Computer Chapter Notes Belong To 12th Grades
Computer Chapter Notes Belong To 12th Grades
1) Components of computer
a. Hardware: Physical components of computer is called hardware. Or hardware means any item of
an ICT system that you can touch. Divided in two following parts:
a. Input: Are that hardware that are used for the entry either instructions or data into the
computer for processing.
Keyboard: is used to enter data such as texts, numbers, symbols and so on.
Pointing devices: Are needed to make selections from a GUI (Graphical User
Interface) in order to move the pointer onto a button/Icon/hyperlinks and etc.
Remote control: Are input devices the issue instructions to control devices such as
TVs, Video players/Recorders and etc.
Joystick: Used mainly for playing computer games.
Touch Screen: Are those Input/output devices used to display information.
Magnetic Strip Readers: Read data stored in the magnetic stripes on plastic cards
such as loyalty cards. The stripe contains data such as account numbers and expiry
date.
Chip Reader and PIN pads: Chip readers are the devices into which you place a
credit/debit card to read the data which is encrypted in the chip on the card.
Scanner: Can be used to scan in photographs and other images on paper to put into
documents or web pages.
Digital Camera: Store the digital photographs on a memory card and display the
picture on a screen.
Microphones: Are input devices that allow sound signals to be converted into data.
Graphics tablet: is a flat board (or tablet) which you use to draw or write on using a
pen-like device called a stylus.
Optical Mark Reader (OMR): use paper-based forms or cards with marks on them
which are read automatically by the device. OMR readers can read marked sheets
at typical speeds of 3000 sheets per hour.
Optical Character Reader (OCR): An optical character reader works by scanning an
image or the text and then using special recognize each individual character. Once
this is done the text can be used with software such as word-processor, desktop
publishing or presentation software.
Barcode Reader: Bar codes are a series of light and dark bars of differing widths.
They are used to input the number using a bar code reader, which appears below
the barcode which is then used to look up the item details in a database.
Video Camera: Most modern video cameras are digital, which means the files
produced are digital and can therefore be transferred to a computer and saved or
edited and then saved. Like any digital file, the file may be added to presentations,
web sites, etc. you can also add the video to sites such as YouTube so that you can
share the video with others.
Web Cam: Are Digital cameras that can take both still and video images which can
then be transferred to other computers or saved. They are used for conducting
conversations over the internet where you can see the person you are taking to.
Web cams are no included with many computers and are easily added to
computers not having one.
Light Pen: Are ideal where space is limited and are used as an alternative input
device to a mouse or graphics tablet. Light pens are used to producing freehand
drawing directly on a screen or editing existing drawings. They can also be used to
point to and select items on the screen in a similar way to a touch screen but with
greater accuracy
b. Output: Are data entered into the computer has been processed, the resulting information
needs to be output. There are many output devices, with a screen (Monitor) and a printer
being the most popular.
Monitors (Screens): Monitors come in lots of different sizes and they are useful for
displaying information that is not needed as hard copy (ex: printouts on paper)
CRT monitors: Stands for Cathode Ray Tube and these monitors are the older
fatter monitors that you still see being used. They take up more space than the
more modern thinner TFT screens.
TFT (Thin Film Transistor) monitors: These are the Thin flat panel screen you see
and they are the more modern type o monitor. They are used with newer desktop
computers and laptops. The screen is made up of thousands of tiny pixels. Each
pixel has three transistors – Red, Green and Blue (RGB) the colour is generated by
the intensity of each.
Printers: Are used to provide users with output in hard copy form. This means the
output is printed on paper.
a. Laser Printers: Are the type of printer mainly used by businesses and
organizations mainly because of their high speed. They are usually chosen
as printers used for networks.
b. Inkjet Printers: are popular with home users because they are relatively
cheap to buy. They are more expensive to run. Because of the high cost of
the ink cartridges. they work by spraying ink onto the paper and can
produce very good colour or black and white printouts.
c. Dot Matrix Printers: Are used in offices and factories where multi-part
printouts are needed and noise is not an issue. For example, one copy of an
invoice could be kept by the sales office and one copy could be sent to the
customer and the other given to the factory.
d. Graph Plotter: Are ideal for printing designs, plans, and maps. They
produce very precise scale drawings. They are ideal for printing out designs
that have been produced using CAD (computer-aided design) software.
They are also ideal for printing out large printouts, for example on A0-sezed
paper.
Speakers: any application which requires sound will need speakers or ear phones to
output the sound. Application which use sound include multimedia presentations
and web sites. Many online encyclopedias make use of sound with explanations,
famous speeches, music, etc.
Output Device as control devices in control applications: computers can be used
for control in many devices, and the computer sends control signals which turn
control devices on or off. Control devices can be motors, buzzers, heaters, lamps
and etc.
a. Actuators: Any device that responds to signals from a computer used in a
control situation that produces movement. For example, a switch or valve
that needs to be opened or closed in an example of an actuator. An
actuator would be needed to allow a computer to run a motor or light on
or off.
b. Motors: Computers can issue control signals to turn electric motors on or
off. Some special motors, called stepper motors, only turn through a
certain angle depending on the signals they receive from the computer.
c. Buzzers: Often act as warning signs or signs to say a control process has
been completed. For example, when a washing machine or drier has
finished the control system issues a buzz/beep to inform the householder.
Buzzer can also be found in automatic cookers and microwaves.
d. Heater: can be switched on/off according to control signals issued by a
computer. The range of control devices with heater is wide and here are
some of them: automatic washing machines, automatic cookers, center
heating controllers, and computer-controlled greenhouse.
e. Lights/Lamps: Light or lamps can be controlled using a control system that
has light sensor to sense the light level. In a computer-controlled
greenhouse. Optimum lighting conditions are maintained by switching on
light. When the natural light level fall below a certain value. Security lights
and outside lighting can be controlled to come on when it goes dark and go
of when it gets depending on light levels.
b. Software: Is a set of instructions, data or programs used to operate computers and execute specific
task.
a. System Software: Any software which is used to operate a digital device is called system
software or operating system.
b. Application Software: Is a type of computer program that performs a specific personal,
educational, and business function. Each application is designed to assist end-users in
accomplishing a variety of task, which may be related to productively, creatively or
communications.
c. Development Software: They are softwares which we are using to make application
softwares.
c. Firmware: Provides basic machine instructions that allow the hardware to function and
communicate with other software running on a device.
2) Central Processing Unit (CPU) and how it works: The central processing unit (CPU), often called the
processor, is the brain of the computer and it consist of millions of tiny circuits on a silicon chip. The central
processing unit does a number of tasks: it controls the step-by-step running of the computer system; it does
all the calculations and performs all the logical operations and deals with the storage of data and programs
in memory.
3) Computer internal memories: There are two types of memory called RAM and ROM. Both these two types
of memory are stored on chips and are available immediately to the central processing unit (CPU). Memory
(ex: ROM and RAM) called primary storage as well.
a. ROM (Read Only Memory): Is fast permeant memory used for holding instructions needed to start
up the computer. This finds out which devices are connected to the computer when it is first
switched on and also loads the operating system from Hard Desk.
b. RAM (Random Access Memory): Is a fast-temporary memory where programs and data are stored
* only when the power is supplied, provides data to central processing unit (CPU) for processing.
is called volatile memory because the contents disappear when the power is turned off.
* holds the software currently use by the user.
4) Operating System: Programs that control the hardware directly by giving the step-by-step instructions that
tell the computer hardware what to do. and Operating system performs that following tasks.
a. Types of operating System: There many types of O/S which is used in computers. (like: Windows,
Linux, Unix, Mac etc.)
b. Types of User Interface used with operating system (CLI, GUI): and operating system needs a way
of interacting with the user. The way the operating system communicates with a user is called
interface and there are two common interfaces in use and there are:
CLI (Command Line Interface): Here you have to type in a series of commands. there commands
have to be precisely worded and it can be hard to remember how to do this, so this type of
interface is harder to use. (ex: CMD)
GUI (Graphical User Interface): Are very popular because they are easy to use. Instead of typing in
command, you can enter them by pointing at and clicking objects on the screen. Microsoft windows
uses GUI. (ex: window, Menu, icons, pointers and etc.)
5) Types of Computers according to size
a. Super computers: Supercomputers are the most powerful and the fastest computers. They are used
for problems requiring complex calculations. Use for weather predications, weapon design.
Many Hollywood movies use it for animation purpose.
b. Mainframe computers: Mainframe computers are used in large organizations where many users
need access to shared data and programs.
Mainframes are also used as e-commerce servers, handling transactions over the Internet.
c. Mini computers: Minicomputers usually used as network servers.
d. Workstation computers: It is more expensive and powerful desktop computer.
* It is used for calculations and graphics work.
* A workstation can tackle tasks that require a lot of processing speed
* It is mostly used by engineers and graphic Designers
e. Micro/Personal Computers: Microcomputers are more commonly known as personal computers
used at homes, educations, offices and etc. for common works in our daily life.
6) Storage Devices and Media: Data needs a material on which to be stored, which is called the storage
media. For example, the storage media could be magnetic or optical or solid state in the case of memory
card. The storage device is the piece or equipment that is used to record the data onto the media or read it
from the media.
a. Primary Storage devices:
b. Secondary Storage devices
c. Ways of accessing Data: there are two ways in which data is read from storage devices called:
a. Serial/ Sequential Access: data is accessed from the storage media by starting at the
beginning of the media until the required data is found. It is the type of access used with
magnetic tape and it is a very slow form of access when looking for particular data on a
tape.
b. Direct/ Random Access: Data is accessed immediately from the storage media. This is the
method used with storage media such as magnetic hard disks and optical media such as CD
and DVD. It is used when fast access to the data is important such as online booking
systems, systems for point-of-sale terminals in shops, etc.
d. Fixed Hard disks: consists of a series of disks coated with a magnetic material and a series of
read/write heads which record data onto the surface or read it off the surface. Fixed hard disks are
used to store operating systems, application software (ex: the software you use to complete tasks
such as word-processing software), and any files of data needed by the user. All of these require
that the data can be both accessed and stored onto the media quickly.
e. Portable hard disks: it is possible to buy additional hard disks. These hard drives are called portable
hard disks and may be removed each might and stored safely.
f. Magnetic tapes: Store data on a plastic tape coated with a magnetic layer.
g. Optical Drives: Are circular disks on which data is stored as series of bumps. The ways the bumps
reflect laser beam light is used to read the data of the disk.
h. CD ROM & CD R, CD RW: CD ROM Used mainly for the distribution of software and the distribution
of music and other small files.
* CD R allows data to be stored on a CD but read them, we cannot remove and change the data
inside the CD. The maximum size of CDs is 700MB.
* CD RW: allows data to be stored on a CD we can read and remove the data inside the CD.
i. DVD ROM & DVD R, DVD RW: Is used for the distribution of movies where you can only read the
data off the disk. A DBD Rom drives can also be used for reading data off a CD. DVD is mainly used
for the distribution of films and multimedia encyclopedias.
* DVD RW drive can be sed to write to as well as read data from a DVD. DVD RW are sometimes
called DVD burners because they are able to be written to and not just read from. like CD RW, they
are ideal for storing data that needs regularly updating.
* Older DVD drive can store data up to 4.7 GB.
* latest DVD drives can store data up to 8.5 GB
j. Blu-ray: Is a new optical disk that has a much higher storage capacity than a DVD blue-ray disks
have capacities if 25 GB, 50 GB and 100 GB.
k. Solid State Backing Storages: Is the smallest form of memory and is used as removable storage.
Because there are no moving parts and no removable media to damage. This type of storage is very
robust. The data stored on solid state backing storage is rewritable and does not need electricity to
keep the data.
solid state backing storage includes the following:
* Memory sticks
* Flash memory cards
l. Computer Network: two or more computers that are linked together so that they are able to share
recourses or data. the resources could be a printer, scanner, software or even a connection to the
internet. You can also share data using a network.
a. The two types of network (LAN & WAN): LAN stand for Local Area Network stablishing
network within one site or building. WAN stands for Wide Area Network is much bigger
than a LAN and spread over different sites.
b. Network Topologies: the devices in a network may be arranged in different ways. Each way
is called a topology. It is important to note that in a wired network the topology would
show how the wires are connected.
c. The Internet: is huge group of networks joined together. Each of these networks consists of
lots of smaller networks. When you connected to the internet your computer becomes part
of the largest network in the world/
d. The Intranet: is a network that is used inside an organization and make use of web pages.
Browsers and other technology just like the internet. School and collage use intranets and
they can hold all sorts of information from teaching resources.
7) Access Database:
a. Table Object
b. Query Object
c. Form Object
d. Report Design
8) Types of Databases
a. Manual Database: using notebooks for storing information is called manual database which is used
commonly in human life.
b. Computerized Database: Whenever with the help of computer we can choose a program to store
the data inside is called computerized database.
a. Flat file Database: Databases are limited use and are only suitable for very simple database.
Flat files only contain on table of data a record is simply that complete information about a
product, employee, students and etc.
b. Relational Database: In a relational database, we do not store all the data in a single flat or
table, instead the data is stored in several table with links between the tables to enable the
data in the separate tables to be combined together if needed.
c. Types of relationships in Database
a. One to one
b. One to many
c. Many to many
d. Primary Key: the key which we set to a field of table to prevent inserting duplicate data.
e. Foreign Key: in a table relationship the primary key which linked to the other table, the primary
key from the main table in sub-table is called foreign key.
9) The Effects of using ICT:
10) Negative Aspects in using ICT: there is no doubt that the use of ICT has brought many benefits to society.
Unfortunately, the use of ICT has also brought a number of problems.
a. Software Copyright theft: people and organization spend time and money developing new
software so they have a right to have their work protected from being copied and used by others
without their permission. This is called software copyright.
b. Computer Viruses: Virus pose a major threat to ICT system. A virus is a program that replicates (ex:
copies) itself automatically and can cause harm by copying files, deleting files or corrupting files.
Once a computer or media has a virus copied onto it, it is said to be infected. Most viruses are
designed to do something apart from copying themselves.
c. Preventing A Virus attack: To prevent a virus attack you should: install anti-virus softwares, not
open file attachments to email unless you know who they are from, not allow anyone to portable
drives or memory sticks to your computer unless they are scanned for viruses first and not
download games and other software from a site on the internet unless it is a trusted site.
d. Hacking and Hackers: hacking is the process of accessing a computer system without permission.
Hackers often access a computer system using the internet. In most cases the hacker will try to
guess the user's password or obtain the password another way.
e. Protecting against hackers: use a firewall _ a firewall is hardware, software or both that will look at
the data being sent or being received by your computer to enter either allow it through or block it.
f. Protecting access by using User-IDs
g. Identifying the user to the system User-IDs
h. Preventing unauthorized access to the system: the use of passwords
i. Encryptions
j. Advice about password
11) The effects of ICT on patterns of employment
a. Areas of work where there is increased employment
b. Areas of work where ICT has increased employment
16) The capabilities and limitations of ICT: ICT systems have many capabilities which are summarized here:
a. Speed: Computers are extremely fast at performing calculations and this is important where a huge
amount of data is used to produce information. An example of this would be the use of millions of
pieces of data from satellites and weather stations used to produce accurate weather forecasts.
b. Accuracy: Computers when provided with accurate data, can produce accurate answer provided
they have been correctly programmed.
c. Processing power: Many processors are able to do several tasks at the same time.
d. Ability to network computers: A whole new range of services computer are linked together.
e. Huge amount of data storage: You can store huge databases of information in the form of text,
images, music video, etc.
f. Ability to perform searches: If a huge amount of information is stored then there needs to be a
way of quickly accessing this information. Software such as web browser software or database
software can find stored information quickly.
i. Bandwidth: This represents the speed with which data can be transferred over the internet.
Bandwidth limits the speed of access to the internet.
j. Battery life: Many portable devices are limited by their battery life. Ideally netbooks, laptops, PDAs,
etc., need a long battery life between charging.
k. Weight: Many portable devices are heavy, which limits their use. The use of flexible screens and the
use of the internet to store programs and data will mean portable devices can be lighter.
l. User interfaces: Users need to interact with devices such as computers and PDAs. Current methods
involve using keyboards, mice, touch screens, etc. User interfaces need to be made easier and
operate in a similar way to the way humans interact with each other.
17) Internet developments: Internet is constantly evolving and web refer to developments to the internet
which include the following:
a. Blogs: Are online diaries of events or journals. Blogs can be about anything groups, singers, and
celebrities have blogs which let people know about their life and what they are doing. Blogs are also
used by politicians, and for collecting public opinion about certain topics.
b. Wikis: A wikis is a web page that can be viewed and modified by anyone when has a web browser.
This means if you have web browser software then you are able to change the content of a web
page. The problem with this is that you can alter the web page to post offensive messages, etc. you
will have seen the online encyclopedia Wikipedia.
c. Digital media uploading websites: There websites allow anyone to upload their videos, digital
images, etc., to a website which allows others to access the media.
d. Social networking websites: There are virtual communication of people who communicate about a
particular subject or interest or just make friends with each other.
18) Issues with information found on the internet: Just because information is on the interned does not make
it true. Any information you get off the internet needs to be treated with cautions.
a. Unreliability of information on the internet: Many people think that because information is
published on the internet it must be true. This is for from the truth, as there are many examples of
sites that contain material which is completely untrue, some sites deliberately set out to misinform
or deceive.
b. Undesirability of information on the internet: It is impossible to censor what is on the internet.
This is because much of the information on the internet comes from other countries.
Unfortunately, the internet contains pornography, violent videos, sites that promote racial hatred,
and so on. Schools and parents are able to use parental controls that restrict the sites and
information that can be viewed on the internet.
19) The security of data transfer: Once networks or individual computers are connected to the internet there is
a chance that others may try to hack into the system usually in order to commit fraud. In this part you will
be looking at some of the issues concerned with the security of data transfer.
a. Phishing: Is fraudulently trying to get people to reveal usernames, passwords, credit card details,
account numbers, etc. Emails are sent to you pretending to be from a bank, building society, credit
card company, etc. The usually say that there has been a problem with your account and ask you to
update (reveal) information such as passwords, account details, etc. Under no circumstances should
you reveal this information. If you do then these details will be used to commit fraud.
b. Pharming: Is where malicious programming code is stored on a computer. Any users who try to
access a website which has been stored on the computer will be re-directed automatically by the
malicious code to a bogus website and not the website they wanted. The website they are directed
to likes almost the same as your genuine website. In many cases the fake website is used to obtain
passwords or banking details so that these can be used fraudulently.
c. Spam: Is email that is sent automatically to multiple recipients. These emails are unasked for and in
the main about things you are not interested in. Spam is also called junk email and, in most
countries, the sending of spam is not illegal despite organizations websiting huge amounts of time
getting rid of it.
20) The potential health hazards when using computers: At there are potential health hazards when using
computers and other ICT equipment, you need to aware of what the hazards are, you also need to be aware
of the symptoms of the medical conditions they can cause.
21) Repetitive strain injury (RSI):
The following can cause RSI:
1.Typing at a computer for a long time
2.Using a mouse for long periods
3.Not adopting correct posture for use of mouse and keyboard.
4.Not having properly arranged equipment (e.g., keyboard, mouse, screen, etc.).
To help prevent RSI:
1.Take regular breaks
2.Use and ergonomic keyboard / mouse
3.Make sure there is enough space to work comfortably
4.Use a document holder
5.Use wrist rest
6.Keep your wrists straight when keying in.
7.Position the mouse so that it can be used keeping the wrist straight
8.Learn how to type properly – two finger typing has been found to be much worse for RSI
9.Eye strain
10. Headaches:
11. Back and neck ache: