Computer Notes - Copy
Computer Notes - Copy
Page 2 of 84
©Ambic Kbtm& family +256 (0) 702137613
PRINTERS: .................................................................................................................................................. 30
IMPACT PRINTERS ..................................................................................................................................... 30
DOT MATRIX PRINTERS ......................................................................................................................... 30
DAISY WHEEL PRINTERS ........................................................................................................................ 31
THERMAL PRINTER ................................................................................................................................ 31
Characteristics of Impact Printers ......................................................................................................... 31
NON-IMPACT PRINTERS ........................................................................................................................ 31
Differences between impact and non-impact printers ....................................................................... 32
PLOTTERS............................................................................................................................................... 32
SECONDARY STORAGE DEVICES AND MEDIA ............................................................................................ 32
THE OPERATING SYSTEM (OS) ................................................................................................................... 34
FUNCTIONS OF AN OPERATING SYSTEM (OS) ........................................................................................... 35
CLASSIFICATION OF OPERATING SYSTEMS. .............................................................................................. 35
UTILITY SOFTWARE.................................................................................................................................... 36
PROGRAMMING LANGUAGES ................................................................................................................... 36
LANGUAGE TRANSLATORS / LANGUAGE PROCESSORS ............................................................................ 37
Advantages of off-shelf packages over customized packages .............................................................. 38
INTRODUCTION TO WORD PROCESSING .................................................................................................. 39
(MICROSOFT OFFICE WORD) ..................................................................................................................... 39
An electronic word processor (word processor) ................................................................................... 39
Examples of word processors................................................................................................................ 39
Advantages of using electronic word processor ................................................................................... 39
Creating a document on a blank window ............................................................................................. 39
Protecting a document with a password. ............................................................................................. 40
Paragraph formatting. ........................................................................................................................... 41
Creating and manipulating tables ......................................................................................................... 42
THE INTERNET AND WORLD WIDE WEB (WWW) ..................................................................................... 43
THE INTERNET ........................................................................................................................................... 43
WORLD WIDE WEB (WWW) ...................................................................................................................... 43
Basic requirements for the WWW ........................................................................................................ 43
The internet service provider (ISP) ........................................................................................................ 43
Services offered by ISPs......................................................................................................................... 44
Advantages of using internet ................................................................................................................ 44
Disadvantages of using internet. ........................................................................................................... 44
Page 3 of 84
©Ambic Kbtm& family +256 (0) 702137613
INTERNET TERMINOLOGIES....................................................................................................................... 45
Characteristics of server computer. ...................................................................................................... 45
Elements of an email address. .............................................................................................................. 46
FACTORS THAT AFFECT THE SPEED OF THE INTERNET ............................................................................. 47
NETTIQUETE .............................................................................................................................................. 48
Netiquette for E-mail communication .................................................................................................. 48
Netiquette for online group Discussion ................................................................................................ 48
COMPUTER MALWARE, VIRUSES AND WORMS ....................................................................................... 48
VIRUSES: .................................................................................................................................................... 49
WORMS ..................................................................................................................................................... 52
HOW VIRUSES SPREAD .............................................................................................................................. 52
HOW TO STOP THE THREAT OF VIRUSES AND OTHER MALWARE PROGRAMS ........................................ 53
DATA COMMUNICATION & NETWORKING ............................................................................................... 53
Elements of data communication ......................................................................................................... 53
DATA COMMUNICATION TOOLS. .............................................................................................................. 54
DATA TRANSMISSION MEDIA .................................................................................................................... 54
TYPES OF TRANSIMISSION MEDIA............................................................................................................. 54
Wireless data transmission media. ....................................................................................................... 55
Categories of wireless transmission media. .......................................................................................... 55
COMPUTER NETWORKS ............................................................................................................................ 55
BASIC REQUIREMENTS FOR SETTING UP COMPUTER NETWORKS ........................................................... 56
Bridges come in three basic types:........................................................................................................ 57
Advantages of Computer Networks .......................................................................................................... 58
Disadvantages of Computer Networks ..................................................................................................... 59
Types Of Computer Networks ............................................................................................................... 60
TYPES OF NETWORK MODELS ................................................................................................................... 61
Peer-to-peer (P2P)................................................................................................................................. 61
Peer-to-peer (P2P)................................................................................................................................. 61
Network structure/topology (not examinable at A’ Level) ................................................... 61
TYPES OF NETWORK TOPOLOGY ............................................................................................................... 62
BUS Topology ........................................................................................................................................ 62
RING Topology ....................................................................................................................................... 62
STAR Topology ....................................................................................................................................... 63
MESH Topology ..................................................................................................................................... 64
Page 4 of 84
©Ambic Kbtm& family +256 (0) 702137613
TREE Topology ....................................................................................................................................... 64
HYBRID Topology ................................................................................................................................... 65
Features of Hybrid Topology ................................................................................................................. 65
INTRODUCTION TO DATABASE.................................................................................................................. 66
(MICROSOFT ACCESS) ................................................................................................................................ 66
Functions of a database software. ........................................................................................................ 66
Database models. .................................................................................................................................. 66
Features of a database management software. ................................................................................... 66
Guidelines for designing a good database. ........................................................................................... 67
Description of field data types. ............................................................................................................. 67
Terms used in relation to database....................................................................................................... 67
INTRODUCTION TO SPREADSHEETS (Microsoft office excel) .................................................................... 69
CELL REFERENCE. ....................................................................................................................................... 70
SYSTEM SECURITY AND ICT ETHICAL ISSUES. ............................................................................................ 78
Page 5 of 84
©Ambic Kbtm& family +256 (0) 702137613
O-LEVEL (840) COMPUTER SYLLABUS
SENIOR 1 TERM 1 – 2 TOPIC 1: INTRODUCTION TO COMPUTERS 1.1 Computers Today
1.2 Evolution of Computers
1.3 Uses and Functions of a Computer
1.4 Computer Care and Safety
1.5 Keyboard and Navigation
1.6 Categories of Computers
1.7 Classification of Computers
1.8 The Computer System
TERM 2 – 3 TOPIC 2: COMPUTER HARDWARE 2.1 Components of Computer
Hardware
2.2 Application of Hardware
Components
SENIOR 2 TERM 1 TOPIC 3: COMPUTER SOFTWARE 3.1 Introduction to Software
3.2 System Software
3.3 Application Software
TERM 2 – 3 TOPIC 12: TRENDS IN COMPUTING 12.1 Computer Integrity and Security
12.2 Computer Ethics
12.3 Computers and Society
12.4 Emerging Technologies
12.5 Systems Analysis
12.6 Computer Professions
Page 6 of 84
©Ambic Kbtm& family +256 (0) 702137613
A’LEVEL SUB ICT (S850) SYLLABUS
S.5 TERM 1
Introduction to Computing Introduction to Computers
World of ICTs
Implications of using ICTs (Advantages and Disadvantages)
Computer Management Booting process
File Management
Common Utilities
Print Management
Computer Laboratory Care and Maintenance Computer Literacy
Secure Laboratory Environment
Servicing and Maintenance
Computer Word Processing I Introduction to Word Processing
Working with Word processing software
S.5 TERM 2
Computer Hardware Input devices
Output devices
Storage devices
Processor Components
Computer software System Software
Application software
Electronic spreadsheets I Introduction to spreadsheets
Working with spreadsheets
Managing spreadsheets
Formulas and functions
Internet and WWW Introduction to the Internet
Wide Web
Internet Services
World Wide Web
S.5 TERM 3
Computer Word Processing II Page Layout
Date tabulation
Use of objects
Document accuracy
Mail merge, document referencing and printing
Electronic Presentation Introduction to Electronic Presentation
Working with Presentation software
Developing a presentation
Charts
Graphical objects
Presentation output
Slide show
S.6 TERM 1
Data communication and Networking Introduction to Data Communication
Introduction to Computer networks
Electronic Publication Introduction to Electronic Publishing
Publishing Basics
Document Layout
Document Enhancement
Outputs
Complete publication
Web Publishing
S6 TERM 2
Electronic Spreadsheets II Working with Charts
Worksheet Page Layout
Printing a worksheet
Databases Databases
Introduction to Databases
Database objects
S.6 TERM 3
System Security, ICT Ethical issues and Emerging Technologies Computer System Security
Privacy and ICT ethical Issues
Emerging Technologies
ICT industry
Page 7 of 84
©Ambic Kbtm& family +256 (0) 702137613
INTRODUCTION TO COMPUTERS
COMPUTER
It is a programmable electro-mechanical device (machine) that can accept data, stores it,
process it, retrieves it and output information.
An automated electronic device operating under the control of instructions, accepts and
stores data in its own memory performs arithmetical and logical operation, and produces
output at a very high speed.
A computer is capable of storing very large amount of information and carry out data
processing extremely fast. The operating speed of a computer is measured in millions of
instructions per second (M/s). The unit of Measurement is in Megahertz (MHz) or in
Gigahertz (GHz)
Note:
Data; refers to the raw material input into the computer
Informationis referred to as the Processed Data. Memory is the storage capacity of a
computer, or scratch pad on which data or information is stored.
Examples of data include; unsorted names, numbers, figures.
Examples of information include; bank statement, payment receipt, invoices, sorted and
arranged names.
User
Feedback Storage
FUNCTIONS OF COMPUTERS
1. They are used for communication
2. Writing letters documents and drawing graphics
3. Used for storage of information for future use
4. Used for entertainment
5. for making reports and calculating
6. Used in research and education
Page 8 of 84
©Ambic Kbtm& family +256 (0) 702137613
CHARACTERISTICS OF MODERN COMPUTERS
1. SPEED this is the ability of a computer to do work in a short time.
2. Accuracy this is the ability of a computer to do work without mistakes.
3. Diligence this is the ability of the computer to do worker repeatedly without getting
tired or bored.
4. Automation / programmable this is the ability of the computer to follow instructions
(Programs) and do work in the absence of the operator. (Which means the computer is
Automatic)
5. Storage this is the ability of the computer to record and safely keep information or data
for both now and future use.
6. Interactive this is the ability of a computer to respond to instructions of the user or
operator in order to process data.
7. Communication this is the ability of a computer to share information with another
computer especially in networking.
8. Versatility this is the ability of a computer to perform tasks in many different ways or
skills.
Page 9 of 84
©Ambic Kbtm& family +256 (0) 702137613
BOOTING A COMPUTER
Booting is a process by which a computer is started (set) or restarted (reset). There are
two basic ways of booting a computer and these include.
Cold booting: this the process in which a computer I started using the on and off
button given that it was not previously on
Procedure followed
- switch on the wall switch/socket
- switch on UPS
- switch on CPU
- switch on Monitor
- password (if any)
Warm booting:
This is the process of restarting computer which has been previously on. This is
normally done by Alt + Ctrl + Del keys at the same time.
Procedure followed.
- click on start
- select shut down/turn off/log off
- click on re-start option
A. THE ABACUS
The expansion of trade and commerce together with the need for accurate records created
a demand for tools needed for calculating. One of such a tool was the Abacus; which
appeared in many forms depending on various designs from the Chinese, Babylonians and
other kingdoms that were involved in major trade systems at the time. It basically
consisted of knots in strings, pebbles in trays and beads on a wooden frame. These were
moved up and down in order to make calculations.
Page 11 of 84
©Ambic Kbtm& family +256 (0) 702137613
The early versions are said to have been developed by the Chinese and the Babylonians
between 500 -1000BC. However, the most widely used form of the abacus was made of the
beads and wires/rods. By moving the beads on the rod/wire, the user was able to perform
addition and subtraction more rapidly.
B. NAPIER’S BONES
In 1615, John Napier a Scottish mathematician invented a computing device that could
make multiplication and division easy. This device used a number of sticks made from
Ivory which were marked in a manner similar to some currently used multiplication
tables. The devices become known as Napier’s bones because of the ivory sticks that
looked like human bones. The principle of Napier’s bones was later used by William
Oustraight who in 1620 invented the first Slide Rule. The rule was used for the next 350
years by business men and scientists until it was replaced by the pocket calculator in the
1970’s.
E. THE ARITHEMOMETER
In 1620, another Frenchman called Thomas Decolommal invented a calculating machine
which he called the arithmemometer. He produced many of these machines and later
made an industry.
F. JACQUARD’S LOOM
Joseph Marie Jacquard was the first Frenchman to invent a machine that was used in the
weaving industry. It used metallic cards punched with holes for storing data (designs).
This method of storage was known as the Hole and Hole method. The machine was
automatic and could weave threads into tapestries. The patterns of design were based on
Page 12 of 84
©Ambic Kbtm& family +256 (0) 702137613
pre-set instruction in the punched cards. He named his machine the LOOM and become
the first weaving device at the time
COMPUTER GENERATION
A computer generation refers to the period when computers changed from simple
technology to advanced technology. Or a computer generation refers to the change of
technology of computers over years. There are a number of generations where computers
have changed these include
Page 13 of 84
©Ambic Kbtm& family +256 (0) 702137613
vii. They were programmed in low level languages such as Assemble and machine
languages
viii. They could store little information because they used Magnetic drums which had
limited memory.
CHARACTERISTICS
i. They existed between 1964 and 1972.
ii. They are smaller than the first and second generation. In terms of size
iii. There was introduction of Operating System such as MULTICS.(is OP which produces
information in butches i.e. every information is put first then process is done at once.
Online OS similar to Macintosh OS2) it follows processes one after the other
iv. There was introduction of Large Scale Integration (LSI) technology, it’s the kind of
technology were 100-10000 transistors are brought together onto a single chip.
v. There was introduction of Integrated Circuit (ICs), a device that brings together many
electronic components onto a single package. Electronic components are normally
transistors.
vi. They stored information on Magnetic devices called Metal Oxide Semi-conductors
(CMOS)
Page 14 of 84
©Ambic Kbtm& family +256 (0) 702137613
vii. They were programmed in simple languages such as BASIC (Beginners all Purpose
Symbolic Instruction Code)
viii. There was introduction of Micro- computers. Kind of computers which used Micro-
processors
CLASSIFICATION OF COMPUTERS
Computers are classified according to size, speed, processor, purpose and Mode of
operation type or power
Classification by Type
Computers are basically categorized into two groups; that is to say:
i. Digital computers
This is the kind of computers which represent information in form of 0’s and 1’s. it
can be defined as a computer. It represents information using discrete values of 0’s
and 1’s. They use 0’s for off and 1’s for on. Examples include; Digital watches,
Digital cameras, Mobile Phones, Pocket calculators.
ii. Analog computers
This is a kind of computers which transmit the information or represent their information
in form or using physical quantities such as Temperature, Pressure, and Distance etc. they
can also be defined as Computers which represent information using continuous values on
physical quantities or measuring quantities of temperature, Pressure, distance etc.
examples include Thermometers, voltmeters, barometer, Anemometer, Analog watches
Page 15 of 84
©Ambic Kbtm& family +256 (0) 702137613
The WAT 1001 mainframe computer that connects the internet to the
satellite
Typical computers (laptop)
SUPER COMPUTERS
These are the largest computers with faster processing power using multiple processors
and superior technology. They are used for complex work or tasks which require a lot of
computation power. They are also used in complex application such as weather
forecasting.
MAIN FRAME
They are large computers in terms of capacity and speed.
Characteristics of Mainframe
a) They are very large computers with a very high capacity of main storage
b) They have large data storage
c) They transfer data at high speed
d) They are operated by special qualified operators and programmers
e) They should be kept in air-conditioned huge rooms since they are sensitive to
temperature changes, humidity and dust.
f) They can accommodate more than one user ie 100-500 on one machine
MINI COMPUTES
Mini computers are widely used in real time applications such as Air-trafficking control
and Factory automation systems.
PORTABLE COMPUTERS
These are small computers using micro processor like the Micro computers but can be
carried from place to place unlike the Desk-top PCs examples include of Laptops,
Palmtops, Notebook computers
Page 17 of 84
©Ambic Kbtm& family +256 (0) 702137613
COMPUTER SYSTEM
A computer system is a set of three components, apparatus, materials and user to
process data.
1) Hardware,
2) Software&
3) Human ware or personal ware.
COMPUTER HARDWARE
Computer hardware is/are the parts of a computer that can be physically touched, feel and
see. Or Hardware refers to the physical parts of a computer.
3. STRORAGE DEVICES
Main memory
Main memory is used for holding data and information required immediately by the CPU.
It is characterized by fast access to information, low capacity and high expressivity. There
are two types of main memory and these include
I. Random Access Memory
II. Read Only Memory
III. Cache memory
Page 18 of 84
©Ambic Kbtm& family +256 (0) 702137613
THE RANDOM ACCESS MEMORY (RAM)RAM can be both read in order to retrieve
information or it can be written into to store information. The name means that any data
in Memory can be reached or accessed in the same amount of time. RAM is used in large
quantities in the main memory and every computer must specify its size e.g. the base RAM
size for Micro-computers is 640KB (1Kilobyte = 1024byte). RAM can be either Static or
Dynamic
CHARACTERISTICS OF RAM
I. RAM is volatile i.e. it loses its contents when power goes off
II. RAM is a primary storage device
III. RAM can be changed or moved
Since RAM is a primary storage device, it stores information as one is currently working
on the computer. A computer will be slow with little RAM.
Types of RAM:
There two types of RAM and these include:
Static RAM (sram): The contents stored are not regularly refreshed but still volatile.
Dynamic RAM (dram): is a type of random-access memory that stores each bit of
data in a separate capacitor within an integrated circuit. The capacitor can be either
charged or discharged; these two states are taken to represent the two values of a bit,
conventionally called 0 and 1. Since capacitors lose charge, the information
eventually fades unless the capacitor charge is refreshed periodically. Because of this
refresh requirement, it is a dynamic memory as opposed to SRAM and other static
memory. Examples of DRAM include: DDR-SDRAM (ddr1) and DDR2, Thyristor RAM
(T-RAM), Zero-capacitor (Z-RAM)
A. THE MROM
Mask Programmable Read Only Memory that can be only produced by the manufacturer.
ROM is advantageous in that it has a high bit density, it is non-volatile and it has a low cost.
Examples include phone ring tones. There are three disadvantages of ROM and these
include
i. They are expensive to produce
ii. They are time consuming
iii. One produced, it can never be altered or changed, because of the above
disadvantages other types of ROM have been introduced
Page 19 of 84
©Ambic Kbtm& family +256 (0) 702137613
PROM is a read only memory that can be programmed directly by the user using special
PROM programmer. PROM, still have one disadvantage i.e. once programmed, it cannot be
changed hence its expensive not practical to use. It’s sometimes called THE FUSIBLE-LINK
The bit is the baric unit of a memory and it is got from the work binary digit.
A bit is represented either by 0 or 1 (zero or one). The zero representing availability (ON)
and the one representing unavailable (OFF).
Band widthIs the number of bytes that can be taken and processed by one instruction.
The byteOne byte consists of 8bits or 2nibbles. A single character (letter or number)
occupies one byte.
E.g. the WORD GIRLFRIEND has ten bytes or 20 nibbles or 80 bits
Example.
How many bits are in the word?
hanny.com?
No. of characters = 9, Note that no. of characters = no. of bytes, so no. of bytes
= 9, No. of bits = 9 * 8 =72 Other Binary Code Systems The computer memories
today are designed to hold more densities which include the below:
ASCII: The American Standard Code for Information Interchange is a character-
encoding scheme originally based on the English alphabet. ASCII codes represent text
in computers, communications equipment, and other devices that use text. Most
modern character-encoding schemes are based on ASCII, though they support many
more characters than ASCII does.
BCD: binary-coded decimal (BCD) is a digital encoding method for numbers using
decimal notation, with each decimal digit represented by its own binary sequence. In
BCD, a numeral is usually represented by four bits which, in general, represent the
decimal range 0 through 9.
EBCDIC: Extended Binary Coded Decimal Interchange Code (EBCDIC) is an 8-bit
character encoding used mainly on IBM mainframe and IBM midrange computer
operating systems. EBCDIC descended from the code used with punched cards and the
corresponding six bit binary-coded decimal code used with most of IBM's computer
peripherals of the late 1950s and early 1960s.
Page 20 of 84
©Ambic Kbtm& family +256 (0) 702137613
2. INPUT DEVICE
These are devices/hardware components that are used to enter data into and instructions
the computer.
These are devices that are used to enter data into the computer.
Input device has two duties to perform.
1. To read the data from the medium on which it is stored
2. To change the data into a suitable and understandable form That is; translating signals
from high level languages to Low Level Languages that can be understood by the
processor.
Page 21 of 84
©Ambic Kbtm& family +256 (0) 702137613
KEYBOARD TRUCK BALL
JOYSTICK
Page 22 of 84
©Ambic Kbtm& family +256 (0) 702137613
FLASH DISK
Page 23 of 84
©Ambic Kbtm& family +256 (0) 702137613
DOCUMENT READER HEADSETS
The Key board The keyboard which is typically resembles a type-writer is the most
common input device for micro-computer systems
THE MOUSE
A mouse is a pointing device that functions by detecting two-dimensional motion relative to
its supporting surface. Physically, a mouse consists of an object held under one of the user's
hands, with one or more buttons. The mouse is another input device commonly used on GUI
(graphical User Interface) systems. It is used to issue commands to the computer by
activating certain points on the screen. It has two or three buttons and a ball is used to move
the cursor on the screen, the buttons represents the Enter key (left button) and the Escape
key (right button). A click of either button is the same as placing the equivalent on the
keyboard.
Cordless mice aren't physically connected at all. Instead they rely on infrared or radio
waves to communicate with the computer. Cordless mice are more expensive than both
serial and bus mice, but they do eliminate the cord, which can sometimes get in the way.
SCANNER
This is an input device used to translate hard copy data or information to soft copy data or
information to the computer. A scanner can be used to copy photographs, designs or text
from paper into the computer.
Page 26 of 84
©Ambic Kbtm& family +256 (0) 702137613
OPTICAL CHARACTER READER (OCR)The optical character reader can detect both a
mark on a paper and also recognize its shape and identify characters. It uses light to detect
marks on paper.
OPTICAL MARK READER (OMR)It is a device which can detect the presence or absence
of a mark on the paper. It uses the same principle of light reflection like the ORC, where light
is shone onto the paper and reflected and detected. If there is a mark on the paper, the
reflection of the light from the mark will be less compared that from a point where there isn’t
a mark.
MAGNETIC INK CHARACTER READER (MICR)MICR systems use special ink to print
characters. The characters can then be read and decoded by special Magnetic device. This
system is widely used by bands for processing cheques
LIGHT PEN. It consists of a stylus connected by a cable to the computer. The position of the
stylus is noted and a dot appears on the screen. When the stylus is brought into contact in the
screen, a light pen is the only instrument that allows th3e user to point directly to an object
on the screen. Therefore, identifying it to the system, this makes it possible to make a choice
from a menu displayed on the screen. Lines and curves may also be drawn by moving the
stylus on the screen
OUTPUT DEVICE
These are devices through which computers communicate with the users. The use of output
results from the computer.
i. Monitor,
ii. Printers,
iii. Plotters
iv. Speakers
OTHER OUTPUT
1. Monitor
2. Printers (all types)
3. Plotters
4. Projector
5. LCD Projection Panels
6. Computer Output Microfilm (COM)
7. Speaker(s)
1. Modems
2. Network cards
3. Touch Screen
Page 27 of 84
©Ambic Kbtm& family +256 (0) 702137613
4. Headsets (Headset consists of Speakers and Microphone. Speaker act Output Device
and Microphone act as Input device)
5. Facsimile (FAX) (It has scanner to scan the document and also have printer to Print
the document)
6. Audio Cards / Sound Card
PRINTER
MONITOR
PROJECTOR
Headphone/ SPEAKER
Page 28 of 84
©Ambic Kbtm& family +256 (0) 702137613
DIGITAL CAMERA
THE MONITOR (VDU) The monitor is sometimes called the Visual Display Unit and is an
output device. It is a screen when the typed data appears (soft copy) and can be manipulated
into information and still the results are displayed on the screen. The monitor can be either a
Cathode Ray Tube (CRT) as for most desktop computers or the Liquid Crystal Display (LCD)
as in Laptops, Notebook computers and other flat panels. There are different types of
Monitors based on display resolutions and color. They are monochrome or colored.
Page 29 of 84
©Ambic Kbtm& family +256 (0) 702137613
COMPARISON OF LCD AND CRT:
High contrast ratio
High speed response
Full range light output level control
Large size
Large weight
Geometric distortion in some CRTs
Greater power consumption than LCD.
Prone to moiré effect at highest resolution
Can display natively in almost any resolution
Intolerant of damp conditions
Small risk of implosion (due to internal vacuum) if the picture tube glass is broken
LCD:
Very poor contrast ratio (e.g. 20:1)
High visible noise if used in more than 8 color mode (3 bit color depth).
Very slow response (moving images barely viewable)
Some suffer horizontal & vertical ghosting
Very small size
Very low weight
Very low power consumption
Lower cost than TFT LCDs.
Zero geometric distortion
PRINTERS:
While monitors can produce softcopies (Intangible Displays), printers can produce a
permanent record (hard copy) on the output paper or any other printing media. There are
two major categories of computers’ printers i.e. Impact and Non-Impact printers.
IMPACT PRINTERS
Impact printer are printer that print whose print head strike the printing media directly in
order to form characters, examples include
i. DOT Matrix
ii. Daisy –Wheel and
iii. Direct Thermal Printers
THERMAL PRINTER
A thermal printer (or direct thermal printer) produces a printed image by selectively heating coated
thermo-chromic paper, or thermal paper as it is commonly known, when the paper passes over the
thermal print head. The coating turns black in the areas where it is heated, producing an image. Two-color
direct thermal printers are capable of printing both black and an additional color (often red), by applying
heat at two different temperatures.
Thermal transfer printing is a related method that uses a heat-sensitive ribbon instead of heat-
sensitive paper.
NON-IMPACT PRINTERS
These are printers whose print heads do not directly touch the print media but instead they
form characters by use of strings or jet of ink heated up within. They are less noisy compared
to the impact printers and they are commercially fast hence they are expensive. Examples
include,
i. The Laser Jet
ii. Ink Jet
iii. Bubble Jet
Laser Jet printers which are the same technology as a photocopying machine and operates at
a high speed. It changes data into a beam of laser light which becomes to be printed. Other
examples include The Ink Jet and the bubble Jet which use the spraying method to form
characters. The ink is sprayed from tiny holes of the ink cartridge on to the printing media
(paper).
Page 31 of 84
©Ambic Kbtm& family +256 (0) 702137613
Differences between impact and non-impact printers
Impact Non impact
They are slow They are fast
They use an inked ribbon to print They use ink, thermal and lasser technology.
They are cheap They are expensive to buy
They produce asingle copy They produce multiple copies
They are noisy They are quiet in printing
PLOTTERS
Plotters are mainly used for printing large engineering and architectural drawings. The
largest paper size that can be used to print on is A1’s size paper. Plotters use pens to plot.
These are devices that cannot be removed without opening the system unit.
The hard disk is mounted inside the computer and for this is reason we refer to it as affixed
disk. Hard disk is the computer permanent storage and the hard disk can hold large amount
of data and is not affected when the computer is turned off.
Page 32 of 84
©Ambic Kbtm& family +256 (0) 702137613
NB: when we need the information from the disk, the disk is inserted in the drive and the
copy of the information is loaded into main memory. The original version remains instant on
the disk.
Page 33 of 84
©Ambic Kbtm& family +256 (0) 702137613
COMPUTER SOFTWARE
Computer software is a set of programs or a set of instruction that can change a general
purpose computer into a computer that is capable of performing special functions. Software
can also be defined as a set of rules or instruction / programs that can cause a computer
system to solve user’s problem.
Software is simply a collection of programs that instruct the computer to do work.
A program is a set of instructions that command a computer to perform a specific task
Software
Customized
Off shelf
Packaged
Utility software Operating ssm Programming languages
- Mergers - Stand alone - Low level (assembly
- Sorters - Networked and binary
- Backup - Single user languages)
- Screen savers - Multi user - High level (COBOL,
- antivirus Fortran, Basic)
SYSTEM SOFTWARE.
These are programs that manage the computer’s operations itself. System software programs
are usually provided by the Manufacturer of the computer and they include.
Page 34 of 84
©Ambic Kbtm& family +256 (0) 702137613
FUNCTIONS OF AN OPERATING SYSTEM (OS)
The operating system is basically a resource manager and its Main function is to manage the
four basic categories of resources namely:
a) Memory Management
The operating system knows which part of the memory is in use and that one which is free.
Storage space is therefore provided for data and information in the memory by the Operating
system. Programs must be loaded in the memory before they are run (executed) hence the
operating system has the function of choosing where they should be stored in the memory.
Urgently needed programs are loaded in the primary memory at the booting stage while
those that will be needed later are loaded in the secondary memory.
b) Processor Management
A multi-user or multi-tasking computer system can be accessed by many users or many
programs at the same time but the CPU (processor) can only run one program at a time or
one user at a time. Therefore, the number of tasks or programs entering into the CPU for
processing must be controlled or monitored; this is done by the operating system. The
operating system uses the CU to control these processes. Note: A Multi- user system is a
system that allows many users at the same time while a Multi-tasking allows many programs
to run at the same time.
c) Input / Output Management
Programs required in the use of Input / Output devices and in a Multi-tasking system a
conflict may arise on who is to use which device, at what time and for how long. The
operating system solves this by monitoring the state of each Input an Output devices and
sends a signal if any faults are detected and to indicate which device can be used at that time.
d) File Management
The operating system monitors data and information, where it’s located in the memory. It’s
status, use late date of recording and storage, etc. these are facilities called the file system.
File systems deals with the logical organization of the information and provide a way of
sorting and sharing it through the operating system. The operating system can also provide
protection of files by use of passwords secrete codes to limit access of users to the files.
Note: A file is a collection of related information.
A folder is a collection of files.
UTILITY SOFTWARE
Utilitys/w is a program that helps to maintain and improve the efficiency of a computer
system. It is also a program that utilizes a system such as the internet to provide a specific
service. Utility software or software utilities are the software programs that function like full
application software but at a smaller scale for a particular purpose. Utility programs are
integrated / combined in most major operating systems. In view of the above, we can
therefore define UTILITY PROGRAM as any application or program that allows the user to do
cleaning or management on the computer system. Examples of Utility programs / software
c) Backup program.
This is a program which makes a copy of the whole computer system. This is done in security
of the hard drive crash.
d) Restore program
This is a program that restores data files or may be able to return data files or a computer to
its original state.
e) Drive space
This is used to compress and decompress disc drives and hard disks. This increases the
storage capacity from 50% to 100% more free space. Note: this Utility should be used with
care, since it could damage or destroy the contents of the compressed drives.
f) Scan disk
This is used to check files and folders for physical errors.
g) Inbox repair
This is used to repair damaged files.
PROGRAMMING LANGUAGES
A Programming language is a combination of symbols, word, and codes arranged in an
organization or logical order known as SYNTAX to help the user to communicate with the
processor (CPU). It can also be defined as a logical flow of instructions arranged in order to
Page 36 of 84
©Ambic Kbtm& family +256 (0) 702137613
from a program in a specific language. There are basically two categories of programming
languages and these include.
a) Compliers
This is a computers program that translates / changes a program written in high level
language into machine codes. It can also be defined as a computer program that translates a
series of instructions written in one computer language known as a source language into an
output computer language known as the object or target language. NB. The complier
program changes the whole program at once into the target language.
b) Assemblers
Assemblers are programs that change Assembly programs / instruction into binary codes
that understood by the processor. Assembler normally begins from where compliers stop.
c) Interpreters
This translates line by line of a program from high level language to low level language.
d) Linkers
These are programs which combine complied programs and determine where the programs
will be located in the memory.
2. APPLICATION SOFTWARE:
These are programs designed to complete the users’ every day activities
These are programs that are written to meet the end user’s problems.
Page 38 of 84
©Ambic Kbtm& family +256 (0) 702137613
INTRODUCTION TO WORD PROCESSING
Traditionally, type writers were used to do office work such as typing documents,
reports, minutes, etc.
Today most offices use computers to do computer work. In this they use what is
called electronic word processors.
Page 39 of 84
©Ambic Kbtm& family +256 (0) 702137613
Saving the document
ii. click on file menu/ office button
iii. select save as
iv. create a file name
v. Select the location where to save your document.
vi. Click on save/ok
Or
i. Press control + s or F12
ii. Type file name
iii. Press enter.
Paragraph formatting.
A paragraph is a block of text dealing with a single theme and starting on a new linethe
following can be done to format a paragraph
1. alignment;
This is the arrangement of text relative to the left margin.
Examples of alignment.
Left alignment; this is a default alignment that lines up the text along the left margin but the
text is un evenly aligned along the right margin.
Right alignment;this lines up the text evenly along the right margin but uneven along the
left margin.
Centre alignment;these lines up the text at the centre between the left and right margins.
Justify alignment; this arranges the text evenly along the right and left margins.
2. Drop cap
A drop cap is a letter that appears larger than the rest consuming more lines in a document.
3. Line spacing
This is a vertical space/ distance between lines of text. The default line spacing is
single space (1.5) but the user can adjust the line spacing to the spacing of his or her
choice.
cell Rows
cell
Columns
Page 42 of 84
©Ambic Kbtm& family +256 (0) 702137613
THE INTERNET AND WORLD WIDE WEB (WWW)
THE INTERNET
Internet refers to the global interconnection of computers for the purpose of communication
and resource sharing.
Internet is the connection of computers to communicate together and share resources
globally.
Single User Switch
Computer Network
Internet
Switch
Computer network
fig 1
INTERNET TERMINOLOGIES
i. Web server; this is a high speed and storage computer whose primary purpose is
to provide requested information to computers on the WWW.
vii. Search engines; this is a program which allows the user to look for
specificinformation or documents of interest on the WWW.
Examples of search engines include
- Google - Gmail
- Yahoo - Messenger/msn
- Dog pile - Netiquette
- Lycos -
viii. Intranet; this is an internet that serves a single organization. It enables the
organization employees to share files and resources within their organization eg.
Printers, modems, faxes.
ix. Extranet; this is an internet that serves more than one organization. It can for
example serve a school, a nearby church or a health centre.
x. Protocol; this is a set of rules and procedures that control communication over
the internet.
Page 45 of 84
©Ambic Kbtm& family +256 (0) 702137613
Examples of protocols
Internet protocol (IP)
This is a set of rules that provide a connection of information delivery between the
computer systems. It is not a guarantee that IP delivers the data.
Transfer control protocol (TCP)
It is a set of rules that provide oriented connections. It provides a guarantee that
the sent data has been delivered and in case of an error, it is responsible for
retransmitting the data.
Other protocols that work hand in hand with the TCP/IP protocols
HTTP(hypertext transfer protocol)
It is used for sending and receiving of WebPages to and from the web server.
FTP(file transfer protocol)
This is used for transferring any kind of files to and from the web server.
SMTP(simple mail transfer protocol)
This is used for transmitting mail messages.
SLIP(serial line internet protocol) and PPP(point to point protocol)
These are used to control net work traffic over a dial up connection. They control
communication over the telephone lines.
Page 47 of 84
©Ambic Kbtm& family +256 (0) 702137613
5. The speed of the connection between my computer and the ISP, if a modem is used,
the data transmission rate varies from 56kbps to 512kbps from cable Modem.
6. The type of Network card and its driver somewhere on your computer determine speed
at which files which will be downloaded or upgraded on the internet.
7. The speed of your ISP, determine the speed at which you will receive files from the
internet.
8. The speed of the server (web servers) that deliver web pages being loaded.
9. The speed of the outside network also affects data transmissions of the internet.
10. The location of your remote computer, affects the speed of the internet in a way that
signals weaken during transmission and this may slow down the whole process.
NETTIQUETE
Is the set of rules and customs that is considered polite when connecting on Internet.
They involve the following practices:
It helping those seeking for answers on online.
Signing out your account after use.
Never to such or post pornographic material.
Identifying yourself truly on internet
Down loading only necessary files in order to avoid clogging the internet
Posting polite statements on online.
Respecting for one’s sites you reached on.
Never search for friends that you don’t know on internet.
VIRUSES:
Page 49 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 50 of 84
©Ambic Kbtm& family +256 (0) 702137613
Acomputer virusis a computer program that can copy itself and infect a computer
without permission or knowledge of the user.
The original may modify the copies or the copies may modify themselves, as occurs in a
metamorphic virus. The term comes from the term virus in biology. A computer virus
reproduces by making (possibly modified) copies of itself in the computer's memory,
storage, or over a network. This is similar to the way a biological virus works.
A virus can only spread from one computer to another when its host is taken to the
uninfected computer, for instance by a user sending it over a network or carrying it on a
removable medium such as a floppy disk, CD, USB drive or by the Internet. Additionally,
Page 51 of 84
©Ambic Kbtm& family +256 (0) 702137613
viruses can spread to other computers by infecting files on a network file system or a file
system that is accessed by another computer.
Some viruses are programmed to damage the computer by damaging programs, deleting
files, or reformatting the hard disk. Others are not designed to do any damage, but simply
replicate themselves and perhaps make their presence known by presenting text, video, or
audio messages. Even these benign viruses can create problems for the computer user. They
typically take up computer memory used by legitimate programs. As a result, they often
cause erratic behavior and can result in system crashes. In addition, many viruses are bug-
ridden, and these bugs may lead to system crashes and data loss. There are many viruses
operating in the general Internet today, and new ones are created and discovered every day.
Examples of Viruses:
Acid
Acme (Uses email to destroy all files on the computer)
A and A (Highly attacks Windows 95, 98 and MS.DOS)
WORMS
Viruses are sometimes confused with computer worms and Trojan.
A computer worm is a self-replicating computer program. It uses a network to send copies
of itself to other nodes (computer terminals on the network) and it may do so without any
user intervention. Unlike a virus, it does not need to attach itself to an existing program.
Worms always harm the network (if only by consuming bandwidth), whereas viruses always
infect or corrupt files on a targeted computer. Many worms have been created which are
only designed to spread, and don't attempt to alter the systems they pass through. However,
as the Morris wormand Mydoomshowed, the network traffic and other unintended effects
can often cause major disruption.
On the other hand, a Trojan horse is a program that installs malicious software while under
the guise of doing something else. A Trojan horse differs from a virus in that a Trojan horse
does not insert its code into other computer files and appears harmless until executed. The
term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be
useful or interesting programs (or at the very least harmless) to an unsuspecting user, but
are actually harmful when executed.
5. Freeware and game programs are an excellent environment for virus developer to send
viruses to many people because games are liked by many.
Page 52 of 84
©Ambic Kbtm& family +256 (0) 702137613
6. Interconnecting an infected PC on a network will also spread the virus or the worm to
the rest of the network.
7. Software updateswhen one is updating the software some applications has got viruses
which are got from the designed program.
Data communicationrefers to the electronic transfer of data & information that has been
digitally encoded from the source to the destination.
It is the high speed exchange of data and information from the source (sender) to the
destination (Receiver)
It is the high speed exchange of data and information between computers and any other
electronic devices through cables and wireless technology.
i. Sender; this is the device that initiates an instruction to transmit data and
instructions eg. A source computer.
ii. Receiver; this is a device that accepts data signals from the source device.
iii. Message; this is the data/content/information to be relayed/transmitted over a
transmission medium. It is usually in a digital/discrete form.
iv. Transmission medium; this is a communication channel/path over which data
signals are sent. Eg. Physical wire or wireless media like blue tooth, infra red,
micro waves etc.
v. Protocol; this is a set of rules and procedures for exchanging data and
information among computers and devices over a network.
vi. Communication device/signal converter; this is a device that converts the
data/ instructions from the sending device into a signal that can be carried by the
transmission medium to the receiver.
Page 53 of 84
©Ambic Kbtm& family +256 (0) 702137613
DATA COMMUNICATION TOOLS.
Data communication tools include
i. Phones
ii. Emails
iii. Social networks
iv. Instant messaging and Skype.
Phones; Wireless phones are a most common form of communication in most countries
in the world today. Text messaging is rampant and with the advent of smart phones
which have PC enabled functions. People are now using phones to send large format
videos, pictures and multimedia. This is achieved by phone having blue tooth, hands free,
speakers and internet access.
Emails; Email is a function of the internet and many users can access it through myriad
devices like phones, computers, and Personal Digital Assistances (PDAs). Emails are used
to send messages and other multimedia from the sender to the receiver.
Social networks; Social networks enable interaction between different users who
communicate directly over the internet. Social networks include;face book, twitter,
badoo, whatsapp, palm chart, Viber, Imo, etc.
Social networks allow users to up load and download photos, pictures, and can be used
for digital record keeping. Some social networks are free to use. E.g.
http://0.facebook.com
Instant messaging and Skype; Instant messaging and Skype are often done over the
internet. Skype offers online calling, messaging, and video calling across the world.
This is a communications channel/paths over which data signals are sent from the source
to the destination.
Physical data transmission media provides restricted path/ physical path along which
data signals are propagated.
This is a type of transmission media that is used to transmit data from one point to another
without using any physical connections.
It is a kind of transmission media that is unguided because in most cases the signals are
scattered in the air and the user may have no control over them.
COMPUTER NETWORKS
In computer networks, networked computing devices pass data to each other along data
connections. The connections (network links) between nodes are established using either
cable media or wireless media. The best-known computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network
nodes. Nodes can include hosts such as personal computers, phones, servers as well as
networking hardware. Two such devices are said to be networked together when one device
Page 55 of 84
©Ambic Kbtm& family +256 (0) 702137613
is able to exchange information with the other device, whether or not they have a direct
connection to each other.
Computer networks support applications such as access to the World Wide Web, shared use
of application and storage servers, printers, and fax machines, and use of email and instant
messaging applications. Computer networks differ in the physical media used to transmit
their signals, the communications protocols to organize network traffic, the network's size,
topology and organizational intent
Networks comprise additional basic system building blocks, such as network interface
controller (NICs), repeaters, hubs, bridges, switches, routers,
modems, and firewalls.
The NIC responds to traffic addressed to a network address for either the NIC or the
computer as a whole.
Repeaters and hubs; A repeater is an electronic device that receives a network signal,
cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher
power level, or to the other side of an obstruction, so that the signal can cover longer
distances without degradation. In most twisted pair Ethernet configurations, repeaters are
required for cable that runs longer than 100 meters. With fiber optics, repeaters can be tens
or even hundreds of kilometers apart.
A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the
OSI model. Repeaters require a small amount of time to regenerate the signal..
Hubs have been mostly absorbed by modern switches; but repeaters are used for long
distance links, notably undersea cabling.
Bridges; A network bridge connects and filters traffic between two network segments at
the data link layer (layer 2) of the OSI model to form a single network. This breaks the
network's collision domain but maintains a unified broadcast domain. Network
segmentation breaks down a large, congested network into an aggregation of smaller, more
efficient networks.
Page 56 of 84
©Ambic Kbtm& family +256 (0) 702137613
Bridges come in three basic types:
Switches; A network switch is a device that forwards and filters OSI layer 2data grams
between ports based on the MAC addresses in the packets. A switch is distinct from a hub in
that it only forwards the frames to the physical ports involved in the communication rather
than all ports connected. It can be thought of as a multi-port bridge. It learns to associate
physical ports to MAC addresses by examining the source addresses of received frames. If an
unknown destination is targeted, the switch broadcasts to all ports but the source. Switches
normally have numerous ports, facilitating a star topology for devices, and cascading
additional switches.
Multi-layer switches are capable of routing based on layer 3 addressing or additional logical
levels. The term switch is often used loosely to include devices such as routers and bridges,
as well as devices that may distribute traffic based on load or based on application content
(e.g., a Web URL identifier).
Modems; Modems (Modulator Demodulator) are used to connect network nodes via wire
not originally designed for digital network traffic, or for wireless. To do this one or more
frequencies are modulated by the digital signal to produce an analog signal that can be
tailored to give the required properties for transmission. Modems are commonly used for
telephone lines, using a Digital Subscriber Line technology.
Firewalls; A firewall is a network device for controlling network security and access rules.
Firewalls are typically configured to reject access requests from unrecognized sources while
allowing actions from recognized ones. The vital role firewalls play in network security
grows in parallel with the constant increase in cyber attacks.
File Sharing; The major advantage of a computer network is that is allows file sharing and
remote file access. A person sitting at one workstation that is connected to a network can
easily see files present on another workstation, provided he is authorized to do so. This saves
him/her the hassle of carrying a storage device every time data needs to be transported from
one system to another. Further, a central database means that anyone on that network can
access a file and/or update it. If files are stored on a server and all of its clients share that
storage capacity, then it becomes easier to make a file available to multiple users.
Inexpensive Set-Up; Shared resources mean reduction in hardware costs. Shared files
mean reduction in memory requirement, which indirectly means reduction in file storage
expenses. A particular software can be installed only once on the server and made available
across all connected computers at once. This saves the expense of buying and installing the
Page 58 of 84
©Ambic Kbtm& family +256 (0) 702137613
same software as many times for as many users.
Flexible Handling; A user can log on to a computer anywhere on the network and access
his files. This offers flexibility to the user as to where he should be during the course of his
routine. A network also allows the network administrator to choose which user on the
network has what specific permissions to handle a file. For example, the network
administrator can allot different permissions to User A and User B for File XYZ. According to
these permissions, User A can read and modify File XYZ, but User B cannot modify the file.
The permission set for User B is read-only. This offers immense flexibility against
unwarranted access to important data.
Increased Storage Capacity; Since there is more than one computer on a network which
can easily share files, the issue of storage capacity gets resolved to a great extent. A
standalone computer might fall short of storage memory, but when many computers are on a
network, the memory of different computers can be used in such a case. One can also design
a storage server on the network in order to have a huge storage capacity.
Security Concerns; One of the major drawbacks of computer networks is the security
issues that are involved. If a computer is a standalone computer, physical access becomes
necessary for any kind of data theft. However, if a computer is on a network, a hacker can get
unauthorized access by using different tools. In case of big organizations, various network
security software need to be used to prevent theft of any confidential and classified data.
Virus and Malware; If even one computer on a network gets affected by a virus, there is a
possible threat for the other systems getting affected too. Viruses can spread on a network
easily, because of the inter-connectivity of workstations. Moreover, multiple systems with
common resources are the perfect breeding ground for viruses that multiply. Similarly, if
malware gets accidentally installed on the central server, all clients in the network that are
connected to that server will get affected automatically.
Lack of Robustness; If the main file server of a computer network breaks down, the entire
system becomes useless. If there is a central linking server or a bridging device in the
network, and it fails, the entire network will come to a standstill. In case of big networks, the
file server should be a powerful computer, which often makes setting up and maintaining the
system doubly expensive.
Needs An Efficient Handler; The technical skills and know-how required to operate and
administer a computer network is considerably high. Any user with just the basic skills
cannot do this job. Also, the responsibility that comes with such a job is high, since allotting
username-passwords and permissions to users in the network are also the network
administrator's duties. Similarly, network connection and configuration is also a tedious task,
and cannot be done by an average user who does not have advanced knowledge of
computers and/or networking.
Lack of Independence; Since most networks have a centralized server and dependent
Page 59 of 84
©Ambic Kbtm& family +256 (0) 702137613
clients, the client users lack any freedom whatsoever. Centralized decision making can
sometimes hinder how a client user wants to use his own computer.
Computer networks have had a profound effect on the way we communicate with each other
today, and have made our life easier. From the World Wide Web to your local office LAN,
computers have become indispensable in daily life, and networks have become a norm in
most businesses. If networks are designed and configured keeping in mind its pros and cons,
they are the best piece of facility you could ever have.
A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a home, school, computer laboratory, or office building, using network
media. The defining characteristics of LANs, in contrast to wide area networks (WANs),
include their smaller geographic area, and non-inclusion of leased telecommunication lines
A metropolitan area network (MAN) is a computer network larger than a local area
network, covering an area of a few city blocks to the area of an entire city, possibly also
including the surrounding areas. A MAN is optimized for a larger geographical area than a
LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on
communications channels of moderate-to-high data rates. A MAN might be owned and
operated by a single organization, but it usually will be used by many individuals and
organizations. MANs might also be owned and operated as public utilities. They will often
provide means for internetworking of local networks
A wide area network (WAN) is a network that covers a broad area (i.e., any
telecommunications network that links across metropolitan, regional, national or
international boundaries) using leased telecommunication lines. Business and government
entities utilize WANs to relay data among employees, clients, buyers, and suppliers from
various geographical locations. In essence, this mode of telecommunication allows a business
to effectively carry out its daily function regardless of location.
A campus network, campus area network, corporate area network or CAN is a computer
network made up of an interconnection of local area networks (LANs) within a limited
geographical area. The networking equipments (switches, routers) and transmission media
(optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned by the campus
tenant / owner: an enterprise, university, government etc.
A personal area network (PAN) is a computer network used for data transmission among
devices such as computers, telephones and personal digital assistants. PANs can be used for
communication among the personal devices themselves (intrapersonal communication), or
for connecting to a higher level network and the Internet (an uplink). A personal digital
assistant (PDA), also known as a palmtop computer, or personal data assistant, is a
mobile device that functions as a personal information manager. PDAs are largely considered
obsolete with the widespread adoption of smart phones.
Page 60 of 84
©Ambic Kbtm& family +256 (0) 702137613
TYPES OF NETWORK MODELS
Peer-to-peer (P2P)
Peers make a portion of their resources, such as processing power, disk storage or network
bandwidth, directly available to other network participants, without the need for central
coordination by servers or stable hosts. Peers are both suppliers and consumers of
resources, in contrast to the traditional client–server model in which the consumption and
supply of resources is divided. Emerging collaborative P2P systems are going beyond the era
of peers doing similar things while sharing resources, and are looking for diverse peers that
can bring in unique resources and capabilities to a virtual community thereby empowering it
to engage in greater tasks beyond those that can be accomplished by individual peers, yet
that are beneficial to all the peers
Client–server
model
Peer-to-peer (P2P)
Examples of computer applications that use the client–server model are Email, network
printing, and the World Wide Web.
Page 61 of 84
©Ambic Kbtm& family +256 (0) 702137613
the network to fail entirely. In general the more interconnections there are, the more robust
the network is; but the more expensive it is to install.
BUS Topology
Bus topology is a network type in where every computer and network device is connected to
single cable.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
Page 62 of 84
©Ambic Kbtm& family +256 (0) 702137613
Features of Ring Topology
1. A number of repeaters are used and the transmission is unidirectional.
2. Date is transferred in a sequential manner that is bit by bit.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
Page 63 of 84
©Ambic Kbtm& family +256 (0) 702137613
MESH Topology
It is a point-to-point connection to other nodes or devices. Traffic is carried only between
two devices or nodes to which it is connected. Mesh has n (n-2)/2 physical channels to link
the devices.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Page 64 of 84
©Ambic Kbtm& family +256 (0) 702137613
2. Used in Wide Area Network.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Note: the physical layout of the nodes in a network may not necessarily reflect the network
topology. As an example, with FDDI, the network topology is a ring (actually two counter-
rotating rings), but the physical topology is often a star, because all neighboring connections
can be routed via a central physical location
Page 65 of 84
©Ambic Kbtm& family +256 (0) 702137613
INTRODUCTION TO DATABASE
(MICROSOFT ACCESS)
A database is a collection of structured and related data items organized so as to provide a
consistent and controlled access to items.
A database management software on the other hand is a software that facilitates the
creation, organization and maintenance of a database.
- Ms access
- MySQL
- Lotus approach
- Fox pro database
Database models.
i. Flat files.
In a flat file model a database holds only one set of data and this is not different
from a manual file e.g.A students assessment report may consist of performance
cards for every students in a class.
ii. Hierarchical mode;
Data items are arranged in a hierarchical tree form.
iii. Rational database mode
This is where related items are stored together in a structure called a ration/table.
iv. Network mode.
This is the type of organization that links are used to express relationships
between data items forming a network of items.
Page 66 of 84
©Ambic Kbtm& family +256 (0) 702137613
Tables; this is a database structure that is used to hold related records. Tables are
organized in rows and columns with each row representing a record while each
column represents a field in each record.
Queries;this is a statement used to extract, change, analyze or request a specific
data from one or more tables.
Forms;this is a graphical representation (interface) that enables the user to view
and enter data in a table.
Report;this provides the user with the means to specify output and what is to be
printed as a report.
Decimal places; this is used on field with numbers and currency; the user can
format the decimal places to the number of decimal places of his or her choice.
Page 67 of 84
©Ambic Kbtm& family +256 (0) 702137613
Caption; this is a more descriptive name for a field or table.
Default values; these are values that automatically appear in the data sheet. Eg.
Date and time appear on sheets automatically.
Validation text; this is a message that appears once a validation rule is violated.
Require; this determines that an entry must be made in a field before you
proceed to the next field.
Allow zero length;this allows the user to proceed without making any entry in a
field set to zero length.
Index. This facilitates the organization of records for easy search. A primary key
is an example of an index.
Primary key; this is an index that uniquely identifies each record sorted in a
table. A primary key controls the user from entering a null or double entries in a
table.
Page 68 of 84
©Ambic Kbtm& family +256 (0) 702137613
INTRODUCTION TO SPREADSHEETS (Microsoft office excel)
Page 69 of 84
©Ambic Kbtm& family +256 (0) 702137613
CELL REFERENCE.
Types of cell reference
Page 70 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 71 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 72 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 73 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 74 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 75 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 76 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 77 of 84
©Ambic Kbtm& family +256 (0) 702137613
SYSTEM SECURITY AND ICT ETHICAL ISSUES.
Page 78 of 84
©Ambic Kbtm& family +256 (0) 702137613
Data protection measures
Page 79 of 84
©Ambic Kbtm& family +256 (0) 702137613
No secret database.
Right of consent
Right to correct
Noise
Page 80 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 81 of 84
©Ambic Kbtm& family +256 (0) 702137613
ICT – Information and Communication
Acronyms Technology
ALU - Arithmetic Logic Unit IP – Internet Protocol
ASCII - American Standard Code for TCP-Transfer Control Protocol
Information Interchange IRC– Internet Relay Chat
BIOS - Basic Input Output System ISDN – Integrated Services Digital
BPS - Bits Per Second Network
CAD/M - Computer Aided Design/ ISP – Internet Service Provider
Manufacturing JPEG – Joint Photographic Experts Group
CAL – Computer Aided Learning Kb – Kilobyte
CAT 5 - 'Category 5' cable KH – KiloHertz
CD - Compact Disc LAN - Local area network
CD-R - Compact Disc Recordable LCD – Liquid Crystal Display
CD-ROM - Compact Disc Read Only LED – Light Emitting Diode
Memory LIFO - Last in First Out
CD-RW - Compact Disc Re-Writable MAN – Metropolitan Area Network
CPU – Central Processing Unit MICR – Magnetic Ink Character
CRT - Cathode Ray Tube Recognition
DBMS - Data Base Management System MP3 – MPEG Layer 3
DDR - Double Data Rate NIC – Network Interface Card
DFD – Data Flow Diagrams NOS- Network Operating System
DOS – Disc Operating System OCR – Optical Character Recognition
DSL - Digital Subscriber Line OMR- Optical Mark Reader /Recognition
DTP - Desktop publishing OOPL- Object Oriented Programming
DVD - Digital Versatile Disc Language
EFT - Electronic Funds Transfer OSI – Open Systems Interconnection
EULA - End User Licence Agreement PCI – Peripheral Component Interconnect
FAQ - Frequently Asked Questions PDA- Personal Data Assistant
FIFO - First in First Out POS - Point of Sale
FNF - First Normal Form PPM – Pages per Minute
FTP – File Transfer Protocol RAM - Random Accesses Memory
Gb – Gigabyte ROM - Read Only Memory.
GIF – Graphic Interchange Format SCSI – Small Computer Systems Interface
GIGO- Garbage In Garbage Out SQL – Structured Query Language
GPS – Global Positioning System TCP – Transmission Control Protocol
GUI – Graphical User Interface UPS- Uninterrupted Power Supply
GW – Gateway LCD-liquid crystal Display
HCI – Human Computer Interaction CRT-Cathode Ray Tube
HTML – Hyper Text Mark-up Language VDU-Visual Display Unit
HTTP – Hyper Text Transfer Protocol PPP-Point to Point Protocol
IC – Integrated Circuit
HDD-Hard Disk
PC-personal Computer
Page 82 of 84
©Ambic Kbtm& family +256 (0) 702137613
URL-Uniform Resource Locator
CU-Control Unit
CAI-Computer Aided Instruction
ENIAC-Electronic Numeric Integrator
Calculator
UNIVAC-UniversalAutomatic
Computer
LEO-Lyris Electronic Machine
IBM-International Business Machine
ATM-Automatic Teller Machine
CCT-Close Circuit Television
SLIP-Serial Line Internet Protocol
PPP-Point To Point Protocol
Page 83 of 84
©Ambic Kbtm& family +256 (0) 702137613
Page 84 of 84
©Ambic Kbtm& family +256 (0) 702137613