Ict Dpte Part 1
Ict Dpte Part 1
Information Technology (IT) is a technology which uses computers to gather, process, store,
retrieve and protect, information. Today, it is common to use the term Information and
communications technology (ICT) because it is unimaginable to work on a computer which is
not connected to the network. Information Communications Technology (ICT) therefore refers
to the use of computers that are connected to the network to gather, process, store, retrieve,
protect, and transfer information.
Data refers to raw facts which have not been processed in to meaningful information. Processing is
transforming data in to meaningful information. Usually, Processing takes place in the CPU (Central
processing unit).Information refers to meaningful output produced by a computer system.
1. Speed – Computers have higher processing speeds than other means of processing,
measured as number of instructions executed per second.
2. Accuracy – Computers are not prone to errors. So long as the programs are correct, they
will always give correct output.
3. Consistency – Given the same data and the same instructions computers will produce
exactly the same answer every time that particular process is repeated.
4. Reliability – Computer systems are built with fault tolerance features, meaning that failure
of one of the components does not necessarily lead to failure of the whole system.
5. Memory capability – A computer has the ability to store and access large volumes of data.
6. Automation: A lot of tasks can be automated saving a lot of time. For example, instead of
manually calculating some values like mean, median of a large dataset, we just use excel.
7. Data retrieval: With one touch of a button, finding documents becomes easy. Thus it saves
a lot of time.
1
Compiled by Maurice Ngeti
Disadvantages of using computers
1. Unemployment: Computers can perform many tasks automatically; this reduces the need
for people and increases unemployment in the society.
2. Health issues: Prolonged use of computers can negatively affect your health. For example,
if you are constantly working on the computer, your eyes will become dry, which can result
in eye strain, headache, etc.
4. Addiction and time wastage: Some people use computers for entertainment purposes like
playing games, and it lasts an extended period, which has negative impacts. A much
younger generation is currently spending more time and energy on the computer.
6. High cost – Computers are expensive. Even the foremost affordable computers are still
very expensive for the typical person.
7. Increases waste and impacts the environment – With the speed that computers and other
electronics get replaced, all of the old devices that get thrown away have a big negative
impact on the environment
Banking – the banking sector has incorporated computer systems in such areas as fund
transfers, customer relations, automated teller machines, home banking, and online
banking.
2
Compiled by Maurice Ngeti
Management of information materials- The Internet has massive reference material on
virtually every learning area. Computer systems have enabled the efficient running of
libraries for information storage and retrieval.
Health care and medicine – computers have played an important role in the growth and
improvement of health care that the use of computers in medicine has become a medical
specialty in itself. Computers are used in such areas as maintenance of patient records,
medical insurance systems, medical diagnosis, and patient monitoring.
Retailing – computers are used in point of sale systems and credit card payment systems as
well as stock inventories.
1. Hardware – These are the physical and tangible parts of a computer system E.g. Keyboard, mouse,
etc
2. Software – These are Programs or instructions that tell the computer what to do and how to do it.
3. Data/Information – Data refers to raw facts which have not been processed in to meaningful
information.
4. Personnel – These are people using the computer system. E.g. End users, programmers, system
administrators etc.
5. Procedures – instructions that helps people to use the computer system.
3
Compiled by Maurice Ngeti
Data processing Lifecycle
These are the stages that data is passed through during processing. Also known as activities or
operations of computer system
1. Input – at this stage data from the environment is entered in to the information system for
processing. The input hardware devices here may include keyboard, mouse, joystick, etc
2. Processing – This is transforming data in to meaningful information. Usually, Processing takes
place in the CPU (Central processing unit)
3. Output – meaningful information produced by information systems. Output hardware devices
may include; monitors printers, speakers, projectors etc.
4. Feedback – Returning the information to the appropriate people in the organization.
5. Storage – writing data and information in to a secondary storage media. E.g. hard disk, flash disk,
memory card, etc
Arithmetic logic unit (ALU): The arithmetic logic unit is the computer’s calculator. It performs all the
arithmetic operations, in addition to decision making and editing functions. The arithmetic operations
include operations such as additions, subtractions, divisions and multiplications. Logic operations
include arrangement and rearrangements, matching, comparing, etc.
Control unit (CU): The control unit controls, and coordinates all operations occurring within the central
processing unit. It controls program execution. The arithmetic logic unit functions under direct control of
the control unit (CU).
Registers: Temporally storage areas used by the arithmetic logic unit and the control unit When
performing their operations.
4
Compiled by Maurice Ngeti
Computer Hardware
Computer hardware refers to the physical parts or components of a computer such as monitor,
keyboard, Computer data storage, hard drive disk, mouse, system unit (graphic cards, sound
cards, memory, motherboard and chips), etc. all of which are physical objects that you can
actually touch.
System Unit
The system unit refers to the body of the computer containing the electronic parts that operate
the computer, the connections to the other components, and the disk drives. It is important to
note that the central processing unit (CPU) is contained within the system unit. Among other
components that contained within the system unit is the mother board, Processor, RAM, ROM,
BIOS, disk drives, floppy disk, hard disk and power supply.
1. Motherboard: The motherboard is the main circuit board of the system unit
2. Processor (CPU): The central processing unit is the control center of the entire computer
system. It accepts data from various input devices, processes this data in to information,
and sends this information to an output device such as a monitor or a printer. The central
processing unit is composed of two major components namely;
Arithmetic logic unit (ALU): The arithmetic logic unit is the computer’s calculator. It
performs all the arithmetic operations, in addition to decision making and editing functions.
Control unit (CU): The control unit controls, and coordinates all operations occurring within
the central processing unit. It controls program execution.
5
Compiled by Maurice Ngeti
3. Random access memory (RAM) is an internal chip where data is temporarily stored when
running applications. This memory can be written to and read from. Since its contents are
lost when power to the computer is turned off, it is often referred to as a ‘volatile’ or
‘temporary’ memory.
4. Read only memory (ROM) is a memory used to store information that needs to be
permanent. It is often used to contain, for example, configuration data for a computer
system. These chips cannot be altered and can only be read from (hence their name). One
of the main advantages is that the information stored on the ROM chip is not lost even
when power is turned off to the computer. They are often referred to as ‘non-volatile’
memories.
5. Bios – This is the program that starts the computer system. The bios program controls the
system during initialization process.
6. Disk Drives - Disk drives are devices inside the system unit that read and write information
on a disk. Data stored on a disk is not lost when the computer is turned off.
7. Hard Disk–The hard disks is a secondary storage device for large capacity storage of data.
They range in capacity from 20 megabytes and larger.
8. A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage
DC power for the internal components of the computer.
9. CMOS (complementary metal oxide semiconductor): a non-volatile chip stores the date,
time and system configuration
6
Compiled by Maurice Ngeti
Computer Software
Computer Software refers to programs or applications that tell the computer hardware what to
do and how to do it.
1. System software: Softwares designed to meet computer’s needs. These Softwares manages
and controls computer hardware so that application softwares can perform their task. e.g.
Operating System (OS) and utility programs.
2. Application software: Softwares designed to meet user’s needs. They are designed to
enable the end-user to perform specific productive tasks. e.g. MS Word for word
processing or Photoshop for image manipulation.
Hardware and Software have a symbiotic relationship, this means that without software
hardware is very limited; and without hardware, software wouldn't be able to run at all. They
need each other to fulfill their potential.
i. Bespoke software
ii. Of-the-shelf software
7
Compiled by Maurice Ngeti
Bespoke Software/Custom software/ Unique Applications/Proprietary software
Bespoke Software is software designed to suit your company’s unique requirements. Bespoke
software is written specifically for you, to meet your specific business requirements. They are
also known as in-house programs or as tailor made programs.
Advantages
8
Compiled by Maurice Ngeti
Disadvantages of off-the-shelf software/Application software/Packages
1. It is not easy to modify the packages.Users must depend on suppliers in case of changing
the software.
2. The packages may not be compatible to some operating systems e.g. Ubuntu.
3. The programs may not be suitable to solve some specific problems.
4. Programmers are needed to install the packages that fit the organizational needs.
5. It is unlikely you will find ready-made software that does everything you would like it to.
6. As your requirements change, the software may not be able to change to keep up – this can
lead to a costly switch to a new package.
7. The same system is available to your competition and gaining any lasting advantage from it
is unlikely.
9
Compiled by Maurice Ngeti
TYPES/CLASSIFICATION OF OPERATING SYSTEMS (OS)
The OS determines determine the type of processing that a computer system is able to
perform, since it controls the allocation & use of the computer resources. Operating systems
can be classified according to:
4. Human Computer interface (HCI) (i.e., how the user & the computer interact).
Command line interface: Allows the user & the computer to interact using commands
Menu driven interface:This type of interface provides the user with a list of program
commands displayed on the screen to choose from
Graphical user interface (GUI): Allows the user & computer to interact by clicking on Icons
using the mouse
5. Real time OS: Responds to input instantly. General-purpose operating systems, such as DOS
and UNIX, are not real-time.
10
Compiled by Maurice Ngeti
Factors to consider when choosing an operating system
The following factors should be considered when choosing an operating system for a computer;
a. Hardware configuration of the computer, e.g., RAM memory size, hard disk capacity, type of
processor, etc.
b. User needs (requirements), i.e., the applications intended for the computer.
c. User friendliness or Human computer interface, i.e., is it Command line based, Menu-driven
or a Graphical user interface?
d. Availability in the market, e.g. Microsoft Windows based OS are very common.
e. Portability.
f. Cost – how expensive the OS is.
g. Reliability, i.e., can it run without crashing or hanging (stop responding to commands).
User interface
A user interface controls how you enter data and instructions and how information is displayed
on the screen
1. Graphical User Interface (GUI): User interact the system through WIMP environment-
Windows, Icon, Menus, and Pointers (WIMP). GUIs are small pictures that represent
actions, and they can be selected by ‘clicking’ on them with the mouse. Example of GUI
interface Windows & Mac OS
2. Command line interfaces (CLI): require a user to type in instructions in order to choose
options from menus, open software etc. There are often a number of commands that need
to be typed in, for example, to save or load a file. The user therefore has to learn a number
of commands just to carry out basic operations. E.g MS DOS
A Utility Program is a type of system software that allows a user to perform maintenance-type
tasks. Examples of Utility Programs : Windows Explorer (File/Folder Management),
Compression Tool, Anti-Virus Utilities, Disk Defragmentation, Disk Clean, BackUp, WinZip,
WinRAR etc
11
Compiled by Maurice Ngeti
Evolution of computers
The earliest mechanical aid to calculation was abacus or bread frame. This is said to have
originated in china in the seventh century BC. The Romans used pebbles on a grooved board in
similar way to the abacus; and the word “calculation” is derived from the Latin ‘calculus’
meaning a pebble. Therefore the first computer to be developed was a basic adding machine
(calculator) for performing only additional functions.
The computers of today are vastly different in appearance and performance as compared to the
computers of earlier days. But where did this technology come from and where is it heading?
To fully understand the impact of computers on today’s world and the promises they hold for
the future, it is important to understand the evolution of computers.
COMPUTER GENERATIONS
The term computer generation is applied to different types of computers to help describe the
major technological developments in hardware and software. Today, computer technology has
evolved through four distinct generations and is currently developing in to the fifth generation.
With each new generation, the circuitry has gotten smaller and more advanced than the
previous generation before it. As a result of the miniaturization, speed, power, and memory of
computers have proportionally increased.
12
Compiled by Maurice Ngeti
Characteristics of the second generation computers
They used transistors unlike the first generation which used vacuum tubes.
They were smaller than the first generation computers and required smaller space.
They were cheap to produce compared to the first generation since One transistor replaced
the equivalent of 40 vacuum tubes
They consumed less power and generated less amounts of heat compared to the first
generation computers thus less prone to hardware failures.
They were easier to use and program compared to the first generation computers hence had
a wider commercial use.
13
Compiled by Maurice Ngeti
Fifth generation (now and in future)
Definitions of what constitutes fifth generation computers do not always agree. Some people
think that the new microcomputers with faster operating speeds, greater processing capacity
and virtually unlimited memory should be included. Other people believe that fifth generation
computers will have circuitry based with gallium arsenide. Gallium arsenide offers a fivefold
speed increase and uses only one tenth of the power that silicon uses. Many fifth generation
computers will also incorporate hundreds or thousands of processors that operates in parallel
i.e. simultaneously.
― The ULSI {Ultra Large Scale Integrated Microprocessor} Technology is used in fifth
generation computers.
― They use parallel processing.
― Artificial Intelligence is used in these 5th generations of computers, and these
characteristics are considered the most acknowledged and utilized.
― These computers are more reliable and portable compared to other generations of
computers.
― They are relatively cheaper than their counterparts.
― Use of optical fiber in circuits
Classification of computers
Because of the variety of computers power available, computers are classified as to purpose,
type and capacity.
Purpose
Computers are designed to either special purpose or general purpose computing devices.
Special purpose computers- are also known as dedicated computers and are computers
designed to perform only one major function. eg calculators, Thermometers, etc
General purpose computers - are designed to handle a variety of tasks. General purpose
computers are also known as hybrid computers. eg PCs, Cell phones, Notebooks, etc
Type
There are two types of computers currently available; analog and digital
Analog Computer:The computer that work with natural phenomena and physical values like
earthquake measurement, speed of the wind, weight light etc is known as Analog computers. It
14
Compiled by Maurice Ngeti
is especially used in scientific work, medical and industrial field. These are special purpose
computers. It measures physical values such as temperature or pressure that fall along a
continuous scale in temperature or pressure. For example, you can see a system on petrol
pump that contains an analog processor and analog device that converts flow of petrol into
quantity. Speedometer in cars and your watch are other examples of analog computer
An analog computer is a form of computer that uses continuous physical phenomena such as electrical,
mechanical, or hydraulic quantities to model the problem being solved.
Digital Computer:
A computer that work with digital value 0 and 1. Where 0 is OFF and 1 is ON. It works with
discrete data. Digital computer does not measure the continuous data for continuous output.
Most of the electronic system is based on the digital system. Digital computers are very popular
for actual computers are very popular for actual computer works like preparation of the report,
documentation, billing and other graphical work etc. The entire PC (Personal Computer) used
today on different fields are digital computers.
A computer that performs calculations and logical operations with quantities represented as
digits, usually in the binary number system
Hybrid computer:
It is the combination of analog and digital computer system. It works with continuous and
discrete value. The good qualities of analog and digital computers are combined on this
computer and made the hybrid computer. These are used in ICU (Intensive Care Unit) of the
hospital, jet planes, and other data analysis terminals. Hybrid computer transfers the data from
analog to digital and digital to analog and vice-versa.
15
Compiled by Maurice Ngeti
Minicomputers: They are medium sized computers used in medium sized businesses e.g.
insurance companies, banks etc. Usually they have a higher processing and storage capacity
than microcomputers.
Mainframe computers: Generally mainframe computers have greater processing speeds
over microcomputers and minicomputers. They are used in large business organizations
which handles complex and voluminous data e.g. government offices. It is a very large and
expensive computer capable of supporting hundreds, or even thousands, of users
simultaneously.
Supercomputers: The fastest and most powerful type of computer. Supercomputers are
very expensive and are employed for specialized applications that require immense
amounts of mathematical calculations. For example, weather forecasting requires a
supercomputer.
Laptop Computer: a portable computer complete with an integrated screen and keyboard.
It is generally smaller in size than a desktop computer and larger than a notebook
computer. It is practically placed on the user's lap, hence the name.
Tablet Computer: tablet computer, computer that is intermediate in size between a laptop
computer and a smartphone.
Smartphone: a mobile phone that performs many of the functions of a computer, typically
having a touchscreen interface, internet access, and an operating system capable of running
downloaded apps.
Personal digital assistant (PDA): A personal digital assistant, usually referred to simply as a
PDA or a handheld PC, is a microcomputer that acts chiefly as a digital information manager.
16
Compiled by Maurice Ngeti
ICT TOOLS
Information Communication Technology tools are digital infrastructures such as; computers,
laptops, desktops, data projector, software programs, printers scanners and Interactive
teaching box.
Examples of ICTs that may be used as educational tools in the classroom may include: Radio,
Television, computer, Internet, mobile learning, whiteboards, etc
Information and Communication Technology consists of various tools and systems that can be
exploited by capable and creative teachers to improve teaching and learning situations. Lim and
Tay (2003) classification of ICT tools as:
1. Informative Tools: Informative tools are applications that provide large amounts of
information in various formats such as text, graphics, sound, or video. Examples include;
Internet, Network Virtual Drive, Intranet systems, Homepage, E-books, etc.
2. Communicative Tools: Communicative tools are systems that allow easy communication
between teachers and students or between students outside the physical barrier classroom.
It is including e-mail, electronic bulletin boards, chat, teleconference and electronic
whiteboard.
3. Situating tools: Situating tools is the system that situates users in an environment where
they may experience the context and the happening. Examples of such systems include
simulation, virtual reality and multi-user domain. Situating tools software tools such as CD-
ROM.
4. Collaborative tools: A collaboration tool helps people to collaborate. The purpose of a
collaboration tool is to support a group of two or more individuals to accomplish a common
goal or objective. Internet can be used for many collaborative activities such as meetings,
discussions, information dissemination, and other tasks.
5. Constructive Tools: constructive tool is a general purpose tool that can be used to
manipulate information, construct their own knowledge or visualize students
understanding. Construction tools such as Microsoft Word or Powerpoint has a strong
impact in the educational environment
17
Compiled by Maurice Ngeti
ICT Tools for teaching and learning
The ICTs are needed at school level for the following activities (Sansanwal, 2009):
Teaching and learning process
Diagnostic Testing and Remedial teaching
Evaluation activities
Psychological analysis of learners
Development of reasoning and thinking abilities among students
Instructional material development
1. Student needs—taking into account their prior knowledge, level of technological literacy,
personal interests, and those other things that make our students special and unique
individuals
2. Compatibility: When choosing hardware, make sure that any new or replacement
components are compatiblewith your existing computer equipment.
4. Costs and Savings: The cost of the tool is another factor to consider. Free and cheaper
software is easier to access and may have a larger user community. Also, a digital tool may
actually end up saving money for schools, teachers and students. So the question may
actually be about how much money the tool will save you, rather than cost you.
5. Familiarity with Technology: There should be a consideration about how comfortable the
student is with digital tools. Think about tools they have used previously and how they
compare to the potential selection.
6. User friendly – The ICT Tool should be easy to use for various purposes like generating
quizzes, evaluating students’ performance and so on
18
Compiled by Maurice Ngeti
1. Buying/purchasing
2. International donations
3. Corporate/Alumni donation
4. NGO Donation
5. Government donation
PRODUCTIVITY TOOLS
Basic productivity tools are computer software programs which allow a user to create specific
items quickly and easily as opposed to creating the same items by hand. They help users
produce things such as documents, databases, graphs, spreadsheets and presentations. Some
of the common productivity tools include:
1. Word Processing. A word processor is a program that is used to create, view, edit, and print
documents. An example would be Microsoft Word.
2. Spreadsheets. A spreadsheet is an application tool that store, organize, and calculate data
in tables. An example would be Microsoft Excel.
4. Databases. Databases allow the user to save collections of information in one easily
accessible place. This allows the user to find information about a specific topic much faster
versus searching the internet. An example of a database would be Microsoft access, Galileo,
etc
5. Graphics suite: A graphics suite is a group of programs that are used to view, manipulate,
and print computer graphics. Popular examples are Corel and Adobe, which includes
Photoshop.
Productivity tools enhance a teacher’s lesson plan and allow the teacher to take their students
beyond textbooks and boring lectures. For example, Excel is a productivity tool that can be very
helpful in teaching situation dealing with math and science. Excel possesses the ability to
change numerical data and put it in the form of a graph in a matter of seconds. This technique
allows the teacher to show the difference in the results of an experiment or survey using a
graph or chart. This visual picture is just as important as the numerical data. Some children are
19
Compiled by Maurice Ngeti
visual learners and they may not be able to comprehend the difference of the data without
seeing it in a chart or graph. On the other hand, PowerPoint enables teachers to make slides of
their notes and project them onto a screen so that everyone can copy word for word what the
teacher wants them to learn.
Microsoft Office is one of the most well-known suites, which includes Word, Excel, PowerPoint,
OneNote, Outlook and Publisher.
Google Workspace is a suite that includes Google Docs, Google Sheets, Google Slides and Google
Forms.
Apache OpenOffice is a popular open source suite that includes Writer for word processing, Calc for
spreadsheets, Impress for presentations, Draw for graphics and Base for databases.
Apple iWork is a suite from Apple that includes Pages for word processing, Numbers for
spreadsheets and Keynote for presentations.
Openoffice: Another free office productivity suite. The following are included in this suite: Writer,
Calc, Impress, Draw, Base, and Math.
There are many benefits to using productivity software, including the following:
Increased efficiency. By automating tasks and providing templates and other tools,
productivity software can help users work more quickly and efficiently.
Improved accuracy. Automated features can help reduce errors in data entry and other
tasks.
Greater flexibility. Productivity software often provides a range of ways to view and
manipulate data, making it easier to find the information you need and tailor it to your
specific needs.
Enhanced collaboration. Many productivity applications now include features that make it
easy to share documents and work on them together with colleagues, which can improve
communication and collaboration.
There can also be some disadvantages to using productivity software, including the following:
20
Compiled by Maurice Ngeti
Increased dependence on technology. Relying on productivity software can make it difficult
to work if there are technical problems or employees don't have access to a computer.
IT support issues. If employees are not familiar with the software, they might need help
from IT support staff to use it effectively, which can add to costs.
Complexity. Some productivity applications can be complex and time-consuming to learn,
which can offset any efficiency gains.
When choosing productivity software, it's important to consider your specific needs and
requirements. Below are a few key points to keep in mind when selecting productivity
software.
The types of tasks you need to do. Make a list of the tasks you need to be able to do with the
software. This will help you narrow down your options.
How many features you need. If you're just using it for personal use, you might not need as many
features as if you're using it for business purposes.
Your budget. Productivity suites can be expensive, so it's important to consider how much you're
willing to spend. There are also some good free options available.
Your level of expertise. If you're not very familiar with computers, you might want to choose a tool
that's relatively easy to use.
Compatibility with other software. Make sure the productivity software you choose is compatible
with any other software you're using.
Rescue Time: Rescue time is an online time tracking and management program for any busy person
who wants to get more done with their time. When entering grades into online grade books, it is too
easy to flip over to email or Facebook and lose track of time. RescueTime can block those
distractions to make it easier for you to stay focused.
21
Compiled by Maurice Ngeti
Todoist’s: Todoist's tagline is "Free up your mental space," and it does just that. It lets you take
control of your day with a customizable to-do list and tasks. It helps you manage your jobs by
allowing you to color-code tasks according to priority
Wunderlist: Wunderlist is an easy-to-use and free task manager that can help teachers and other
professionals make and organize lists. You can use it on your computer, tablet, and phone at no
cost, a great feature for teachers. Wunderlist is very easy to use and you can take your lists with you
everywhere you go so that you are working smarter, not harder.
Edmodo: Edmodo provides the learning community with unlimited resources. It is an assessment
tool that helps educators build interactive classrooms with polls, quizzes, notes, questions, and
assignments.
Generally a hazard is a situation in the workplace that has the potential to harm the health and
safety of people or to damage plant and equipment. Common hazards encountered by
computer technicians and users includes; Physical Hazards, Chemical Hazards and biological
hazards
22
Compiled by Maurice Ngeti
2) Repetitive strain injury:
Repetitive Strain Injury (RSI) is damage to the fingers, wrists and other parts of the body due to
repeated movements over a long period of time.
Practical Tips:
Typing should be gentle. Do not fix your wrists in a certain position while typing.
Have a five-minute break from typing every hour.
Relax your arms or stretch when you are not typing or using the mouse.
3) Eye Strain
Eyes can become strained after staring at a computer screen for a long time, particularly if
working in bad light, in glare or with a flickering screen.
Practical tips
Adjust the contrast and brightness of your computer screen such that your eyes are not
strained.
Maintain a proper distance from the screen.
Use screens that do not flicker.
Take regular breaks - do not work for more than one hour without a break.
4) Headache
Because of increased muscle tension or pain in the neck at the base of the skull, headache is
common problem with computer use. Many a times, prolonged use can affect eye power which
needs vision correction. This can also result in headache.
Practical tips
Get your eye power tested if headache is a common problem with computer use.
Take breaks in between and circle your neck a bit to release the strain.
5) Obesity
Studies have shown that prolonged use of computers, especially in children, is the major
contributing factor of sedentary lifestyle and childhood obesity.
Practical tips:
Set limits for your children if they insist to playing computer games non-stop.
Encourage your children to play outdoor games or to take up a hobby. Involve them in
extra-curricular activities
Adults who work for 7-8 hours should avoid spending time on computer after reaching
home. Your body and mind both need to relax.
23
Compiled by Maurice Ngeti
6) Stress disorders
Prolonged computer use along with other factors like poor health, work pressure and job
environment can make you susceptible to stress. Moreover, the longer you uphold the stress,
the more susceptible you become to other health issues mentioned above. It can also lead to
loss of concentration, dizziness and weariness.
Practical tips:
Be proactive and take necessary measures to beat stress before it affects your health.
Chemical hazards
Exist in the form of gases, dust, corrosives, vapor and liquids. These chemicals can become
dangerous to persons, when inhaled or absorbed through the skin. -Can cause breathing
problems, skin irritation or burns.
When you open a computer you will find circuit boards, and circuit boards often contain
poisonous metals that are used in the manufacturing process, including mercury and lead.
Both of these can have profound health effects in humans. Mercury poisoning causes
damage to the central nervous system, liver, and other organs and causes impairment of
the senses (vision, speech, and hearing). Lead toxicity can cause anemia, irreversible
neurological damage, cardiovascular effects, gastrointestinal symptoms, and renal disease.
Computer screens (CRT) also contain phosphors and barium compounds, which are toxic,
and the glass may be leaded. Liquid crystal display screens may also contain lead, as well as
copper at levels in excess of regulatory limits. The backlight may also contain mercury.
Some UPS devices and some older computers use lead acid batteries (like car batteries).
These contain sulfuric acid that's very corrosive and can pose a big danger if they leak.
Laptop Batteries also contain heavy metals, including lead, mercury, nickel, and cadmium
which are also considered to be hazardous.
Ozone irritation: Health experts have suggested that ozone emitted from laser printers can
lead to breathing problems.
24
Compiled by Maurice Ngeti
Use personal protective equipment and devices.
Maintain equipment in good order to prevent leaks and breakdowns that may release toxic
substances.
25
Compiled by Maurice Ngeti
DATA SECURITY AND CONTROL
Data & Information must be protected against unauthorized access, disclosure, modification or
damage. Data security is the protection of data & information from accidental or intentional
disclosure to unauthorized persons.
A computer virus is a program designed specifically to damage other programs or interfere with
the proper functioning of the computer system.
Sources of viruses
a) Contact with contaminated systems: If a disk is used on a virus infected computer, it could become
contaminated. If the same diskette is used on another computer, then the virus will spread.
26
Compiled by Maurice Ngeti
b) Use of pirated software: Pirated software may be contaminated by a virus code or it may have been
amended to perform some destructive functions which may affect your computer.
c) Infected proprietary software: A virus could be introduced when the software is being developed
in laboratories, and then copied onto diskettes containing the finished software product.
d) Fake games: Some virus programs behave like games software. Since many people like playing
games on computers, the virus can spread very fast.
f) Updates of software distributed via networks: Viruses programs can be spread through software
distributed via networks.
b). Surveillance (monitoring): This is where a person may monitor all computer activities done by
another person or people.
27
Compiled by Maurice Ngeti
Industrial espionage involves spying on a competitor so as to get or steal information that can be
used to finish the competitor or for commercial gain.
d). an employee who is not supposed to see some sensitive data gets it, either by mistake or design.
e). Forced entry into the computer room through weak access points.
i). Enforce data & information access control policies on all employees to control access to data.
ii). Keep the computer room closed when nobody is using it.
iii). Reinforce weak access points, e.g., doors & windows with metallic grills & burglar alarms.
iv). Use file passwords to prevent any person from getting access to the electronic files.
v). Enforce network security measures, e.g., use of firewalls.
vi). Encrypt the data & information during transmission.
vii). Perform frequent Audit trails to identify threats to data & information.
Mistakes made by people, e.g., one may print sensitive reports & unsuspectingly give them to
unauthorized persons.
People experimenting with features they are not familiar with. E.g., a person may innocently
download a file without knowing that it is self-installing or it may be dangerous to the system.
4). THEFT
The threat of theft of data & information, hardware & software is real. Some information is so
valuable such that business competitors or some governments can decide to pay somebody a fortune
so as to steal the information for them to use.
28
Compiled by Maurice Ngeti
COMPUTER CRIMES
A computer crime is a deliberate theft or criminal destruction of computerized data. It is the use of
computer hardware, software, or data for illegal activities, e.g., stealing, forgery, defrauding, etc.
Trespass.
― Trespass refers to the illegal physical entry to restricted places where computer hardware,
software & backed up data is kept.
― It can also refer to the act of accessing information illegally on a local or remote computer over a
network.
Hacking
Hacking is an attempt to invade the privacy of a system, either by tapping messages being
transmitted along a public telephone line, or through breaking security codes & passwords to gain
unauthorized entry to the system data and information files in a computer.
Hacking is done by skilled programmers referred to as Hackers. Hacker is a person who gains
unauthorized access to a computer network for profit, criminal mischief, or personal gain.
Tapping
Tapping involves listening to a transmission line to gain a copy of the message being transmitted.
Cracking
29
Compiled by Maurice Ngeti
Cracking is the use of guesswork by a person trying to look for a weakness in the security codes of a
software in order to get access to data & information.
Piracy
Piracy means making illegal copies of copyrighted software, data, or information either for personal
use or for re-sale.
Fraud
Fraud is the use of computers to conceal information or cheat other people with the intention of
gaining money or information. Fraud may take the following forms:
a). Input manipulation: Data input clerks can manipulate input transactions, e.g., they can create
dummy (ghost) employees on the Salary file or a ghost supplier on the Purchases file.
b). Production & use of fake documents: E.g., a person created an intelligent program in the Tax
department that could credit his account with cents from all the tax payers. He ended up becoming
very rich before he was discovered.
Fraudsters can either be employees in the company or outsiders who are smart enough to defraud
unsuspecting people.
Sabotage
Sabotage is the illegal or malicious destruction of the system, data or information by employees or
other people with grudges with the aim of crippling service delivery or causing great loss to an
30
Compiled by Maurice Ngeti
organization. Sabotage is usually carried out by discontented employees or those sent by competitors
to cause harm to the organization.
The following are some acts of saboteurs which can result in great damage to the computer centres:
― Using Magnets to mix up (mess up) codes on tapes.
― Planting of bombs.
― Cutting of communication lines.
Alteration
Alteration is the illegal changing of stored data & information without permission with the aim of
gaining or misinforming the authorized users.
Alteration is usually done by those people who wish to hide the truth. It makes the data irrelevant and
unreliable.
31
Compiled by Maurice Ngeti
Audit trails
This is a careful study of an information system by experts in order to establish (or, find out) all the
weaknesses in the system that could lead to security threats or act as weak access points for
criminals.
Data encryption
Data being transmitted over a network faces the dangers of being tapped, listened to, or copied to
unauthorized destinations. To protect such data, it is mixed up into a form that only the sender & the
receiver can be able to understand by reconstructing the original message from the mix. This is called
Data encryption.
Log files
These are special system files that keep a record (log) of events on the use of the computers and
resources of the information system.
Each user is usually assigned a username & password or account. The information system
administrator can therefore easily track who accessed the system, when and what they did on the
system.
Firewalls
A Firewall is a device or software system that filters the data & information exchanged between
different networks by monitoring & controlling access to or from protected networks.
1). Fire.
Fire destroys data, information, software & hardware.
Security measures against fire:
Use fire-proof cabinets & lockable metal boxes for floppy disks.
Use of backups.
Install firefighting equipment, e.g., fire extinguishers.
Have some detectors.
Training of fire-fighting officers.
Observe safety procedures, e.g., avoid smoking in the computer rooms.
Have well placed exit signs.
Contingency plans.
32
Compiled by Maurice Ngeti
3). Lightening, electricity & electrical storms.
This causes power failure that can cause damage to data, which has not been transferred to permanent
storage devices.
Security measures:
Install facilities to control power fluctuations, e.g., use of Uninterrupted power source (UPS)
Use power stabilizers.
Have standby power generators/sources.
Have lightening arresters in the building.
Security measures:
There should be efficient ventilation system.
Use a cooling system in the computer rooms, e.g., cooling fans & air conditioners.
Political terrorists
Criminal type of activities
33
Compiled by Maurice Ngeti
Individuals with grudges, or
People intending to cause general destruction.
Security measures:
Hiring of security guards to control physical access to the building housing the computer room.
Activities that can cause terrorism should be avoided, e.g., exploitation of workers.
Have double door & monitoring devices.
Use of policies.
System auditing / use of log files.
Use of passwords.
Punitive measures.
Encryption of data.
Use of firewalls.
Consult & co-operate with the Police and Fire authorities on potential risks.
8). People.
People threats include:
Carelessness.
Clumsiness.
Accidental deletion of data, information or programs.
Vandalism, i.e., theft or destruction of data, information or programs & hardware.
Piracy of copyrighted data & software.
34
Compiled by Maurice Ngeti