Introduction To Computers With Cover
Introduction To Computers With Cover
OUbs022113, OUbs009126
INTRODUCTION TO COMPUTERS
Roger Powley, CD PhD
Wilhelmina Louw
Glenda Gaye
Introduction to Computers 1
Course Name: Introduction to Computers
Course Author:
Roger Powley, CD PhD – Commonwealth of Learning Consultant
Wilhelmina Louw – Namibian College of Open Learning
Glenda Gaye – University of the West Indies
Commonwealth of Learning
Edition 1.0
____________________
http://creativecommons.org/licenses/by‐sa/3.0
Commonwealth of Learning
1055 West Hastings Street, Suite 1200
Vancouver, British Columbia
Canada V6E 2E9
Telephone: +1 604 775 8200
Fax: +1 604 775 8210
Web: www.col.org
E‐mail: [email protected]
Introduction to Computers 2
ACKNOWLEDGEMENTS
Introduction to Computers 3
TABLE OF CONTENTS
ACKNOWLEDGEMENTS ________________________________________________________ 3
TABLE OF CONTENTS __________________________________________________________ 4
COURSE OVERVIEW ___________________________________________________________ 9
Introduction _____________________________________________________________________________ 9
Course Goals _____________________________________________________________________________ 9
Description ______________________________________________________________________________ 9
Required Readings ________________________________________________________________________ 9
Major Assignment _________________________________________________________________________ 9
Assessment _____________________________________________________________________________ 10
Course Schedule _________________________________________________________________________ 10
Hardware and Software ___________________________________________________________________ 10
Introduction to Computers 4
Education and Technology _________________________________________________________________ 29
Business and Technology __________________________________________________________________ 30
Social Interactions and Relationships _________________________________________________________ 31
Man‐Machine Connection _________________________________________________________________ 32
Topic Summary __________________________________________________________________________ 33
Introduction to Computers 5
Operating Systems _______________________________________________________________________ 71
Types of Operating Systems ________________________________________________________________ 73
Functions OF AN Operating System __________________________________________________________ 74
User Interface ___________________________________________________________________________ 76
Utility Programs _________________________________________________________________________ 78
Language Translators _____________________________________________________________________ 79
Topic Summary __________________________________________________________________________ 80
Introduction to Computers 6
The Keyboard __________________________________________________________________________ 102
Pointing Devices ________________________________________________________________________ 103
Topic Summary _________________________________________________________________________ 106
Introduction to Computers 7
Objectives _____________________________________________________________________________ 130
Communications ________________________________________________________________________ 130
Transaction Processing ___________________________________________________________________ 131
Information Retrieval ____________________________________________________________________ 131
Electronic Mail and Electronic Messaging ____________________________________________________ 132
Efficient and Effective Communication ______________________________________________________ 132
Topic Summary _________________________________________________________________________ 133
Introduction to Computers 8
COURSE OVERVIEW
Course Title: Certificate 03 ‐ Introduction to Computers.
INTRODUCTION
The Introduction to Computers course will prepare future entrepreneurs to operate
computer hardware and software applications. Participants will gain an understanding of
computer hardware, operating systems, office applications and networks. It will ensure the
entrepreneur is able to apply the concepts of networks, the Internet, World Wide Web, and
mobile technologies and how they could potentially support a successful business
operation.
COURSE GOALS
Upon completion of the Introduction to Computers course you will be able to:
DESCRIPTION
This course is the first of two course discussing information technology and its use in the
creation and growth of a business. The second course “Business Information Systems”
builds upon this course and provides the details of how to use information systems to
ensure business success.
REQUIRED READINGS
Recommended readings are provided at the end of each unit. Most readings will require
access to the Internet to review the online articles and web sites.
MAJOR ASSIGNMENT
The major assignment for this course is to produce a detailed analysis of the hardware,
software and network requirements for a small business and its growth over three to five
years. The assignment will require the participants to produce the following:
1. Three to five page report using a word processor of your choice (e.g. MS Word,
Open Office Word, etc.).
Introduction to Computers 9
2. Presentation of five to ten slides that describes the technology solutions reflected
in the written report. The slides must incorporate graphics. The participant may
select the presentation software to be used to produce the project presentation.
3. The third part of the assignment is to create a spreadsheet that illustrates to cost of
the equipment and the annual operation of the technology support required by the
business. You should include the creation of a web site as part of the marketing
solution. Participants may select the spreadsheet software to be used to produce
the budget.
4. All three files should be emailed to your instructor for feedback and review.
ASSESSMENT
Assessment and grading will be established based on the instructor’s additional
requirements and the institutional policies guiding course assessment.
COURSE SCHEDULE
The instructor will provide a proposed course schedule based on the length of the semester
and any additional assignments or activities that he or she requires of the course
participants.
Software Requirements: Each student will be required to have access to Microsoft Office
or Open Office that includes a word professor, presentation software, spreadsheets and
data base program. Open Office is an open source equivalent of Microsoft Office and can
be downloaded free from the Internet.
Introduction to Computers 10
STUDENT SUPPORT
Note: This section should be customized based on the services provided by each
institution’s capabilities.
ACADEMIC SUPPORT
<Insert the following information if relevant>
TECHNICAL SUPPORT
<If the students must access content online or use email to submit assignments, then a
technical support section is required. You need to include how to complete basic tasks and
a phone number that they can call if they are having difficulty getting online>.
Introduction to Computers 11
UNIT 1: IMPACT AND HISTORY OF COMPUTERS
INTRODUCTION
Technology influences different areas of society and business, whether it is a particular age
group or gender, or the entire population. We may be resistant to its influences, whether in
the long or short term, until we are more aware on how this change impacts our lives,
families, work, entertainment, or daily living.
This unit explains terms associated with computer technology, explains its influence, and
contributions to various aspects of work and play. Then it briefly reviews the development
of the technology and explains the different categories of computer systems.
UNIT OBJECTIVES
At the end of this unit, you should be able to:
Introduction to Computers 12
TOPIC 1 – COMPUTER TECHNOLOGY – AN INTRODUCTION
INTRODUCTION
Computer Technology is now part of our everyday life, and almost every task we encounter
involves the use of computer technology. This Topic will first help you to understand
computer technology and its impact in society.
OBJECTIVES
After studying this topic, you will be able to:
4. Discuss the extent to which computer technology has increased access and
flexibility.
5. Discuss the extent to which computer technology has changed the communication
landscape.
You may be surprised to learn that people were the first computers! The term computer
means someone who computes or performs calculations. Centuries ago, people were
called computers. They were usually women who worked out mathematical problems such
as tidal charts or navigational tables, and so ‘Computer’ was actually a job title.
However, as you can imagine, performing mathematical tasks every day, every week, every
month would eventually cause boredom which would cause errors in the calculations.
Therefore, the computer became a machine which automated these repetitive tasks.
Introduction to Computers 13
display the results (called OUTPUT).
Answer: 2008.79
The role of computers and computer technology is the ability to manipulate data into
information or commands. Data can be in many forms, such as text, pictures or sound and
can also be retrieved from the environment. An air conditioner which monitors the
temperature in a room to keep it cool at a specific temperature, or turning on lights outside
a building at dusk are both examples of a computer controlled environment that requires
input to produce a specific result or output.
Activity 1.1 ‐ Consider why it is essential that data and information must have the
following qualities:
Relevant
Complete
Accurate
Clear
Reliable
Concise
Timely
Introduction to Computers 14
Introduction to Computers 15
COMPUTER TECHNOLOGY IS EVERYWHERE
Information has become very important as a result of the computer technology which
provides it. Computer driven technology is an integral part of our daily routines, however
we tend not be aware of its presence. Many of our daily tasks are automated; such as our
answering machines, televisions, cable boxes, vehicles that use this technology. Similarly,
as a cashier prints out our receipt for a purchased item or the mail we receive that was
stamped by a machine, computer technology supported the creation of the receipt or the
delivery of our mail automatically.
Activity 1.2 ‐ Describe how computer technology is integrated in the following sectors:
Agriculture
Education
GENERATING INFORMATION
Remember that computers store the results or output of processing the data. Well
computer technology has enabled us to access information at our "finger tips"; from many
places, in many places, at any time, and in many different forms whether printed or stored.
Hence as more information is requested, more information is generated and more data
stored. It seems like a never ending cycle of information growing exponentially!
Activity 1.3 – Think of some specific examples, that you could use to explain what is
meant by the phrase:
Introduction to Computers 16
Unfortunately, there is a drawback to generating information on every transaction.
Imagine how one minor error can mushroom into major problems because of your
computer technology, and this can have a negative impact on businesses and customers
alike. In addition, most people who are not in the computer field may believe that whatever
the computer produces is correct. Consider the consequences of transposing (switching)
two digits in a bank account number or entering the wrong data in payroll system. This can
cause embarrassment to the persons involved if deposits are made to the wrong account or
employees do not receive the correct pay. Even so, it is also more difficult to locate
someone who is willing to accept responsibility for an error made by a computerized
system. This lack of accountability for the error would be better addressed if the software
glitch was corrected as soon as possible!
We should also realize that since information is constantly generated, then it should be
possible to store it over a long period of time. It is reasonable to assume therefore that
information cannot be entirely destroyed or lost.
Activity 1.4 ‐ Describe two procedures or methods that should be implemented to ensure
that information is not lost or destroyed.
ACCESSING INFORMATION
Much of the computer information that is generated and held in a database is available on‐
line. For example, customers can use the telephone or Internet to access current bank
balances and perform transactions. Access to your banking information can be made from
almost anywhere in the world. This has led to a new work ethic where computer
technology has enabled employees to work from various geographic locations, or time
zones. Computer technology has provided people with increased mobility while talking with
someone on the phone, or receiving a fax.
Information can be retrieved and sent in many forms including text, voice, graphics, photos
and video. Additionally, the "information superhighway" has increased the availability of
these forms of information delivery methods. One major concern of the recording industry
is the ability to reproduce digital material such as video tapes and DVDs, which are
indistinguishable from the original. This technology has caused headaches to the industry’s
composers and performers since any digital file can be easily duplicated and shared.
Activity 1.5 ‐ How would you explain the term "information superhighway" to a family
member? When considering your explanation highlight some characteristics that are
implied in the term.
Introduction to Computers 17
With access to information, and digital voice and smart technologies automated voices
have replaced operators who traditionally greeted customers and initially responded to
their queries. It is now commonplace to call businesses and hear an automated switching
system and voice‐mail system instead of an actual person who can assist you.
Activity 1.6 ‐ Think of three companies in your country that have automated responses to
transfer you to an extension or department. Consider how hearing an automated
response or a human voice personally affects you, and what these effects are.
SURVEILLANCE
Computer technology has certainly allowed surveillance or the gathering of information for
different of purposes. Surveillance software allows individuals, companies and government
to monitor you in a variety of locations including other countries. Surveillance equipment
such as cameras and key pads now include transactional data which is collected from
virtually all types of transactions, including cash purchases and the acquisition of services to
analyze trends. One example is the use of Google Earth to capture topographical pictures
of different locations on the earth and more recently Google has released their street view
software that allows you to wander the streets of your city using 3D technologies. Take a
look at it by clicking here.
Activity 1.7 ‐ After viewing Google Street View, consider why investigators would want to
use surveillance to analyze pedestrian traffic in a town, or weather patterns in a particular
area of the country.
Even distance learning has changed the way people are educated, as this manual and your
online activities illustrate! Your relationship with the facilitator is remote and you may only
Introduction to Computers 18
hear a voice or read the words on a page written by your instructor. Much of the distance
or blended learning materials and content are delivered though the use of databases, audio
or video feeds and other means such as Moodle or Blackboard. This has become a reality
for many who wish to further their education while employed full‐time or those who are
unable to access a physical campus at a local institution..
Different symbols that are used to represent emotions in email messages, instant
messenger and text messages.
Think of different words or phrases that have been shortened or modified in email
messages, instant messenger and text messages
TOPIC SUMMARY
During the review of this topic we learned that computers impact every aspect of our life.
As a future entrepreneur you must learn to recognize the potential of computer
technologies and how to incorporate them into your business environment and business
plan. Consider the type of information you need access to, the type of information your
customers need and how to communicate this information to your target audience. The
next topic discussion on “Information Technologies” will help you better understand the
concepts related to computer and information technologies and provide another
perspective on how IT impacts our lives.
Introduction to Computers 19
TOPIC 1.2 – INFORMATION TECHNOLOGY (IT) – THE CONCEPTS
INTRODUCTION
As noted in Topic 1.1 computers play a major role in our daily lives. Business demands the
use of computers to support business operations. As an entrepreneur it is important that
you understand and use computer technologies effectively to help grow your business.
Before exploring the details of a business computer environment, you need to understand
what we mean by information technology and how it influences society.
OBJECTIVES
Upon completion of this lesson you will be able to:
Let’s start with the term information. Information refers to data that has been put into a
meaningful and useful context.
Information systems refer to a set of people, procedures and resources that collects,
transforms, and disseminates information in an organization. Information systems are
implemented within an organization for the purpose of improving the effectiveness and
efficiency of that organization.
As an entrepreneur you will need to use a system to provide for the flow of information
within your business. Computers is playing a vital part in obtaining, processing and sharing
information within a business which means that an entrepreneur will have to make use of a
computer‐based information system.
This requires that you must have an understanding technologies used in computer‐based
information systems – use of hardware, software and people resources to transform data
resources into information.
Back to our question: What is meant by Information Technology?
Information Technology (IT) is the area of managing technology and spans a wide variety of
areas that include but are not limited to things such as processes, computer software,
information systems, computer hardware, programming languages, and data constructs. In
short, anything that renders data, information or perceived knowledge in any visual format
Introduction to Computers 20
whatsoever, via any multimedia distribution mechanism, is considered part of the domain
space known as Information Technology (IT) (Wikipedia).
The discipline of Information Systems can best be described as the effective analysis,
design, construction, delivery, management and use of information and information
technology in organizations and society. An Information System, per se, is an organized
collection of people, procedures, data, machines and services that work together to deliver
information (http://www.is.ru.ac.za/?q=content‐2 ).
Information technology (IT) refers to the different ways (electronic computers and
computer software) of obtaining, processing, storing, and transmitting data in the form of
voice, pictures and words.
It is clear from our brief discussion that computer technology plays a vital role in everyday
life. Now take a few minutes to complete the following activity.
Introduction to Computers 21
Activity 1.9 ‐ You have no doubt have come across a computer of some kind in your
everyday tasks, be it directly or indirectly. Do you agree?
In Column A, list five places where computers can be used in operating a business or in your
local community and in Column B suggest how the entrepreneur can use these computers
to support ICT.
PLACE USE
You might have referred to places such as schools, businesses, government institutions and
the individual at home. Work through the following information and compare it with your
answers for this activity.
In general the impact of computers on society and how we live our lives is as follows:
You can use computers to communicate with your family and friends, create a
household budget, book travel and movie tickets, or manage your business. The
internet has also tremendously increased people’s ability to communicate with
others from all over the world efficiently and relatively cheaply.
Introduction to Computers 22
In business and industry, you use computers to maintain accounts, create personnel
records, track inventory, prepare presentations and reports, manage projects, and
communicate by e‐mail. You can use computers to design any type of publication
ranging from simple newsletters to fashion magazines, marketing materials, books,
or newspapers.
In the field of education, trainers can use computers to deliver training through
audio‐visual learning aids, maintain student records to track performance, search
for information on different topics, and create or submit assignments.
You can use computers to view the details of your bank account. Traders use
computer technology to get instant information on stock markets, to trade stocks,
and to manage investments.
Scientists use computers for scientific research, and to gather and analyze
information. For example, they use computers to view images from space and to
publish information on their recent research.
You can also use computers to create drawings and paintings. Photographers use
computers to edit and enhance pictures. Writers use computers to write content for
their books and to also create illustrations. By using computers, writers can make
changes in the content easily and save a lot of time.
In the field of entertainment, you can use computers to listen to music, watch
movies, store and print photographs, send greetings, and play games.
A Computer Crime
Introduction to Computers 23
Computer Crime ranges from the use of information technology to commit an act that
would be criminal no matter how committed (such as the theft of money or other
property) to activities more specifically related to computers, such as the unauthorized
access and use of information systems, theft of computer and telecommunications
services, and the theft, intentional alteration, or destruction of data or programs. The
protection of customer data and business confidential information is an issue that faces
all entrepreneurs.
B Theft of Money
As financial institutions become more and more reliant on computers, new
opportunities have arisen for criminals to use computers to steal or siphon off money.
Password protection and other security tools must be used to protect bank accounts,
investments and other financial resources.
E System Disasters
In addition to computer crime, information systems are susceptible to natural disasters
(Rain, earthquakes, fire and floods), terrorist attack, electrical power and
telecommunications line failure, hardware and software malfunction, even human error.
Off‐site backups and in some cases backups to computers in another island or nation is
recommended when your region is subjected to regular national disasters.
Introduction to Computers 24
Now do the following activity to test your understanding of the positive and negative
impact of computers and ICT on society.
Activity 1.10 ‐ Read the following case and reflect on the information before you look at the
questions that follow. In 1999, heavy rains collapsed the roof of a computer centre in
Pretoria, knocking out computers that handled transactions for over 4000 ATMs nationwide.
As a result, over 1 million cardholders were temporarily deprived of their access to their
funds through other teller networks, but because those networks lacked data about account
balances, cash withdrawals were limited to R100 a day to reduce fraud.
Hint: Think of examples of how technology impact (both positively and negatively) your life
personally and how it will impact the entrepreneur in his business.
It is advised that you share your ideas/answers with fellow students by engaging in face‐to
face discussion, via e‐mail or use social media such as Facebook and Skype.
This brings us to the end of topic 1. Hope you did well in doing the activities. Let’s
summarise what we have discussed.
TOPIC SUMMARY
In this topic we have learned that:
Now as we are through with defining information technology let’s move on to the next
topic where we will discuss the basics of computer in detail.
Introduction to Computers 25
TOPIC 3 ‐ COMPUTER TECHNOLOGY IN WORK AND PLAY
INTRODUCTION
Now that we have understood some terminology and features of computer technology, let
us look more closely at various aspects of work and play, and how technology affects each
one.
This section will allow discussion on some of the impacts in the last, and thoughts on the
next decade.
Inventions already introduced into society through computer technology, have caused the
society to change, with the cellular phone (or cell phone) being the most recent to reach
the populations. It is now an everyday occurrence to reach anyone, anywhere with the use
of a cellular phone. Not as openly known, but still commonplace however, is the use of the
smart prosthesis on someone who previously could not walk after an accident. Simulations
of people walking or running for example have furthered the invention of essential types of
prostheses.
OBJECTIVES
After studying this topic, you will be able to:
Space travel
Weather
Loss of limbs
Introduction to Computers 26
Since health care matters to everyone, it is not surprising that computer technology has
become a natural part of our health and wellbeing, but its use and relevance has
implications in everything we do…and not do! If you would like to explore how medical
organizations are using simulation and other computer technologies to provide professional
development to health care professionals and support science education in the schools go
to the Howard Hughes Medical Institute, Bio‐interactive site.
Computer technology is integral part of the health and wellness sector. CTI scanners and
other diagnostic tools are driven by computer technology. Our health records are placed
into databases to be used and retrieved when you visit the hospital or your local doctor.
Science has had an incredible impact within the last century. Toffler in his book “The Third
Wave” has identified computer technology as a new phase in the evolution of society.
Technology has made the following medical procedures possible. Many of these
procedures have generated considerable debate about the ethics of these procedures.
Some of these procedures include the use of technology to support:
organ transplants;
cloning;
nuclear radiation;
limb replacement;
nerve regeneration.
Telemedicine
Some of you may have previously seen or heard the terms teleconferencing or
telecommuting. The Greek word 'tele' means ‘distance’, so teleconferencing provides
opportunities to have a conference without all persons having to be in the same room, city
or country. Similarly telecommuting or the less popular term, ‘tele‐working’, was first
offered in the 1960s by the information technology industry. This arrangement allowed
employees to work at home and communicate with the office by methods such as phone,
fax and computer.
So we now have yet another term ‘telemedicine’, where ‘medicine’. Telemedicine involves
telecommunications, where medical personnel and their patients are separated by some
physical distance but are connected through technology so the professional can complete a
medical procedure. Some of the services offered by telemedicine include medical
Introduction to Computers 27
diagnoses, pathology, radiology, and consultation, so that expertise can be made available
in rural and remote areas.
Medical Self‐Diagnoses
Many people are using knowledge‐based database systems to research cures and
symptoms of ailments, probably for self‐diagnoses. These database systems, called expert
systems perform tasks that would otherwise be performed by someone with expertise in
the field. Expert systems can be used, not only to diagnose human illnesses, but also to
make financial forecasts, and schedule routes for delivery vehicles. However it is important
to note that while some expert systems replace human experts, there are others designed
to assist them.
Having a medical complaint which is embarrassing should not be the sole reason to avoid
consulting a doctor. Although there are well‐documented and researched medical expert
systems (such as WebMD) being able to access a website on the Internet to diagnose
symptoms does not automatically validate the authenticity or correctness of the online
diagnosis. Only a doctor can do this.
Activity 1.12 ‐ Why would you and others want to perform self‐diagnosis using an Internet
medical search engine? Think about the precautions that you must consider when using
such search engines.
Database technologies are now used to store dental records, x‐rays, medical insurance
forms and other records for administrative, management and cross referencing. Here are
some further examples of the development of database systems with associated
technologies which are used as expert systems and have become tools for medical
research.
Research
Research on genetics has discovered entire sets of genetic instructions in the cells of
our body, their sequences and any possible unique features or abnormalities. Using
computer technology has afforded:
The discovery of a gene which has the pre‐disposition to develop colon cancer can save a
life if genetic screening is done early. In contrast, persons in the early 1970s were either
denied insurance coverage or were asked to pay increased premiums if they carried the
gene for sickle cell anemia.
Introduction to Computers 28
Forensic personnel used computer technology to assist in the identification of people
missing at the World Trade Centre. Tools were used to compare the victims’ DNA with an
item used by the victims, such as a toothbrush.
Activity 1.13 ‐ Consider the moral and ethical implications for using computer technology
to search databases for screening employees DNA; for other diseases such as HIV/AIDS; or
for conducting criminal background checks.
In Barbados, technology is now becoming a part of the classroom with the assistance of a
government sponsored educational initiative called Edutech 2000. This programme is
providing training in Information and Computer Technologies (ICTs) for teachers and
students alike in order to develop the country’s future workforce and ensure the country
has suitable skills to compete in the international market.
In most countries today the typical public school program includes some instruction in
computer technology, computer literacy skills and software familiarization. Most public
schools throughout the Caribbean and parts of Africa have access to computers within their
schools. Technology is being used to support instruction and increase student and teacher
technical knowledge and skills.
The introduction of computers to support classroom instruction has met mixed reactions.
Some teachers embrace it, but many resist it because they don’t have the pre‐requisite
skills to properly employ the technologies. Change will take time, resources and more
teacher professional development. The Commonwealth of Learning is supporting the Open
School Movement and the use of ICT to support instruction and student learning. Check it
out.
Computer technologies and the advent of the Internet have allowed online universities to
flourish. Examples of fully online universities include Indira Gandhi National Open
University, National Open University of Nigeria, Athabasca University and the Open
University of the United Kingdom Online universities and similar organizations around the
world provide opportunities for millions of students to study anywhere and at any time.
Introduction to Computers 29
Working professionals are now able to further their education without having to travel
while maintaining full‐time employment and an appropriate quality of life.
There are some disadvantages however with online activities, which include the lack of
opportunity for human interaction and socialization. Many online students experience the
feeling of isolation. Although the inclusion of online discussion forums and chat capabilities
have somewhat alleviated this problem, there is still an issue with misinterpretation and
miscommunication associated with text messages and phrases.
The online learning environment is slowly embracing new technologies like Podcasts, social
networking software like Facebook, instant messaging technologies like Skype and web
conferencing systems like Elluminate. Web 2.0 tools are helping close the social divide and
providing more opportunities to interact with peers learners and others in the educational
communities.
Activity 1.14 – Based on your own experiences with distance education, think about the
potential impact that an online university has on its students.
Introduction to Computers 30
Activity 1.13 – Consider the following and if you have opportunity discuss it with others.
What statement best reflects your belief about computer technology and the automation
of tasks in the workplace.
As the cartoon below illustrates texting has become part of our culture.
I suspect there were smiles as you read the cartoon, but has the cartoon become a reality
today? Are people unknowingly hiding behind the technology in order to minimize
communicating with each other? Do people speak more freely with the use of technology
or in person?
Over the years the Internet has evolved from a deliverer of static information text based
technology to a platform that encourages social networking, idea exchange, collaborattion
and online community building. Tools like Facebook, Yahoo Groups and others allow
Introduction to Computers 31
individuals to connect with individuals of like minds and create their own virtual network of
friends and colleagues. Tools like YouTube and Blogger have allowed everyone to create
and share their own information. Everyone has opportunity to contribute to the world
knowledge base and provide their own interpretation of personal, local, regional or national
events.
This form of the Internet is known as Web 2.0 and has democratized our virtual space.
Everyone is now equal and can post personal messages for the world to read.
Activity 1.16 – Search the Internet and see if you can discover other social
networking sites that you would like to participate in or share with your peers. If
you have a course web site or email list feel free to share you link with others and
describe why you think your site reflects the values of community building, social
collaboration and knowledge sharing.
MAN‐MACHINE CONNECTION
I would hope by now that you would agree much of the world cannot live without having
some form of computer technology in their lives. Does this mean that we are controlling
computer technology or is the technology controlling us? During the late 1980s and 1990s,
the Internet invaded our lives. Movies and TV shows included the Internet and
sophisticated computers to entertain us. Some interesting ones were the 1982‐1986 weekly
television crime fighter series ‘Knight Rider’ which portrayed a modern‐day hero who drove
a high‐tech smart car equipped with artificial intelligence. Sandra Bullock’s 1995 movie
‘The Net’, involved an Alfred Hitchcock style drama about having her identity electronically
erased and replaced with a stranger’s information. Then in 1998, there is Will Smith
starring in ‘Enemy of the State’ which speaks about the use of satellites to track people, as
well as in ‘I Robot’ in 2004 about a ‘humanoid’ robot that is suspected to have murdered its
creator. Whether you have seen these movies or not, the implicit use of computer
technology in each of them sends the message that whether to help or hinder, that
technology is everywhere. Today it is digitally generated 3D movies and animations like
Avatar have caught our attention. These movies would not be possible without computer
generated images and human machine interactions to capture life like character
movement.
Technology has advanced so fast that more and more computers have an incredibly high
fault tolerance, with robots automating the repair process, without any human
intervention. One example are the robots that are used by NASA to repair the International
Space Station. Seriously, we are not that far away from computers repairing themselves.
Let us now consider computer logics. Do “they” have the capability of handling complex
thought processes like human ones? Almost!
Introduction to Computers 32
An Example – Man Machine Practical Application
An implantable RFID chip is a minuscule capsule containing a microchip and an antenna, all
enclosed in glass. The chip is about the size of a grain of rice. RFID chips work by storing a
unique identification number in the microchip. This number can be retrieved by a special
RFID reader that is held within close proximity. Today there are most often implemented in
animals to track their whereabouts and to include owner information that can be retrieved
by a scanner used by a vet or other animal agency
When employing different technologies we must be aware of not only the technical issues,
but issues of privacy, morality, society norms and ethical practices.
TOPIC SUMMARY
This topic discussed the impact of technology on society. It demonstrated that ICT and
computer technologies are an integral part of everyday life. It drives our businesses,
entertains us, educates us, and helps ensure our health and wellness. As an entrepreneur
you must stay abreast of technological innovations. You must consider how they can help
you do your business and more importantly how you can use them to support or create
new products and services.
Introduction to Computers 33
UNIT 1 SUMMARY
After reviewing this unit, reading the suggested articles and exploring the different links you
should have concluded that:
With computer technology, the types of negative impacts and the number of
people directly affected by a single system error has grown enormously to where
millions can be directly affected.
The main role of computers and computer technology is the ability to manipulate
data into information
Computer technology has enabled us to access information at our ‘finger tips’, from
many places, in many places, at any time, and in many different forms whether
printed or stored.
Information can be retrieved in many forms such as text, voice, graphics, and video
Computer technology has changed the way we communicate with another person
or among groups of people
Computer technology can improve our lives in health and medicine such as
research in cures for diseases
Introduction to Computers 34
Telemedicine involves telecommunications, where medical personnel and the
patient are separated by some physical distance
Expert systems perform tasks that would otherwise be performed by someone with
expertise in the field
Databases are now used to store dental records, x‐rays, medical, insurance and
other records for searches and purposes of cross referencing
Businesses have felt most of the impact of computer technology, such that if there
is little technology incorporated then the business may be frowned upon as being
‘not‐up‐to‐date’ or archaic.
Many of us cannot live without having some form of computer technology in our
lives
This unit introduced the general ideas associated with the impact of technology on different
sectors of our society. Are you explored these impacts, you should have noted that they
range from the practical and necessary to what may be regarded as leading edge or radical.
However in all eras of human history, (a subtle change from ‘revolution’, as in the Industrial
Revolution!), our different societies have been faced with change in almost every aspect of
their life. This change has been accelerated by the intervention and adoption of computer
technologies. It is hoped that this unit caused you to reflect upon the advantages and
disadvantages of technology and how it impacts all of us.
Introduction to Computers 35
UNIT 2: COMPUTER HARDWARE
INTRODUCTION
This unit discusses the evolution of computer hardware, provides an introduction the basic
components of computer system and explains how a computer processes data that
executes different computer instructions.
UNIT OBJECTIVES
At the end of this unit, you should be able to:
3. Evaluate the various types of computer systems that have evolved since 1985.
Introduction to Computers 36
TOPIC 1 – THE EVOLUTION OF COMPUTER TECHNOLOGY
INTRODUCTION
Today many jobs mainly depend on the either the creation or collection, and distribution of
information. This topic addresses the different advancements in computer technology and
the various types of computers and their critical components.
OBJECTIVES
After studying this topic, you will be able to:
COMPUTER GENERATIONS
As each new computer generation improves on its previous generation, there have been a
corresponding reduction in size (or miniaturization) of computer circuitry. In contrast to this
miniaturization, the speed, power, and memory of computers have proportionally
increased. Although this Topic will describe the major developments of each computer
generation, it is more important to consider how the technology has influenced the
development of current computer systems.
6 Reduced Instruction Set Chip (RISC) and more Mid 1990s to Present
inventions to date
Introduction to Computers 37
THE FIRST GENERATION COMPUTER (1940S‐1950S)
Vacuum Tubes
These early computers comprised huge vacuum tubes (similar to light bulbs) whose main
purpose was to strengthen weak signals for transmission. The vacuum tubes acted as
switches to start and stop the instant flow of electricity. The concept underlying the on/off
switch was the idea of ones and zeros. The combination of ones and zeros or on and off
created a type of machine language that could be used to process information.
The first computer, the Mark 1, was so huge that it filled a typical stadium field and was
said to have used more than 500 miles of wire. Its success however was its processing
power, such as a mathematical problem that normally took 40 hours to solve, only took the
Mark 1, 20 seconds to produce a result. It was used by the U.S. Navy during World War II, to
help solve strategic military mathematical problems such as cracking secret codes and
creating complex fire tables for naval guns and artillery. Scientists used the computer to
predict weather patterns and for analyzing problems in airplane design. As noted earlier
the language of this first generation was called machine language, which comprised zeros
and ones for programming the computer.
The next computer, the ENIAC (Electronic Numerical Integrator and Computer) was an
improvement on the Mark 1, since its processing power was about 1,000 times faster. The
ENIAC was about 80 feet (24.4 m) long by 3 feet (0.9 m) wide, and used about 18,000
vacuum tubes. Unfortunately, the tubes were very hot, had to be replaced frequently, and
were costly in using much electricity to keep them cool. The UNIVAC (Universal Automatic
Computer) soon replaced the ENIAC by containing a compact 5000 tubes, a reduction from
the 18,000 used in the ENIAC.
Transistors
During this generation the significantly smaller transistors (a new technology) eventually
replaced vacuum tubes as the processing component of the computer. This allowed
engineers to dramatically reduce the size and space needed to house a computer.
Transistors proved to be cheaper to produce and emitted no heat, thus reducing the costs
of manufacturing and making the technology more reliable since they conducted electricity
faster vacuum tubes and failed less often.
This generation was noted for making space travel possible, and for the development of
more sophisticated programming languages that allowed programmers to use short specific
terms (e.g. ADD) to represent certain computer processing instructions. Higher level
programming languages such as FORTRAN, ALGOL and COBOL, which use short English‐like
words, were developed during this generation. During this generation computer hardware
Introduction to Computers 38
and software was created that allowed users to store and retrieve programming
instructions.
Integrated Circuits
This generation improved on the previous one by miniaturizing the transistor and building
several onto a single chip of silicon. This compacting of millions of transistors in a small
space, also called an integrated circuit, greatly increased the power of computer, the
processing speed, lowered its production costs even more and reduced the size of the
computer.
During this generation the creation of new input and output devices were created.
Keyboards, monitors, and the mouse made the computer a more user friendly environment
and eliminated the need for huge stacks of punch cards to input data into a main frame
computer. Output of the computer calculations could be read on screen vice printing out
large amounts of paper with graphic symbols on them
The Microprocessor
Again an improvement on the previous generation, this generation continued to reduce the
size of the silicon chip comparable to the size of a pencil eraser while vastly increasing its
computational speeds. This single chip with the components and processing speeds of a
computer was called a micro‐processor and was initially intended for use in calculators, not
computers.
During this generation the silicon chip technology was harnessed by the chip manufacturer
Intel. Intel in partnership with IBM created the first microcomputer, or personal computer.
A few years later Apple in partnership with Motorola introduced the Macintosh to compete
against the IBM personal computer. Only recently has Apple recognized the need for
standardization and has embraced the Pentium technologies currently supported by Intel.
During this periods new and more powerful programming languages developed. This
included Pascal, C and compilers which converted the program to a lower level language
that the machine could process. The UNIX operating system was also developed during this
time to manage system resources.
Introduction to Computers 39
The Fifth Computer Generation Computer (Mid 1980s – Early 1990s)
The goal of this generation is to develop devices that are capable of responding sensibly to
a user’s natural language and also capable of learning and self‐organization. It is
characterized by the introduction of computers with hundreds of processors that could be
assigned to work on different sections of a single program. This is called parallel processing,
and is being used to develop communication between a computer in natural spoken
language and its user, through access to a vast knowledge database to make intelligent
inferences and draw logical conclusions in the way that humans do.
Several programming languages known as artificial intelligence (AI) languages have been
developed simply because they are used almost exclusively for AI applications. The two
most commonly used languages are LISP and Prolog.
The linking of computers together, called computer networks, and the increasing use of
workstations (explained in table 2.1) were also developed during this generation.
Activity 2.1 ‐ Consider the advantages and disadvantages of the development of artificial
intelligence in this generation
This era refers to the generation of computer and video games which became popular
around 1998. The Nintendo Game Cube, Sony PlayStation 2, and Microsoft's Xbox are noted
to have dominated game playing in all age groups.
Introduction to Computers 40
Figure 2.1: General Timelines of Computer Generations
G5: Parallel
G4: Microprocessor
G2: Transistor
Years
Activity 2.2 – Reflect upon what facilitated the increase in speed, power or memory in
each of the computer generations.
Laptop Compared to the desktop, laptops are portable computers that have
their monitor, keyboard, and other memory and storage devices all
included in a packages that is up 17 inches in size and is powered by
a special battery. Laptops are also called notebooks.
Introduction to Computers 41
Type of Brief Description
Computer System
Mainframe Mainly associated with large companies, that process millions of
transactions calculations from multiple sources at one time,
mainframes previously filled large rooms, but today consist of a
number of linked components that allow the different processors to
communicate with one another and share their total computing
power.
Minicomputer Minicomputers are powerful and can support many users at once.
Their size is between microcomputers (PCs) and mainframes.
Palmtop More commonly called Personal Digital Assistants (PDAs). They are
compact computers that often use special secondary flash memory
instead of a typical hard drive for storage. Palmtops usually have
optional keyboards but mainly use touch screens for input. They are
typically the size of a paperback novel or even smaller and are very
lightweight and use battery power.
Personal Computer Personal Computers (PC) was designed to be used by individuals for
general use. The PC is not usually associated with the Apple Mac
although it is a PC. Often the term desktop and PC are used
interchangeably.
Supercomputer Supercomputers have the world’s fastest processors and are able to
perform millions of computations a minute. Supercomputers are
normally comprised of multiple high performance computers
working in parallel as a single system. The best known
supercomputers are built by Cray Supercomputers.
Introduction to Computers 42
Activity 2.3 ‐ Explain, with reasons, which computer system(s) would be most appropriate
in the following examples:
3. A multi‐million dollar company with six branches in the country and three in other
countries
4. Banking system with many tellers who access the same customer database
TOPIC SUMMARY
Since the 1940s when computer technology was used to support the creation of firing
tables for the artillery and to the introduction of the World Wide Web network of
computers in the 1980s computer technologies have become a large part of our everyday
life. The use of computers is accelerating. They are now in our cars, our phones, our
refrigerators. Almost every type of electronic device has a computer chip in it. Each chip
relays on commands. Commands must be input using different devices. The next topic will
examine some of these input and output devices.
Introduction to Computers 43
TOPIC 2 – COMPUTER HARDWARE AND PERIPHERALS
INTRODUCTION
This topic presents a brief discussion on computer and their components and other basic
concepts you need to familiarise yourself with before using the computer.
OBJECTIVES
Upon completion of this lesson you will be able to:
We have briefly looked at the different types of computer systems in Topic 1. We will
discuss the different hardware components that make up different computer systems. The
hardware and peripherals can be categorized as either Input, output, process or storage
devices.
INPUT DEVICES
You use input devices to provide information to a computer, such as typing a letter or giving
instructions to a computer to perform a task. Some examples of input devices are described
in the following list.
Trackball
This is an alternative to the traditional mouse and
is favoured by graphic designers. It gives a much
finer control over the movement of items on the
screen.
Introduction to Computers 44
Scanner: A device that is similar to a photocopy
machine. You can use this device to transfer an exact
copy of a photograph or document into a computer. A
scanner reads the page and translates it into a digital
format, which a computer can read. For example, you
can scan photographs of your family using a scanner.
Multimedia devices
This is the combination of sound and images with text and graphics. To capture sound
and image data, special input devices are required.
Self‐Reflection Activity
Look around in your immediate environment (shops, government institutions, at home, etc)
and see if you can recognise any of the above discussed input devices. Can you remember
Introduction to Computers 45
the functions of each of the devices that you have identified?
Let’s continue our discussion by looking at the second type of computer hardware.
OUTPUT DEVICE
Output devices in the computer system are the equipment whereby the result of a
computer operation can be viewed, heard or printed. You use output devices to get
feedback from a computer after it performs a task. Some examples of output devices are
described in the following list.
Take note
One of the things that you need to make sure of is that you get the right printer.
How do you know what printer to get?
There are various types of printers available and these vary considerably in the quality of
their production.
Introduction to Computers 46
Impact Printers
Non‐impact Printers
CPU
Motherboard
Extension cards
Drivers
Connection ports
How do we get the different computer parts to work together so that your computer can
work? Let’s start of our discussion with the process devices.
Introduction to Computers 47
Motherboard
Expansion Cards
Yes you can play music and video files on your computer. But how is it possible?
Inside the computer system box you also find an expansion card which is another circuit
board that can be attached to the motherboard to add features such as video display and
audio capability to your computer. Expansion cards are also called expansion boards that
enable your computer to use the multimedia devices. An expansion card either improves
the performance of your computer or enhances its features. Examples of expansion cards
that can be added include:
Video Card: It is connected to the computer monitor and is used to display
information on the monitor.
Network Interface Card (NIC): Remember we’ve explained computer networks in
Unit 1. The NIC allows the computer to be connected to other computers so that
information can be exchanged between them.
Sound Card: It converts audio signals from a microphone, audio tape, or some
other source to digital signals, which can be stored as a computer audio file. Sound
cards also convert computer audio files to electrical signals, which you can play
through a speaker or a headphone. The microphone and the speakers or the
headphones connect to the sound card.
STORAGE DEVICES
All computers need to store and retrieve data for processing. The CPU is constantly
using memory from the time that it is switched on until the time you shut it down.
There are two types of storage devices as illustrated in the flow chart below.
Introduction to Computers 48
Primary Storage is also called main memory or immediate access store (IMAS). This
is necessary since the processing unit can only act on data and instructions that are
held in primary storage. Primary storage consists of two types of memory chips:
Introduction to Computers 49
So we can compare the features of the two memory types as below:
Data will be lost if power is turned off Data will not be lost if power is turned off
Volatile Non‐volatile
Units of Storage
The amount of data and instructions that can be stored in the memory of a
computer or secondary storage is measured in bytes.
A byte is made up of a combination of eight (8) bits and has the storage power to
represent one character (a character is a letter or symbol or punctuation mark or
blank space).
Units of Storage
1 byte 8 bits
1 kilobyte (K) 1024 bytes
1 megabyte (MB) 1000 kilobytes (approx. 1 million bytes)
1 gigabyte (GB) 1000 megabytes (approx. 1 billion bytes)
1 terabyte (TB) 1000 gigabytes (approx. 1 trillion bytes)
PCs use a simple method of designating disk drives to store data. These drives are
assigned letters of the alphabet.
Introduction to Computers 50
A Drive Floppy drive. Still found in older computers
C Drive Internal hard drive (hard disk drive) situated inside the system case.
D Drive Usually the CD‐ROM/DVD‐ROM drive although can also be used for another
virtual or physical hardware if a second one is deployed.
E Drive Usually use for any other disks, such as CD‐writer, USB flash drive, external
or hard drive, etc.
Higher
Data and information stored on a permanent basis for later use. Secondary storage is
cheaper to purchase and access. Hard disks, Zip drives, Optical disks (CD’s and DVD’s)
are all examples of secondary storage.
Introduction to Computers 51
CD‐RW or Compact Disk Rewriteable, allows
you to write and erase information from the
disk many times. They are used to store
large volumes of information such as texts,
graphics, sound and video.
Now that you have a basic understanding of the hardware components of a computer take
some time and do the following activity.
Activity 2.4
A. Test your knowledge. Say whether the following statements are true or false.
Introduction to Computers 52
6. Back up files are usually created on hard disks
Did you do well in answering the questions? Please work through the unit again if you feel
that you did not master the content yet. Let’s summarise what we have discuss in this
topic.
TOPIC SUMMARY
In this topic we have learned that:
You use input devices such as keyboard, mouse, scanner and multimedia devices to
provide information to a computer.
Output devices are use to get feedback from a computer after it performs a task.
Examples include monitor, printer and multimedia devices.
CPU takes raw data and turns it into information. The CPU is made up of Control
Unit, Arithmetic Logic Unit (ALU) and the main memory.
Random Access Memory (RAM) is the main memory and allows you to temporarily
store commands and data.
Read Only Memory (ROM) retains its contents even after the computer is turned
off.
Introduction to Computers 53
A bit is the smallest unit of storage in a computer.
The amount of data and instructions that can be stored in the memory of a
computer or secondary storage is measured in bytes. A byte is made up of a
combination of eight bits and has the storage power to represent one
written character.
Hard disks, CD‐R, CD‐RW and DVD are secondary storage devices.
This brings us to the end of topic 2.1. We’ve said earlier that for you to be able to use your
computer you will need the programmes to operate the computer. Let’s move on to the
next topic where we can look at how the computer hardware processes information.
Introduction to Computers 54
TOPIC 3 ‐ COMPUTERS AND COMPUTING
INTRODUCTION
This topic explores the types of computer systems (vice individual computers), their
purpose, their structure and it provides a technical description of the components of a
generic computer system.
OBJECTIVES
After studying this topic, you will be able to:
Introduction to Computers 55
The peripheral devices mentioned above are collectively called hardware devices, since
they can be physically attached to the computer. However, computer systems also include
software, or programs that are integral in the functioning of some of these peripheral
devices and are necessary to make the computer operate. Every computer system, for
example, requires an operating system. An operating system is a program that establishes
communications with the various peripherals and acts as a bridge to other application
specific software programs. An operating system is like the command centre of the ship. It
makes all of the decisions about how the computer will function and work with others.
Compared to a typical computer, embedded systems are often smaller in size, tend to be
cheaper, and as a result many are mass‐produced. Embedded systems range from small
portable devices to large complex systems. The major difference is that they are single
purpose devices with only one form of input or output. Some may also have simple user
interfaces or displays which include buttons, or touch screens, while others have none at
all.
Introduction to Computers 56
Table 2.1 ‐ Examples of systems and devices which comprise embedded systems
Sprinklers
Handheld computers
Thermostats
Activity 2.5 – Try and think of other examples of embedded systems that you typically
use in your day to day activities but have never thought of them as embedded computer
systems.
Introduction to Computers 57
another peripheral device. Figure 2.2 illustrates the major components of a system unit that
is attached to an input and output device.
The Central Processing Unit (CPU), also known as the processor or microprocessor has
components that control the operating system and other software installed on the
computer. The CPU also sends commands and data to the peripherals attached to the
computer, such as the monitor or printer. Therefore the speed (how fast the electrons
move around the chip) at which the CPU executes its tasks (or commands) determines how
quickly you can view or hear the output from the command; such as printing a page or
allowing you to view a letter on the monitor. This speed is called ‘clock speed’, and is
measured in megahertz (MHz). A computer system that responds to commands quicker
means that its clock speed is working faster to execute these commands. Table 2 compares
some common CPUs and their clock speeds. Different CPUs use different silicon chips to
execute the commands and process data. Different types of chips have different clock
speeds based on the technology that was used to create them. Some examples are
provided below.
Introduction to Computers 58
Table 2.1 Typical CPU Speeds Based on Chip Type
Now let’s look deeper into the operation of the CPU. All computer systems have a CPU
which comprises (1) a control unit and (2) arithmetic and logic unit (ALU).
The control unit is similar to an efficient manager. It is responsible for directing other parts
of the computer system in order to carry out the instructions for the task required. The
control unit (CU) must interact with the arithmetic and logic unit (ALU) and memory to
complete its tasks. As instructions are fetched from memory, the CU interprets the
instruction. The CU then sends commands to other components to gather data that may be
needed to complete the instruction, even if it involves a transfer of data from other
components and devices. The CU than determines where to send the result. This may
1
Mhz = Megahertz ‐ It is a measure of the transmission speed of electronic devices, including
channels, buses and the computer's internal clock. A one‐megahertz clock (1 MHz) means some
number of bits (16, 32, 64, etc.) are manipulated one million times per second.
2
Ghz = Gigahertz ‐ A one‐gigahertz clock (1 GHz) means one billion times. MHz and GHz are used to
measure the speed of the CPU. For example, a 1.6 GHz computer processes data internally
(calculates, compares, etc.) twice as fast as an 800 MHz machine. However, the doubled clock speed
of the CPU does not mean twice as much finished work gets done in the same time frame. Internal
cache design, bus speed, disk speed, network speed and software design all contribute to the
computer's overall processing speed and performance (overall throughput).
Introduction to Computers 59
include activating the printer, showing the result on the monitor or playing a sound on the
speakers.
Activity 2.6 ‐ Explain why the control unit is regarded as an efficient manager.
The Arithmetic and Logic Unit (ALU) is the part of the CPU which performs all arithmetic and
logic operations this involves arithmetic calculations including addition, subtraction and
multiplication. As calculations are required, the Control Unit sends them to be performed in
the ALU which sends the result back to the Control Unit. It also performs logic operations
such as comparisons of numbers or letters to test for, such as equal‐to (=), less‐than (<),
greater‐than (>) and other combinations, such as less‐than or equal‐to (<=).
Activity 2.7 ‐ In a test for the equal‐to condition, the arithmetic/logic unit compares two
values to determine if they are equal. For example: If the number of tickets sold
(Num_Tickets) equals the number of seats in the auditorium (Num_Seats), then the
concert is declared sold out. This can be represented as:
Num_Tickets = Num_Seats ?
2. Votes for Candidate A are less than the votes for candidate B
Memory
Primary memory is necessary to store instructions and data for processing, but they are not
part of the CPU. Memory are separate chips stored on a mother board which connects all
the hardware together. Program instructions or data are kept in primary memory for only
as long as the program currently using them. In human terms this would be considered
Introduction to Computers 60
“short term memory”. The original instructions and data are lost once the computer is
turned off; therefore primary memory is deemed volatile. In later units we discuss those
non‐volatile devices which allow data and instructions to be permanently stored in a
computer system for use later on. Primary memory is also as – memory, main memory,
primary storage, main storage, internal storage, computer memory and RAM (Random
Access Memory).
Activity 2.8 ‐ Explain what is meant by the phrase “primary memory is deemed volatile”
TOPIC SUMMARY
The internal workings of a computer are very similar to the internal workings of the brain.
The CPU represents the brain. Both are used to store and process information. Both carry
out complex algorithms to store and combine crucial information. Both control the
external operation of the body or in the case of the computer the peripherals and other
attached devices. How this is done will be explored in the next topic on data processing.
Introduction to Computers 61
TOPIC 4 – PROCESSING DATA
INTRODUCTION
Processing data is the most important activity in the computer, and so the task of the
processor is to interpret and execute program instructions, in order to transform data into
information. The processor is also responsible for interacting with the input, output and
storage devices.
Objectives
2. Describe how data moves through the Central Processing Unit (CPU).
3. Define megabyte.
7. Explain the difference between instruction time (i‐time) and execution time (e‐
time).
Generally primary memory only stores data and instructions while the computer is
turned on, but once the computer is turned off, the data and instructions are lost.
If more than one program or application is opened at the same time, then, a single
program should not exclusively use all the memory; some memory should be
available for the other programs to use.
The amount of memory available to hold the data and instruction is measured in
megabytes or MB. A personal computer with a minimal amount of memory of say less than
512 MB may not be able to perform efficiently and may be rather slow in executing the
applications. Memory is also loosely known as RAM which is an acronym for Random Access
Introduction to Computers 62
Memory. It should be noted there that the word random implies that data can be retrieved
quickly, and in the same length of time, regardless of where the data is located (that is, the
address of the data).
Read‐only memory or ROM is an integrated circuit, programmed with specific data when it
is manufactured. It is used in computer systems and other electronic devices. RAM and
ROM are different since data stored in ROM cannot be modified easily. In other words,
ROM is ideally suitable for storing a set of data for the life of the device, and is therefore
non volatile.
Flash memory (or simply flash) is a modern type of EEPROM which can be erased and
rewritten faster than EEPROM. Flash memory is mainly used in memory cards, USB flash
drives, memory stick, flash stick and jump drive), which are used for general storage and
transfer of data between computers and other digital products.
Consider a user who needs to add two numbers, 10 and 15. These numbers may be input at
the keyboard and the results shown on a screen. The processing of this simple addition is
carried out in the CPU.
Let us examine how a single instruction is executed or carried out in the central processing
unit. Of course, computers today generally execute one instruction at a time, although as
quickly as a fraction of a second.
In order to carry out an instruction, the program instructions and data must be moved into
memory from either an input device or a secondary storage device. Once in memory, the
control unit and ALU in the CPU work together to perform the following four steps (fetch,
decode, execute, and store) for each instruction. These steps are collectively known as the
Introduction to Computers 63
machine cycle or the processing cycle. This machine cycle has two phases, the instruction
cycle (instruction time, or I‐Time) and the execution cycle (execution time or E‐Time). Let us
examine these cycles in more detail.
1. Fetch Instruction: The control unit fetches (gets) the program instruction from
memory.
2. Decode Instruction: The control unit decodes the instruction (decides what it
means) and then moves the necessary data from memory to the ALU.
3. Execute Instruction: The ALU performs the requested action, by executing the
arithmetic or logical instructions on the data.
4. Store (write) Result: The ALU writes or stores the result of this operation in
memory or in a temporary register.
Once these two phases are complete, the control unit instructs memory to send the result
to an output device or a secondary storage device. The figure below illustrates how these
cycles interact to produce a result.
Activity 2.9 ‐ Describe briefly the four basic operations that comprise a machine cycle or
instruction cycle.
Explain the difference between instruction time (i‐time) and execution time (e‐time).
Introduction to Computers 64
We have already noted that the Control Unit is ideally the brain of the CPU, and must be
very organized. For all instructions to be processed the Control unit must have the data
ready and the cycles working like, well, like clock work! If the control unit is regarded as the
brain, then the clock is regarded the heart of the computer. Every operation in the
processor takes place like the ticking of a typical old‐fashioned mechanical clock. Each ‘tick’
may indicate the beginning and each ‘tock’ the end of a basic interval of time in the
processor during a clock period. During this beginning and end phase, data moves as
directed from the CU.
We have discussed instructions, data, and memory, as well as the machine cycle functions
in two phases. Let us now briefly mention how the control unit is able to retrieve the
correct data and instructions from memory. This is done by giving each instruction and
each piece of data an address, just as persons have an address for their home. So the
addresses say the same, but just as people move to new addresses, different instructions
and data are moved to new addresses or locations when the old data is no longer needed in
memory. Just like a mailbox for an address can hold so many letters and packages, similarly
each memory location can also only contain a fixed amount of data. Finally as mailboxes
may have a label or number affixed to it, so do memory addresses have representative
address names such as Hours, Age, or Name.
A memory address is simply a unique number that identifies the location of a particular
byte in memory.
TOPIC SUMMARY
This topic explored how data is processed, calculated and stored in a computer.
Understanding this process will help you better understand the type of systems and system
software that you need to support your business.
Introduction to Computers 65
RECOMMENDED UNIT READINGS
After you have completed your review of each Topic and its related activities, it is
recommended you read at least one of the following online articles and consider the
related reflective questions as you read the materials.
There are four parts to this article. Kopplin demonstrates that computers are not a new
invention. Devices to perform calculations have existed for over two thousand years. The
four parts provide a pictorial history of our early computers. When reviewing the Kopplin
article consider:
“The history of mankind is one of innovation, revolution and change”. How does the
evolution of computer devices support this statement?
Beach, T.E. (2004). Hardware. In Computer Concepts and Terminology. University of New
Mexico at Los Alamos. Available at:
http://www.unm.edu/~tbeach/terms/hardware.html.
This article is part of a larger tutorial on computer concepts presented by Dr. Beach. Feel
free to review other parts of his tutorial. When doing so consider:
What is the basic configuration of the computer that you are currently working on. Can you
identify the different components and the capabilities of each component?
Introduction to Computers 66
UNIT 2 SUMMARY
The following concepts were covered in this unit:
A computer is a device that accepts data, uses a program to process the data, and
generate results.
A computer system is a collective term that includes a computer and all peripheral
devices attached to it, such as a monitor, keyboard and mouse.
The main components of a computer system include the Central Processing Unit
(CPU), primary memory, input and output devices, and secondary storage.
The Central Processing Unit (CPU) comprises the Arithmetic and Logic Unit (ALU)
and the Control Unit (CU).
The ALU is the part of the CPU which performs all arithmetic and logic operations
this involves arithmetic calculations including addition, subtraction and
multiplication, as well as comparison of numbers and text.
The control unit is responsible for directing other parts of the computer system in
order to carry out program instructions
Both primary memory and secondary storage are also necessary to store
instructions and data for processing, but they are not part of the CPU
First Computer Generation is characterized by the huge vacuum tubes whose main
purpose was to strengthen weak signals for transmission, and used switches to
start and stop the instant flow of electricity
Introduction to Computers 67
Sixth Generation refers to the generation of computer and video games
In order to carry out an instruction, the program instructions and data must be
moved into memory from either an input device or a secondary storage device
The control unit and ALU in the CPU work together to perform the following four
steps (fetch, decode, execute, and store) for each instruction
In this unit, the evolution of computer systems through a number different generations was
considered. Although it may have appear to many as simply a historical perspective, it is
important to view this history as clues for the underlying trend that brought computer
systems to what they are today. This trend illustrates the reduction in size at each stage
which also coincided with increased speed of the system designed to handle the many tasks
required of it in this latest generation.
We also explored the distinction between a computer and a computer system along with
introducing the concept of special–purpose computer systems. We also explored the
components of a general computer system and their inter‐connections and reliance on each
other. Finally a description of how a computer processes data was explained.
Introduction to Computers 68
UNIT 3: SOFTWARE
INTRODUCTION
This unit discusses the two categories of software that are used to actually have the
computer complete specific tasks and that communicate with the hardware and other
peripherals. The two categories of software are: systems software and applications
software.
System software comprises a collection of programs with instructions that work together
with the hardware components of a computer (including peripheral devices), to accomplish
its tasks efficiently and effectively. System software acts as a mediator between the
hardware resources and the application programs. In addition, system software monitors
the activities of the computer (like memory and file storage) so that it functions efficiently.
Language translators.
Application software allows the computer user to create documents, produce graphics,
capture and manipulate photographs, create databases and treat the computer as a tool for
a variety of tasks.
The difference between the two can be summarized as follows: application software is
what users require to complete their tasks while system software is the software that
interfaces between the hardware to perform what is requested by the application software.
UNIT OBJECTIVES
At the end of this unit, you should be able to:
3. Explain the interaction between the user and the computer and the role of system
software to support this interaction.
Introduction to Computers 69
7. Describe a statistical application that is used to analyze data.
Introduction to Computers 70
TOPIC 1 ‐ OPERATING SYSTEMS, UTILITY PROGRAMS AND LANGUAGE TRANSLATORS
INTRODUCTION
There are three different types of software that are part of all computer systems and that
ensure that the hardware and application programs can effectively communicate with each
other. This software is classified as operating systems, utility programs and language
translators.
OBJECTIVES
After studying this topic, you will be able to:
OPERATING SYSTEMS
A computer cannot work without an operating system! The operating system comprises a
set of coded programs that work with the peripheral devices and computer hardware to
control and organize the general operating functions of the computer. Some of these
functions include:
Enabling interaction between the user and the computer system through the use of
external input devices, and
Starting the computer, also called booting, is the process of loading the operating system
into the computer’s memory so it can execute the different operations and mange the
hardware devices. When the power button on the computer is turned on to load the
Introduction to Computers 71
operating system, this process is called a cold boot. If the computer system is already on
and the system needs be re‐started for a number of reasons (like the hardware stops
operating or the user gets an error message), then the process of reloading the operating
system is called a warm boot (because the computer was already on) A warm boot in a
Windows based PC is normally done by holding down the CTL‐ALT‐DEL keys at once.
The computer system needs to manage the programs that the computer user needs to
complete business or personal tasks such as a word processing, Internet research,
spreadsheet production and others. The operating system must therefore be able to
manage one or more software application programs at the same time. This is known as
multi‐tasking and the computer is considered a multi‐tasking operating environment. For
example, multitasking operating systems run more than one application program at a time.
Suppose a user has a word processing program, Internet browser and a spreadsheet are
open at the same time and the computer user currently typing a report, using the word
processing program. The word processing program is called the active program, since it is
the current program in use while the other programs – the Internet browser and
spreadsheet – are called inactive programs since they are running in the background and
are not currently in use.
Since computers use primary memory to increase processing efficiency, the operating
system allocates memory spaces for each running program so that the individual programs
do not interfere with each other. In order to accomplish this, the operating system uses
‘virtual memory’ or secondary storage, as an extension of random access memory (RAM).
This is illustrated in the figure 3.1. Sometimes, if there are too many applications opened,
then the operating system is unable to allocated adequate memory to each application.
When this happens, none of the applications may appear to work and the computer system
may need a warm boot.
Introduction to Computers 72
Figure 3.1 – Memory CPU Interaction
The Macintosh (or Mac) and the IBM personal computer operate with hardware and
software configurations. This is known as the platform. The platform of a computer system
is the underlying hardware and software that it allows it to function. For example, the
Apple computer was developed with a Mac platform using Motorola chips and unique
operating software called “Mac OS” The original IBM computer uses Intel chips and
originally employed an operating system called “DOS” or Disk Operating System. Today’s
PCs now use a Windows based operating system that incorporates many of the original
concepts in DOS. Operating systems differ in functionality, flexibility and ease of use. Today
there are a number of different operating systems in use. They can be classified as either
personal operating systems, network (client/servers) operating systems and handheld
operating systems. A representative list of different operating systems is described below.
Introduction to Computers 73
Operating Type Main Purpose or Major Development
System
(OS)
Linux Network Uses a command line interface; more stable than
Windows, but applications using Linux are rare.
Microsoft All Types The current Microsoft operating system with a number
Windows 7 of variants which can be used in all types of computer
environments.
The operating system allows application software programmes such as word processing,
spreadsheet and database packages to communicate with the computer’s hardware. For
example if you work on a document in Excel and you want to print the document, you just
press the print button on the toolbar. Excel will direct the operating system to select a
printer to print the document. The operating system then notifies the computer to begin
sending data and instructions to the appropriate program to get the document printed.
Introduction to Computers 74
The operating system therefore acts as an interface between the application programmes
and the hardware.
The operating system manages all files on a computer. It keeps tracks of the locations
where programmes and data are stored within the computer’s memory. For example,
when you open a file that has been saved to the hard drive, you are first instructing the
computer to find the file, and then to open it. The operating system also allows you to
easily find files stored in secondary storages devices. Other file management functions
include copying, erasing, renaming and backing‐up files.
3. Maintaining security
In networks and larger computers each user is given a user name or ID and password to
gain access to the computer system. The operating system keeps a register of all these
names so that only persons with valid usernames and passwords can access the system.
This prevents access by hackers and unauthorised persons.
The operating system also keeps a log which records users logged in, the length of time
each user stayed on the system, and heat they did. Administrators can check the log to
look for security breaches and abuse of resources.
4. Managing tasks
A computer can perform many tasks simultaneously. One way of doing this is multi‐tasking
– ability of the computer to run more than one programme at the same time. For example,
a user can listen to music on his/her computer whilst at the same time typing a document
or typing an e‐mail while another e‐mail is being sent. In the case of networks the multi‐
user operating system allows more than one user to access the same data at the same time.
Many operating systems functions are never apparent on the computer’s display screen.
What you do see is what is called the user interface. The interface helps the user to interact
with the computer.
Introduction to Computers 75
Activity 3.1 – Consider the following:
1. Identify a number of tasks that are carried out by all operating systems.
2. Describe at least one task that a multi‐tasking operating system would be able to
execute.
3. Describe at least one task that a multi‐user operating system would be able to
execute.
USER INTERFACE
In order to interact with the computer, a user uses a part of the operating system called a
user interface. The functions of the user interface are to start application programs,
manage secondary storage, such as hard disks, as well as manipulate files and folders, and
finally shut down the computer safely.
command‐line interface.
The Graphical User Interface (GUI) uses graphics or icons which represent various tasks. For
example the icon to print is a small picture of a printer which when clicked with a
mouse, will invoke the printing dialog box. Once the printer dialogue box is opened you can
pick other commands that will be used to send your document to the printer. A GUI is a
user‐friendly interface that eliminates the need to remember complex computer
commands or programming languages.
Introduction to Computers 76
Figure 3.2 – Graphical User Interface Example
The menu‐driven interface is used to show all of the options available to the user in the
form of pull‐down or pop‐up menus. An illustration of a pull‐down menu is shown in figure
4.2. Many menu interfaces now include the GUI icons with text menu options.
Introduction to Computers 77
The command‐line interface requires the user to type keywords or commands at a prompt,
in order to enter data or execute commands. You can experience this type of command
when you open the “Run” interface to input DOS based commands to execute an operating
system task. This interface is the most difficult one for the average computer users to
learn. They are often used in programming applications or in support of systems software.
Activity 3.2 ‐ Graphical user interfaces (GUIs) are found on many computers.
Think of other input devices, other than a keyboard, that can be used with a
graphical user interface.
UTILITY PROGRAMS
Utility programs are tools that help the operating system manage the computer system’s
secondary or non‐priority jobs. These jobs are repetitive in nature. Some examples of
utility programs include antivirus software, backup software, disk defragmentation, disk
scanning; file compression software, file management programs, and searching software.
Often are automatically loaded into member when the system is booted and they operate
in the background at the same time as the application program. Often you do not know
they are working until they send you a message like “Virus detected, click here to
eliminate”. Only then does the user need to engage some form of interface to take the
appropriate action.
Introduction to Computers 78
Table 3.1 – Examples of Utility Programs
Backup software Used to copy data from the hard disk to another storage
medium.
File Compression Reduces the size of a file, folder or directory. Popular utility is
WinZip.
Activity 3.3 ‐ You share a computer with four other family members. Over the last
three months, you notice an increase in files, and folders from the various projects
and assignments. There are also quite a few files which have been downloaded from
the Internet. Think about which utility programs would be appropriate, not only to
organize the many files and folders, but to generally use on this computer.
LANGUAGE TRANSLATORS
Language translators convert the data in a program (source code) into machine language
code (object code) so that the computer can then process. The main purpose of translating
source code to object code is to create a program in machine language so that the
computer can produce the desired results. An example of different types of language
translators are compilers and interpreters. The compiler is a computer program or in some
cases a set of programs that translates another program’s source code into object code all
Introduction to Computers 79
at once, while the interpreter is a set of programs that translate the application program’s
source code, one line at a time while the program is running.
TOPIC SUMMARY
While the CPU is the brain of the computer, it needs instructions to work effectively. It
uses electronic instructions or binary signals in bits and bytes to communicate with other
parts of the system. Software, specifically operating software, provides specific instructions
to the peripherals and the various systems attached to the computer including network
operations. Application software provides the creative portion of the brain. It allows you
to use the computer to create and communicate. We will now explore application
software.
Introduction to Computers 80
TOPIC 2 – APPLICATIONS SOFTWARE
INTRODUCTION
Application programs assist the user in completing workplace tasks, personal tasks or
research when using the computer. They are the programs that a regular users sees and
manipulates. This includes word processing, spreadsheet, graphic presentations software
and others. .This Topic discusses some categories of application software, including their
strengths that enhance a user’s productivity.
OBJECTIVES
After studying this topic, you will be able to:
12. Demonstrate how to extract results from quantitative data using statistical
software.
Introduction to Computers 81
These personal productivity programs are usually stand‐alone programs which do not
depend on other application software to function. However, there are some applications
whose interfaces are the same, and also share data and resources with each other. These
applications together are called software suites, and some examples are Microsoft Office ‐
which is the most popular, Corel WordPerfect Office, and Lotus SmartSuite.
Word Processor
Database Spreadsheet
Types Description
Introduction to Computers 82
Types Description
Database Software Stores, manipulates and retrieves data. Some examples are
Microsoft Access, dBase and FoxPro
Editing the document allows sections of text to be deleted, moved, or re‐typed, and text
can also be searched and replaced. Formatting the document enhances its appearance,
using various features include using different font types and sizes, line spacing, colours and
borders.
Mail merge is one of the powerful features of word processing software. This feature makes
it easy to create personalized letters and reports, as well as print addresses on envelopes
and mailing labels. With a bit of creative thinking, mail merge can be used to simplify many
routine tasks such as personalizing invitations, preparing flyers, making certificates, labeling
file folders, and preparing name tags.
Activity 3.4 – Open your own word processing software program and investigate the
different formatting options it provides. Try and create a document than modify its
format using the templates and formatting features.
Hint: Some word processors have extensive help features and/or tutorials. Review some
of the tutorials.
WORKGROUP APPLICATIONS
These applications are used by two or more users who work as a team to achieve a
common task. The programs therefore should support the sharing of information and
sections of the work or a project, scheduling group meetings, group electronic mail services,
group decision making and conferencing. Some examples of this software are project
management software, groupware like Microsoft Sharepoint and collaborative software like
WIKIs (an example of a WIKI is Wikipedia).
ENTERPRISE APPLICATIONS
These applications are used by personnel to support the company in its interaction with
customers and employees. Some of the activities include entry of orders, billing, payroll,
human resource management, and general reporting activities. Enterprise applications are
specialized or tailor made to the specific activities of the company. Examples of enterprise
software include PeopleSoft a complete package of company operations and Banner an
Introduction to Computers 83
enterprise system used by universities and colleges to support records management,
financial management, course management, student management, etc.
Activity 3.5 – Consider the different tasks that you can complete with project
management software. Also provide the name of one project management application
package
SPREADSHEET FEATURES
Electronic spreadsheets organize data in a grid of rows and columns. Spreadsheet
programs are considered a simple database that can be used to manipulate data in the
form of numbers, percentages, etc.
The benefits include the elimination of much of the tedious tasks of performing the
calculations manually, so that the calculations are generally error‐free. Data is automatically
recalculated when one value or calculation is changed. What‐if analysis allows users to
change one value and have the results instantly recalculated. This is very useful in financial
forecasting.
The intersection of a row and column is called a cell. A cell is known by its address which
consists of a column letter, followed by row number, for example B7. Cells contain:
a displayed value which is what is displayed in the cell. This displayed value can
represent:
Introduction to Computers 84
Spreadsheets produce graphs based on the data given in a visual, easily understood
format. Analytical graphs are designed to help users analyze and understand specific data
using simple line, bar, and pie chart graphs.
Activity 3.6 – Open your own spreadsheet software and investigate how spreadsheets
can be used to create different types of graphs or chart such as line, bar and pie charts.
Try and enter some data and create a graph.
Hint: Some spreadsheet programs have extensive help features and/or tutorials.
Review some of the tutorials.
Public domain software is not subject to copyright and can be used for any purpose. This
includes free software, licensed by the owner under more permissive terms and open
source software.
Introduction to Computers 85
Shareware is software that is copyright protected, but may be downloaded and used
for free, for a limited time, after which the user is asked to voluntarily send the
author/creator a small payment and register the product. Shareware can be
downloaded from the internet, but it might also be available on CD.
Freeware is copyrighted software that can be copied, used and distributed at no charge.
This software may not be sold or used in any way for commercial purposes. It is mostly
downloaded from the internet. Users cannot change this software.
Open Source is software that can be use or modified without restriction, and made
available for use without restriction. Open source software is generally available
without charge, but can have a small fee and can be downloaded from the internet.
This software may not be sold or used in any way for commercial purposes. It is mostly
downloaded from the internet.
Take note: In practice, for software to be distributed as open source software, the
human‐readable form of the program (the source code) must be made available to the
recipient along with a notice granting the above permissions. Such a notice either is a
free software license, or a notice that the source code is released into the public
domain.
TOPIC SUMMARY
You should now be familiar with the relationship of hardware and software. You should
now realize how critical each part of a computer system is. As an entrepreneur you must
decide the type of hardware and software you will need to ensure your business operates
efficiently.
Introduction to Computers 86
RECOMMENDED UNIT READINGS
After you have completed your review of the topics in this unit it is recommended you read
at least one of the following online articles and consider the related reflective questions as
you read the materials.
This Microsoft article describes the evolution of their Windows Operating System. As you
read it consider the following question:
How has the creation of the Windows operating system impacted the use and evolution of
the computer?
This article explores the evolution of a the web browser from the prespective of Apple’s
Safari. But it does explore the evolution of other web browsers including Windows Explorer
and Firefox. As you read the article consider the following question:
What impact has the invention of the web browser had on our social, economic cultural and
education systems?
The author of this article explores the evolution of the graphical user interface. As you read
the article consider the following question:
How has the invention of the graphical user interface impacted how the computer has been
used? What is the next step in GUI development?
Introduction to Computers 87
UNIT 3 – SUMMARY
The major systems software concepts discussed in this unit were:
The operating system comprises a set of programs that work with the peripheral
devices and computer hardware to control and organize the general operating
functions of the computer.
The functions of the user interface are to start application programs, manage
secondary storage, such as hard disks, as well as manipulate files and folders, and
finally shut down the computer safely.
The Graphical User Interface (GUI) uses graphics or icons which represent various
tasks.
Utility programs are tools that help the operating system manage the computer
system’s secondary or non‐priority jobs.
Language translators are these systems programs convert the data in a program
(source code) into machine language code (object code) that the computer can
then process.
Windows Explorer is a tool for organizing files on disk and uses several important
components to manage drives such as disks (floppy disks, CDs, DVDs, and memory
sticks), folders and files.
Folders are used to organize where the files are located, so that a particular folder
may contain all spreadsheet files, while another folder can contain all word
processing files.
A disk is a secondary storage device such as a floppy disk, CD, DVD, or memory
stick, where folders and files can be stored.
Introduction to Computers 88
The root folder is the main or general folder found on all disks.
Deleting folders also removes files and any subfolders in that folder.
Application software is what users require to complete their tasks, while system
software is the software that interfaces between the hardware to perform what is
required by the application software.
The word processing document life cycle, includes creating a document, editing or
modifying the document, formatting the document, saving and finally printing to
provide a hard copy.
Mail merge is one of the powerful features of word processing software which
makes it easy to create personalized letters and reports.
Workgroup applications are used by two or more users who work as a team to
achieve a common task.
Spreadsheets produce graphs based on the data given in a visual, easily understood
format.
SPSS (Statistical Package for the Social Sciences) is a software application that
manages data in a systematic way in order to perform statistical analysis on a set of
data.
System software plays an important role in the proper functioning of a computer system.
This unit explained the three main programs that comprise system software, namely
operating systems, utility programs and language translators. Of course different types of
system software are necessary for the different types of operating systems available. The
Introduction to Computers 89
user interface was also discussed as a mediator between the user and the computer
system, to ensure that the computer system performs certain complex or other mundane
tasks for the user.
This unit also introduced personal productivity software or applications software which are
stand‐alone programs that do not depend on other applications to function. Some popular
application software programs discussed were for word processing, spreadsheet analysis,
presentations, and statistical analysis. Some other applications such as workgroup and
enterprise applications were also introduced, since they are also widely used in the day‐to‐
day tasks in many businesses.
Introduction to Computers 90
UNIT 4: FILE AND DATA MANAGEMENT
INTRODUCTION
This unit explains how a computer file and data management system operates and is
accompanied by some practical activities which are useful in helping understand how files
can be organized on secondary storage devices into multiple folders and sub‐folders.
UNIT OBJECTIVES
At the end of this unit, you should be able to:
This unit consists of one Topic which describes disk and file management operations and
then is supported by some practical exercises that students are encouraged to complete.
Introduction to Computers 91
TOPIC 1 ‐ DISK AND FILE MANAGEMENT OPERATIONS
INTRODUCTION
This Topic uses Microsoft Windows Explorer as a tool for organizing files with data and
information into manageable areas called folders.
OBJECTIVES
After studying this topic, you will be able to:
FILE MANAGEMENT
In Microsoft Windows operating system, Windows Explorer is a tool for organizing files on
disk and uses several important components to manage drives such as disks (floppy disks,
CDs, DVDs, and memory sticks), folders and files. When Explorer is started, you will see the
directory window, which displays the contents of a specified folder on a selected drive.
Files, folders and disks must interact to organize information in a meaningful way.
Files are a collection of information, data, or program files. For example, an application
software program such as a spreadsheet or word processor is a program file, while the
document created using the spreadsheet or word processor is called a data file.
Folders are used to organize where the files are located, so that a particular folder may
contain all spreadsheet files, while another folder can contain all word processing files.
A disk is a secondary storage device such as a floppy disk, CD, DVD, or memory stick, where
folders and files can be stored. Consider a disk to be like a filing cabinet with the folders
similar to physical folders or drawers in the filing cabinet. These folders can therefore
contain files or rather paper files! So you can have many folders in a file, and the folders can
contain many files! Also, just as your filing cabinet can become full of files, your disk
(storage device) can also become full.
Introduction to Computers 92
Table 4.2 Designated Drive Letters
Another Hard Disk Drive Can be given another letter such as D:\ or more depending
on the number of installed hard‐drives on the computer.
Memory Stick (also If there are two hard drives on the computer, then it is
called Flash drive) designated E:\
A Network Drive H:\ or higher ‐ Note network drives do not physically reside
on your desktop or laptop computer. To connect to a
Network Drive your computer must be installed on a local or
wide area network.
Once you create folders within the root folder, then these folders are called subfolders. So
if the root folder contains another folder called WORD, then the folder is identified by its
name preceded by the name of the root. Therefore we have in our example, A:\WORD
which indicates that the subfolder WORD is in the root folder of the A: drive. Folders can
have more folders within them. So if ASSIGN1, is created within the WORD Subfolder, then
A:\WORD\ASSIGN1 indicates that the ASSIGN1 subfolder is within the WORD subfolder
contained in the root folder of the floppy disk. Another way to describe the hierarchical
nature of the above example is below:
Introduction to Computers 93
Activity 4.1 ‐ Using the Directory Window
Launch Windows Explorer by right‐clicking the Start button and selecting Explore. Then
Double‐click on the icon located in the left panel. (you may not see
the numbers before the C:. A list of folders will be displayed in the right panel. Double‐
click the WINNT or WINDOWS folder depending on the system you are using. (You may
get a message telling you that these files are hidden for security reasons. Simply click the
on the Show Files option.) You can also double‐click on any folder for this activity; the
Explorer title will be updated to reflect the name of the folder that you have opened.
Double‐click the Desktop folder in the left panel, or in the file list (in the right panel), and
notice the files change to reflect those in the desktop folder.
You should now select and click the View pull‐down menu, and notice how the Explorer
panels change with each option. Try the four options in the Arrange Icon option and
Details option to see the result.
Introduction to Computers 94
CREATING AND DELETING FOLDERS
You can also create and delete folders in Explorer. To create a new folder, you first need to
know WHERE your folder will be located, such as the desired drive, and then the directory
from the tree (left panel). Select the disk and folder that you want to create this new
subfolder within, and select File New Folder from the menu bar.
You need to be careful when deleting or removing folders, since you may remove a folder
with important files still within it. Deleting folders also removes files and any subfolders in
that folder. Click to select the folder, and then select File Delete from the menu bar.
Launch Explorer and put your floppy disk in the floppy drive. Click on the Floppy Drive
icon.
Select File New Folder. Alternatively you can right click in the right pane and select
the New Folder Option
Type DISTANCE and press [ENTER]. The new folder has been added under the A:\ root
directory. Double‐click the folder DISTANCE and select File New Folder (or once again
right click and select New Folder). Type ACTIVITY. Your directory tree for the floppy
disk is shown:
Click on the DISTANCE folder. To delete this folder (and all its contents), select File
Delete from the menu, or press DELETE. Click OK when the Confirm Delete dialog box
appears.
Introduction to Computers 95
DISK AND FILE MANAGEMENT OPERATIONS
Windows Explorer allows the management of files such a wide range of file activities
including copying, moving, deleting and renaming.
Copying Operation ‐ In order to copy one or more files from one folder to another, these
file(s) should be first selected from the directory list. Multiple files can be selected from the
folder by clicking on the first file (remember, do NOT double click as this will open the
document and not select it), then hold down the CONTROL key while clicking on each
individual file. If the files are located together, then first hold down the SHIFT key and then
click on the first and then the last file. All files between the first and last will be selected. A
file can be de‐selected by clicking on the file a second time. After selecting the file(s) use
the Edit Copy command, or hold down the CTRL key and tap the letter C on the keyboard.
Click in the destination folder on the desired drive, and select Edit Paste. Your files should
be copied to the desired folder.
Moving Operation ‐ To move one or more files, first select the required files, as in the
copying operation above. With the files selected or highlighted, click and hold on the
selected files. Then drag the mouse pointer onto the destination folder name in the tree
and release the mouse button. You should check to see that the files were actually moved
to the desired location. Alternatively, files can be moved by first selecting the files and using
Edit Cut, to remove the files from the first location. Then click in the destination folder on
the desired drive, and select Edit Paste to move the files to this folder.
Renaming Operation ‐ Renaming files is accomplished by selecting the desired file and then
choosing File Rename from the menu. Simply type in the new filename and press Enter.
First create the following tree structure on your floppy disk, or memory stick
(removable disk)
Use Start, Programs, Accessories, and Paint to create the four bitmap files and save
those files with a Monochrome Bitmap file format. Use WordPad or Notepad to create
and save the four text files shown. You do not need to type anything in the file. Save
these files in the root folder of your disk. Also make sure your files are arranged by
type in Explorer.
Introduction to Computers 96
Copy all bitmap files from the root (Distance) to the Graphics folder. To do this:
Click on the first file Assign1 Graphic, hold the SHIFT key down and click or select the
Assign4 Graphic to select all of the graphic files.
Select Edit Copy from the menu, or hold down the CTRL key and tap the C key. Click
on the Graphics folder in the directory structure (left panel). Select Edit Paste, or CTRL
V to copy the files. A dialog box will show you the files as they are copied.
Click on the first file Assign1, hold the SHIFT key down and click or select the Assign5
text file to select all of the text files.
Select Edit Cut from the menu, or hold down the CTRL key and tap the C key. Click on
the Assignments folder in the directory structure (left panel). Select Edit Paste, or
CTRL V to copy the files. A dialog box will show you the files as they are copied.
Delete the remaining files from the root. Select all files in the root and tap the DELETE
(DEL) key. Select YES when the Confirm Multiple File Delete dialog box appears.
Rename files. Click on the System Software folder in the Tree. Select File Rename
from the menu, and type in the new file name: Operating Systems. Press ENTER.
Click on the Application Software folder and press DELETE. What happens? Since you
do not actually want to delete this folder, what should you do?
TOPIC SUMMARY
In this topic we explored how to create a file and data management system that will ensure
you are able to effectively store and retrieve information from your computer system. An
effective business will treat its data like gold. You must know how to protect, how to store
it and how to back it up.
Introduction to Computers 97
RECOMMENDED UNIT READINGS
After you have completed your review of the topic and its related activities, you should
review the resources available at the site described below. As you are reviewing the
information in the University consider the related reflective questions as you read the
materials.
Instructions: As minimum review the two tutorials (Windows File Management and
Macintosh File Management) and the Best Practices in File Management PowerPoint
slideshow. Consider the following question:
How can I use the best practices and tips and tricks presented in the tutorials and slideshow
to better manage the files and data on my own computer?
Introduction to Computers 98
UNIT 4 ‐ SUMMARY
The following concepts were explored in this unit:
4. A disk is a secondary storage device such as a floppy disk, CD, DVD, or memory
stick, where folders and files can be stored.
5. The root folder is the main or general folder found on all disks.
6. Once you create folders within the root folder, then these folders are called
subfolders.
7. To create a new folder, you first need to know WHERE your folder will be located.
8. You need to be careful when deleting or removing folders, since you may remove a
folder with important files still within it.
This unit explained the difference among terms such as disks, files, folders and sub folders
and root folder. It also noted the various disk drive letter designations when performing
data and file management tasks.
Introduction to Computers 99
UNIT 5: INPUT AND OUTPUT DEVICES
INTRODUCTION
This unit builds upon earlier descriptions of computer hardware and provides detailed
descriptions of the devices needed by systems users to input information and how to view
the output of processed data and applications programs.
As note earlier hardware input devices are integral in processing data into meaningful
information. Different hardware devices enable data to be input in a form that the
computer can process and translate into an understandable form for humans to interpret.
Output devices are peripheral devices that enable us to view, hear or store the result of the
computer’s processed data. Note that output of processed data is different from storing the
processed data before it is output. Storage of data and the associated storage devices are
discussed in Topic 5 of this unit, however in this Topic, we describe the need for output
devices and explain why some output devices are more suited for certain applications than
others.
UNIT OBJECTIVES
At the end of this unit, you should be able to:
OBJECTIVES
After studying this topic, you will be able to:
5. List the pointing devices and the advantages and disadvantages of each.
DATA INPUT
Before we can use the computer for various tasks, including surfing the Internet or as part
of our daily work, computer systems need to convert data into meaningful information or
representations that are familiar to the user. Data can be obtained in various forms for
input into the computer. Actions by computer users are the most common way of inputting
data. Other ways input data into a computer for processing is through is the transfer of data
(or files) from other storage devices (such as a hard‐drive, memory stick or CD ROM) and
transfer of data from another network computer.
Raw data, such as words, numbers, pictures, symbols, graphics, or sound which
needs to be processed into meaningful data.
Software programs that give the computer its instructions and therefore need to be
transferred from an external storage device to the computer’s internal memory.
Responses or prompts either through sound or visual boxes requiring the user to
usually provide some typed response, reply or feedback, such as OK, Cancel, Yes or
No.
2. List two ways in which data can be inputted into the computer.
3. Give two examples of the type of data that can be input into a computer.
Hardware devices are used to translate data into a form that the computer can process can
be placed in three general categories: Keyboard, Pointing and Source Data Entry. The
devices in these categories used to get this data input to the computer are described below.
THE KEYBOARD
A computer keyboard is the most common method of
inputting data into a computer’s memory directly. The
keyboard is an improvement on the typewriter and
comprises keys of letters, numbers, some punctuation
marks and other symbols as well as some pre‐defined
keys called function keys. The user can type words and
other commands which are converted into electrical
signals (ones and zeros) and input into a computer’s
memory.
Keyboards are produced in various shapes and sizes to suit users’ specific needs. Today
keyboards that are ergonomically designed are popular to present injuries such as carpal
tunnel syndrome or other repetitive hand and wrist injuries. Keyboards have also been
created to support individuals with different physical disabilities. These include Braille
keyboards for those that are blind, one handed keyboards for those users who can only use
one hand, keyboards for special purpose devices (such as a Personal Digital Assistant or cell
phone) and digitally projected keyboards that allow a keyboard to displayed in a variety
locations.
A mouse can provide input in a number of different ways. Specific actions that are included
in all mouse pointing devices include:
A recent addition to the design of the mouse is a rotating wheel which, when scrolled up or
down, correspondingly scrolls the page up or down with a text document. The cordless
mouse gives added flexibility to the user, by removing the connection of the cord to the
computer; however the mouse must remain in sight of a receiver to work.
The mouse allows the user to quickly move the cursor on the screen instead of typing
commands on the keyboard to move data around the screen. However the use of the
mouse requires constant hand and wrist movement and like the keyboard may result in
wrist injuries.
There are a number of other pointing devices that have evolved since the mouse was
invented. Many of them have capabilities that are similar to the mouse. These specialized
pointing devices add additional features that support customized software applications that
can react based on the input devices. Some of the more common pointing devices are
described in table 5.1.
Trackball and Some look like an Uses less space Again requires much ball
track point inverted mouse for movement control using a finger or
with the ball on than a mouse thumb. Also using same
the top or side of would, and so is wrist muscles is tiring and
the trackball for not as tiring as can also cause injuries.
the user to roll. using the
The track point is mouse.
more commonly
found embedded
in the keyboard of
laptops
Touch Screen The user makes The natural Reaching out to touch the
selection by just tendency to areas on the screen can
touching the touch an object become tiring if there are
screen is a distinct many choices to be made.
advantage of the The screen must also be
touch screen. large enough to
accommodate the several
choices since fingers pads
are bigger than the thin
cursors.
Pen Input Used generally in Apart from its Device must be trained to
Personal Digital small size, it can recognize user’s
Assistants (PDA)or imitate handwriting. Also the user
Tablet PCs. handwriting can lose the pen since it is
Functions like a instead of typing not usually attached to the
mouse with using keyboard. device
clicking replaced
by tapping the
screen.
Touch Pad Uses a touch Similar to the The constraints of the size
sensitive pad for touch screen of the touch pad can be
controlling the restrictive, and constant
cursor. Cursor reaching for the touch pad
follows sliding can also be tiring
finger movement
across the pad.
Buttons allow for
clicking, or tap on
the pad with a
finger.
Game Console
1. Explain one common problem that can result from constant use of pointing
devices
2. Can you identify those persons who will not be able to use pointing devices?
OBJECTIVES
After studying this topic, you will be able to:
2. Explain biometrics.
Activity 5.3 ‐ A weather station uses SENSORS to take various readings or measurements
which are stored or logged for later use.
1. State the general name for the type of input that is required to take these
readings.
2. State are the advantages of using these devices to log the data compared to a
human being taking the measurements.
3. Explain the kinds of readings that could be taken by the weather station.
BIOMETRICS
Biometrics is a human‐biology input device, which uses a user’s body characteristics as
input to a computer system. These characteristics include fingerprints, face structure and
hands to the patterns in the eye's iris.
SCANNERS
The scanner is like a photocopying machine. A document is placed on a glass plate and a
light emitting diode is passed over the document and the content of the document is
converted to a digital image. Scanning software allows the users to take the captured
BARCODE READER
Barcodes are different groups of vertical bars that
represent specific types of data that can be read by a
barcode reader. A barcode reader is a specialized type of
scanner that captures the bar code and passes the data to
a specialized application or data base for interpretation
and output to a specific hardware device. Businesses such
as supermarkets and clothing stores now use printed bar
codes on products and letters to track inventory and
calculate the sale at the checkout counter. Post offices
and courier services use bar code readers and forms with
bar codes to track and sort mail and packages.
Barcodes make it easier for a business to track their inventory and maintain their stock
balances in a way that supports just in time sales and distribution. Barcodes generally
contains product details such as product name, size, manufacturer, country of origin. They
can be customized to show location, time in, time out, etc. As each product bar code is
scanned, the symbols in the bar code are translated or converted into digital code. At the
same time, the stock value is automatically reduced by one.
The most suitable input device for creating a short report would be a:
1. Mouse
2. Scanner
3. Keyboard
4. Joystick
The most suitable input device for selecting (highlighting) text on a screen would be
a:
1. Joystick
2. Mouse
3. Keyboard
4. Touch Screen
In order to create a digital image from a paper photograph you would first need to
input it using a:
1. Scanner
2. Joystick
3. Digital Camera
4. Touch Screen
1. Receipts
2. Photographs
3. Cheques
4. Barcodes
1. Barcode Reader
2. Optical Mark Reader
3. Magnetic Ink Character Recognition
4. Magnetic Strip Reader
A variety of other miscellaneous input devices are now in use to capture just about any
form of input available. Let us examine a few of these input devices.
Voice recognition software is also used by the disabled to input commands to voice enabled
application software. For example The Windows 7 operating system has the capability to
control all menus via voice input. If you have a Window based computer check out the
“Speech Recognition” icon located in the “Control Panel”.
DIGITAL INPUT
Digital cameras are quickly replacing film cameras. Instead of waiting for the film to be
developed, pictures can be taken and re‐taken, previewed before they are stored. You can
choose to print what pictures you wish to print, you can delete unwanted pictures and with
the add of photo editing software, you can change the look of your pictures. The images
are transferred to a computer using special software and a USB
cable or digital flash card (called an SD card). The printed picture
depends on both the quality of the paper and printer. Or you can
choose to email your pictures to photo production companies
that will print the selected photos and return them to you.
Today’s smart cell phones have both a digital video and still camera capabilities. Transfer of
photos or videos can be easily accomplished using a digital SD card or by attaching the
phone to a computer using a USB connection.
TOPIC SUMMARY
Many of the input devices explored in this topic discussion are used by many retail and
information processing businesses. You must consider the different methods of data input
and the types of input devices you will need to support your business environment.
OBJECTIVES
After studying this topic, you will be able to:
The level of resolution depends on two hardware components: the monitor and the video
card. Monitors are made to support different video resolutions and video cards are made
Monitors are made in various sizes, and these sizes are measured diagonally from one
corner to the opposite corner in inches (e.g. from bottom right corner to top left corner
reflects the size of the monitor). Therefore the size of a monitor includes the case around
the viewing area of the screen. Common monitor sizes range from 15 to and 21inches.
Although monitors come in various sizes, the quality of the output on the screen is also
important. The resolution and refresh rate also determine the quality of the monitor
display. We have discussed resolution, now lets look at refresh rate.
Refresh rate is the number of times per second the pixels are recharged, so that the image
on the screen remains consistent, and not flicker. The faster the refresher rate the better
the picture. Refresh rates are measured in hertz (HZ) and based on how fast the horizontal
and vertical resolution is completed. A typical refresh rate is 70 to 90 HZ. The higher the
number the better. Like resolution, refresh rates are tied to the capabilities of both the
monitor and the video card. Video cards can only refresh the screen as fast as the monitor
will allow it.
Activity 5.5 ‐ Briefly explain why a user would need a smaller or even a larger monitor size,
than a standard 15 or 17 inch monitor.
Today there are two types of monitor technology. The older cathode ray (CRT) monitor
looks very much like an older CRT television. It uses old technology and is slowly being
replaced by Liquid Crystal Display (LCD) monitors which use digital input vice analogue
input. The LCD monitors will soon replace the CRT monitors because:
LCD monitors are lighter and take up less space on the desk.
The one advantage of CRT monitors is that they are cheaper than LCD monitors.
LCD monitors come in a variety of types and sizes that include: passive (monochrome or
one colour), active, gas plasma, and field emission display screens, which are all beyond the
scope of this course.
Activity 5.7 ‐ You are a student who has saved some money to purchase a second hand
computer to produce your assignments, and to access your course work on the Internet.
Explain, with valid reasons what type of monitor you would purchase.
Audio output enables the computer to output sound using two components of the
computer system. The first component is a sound card, which is a separate card or board
installed on the computer system unit. A sound card is necessary to listen to a sound file,
play a recording or receive audio feedback from the operating system or other application
programs.
TOPIC SUMMARY
Often data is in the form of audio or highly detailed graphics, animations or video. If your
business requires audio, animation or detailed graphics output you need to consider using a
computer system with an appropriate audio or video card. In the next topic we will discuss
output devices like printers and other hard copy outputs.
OBJECTIVES
After studying this topic, you will be able to:
Impact printers strike a special hammer or wheel with the letter or character
against ribbon that has ink on it, thus leaving an image of the letter on the paper.
Examples include the dot‐matrix printer.
A non‐impact printer produces the characters and images without having to hit the
paper. These printers use either jets to spray the ink on the paper or lasers to burn
the ink onto the paper. Since there is no hammering against the paper, these
printers cannot print copies of the document using carbon paper. Examples include
laser, inkjet, plotters and multi‐function printers.
character on a Makes characters by Laser printer works like a copier Uses a pen that moves over a
gainst paper. spraying dots of ink onto large revolving sheet of paper.
ally useful for multi‐ paper It is used in engineering,
bon copy forms) drafting, map making, and
plicate copies are seismology.
e pins, the Letter‐quality printouts Very high quality output Determined by dots per inch
er‐looking the (dpi) produced
Graphics of low
f possible at all.
able Color printers available at Colour laser printers are available Color printers available
cheaper than laser printer but very expensive
sive Cost of printer is Depending on size, cost ranges Expensive initial costs but
inexpensive but ink is from reasonable to very costly. cheaper to operate per page
costly Running costs are higher than
impact printers but lower than
most ink jet printers.
low Slow, one page may take Very fast. Typical home laser Fast, but it depends on the
up to 10 minutes printers can print 8 pages per size of the file being printed.
minute (ppm).
OTHER TYPES OF PRINTERS
There are two other types of printers that act as an output device for personal and office
use.
Thermal printers use wax and heat to burn images on special paper.
Some older fax machines that use rolls of papers are considered
thermal printers. These printers are expensive to buy, and the paper is
expensive compared to plain paper. Thermal printers are used by
organizations, like publishers, who require top quality output.
Multifunction printers are output devices that can print, scan, copy
and fax a document using the same platform. Most look like a
photocopier but can perform these other functions. However, if one
component malfunctions, than the other components cannot be used
since the entire printer must be sent out to be repaired.
Intelligent Terminal ‐ This is another term for a typical computer system, with its
own micro‐processor, memory and storage devices. Examples of these terminals
are automatic banking machines (ABMs) or Point of Sale terminals found mainly in
supermarkets.
Smart Terminal ‐ This type of terminal comprises a monitor that displays features
such as bold characters as well as characters that blink on the screen. This monitor
therefore has its own processor. This is an older term, and today all PCs and
laptops would be considered smart terminals.
Dumb Terminal ‐ This terminal is simply an output device that has a monitor to
display information from a server or mainframe computer. It also has a keyboard
for simple data entry, but more importantly it has no means of storing any data
input and has no processing capabilities, A dumb terminal needs to be networked
and data input into a server or smart terminal.
The most suitable output device for producing a few colour brochures cheaply would be
The most suitable output device for producing a wage slip where the details need to be
printed through multi‐part (carbon) paper would be
The most suitable output device for an architect to produce large plans would be
The most suitable output device to quickly produce a large amount of high quality black
and white printouts would be
TOPIC SUMMARY
We have now explored a variety of output devices. Almost all business environments will
need printers and monitors to review the data in hard or soft form. But some businesses
may require speciality devices to print receipts, share visuals, or support data sharing in
different ways. You must consider your data formatting and output requirements as part of
your business planning process.
OBJECTIVES
After studying this topic, you will be able to:
OVERVIEW
Storage devices typically hold programs and data in manageable blocks or units called files.
It is the primary memory that is used together with secondary storage to temporarily
transfer the contents of a file between the two while the file is being used.
Activity 5.9 ‐ A school has 200 students who are learning Information Technology for an
external exam. The administration of the school generally keeps records of the students,
as well as the teachers’ payroll information and the alumni association.
Consider the types of storage devices are would be necessary in the day‐to‐day work for
the students, teachers and administration. If the school needs to backup all data, due to
the threat of a hurricane, then explain if any secondary storage devices would change
Storage technology.
Method of Access
The method of access is further sub‐divided into two sections, sequential access and
random access.
Sequential storage devices (also called serial storage devices) are those
that must start from the beginning of the data to be read from or
written to, and proceed through each unit after the other in a
sequence, until it reaches the required point. Therefore locating data
using sequential access takes different lengths of time, depending on
where in the list the data is located. Examples of sequential storage
devices are cassette tape drives, where the drive forwards or rewinds
the tape until it reaches its required target.
Random access storage devices can access data immediately without having to read data
from the beginning through to where the data is located. They search data based on a
table of contents for the data located on the device. Examples of these storage devices are
floppy drives and hard disk drives. These devices are also known as machine access, and
direct access storage devices.
Floppy disks are still common with students who are now beginning to learn Information
Technology, since they are relatively cheap. But these storage devices are quickly being
replaced by portable flash drives and CD ROM and DVD disks. The future of the floppy disks
is going the same way as beta tape recorders. Students who have projects small enough to
store on a floppy, can transfer these files from one computer (possibly at home) to another
(computer at school), while working on the project.
Again, storage devices can be further sub‐divided into magnetic and optical devices.
The benefits of using magnetic storage devices such as 3 ½” floppy disks, hard disks and
magnetic tape is that they can cheaply store large amounts of data. Magnetic tapes are also
similar to those previously used to record music, and are popular for use in the backup of
data.
A hard disk is a storage device which can retrieve data very quickly and can also store large
amounts of data, many times more than a floppy disk or cassette tape. They contain
multiple metal disks called platters, with read/write heads for each side of each disk.
The time taken to retrieve data includes the time taken to find the data on the disk (called
access time) and the time taken to transfer the data from the disk to primary memory. The
average hard disk has an average access time of 12 kps (Kilo‐bytes per seconds). A fast hard
drive is considered 8 kps.
If a storage device uses laser technology, then it is categorized as an optical storage device,
since it uses laser beams to read data etched into plastic disks. Simplistically the surface of
the disk will contain tiny indentations called pits. As a light‐sensing device scans the surface,
it picks up signals to interpret the data. For example, it receives no light from the pits, or
light if no pits are scanned, thus sending a series of signals to the computer. The compact
disk, more commonly called a CD, is the general term for these storage devices.
Optical disk storage also stores a larger amount of data than floppy disks, and are usually
categorized according to they ability to read or write or both read and write data to the
disk. They are generally used for mass distribution of information such music, video, or
computer programs. Standard CDs can store approximately 80 minutes of music.
CD‐ROM Compact Disk‐ The drive can only read data from and not write data to
Read Only the disk. Stores up to approximately 700 MB of data on
Memory. one disk. Primarily used for distribution of many types of
software They are used for storing large application
programs, and multimedia programs.
CD‐R Compact Disk‐ Can be read from and written to. Note however that disks
Record (once) can be written to only ‘once’ Disk can be read by either a
CD‐ROM or CD‐R drive.
CD‐RW Compact Disk‐ Disks can be read and written to many times and are
Re‐Writable therefore erasable. CD‐RW drives are capable of reading,
writing, and erasing data. Note that the write operation is
much slower than the read operation, and hence not as
popular as the others.
DVD‐ Digital Video Mainly used for video storage (DVD‐Video) but can also
ROM Disk‐Read hold audio. DVD‐ROM device is used for computer data
Only storage.
Table 5.2 Comparison of storage capacity and access speed among storage devices
Solid state storage devices are electronic and have no moving parts like the other
mechanical storage devices such as the hard drive. Examples include flash memory sticks
for storing general files, memory cards for video game consoles, and other devices used in
digital cameras, disks in laptops. Flash memory is a type of EEPROM chip but it used more
as a hard drive for data storage. These popular memory stick or flash drive is quite similar in
Activity 6.2 ‐ The floppy disk was previously used as the typical method for distributing
software adopted by software houses and developers.
Describe one occasion where it would still be sensible to use a floppy disk for software
distribution. (2)
State two different ways, other than by floppy disk, in which software can be distributed.
Online storage This is primary storage. These storage devices are readily
available computer system, and there the user is not required to
issue any instructions.
Near‐online storage This is secondary storage. The user usually needs to insert a disk
in order to access the data implying that some intervention from
the user is required to make the data available to the computer
system.
Offline storage This is also tertiary storage or archival storage, since this is not
usually available to the computer system. A tape backup unit for
archiving is an example.
TOPIC SUMMARY
Data storage is critical to any business. You must protect your data and store in a way that
if anything happened to the computer system that it could be restored on another similar
system. Critical data should be stored off site and backup systems should be in place to
save data on a regular basis.
Hersh, J. (1998). The Tyranny of the Keyboard. FAQ Typing Injury. Available at:
http://www.tifaq.org/articles/keyboard_tyranny‐feb98‐jay_hersh.html.
Murat, J.K. (2007). How Do Laser Printers Work. Ezine Articles. Available at:
http://ezinearticles.com/?How‐Do‐Laser‐Printers‐Work?&id=747072.
How have input and output devices facilitated humankinds need to capture, store and
create new knowledge?
Brain, M. (ND). How Hard Disks Work. HowStuffWorks.com. Available at: from:
http://www.howstuffworks.com/hard-disk.htm.
What type of storage device is appropriate for my personal use? Is my storage needs the
same as others?
Input includes software, data, or information that is entered into the computer’s
memory.
Input devices such as the keyboard, mouse, and trackball enable the user to enter
data into the computer’s memory.
Video and images can be entered into a computer through using digital cameras or
scanners.
The following diagram illustrates a number of input devices that can be attached to
a computer in the keyboard, pointing and source data entry categories.
The following concepts related to output devices was discussed in this unit:
Monitors enable the user to view the computer’s processed data. The output is
known as soft copy.
Softcopy output can be further sub‐divided into visual output (on screens) and
audio output (from speakers).
Two types of monitors are the cathode ray tube (CRT) and the liquid crystal display
(LCD).
Input devices can be categorized by keyboard, pointing and data entry from the source.
Each category has its own advantages and disadvantages although some users are
somewhat inclined to use some types over others. The main concern with input devices is
Output devices are either softcopy or hardcopy output. Softcopy is usually temporary
output while hardcopy output can be printed and stored for future use. The various types
of soft‐ and hard‐copy output must depend on the appropriateness of the application.
The concepts related to storages devices that were discussed in this unit included:
Secondary storage is used to save your data when the computer is turned off and is
cheaper than primary memory
Storage devices typically hold programs and data in manageable blocks or units
called files.
Optical storage devices include, CD‐ROM (Read‐only), CD‐R (Record once), CD‐RW
(Erasable, write repeatedly), DVD‐ROM (Read‐only), and DVD‐R (Read/write).
Solid state storage devices include PC cards, flash memory cards, and smart cards
Secondary storage is very important in the long‐term storage of data and information.
However the appropriate use of these devices depend on the method of access to data, the
type of technology, the user’s preference of online or offline storage as well as the type of
operations that are to be performed.
UNIT OBJECTIVES
At the end of this unit, you should be able to:
3. Define a network.
OBJECTIVES
After studying this topic, you will be able to:
COMMUNICATIONS
In our day to day lives we regular communicate with others through talking, writing, and
actions. Computer networks communicate by first becoming linked to each other, so that
data and resources can be shared. For example, two or more computers can be connected
to each other, along with one printer (a resource), so that each computer is able to print
form this one printer. This is known as a simple network and you are sharing output
devices via the network.
Activity 6.1 ‐ Discuss one other advantage and one disadvantage of sharing (a)
data and (b) resources, in a network.
Computer communication is achieved when signals are sent and received among and
between different computers. This exchange of signals allows users to collaborate with
other online users in different countries. Individuals can share and retrieve information and
files they can exchange electronic mail and participate in electronic messaging with others
from all over the world.
Computer communication has provided contact among users from different cultures,
continents, and time zones. Indeed, telecommunications technologies such as land lines,
satellite, cable, the Internet and cell phone technology have made communication possible
and affordable over long distances. Many business organizations and individuals have taken
advantage of teleconferencing and videoconferencing – conferencing available on the
Internet, and through you telephone, cable and satellite providers. Today people do not
have to travel for meetings or conferences. Telecommunications technologies allow
TRANSACTION PROCESSING
In previous years data and information were stored in a central location, and many users
would simultaneously access this single location to retrieve data required for a transaction,
or other reasons. This caused problems, as not everyone was able to access data in a timely
fashion. Large numbers of requests to a central processor or storage location takes time
taken to send and retrieve the large or small amounts of data or information. The volume
of data moving through the system often slowed the system down and at times even
crashed or shut down the system. With computer communication systems now available,
data and information (and indeed the workload) can now be dispersed (or distributed) to
various sites, subsidiaries or branches of the business in other areas of the building or
country.
Indeed many large corporations link some parts of their systems with the systems of their
major customers. This inter‐organizational system link also allows the corporation’s systems
to link to suppliers for electronic data interchange (EDI). This facilitates speedy order
processing and other transaction processing.
INFORMATION RETRIEVAL
Information retrieval is important for decision making in business, industry, research
organizations, and even for entertainment. Various types of information (such as music,
text, sound) can now be stored in private or public databases. Once these databases are
made available online, they can be accessed by select persons either through the use of the
Internet, or an internal company network, called an Intranet.
1. size 8 brown shoes (you choose whether male or female shoes and the style!).
Notice that as you search for the item, you are accessing large databases, and narrowing
the search each time until you find your item
Activity 6.5 ‐ Electronic messaging has become an integral part of many cellular phone
users’ daily communication. Discuss the difficulties in written communication that may
arise from employees’ continued daily use of slang, such as ‘u’ for ‘you’, ‘4’ for ‘for’, and
AFAIK for ‘As far as I know’.
UNIT OBJECTIVES
After studying this topic, you will be able to:
3. Describe the differences between local area networks (LANs) and wide area
networks (WANs).
NETWORK TOPOLOGIES
The physical layout of a network is called a topology. The four main topologies will be
discussed in this section.
A network is a collection of computers which are connected together. When sketching the
topology, each computer workstation, file server or other peripheral is generally called a
node. A network topology therefore, is the arrangement of the network, whether physically
(the actual layout including cable installation), or logically (the actual operation of
transferring data), according to the requirements of the network. This Topic will discuss
four general network topologies.
Bus Topology
This linear bus topology is one of the simplest of the four network topologies to use, in its
most basic form it is simply a case of running one cable called a backbone, from the
computer or peripheral device at one end of the network to the last peripheral device or
computer at the other end. Other computers, scanners, printers or other peripheral devices
are then attached to the backbone anywhere between these two end computers.
Of course from the simple description above, it seems relatively easy to connect a
computer or peripheral to this topology. It also requires less lengths of cable than the other
topologies, so it can be economical.
Since all computers and peripherals depend on this single cable or backbone, the entire
network will not work if there is a break in the backbone. This will also prove difficult to
identify where the problem or break is located, if the entire network is not working. This
topology is also not intended to be used as the only network arrangement where numerous
computers and peripherals are to be connected. Finally it has the lowest fault tolerance,
that is, a single problem in the network with a bus topology can halt all of its activities.
A star topology connects computers and peripherals to a central device called a hub.
Physically the topology looks like a star. So that when a node is sending data to another
node, the data passes through the hub before continuing to its destination node. The hub
therefore manages and controls the network.
A new node is relatively easy to install by adding a cable from the new device to the hub.
Installing and even removing nodes do not cause any disruptions to the network, so this
topology has high fault tolerance when troubleshooting to detect faults and to remove
nodes.
Of course if the hub fails, then all nodes attached to the network are disabled. It is also
more expensive than the bus topology because of the cost of installing the cabling and
configuring the hub.
Ring Topology
The nodes in a ring topology are connected to the nodes on its left and right, so that data
passes from one node to the next. Of course fault tolerance is non‐existent since failure of
one node cripples the entire network. This is why the physical ring topology is rarely used.
Adding a new device to an existing physical Ring network can be complicated as any new
device needs to go in‐between the existing devices.
In order for a LAN to function, a network interface card (NIC) must be installed in the
computer to provide the connection between the computer and the network. The main
operating system software that supports networking are UNIX, Linux, Windows, and Mac
OS. Two types of LANs are peer‐to‐peer and client‐server, which employ a bus or ring
topology.
PEER‐TO‐PEER NETWORKS
All computers on a peer‐to‐peer network are configured similarly with no specific computer
designated as a file server. Also the users in this type of network determine which files and
peripherals attached to their computer that they wish to share. This is why peer‐to peer
networks are simple to set‐up as home businesses, and are not appropriate when there are
many computers.
CLIENT‐SERVER NETWORKS
Client‐server networks can be set up using various topologies, and are appropriate in large
corporations. The network requires file servers which contain the many application
programs. The clients are the networked computers which access the server to obtain and
use the programs, data, and to access peripherals.
The Internet is a network of networks, which link local, regional, national and international
computer networks to exchange data and process tasks. In order to efficiently process
these tasks and exchange data, a standard called TCP/IP (Transmission Control Protocol/
Internet Protocol) comprises a set of rules which must be followed. The telecommunication
links among the networks of the Internet are built and maintained by major
telecommunications companies around the world. Each computer connected to the
Internet is recognized by a unique number, officially known as an ‘IP Address’. Data travels
the Internet from origin computer to destination computer in small chunks called ‘Packets’,
with the help of ‘routers’.
Activity 6.6 – Identify some of the local Internet service providers in your country, and
visit their web sites. Compare the costs of dial‐up and faster Internet connections, as well
as speeds of connectivity for each one.
Web Browsers
Just as you would use a software program such as a word processor, web browsers are also
software programs that are also installed on your computer. Their purpose however is to
allow you to access one or more web pages. In simpler terms, a web browser is just a way
to help you get around the Internet, so whenever you type in an address for distance
education to access your notes, for example, you are using a browser. Browsers are also
useful for downloading files from databases stored on the Internet, and linking you to other
pages from a main home page. Each browser keeps a list of the pages you have viewed on
the Web, so that you can return to that site, even if you visited it days ago.
A typical web page contains mostly text, with some pictures, and even media such as
movies or other small programs. Your browser translates the HTML language that was used
to create each web page into a presentable form that users can understand. Figure 5.1
shows a typical browser while figure 5.1 shows the html code that was used to create the
web page.
Activity 7.8 ‐ Write short notes to explain the purpose of bookmarks, cookies, tabbed
browsing, pop‐up blocker, security options, auto‐fill capabilities for web‐based forms, as
they relate to Internet Browsers.
There are many different browsers available, although the popular one is Internet Explorer
(or IE). However all browsers should be able to load web pages without much difficulty and
at about the same speed.
SEARCH ENGINES
Search engines access many web sites which match your request, and then show a list or
sample of the web pages so that you can select those that you are interested in. generally,
search engines carry out some of the following tasks. Gather a list of web pages:
Based on a user’s search for a word, phrase, web page or similar option.
Through listing each page that contains the search word or similar words.
If the search word is an embedded link on a web page, then the search engine
peruses that link also.
Search for a word or phrase in a browser window, will produce those web pages that are
relevant to what you are searching for. However, words and phrases differ in context, so
you may also see other listing which do not relate to what you need. In addition, you may
also see duplicate listings since the search will list the web page with your search term, as
well as all of the links from the same web page that also contain the search term.
Activity 6.9 ‐ Internet cookies or web cookies are used to collect basic information on
users as they visit web sites. Perform a search on the Internet for the term ‘cookie.
Note how many pages of results are produced. Also peruse two or three pages and
note how many web sites show results that may be relevant to the search term.
Remember you are looking for the sites based on cookies relating to the Internet! Make
a note any web sites that have no relation to the search term.
HTML (Hypertext A language to create web pages. The file extensions used are
Markup Language) .htm or .html
The Web (or World A collection of files that are interconnected through of
Wide Web) hypertext.
After reviewing the article think about the complexity of the networking environment and
consider:
Linear bus topology is one of the simplest of the four network topologies to use.
Star topology connects computers and peripherals to a central device called a hub.
Ring topology are connected to the nodes on its left and right, so that data passes
from one node to the next.
A Local Area Network (LAN) is a computer network that functions within a specific
geographical area, such as a building, school or campus.
Wide area networks (WANs) connect LANs which are located at different
geographical locations.
The Internet is a network of networks, which link local, regional, national and
international computer networks to exchange data and process tasks.
Web Browsers are also software programs that are also installed on your computer.
Search engines access many web sites which match your request, and then show a
list or sample of the web pages so that you can select those that you are interested
in.
In the previous units we explored the input, processing, storage and output of individual
computers. This unit introduced communication among computers once they were linked
together in different ways to form a network. It thus enabled the user to engage in
telecommunication, teleconferencing and then telecommuting.
The major assignment for this course is to produce a detailed analysis of the hardware,
software and network requirements for a small business and its growth over three to five
years. The assignment will require the participants to produce the following:
1. Three to five page report using a word processor of your choice (e.g. MS Word,
Open Office Word, etc.). The report should include:
b. Reflect the use of word processor template with Title and Headings.
2. Presentation of five to ten slides that describes the technology solutions reflected
in the written report. The participant may select the presentation software to be
used to produce the project presentation. The layout of the presentation should
include:
3. The third part of the assignment is to create a spreadsheet that illustrates to cost of
the equipment and the annual operation of the technology support required by the
business. You should include the creation of a web site as part of the marketing
solution. Participants may select the spreadsheet software to be used to produce
the budget. The spreadsheet should:
b. Costs should be represented as either Capital costs (one time only) and
Annual Operating costs (spent over a period of 12 months).
4. All three files should be emailed to your instructor for feedback and review. Your
instructor will provide additional instructions on where and when to submit the
assignment.
COURSE SUMMARY
You have now completed this introductory course. It is hoped that the course has given
you a solid understanding about how computer and information technology systems
operate. Today’s entrepreneur must embrace technology and to do so he or she must
ensure they have a good grounding in the basics of ICT. This course will prepare you to
complete the next course in the series “Business Information Systems” in the Business and
Entrepreneurship Diploma programme.
Relevant
Complete
Accurate
Clear
Reliable
Concise
Timely
Suggested Response
Data should be complete so that the user can make conclusions after analyzing all
the parameters available
Data should be accurate since errors can results in bad decisions, or even loss of life
Data should be reliable so that users are able to trust its interpretations and
analyses
Data should be concise because extra, or non‐important data may result in bad
decision‐making, and also increases the time to pick out the important data
Data must be timely, since out‐of‐date data may result in irrelevant decision‐
making
Activity 1.2 – Describe how computer technology is integrated in the following sectors:
Agriculture
Education
Suggested Response
Trends can analyze the increase/decrease of pests in crops, or the usefulness of certain
insecticides, or types of species of plants and their effect on other crops
Education can be used to simulate how some tasks are done. Videos can show students
various illustrations and examples in some subjects that the students would not otherwise
get to experience
The use of musical scores and video productions are important in many areas of the theatre
or the Arts.
Activity 1.3 – Think of some specific examples that you could use to explain what is meant
by the phrase:
“… computer technology has enabled us to access information … from many places, in many
places, at any time…’
Suggested Response
You should have consider the use of email, fax, cell phones, Voice Over IP phones and
others as good examples that illustrate this phrase.
Activity 1.4 – Think about two procedures or methods that should be implemented to
ensure that information is not lost or destroyed.
Suggested Response
You should consider location, as well as physical and logical prevention methods.
Backing up and even storing the backup data in other locations are two examples of
location methods. Also using appropriate secondary storage devices can be discussed,
illustrating the pros and cons are physical prevention methods, as well as the use of
universal power supplies (UPS) or surge protectors to prevent data loss are good discussion
points. Even the use of antivirus software, which is updated regularly is an example of
logical (software) prevention of data loss.
Activity 1.5 ‐ How would you explain the term "information superhighway" to a family
member? When considering your explanation highlight some characteristics that are
implied in the term.
Suggested Response
You should consider that information needs to be interpreted and analyzed before it can
become useful data. This requires information to move from one spot to another in the
Activity 1.6 ‐ Identify three companies in your country that have automated responses to
transfer you to an extension of department. Explain whether hearing an automated
response or a human voice has an effect on you, and what these effects are.
Suggested Response
Many large corporations, hospitals, telephone companies and universities use automated
responses. Occasionally the time taken to be transferred to the person may take a long
time, or the user may be transferred to different extensions and not reach a human voice.
This may result in frustration.
Activity 1.7 ‐ After viewing Google Street View, consider why investigators would want to
use surveillance to analyze pedestrian traffic in a town, or weather patterns in a particular
area of the country.
Suggested Response
To observe the natural patterns so that predictions can be made (in the case of the
weather) or decisions can be made on future changes in traffic flows or pedestrian
crossings. You should have considered such reasons as preventative measures, changes in
trends as communities change, and the type of surveillance used, such as video cameras,
and strips across the roads to check traffic flows on highways and other roads.
Different symbols that are used to represent emotions in email messages, instant
messenger and text messages.
Think of different words or phrases that have been shortened or modified in email
messages, instant messenger and text messages
Suggested Response
POS ‐ parent over shoulder; FYI – for your information; pls – please; thks – thanks
Activity 1.10 –
1. Space travel
2. Weather
4. Lost of limbs
Suggested Response
Computer models and procedural trainers are used to practice procedural tasks, explore
the impact of decision making, create situations that are too dangerous to do in real life
(e.g. explosive detection). Simulations are used to prepare for a disaster, or help architects
design and test stronger buildings to withstand adverse weather conditions before the
building is created.
Simulations allow us to go places we cannot go at the present time. Simulations are used to
train astronauts and explore potential scenarios for a flight to Mars and the creation of a
permanent human habit on another planet.
Simulation software can also be used to determine how artificial limbs should be fitted and
to help persons adjust to these limbs, and possibly resume certain activities.
Activity 1.12 ‐ Why would you and others want to perform self‐diagnosis using an Internet
medical search engine? Think about the precautions that you must consider when using
such search engines.
Suggested Response
Not all search engines provide accurate or up‐to‐date information and persons may obtain
the wrong information. Also, the source of this information may not be known to
authenticate its accuracy.
Activity 1.13 ‐ Consider the moral and ethical implications for using computer technology to
search databases for screening employees DNA; for other diseases such as HIV/AIDS; or for
conducting criminal background checks.
Suggested Response
Confidentiality and privacy are of utmost importance. There are also moral and ethical
issues involved which can be discussed
Suggested Response
Payment of registration online usually speeds up the registration process, but the user must
possess a credit card, otherwise acknowledgement of payment takes days or weeks.
If courses are taught online, then there is no need for accommodation. Other fees are
incurred for the accommodation on or off‐campus.
Student culture and activities are non‐existent if users are in an online environment.
Online studies produce varied class structures with generally little interaction among
students in the class. This is also similar in the exchange of ideas. Chatting, whether online
or in person, can be important for exchanging of ideas.
Activity 1.15 – Go to the discussion forum and with your peers discuss whether computer
technology and the automation of tasks has:
Discuss whether using computer technology has ‘created more jobs’ or ‘helped get the job
done’ within the Caribbean.
Suggested Response
Opposing views can be used in the discussion. Indeed lack of computer expertise could
certainly hinder productivity; laziness, resistance to change.
Activity 1.16 – Search the Internet and see if you can discover other social networking sites
that you would like to share with your peers. Once you find an interesting site than go to
the 1.14 discussion forum, post your link to the forum and provide a brief description of
why you think your site reflects the values of community building, social collaboration and
knowledge sharing.
Suggested Response
None. Tutor to view each site and where appropriate provide a comment.
Suggested Response
First, the instructor should obtain applications of artificial intelligence, then the advantages
and disadvantages can each be discussed
Sample of applications
medical diagnosis
interpretation (speech)
Factory scheduling
prediction (weather)
Activity 2.2 – Reflect upon what facilitated the increase in speed, power or memory in each
of the computer generations.
Suggested Response
Each computer generation caters to the speed of processing so that transactions are
completed in the fastest possible time. Also with each generation, more and more
transactions are created to be processed stored and accessed, hence the need for increased
resources.
Activity 2.3 ‐ Explain, with reasons, which computer system(s) would be most appropriate
in the following examples:
A multi‐million dollar company with six branches in the country and three in other
countries
Suggested Response
laptop
desktop
mainframe
workstations
Suggested Response
19. Trackballs, pointing sticks and touch pads do the same function as a X
mouse
20. Input devices take raw data and turn it into information X
Suggested Response
Automatic garage doors and some cars with special features such as automatic parking are
examples of devices with embedded systems.
Activity 2.5 ‐ Explain why the control unit is regarded as an efficient manager.
Suggested Response
The control unit has to manage the other components and therefore must be able to
coordinate the other components and their activities in order to arrive at the correct
output. The control unit must therefore be well‐organized and thus efficient.
Activity 2.7 ‐ In a test for the equal‐to condition, the arithmetic/logic unit compares two
values to determine if they are equal. For example: If the number of tickets sold
(Num_Tickets) equals the number of seats in the auditorium (Num_Seats), then the concert
is declared sold out. This can be represented as:
Num_Tickets = Num_Seats ?
Votes for Candidate A are less than the votes for candidate B
Suggested Response
Mark >= 50
Activity 2.8 ‐ Explain what is meant by the phrase “primary memory is deemed volatile”
Primary memory only holds the data and instructions temporarily, while you are working.
Therefore if power is lost while you are working, then all the data and instructions that
were in primary members will also be lost.
the four basic operations that comprise a machine cycle or instruction cycle; and
the difference between instruction time (i‐time) and execution time (e‐time)
Suggested Response
Question 1 ‐ Fetching is the process of obtaining a program instruction or data item from
memory.
Decoding is the process of translating the instruction into commands the computer can
execute.
Question 2 ‐ Instruction time (i‐time) is the time it takes the control unit to fetch and
decode instruction. Execution time (e‐time) is the time it takes the control unit to execute
the instruction
Suggested Response
A memory address is simply a unique number that identifies the location of a particular
byte in memory.
Identify a number of tasks that are carried out by all operating systems.
Describe at least one task that a multi‐tasking operating system would be able to execute.
Describe at least one task that a multi‐user operating system would be able to execute.
Suggested Response
Some of the tasks that are carried out by all operating systems include:
Controlling printers.
Running programs.
One of the major tasks that a multi‐tasking operating system would be able to carry out is
running more than one application program at the same time.
One of the major tasks that a multi‐user operating system would be able to carry out is
allowing many users to interact with the system to access data and programs at the same
time.
Activity 3.2 ‐ Graphical user interfaces (GUIs) are found on many computers.
Think of other input devices, other than a keyboard, that can be used with a graphical user
interface.
Suggested Response
Activity 3.3 ‐ You share a computer with four other family members. Over the last three
months, you notice an increase in files, and folders from the various projects and
assignments. There are also quite a few files which have been downloaded from the
Internet. Think about which utility programs would be appropriate, not only to organize the
many files and folders, but to generally use on this computer.
Suggested Response
The file management program would be useful to create folders with each family member’s
name. Then all relevant files can be moved to the respective folders and sub folders. Disk
defragmentation would be subsequently used to improve performance after the files have
be moved and re‐organized.
Since files are being downloaded from the Internet, an Antivirus program would be useful
to monitor and protect the computer from viruses and other attacks.
Activity 3.5 – Consider the different tasks that you can complete with project management
software. Also provide the name of one project management application package
Suggested Response
The purpose of project management software is to plan, schedule, allocate and manage
time, budget and personnel needed to complete a project by a certain schedule. Microsoft
Project is a popular software application. The student should be encouraged to investigate
the features of the application, either through browsing the Internet or by asking a project
manager.
List two ways in which data can be inputted into the computer.
Give two examples of the type of data that can be input into a computer.
Suggested Response
A user is someone who uses a computer system, whether directly or indirectly. For
example, a user is one who types a document using a word processor, or performs a
transaction using an automatic teller machine. Also a user may simply swipe a plastic card
to gain entry to a place.
Data can in input manually or through automatic data entry. Manual data entry involves the
use of a keyboard or other peripheral device and a user who enters the data. Automatic
data entry does not directly involve the user, since the data is captured directly from the
source and input into the computer or stored for transfer. For example, the scanning of
merchandise at the supermarket or a store, allows the code to be scanned directly into the
register where the price is noted.
Explain one common problem that can result from constant use of pointing devices
Can you identify those persons who will not be able to use pointing devices?
Suggested Response
Health problems usually with the fingers and hands (Carpal tunnel syndrome), can result
from constant use of pointing devices
Those persons who are physically impaired (missing fingers, hands or arms) or those who
have problems with hand‐eye coordination. Also, those persons with an illness which cause
the shaking of the hands.
Activity 5.3 ‐ A weather station uses SENSORS to take various readings or measurements
which are stored or logged for later use.
State the general name for the type of input that is required to take these readings.
State the advantages of using these devices to log the data compared to a human being
taking the measurements.
Suggested Response
Source data automation is the general name for the type of input.
Source data entry devices remove any possible data entry errors or other human errors that
can occur, thus ensuring that the data is as accurate as possible.
Activity 5.4 ‐ Choose the most appropriate response for each of the following questions on
input devices
The most suitable input device for creating a short report would be:
Mouse
Scanner
Keyboard
Joystick
The most suitable input device for selecting (highlighting) text on a screen would be a:
Joystick
Mouse
Keyboard
Touch Screen
In order to create a digital image from a paper photograph you would first need to input it
using a:
Scanner
Joystick
Digital Camera
Touch Screen
Receipts
Cheques
Barcodes
Barcode Reader
Activity 5.5 ‐ Briefly explain why a user would need a smaller or even a larger monitor size,
than a standard 15 or 17 inch monitor.
Suggested Response
Smaller monitors may be needed for use in, say police cars or small areas where monitoring
is necessary. Large monitors are necessary for persons who may need to view certain
documents or designs on screens bigger than the normal screen.
Activity 5.6 ‐ Explain whether a CRT monitor would be a good choice for a portable
computer display.
Suggested Response
A CRT monitor would not be suitable since it is cumbersome and heavy to move around. A
better choice would be a flat panel or LCD monitor
Activity 5.7 ‐ You are a student who has saved some money to purchase a second hand
computer to produce your assignments, and to access your course work on the Internet.
Explain, with valid reasons what type of monitor you would purchase.
Suggested Response
Activity 5.8 ‐ State the advantages and disadvantages of the following printers?
Suggested Response
Activity 5.9 ‐ A school has 200 students who are learning Information Technology for an
external exam. The administration of the school generally keeps records of the students, as
well as the teachers’ payroll information and the alumni association. Discuss the types of
storage devices that would be necessary in the day‐to‐day work for the students, teachers
and administration. If the school needs to backup all data, due to the threat of a hurricane,
then explain if any secondary storage devices would change from the day‐to‐day tasks.
Suggested Response
The students may use floppy disks or the more expensive flash memory sticks for their
work. Teachers and administration may use computer hard drives for maintaining student
and alumni records.
In the event of a hurricane, teachers may use flash memory sticks or CD‐ROMS for their
subject notes and student subject records, while administration may use CD‐ROM.
The instructor may also discuss the use a portable hard drives which use USB ports. These
drives can also serve as a backup storage device.
Activity 5.10 ‐ The floppy disk was previously used as the typical method for distributing
software adopted by software houses and developers.
Describe one occasion where it would still be sensible to use a floppy disk for software
distribution.
State two different ways, other than by floppy disk, in which software can be distributed.
Suggested Response
If the software is dated and only available on floppy disks, or if the program is so compact
that it can be stored on the floppy disk, then there would be no reason to use a bigger
storage device to store the program
Suggested Response
Advantage: This saves the cost of purchasing a printer for each computer.
Disadvantage: Printer located in an area that allows for others to see the printout
Suggested Response
Some business may not have the finances to afford the hardware and software for
telecommunications and teleconferencing. There is also the cultural considerations where
body language, tone, facial expressions are misinterpreted. In some instances, one is unable
to ‘reach over’ to show a colleague a comment or item on a document since all persons are
not in the same room physically.
Suggested Response
Some employees may prefer quite surroundings and may work well during the night.
Others may be physically impaired and unable to travel to work. Other appropriate answers
can be discussed.
Activity 6.3 ‐ Give a disadvantage of having all of a company’s data and information stored
in one location. Explain the measure(s) this company should implement to secure its data
and information.
Suggested Response
The data and information is at risk of being erased (if say, there is a hardware problem), or
tampered with (by unauthorized persons). Other suitable disadvantages are acceptable.
The data and information should be backed up regularly, and universal power supply (UPS)
on hand in case of power loss.
size 8 brown shoes (you choose whether male or female shoes and the style!)
Notice that as you search for the item, you are accessing large databases, and narrowing
the search each time until you find your item
Suggested Response
Activity 6.5 ‐ Electronic messaging has become an integral part of many cellular phone
users’ daily communication. Discuss the difficulties in written communication that may
arise from employees’ continued daily use of slang, such as ‘u’ for ‘you’, ‘4’ for ‘for’, and
AFAIK for ‘As far as I know’.
Suggested Response
This type of slang becomes part of the users’ language, and may soon be included in written
reports and professional documents. This is not Standard English and is unprofessional in
the official documents.
Activity 6.6 ‐ Find out the names of some local Internet service providers in your country,
and visit their web sites. Compare the costs of dial‐up and faster Internet connections, as
well as speeds of connectivity for each one.
Suggested Response
Activity 6.7 ‐ State and explain the meaning of the terms as well as any differences among
DSL, ADSL, and SDSL
Suggested Response
The instructor can use the following information to direct the discussion and differences
among the modems.
Asymmetric DSL (ADSL) reserves more bandwidth for downloading and less for uploading
because users typically download much more data than they send files.
Symmetric DSL maintains both downloading and uploading speeds at the same rate.
Therefore it is suited more to business and companies who have web servers, corporate
networks, where large quantities of data are constantly being processed in both directions
from and to the Internet.
Activity 6.8 ‐ Write short notes to explain the purpose of bookmarks, cookies, tabbed
browsing, pop‐up blocker, security options, auto‐fill capabilities for web‐based forms, as
they relate to Internet Browsers.
Suggested Response
Bookmark feature lets you save the address (URL) of a Web page so that you can easily re‐
visit the page at a later time.
The main purpose of cookies is to identify users and possibly prepare customized Web
pages for them.
Tabbed browsing allows users to view multiple pages by loading them into "tabbed"
sections of one page, rather than multiple pages.
A pop‐up blocker refers to any software or application that disables any advertisement
window that appears that you would see while using a Web browser.
Security options check for attacks by viruses, firewalls, and monitoring the type of web
page content that users may be viewing.
Auto‐fill completes an option with the user’s name and other optional terms when the user
begins to type the required information.
Activity 6.9 ‐ Internet cookies or web cookies are used to collect basic information on users
as they visit web sites. Perform a search on the Internet for the term ‘cookie. Note how
many pages of results are produced. Also peruse two or three pages and note how many
web sites show results that may be relevant to the search term. Remember you are looking
Suggested Response