Computer Notes Form 1 4 Booklet
Computer Notes Form 1 4 Booklet
Section I
Objectives
Since the earliest days of civilization man has been preoccupied with
mathematics and logic, and the attempts to create a machine to carry out
calculations on numbers – additions, subtractions, multiplications, divi-
sions – began in the days of the great thinkers of Asia, Greece and Egypt.
The abacus and later mechanical implements were developed, but until
the twentieth century no machine has been invented which could “store”
a sequence of calculations and repeat them as required. Every calculation
needed to be carried out afresh.
It was a Victoria gentleman called Babbage who invented, in the late nine-
teenth century, the first “programmable” computer. That was a machine
built of thousands of intricate geared cylinders interlocked in incredibly
complex ways which could carry out instructions under the control of a
“program” contained in the holes in punched cards – an idea inspired by
the jacquard loom, a card-controlled loom (weaving machine) which wove
extremely complex patterns.
The portable computer, which fits into a briefcase or on a lap, with its own
screen, keyboard and mini-printer, is available in a variety of forms. Many
micro-computers use a “mouse” – a hand-held remote control box, to
move an arrow around the screen to instruct the computers are a reality,
with only the cost of these newer features limiting their wider popularity.
Modern microcomputers can produce pictures, graphs, charts, play tunes,
as well as undertake many necessary administrative and clerical func-
tions.
Whole areas of uses for computers have yet to be opened up, and the
manager who thinks ahead and who wishes to harness the latest contribu-
tions of technology for the better service of his enterprise, will do well to
keep in touch with the rapid developments of the computer world.
This following summary will give you an insight into many ways in which
the use of computers can improve the efficiency of management in the
Armed Forces, and of many businesses, whatever their sizes.
Objectives
Definition of a Computer
Classification of Computers
Types of Computers
Parts of a Computer System
How a Computer System Works
Computer Programming Languages
All electronic computers are basically the same in their functional design.
The main essential differences are in four categories:
Cost
This refers to the initial and maintenance cost which is deter-
mined by the technology involved and the accompanying facili-
ties, e.g. the power of processing.
Functional performance
This refers to the capability of the CPU to handle input data and
instructions to generate information to the recipients.
physical size
This is influenced by the computer generation.
Storage facility
The storage facility is influenced by the type of media that the
computer supports and/or information to be stored.
2.2 Types of Computers
Mainframe computers
Mainframes are large computers with almost unlimited power
allowing many users access to them simultaneously. They
have large storage capacity and can perform calculations at
very high speeds.
Mini-computers
As technology improved, it was possible to design smaller com-
puters especially after the invention of integrated circuits. Mini-
computers were designed for use in a normal office environ-
ment, providing extensive processing power, adequate for
medium sized organizations.
Micro-computers
Microcomputers (commonly called personal computers, PCs)
are the smallest computers and were intended for use in an of-
fice, fitting on a desktop. Their design is based on large-scale
circuit integration that confines several physical components to
a small element. Their internal memory is smaller than the
mini and mainframe computers and they support limited back-
ing storage media. They are relatively cheaper and are the
most commonly used computers in offices today.
Computer Hardware.
Computer Software.
Input Devices
Output devices
Backing Storage
Input Devices:
The Mouse may have got its name from the fact that it looks like
a mouse especially with the long tail coming from one end. This
tail will be attached to your computer, or if the mouse is a cord-
less one, it runs on a battery. A mouse’s primary purpose is to al-
low you to choose what you would like to happen on your screen
without typing. All you have to do with a mouse is point and click
on your choice of instructions.
Keyboard
Mouse
Monitor is the device that looks like a television set. It where text
and images are displayed on a screen. The monitor has controls
to adjust the quality and contrast of pictures displayed on the
screen.
The last three (*) provide high quality colour images and are favourites in
the graphic industry. While all printers will produce images, not all printers
are compatible with all computers and software. Remember to choose a
printer according to your printing needs.
Hard disk which is fixed into the computer and consists of one or
more large disks permanently mounted on a horizontal spindle ro-
tating at high speed, which can provide very high volume capacity.
They are frequently used when a large amount of data needs to be
stored and accessed rapidly.
Computer Software.
Software cannot be seen even though it comes packaged in boxes that
you can see. Software is a set of electronic instructions that tell a com-
puter how to do the job. It is actually the programs that run the computer.
Some people have described it as the language that the computer uses to
understand what you want it to do.
There are three main types of software, and they are used for different
purposes:
Tailor-made programs
Application packages
Standalone Operating systems
» Machine language
» Low-level language
» High-level language
Machine language
All instructions to the computer are given in strings of 1’s and 0’s, using
the binary number system known as “machine code”. The reason for us-
ing the binary number system is that, as an electronic machine, the com-
puter can respond only to two conditions whether transmitted by valve,
transistor or integrated circuit.
Low-level languages are written in symbolic form, with one machine in-
struction corresponding to one written instruction. Instead of using ma-
chine code operation numbers, the programmer is able to use easily
learnt and understood operation mnemonics (i.e. ADD, SUB, MULT, etc.)
and symbolic operands (names allocated by the programmer and used to
refer to particular data areas in the program) to replace numeric oper-
ands.
High-level languages
Scenario
A retail stationery business employs a clerical assistant to complete
sales invoices before sending them to customers. Each completed invoice
is to contain the name and address of the relevant customer, plus the
quantity, description and catalogue number of each item of goods pur-
chased on credit by that particular customer. The assistant’s function is to
look up the unit price of each item in the relevant price-list, and then to
calculate the total cost by multiplying the quantity purchased by the unit
price. He has then to write the total cost for each entry on the invoice, and
must finally add up the total invoice charge and write that in the appropri -
ate place on the invoice.
Explanation
Reading the item catalogue number and quantity stated on the in-
voice, i.e. receiving new information. (input)
Looking up the item unit price in the price-list, i.e. referring to infor-
mation already recorded or stored. (main storage)
Calculating the total entry cost. (arithmetic)
Writing the total cost on the invoice. (output)
If there are no more entries, calculating and writing the total invoice
charge; if there are more, repeating the sequence again. (logic)
A SIMPLE PROCEDURE
PRICE LIST
STORAGE
INCOMPLETE COMPLETED
INVOICES INVOICES
PROCESSING OUTPUT
INPUT
From input devices data goes into main memory (main storage) ready
to be processed and the results of processing flow from main storage
to output devices.
Data flows from main storage to the ALU. The ALU performs operations
on the data thus generating results, which flow back to main storage.
Commands flow from the control unit to other elements of the com-
puter system and are distinct from data flow.
NB: The ALU and the Control Unit form the processor.
Section III
Objectives
In this section you will learn:
There are many good reasons to justify critical appraisal of security issues
particularly in a highly computerized organization. The use of computers
presents immense benefits to all organizations, and more specifically to
information-based organizations.
Vulnerabilities
Deliberate sabotage
Fire and other hazards
Through equipment failure
Operator negligence
Unauthorized access to computer systems.
Password exposure
Insufficient security
Virus and malicious codes
Unauthorized access to computer network
Embarrassment to self
Embarrassment to organization
Some thing that police cannot help
Fraud warnings
Fraud alerts
The protective features that computer security shares with other kinds of
security consist of administrative and organizational measures, provisions
to ensure the loyalty and reliability of personnel and traditional physical
and environmental safeguards.