Personal Notes 2
Personal Notes 2
This is the use of modern technology to aid in capturing, processing, storing, retrieving, and
communication of information, whether in the form of numerical data, text, sound, or image.
ICTs are the platforms upon which communication of information is made effective using a wide
range of technological tools.
NB: Technological tool is an electronic, digital or physical tool that can expand the human ability for
performing tasks. Examples are Word processor, Presentation program, Artificial Intelligence (AI),
Web Technology, Data projectors, Laptops etc.
ICT will create the information or forum for communication but ICTs facilitate the communication.
Data: They are raw or unorganized facts suitable for processing by a computer, such as figures,
letters, words or symbols that represent an idea, an object, a condition or situation. Like all raw
materials, it is not very useful on its own and needs to be processed before it can be turned into
something useful.
Sources of Data
Information: It is a data that has been processed in such a way that it is meaningful to the computer
user. Information is therefore a processed data that is usually organized and understandable.
Uses of information
Individuals, businesses and organizations need information. Information may be used in the
following areas.
Planning
Controlling
Decision making
Recording
Measuring
E-Learning: It is the use of electronic media and information and communication technologies in
education. This includes the following forms learning techniques;
Turning data into meaning information is a process. Therefore, a process is a set of logically related
tasked performed to achieve a defined outcome. The process of turning data into information is
known as the IPC. The IPC is divided into 4 stages.
This stage is also known as input stage. At this stage, data is entered or captured electronically using
input hardware and converted to a form that can be processed by the computer. Examples of input
hardware include the keyboard, mouse, microphone or scanner.
This stage transforms data into information with the help processing hardware called the Central
Processing Unit (CPU). The CPU controls and manipulates data to produce information. Examples of
CPU’s include AMD processor, Intel’s processor etc.
This stage is also known as output stage. At this stage, output devices are used to displays the
information obtained from the data in a form that can be used by humans as in printed texts and
images, sounds, videos etc. examples of output devices include screens, printers, projectors and
speakers.
At this stage, information must be stored permanently using a storage hardware in computer
processable form in order to prevent having to repeat stage 1 and 2 of the IPC. Examples of storage
hardware include hard disk, flash drive, compact disc etc.
Uses of ICT
ICT has many different uses. Let us consider how ICT may be used for educational, social and
economic purposes.
ICT has many uses in the field of education. Some of these uses include the following;
1. As a subject of instruction i.e. it’s a subject of study in all different levels of education.
2. As a tool of instruction i.e. using ICT tools to aid in teaching and learning process
3. As a research tool i.e. the use of internet to search for information have helped improve the
quality of research and information
4. As a development tool i.e. based on the available data educator can measure, evaluate,
monitor student’s progress and assist them to make responsible decision about their careers.
5. As a management tool i.e. easy recording of students grades and taking assignments online
to reduce paper work.
ICT has been useful for numerous social purposes. Some of these include;
1. For communication i.e. very easier for people to communicate with one another.
2. For entertainment i.e. has improve the quality and accessibility of entertainment to people
and also has made video games more interactive.
3. For establishing relationships i.e. it has created a social platforms like Facebook for people to
renew or make new friendships.
4. For sharing experience i.e. it has created a platform like INSTAGRAM & YOUTUBE for people
to share their experience with others and to be learn from.
5. For sharing news and information i.e. easy to print many newspapers and send to many
people in a short possible time.
The use of ICT for economic purposes includes the following reasons;
1. For advertising i.e. it has helped many companies to reach clients and customers in different
part of the world at lower cost.
2. For online trading i.e. it has created a platform for people to buy, sell and complete
transactions over the internet.
3. For encouraging cashless society i.e. it has made it possible for certain societies to trade
without using physical cash.
4. For improving products i.e. companies get feedback about their products and improve their
products to satisfy their customers need.
Impact of ICT on Educational, Social and Economic Development
System Administrator
Programmer or Software Developer
Web Developer
Webmaster
Graphic Designers
Network Administrator
Database Administrator
ICT Consultant
ICT Coordinator
ICT Tutor
Introduction to Computers
Computer is defined as an electronic device that can follow instructions to accept input, process that
input, produce and stores information.
The Hardware i.e. the physical components that make up a computer system.
The Software i.e. the electronic instructions that tell the computer how to perform a task.
User i.e. a human who uses the computer with the help of software designed to perform a task.
Procedure i.e. series of actions taken to achieve a goal when using the computer.
Classification of Computers
There are different types of computers and they can be classified according to their capacity/size,
purpose or type.
B. Classification by Purpose
1. General purpose i.e. they are designed to solve a large variety of problems. E.g. laptop
2. Special purpose i.e. designed to solve a specific or particular problem. E.g. thermometer
Uses of Computers
Accept data, process data, give information and store data or information
Enhance teaching and learning
Produce documents
Calculation
Entertainment
Communication
Record keeping
Internet browsing
Word processing
Accounting
Unit Two
Boot or Booting is the process of switching “ON” the computer and starting the Operating System
(OS). When you turn on a computer, it goes through some steps to prepare itself for use. The first
step is called the Power-On-Self-Test [POST] (which is, identifying peripheral devices attached to it
and does a quick check to see whether the memory is functioning properly).
Types of Booting
Cold Booting: It is the process of switching on the computer by pressing the power button of
the system unit and the monitor.
Warm Booting/Rebooting: The process of restarting the computer without pressing the power
button of the system unit.
Reasons for Applying Warm Booting
1. When the computer freezes or takes long time to respond to commands.
2. After installing and uninstalling an application.
3. When a new hardware component is attached or connected to the computer.
Shutting Down:
The process of putting off the computer system. It is important to ensure that the computer is
shut down correctly to prevent serious damage to the computer.
Steps to Shut Down PC
Close all running programs on the PC
Click on the “START” or “WINDOWS” button on the taskbar
Click on “Shut Down” or “Power” on the start menu
Select “Turn Off” or “Shut Down”
A threat can be described as any dangerous individual or thing with the intent to cause harm or
damage. Computers and its users are exposed to different types of threats.
Natural threat (i.e. threats that are caused by nature or things in nature)
1. Heat
2. Flood
3. Rodents
Human or Man-made threat (i.e. threats that are caused by humans)
1. Dust
2. Theft
3. Electrical faults or power fluctuations
4. Liquid or water
5. Human error
6. Computer viruses
Threats to computer users (i.e. health hazards and other related issues to computer users)
1. Bad posture
2. Poor vision
3. Wrist pains
4. Electric shock or electrocution
5. Identity theft
6. Phishing
7. Spyware
8. Internet fraud
Computer Viruses
A computer virus is a hidden instructions that are buried in another set of instructions and move
between computers often to cause damage. Software developers or computer programmers create
computer viruses.
1. Logic / Time Bombs: These are viruses which are programmed to execute at a specific date or
time.
2. Boot sector virus: This virus attaches itself to the first part of the hard disk that is executed by the
computer upon bootup.
3. Memory Resident virus: These viruses reside in the computers volatile memory (RAM) and cause
programs to malfunction.
4. Rootkit virus: This is an undetectable virus which attempt to allow someone to gain control of a
computer system.
5. Trojan horse: This type of virus misleads users of its true intent. It conceals its true content to
fool users into thinking it’s a harmless file.
COMPUTER HARDWARE
Front side: power switch button and light indicator, CD ROM drive
Inside: motherboard, CPU, power supply, memory, hard disk, CMOS battery, cables, cooling system,
expansion slots, etc
Motherboard: This connect all components of the computer system; it is the computer’s main
circuit board.
CPU (Central Processing Unit): This hardware component performs the calculations and does the
comparisons needed for processing and controls the other parts of the computer system. The
CPU is composed of three functional sections or parts (thus the Arithmetic and Logic Unit, Control
Unit and the Registers)
Power Supply Unit: this converts standard electrical power into a form the computer can use.
Memory (RAM): It is the primary storage device for the system that stores data temporarily while
you are working with the computer.
Hard disk: it is the main permanent storage device inside the system unit that stores data and
programs permanently.
Expansion slots: it helps connect expansion cards to the motherboard to add additional
capabilities to the computer system.
Fan (cooling systems): it helps cools the CPU and other important components.
CMOS Battery: it enables the system to keep track of current date and time.
INPUT DEVICES: They are hardware devices that is used to enter data and instructions for the
computer to carry out. Examples include mouse, keyboard, sensor, digital camera, joystick,
microphone, bar code reader, scanners (image, MICR, OMR, OCR) etc.
Keyboard: it is an input device that allow the user to give instruction to the computer. The most
widely used computer keyboard is the QWERTY keyboard. The computer keyboard has different
kinds of keys on it. These are
Alphanumeric keys: they are the keys on a keyboard that consist of letters, numbers,
punctuation marks and other symbols.
Numeric keys: they are the keys on which you see numbers 0 to 9, usually on the far right on
the keyboard.
Function keys: these keys on the computer keyboard can be programmed to cause OS
command interpreter or application to perform certain actions. They are labeled F1 to F12
Special purpose keys: these keys are used to help enter and edit data and execute
commands. Examples are Ctrl, Shift, Alt, Insert, Delete, Backspace, Prt SC, Escape, Windows
key
Cursor control keys: They are used to move the cursor. Examples are the Arrow keys, Pg Up,
Pg Dn, Home, End, Tab.
Lock keys: they are special keys designed to change the way other keys on the keyboard
behave. Caps lock, Num lock and Scroll lock
Mouse:
OUTPUT DEVICES: These hardware devices translate information processed by the computer into a
form that humans can understand. The output can be either a hardcopy (printed) or softcopy (on
screen or audio form). Examples include monitors, projectors, printers, audio output devices etc.
Printer is an output device that prints characters, symbols and graphics on paper or other hard copy
medium. They are generally categorized according to how the image produced is formed by physical
contact of the print mechanism with the paper. Therefore, printers can be divided into two types;
thus, Impact printers and non-impact printers.
Impact printers: this type of printer form characters by striking a mechanism like print
hammer against an inked ribbon, leaving the image on the paper. Examples of impact
printers are the dot matrix printer and daisy wheel printer. Usually they are very slow,
makes a lot of noise when printing and has a very low print quality.
Non-impact printer: this type of printer form characters and images without making direct
physical contact between the printing mechanism and the paper. Examples are laser printers
and ink-jet printers. Many offices use this type of printer because they are quiet, fast and
produce very sharp good images.
PROCESSING DEVICE: A processor is also called the Central Processing Unit (CPU), and it works hand
in hand with the main memory to carry out processing in the computer system. The CPU follows the
instructions of the software or program to manipulate data into information therefore it is the brain
of the computer. The CPU consist of three functional parts, thus the Arithmetic/Logic Unit, the
Control Unit and the Register.
The Arithmetic/Logic Unit (ALU): it performs arithmetic and logic operations. The arithmetic
operations are the fundamental math operations like addition, subtraction, multiplication
and division. The logical operations are comparison. It compares two sets of data to see
whether one is greater than, less than or equal to or not equal to the other.
The Control Unit (CU): It is for directing electronic signals in the CPU and regulates the
operations of the entire computer system. It directs movement of electronic signals between
main memory and the input and output devices.
The Register: It contain the address of the memory location where data is stored in the CPU.
They hold data, keep track of instructions, and hold the locations and results of these
operations.
STORAGE DEVICES: A storage device is a device that can read and write data on a storage media.
Examples include CD-ROM Drive, DVD-ROM Drive, Floppy Disk Drive and Hard Disk Drive.
Storage media refers to the medium used to keep or store electronic data permanently. The storage
media are popularly known as a secondary storage. Examples include Optical discs (CD-ROM, CD-R,
CD-RW/DVDs), Hard disk, Flash or pen drive, Memory Card (SD Card), Floppy disk, Cloud storages
(Dropbox, OneDrive/SkyDrive, Google Drive, Google Cloud Storage, iCloud Drive)
Kilobyte: A kilobyte (KB) is about 1000 bytes. (Actually, it’s precisely 210 = 1,024 bytes but the figure
is commonly rounded).
Megabyte: A megabyte (MB) is about 1 million (106) bytes (i.e. 220 = 1,048,576 bytes).
Gigabyte: A gigabyte (GB) is about 1 billion (109) bytes (i.e. 230 = 1,073,741,824 bytes).
Terabyte: A gigabyte (TB) represents about 1 trillion (1012) bytes (i.e. 240 = 1,009,511,627,776 bytes).
Petabyte: A petabyte (PB) represents about million gigabytes (1015) bytes or (106) gigabytes (i.e. 250 =
1,125,899,906,844,624). It is a measurement accommodates the huge storage capacities of modern
databases.
COMPUTER SOFTWARE
Software is set of instructions or programs that tell the computer how to perform a task in order to
process data into information.
The two main categories of software are System software and Application software.
System Software: They are software or programs designed to run a computer’s hardware and
provides a platform for applications to run on top of. They coordinate the activities and functions of
the hardware and software. Examples are Operating System, Driver Software and Utility software.
Operating System (OS) is the software that acts as an interface between the hardware
component and the user. It also a software which manages computer hardware. Examples
are Microsoft Windows, Linux, Mac OS, DOS, Unix, Android, Apple iOS, Ubuntu etc.
Utility software: is a software that performs specific tasks to keep the computer running in
the background. Examples include security and optimization programs.
Driver software: is a software that controls and manages the hardware device.
Application Software: They are the software designed to help users to solve specific problems,
perform specific tasks or to provide entertainment. Examples include Word processing programs,
Graphics programs, Spreadsheet programs, Presentation programs, Web browsers, Multimedia
programs, Education and reference programs, Games, Database programs etc.
Networking is a collection of computers, servers, network devices or other devices connected to one
another to share data.
Computer network
It is where computers and other hardware devices are connected together to share hardware,
software and data.
Types of Networks
Transmission Media
It is the means through which data is transmitted in a computer network. It can be done in either
wired transmission or wireless transmission.
Wired transmission media: is when physical cable is used to setup the network. Examples
are
1. Coaxial cable
2. Fibre-optic cable
3. Twisted pair cable
4. Telephone line
Wireless transmission media: is when data is sent without the use of a cables. Examples
include
1. Infrared e.g. TV remote
2. Radio waves e.g. FM Radio, cordless phone
3. Microwaves e.g. satellite dish
Network Devices
They are physical devices that are required for communication and interaction between hardware
on a computer network. Examples are Hub, Switch, Router, Repeater, Modem, NIC, Bridge, Gateway.
Hub – It is a network device that is used to connects multiple computers in a LAN network.
All the information send to the Hub is automatically sent to each port to every device.
Switch – It also connects multiple computers together in a LAN network. It simply detects
and connects specific computer by its MAC address and deliver message to the particular
destination. Switch is more intelligent than hub.
Router – It is a network device that works as a traffic controller of a network. It chooses a
congestion free path through which the data will travel. It forwards data from one network
to another using their IP addresses and also used to connects networks over the internet.
Repeater – It is a network device that is used to “boots up” or regenerates the weak signals
in a network.
Modem – It is a network device that is placed between the computer system and telephone
line. It allows computers to connect to internet.
NIC – It is a hardware device without which we can’t connect computer to the network or
internet.
Bridge – It is a network device that is used to separate LAN into number of sections.
Gateway – It is a hardware device that is used to connect two dissimilar types of networks. it
allows us to send and receive data through the internet even in LAN network.
Bandwidth – It is the amount of data that can be transferred from one point to another
within a network in a specific amount of time. It is measured in Mbps, Kbps or Bps.
Ethernet – Is way of connecting computers together in a wired local area network or LAN
Intranet – (Intra means within) It is an internal network within an organization that enables
them securely communicate, stores information and help collaborate.
Client – It is any computer that is connected to the network and accesses information or
other applications from a server.
Server – It is a computer or system that provides resources, data, services, or programs to
clients in a computer network. Examples are web server, mail server and file server.
Web servers are computer systems that stores and delivers content to a web browser.
Mail servers are computer systems that sends and receives email.
File server is a server that stores files and documents over a network.
Workstation – It is a high-performance computer system that is basically designed for a
single user and has advanced graphics capabilities, large storage capacity, and a powerful
central processing unit.
Broadband – It is the transmission of high-quality data of wide bandwidth. In its simplest
form, it is a high-speed Internet connection that is always on. Broadband is the transmission
of wide bandwidth data over a high-speed internet connection.
Network Topology
It is how computers and other network devices (nodes) have been physically and logically arranged
in a network via a communication medium. Nodes are electronic devices that are attached to the
network and its capable of creating, receiving or transmitting information over a communication
channel. Examples are hub, switch, modem etc.
1. Bus Topology
It is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is
called Linear Bus Topology.
Advantages Disadvantages
4. Best used in small networks. 3. It is not great for large networks.
5. When one computer fails, there will be no 4. If the main cable is damaged, the entire
effect on the other devices. network will go down.
6. It is less expensive. 5. There is no privacy in the network.
2. Ring Topology
In this type of network topology, each computer/node connects exactly two other nodes
forming a ring.
Advantages Disadvantages
1. Easy to install 1. Failure of one computer can create problems for the
entire network.
2. Easy to identify and isolate faults. 2. You cannot send private messages.
3. Star Topology
In this type of topology, all the computers are connected to a central device called hub or
switch.
Advantages Disadvantages
1. If one computer fails, the others node 1. If the central device fails, the entire network will
will not be affected. stop because all the nodes depend on it.
2. Devices can be added or removed 2. Expensive to install because of the number of
without disturbing the network. cables needed.
3. Mesh Topology
In mesh topology, every computer is directly connected to every other device on the network.
1. Hybrid Topology
Disadvantages
Advantages
1. It is a good topology to send private messages. 1. Installation and configuration are
difficult.
2. Very reliable and robust as failure of one device 2. Bulk wiring is required.
doesn’t affect communication between others on the
network.
3. No data traffic issues. 3. Highly expensive due to cabling
cost
A combination of two or more topology is known as hybrid topology. For example, a combination of
star and ring topology will result in a hybrid topology.
Advantages Disadvantages
1. Very effective since data can be transmitted 1. Installation is very difficult.
from different devices simultaneously.
2. Even if one of the computers fails there is 2. Fault detection is also very difficult.
always an alternative present.