen to display a moving image or a
back screen if no keyboard or mouse activity occurs for a specific period of time.
- Pop up menus: A menu that, when requested, is displayed next to the object with which it is
associated. A menu that can be set to appear when a specified mouse button is pressed in a
window. A pop-menu consists of multiple menu items.
- Window: It is a rectangular area on a screen defined by specific borders called window
borders.
- Pop down Menus: It is a menu of options that appears below the item when the computer
user clicks on it. It comes down from the top of the computer screen, in the gray area
Task bar: A bar commonly located at the bottom of Microsoft Windows 95, Windows 98,
Windows NT, Windows 2000, Windows ME, Windows XP operating systems that displays
the programs that are currently running.
- Toggle buttons:
Page35
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
A toggle button is a button that represents a setting with two states--on and off. Toggle
buttons look similar to command buttons and display a graphic or text (or both) to identify the
button.
Commands buttons: These initiate an action in progress such as canceling a command
or confirming to process the required action.
Text box: This offers a rectangular space for typing in additional information. This
information may be either a file name or a path.
Drop-down list boxes: These offer options like the list boxes except that initially they
look like text boxes with an arrow pointing down on the right of the box.
Options buttons: These represent a group of mutually exclusive options only one of
which can be selected. For example, in the dialog box you can only select either Center
or Tile but not both.
Check boxes: These offer non-exclusive options in a group of options. All check boxes
can be selected or un-selected depending on what is desired.
2. Ms (Micro-soft) Windows 98. The micro soft corporation developed these two operating
systems due to technological advancement over the windows 3X. There are 32 utilities to
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
provide better multi – tasking (working with various applications at the same time) and faster
video display gives. There ability for plug and play provides a better way of installing new
peripheral e.g. mouse, joysticks, printers e.t.c. They also entail (force) the improved net work
support power management and file locking, they offer improved battery binary life and
productivity for laptop users.
There new interface that provide the users with various options of starting application
programmes. This can be done either from the short cut folder or the casketing do start menu.
Unlike Windows 95, windows 98 provides better DVD support and its integration with the
internet explorer makes it an ideal tool for web browsers.
3. Operating system -2 (OS-2): This is another desktop operating system which offers multi-
tasking abilities. It was designed for the IBM operation a. Desktop operating System which
collaboratively developed this operating system.
4. BeOS (be operating system): This Be operating system is one of the recent developments in
the operating system. It was built due to the increased demand in the multi media industry for
robust and longer file holding abilities. It 64 by bit file system and can handle files of up to 18
million Terabytes. This makes it ideal to handle files that include videos, sound and three divers’
oral images (3 d images). Its main disadvantage is that the current version is complicated and
needs only people with a lot of technical knowledge.
Currently, it is increasingly being used as a backend sewer. It is supported by companies like Dell and
IBM makes it an industrial straight operating system.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
They are called application programs because the direct the processing of a particular use of the
computer . They include:-
Word processors, Spread sheets , Data base , presentation , desktop . publishing , graphics processing
and communication.
CHARACTERISTICS
WORD PROCESSOR
These are used in creation , editing , formatting , saving and printing of documents such as letters ,
reports , labels , memos, advertisements, poems e.t.c.
Word processing applications include the following; Micro soft Word, word perfect, word pad, Note
pad, word pad.
SPREAD SHEETS
These are simple grids of cells arranged in rows and columns used in creation, handling and
maintenance of numerical data (Performance of calculations) such as budgeting , whatif analysis , past
planning e.t.c.
spreadsheet applications include ; Micro soft excel, Lotus 1-2-3, Visual calc,
Micro soft works, e.t.c.
DATABASES
These are used in creation of and management of large information related to a particular topic or
subject e.g. Mailing list, Customers’ information, product details, employees payroll information e.t.c.
The applications For Database are; Oracle, Lotus Pro, Database iv, Microsoft Access
PRESENTATION SOFTWARE
These are used in creation of computer based slide shows using sophisticated graphics, styles , effects
, transitions and animations to strengthen / enhance images which are employed during meeting s or
seminars to enhance the speakers idea graphically .
The application for presentation software is Micro soft power point.
DESKTOP PUBLISHING
These are used to combine text and graphics to create a publication . E.g. Newsletters, Brochures,
prospectus e.t.c.
The Desktop publication application include; Adobe page maker, Microsoft publisher., Ventura and
Microsoft Dream weaver.
GRAPHICS PROCESSING.
These are use d in the creation and manipulation of anything of graphics ranging from charts , paints
and draw , image editing e.t.c.
The Graphics applications include; Adobe photo shop, Ms photo draw, Coral draw.
COMMUNICATION SOFTWARE
Page39
|These are used in exchange of messages with people , sending and receiving of data via computer
from different areas in the world .
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
The communication software applications include; Netscape, Ms Navigator, Eudora, Comet Bird,
Internet Explorer, e.t.c
Disk Operating System uses certain extensions with its own files . These extensions should not be
used unless ,they they have the correct meaning . They include;
.Com Dos External command files.
.bat Batch files (Program Utilities, virus guards and Dos commands).
A drive is an area on the computer where secondary storage devices are inserted for reading ,
writing and retrieval of data.
Dos works with different parts of the computer but needs to be told which drive to use . Drives are
indicated by letters in the following ways:-
Drive A: 1st diskette drive
INTERNET
This a computer net work which links millions of computers worldwide. Or This is a global computer
network .
It can also be defined as a worldwide system of information connected computers.
When a computer is connected to the computer, it becomes capable with establishing contact with any
other computer worldwide. The Internet uses a set of standards (Rules) to connect . these standards are
called Internet Protocols or Transmission Control Protocols(TCPs).
INTRANET .
This is a local area net work which uses internet protocols to connect computers within an organization.
It is a private net work that is accessible to only authorized members.
EXTRANET.
This is a wide area net work which uses internet protocols to connect computers within an organization.
It is a private net work that is accessible to only authorized members.
FUNCTIONS OF INTERNET
The Internet has got a wide range of functions , that is why it is liked by many organization and it
can be used to achieve the following :-
Easy communication and collaboration. The Internet helps people to exchange messages among
business associates and friends . And receive messages.
Entertainment. The Internet provides interactive video games, music, plays, therefore helping people
to spend their leisure time and develop talents.
The Internet provides access to information. Through surfing , people get information from all parts
of the world Like sports , news papers and others.
Page41
Participation in discussion. It enable users to exchange their opinions and ideas with other people all
over the world. These enhance/promote social interaction.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Business transactions. It enables people to advertize their products to all people allover the world .
Purchasing and selling products without physical contact between the buyer and seller. I.e. E-
Commerce. This means use of computers to carryout trade(Electronic commerce).
E- Learning. This is the acquisition of knowledge , skills using computers without physical contact.
The Internet allows people to down load programs and other files from other connected computers in all
parts of the world. These programs are downloaded free of charge e.g. application programs, antivirus
programs, games, music players e.t.c.
The Internet provides job opportunities. For instance people who work in the Internet cafes and
Internet providers.
DISADVANTAGES OF INTERNET
It causes viruses to the computer.
It displays pornographic videos which lead to immorality.
It is only used by the educated few.
It has no data security since the net work is accessible to everybody.
It is expensive since payments are made to access the services on it.
In late 1980s , the government of USA begun to remove restrictions on who should access and use
Internet and commercialization of the Internet begun.
In 1990s . The Internet quickly expanded to include Universities , companies , libraries , Schools,
Individuals and Families.
The World Wide Web Consortium (W3C) is the group that oversees research and sets standards and
guidelines for many areas of the Internet.
Page42
An Internet Service Provider (ISP) is a company that supplies connections to the Internet, usually for a
monthly fee.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Users may connect to their ISPs through a LAN, or through a dial-up access.
With dial-up access, the user uses a computer, a modem and a regular telephone line to dial into an ISP.
A dial-up connection is a slow speed technology.
WHILE
Some users opt for high-speed technologies such as Digital Subscriber Lines (DSL) or Cable television
Internet Services.
The Internet uses an IP address to send data to a computer at a specific destination.
An IP (Internet protocol) address is a number that uniquely identifies each computer or device connected
to the Internet.
Each IP address consists of four (4) groups of number, each separated by a period (e.g. 192.168.3.3)
A domain name is the text version of an IP address, which makes the all numeric IP address easier to
remember and use.
The domain name system (DNS) is the system on the Internet that stores the domain names and their
corresponding IP address.
The domain name server (DNS): This translates the domain name into its associated IP address, so that
data can route to the correct computer.
A domain name includes:
www.monitor.co.ug
www.jomayi.co.ug
Each domain name contains a Top-level domain (TLD) abbreviation that identifies the type of
organization that is associated with the domain.
Top Level Domain Type of domain
The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for assigning
and controlling TLDs.
A Server
is the host or central computer that manages the resources on a network. A server.
A server provides a centralized storage area for programs, data and information.
Page43
COMPUTER NETWORK
What is a Network?
A network is a collection of computers and devices connected together via communications devices and
media.
Communications devices: This device that enables two or more computers to exchange items such as
data, instructions and information. Examples include: -
Modems
Cable modems
Network Interface Card
Bridge
Multiplexer
Switch
Networks allows user to share resources, such as hardware, software, data and information.
Factors Affecting Transmission Rate of a Network
i) Transfer rate: This is the speed of transmitting data and information. Transfer rate are usually
expressed in bits per second (bps), kilobits per second (kbps), or megabits per second (mbps).
ii) The transfer rate of a transmission medium depends on the medium’s bandwidth and its speed.
iii) The Network Topology: It refers to the physical layout of a network. This means that start networks
have fewer collisions and usually run faster.
iv) Capacity of hardware: These include; switches, hubs and network interface card and they have their
own maximum speed.
v) The server: It should have the RAM of the high speed and the capacity of the hard disk.
vi) Location of software and file: Storing software on the workstation hard disks reduce network traffic
and speed up performance
TYPES OF NETWORKS:
1. Personal Area network (PAN): It is a computer network used for communication among computer
devices close to one person. Some examples of devices that are used in a PAN are printers, fax
machines, telephones, PDAs or scanners.
2. Virtual Private Network (VPN): It is a network accessed by the employees in any given company.
Page44
A Virtual Private Network provides the user with a secure connection to the network using the Internet
as if the user had a private line.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
3. Local area network (LAN): It is a network covering a small geographic area, like a home, office, or
building. Current LANs are most likely to be based on Ethernet technology.
4. Wireless Local Area Network (WLAN): It is a LAN that uses no physical wires, but wireless media
such as radio waves.
5. Campus Area Network (CAN): A network that connects two or more LANs but that is limited to a
specific and contiguous geographical area such as a college campus, industrial complex, or a military
base.
6. Metropolitan Area Network (MAN): A Metropolitan Area Network is a network that connects two
or more Local Area Networks or Campus Area Networks together but does not extend beyond the
boundaries of the immediate town/city. Routers, switches and hubs are connected to create a
Metropolitan Area Network.
7. Wide Area Network (WAN): A WAN is a data communications network that covers a relatively
broad geographic area (i.e. one city to another and one country to another country) and that often uses
transmission facilities provided by common carriers, such as telephone companies.
8. Global Area Network (GAN): Global area networks (GAN) specifications are in development by
several groups, and there is no common definition. In general, however, a GAN is a model for
supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage
areas, etc
Advantages of using a network
1. Speed. Networks provide a very rapid method for sharing and transferring files.
2. Cost. Networkable versions of many popular software programs are available at considerable savings
when compared to buying individually licensed copies.
3. Security. Files and programs on a network can be designated as "copy inhibit," so that you do not
have to worry about illegal copying of programs.
4. Centralized Software Management. All the software can be loaded on one computer known as the
File Server.
5. Resource Sharing. Sharing resources is another area in which a network exceeds stand-alone
computers.
6. Electronic Mail. The presence of a network provides the hardware necessary to install an e-mail
system.
7. Workgroup Computing. Workgroup software (such as Microsoft BackOffice) allows many users to
work on a document or project concurrently.
8. Flexible Access. School networks allow students to access their files from computers throughout the
school.
Disadvantages of installing a school Network
1. Expensive to Install. Although a network will generally save money over time, the initial costs of
installation can be prohibitive. Cables, network cards, and software are expensive, and the installation
may require the services of a technician.
2. Requires Administrative Time. Proper maintenance of a network requires considerable time and
expertise.
3. File Server May Fail. Although a file server is no more susceptible to failure than any other computer,
when the files server "goes down," the entire network may come to a halt.
4. Cables May Break. The Topology chapter presents information about the various configurations of
cables.
Peer-to-peer network
A Peer-to-peer network is a network where by each computer can share the hardware, data or information
located on any other computer on the network.
Page45
Each computer on a peer-to peer network stores files on its own storage devices.
Each computer on the network contains both the network operating system and application software.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
A peer-to-peer network is a simple, inexpensive network that typically connects less than 10 computers
together.
It is ideal for home and small business users Fig. 4: peer to peer illustration
Peer-to-peer environment
Client/Server environment
NETWORK TOPOLOGY
Definition:
Network topology is defined as the physical layout of network hardware. These include:-
Computers
Page46
Cables e.g. fiber optic cables, shielded twisted pair, wireless networks etc.
Networking devices. E.g. Switches, hubs, repeaters, bridges and routers.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Three commonly used topologies are:
Bus Topology
Ring Topology
Star Topology
1. Bus Topology (Linear):
Commonly referred to as a linear bus. All the devices on a bus topology are connected by one single
cable, which proceeds from one computer to the next. This topology is rarely used and would only be
suitable for a home, office or small business with only a few hosts.
2. Ring topology
A frame called a token, travels around the ring and stops at each node. If a node wants to transmit data, it
adds that data and the addressing information to the frame. The advantage of using his is that there are no
collisions of data packets.
3. Star Topology:
This is the most commonly used architecture in Local Area Networks (LANs) and resembles spokes
in a bicycle wheel. A star network features a central connection point called a "hub" that may be a hub,
switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Page47
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
COMMUNICATION DEVICES
These enable two or more computers to exchange items e.g. data, instructions, and information with each
other.
MODEM. This is a communication device that interchanges between signals. This converts digital
signals into analog signals and analog signal into digital signals (Modulation Demodulation)
TYPES OF MODEMS.
Dial up modem. This is a modem used to dial to the internet provider before being connected to the
internet.
ISDN (Integrated Service Digital Network)
Is a set of standards for digital transmission of data over a standard copper telephone line.
DSL(Digital subscriber Lines)
Page49
These provide high speed connection to the internet over a regular copper telephone line.
CABLE MODEM: Sends and receive data over a cable television.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
T. carrier Line: This is a digital line that carries multiple signals over a single communication line
using the multiplexing technique. T3 line = 28 T-1 lines in speed.
Asynchronous Transfer Mode (ATM) is a service that carries voice data, video and multimedia at
extremely high speed.
TRANSMISSION MEDIA
A Transmission media consists of materials / techniques capable of carrying one or more signals.
Forms of Transmission media include;
a) Physical Transmission media. This one use wires, cables, or other physical materials to send
communication signals.
b) Wireless Transmission media. Send communication signals through the air or space using radio
microwave or infrared signals.
iv) Gateway
Is a combination of hardware and software that connects networks
That use different protocols.
v) Router
Is an intelligent communication device that sends communication
Traffic to an appropriate network using the faster available path.
E.g. Cisco 827-4v Router.
vi) MULTIPLEXER.
Is a communication device that combines two or more input signals
from various devices into a single stream of data and then transmits it
over a single transmission media.
vii) NIC. (Network Interface Cards). (LAN adapter)
is an expansion card that enable a computer or device to connect to a
network e.g. Ethernet card.
NB: A signal travels over a long distance, it undergoes a reduction in strength, and an occurrence is
called ATTENUATION.
TWISTED-PAIRED CABLE consists of one or more twisted-pair wire bundled together.
Page50
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
NB. Noise is an electrical disturbance that can degrade communication. Speed is 0 – 100mbps, Cost
Page51
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
PROTOCOLS: A communication protocol is a set of rules governing the exchange of data between
hardware and software components on a communication network.
A communication protocol will specify the receiving device will acknowledge sending devices
Page53
A DIAL UP LINE Is a temporary connection that uses one or more analog telephone lines for
communications.
Advantages
It is no more than making regular telephone call.
Computers at two locations can establish a connection using a modem and telephone Network.
Disadvantages
The user can not control the quality of the connection because the telephone company’s
switching office randomly selects the line for connection.
4. BBS
5. Instant messaging
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
6. Chat rooms
7. Newsgroups
8. Internet telephony
9. Videoconferencing
10. Groupware
11. Telecommuting
12. Global Positioning System.
13. E- commerce
VOICE MAIL
Voice mail functions like an answering machine and allows a caller to leave a voice message ,
which is stored in a voice mail box, for the called party.
A called party can listen to the message , add comments to a message, and reply or forward a
message to another voice mailbox in the voice mail system.
FAX
A facsimile (Fax) machine is a device that transmits and receives documents over telephone lines.
Documents sent or received via a fax machine are known as faxes.
Fax capability can also be added to the computer using a fax modem.
Advantages of fax
Hard copies are available
Slow in sending big documents
Wasteful of paper when junk faxes are sent
ELECTRONIC MAIL (E-MAIL)
Electronic Mail is the transmission of messages via computer Network e.g .LAN or the Internet.
Such messages can be a simple text or can include an attachment. E.g. Word processing documents,
graphical image, video clip. E.t.c.
Components of an E-mail message
To: It carries the e-mail address of the recipient
Cc: (Carbon copy): It allows the sending message to a third party while allowing other recipients.
Bcc: (Blind carbon copy): Allows sending messages to a third party without allowing other recipients.
Message: It is a theme of an E-mail message.
INSTANT MESSAGING
Is a computer communication service that notifies a user when one or more people are online and
then allow the user to exchange messages or files with them . The program used for this service is
instant messenger.
CHAT ROOMS
Is location on an internet server that permits users to chat with each other by typing lines of text
on the computer. Most web browsers include a chat client.
A web browser is a computer program that allows the user to access and view web pages on
the Internet . E.g. Microsoft Internet Explorer, and Netscape Navigator, Comet bird, Mozilla fire fox.
connection. A microphone, a sound card , and special Internet telephony soft ware are required for
conducting internet telephony.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
VIDEO CONFERENCING
A video conference is a meeting between two or more geographically separated people who use a
network or the internet to transmit audio and video data.
A video conferencing software with microphone , speakers and digital cameras attached to the
computer to participate in a video conference.
GROUPWARE
Is a software application that helps groups of people work together and share information over a
network.
It enables members of a workgroup to communicate , manage projects ,schedule meetings and make
group decisions.
TELECOMMUTING
Is a work arrangement so that employees may work away from the standard workplace of a company
but communicate with the office using some kinds of communication technology.
Advantages
Reduces the expenses of traveling to and from work.
Eliminates traveling during un safe weather conditions.
Allows a flexible work schedule for employees.
Favors the disabled employees.
Reduces Air pollution caused by vehicles driven to and from work.
Reduces costs incurred by the employers. E.g. less office space, Furniture.
Disadvantages
Face to face interaction is reduced among the working staff.
Work has to stop if any component of communication system fails to work.
Leisure time at home may be replaced by work.
Data security may be jeopardized (destroyed).
ELECTRONIC COMMERCE(E-commerce)
is a financial business transactions that occurs over an electronic network such as the Internet.
Online banking and online shopping are two popular types of e-commerce that uses either electric data
interchange(EDI) or Electronic money (e-money).
E- Commerce can be grouped into three basic models:
Business-to – consumer(B2C) e-commerce consists of selling goods to the general public.
Consumer-to-consumer (C2C) e-commerce occurs when one consumer sells goods directly to another,
such as online auction.
Page58
Business-to – business (B2B) e- commerce consists of business providing goods and services to other
businesses.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
ADVANTAGES OF E-COMMERCE
Transactions occur instantaneously and globally , thus save time for participation on both
ends .
Transactions occur 24 hours per day.
Businesses have access to millions of people with Internet connections.
Business has the ability to gather customer information, analyze it and react if possible.
Information can be changed and be available quickly.
Customers can compare prices easily.
Feedback can be immediate.
Manufacturers buy and sell directly, avoiding the cost of the middlemen.
Distribution costs for information is reduced or eliminated.
INTERNET
This is the worldwide collection of Networks linked together.
INTRANET
Is the small version of the Internet used within an organization.
EXTRANET
This is a wide area network of an organization whose access is only to limited authorized members. E.g.
Embassies in different countries share information via a network (Extranet)
NB
To prevent unauthorized access to data and information, an intranet or extranet is often protected by a
firewall.
A firewall is a general term that refers to both hardware and software used to restrict access to data and
information on a network
CONNECTING THE COMPUTER TO THE INTERNET
There are several requirements for the computer to be connected to the internet. They include the
following;
Browser for example Internet Explorer, Comet bird, Mozilla Fire Fox, e.t.c.
A computer with a serial port for external modem or an expansion slot for internal modem.
A modem (Either internal or External)
Communication soft ware (Out look express, Netscape,)
An account with the internet service provider, Internet Account and Connection wizard.
An ISP (Internet Service Provider) , an online service e.g. Microsoft Network , America
Online(AOL).
Factors affecting communication speed on the Internet: -
Computer processing speed. The higher the processor speed the higher the computer speed.
Connection, speed of Internet Service Provider’s server
Bandwidth: It is the speed at which your computer can send and receive information) is measured
in either Kbps (kilobits per second) or Mbps (megabits per second).
Traffic on the Internet. Absence of traffic on the internet leads to transmission of large volumes of
data.
Internet protocols
Direction of transmission e.g. Full duplex and half duplex
Mode of transmission
Page59
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
The internet uses an IP address system to send data to a computer at a specific destination.
An IP(Internet Protocol) address is a number that uniquely identifies each computer device
connected to the Internet. Each IP address consists of four groups of numbers each separated by a
period. E.g. 216.200.47.93. The number in each group is between 0 and 255.
In general, the first portion of each IP address identifies the network and last portion identifies the
specific computer.
A DOMAIN NAME: This is the text version of an IP address which makes the all numeric IP address
easier to remember and use. E.g. WWW.bsksch.Com.
The Domain Name System (DNS), is the system on the internet that stores the domain names and
their corresponding IP addresses.
The Domain Name System Server translates the domain name into its IP address so that data can route to
the correct computer.
Advantages of using an Internet
a. It facilitates advertisements
b. It provides education and online training courses.
c. It provides entertainment and leisure, such as online games and music, magazines and vacation
planning guides.
d. It facilitates trade and commerce e.g. online shopping, placing orders etc.
e. Easy access to huge information and research. For example news, weather reports and airline
schedules.
f. Internet provides online banking services and manages investments.
g. Provides online for goods and services.
h. People can communicate with each other through chatting, e-mails among others.
i. Internet enables downloading of files, listening to music and watching sports.
Disadvantages of using an Internet
a. It promotes immorality
b. It promotes conmen. These are people who take advantage of the Internet and take away people’s
money.
c. Bargaining cannot take place since there are no physical people.
Advantages of having Internet at school
a. Students are able to learn at their pace (at their wish) since lessons will not be supervised.
b. Topics can be accessed on the Internet by the students.
c. Instruction materials like homework, presentations and assignments can be made available online.
d. Students will access current information on the Internet
e. It provides interactive programs like games, chatting, E-mails etc.
f. It enables getting long term contacts from other countries (Pen pals).
Disadvantages of having Internet at school
i. Promotes laziness to students
ii. Internet will consume much of students' time
i. Pornography will be surfed
HISTORY OF THE INTERNET
The Internet has its root in a networking project called ARPANET started by Pentagon’s Advanced
Research Project Agency.
The goal of the project was to build a network that allowed scientists at different locations to
Page60
GETTING CONNECTED
Switch on the modem. If it is external, double click on the configured dial up net work icon.
(Dialog box for “connected to” appears.
Press the connect button and it will connect to the server.
If the connection is successful, the terminal window will come where you are prompted for user
name and password.
If the combination is correct, the third prompt comes where you have to type PPP.
Press F7 for continuing the login process.
Once connected, one gets a message box specifying the connection speed and elapsed time.
After all these steps, one can start the browser and then start surfing.
ISP: Internet Service Provider is the company which provides internet services usually on a monthly fee.
FACTORS CONSIDERED WHEN CHOOSING AN ISP
Technical support services(User help)
Consider a company with an equaled level of technical expertise , dedicated support services and
good technical support team where by professionals are available whenever a problem is encountered
to give answers to questions every time.
Reliability
Consider a company which is committed to implement new interactive mediums and setting
standards in Internet Service.
Customer service.
Consider a company that is aimed with deep understanding of customer needs.
Costs/Affordability
Consider a company with economic understanding where by the charges for the services rendered is
affordable.
Reputation in the field.
Consider a company with a good reputation (good image) in the field where e by many people can visit
your site.
Advantages of having an ISP
Most of the days’ activities like server management and housekeeping are left with the ISP.
COMMUNICATION AND INTERNET PROTOCOLS
A protocol is a language that enables computers on the internet (net work) to speak to one another.
Or
It is a set of rules governing the transmission of data from one computer to another. The Protocols include
the following;
TCP/IP(Communication Control Protocol/ Internet Protocol)
Page62
This is the protocol on which the Internet is based . It is the collection of protocols governing the way
data travels from one machine to another across networks. It has two component i.e. TCP and IP
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
which are inseparable.
Two widely used protocols for Local Area Networks (LANs) are:-
Ethernet, which is a LAN protocol that allows personal computers to contend (request) for access
to the network.
Token Ring protocol
Functions
a) Internet Protocol
It envelops and addresses data.
It enables the network to read the envelop and forward the data to its destination.
It defines how data can fit in a single “envelop” or packet.
b) Transmission Control Protocol
It breaks data into packet that the network can handle efficiently.
It verifies that all packets arrive at their destinations.
Re assembles data.
FTP (File Transfer Protocol)
This is part of TCP/IP protocol which is use to make files and folders publicly available for
transfer on the Internet.
It is a standard for Uploading or Downloading files to or from the Internet.
HTTP (Hyper Text Transfer Protocol)
This governs the transfer of hyper text (Web pages) between two or more computers. The WWW
(World Wide Web) gets all the information that is available through this.
TELNET
This is standard protocol for creating a connection with a remote system.
GOPHER
This is a protocol designed to retrieve and display documents from remote sites on the Internet.
Excite WWW.excite.com
Google WWW.Google.com
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Hotbot WWW.Hotbot.com
Lycos WWW.Lycos.com
WebCrawler WWW.Webcrawler.com
Yahoo. WWW.Yahoo.com
E- Mail or electronic mail is the transmission of messages via a computer network . e.g. Local Area
Network or the Internet.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
The message can be simple text or can include an attachment e.g. a word processing document , a
graphical image, an audio clip or video clip.
E- mail software creates , sends ,receives , forwards, stores. Prints and deletes email messages.
An e- mail system can be configured to any of these three major protocols.
SMTP (Simple Mail Transfer Protocol)
POP3 (Post Office Protocol Version 3)
IMAP (Internet message Access Protocols)
An e-mail system has three modes. These include the following;
i) Local Email System. This is designed to work with a LAN and normally uses SMTP.
ii) International E-mail System. This is designed for wide Area Network.
iii) The third combines both environments.
AN E-MAIL ADDRESS
Is a combination of a user name and domain name that identifies a user who sends
or receives e-mail . An e-mail consists of complicated phrases of words depending on the system
being used . The basic structure of an e-mail is [email protected], [email protected].
Joel is the name of the person sending or receiving the message .
Info com is the serve name, Co means company
Ug means that info com is in Uganda.
Example II
muwanguzi@nkpublishing house.com,
Muwanguzi is the user name, nkpublishing is domain and com means commercial.
Most e-mail programs allows users to create an address book which contains a list of names and
e-mail addresses.
Most ISPs provide users with a mail box which stores their e-mails on a special server called e-
mail server.
When an e-mail arrives at the recipient ‘s mail server, the e-mail transfers to a POP or POP3
server until the recipient retrieves it with his or her e-mail software.
Popular E- mail software includes. Microsoft Outlook, express, Endora. Some websites provide e-
mail services called Web mail which can be accessed by a web browser.
Advantages of E-mail
One can send any size of message at just the cost of a local phone call.
Messages can reach their destinations in less than a minute anywhere in the world.
They save a lot of time.
FILE TRANSFER PROTOCOL (FTP).
This is an internet standard that allows users to upload and download files with other
computers.
AN FTP Server is the computer that allows users to upload and download files using FTP.
FTP SITE: This is the collection of files that reside on an FTP server. FTP sites allow transfer to
users who have authorized accounts.
Many FTP sites allow anonymous FTP so that anyone can transfer some or all available sites.
An operating system with FTP capabilities or separate FTP program is required to upload
files to an FTP site.
AUDIO can be music, speech, or any other sound. Common audio formats include WAV , MID and
MP3.
MIDI (Musical Instrument Digital Interface).
Is the electronic music industry’s standard that defines how sounds are represented electronically
by digital music devices.
MP3
This is a popular technology that may reduce an audio file to about one tenth of it original size ,
Page66
Do use
- At least eight characters if supported by the system.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
- A combination of mixed case letters and digits.
- A password that can be typed easily.
Do not use
- Your name, birthday, Id number, telephone numbers or a password of digits with the same letters
throughout.
Tips for safeguarding your password
- » Change your password frequently
- » Do not share your password with others
- » Do not write down your password
POSSESSED OBJECTS
Is any item that a user must carry to gain access to the computer or computer facility. These include
badges, cards, and keys. They are often used with Personal Identification Numbers (PIN)
BIOMETRIC DEVICES
This verifies personal characteristics e.g. finger prints , it translates personal characteristics into a
digital code that is compared with a digital code in the computer. Such devices include; finger print
scanner, hand geometry system, system recognition, signature verification system, iris recognition
system.
Advantages of Biometric Devices
- Personal characteristics are unique and cannot be forgotten or misplaced
Disadvantages.
- Most of the devices are expensive.
- A finger print scanner may reject a legitimate user if the user cuts his / her nerves.
- A signature may not match the one on file when the person is nervous.
- A voice recognition system might reject users with a sore throat.
CALL BACK SYSTEM
Is a system that connects a user to a computer only after the computer calls the user back at a
previously established telephone number.
To initiate a callback system;
a) The user calls the computer and then enters the correct user name and password.
b) The computer instructs the user to hang up and then calls the user back.
A callback system works best for users who regularly work at the same remote location.
6.2.1 HARDWARE THEFT
ADVANTAGES DISADVANTAGES
Full back up - All files are saved - Longest back up
- Fastest recovery. time
Differential - Fast back up method - Recovery time is
- Requires minimal consuming.
storage space to
back.
NB.
Page71
The grant parent is the oldest copy of a file , parent is the second oldest copy of the file child is
the most recent copy of the file.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
COMPUTER HEALTH RISKS
Prolonged computer usage can lead to health risks. E.g.
- Repetitive stress injury
- Eye strain
- Lower back pain
- Muscle fatigue
- Emotional fatigue
REPETITIVE STRESS INJURY
Is a kind of musculoskeletal disorder of muscles, nerves, tendons, ligaments and joints.
Force full bending of the wrist can cause tendonitis of the wrist.
Tendonitis is the inflammation of the tendon due to some repeated motion or stress of that tendon.
Carpel Tunnel Syndrome (CTS) Is the inflammation of the nerves that connects the fore arm to the palm
of the wrist.
a document.
Thesaurus: It suggests alternative words with same meaning (i.e. synonyms) for use in the document.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Automatic page numbering: This numbers the pages automatically.
Find and search: This allows the user to locate a particular character, word or phrase.
Examples of Word processing applications programs
Microsoft word
Lotus notes
Perfect writer
Word pad
Word perfect
Word star
Office pro
Advantages of Word processor
Word processor helps the users to read and revise documents on the screen.
Documents can be previewed before being printed.
It facilitates change by formatting to get the desired visual effect
It enables the user to produce as many copies as needed.
It allows the saving on document and thus makes work easy.
A document can be stored in the computer for future reference in computer files
that do not occupy physical space like the one on paper.
Typing using a word processor is easier and more efficient because some actions are automated. for
example word-wrap
Most word processors have special editing tools such as spelling and grammar checkers and
thesaurus that help the user to easily correct grammar and spelling mistakes .
With insert and type over modes available in most word processors , one can easily insert or
replace a word or a phrase without affecting the structure and neatness of the document.
Word processors have superior document formatting features. such features include italicization,
boldfacing , applying different colours.
While a typewriter may require that the entire document is retyped for many copies , with a word
processor , printing enables one produce as many copies per session as needed.
Using the cut, copy and paste commands , one can incorporate text without having to retype.
Disadvantages
Word application can only be operated by people who are computer literate.
Word processing applications have so many commands that cannot be learnt with in a short period of
time.
It can lead to unemployment since a single computer can do work for many people.
Data can easily be lost in case of power failure.
MICROSOFT WORD
Is the most commonly used word processing software which can incorporate text, pictures, chart e.t.c.
in the same file and then the exact image is displayed on the screen of what will be printed out on a
paper.
Select programs
Select Ms word (office for Microsoft word)
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
FORMATTING TEXT
Select or highlight the text / paragraph to be formatted.
Click on the formatting menu
Select font (dialog box appears) and make desired choices.
Select okay.
CHANGE CASE
This is to change the word from either small to capital and vices verse.
Select the text to be changed
Click on the format menu
Select change case (a dialog box opens)
Click on the option button of the desired case style
Click ok.
DROP CAPPING
This is the making of the first character of the paragraph bigger
than the rest.
Select the character (the first character of a word)
Click on the format menu
Select Drop cap…..(Dialog box appears)
Select Dropped
Set lines to be dropped and then ok.
Click on save.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
SAVING CHANGES
Click on the file menu.
Select save
Or Click on the save icon on the standard toolbar.
PRINTING
Is to create a hard copy of information on papers.
Click on the file menu.
Select print (Print dialog box opens)
Set the number of copies to be printed out.
Click ok
CLOSING A DOCUMENT
Click on file menu
Select close or click on the X button on the document window.
LINE SPACING
Position the cursor where to change the line spacing
Click on the format men
Select paragraph (A dialog box appears)
Under spacing drop down list, select the desired spacing.
Click ok.
ALIGNMENT.
This is used to align text either left, right, center or justify.
Click format.
Choose paragraph from the formatting dialog box
Choose alignment style on the indents and spacing.
Choose the appropriate alignment style from the alignment look-in.
Click ok.
THESAURUS.
This provides the synonyms/ words of the same meaning as selected word. (Alternative words)
Select the word
Click on tools menu
Select language
Select the appropriate synonym from the list provided.
Click on ok.
NB: If you want columns to be at a particular area in the document , click on the Apply to :
Button and select where you want them to be.
USING NUMBERS AND BULLETS
Numbering shows sequence while Bullets emphasize points.
Select the text to number / bullet
Click on format menu
Select Bullets and numbering (from the dialog Box)
Click on the numbered Tab for numbering / bulleted. Tab for bullets – Select the style of your
choice.
Click ok
PAGE NUMBERING.
This is used to number the pages of a multi-page document so that readers can follow the sequence of the
pages more easily.
Click on the Insert Menu
Select page numbers (dialog Box)
Select the position either Top of the page (Header) or Bottom of the page (Footer) from the
position drop down box.
Select ok.
NB: The preview displays the settings you make. You can modify the numbers by clicking on
format. In the dialog box.
Click on close
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
A table is made up of columns (Vertical) and rows (horizontal) which intersect to form cells.
NB: A cell is an intersection of rows and columns.
Click on Table Menu.
Click a table
Use the given Pencil to come up with a table.
MERGING CELLS
This is the joining of cells.
Select the cells to join
Click on the table menu.
Select merge cells (The cells will merge into one cell).
SPLITTING CELLS:
This is to divide the cell into any number of cells).
Page80
Mail Merge.
This is the process of generating personalized letters or document by combining the main document. E.g.
A letter, with an existing data source such as the address book. Therefore in mail merge, three files
created are
1. The primary file (main document)
2. The secondary file.
3. Merged file.
1. From the file menu, select New to create a new document. You also open or retrieve an existing
document.
2. On the tools menu, click Mail Merge to display.
3. Click create button, to select the type of document needed e.g. form letters.
4. Click data , To use an existing list of names and address , click open data source . To use existing
address form an electronic address book.
To create a new list of names and addresses , first choose the necessary fields from the create data
source box. Then save the record structure.
5. With the main document open, spot the mail merge toolbar on the screen. Position the text cursor’
where you want to insert merge field and insert them.
6. From the Merge toolbar, choose, ABC (Reveal merged fields).
INSERTING GRAPHICS.
Page81
Functions of Spreadsheets
1. It is a valuable tool for accounting , finance and business planning .
2. It is used to keep accurate financial records e.g. sales
3. It allows the use of what if analysis which helps to find out effects of company performance.
4. It helps school administrators to track expenses , income from fees payments e.t.c.
5. It helps teachers to keep record of classroom attendance and performance records, test scores and
grades .
6. It is used in preparation of budgets, cash-flow fore –casts in business and other organizations.
7. It helps accountants to track daily income and expenditure , prepare quarterly and yearly tax
returns or to analyze the value or worth of the business.
TERMINOLOGIES
CELL : Is the intersection of a row and a column. Each cell has a unique reference given by its column
letter and row number e.g. A1, c100 etcetera .
ROWS : This is the horizontal arrangement of cells. The run from left to right numbered from top to
the bottom along the left edge of the worksheet. There are 65536 rows on a worksheet.
COLUMNS: This is the vertical arrangement of many cells. They run from top to the bottom labeled by
letters A – IV from left to the right . There are 256 columns on a worksheet.
GRID : These are columns and rows of a worksheet.
LABELS: These are alphanumeric words used to name columns or rows or to identify / explain a formula
or numeric entry.
VALUES: These are numbers that are available for mathematical operations. E.g. 0 -9.
RANGE: Refers to a group of cells from a single cell , row, column. This is a rectangular block or entire
worksheet referred to by the top left and bottom right cell e.g. B2 – G17
FORMULA: These are mathematical expressions that create relationship among cells. They are
equations analyzing data on a worksheet by performing operations such as addition, multiplication,
subtraction etcetera.
FUNCTIONS: These are pre-defined formula that are in-built in the computer and perform calculations
by using specific values called arguments in a particular order.
ACTIVE CELL: Is a cell in which data is entered as you type. Or is a cell that is ready to receive data.
Only one cell in a worksheet is bounded by a heavy boarder.
CELL REFERENCE: This is a set of coordinates That show the location data on the worksheet. E.g. The
Page83
cell reference that of a cell that appears at the intersection of Column B and Row 3 is B3.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
CELL ADDRESS: Is the identification of cells e.g. A1, B1 e.t.c.
WORKSHEET: Is a spreadsheet document.
WORKBOOK : Is the file for worksheets which is made up to 16 worksheets. Workbooks contain
three sheets but more can be added.
3. Formulae
4. Functions
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
LABELS
These refer to text or alphanumeric characters/ words entered in a cell and viewed as a label by the
spreadsheet program. Labels are used as row or column headings usually to describe the contents of the
row or column.
VALUES
These are numbers that can be manipulated mathematically. They may include currency, date, numbers (0
-9), special symbols or text that can be manipulated mathematically by the spreadsheet.
FORMULAE
These are user designed mathematical expressions that create relationship between / among cells and
return a value in a chosen cell .
In Ms Excel a formula starts with an equal sign . For example , the formula =B3+D4 adds the content
of B3 and D4 and returns the value in the current cell.
FUNCTIONS
These are inbuilt predefined formulae that the user can quickly use instead of having to create a new
one each time a calculation has to be carried out . Ms Excel has many of these formulae that cover
most of the calculations preformed by spreadsheets.
To add the contents of cell B3 and D4 the sum function can be used as shown below
=SUM(B3:D4)
CREATING A DOCUMENT
Click on the file menu
Select new
Select workbook
Click ok, Or
Select new from the standard toolbar
ENTERING DATA
Data is entered in the current active cell but you can also move to the required cell address by
clicking on it using the mouse or the arrow keys.
Click in the cell in which data is to be entered
Type the required data (data also appears in the formula bar).
Press Enter
NB: Auto complete
This is a feature which detects the text if its is already present on the worksheet and completes it
after the first letters are typed.
SAVING A DOCUMENT
Click on the file menu
Select save as (a dialog box appears)
Type the file name
Locate the drive by clicking on the arrowhead, on the save in bx. E.g. 31/2 floppy(A)
Click on save (ok) or press enter
SAVING CHANGES
Click on the file menu
Select save or use the save tool on the standard toolbar
SIMPLE FORMATTING
(a) To change font size , bold facing , italicing and underlining
Highlight the range of data to format
Click on format menu select cells .(A dialog box opens)
Click on font tab and select the appropriate font , font size e.t.c
Click ok or use icons on the formatting toolbar.
NB: This #### symbol indicates that the cell is too small to display the data in the chosen format .
Therefore you need to increase the cell width to display the data.
NB: Number formatting buttons include; Currency style ($), percentage style (%), Coma style (,). Top
Page88
apply any style , select the cell containing data and click on the appropriate style on the formatting
toolbar.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
CALCULATION OPERATOR
There are four types of calculation operators
1. Arithmetic operators: These perform basic mathematical operations e.g. addition,
multiplication, combines numbers and produce numeric results.
E. g.
Arithmetic operator Meaning Example
+ (plus sign) Addition 10+10
2. Compulsion operators: Compare two values with the following operators. When two values are
compared by using the operators, the result is a logical value, either true or false, yes or no.
FUNCTIONS
These are pre-defined formulae that perform calculations by using values called argument in a
particular order or structure. The most commonly used functions are;
NB: Relative cell referencing automatically adjust when one copy them and absolute reference do not.
Now to copy the formula from C3 to any other cell using absolute addressing , click on C3 and
Edit the formula = B3+($B$3*$A$9).
DATA MANAGEMENT
At times , it becomes necessary to use advanced data management tools to manage large data stored
on worksheet. For example , If the work sheet has many records , it may it may become necessary
to arrange them in a particular order using a method called sorting for easier access to data items .
Other methods of data management include use of filters, totals/ sub totals function and forms.
SORTING
This is the arrangement of data in either numerical or alphabetical order / descending or ascending .
To carry out sorting proceed as follows.
Highlight the range that you wish to sort by clicking its column headers letter.
Click data then sort display the dialog box. Notice that the sort by field is already reading the
field selected this field is called the criteria field .
select the field to be used as the key for sorting and the sort order as either descending or
ascending then click ok button to apply.
FILTERING DATA
This is a quick and efficient method of finding and work with a sub set of data in a list . a filter list
will only display the rows that meet the condition or criteria you specify. Micro soft excel has two
commands for filtering lists.
The auto filter: It uses simple criteria and includes filter by selection.
Advanced filter uses more complex criteria.
Page91
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
AUTO FILTER
Filter can be applied to only one list on a worksheet at a time
Click a cell in list that is to be filtered usually the list in a column.
On the data menu, point to filter and then click auto filter
To display only the rows that contain a specific value , click the arrow in the column that
contains the data one wants to filter(display)
Click on the value that is to be displayed by the filter form the drop down list.
SUB TOTALS
Consider the following scenario, a company that has many sales persons will need to know how
much each of them should be paid at the end of a period by looking at individual sales volume.
Also the grand total for all the payments has to be calculated.
Therefore , if the salespersons are held in a list there would be needed to calculate the amount due
to each of them. This can be called a subtotal in the list. All subtotals can then be added together to make
the grand total. Consider the following list.
Click a cell in the list that will have subtotals e.g. Cell A3
On the data menu, click subtotals to see the dialog box.
In the change in box, Select name from the drop down list because we want sub totals for
each of the names.
In the use function box, select the sum function .
TOTAL FUNCTION
Use the auto calculate feature in Microsoft excel to automatically show the total of a selected
range. When cells are selected , Microsoft excel displays the sum of the range on the status bar. Right
clicking this function , it displays other functions like min, max and average that can also be used . to
find the total of the range, highlight it then click the auto sum icon on the standard toolbar.
FORMS
A form is specially prepared template that the user can use to enter data in a worksheet. It is specifically
formatted to enable users to enter data in a format that is more convenient to them. If data is
collected on paper before entering in the computer , then a form can be created to have the layout of
the data on the paper to quicken data entry procedures . To display a form, click on data, then form
Embedded Chart: Is a chart considered as a graphic object and saved as part on which it is created.
Chart Sheet: is a separate sheet within a workbook that has its own sheet name. It is used to view or
edit large complex charts separated from the worksheet to preserve screen space as one works on
the worksheet.
In charts , data appears in form of axis values, Category names ,chart data series names, data markers
and data sheets.
Page92
CREATING CHARTS
One can create either an embedded chart or a chart sheet.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
Enter data in the worksheet
Select the cells that contain data one wants to appear in the chart . If one wants the column
and row label in the chart, include the cells that contain them in the selection.
Click on the insert menu, click chart or click on the chart wizard from the standard toolbar.
Follow the instructions in each step of the wizard
DELETING CHARTS
Select the chart to have the selection squares
Press delete key
Qn: Explain the advantages of using electronic spreadsheet over manual spreadsheets.
PRESENTATION SOFTWARE
This is an application software enabling the users to create computer based slide shows using
sophisticated graphic s and animations to enhance images .
Page94
These applications are also able to create slide reprints and notes. They are normally employed during
meetings or seminars to enhance speakers’ ideas graphically.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
A PRESENTATION
This is a collection of slides , handouts, speakers’ notes and outlines in a single file.
A SLIDE
This is an individual page in ones’ presentations.
A HANDOUT
Is a printed material for ones’ audience that consists of two- six slide images printed on a single page.
It helps to support ones’ presentation by keeping the audience focused on what one is saying and by
not requiring them to write down everything they see on the projection screen.
OUTLINES
Theses are used for brainstorming and organizing one’s thoughts.
SLIDE MASTER
Is the master page of each of the output options , slides, handouts and notes pages that is part of every
presentation created.
TITLE MASTER
This is a title area for auto layout . It is formatted place holder for slide titles on the slide master.
TRANSITION
This is a way how characters in a slides move on and off the screen. For example Dissolve in.
ANIMATIONS.
These are special visual or sound effects that can be added to text or objects in a presentation.
COLOUR SCHEMES
Is a set of colours that one can apply for individual slides, notes, pages and audience handouts
Is used to create overhead transparencies. 35 mm slides, audience handouts and speakers notes.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
It provides tools that help one to organize his / her thoughts, build a presentation quickly using
quickly using professionally designed templates.
Is used to enhance the users’ presentation with pictures, sound, transitions, charts and videos.
ADVANTAGES OF PRESENTATION SOFTWARE
It provides a variety of presentations layouts for the slides.
Multimedia elements such as clip art images, video clips and audio clips can be turned into the
slides.
Timing of the slides can be set so that the presentation automatically displays the next slide
after a predefined period of time.
The presentation can be viewed and printed in different formats e.g. Outline format, audiences
handout format and notes page format.
MICTROSOFT POWER POINIT
This is the most common presentation software used , which enables the user to produce high quality
output e.g. overhead transparencies 35mm slides and computer based displays for presentation to an
audience.
EDITING A PRESENTATION
Changing slide layout
Make the slide that you that to modify active by displaying it in the presentation window.
Click format/slide layout and select a new layout from the slide layout dialog box.
Click apply / Press enter.
Changing indent levels of bulleted items.
Click promote (Indent less</button to indent to the left)
Click Demote (indent more)>/ button to indent text to the right.
Inserting clipart//pictures
Select an auto layout option with a clipart placeholder.
Double click the clipart placeholder.
Select any picture from the clipart gallery.
Press enter / Click insert
Resizing and moving clipart
Select clipart object by clicking the mouse pointer once over the object. ( Handles appear around
the picture when properly selected )
Drag the handle on the object to size the picture or drag the centre of the object to move to any
other location.
VIEWING A PRESENTATION
SLIDE VIEW:
This shows how the slide will appear when printed /displayed . Is the most common to use for building
/ finalizing a presentation.
OUTLINE VIEW:
This is to organize your presentation thoughts and quickly develop textual content for a presentation.
- From the view menu, choose outline.
SLIDE SORTER VIEW:
Page97
It helps one to see how his presentation flows. In this, one cane re order slides, add transition effects and
set timing for electronic presentation. It provides a small-scale of each slide complete with graphics and
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
text.
- From View menu, Click Slide sorter.
NOTES PAGE VIEW:
This helps to create speakers’ notes for any or all of the slides in his or her presentation. Each notes
page corresponds to a slide.
Just as in slide view , the following can be performed in the notes page view.
Insert, edit and delete text.
Draw line, squares, ovals e.t.c.
Add clipart, charts, and scanned photographs.
Add graphs, charts/data from other applications.
Change the appearance of text and object.
Change a template’s style or colour scheme.
- From view menu, Click notes pages.
SLIDE SHOW VIEW:
This is also called an on screen presentation which displays slides as an electronic presentation on the
computer.
It helps the user see the effect of the transition and the timing that you set in the slide show.
-From the view menu, choose slide show.
From the file menu , choose the file you want to open from the list of recently used files.
Choose the bullet style by selecting from among the following options.
-In the “Bullets from Box” select a font to use with your bullets as you change for bullets in
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
the grid below change.
-In special colour box , select colour.
Click a bullet in the grid to see an enlarged view of it and choose ok.
To increase the indents.
Click on Demote or promote button on the formatting
SHADOWING AND EMBOSSING TEXT
Shadowing adds a drop shadow behind a text for emphasis.
Embossing text brings a highlight effect.
PROCEDURE
Select the character or text that you want to shadow / emphasize.
From the format menu, click font ………..Dialog box appears.
In the effects box, select emboss/shadow.
Choose ok.
SUPERSCRIPTING AND SUBSCRIPTING
To superscript is to select text / character and raise it while to subscript is to lower the word in relation
to the texts base.
NB. Same procedure as embossing and shadowing.
audience on the slide show . However frequent use of sound effects can draw attention
away from your main points.
Computer Notes 840/1 Theory and Some Notes of 840/2 Pratical
The pace of your presentation also affects audience response e.g. going too fast exhausts
audience members and going too slow puts them to sleep.
You can use Power Point features to rehearse your pace before you give a presentation.
While you rehearse, you can also check your slides’ visual impact . Too many words or
pictures can distract the audience. If you find yourself using too much text , try turning
one slide into two or three , then increase the font size.
Page104
Computer Notes
Fields
Key field:
This is a field in the file that uniquely identifies a record.
Importance of a key field (Primary key)
Is used to ensure that there are no duplicate fields in the table .
It avoids redundancy in tables since it can be represented as a foreign key in other tables.
NB: the ISBN number of a book should be used as the key field in an electronic library system
Field Type/ Data Type: This specifies the type of data a field can contain . Common data types include.
i. Text/ Character type – This holds letters, numbers or special characters.
ii. Numeric Type – This holds numbers only.
Page105
iii. Currency Type – This may hold dollars and cents amount.
iv. Date/Time Type – This may hold month , day , time and year information.
Computer Notes
v. Memo type - This contain text of any type or length .
vi. Boolean type – This holds values that are either true / false/yes or no.
vii. Ole Object (Object Linking and embedding) . This holds objects, graphs (Pictures and photographs)
sound or other binary data.
viii. Auto number – This holds a number that is assigned randomly to a particular record and never
changes again.
ix. Look up - This holds values that are from external table, query or a list of specified values.
x. Hyperlink – This refers to data types that are internet addresses.
Field properties
These are specific characteristics of particular fields.
a) Field width/ size. Refers to the maximum length of characters including spaces that any data
items in a field should have.
b) Caption – specifies a different name to be used as a filed label instead of a specified name.E.g.
Stu Name could be Student Name
c) Format – Specifies the appearance of any data item in that particular field.
d) Decimal places – Specifies the number of decimal places the figure should have.
e) Indexed - Specifies whether to allow duplicate data items in a field.
f) Input Mask – Specifies a specific pattern of entering data items in a particular field
automatically.
g) Required - if set to yes, this field cannot be left blank during data entry.
h) Default - specifies the data entry value to be entered automatically for each field unless changed.
i) Allow zero length – If set yes , even an empty string will be accepted as a valid entry in
that field .
Validation :
This is the process of comparing the data entered with a set of pre-defined rules or values to check if
the data is acceptable.
Browsing
Is the scanning for information of general interest.
Data validation
Is the process of checking of input data for errors before processing.
Common data validation techniques include;
i. Presence check- is to make sure that data is present.
ii. Range Check - is to make sure that data lies within a certain range.
iii. Data type check – (Character check / alphanumeric check): is to make sure that the data entered is
of correct data type.
iv. Consistency check – is to compare new data with previous data.
v. Control total check – Is to compare the computer calculated total with a manually calculated total.
NB: Check digit.
Is an extra digit appended to a code consisting of a series of numbers or characters to detect errors arising
from a transcription?
MANUPULATION OF DATA IN DATABASE
TABLES
These are database structures that act as collections of data about a specific topics and they are arrange in
columns (field) and rows (records).
Queries
These are tools used to locate for specific records within a table or ask questions to your database.
Page106
Querying refers to the use of a set of rules (criteria) for retrieving data from the database.
Forms.
Computer Notes
Theses provide alternatives to the tables . They are similar to receipts , registration forms , order invoices
etcetera.
Or
A form is pictorial presentation of data in a graphical natures.
Reports
These are used to produce various printed output e.g. summaries in your database. They can be constructed
form data tables or queries which include lists, form letters, envelops , mailing lists etcetera.
Updating a database
Adding new records
Deleting records
Modifying (Amending a record)
Advantages of a database system
i. Reduction in redundancy- Storing of data in one place lessens duplication and the required space.
ii. Enhancement of data integrity – Centralization of data reduces updating errors hence greater
accuracy can be maintained.
iii. Ensured data independence – Data is entered , stored ,modified and accessed by methods that are
not affected by other application program.
iv. Facilitates data sharing and integration – It offers users ability to combine or cross reference data
in many different ways.
v. Improvement of access to data – Data systems allows users to query the data base directly without
necessarily using an application program.
vi. Centralization of security. It is easier to limit access of the information if it is grouped together
instead of being kept in several scattered files.
vii. Reduction of costs. By eliminating duplication of data, many organizations can realize substantial
savings.
Disadvantages of Database software.
i. Complexity . Database systems are difficult and time consuming to develop.
ii. Initial expenses. Database systems are expensive to set up .
Page107
iii. Need for substantial conversion effort. Change from a traditional file oriented system to a database
system can often involve large – scale reorganization of data and program. This need can create user
resistance.
Computer Notes
iv. Vulnerability. Data in a database may be liable to theft, sabotage or destruction.
Creating Queries.
After entering data into a table , you can create a simple select query with a wizard.
The simple select query wizard creates queries that retrieve data from the fields you can specify in one or
more tables or queries. It can sum, Count and average values for groups of records or all records and it
can calculate the minimum or maximum value in the field.
Procedure
In the data base window , click the queries tab and then click new.
In the new query dialog box , click simple query wizard.
Click ok
Click the name of the table or query you want to base your query on and then select the fields
whose fields whose data you want to retrieve.
Follow the direction in the wizard dialog boxes.
In the last dialog box, you can choose either to run the query or to see the query’s structure in design
view.
preceding example would be >”400”. You can use more complicated expressions such as “industrial
area” in the address field and >”400” in the quantity sold field.
Computer Notes
ADDING RECORDS USING FORMS
Forms consist of four basic elements namely;
Fields that relate to a database.
Calculated fields that are not in the database.
Illustrative / descriptive text
Boxes and lines.
CREATING FORMS USING WIZARD
Click on the form tab new (Forms dialog box appears). Select form wizard from the options and
click ok.(A new form wizard starts).
Under tables/ queries dropdown list, select cosmetics table.
Click on next button to continue (forms wizard asks you to continue). The form wizard displays a
list of various styles for you to make a choice.
Select the standard style and click the next button to continue. The form wizard finally requests you
for an appropriate title of your form.
For the title type in customers form, click finish button. A new standard form is displayed with
details of the first record if there was any entered.
FORMATTING FORMS
1. Click the design button to open the form design view from the standard toolbar.
2. Select format from the menu bar.
3. Click auto format command .(You are presented with a blank design screen where you enter data.
With a query, you can analyze all records fields using the inbuilt functions such as Sum, Average,
Minimum, and Maximum etcetera. To use the total functions:
Open your query in design view.
Computer Notes
Click the totals button on the query toolbar.
Select the field you want to analyze
For each field to be analyzed , click its cell in the total row , and then select any of the
functions that you may see or find in the dialog that appears.
Select the criteria and other options the n click run to preview the results .
Save the query.
SORTING
Is to arrange or change the order of records / Items.
Change sorting and grouping order in a report.
1. Open the report in design view.
2. Click sorting and grouping tool on the toolbar to display the sorting and grouping box.
3. In the grouping box, click the expression you want to move.
4. Click the expression again and drag the row to a new location in the list.
NB: If the groups you are re-arranging have headers or footers, Ms Access moves the headers and footers
and all the control in them to their position.
CREATING REPORTS.
With wizard
i. In the database window, click the reports tab and select New.
ii. In the new report dialog box, click the wizard that you want to use. A description of the wizard
appears in the left side of the dialog box.
iii. Click the table / query that contain the data you want to base your report on.
iv. Click ok
NB: if you clicked Report wizard, char wizard or label wizard in step 3, follow the directions in the wizard
dialog boxes. If you click Auto Report: Tabular or Auto report: Columnar,
Ms Access automatically create your report.
If the resulting report does not look the way you want, you can change it in design view.
Is an electronic document on the web? A web page contains text, graphics, animations, audio and video
(multimedia elements) as well as in built connections called hyperlinks
Hyperlinks
Computer Notes
Is a built in connection to a page or part of a web. This is a method of instant cross referencing. In most
websites, words/phrases appear in certain text of different co lour often this text is underlined. It has an icon
of a palm.
A web site
Is a collection of similar web pages (related web pages).
Home page
This is a starting page on a table of contents for a web site and normally it has a name called index html in
index html.
A web browser
Is a software program used to view or access web pages.
The most popular web browsers include:
1. Mozilla 4. Comet bird
2. Netscape internet explore 5. Fire fox
3. Microsoft internet explore 6. Torrent
HTML
Html which stands for hyper text mark up language is the predominant mark language for web pages. it is
written in form of HTML elements consisting of “tags” surrounded by angle brackets within the web pages
content.
It allows images and objects to be embedded and can be used to create interactive forms. It provides a mean
to create interactive forms. It provides a mean to crate structured documents by denoting structured
semantics for text such as headings, paragraphs, lists, links, quotes, and other items.
< > - these are HTML tags which are even enclosed in for almost all tags this is a start and ending tag
HTML TAGS.
- <Html> and It shows the beginning and the end of the heading.
- <Head>
- <Title> My home page </Head>
- <H> This is my first Html lesson</H>
- <Body>
- <p> This is a paragraph </p>
- </Html>
<html>
<head>
<title>My Own Webpage!</title>
</head>
<body>
<h2>Welcome to my webpage</h2>
<p>Coming soon will be my completed webpage that will wow and impress you!</p>
</body>
</html>
The steps you take to make your pages public depend on how you want to share them. There are two (2) main
avenues: -
i. On your local network or Intranet for limited access by people with in an organization.
ii. By using the Internet for access by anyone using the WWW.
To make Web Pages available to other people on your network,
Save your Web Pages and related files, such as pictures to a network location.
To make your Web Pages available on the WWW, you need to;
Either Install Web Server Software on your computer.
Or locate an Internet Provider that allocates space for Web Pages.
WEB HOSTING
Definition of World Wide Web:
The Web is a network of computers all over the world.
All the computers on the Web can communicate with each other. Al the computers use a communication
standard called Hyper Text Transfer Protocol (HTTP).
Examples of some popular browsers and these are: -
Internet explorer Opera
Mozilla fire fox Netscape navigato
Google chrome
2. “Computers have destroyed our culture”. What are your arguments for and against this
statement?
Arguments:
- Computers have destroyed our traditional moral and sexual values. E.g. use of e-mails.
- Change of work schedules, e.g. use of time tables
- Erosion of traditional religious norms. E.g. pornography
- Have destroyed craftsmanship. E.g. computers have taken over man’s ability to execute tasks.
- Access to uncensored materials as opposed to the well guarded traditional norms.
Against:
- Improved communication
- Enhanced scientific research
- Computers have improved on ways of doing business by use E-commerce
- Education has been boosted. E.g. online learning
- It has improved the process of data storage and manipulation
- Provision of up to date information at the quickest time possible.
3. Discuss what you expect the role of computers in the future.
In communication: We expect very fast and reliable systems and improved networks.
In education: We expect very fast access to research topics, electronic publications etc.
Security: We expect high technological systems by providing efficient & effective protection,
computer guided warfare etc.
In manufacturing industries: We expect increased use of robots, Computer Aided Designs (CADs) in
manufacturing & high technological manufacturing systems.
Creation of a virtual world. That is to say, where seven continents are connected together.
Page114
- Use of passwords & PIN Numbers to enable the users log onto the systems. The passwords should not
be shared with other people, never write on a paper and it should be changed f
- Data encryption
- Audit controls
- Applying possessed objects like IDs and badges.
- Use biometric devices. For example the finger prints, iris recognition systems, thumb prints, face
recognition systems and voice recognition equipments.
- Use of call back systems. That is to say, a computer calls a user back at a previously established
telephone number.
- Installing alarm systems for additional security. For example surveillance cameras should be fitted in
the rooms.
- Never leave a notebook computer or a laptop unattended to in a public place.
- Backing up all important files stored on the computer regularly.
NEGATIVE EFFECTS
Page115