Ict Commom Notes
Ict Commom Notes
INFORMATION
COMMUNICATION
TECHNOLOGY FOR
ALL COURSES
Academics Office
1. What is a computer?
4. History of Computers
The first electronic computers were produced in the 1940s. Since then,
a series of breakthroughs in electronics have occurred leading to great
improvements in the capacity, processing speed and quality of
computer resources.
Landmark Inventions
6. Classification of computers
Classification by processing
This is by how the computer represents and processes the data.
Classification by purpose
This is a classification by the use to which the computer is put.
Classification by generation
This is a time-based classification coinciding with technological
advances.
The computers are categorized as First generation through to Fifth
generation.
Unix and DOS-based operating systems use ASCII for text files.
Windows NT and 2000 uses a newer code, Unicode. IBM's S/390
systems use a proprietary 8-bit code called EBCDIC. Conversion
programs allow different operating systems to change a file from one
code to another. ASCII was developed by the American National
Standards Institute (ANSI).
(ii) EBCDIC
EBCDIC is a binary code for alphabetic and numeric characters that IBM
developed for its larger operating systems. It is the code for text files
that is used in IBM's OS/390 operating system for its S/390 servers and
that thousands of corporations use for their legacy applications and
databases. In an EBCDIC file, each alphabetic or numeric character is
represented with an 8-bit binary number (a string of eight 0's or 1's).
256 possible characters (letters of the alphabet, numerals, and special
characters) are defined.
(iii) Unicode
Number Systems
This is the normal human numbering system where all numbers are
represented using base 10.The decimal system consists of 10 digits
namely 0 to 9. This system is not used by the computer for internal
data representation. The position of a digit represents its relation to the
power of ten.
E.g. 45780 = {(0×100) + (8×101) + (7×102) + (5×103) +
(4×104)}
This is the system that is used by the computer for internal data
representation whereby numbers are represented using base 2. Its
basic units are 0 and 1, which are referred to as BITs (BInary digiTS). 0
and 1 represent two electronic or magnetic states of the computer that
are implemented in hardware. The implementation is through use of
electronic switching devices called gates, which like a normal switch are
in either one of two states: ON (1) or OFF (0).
2 1 6 3
Computer system
Communicati
on DevicesCPU
System Unit
Control Arithmetic
Unit & Logic
Unit
Input Registers (storage Outpu
Devic area) t
es Devic
es
Main Memory
(Primary
storage)
Secondary
Storage
Devices
Hardware categories
a) Input
Most computers cannot accept data in forms customary to human
communication such as speech or hand-written documents. It is
necessary, therefore, to present data to the computer in a way that
provides easy conversion into its own electronic pulse-based forms. This
is commonly achieved by typing data using the keyboard or using an
electronic mouse or any other input device.
Dumb Terminal
- Used to input and receive data only.
- It cannot process data independently.
- A terminal used by an airline reservation clerk to access
a mainframe computer for flight information is an
example of a dumb terminal
Intelligent Terminal
- Includes a processing unit, memory, and secondary
storage.
- It uses communications software and a telephone
hookup or other communications link.
- A microcomputer connected to a larger computer by a
modem or network link is an example of an intelligent
terminal.
Network Terminal
- Also known as a thin client or network computer.
- It is a low cost alternative to an intelligent terminal.
- Most network terminals do not have a hard drive.
- This type of terminal relies on a host computer or server
for application or system software.
Internet Terminal
- Is also known as a web terminal.
- It provides access to the Internet and displays web
pages on a standard television set.
- It is used almost exclusively in the home.
Pen input devices are used to select or input items by touching the
screen with the pen. Light pens accomplish this by using a white cell at
the tip of the pen. When the light pen is placed against the monitor, it
closes a photoelectric circuit. The photoelectric circuit identifies the
spot for entering or modifying data. Engineers who design
microprocessor chips or airplane parts use light pens.
Note:
b) Storage
Data and instructions enter main storage, and are held until needed to
be worked on. The instructions dictate action to be taken on the data.
Results of the action will be held until they are required for output.
c) Control
Each computer has a control unit that fetches instructions from main
storage, interprets them, and issues the necessary signals to the
components making up the system. It directs all hardware operations
necessary in obeying instructions.
d) Processing
Instructions are obeyed and the necessary arithmetic and logic
operations are carried out on the data. The part that does this is called
the Arithmetic and Logic Unit (ALU).
Processing devices
It consists of:
e) Output
Results are taken from main storage and fed to an output device. This
may be a printer, in which case the information is automatically
converted to a printed form called hard copy or to a monitor screen for a
soft copy of data or information.
Output devices
Printers
Forms images via pins striking a ribbon against a paper. The print head
typically have 9 or 24 pins. The images are relatively of poor quality
since dots are visible upon close inspection. Though inexpensive
compared to other types, they are noisy and low-end models are slow
(speed varies with price).
o Thermal Printers
Forms images using heat elements and heat – sensitive paper. It is very
quiet and not widely used by home PC users. Some very expensive
colour models are available. “Ink” in these computers is wax crayons.
Plotters
Plotters are typically used for design output. They are special-purpose
output devices used to produce charts, maps, architectural drawings
and three-dimensional representations. They can produce high-quality
multi-colour documents or larger size documents. Plotters produce
documents such as blueprints or schematics.
Monitors
– Output device for soft-copy output (temporal screen display of output
which lasts as long as the monitor’s power is on). They are the most
frequently used output devices. Some are used on the desktop; others
are portable. Two important characteristics of the monitor are size and
clarity.
Voice-output devices
5 ¼ floppy disks
3 ½ floppy disks – The most common size with a
capacity of 1.44 MB. They are not very fast and
durable.
Communication devices
Computer Memory
Memory capability is one of the features that distinguish a computer
from other electronic devices. Like the CPU, memory is made of silicon
chips containing circuits holding data represented by on or off electrical
states, or bits. Eight bits together form a byte. Memory is usually
measured in megabytes or gigabytes.
Types of Memory
RAM ROM
2. ROM (Read Only Memory) – Its contents can only be read and
cannot be changed. ROM chips is non-volatile, so the contents
aren’t lost if the power is disrupted. ROM provides permanent
storage for unchanging data & instructions, such as data from the
computer maker. It is used to hold instructions for starting the
computer called the bootstrap program.
PROM: the settings must be programmed into the chip. After they
are programmed, PROM behaves like ROM – the circuit states
can’t be changed. PROM is used when instructions will be
permanent, but they aren’t produced in large enough quantities
to make custom chip production (as in ROM) cost effective. PROM
chips are, for example, used to store video game instructions.
System software
Examples
Operating systems
Utility Programs - Utility programs often come installed on
computer systems or packaged with operating systems. Utilities
can also be purchased individually. Utility programs perform
useful tasks, such as virus detection, tracking computer jobs, and
compressing data.
Language processors – Compilers and interpreters
Operating systems
Sources of software
Application
Software
Proprietary Off-the-shelf
In – house Contract
customized customization
Advantages of proprietary software
You can get exactly what you need in terms of reports, features
etc.
Being involved in development offers a further level in control
over results.
There is more flexibility in making modifications that may be
required to counteract a new initiative by a competitor or to meet
new supplier or customer requirements. A merger with another
firm or an acquisition will also necessitate software changes to
meet new business needs.
The initial cost is lower since the software firm is able to spread
the development costs over a large number of customers.
There is lower risk that the software will fail to meet the basic
business needs
– you can analyse existing features and performance of the
package
Package is likely to be of high quality since many customer firms
have tested the software and helped identify many of its bugs.
General-purpose software
Examples include
Word processing – Create, edit and print text documents. E.g. MS
Word, Word Perfect.
Spreadsheets – Provide a wide range of built-in functions for
statistical, logical, financial, database, graphics, data and time
calculations. E.g. Lotus 1-2-3, Excel, Quattro Pro.
Database management systems (DBMS) – Store, manipulate and
retrieve data. E.g. Access, FoxPro, dBase.
Online Information Services – Obtain a broad range of information
from commercial services. E.g. America Online, CompuServe
Communications- Ms Outlook for email
Browsers e.g Internet Explorer, Eudora
Graphics – Develop graphs, illustrations and drawings. E.g.
PaintShop, FreeHand, Corel
Project Management – Plan, schedule, allocate and control people
and resources needed to complete a project according to
schedule. E.g. Project for Windows, Time Line.
Financial Management – Provide income and expense tracking
and reporting to monitor and plan budgets. E.g. Quicken
Desktop publishing -used to create high-quality printed output
including text and graphics; various styles of pages can be laid
out; art and text from other programs can also be integrated into
published pages. E.g. PageMaker, Publisher.
Presentation packages like MS Powerpoint
Programming Languages
Advantage
Disadvantages
Advantages:
Disadvantages:
Language translators
Interpreters
Compilers
Information
Information is data that has been processed into a form that is
meaningful to the recipient and is of real or perceived value in current
or prospective actions or decisions. It is important to note that data for
one level of an information system may be information for another. For
example, data input to the management level is information output of a
lower level of the system such as operations level. Information
resources are reusable. When retrieved and used it does not lose value:
it may indeed gain value through the credibility added by use.
Data Processing
Data processing may be defined as those activities, which are
concerned with the systematic recording, arranging, filing, processing
and dissemination of facts relating to the physical events occurring in
the business. Data processing can also be described as the activity of
manipulating the raw facts to generate a set or an assembly of
meaningful data, what is described as information. Data processing
activities include data collection, classification, sorting, adding,
merging, summarizing, storing, retrieval and dissemination.
In dealing with digital computers this data consists of: numerical data,
character data and special (control) characters.
Information processing
This is the process of turning data into information by making it useful
to some person or process.
Computer files
A file is a collection of related data or information that is normally
maintained on a secondary storage device. The purpose of a file is to
keep data in a convenient location where they can be located and
retrieved as needed. The term computer file suggests organized
retention on the computer that facilitates rapid, convenient storage and
retrieval.
Master files
Master files contain information to be retained over a relatively long
time period. Information in master files is updated continuously to
represent the current status of the business.
Accessing Files
Files can be accessed
Sequentially - start at first record and read one record after
another until end of file or desired record is found
o known as “sequential access”
o only possible access for serial storage devices
Directly - read desired record directly
o known as “random access” or “direct access”
File Organization
Files need to be properly arranged and organised to facilitate easy
access and retrieval of the information. Types of file organisation
(physical method of storage) include:
Serial
Sequential
Indexed-Sequential
Random
All file organisation types apply to direct access storage media (disk,
drum etc.)
A file on a serial storage media (e.g. tape) can only be organised
serially
Serial Organization
Each record is placed in turn in the next available storage space
A serial file must be accessed sequentially implying
o good use of space
o high access time
Usually used for temporary files, e.g. transaction files, work files,
spool files
Note: The method of accessing the data on the file is different to
its organisation
o E.g. sequential access of a randomly organised file
o E.g. direct access of a sequential file
Sequential organization
Records are organised in ascending sequence according to a certain
key
Sequential files are accessed sequentially, one record after the next
Suitable
o for master files in a batch processing environment
o where a large percentage of records (high hit-rate) are to
be accessed
Not suitable for online access requiring a fast response as file needs
to be accessed sequentially
Indexed Sequential
Most commonly used methods of file organisation
File is organised sequentially and contains an index
Used on direct access devices
Used in applications that require sequential processing of large
numbers of records but occasional direct access of individual records
Increases processing overheads with maintenance of the indices
Random organization
Data redundancy
o duplicate data in multiple data files
Redundancy leads to inconsistencies
o in data representation e.g. refer to the same person as
client or customer
o values of data items across multiple filesData isolation —
multiple files and formats
Program-data dependence
o tight relationship between data files and specific programs
used to maintain files
Lack of flexibility
o Need to write a new program to carry out each new
taskLack of data sharing and availability
Integrity problems
o Integrity constraints (e.g. account balance > 0) become
part of program code
o Hard to add new constraints or change existing ones
Concurrent access by multiple users difficult
o Concurrent accessed needed for performance
o Uncontrolled concurrent accesses can lead to
inconsistencies
o E.g. two people reading a balance and updating it at the
same time
Security problems
Data files and databases
A data file is a structured collection of data (information). The data is
related in some manner. It is organized so that relationships within the
data are revealed (or revealable). A data file stores several (many)
pieces of information about many data objects. The simplest and most
efficient metaphor of how data is organized in a data file is as a table of
rows and columns, like a spreadsheet but without the linkages between
individual cells. A data file is made up of a number of records; each row
in a table is a separate record. Each record is made up of all the data
about a particular entity in the file.
DBMSs are system software that aid in organizing, controlling and using
the data needed by application programs. A DBMS provides the facility
to create and maintain a well-organized database. It also provides
functions such as normalization to reduce data redundancy, decrease
access time and establish basic security measures over sensitive data.
Most DBMS have internal security features that interface with the
operating system access control mechanism/package, unless it was
implemented in a raw device. A combination of the DBMS security
features and security package functions is often used to cover all
required security functions. This dual security approach however
introduces complexity and opportunity for security lapses.
DBMS architecture
Data elements required to define a database are called metadata.
There are three types of metadata: conceptual schema metadata,
external schema metadata and internal schema metadata. If any one of
these elements is missing from the data definition maintained within
the DBMS, the DBMS may not be adequate to meet users’ needs. A data
definition language (DDL) is a component used for creating the schema
representation necessary for interpreting and responding to the users’
requests.
Data dictionary and directory systems (DD/DS) have been developed to
define and store in source and object forms all data definitions for
external schemas, conceptual schemas, the internal schema and all
associated mappings. The data dictionary contains an index and
description of all the items stored in the database. The directory
describes the location of the data and access method. Some of the
benefits of using DD/DS include:
Enhancing documentation
Providing common validation criteria
Facilitating programming by reducing the needs for data
definition
Standardizing programming methods
Database structure
The common database models are:
Hierarchical database model
Network database model
Relational database model
Object–oriented model
A hierarchical structure has only one root. Each parent can have
numerous children, but a child can have only one parent. Subordinate
segments are retrieved through the parent segment. Reverse pointers
are not allowed. Pointers can be set only for nodes on a lower level;
they cannot be set to a node on a predetermined access path.
Computer
Department
Manager Manager
(Development) (Operation)
The network structure is more flexible, yet more complex, than the
hierarchical structure. Data records are related through logical entities
called sets. Within a network, any data element can be connected to
any item. Because networks allow reverse pointers, an item can be an
owner and a member of the same set of data. Members are grouped
together to form records, and records are linked together to form a set.
A set can have only one owner record but several member records.
Comp
.
John Dept. Jane
Mary
Comp
. 101 Comp
. 201
Comp
Comp . 401
. 301
Multiprogramming
Multiprogramming is a rudimentary form of parallel processing in which
several programs are run at the same time on a uniprocessor. Since
there is only one processor, there can be no true simultaneous
execution of different programs. Instead, the operating system executes
part of one program, then part of another, and so on. To the user it
appears that all programs are executing at the same time.
Multiprocessing
Multiprocessing is the coordinated (simultaneous execution) processing
of programs by more than one computer processor. Multiprocessing is a
general term that can mean the dynamic assignment of a program to
one of two or more computers working in tandem or can involve
multiple computers working on the same program at the same time (in
parallel).
Multitasking
In a computer operating system, multitasking is allowing a user to
perform more than one computer task (such as the operation of an
application program) at a time. The operating system is able to keep
track of where you are in these tasks and go from one to the other
without losing information. Microsoft Windows 2000, IBM's OS/390, and
Linux are examples of operating systems that can do multitasking
(almost all of today's operating systems can). When you open your Web
browser and then open word at the same time, you are causing the
operating system to do multitasking.
Multithreading
It is easy to confuse multithreading with multitasking or
multiprogramming, which are somewhat different ideas.
NETWORKS
Terminologies used in networks
Bookmark - a way of storing your favorite sites on the Internet. Browsers like Netscape
or Internet
Cookie - Information (in this case URLs, Web addresses) created by a Web server and
stored on a user's computer.
Firewall - The name "firewall" derives from the term for a barrier that prevents fires from
spreading. A computer "firewall" is a barrier between your computer and the outside
world.
Flash - Animation software used to develop interactive graphics for Web sites as well as
desktop presentations and games (Windows and Mac) by the company Macromedia
Home page - Generally the first page retrieved when accessing a Web site
Internet - A global network of thousands of computer networks linked by data lines and
wireless systems.
Search Engine - specialized software, such as AltaVista and Yahoo, that lets WWW
browser users search for information on the Web by using keywords, phrases, and boolean
logic.
Telnet - The command to log on to another computer on the Internet.
URL - A universal resource locator (a computer address) that identifies the location and
type of resource on the Web. A URL generally starts with "http."
What is a computer
Network?
Every
network
includes
:
a
n
d
L
i
n
u
x
.
Types of
Networks:
MANs (Metropolitan
area Networks) The
refers to a network of
computers with in a City.
Categories
of Network:
Peer-to-peer.
Server – based.
Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network
What is a Topology?
The physical topology of a network refers to the configuration of cables, computers, and
other peripherals. Physical topology should not be confused with logical topology which is
the method used to pass information between workstations. Logical topology was
discussed in the Protocol chapter.
The following sections discuss the physical topologies used in networks and other related
topics.
Linear Bus
Star
Tree (Expanded Star)
Considerations When Choosing a Topology
Summary Chart
Star
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch, or concentrator (See fig. 2).
Data on a star network passes through the hub, switch, or concentrator before continuing to
its destination. The hub, switch, or concentrator manages and controls all functions of the
network. It also acts as a repeater for the data flow. This configuration is common with
twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Linear Bus
A linear bus topology consists of a main run of cable with a terminator at each end (See
fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear
cable.
Most computer processing systems require some input from the user. The way this
processing is to be carried out is determined at the system design stage of the System Life
Cycle.
This is called the 'processing mode'. The ones you need to understand are
Batch mode
Interactive mode
Real Time mode
. BATCH PROCESSING
It is often not desirable to deal with a set of data inputs until a certain
number have occurred or a set time has passed. So they are stored
until the system comes online to process the data in one 'batch'.
For example
A stock control programme may store records of every item sold in a shop that day.
Then, at the end of each day it calculates what needs to be ordered.
An online competition stores all the entries until it is time to find the winner.
Electricity, gas and telephone bills are usually calculated on a monthly basis.
Producing monthly bank statements to send out to customers
Payroll runs which may be weekly or monthly
After loading the data into the system, batch processing does not
usually require any further interaction on the part of the user. Therefore
the user interface is often code-based. The user enters the parameters
of the batch run then leaves it to carry on.
ADVANTAGES
DISADVANTAGES
All of a batch job’s input data must be ready before the computer
can run it; this means it must be carefully checked. Problems with
data, errors and program crashes that occur during batch jobs
bring the whole process to a halt; the inputs must be carefully
checked before the job can be run again. Even minor data errors,
such as typos in dates, can prevent a batch job from running.
TIME-SHARING
DISTRIBUTED PROCESSING
in the distributed processing system mode, server systems called distributed systems that
are placed at locations such as business stores and branch offices are connected to the host
computer. The role of distributed systems includes distributed processing of host computer
jobs and management of distributed data.
The following figure shows an example of the distributed processing system mode.
Computer security covers a lot of territory: locking your computer room and your machine,
protecting your login accounts with passwords, using file protection to keep your data from
being destroyed, encrypting network communications lines, and using special shields to
keep electromagnetic emanations from leaking out of your computer. But when people talk
about computer security, they usually mean what in this chapter we call computer system
security.
What Makes a System Secure?
In the most basic sense, computer system security ensures that your computer does what
it's supposed to do–even if its users don't do what they're supposed to do. It protects the
information stored in it from being lost, changed either maliciously or accidentally, or read
or modified by those not authorized to access it.
How does computer system security provide protection? There are four primary methods:
The section "System Access: Logging Into Your System" introduces the basics of
system access controls. Chapter 6, Inside the Orange Book, describes the Orange
Book accountability requirements, which specify the system access controls defined
for different levels of secure systems. In particular, see the section entitled
"Accountability Requirements" in that chapter.
"Data Access: Protecting Your Data" introduces the basics of data access controls.
In Chapter 6, the section entitled "Security Policy Requirements" describes the
Orange Book security policy requirements, which specify the data access controls
defined for different levels of secure systems.
3. System and Security Administration.
Performing the offline procedures that make or break a secure system–by clearly
delineating system administrator responsibilities, by training users appropriately,
and by monitoring users to make sure that security policies are observed. This
category also involves more global security management; for example, figuring out
what security threats face your system and what it will cost to protect against them.
4. System Design.
Taking advantage of basic hardware and software security characteristics; for
example, using a system architecture that's able to segment memory, thus isolating
privileged processes from nonprivileged processes.
The Internet links are computer networks all over the world so that users can share
resources and communicate with each other
There is no clear answer to this question because the Internet is not one
"thing", it's many things. No one central agency exists that charges
individual Internet users. Rather, individuals and institutions who use
the Internet pay a local or regional Internet service provider for their
share of services. And in turn, those smaller Internet service providers
might purchase services from an even larger network. So basically,
everyone who uses the Internet in some way pays for part of it.
Top
2-what makes the internet work?
The unique thing about the Internet is that it allows many different
computers to connect and talk to each other. This is possible because of
a set of standards, known as protocols, that govern the transmission of
data over the network: TCP/IP (Transmission Control Protocol/Internet
Protocol). Most people who use the Internet aren't so interested in
details related to these protocols. They do, however, want to know what
they can do on the Internet and how to do it effectively.
What is a virus?
This is a type of program which has been put together with the
aim of causing problems to your computer. Either your hard disk
could be permanently damaged, or, at least some files will be
corrupted.
WEB BROWSER
What is it? This is a piece of software that lets you visit the
World Wide Web, a vast interconnected group of files stored
on and accessed by computers around the world. The key to
the Web is its interwoven connections: the hyperlinks you
work with to access specific files on your screen.
Tool Bar: Here are some of the most frequently used commands
shown in the form of buttons. Point and click to use.
Home: To return to the page you saw when you first opened Internet
Explorer, click on Home.
Favorites: You may decide that there are certain web sites that you
want to refer to often so keep them in your favorites.
History:
To find a page you've seen in the last few days, on the toolbar,
click the History button. The History bar appears, containing
links for Web sites and pages visited in previous days and
weeks. In the History bar, click a week or day, click a Web site
folder to display individual pages, and then click the page icon
to display the Web page.
To sort or search the History bar, click the arrow next to the
View button at the top of the History bar.
You can hide the History bar by clicking the History button
again. You can change the number of days that pages are
saved in the History list. The more days you specify, the
more disk space is used on your computer to save that
information.
Print: If you want to print a web page, click here, you will be
asked which format you want. Choose Text if you want just the
basic information and no : graphics, or Richtext to include
everything.
Electronic mail, or e-mail, is probably the most popular and widely used
Internet function. E-mail, email, or just mail, is a fast and efficient way to
communicate with friends or colleagues. You can communicate with one
person at a time or thousands; you can receive and send files and other
information. You can even subscribe to electronic journals and
newsletters. You can send an e-mail message to a person in the same
building or on the other side of the world.
Top