0% found this document useful (0 votes)
29 views27 pages

Computer Studies Notes-1

Computer studies notes

Uploaded by

calebkimanzi254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views27 pages

Computer Studies Notes-1

Computer studies notes

Uploaded by

calebkimanzi254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

1.

0 INTRODUCTION TO COMPUTERS
Specific objectives
By the end of the topic you should be able to:-
a). Define a computer
b). State the different parts that make up a computer
c). Explain how computers have developed
d). Classify the various types of computers
e). Identify areas where computers are stored used
f). State the safety precautions and practices in a computer laboratory
g). Demonstrate basic hands-on skills on the use of a computer

1.1 Definition of terms


A computer
 Is an electronic device that accepts user input (data) and processes it under the influence of a
set of instructions referred to as programs to produce desired output (information).
 Is an electronic device that uses instructions (programs) to accept and process data given to it
in a variety of forms in order to produce useful information.
 Is an electronic device that accepts user input (data) and transforms it under the influence of
sets of special instructions called programs to produce information.
A computer is said to be electronic because it utilizes electrical signals to process information.

The three key terms that define a computer are:- input, process and output.
Programs
Set of instructions written in computer language that directs the computer what task to perform
and how to perform it.

Data
Raw facts that do not have much meaning to the user. Includes alphabets, numbers and symbols.

Data processing
The varied activities performed to convert data into useful information.

Information
Processed data that is meaningful to the user and which can form a basis for decision making.

Information and Communication Technology (ICT)


Is the integration of computers and telecommunication facilities for the purpose of
communication?
A computer is said to be electronic because it utilizes small electrical signals to process
information.

Computers come in different sizes and designs but the most common is Personal Computer (PC)
1.2 Physical Parts of a Computer
A computer is made up of a collection of different components that are interconnected together
in order to function as a single entity. A computer is basically made up of four basic components
and other devices connected to the system unit called peripheral devices.

i). System unit


Looks like a box. A computer case (also known as a computer chassis, cabinet, box, tower,
enclosure, housing, system unit or simply case) is the enclosure that contains most of the
components of a computer (usually excluding the display, keyboard and mouse). This part
houses the brain of the computer called the Central Processing Unit (CPU), motherboard, main
memory, and the drives. The drive is used to store, record and read data. The two common types
of system units are Tower and desktop type. The below picture shows a tower style.

ii). Peripheral devices


Can be defined as:-
- Devices connected to the system unit via ports and controlled by the CPU; or
- hardware that is externally connected to the computer’s system unit
Most of the devices are connected using data interface cables . The interface cables carry data
and information to and from the devices. The cables are attached to the system unit using
connectors called ports.
Peripheral devices can be external -- such as a mouse, keyboard, printer, monitor, external Zip
drive or scanner -- or internal, such as a CD-ROM drive, CD-R drive , memory, motherboard,
hard drive, graphics card, floppy drive, cd/dvd drive
or internal modem. Internal peripheral devices are often referred to as integrated peripherals.

Some peripheral devices are:-


 Keyboard
Is a device that enables the user to enter data and instructions in the computer by pressing its
keys.
 The mouse
Is a hand held device that enables the user to issue instructions to the computer and move items
on the screen by controlling a special mouse pointer displayed on the screen.
 The monitor
Is a TV like device that displays output. it is a called a monitor because it enables the user to
monitor or see what is going on in the computer.

1.3 Classification of Computers


Computers are classified according to:
 Physical size and processing power
 Purpose
 Functionality

1) Physical size and processing power


a). Supercomputers

Supercomputers are very expensive and are employed for


specialized applications that require immense amounts of
mathematical calculations. For example, weather forecasting
requires a supercomputer. Other uses of supercomputers
include animated graphics, fluid dynamic calculations, nuclear
energy research, and petroleum exploration. Are very fast,
largest in physical size, most expensive, fastest processor
speed and largest memory capacity computers. Perform many
complex calculations and generate a lot of heat due to their
huge processing power. Due to this the whole CPU is
immersed in a tank containing liquid fluorocarbon to
provide cooling. Mainly used for scientific research which
requires enormous calculations. Applications that justify use of supercomputers are:- space
science, nuclear physics, aerodynamic design and simulation., defense and weapon analysis. Are
found in developed countries like USA and Japan.
b). Mainframe

Are less powerful, less expensive, smaller, slower, lower


memory capacity than supercomputers. Handling all kinds of
problems whether scientific or commercial. Support a variety of
peripheral devices. Mostly found in government agencies, big
organizations and companies such as hospitals, banks, airports
etc, which have large information processing needs and places
where processing automation is required.. They can also be used
as Network Servers in large businesses like in Banks to provide
online data of customer accounts to branch offices.

c). Minicomputers
Also referred small scale mainframes. Slightly smaller, low memory, cheaper, and low
processing power than mainframe. Supports fewer peripheral devices and not as powerful and
fast as the mainframe. It was developed as a cheaper alternative to the mainframes for smaller
organizations. They are used in research institutions, scientific laboratories, manufacturing
industries, engineering plants, etc.

d). Microcomputers
Also called personal computers (PCs). Is the smallest, cheapest, slowest and least powerful type
of computers compared to supercomputer, mainframes and minicomputer. They are called
Microcomputers because their processor is very tiny (size of a thumbnail). They are mainly used
in training and learning institutions, small business enterprises, communication centres, etc.
Today powerful microcomputers have grown tremendously closing the gap that formerly existed
and reserved for minicomputers and mainframes.

Types of microcomputers
 Non-portable: Desktop computer which is not portable and designed to be placed on top of
an office desk.
 Portable

Laptop: Are small enough to rest on persons lap when using. Weigh about 1 to 3 kg each.

Advantages of laptops
o They are portable
o Are convenient to travel with
o Their screen show sharper and clear images which
prevent eye strain.
o Laptops have power batteries which serve as inbuilt
UPS
Note books: are even smaller and lighter than laptops. Small enough to fit in the pocket of a coat.
Cheaper than laptops and just as useful. When very small are called
sub-notebooks.

Palmtops: A small computer that literally fits in your palm. Compared


to full-size computers, palmtops are severely limited, but they are
practical for certain functions such as phone
books and calendars. Palmtops that use a pen
rather than a keyboard for input are often called
hand-held computers or PDAs.

Because of their small size, most palmtop computers do not


include disk drives. However, many contain PCMCIAslots in which
you can insert disk drives, modems, memory, and other devices.

Palmtops are also called PDAs, hand-held computers and pocket


computers

Examples are: Personal Digital Assistants (PDAs), personal organizers or pen computers.

2) Purpose (Use)
All computers falls into two broad groups according to the tasks they perform namely special
and general purpose.

(a) Special purpose computers


They are designed to serve/ perform only one specialized task. These computers cannot perform
other task except the one they were meant to do. The set of instructions which drive the a special
purpose computer are limited in number at the time of manufacturer. Examples are: robots used
in manufacturing industry, mobile phones for communication, electronic calculators for
calculations, watches, oven etc. they can perform the task very fast and very efficiently since
they are dedicated to a single task. Are relatively cheap.

(b) General purpose


Are designed to be able to perform a variety of tasks when loaded with the appropriate programs.
Are quite flexible to be applied in a wide range of applications like document processing,
performing calculations, accounting, data and information management etc.

(c) Embedded computers


Are inbuilt within machines that they control. They have hidden inputs originating from the
machines they are controlling. Embedded computers are found in microwaves, digital
cameras, digital watches and air conditioners.
3) Functionality
In this class computers are classified according to the type of data they can process.

o Analog computers
Process data that is analog in nature which is continuous. They solve mathematical operations
and logical comparison by measuring the amount of change in physical magnitude e.g. speed,
temperature, etc. are dedicated to a single task. Are used in manufacturing process control like
monitoring and regulating furnace temperatures, speed, pressures, weather, etc, stations to record
and process physical quantities e.g. wind, cloud speed, temperature, etc. in addition to PCs, most
modern home appliances such as digitals TVs, microwaves, wall clocks are digital in nature.
Continuous data is represented using a continuous waveform.
+

- Digital signal Draw manually

o Digital computers
They process digital data only which is discrete in nature and their operations are based on two
states namely “on” and “off” or “1” and “0”.

- Analog signal {Draw manually}

o Hybrid computers
`They are computers build with the characteristics of both analog and digital, thus process both
analog and digital data.

Review questions 1.1


1. What is a computer?
2. State different parts that make up a computer.
3. Differentiate the following types of computers.
a. Supercomputer and mainframe.
b. Minicomputer and a PC .
4. Differentiate between a digital and analog computer.
5. Give two reasons why smaller computers like laptops tend to be more expensive than
desktop computers.
6. A…………… computer performs only one task while a…………. performs more than
one.
7. A computer is called electronic device because:
a. It processes data.
b. It uses electrical signals.
c. It gives out information.
d. It accepts user input.
8. What is data?.
a. Processed information.
b. Unprocessed information.
c. Raw facts inform of characters, symbols and numbers.
d. Information displayed .
e. On the screen.
9. Which one of the following is not true about the system unit?.
a. It houses the CPU
b. It houses the monitor.
c. It connects to all peripheral devices using ports.
10. What is a mouse in relation to computing.
a. A small destructive rodent.
b. A round A pointing device that controls a pointer on the plastic container with a tail.
c. screen.
d. A device used in typing.
11. Why the screen is also called a monitor.
a. It displays the monitor lizard.
b. It helps the user to track what is going on in the computer.
c. It monitors system performance.
d. It is a television.
12. Pick the old one out in the list below
a) Calculator
b) Mobile phone
c) Robot
d) laptop

13. Pick the odd one out in the list below.


a. Mainframe.
b. Microcomputer.
c. Minicomputer.
d. Digital computer.
14. Which of the following would be most suitable for travelers?.
a. Supercomputer .
b. Mainframe computer.
c. Palmtop computer.
d. Minicomputer.
15. Why is a mobile phone regarded to be a computer?.
a. It is electronic, has a screen, keypad, memory and is programmable.
b. It looks like a palmtop.
c. It is portable.
d. It produces tones.
16. What is meant by analog data.
a. Data that never stops.
b. Discrete data .
c. Large data.
d. Continuous data.
17. Which of the following are analog devices?
a. A monitor with knobs that are rotated to increase brightness.
b. A monitor with buttons that one presses to increase brightness.
c. A radio with a knob that slides in a slot to increase volume.
d. A thermometer.
18. Which of the following is called a microprocessor?
a. The CPU of a mainframe.
b. The CPU of a computer.
c. The CPU of a micro computer.
d. The CPU of a supercomputer.

1.4 Development of Computers


Non-electronic computing devices
Included Abacus, Napiers bones and Analytical engine
Before 1900, most data processing was done manually. Abacus was a special counting
instrument / calculating tool used to calculate large figures developed by Asian merchants.
Napiers Bornes was developed by John Napier a scotish mathematician to help in multiplication
and division.The first machine after the abacus was Analytical Engine developed by Charles
Babbage who was an English Mathematician in 1822 -1871. Mark I was the first computer like
machine designed by professor Howard Aken of Horrand University in 1939. Mark I became
operational in 1943. It weighed 5 tons and was 16 metres long. Since then rapid advancements
in computing have been realized and can be categorized into five generations.

Each generation of computer is characterized by a major technological development that


fundamentally changed the way computers operate, resulting in increasingly smaller,
cheaper, more powerful and more efficient and reliable devices.

The history of development is often referred to in reference to the different generations of


computing. Each generation of computer is characterized by a major technological development
that fundamentally changed the way computers operate, resulting in increasingly smaller,
cheaper, more powerful and more efficient and reliable devices. Read about each generation and
the developments that led to the current devices that we use today.

Key Terms: computer, magnetic drums, binary, integrated circuit, semiconductor,


nanotechnology

First Generation (1940-1956) Vacuum Tubes

The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were
often enormous, taking up entire rooms. They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat, which was often the cause of
malfunctions.
First generation computers relied on machine language, the lowest-level programming language
understood by computers, to perform operations, and they could only solve one problem at a
time. Input was based on punched cards and paper tape, and output was displayed on printouts.

The UNIVAC and ENIAC computers are examples of first-generation computing devices. The
UNIVAC was the first commercial computer delivered to a business client, the U.S. Census
Bureau in 1951.

Second Generation (1956-1963) Transistors

Transistors replaced vacuum tubes and ushered in the second generation of computers. The
transistor was invented in 1947 but did not see widespread use in computers until the late 1950s.
The transistor was far superior to the vacuum tube, allowing computers to become smaller,
faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors.
Though the transistor still generated a great deal of heat that subjected the computer to damage,
it was a vast improvement over the vacuum tube. Second-generation computers still relied on
punched cards for input and printouts for output.

Second-generation computers moved from cryptic binary machine language to symbolic, or


assembly, languages, which allowed programmers to specify instructions in words. High-level
programming languages were also being developed at this time, such as early versions of
COBOL and FORTRAN. These were also the first computers that stored their instructions in
their memory, which moved from a magnetic drum to magnetic core technology.

The first computers of this generation were developed for the atomic energy industry.

Third Generation (1964-1971) Integrated Circuits

The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on siliconchips, called semiconductors, which
drastically increased the speed and efficiency of computers.

Instead of punched cards and printouts, users interacted with third generation computers through
keyboards and monitors and interfaced with an operating system, which allowed the device to
run many different applications at one time with a central program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were smaller
and cheaper than their predecessors.

Fourth Generation (1971-Present) Microprocessors

The microprocessor brought the fourth generation of


computers, as thousands of integrated circuits were built onto
a single silicon chip. What in the first generation filled an entire room could now fit in the palm
of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer
—from the central processing unit and memory to input/output controls—on a single chip.

In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the
Macintosh. Microprocessors also moved out of the realm of desktop computers and into many
areas of life as more and more everyday products began to use microprocessors.

As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of the Internet. Fourth generation computers
also saw the development of GUIs, the mouse and handheld devices.

Fifth Generation (Present and Beyond) Artificial Intelligence

Fifth generation computing devices, based on artificial intelligence, are still in development,
though there are some applications, such as voice recognition, that are being used today. The use
of parallel processing and superconductors is helping to make artificial intelligence a reality.
Quantum computation and molecular and nanotechnology will radically change the face of
computers in years to come. The goal of fifth-generation computing is to develop devices that
respond to natural language input and are capable of learning and self-organization.

In the fifth generation are characterized by:-


- computers have very high processing power and speed
- Size is increasingly becoming smaller because of superior hardware and software products
that are small in size.
- Emit negligible heat
- Have special instruction sets that allow them to support complex programs that mimic
human intelligence referred to as Artificial Intelligence (AI). Therefore the circuit
technology is AI, parallel architectures, three Dimensional circuit design and super-
conducting materials.
- Use advanced hard disks and optical disks for storage e.g. DVDs
- Perform multiprocessing
- Use multi-user operating systems and advanced application programs
- Massive connectivity to Internet and intranet.

NB: Internet refers to global interconnection of computer networks for the purpose of
communication and resource sharing.
Computer Network is collection of computers linked together using transmission media for the
purpose of communication and resource sharing.
Intranet – is a private network.

DID YOU KNOW...?


An integrated circuit (IC) is a small electronic device made out of a semiconductor material. The
first integrated circuit was developed in the 1950s by Jack Kilby of Texas Instruments and
Robert Noyce of Fairchild Semiconductor.
1. 5 Areas Where Computers Are Used
Supermarkets
- Provides quick way of checking out customers purchases through EPOSS
- Provides opportunity to customers to purchase goods without hard cash through EFT.
- to help in management of daily stock control, for production of receipts and can be used as a
barcode reader

Banks
- Manage financial transactions through the use of special cash dispensing machines called
ATMs used for cash deposit and withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping and processing of documents
- Provide electronic money transfer facilities

Homes
- Entertainment e.g. watching movies, playing music, playing computer games
- For storing personal information / documents
- For calculating and keeping home budgets

Industries
- To monitor and control industrial processes through the use of robots
- For management control i.e. to keep track of orders, bills and transactions
- For advertisement purposes, which enable an industry to attract more customers
- CAD {Computer Aided Design} allows accurate, quick and easy designs of products on
computer screen.

Law enforcement agencies


- For matching, analyzing and keeping database of fingerprints
- For taking photographs and other identification details
- For record keeping
- For face recognition, scene monitoring and analysis, which help the police carry out criminal
investigations speedily.

Transport industry
- Airports; to control the movement of aircrafts, their take off and landing using radar
equipment
- For making reservations (Booking purposes)
- Storing flight information
- Automobile traffic control i.e monitoring vehicle traffic in busy towns
- In Railway corporations to coordinate the movement of goods and wagons
- In shipping control for efficient management of fleets, cargo handling and communication

Offices
- For receiving and sending of information through e-mails, fax , etc
- Production of documents
- Keeping records

Hospitals
- For keeping patient records
- Keeping records of purchases and stock of medicine
- Analysis data obtained from X-rays
- Maintaining the booking system of scarce resources such as operation theaters.
- Control of life support machines in intensive care unit
- Used by physicians to get proper diagnosis of the affected part of body through cross
sectional view
Education
- Access internet through email to link different schools and to exchange knowledge
- Communication through email to link different schools and exchange knowledge
- For teaching and learning purposes e.g. computer practical
- Administration –storing information about students, processing grades and teachers salaries.

Library services
- Enables library personnel to easily access and keep updated records of books and other
library materials i.e. to keep electronic catalogues and track book circulation.
- Library users can also use computers to search for titles instead of using the manual card
catalogue

Entertainment industry – to generate and edit computer graphics in movies and games.
Military to design weapons and control flight.
Research institutions to process and analyze data.
Impaired persons
- converts speech to text for the deaf
- converts spoken language to sign language for the deaf.
- Converts text to speech for the blind using speech synthesizers.

Review questions 1.2


1) Match the following generations of computers with the technology used to develop them.
1. First Generation A .Very Large Integrated
Circuit
2. Second Generation B. Thermionic Valves
3. Third Generation C. Transistors
4. Fourth Generation D. Integrated Circuits

2) Identify and explain at least five areas where computers are used to process data.
3) What were the characteristics of first generation computers?
4) Who developed the analytical engine
5) What is artificial intelligence?
6) Write the following initial sin full:
a) IC
7) Represent 5780 using abacus
8) Match the following computer application areas with the role played by computers in each
case.

1. Supermarkets A. Matching fingerprints


2. Hospital B. Entertainment
3. Bank C. Stock control
4. Hotel D. Booking rooms
5. Home E. Analyzing academic data
6. School F. Manufacturing process control
7. Industry G. Life support machines
8. Police station H. Processing cheques

1.6 The Computer Laboratory


Definition
- Is a room that has been specially prepared to facilitate installation of computers and to
provide a safe conducive environment for teaching and learning of computer studies; or
- A room where practical computer studies lessons are conducted where resources such as
printers, disks and manuals can be shared.

Factors to consider when preparing a computer laboratory


i). Security of computer programs and other resources
ii). Reliability of the source of power
iii). The number of computers to be installed and the available floor space
iv). The maximum number of users that the laboratory can accommodate.

Safety precautions and practices in the computer laboratory


Computer systems are expensive to acquire and maintain, and should therefore be handled with
great care. Most computer system malfunctions are caused by failure to follow correct
instructions on use of equipments, carelessness and neglect. We need to observe the safety
precautions, rules and practices to avoid accidental injury, damage of devices or lack of
conducive learning and teaching environment. Some safety precautions are made to protect
computers while others protect users.

Measures that protect the computers


 Behaviour in the computer laboratory
The following should be followed in and out of the computer laboratory
- Avoid smoking or exposing computers to dust by entering in shoes. Smoke and dust particles
can damage the computer components and cause wearing to moving parts.
- Never take any eatables (food or beverage). Food particles may fall in moving computer like
keyboard and clog them while liquids may pour into electrical circuits causing rusting,
electrical faults, or short circuits..
- Avoid unnecessary movements because you may accidentally knock down peripheral
devices.
- See that no waste materials (paper bits, etc) are inside the room. If any, collect them and put
them into the dustbin.
- Follow the correct procedure for starting and shutting down the computer.

- When in doubt ask. Students should always remember the principle of: “It is not stupid to ask
a sincere question”, to ensure that no damage is caused due to lack of proper knowledge. If
you are not sure of how to handle or operate any piece of equipment in the laboratory please
ask for assistance.

 Burglar proofingComputer equipment is expensive and it is therefore important to protect


the investment against theft by implementing the following controls:
i). Fit strong metallic grills and locks on doors, windows
ii). Do not welcome strangers to computer room
iii). Install intrusion detection alarm system at strategic access points to alert security
personnel incase of break in.

 Protection against fire


Fire in laboratories is either caused by inflammable chemicals used for cleaning and servicing
computer equipment or electrical faults due to open wires or cables and sometimes cigarette
smokers. Install fire prevention and control equipment such as smoke detectors, a gaseous fire
extinguisher filled with carbon dioxide and should be non-liquid or non-power based. The reason
is that liquids may cause rusting and corrosion of computer components while powder particles
may increase friction and wear off moving parts and/or cause disks to crash

 The room should be well laid out


There should be enough space for movement and the computers should be placed on
stable wide desks to avoid accidentally knocking them down. The cables should be laid
out in trunks away form the from user paths to avoid stumbling on them.

 Cables and power sockets should be well insulated to avoid short circuits that can cause
damage to computer components.

 Dust and dump control


Dust can be controlled by fitting good window curtains and an air conditioning system that filters
dust particles from the air entering the room. Also computers should be covered with dust covers
when not in use. Humidity should be regulated by using dehumidifiers in the room to remain an
optimum of 50%. Humidity lower than this allows static electricity to built up and cause damage
to computer components. High humidity of over 70% may cause rusting of metallic parts.

 Stable power supply


Computers require a stable source of power. Momentary power interruptions or fluctuations
often cause computers to crash, damage data storage devices or loss of information that had not
been saved prior to the power disruptions. Power from main supply is not always stable.

There are two types of power protection devices:


A surge protector and Uninterruptible Power Supply (UPS)
a) A surge protector
- A surge protector is a power protection device that protects the computer against electrical
surges. Surges are large amounts of electricity which exceed the maximum level device is
capable of holding. Surges can damage or destroy computer components.

b) Uninterruptible power supply (UPS)


- Protects a computer from loss of power. It charges when mains power is on and has power
surge and brownout protection capabilities. When the main’s
power goes off, it beeps to alert the user.
- The UPS has
computer and other hardware to tap power from.

Function of UPS
- It regulates power from unstable power source to the required clean stable voltage
- It temporarily provides power to the computer incase of a sudden power failure.
- It beeps to alert the user when the main Power goes off.

In summary stable power supply must be applied and adhered to by installing surge protectors,
power extension cables, for each computer and a power backup generator.

A computer connected to a UPS

Types of UPS
Standby Ups – which is a power conditioner with the ability to generate its own power when
there is a power failure

Online UPS (single conversion)


Operates like standby UPS but idles at very low power during standby operation.

True on-line UPS (Double conversion)


Is always on even during normal operation thus eliminating the need for any switching incase of
power failure. It is used for critical applications e.g in Banks where loss of power for few
seconds may result in file corruption.

- Installing lighting arrestors on the computer lab.

- The room should be well laid out with enough space for movement.

- Providing antiglare screens (light filters and adjustable screens to avoid eye strain and fatigue
caused by over bright CRT monitors.

Measures that protect the user


 The walls of the computer room should not be painted with over bright reflective oil
paints and the screens should face away from the window to avoid glare caused by bright
backgrounds.

 Cables insulation
All power cables must be properly insulated and laid away from busy pathways in the computer
laboratory. They can be laid along the wall in trunks or use special computer tables designed to
hide all the cables by running under.

 Standard furniture
The table on which a computer is placed must be strong and wide enough to hold the weight and
accommodate all peripheral devices. The user’s seat must be comfortable and have a straight
back rest that allows someone to sit upright to avoid muscle pains and back aches. The sit must
be high enough relative to the table to enable comfortable use of hands on the keyboard as shown
in the diagram below:
The eye must be at the same level as the top of the screen (monitor) when user is seated upright
as show in the figure below:

 Providing antiglare screens like Light filters and adjustable screens to avoid eye strain and
fatigue caused by over bright CTR monitors. Alternatively you use LCD monitors.

 Ventilation
There must be good air circulation to avoid suffocation or dizziness caused by lack of oxygen
and to allow computers to cool hence avoid damage to electronic parts. A computer laboratory
should be fitted with a HVAC (Heating, Ventilation, and Air Conditioning) system. This system
controls the temperature, air flow and humidity within a room, ensuring that the computer
equipment does not get over-heated, and the occupants of the laboratory are comfortable.
 Overcrowding in the computer laboratory should be avoided others users will suffocate.
 Lighting: Computer room should be well lit to avoid eyestrain that leads to headaches, stress
and fatigue. The monitor should be positioned such that glare or bright reflections on the
display are minimized. Radiation filter screens may be fitted as shown below:.

Computer layout
- Should be such that an instructor (tutor) can teach from the front. There should be enough
room between rows so that a person can easily move about the room. This can be attained
by using the two popular patterns for laying desks in a computer laboratory namely
classroom pattern and conference pattern. Figures below shows these layouts.

Whiteboard

Fig.1.1 Classroom pattern layout

White board

Fig. 1.2 Conference pattern layout


There should be a central printer where students can print their work. If possible the instructors
computer should be connected to a projector to magnify the screen on a white board

Review questions 1.3


1) What name is given to alternative sources of power.
a) Generators
b) UPS
c) Power backups
d) The sun
2) Which of the following will not ensure proper ventilation in a room.
a) Enough windows and doors
b) Overcrowding
c) Installing fans
d) Air conditioning system
3) All the following are dangerous to a computer except one.
a) Water
b) Smoke
c) Enough ventilation
d) Dust

4) Why must foods and beverages be kept out of the computer room?
a) Because computer users should not eat.
b) Because spilling may clog and destroy computer components
c) Because the smell of food is not good for the room.
d) Because all foods affect computers.
5) Which one of the following statements is correct?
a) Opening the system unit when it is still on.
b) Using magnets in the computer room
c) Covering the computers with dust covers after shutting down
d) Stepping on power and data cables.
6) Why are powder fire extinguishers not allowed in the computer room?
a) Powder particles settle on storage devices and may scratch them during read/write operation.
b) Power is poisonous
c) It fills the room with mist
d) Powder changes to liquid when sprayed.
7) All the following are functions of the UPS except one. Which one is it?
a) It prevents sudden power surges to destroy the computer
b) It supplies power to the computer during blackouts and brownouts
c) It provides stable power supply (clean power)
d) It can be used as the main power source for computers
8) Which of the following reasons are likely to cause eye strain in the computer room.
a) Poor lighting
b) Bright monitor
c) Poor ventilation
d) Ant radiation screen
9) All the following are proper sitting postures while using the computer except one. Which on
is it?
a) Straight back position
b) Feet firmly on the floor
c) High enough allowing eyes to be level with top of monitor
d) Bending the back backwards on a relaxed chair
10) What can be done to deter illegal access to a computer room by unauthorized persons?
a) Burglar proof the room by reinforcing doors and weak access points
b) Welcome strangers to the room
c) Leave the room open when nobody is using it.
d) Switch off the security alarm when leaving the room.
1.7 Practical Hands on Skills
Computer booting (starting – up)
Definition of booting
Process by which a computer loads system files into the main memory. i.e. the operating system
is read from hard disk and loaded to the maim memory.

Computer booting (starting-up) process


- Make sure that all components are properly connected. Turn on the switch at the source of the
power supply. If the computer is connected to the UPS turn on this after switching the Main
supply. Switch on the monitor and the system unit.
- The computer once switched on, you hear the sound of a cooler fan running. After a view
seconds, lines of text start to scroll on the screen as the computer goes through a process of
Power-On Self Test (POST), before it starts in preparation for use. POST is directed by a
special firmware called Basic Input Output System (BIOS) which is held in ROM chip
mounted on the motherboard. The POST checks whether existing storage, all basic
Input/Output devices and system components are working properly. If any of the devices has
a faulty or is missing, the process may stop or halt then an appropriate error message is
displayed on the screen.
- After POST, the computer reads some instructions such as the current time and date from
special memory known as the complementary metal-oxide semiconductor (CMOS). CMOSis
a special memory where instructions for current date and time are contained. CMOS is
powered by a dry cell that resembles that of a digital watch. If the cell is down, the computer
would always require the user to enter the current time and date. Lastly, after the checks the
operating system is read from the hard disk and loaded to the memory (RAM) in a process
called booting. Once the operating system is successfully loaded, a user-interface called
desktop is displayed.
- The entire process that makes the computer ready for use is called Booting up.

Types of booting
i) Cold booting {bootup}
Process of switching on a computer that has been off completely by pressing the power button.

ii) Warm booting


This happens when the computer, originally on, is forced to restart by pressing the restart button
on the system unit or using the restart command on Start menu

Shutting down a computer


Turning a PC on and off several times a day is harmful. If the correct procedure is not followed
then loss of data, damage of programs and computer components may occur. It is therefore
advisable to shutdown the computer only after the sessions for the day.

Procedure for shutting down a computer


1. Save the work done on the computer before you turn it off
2. Close all programs that may be currently running.
3. Remove the floppy disks if you have inserted any.
4. if your computer is running on Microsoft Windows XP or Windows 7
a). click the Start button
b). on the Start menu, click Turn Off Computer or Shut Down
c). On the message box that appears(see figure below), click Turn Off. The computer will
undergo the shut down process.

NB: Pressing the Power key on the keyboard shuts down the computer.
5. Switch off your printer / or any other output devices.

Keyboarding ands mouse skills


Keyboard layout
Activity: Identify keys on the keyboard that could be used for entering
- Alphabetic characters
- Numbers and arithmetic operators

Keys on the keyboard can be categorized into five groups as follows:


1. Alphanumeric (typing) keys
2. Function keys
3. Cursor movement and editing keys
4. Special PC operation keys
5. Numeric keypad keys

1) Alphanumeric keys (typing keys)


Are keys labeled A-Z, numbers arranged in a line 1, 2, …0 respectively and symbols like !, @,
%, ^, >, [, } etc as well as keys like Enter, Caps Lock, Tab, space bar, back space.
 Caps Lock
Lets then user switch between uppercase(CAPITAL Letters) and lowercase (small letters) by
pressing it. When its ON Caps Lock diode lights which is above Numeric keypad keys. Just
press it again to switch to lower case.
 Enter key(return key)
If pressed it forces the text cursor to move to the beginning of the next line.
Definition of cursor: Is a blinking underscore ( _ ) or a vertical beam ( I ) that shows where the
next character to be typed will appear.
Apart from cursor movement, the other function of enter key is to execute a selected command
and in spreadsheets when pressed it moves the cell pointer from one cell to another downwards.

 Space bar
It is the longest key on the keyboard and creates a space between words during typing.

 The backspace key


This key is like an eraser. It has backward arrow marked on it. When pressed it erases characters
to the left of the cursor position (insertion pointer) i.e. from right to left.
 Tab key
Moves the text cursor at set intervals on the same line. Its also used in setting Tab stops during
typing and moving from one cell to another or option to option.

2) Function keys
These keys are located on top of the keyboard. They are labeled F1, F2 …. F12. each of these
keys is used for a special function or job. Example pressing F1 invokes the on-line help, Pressing
F7 starts Spelling and Grammar Checker

3) Cursor movement(navigation) and editing keys


Cursor movement(navigation) keys: are used to move the cursor on the screen. They include:
Home, End, Pageup / Pagedown and Arrow keys.
 Arrow keys
They are four in number and have arrow marked on them showing the four directions. They are
used to;
- Move the cursor where we want it to be e.g. pressing the right or left arrow key moves the
cursor one character to right or left respectively. Pressing the Upward or Downward arrow key
move the cursor one line up or down respectively.
- Move the selected text or object to the desired place on the screen
 Page Up and Page Down
- Page Up moves the cursor up one page incase the document has many pages. Page Down
moves the cursor down one page incase the document has many pages.
 Home and End keys
Home key moves the cursor to the beginning of the current line while End key moves the cursor
to the end of the current line.

Editing keys
Editing keys are used to erase (delete) or insert characters in a document.
These are:
 Insert key
Helps the user to insert or replace a character at the cursor position i.e. switch between Insert and
Typeover (Overwrite) mode.
 Delete (Del) key
Is used to delete the text or any part therefore from the right of the cursor position

4) Special PC Operation keys


These keys are rarely used singly but in combination with other keys. They give special
instructions to the computer. They include SHIFT, CTRL, ALT, and ESC keys.
Ctrl key:
- used for shortcuts in combination with other keys e.g. holding down Ctrl + S activates Save
command,

Shift Key
- used for typing alternative characters for keys that represent more than one character e.g.
Shift + 5 types operator %.
- Changing cases i.e. if the Caps Lock light is not illuminated and you hold down the shift key
and press a letter key, the upper case version of the character will be generated. The opposite
will happen if the Caps Lock light is illuminated.
- If you hold down Shift key as you delete folders/files from hard disk they will bypass recycle
bin folder and get deleted (discarded) completed.

5) Numeric keypad keys


They are located on the rightmost part on the keyboard. They have digits marked on the in rows
from bottom upwards. They have numbers in compact form and helps in rapid entry of numeric
data. Apart from the digits the numeric keypad has some mathematical symbols also marked on
its key e.g /, +,\, -, *.
Note: that the numbers on the numeric keypad can only be used when the Num Lock key is
turned on. The key is situated on the numeric pad.
They can also be used as cursor movement keys and editing keys when Num Lock key is turned
off. Some portable computers lack numeric keypad due to size limitations.
The Num Lock used to switch between numbers, editing and navigation keys on the numeric
keypad.
NB: Caps Lock, Num Lock and Scroll Lock act in ON and OFF states.

Practical Keyboard Skills


The following typing rules should be observed when using keyboard:
I. Sit upright with both feet firmly on the ground maintaining an alert posture
II. Place the material to be typed on your right in a position you can read without strain if
possible using copy holder as shown in diagram below:
III. Rest both hands on the keyboard with fingers resting on the home keys. Home keys are keys
on which fingers rest during typing in readiness to press other keys. Home keys for the
hand are: A, S, D, F with the thumb on the Spacebar. For the right hand are: semicolon (;),
L, K, J with the thumb on spacebar. NB: Some authors state Home keys for right hand
starting with apostrophe i.e. ‘,(;), L, K and Space bar.
IV. Start typing text slowly, making sure you are using all the 10 fingers and you press the key
nearest to the home keys with the closest finger e.g. to press Q, use the small finger on the
left hand while to J, use the index finger on the right hand.

Mouse skills
The mouse got its name from shape and long interface cable which makes it look like the
biological mouse, although this is vanishing because of wireless technology.
The mouse is an input device with sensor buttons and a ball that slides it on a flat surface. When
it is made to slide, it controls a pointer on the screen, which is called a mouse pointer or a cursor.
The movement of a mouse is mirrored by a pointer on the screen. To make a selection the pointer
should be on the item that is to be selected, then manipulate the item by pressing the mouse
button.
A typical mouse has a ball at its bottom that rotates when the mouse is moved.
Mouse come in various shapes, colours and sizes even there are cordless mouse this is does not
have a connection cable. A mouse has two buttons at the top and an optional scroll wheel which
can be used to scroll up the screen in an application.
Rules to observe when using the mouse
1. Place the mouse on a flat smooth surface
2. Gently hold the mouse with your right hand, using the thumb and the two right most
fingers
3. The index finger should rest on the left button while the middle finger rests on the right
button. See diagram below.

Mouse terminologies and meaning

Terminology Meaning
Point Move the mouse until the mouse pointer on the screen points on the
item
Click Position tip of the mouse pointer over specified element, then press
and release the left mouse button once. Selects an object/icons, files in
a list and dialog box options.
Double clicking Pressing the left mouse button twice in quick/rapid succession.
Expands icons, starts applications, opens a file and chooses items from
a list .
Right clicking Pressing the right hand side mouse button once. It displays a shortcut
menu or context sensitive menu, which apply to the right clicked text /
item.
Drag and Drop Press and hold down the mouse button as the mouse is moved. Release
once the destination is reached. Through drag and drop, user drags an
item from one location on the screen to another, move windows, icons
and resizes windows.

Selecting items using the mouse


Item Using the mouse
Single item Click
Multiple sequential items Click first item, hold SHIFT key and click the last
item.
Multiple non-sequential items Hold CTRL and click.
The figure below emphasizes on mouse terminologies and actions:

Review questions 1.4


1) What is booting?
2) Differentiate between cold booting and warm booting.
3) What is the difference between function keys and special PC keys?
4) Explain the various categories of keys found on a standard keyboard.
5) Define the following terms:
a) Double clicking
b) Clicking
c) Drag and drop
d) Right click
e) Mouse pointer
6) What makes a mouse move a pointer on the screen?
7) Explain the correct procedure for shutting down of the computers in the computer laboratory.

Revision questions
1. Explain why smoke and dust particles are harmful to a computer
2. Explain the emerging trends in a microcomputer technology in relation to size.
3. describe the ideal environment for a computer to work properly
4. Explain the term system unit and name some of the components found in the system unit
5. What is booting? Explain what happens in the computer during the booting process.
6. State on reason why a computer needs to be connected to a stable power source.
7. Give two examples of special purpose computers
8. Why would it not be good to install water based fire extinguishers in the computer room?
9. Explain the following terms: clicking the mouse, right clicking the mouse, double clicking
the mouse
10. What precaution would you take in the computer room in case:
a) The humidity falls below normal for prolonged periods due to weather change.
b) Users complain of backaches after long periods of using the computer.
11. Classify the following keyboard characters
a) A, B, C, …Z
b) 0,1,2,…9
c) F1, F2, …F12
d) Del, Insert
e) Home, End, Page UP, arrow key
f) Ctrl, shift, Alt

You might also like