Computer Notes
Computer Notes
Information and communication plays an important role in our day-to-day activities. This information
and communication has been greatly enhanced by the advent of computers. Computers can now be
found in banks, shops, and government offices and media houses. It has therefore become very
important that a person becomes a knowledgeable and competent user of computer based
Technologies or Information and Communication Technology (ICT) to survive in this technological
world.
What a Computer does:
There are four jobs that any computer is built to do. These are:
1. Accept information. You must put information into a computer. This information is of two types
namely:
I. A collection of words and numbers
ii. A set of instructions, instructing the computer what to do.
2. Store the information. The information is stored in a device called a memory that holds the
information for as long as long as you want it.
3. Process information. The stored information is then worked upon and turned into what the
computer was instructed to do.
4. Give out the processed information. The results of the processed information are then given
out. They are the results of the instructions to the computer.
DEFINITION:
What is a computer?
• A computer is an electronic machine which can receive data, manipulate (process) it and
output information
• A computer is an electronic device that can accept data input, store, process and output
information according to specified instructions. A working computer is made up of the
hardware and software
THE BASIC PHYSICALPARTS OF A COMPUTER
A desk top computer is made up of collection of components /parts that are inter-connected to
function as a single unit and these parts may include
THE SYSTEM UNIT: This is the part that houses the brain/inside parts of a computer among them
being the CPU central processing unit
MUSE: Is a pointing device that enables the user to process, manipulate or execute a command. It
is used to control an arrow displayed on the screen. To execute a
Command/task, the user moves the mouse, which also in return moves the pointer on the screen in
the same direction
THE MONITOR: A monitor or simply the screen is a TV like device used for
displaying information.
It is called the monitor because it enables a user to monitor (see) what is going on in a computer.
THE KEY BOARD: Is a device that enables a user to enter data into the computer
Keyboard keys and their functions
Tab: This key can be used to move forward through options in a dialog box.
Caps Lock: Locks the keyboard in "Capitals" mode (only applies to Alpha keys).
Shift: The use of this key is to allow selection of capital letters when depressing the
alphabet characters, or selecting the characters above other non-alpha keys.
Control Key (Ctrl) : Depressing the Ctrl key while clicking allows multiple
selections. Common actions performed by the combination Ctrl and other keys.
Ctrl + A: Selects all items
Ctrl + B: add or remove Bold formatting
Ctrl + C: Copy, places the selected/highlighted copy on the clipboard.
Ctrl + F: Opens the Find what: dialog box.
Ctrl + I: Add or remove Italic formatting.
Ctrl + N: opens a New Document, In most publishing programs like Word,.
Ctrl + o: Open, brings up a browse dialog and allows you to select a file to open.
Ctrl + P: Print
Ctrl + S: Save
Ctrl + U: Add or remove Underline formatting.
Ctrl + V: Paste, inserts the copy on the clipboard into the area where your flashing cursor is
positioned or the area you have selected/highlighted.
Ctrl + W: Close, will close the document currently open window.
Ctrl + X: Cut, removes the selected/highlighted copy and places it on the clipboard.
Space Bar: Insert a space between words.
Enter: Creates a new Paragraph. It is referred to as a Hard Return.
Backspace: deletes characters to the left of the insertion point while working with text.
Characteristics of Computers
For any device to be called a computer, it must manifest some or all of the following
characteristics:
• Speed
• Accuracy
• Storage
• Diligence
• Artificial intelligence
• Automation
• Versatility
1. Speed: Computers are very fast in their operation in that their speed is measured in millions of
instructions per second
2. Accuracy: Computers are accurate. This means that they hardly make any mistake. Computers
are capable of detecting and correcting any mistakes made. However, if wrong data is fed into
the computer, wrong information is also given; hence the saying “Garbage In, Garbage Out”
(GIGO). This implies that the accuracy of the computer largely depends on the accuracy of the
user.
3. Storage: For the computer to be able to work, it should have some form of work space where
data is stored before it is processed or where information is stored before being output to
particular devices. This storage space is called the Memory.
4. Diligence: Computers are diligent. This means that computers have ability to perform the same
task over and over again for a long time without getting tired or bored. Unlike humans,
computers do not complain.
5. Artificial Intelligence: Computers have artificial intelligence. This means that they can respond
to commands or requests given to them and provide solutions. The computer’s intelligence is
said t be artificial because it is enabled by the computer programs installed in them.
A computer program is a set of instructions written in a computer language.
6. Automation: This means that computers have the ability to work without human supervision.
Computers do not need any supervision in order to perform programmed routines. In other
words, they are automatic.
7. Versatility: This means that a computer has the ability to perform more than one task at the
same time. For example, a computer should be able to play music while one is typing.
The ability of the computer to perform more than one task is called Versatility or Multi-task
Terminologies and Concepts
Computer professional – a person who has had formal education in the technical aspects of
computers e.g computer programmer.
Computer competence – this is applying some skills using a computer to meet your information
needs and improve your productivity.
User – some one without much technical knowledge in computers but uses it to produce information.
Computer Literacy – having the knowledge and understanding of computers and their uses
Data is unorganized facts e.g. a list of students in school, irrespective of their class, sex or age.
-a collection of raw facts, figures and symbols like numbers,words,imagws,videos and sound given to
the computer during the input stage/phase
Information is organized facts or data that has been turned into more meaningful form e.g. a list
of students in school according to their classes, sex and age.
Data Processing is the procedure of transforming data into desired output
Information Processing is the process of transforming data into which can be used to make
better decisions (pay cheques, pay slips)
Data processing systems include all people, procedures, devices used to produce desirable
output. Information-process-system is useful information that can be used in decision making.
Let’s compare the computer to the human being. A human being has got a body and a soul. These two
parts works hand in hard for the existence of a human being. Incase one of the two is not there, there
will then be no operation.
For this case, the hardware is the body of the computer; the software is the soul of the computer.
Now the human ware will be the person who would like to use the machine this person uses the
software to communicate with the hardware and get what he wants
i) Hardware – These refer the physical and electronic components of the computer. E.g.
Keyboard, Monitor, Mouse, etc.
ii) Software – These are electronic instructions that tell the computer how to perform a
task. iii) People / Human ware – The trained personnel, who operate, design and develop
computers
The data/information processing cycle: refers to the sequence of events that take place in the
processing data to convert it into information. A computer to work there must be there basic
things i.e.
➢ Human ware,
➢ hardware and
➢ Software.
• The data processing cycle starts with the human ware that generates the input facts.
• The human ware then sends his raw facts to the computer using any of the input devices.
• These facts will then go to the control unit processing and control Unit will forward it to the
Arithmetic Control Unit to calculate the number of bits and bytes in order to determine the
size of the data being worked on.
⚫ The data will now be sent to the RAM for temporally storage (Primary Storage) and at the
same time presented to the Visual Display Unit in kind of Information.
⚫ Data will remain in the RAM until when the computer user decides to store it as information
onto a secondary Storage Device.
Input Process
Output
(CPU Central Processing Unity)
Data
Storage
This is a room where computer learning takes place and where computers and all
its components are kept
The computer lab should be kept clean to avoid dirt affecting our computer
Bags and pullovers should be left outside the computer lab to avoid loss of small
computer components by the computer learners
Since the lab is a study room, the learners should maintain silence and the room its self
should be located in a quite environment
The computer users should switch on and off computers in a proper way to avoid damages
Food stuffs and drinks should not be brought in the computer lab
Computer lab and all other resources in it should be specifically for academic only.
Playing music and watching pornography is not allowed
Proper shut down of computer should be followed to avoid disk and system failure so
avoid abrupt switching off
Handle delicate storage devices with care. Don’t touch the inner surface of computer disk
and always remove safely flash disks from the systems
Always sit upright to avoid muscle pain and back aches caused by poor sitting posture
Don’t bring magnetic device to the lab. Because a computer has magnetic disk which can
be spoilt if they come near other magnetic fields
Un necessary movements are not allowed to prevent learners from stepping on wires
and devices
Avoid running in the computer lab but walk gently and confidently. Why. As you run,
wire may trap you and you fall and damage other hardware in the computer
Always respect other peoples work you find in the computer so do not delete, edit or even
try to open any.
Keep fire sources out and far from the computer lab
Since the computer lab is a place of learning ,it receives many people and this may result into
possible dangers like:
Thus there is need to employ some of the following in our computer lab
Air conditioners: these can help to keep the room at a very good temperature that cannot affect
people and the machines. here you can buy fans, increase on the ventilators, put a ceiling in
the room or buy the modern air conditioner
Always use surge protectors such as uninterruptible power supply (UPS) or voltage stabilizers
to ensure steady power supply
Voltage stabilizers: helps to regulate the level of voltage/electricity that enters computer and
other devices in lab so that electricity does not affect our computer.
Un interruptible power supply (UPS) This device can also backup power and this can help
your devices to remain on for some minutes when power goes off
Security cameras: you can install security cameras (closed circuit television -CCTV) which
can help you inspect the place to avoid people that many need to move out with some gadgets
Alarms : you can attach alarms to every device in the lab and if some touches on the device,
the buzzer or alarm will make sound
It’s a preventive measure to protect your computer from viruses and other malware
Gives a computer long life-just like a person who cares a bout him self stay health and
live along productive life
Upgrading your pc will keep it up to date with technology and add extra features that
your basic pc did not have upon purchase
BOOTING A COMPUTER
This is the process of starting or resetting a computer. The computer automatically goes through
the process of self-test and preparation for use.
Types of Booting
i) Cold Booting: This starting of a computer, which has originally off. The computer
checks all its components to determine whether they are working properly. This
process is called POST (Power On Self Test).
ii) Warm Booting: This refers to restarting a computer, which has been originally on. It is
forced to restart by pressing CTRL+ALT+DEL.
When the computer freezes (Does not respond to any input Instruction by the mouse or the
Keyboard).
Information: Processed Data. Something useful to a recipient that can be used for
decision making. In other words it’s the end result of data processing. E.g. CVs,
Transcripts, Payrolls, Balance Sheets, Final %s of votes.
Technology: The advanced scientific knowledge that eases work. However with ICT
we concentrate on
Therefore, it refers to the procedures and equipment used by people to improve the quality
of gathering, processing, communicating and storing information.
Uses of Computers
Computers are widely used in our everyday life to accomplish large number of useful applications
or various tasks.
Some of the areas that computers are widely used include:-
• Business.
• Science and Engineering.
• Military.
• Entertainment and Leisure
• Education. (Recreation)
• Research.
1. BUSINESS APPLICATIONS.
• They are used to carryout business data processing which includes designing receipts,
bills, invoices etc
• They are used to carry out financial analysis which includes analyzing
business performance, making sales summary, and forecasting business
needs like labor
• They are used in vending machines, elevators, cars, and phones to automate them.
These machines are automatic because of the special computers that control them
• They are used to reduce inventory costs by keeping all documents in electronic
form instead of paper files which consume a lot of space
• They are used in banks to transfer money electronically which has eased the process
of banking and the risks involved in transporting cash
• They are used in banks to work as tellers. These ATMs have lessened the
congestion that was in banking halls
3. HEALTH CARE:
• They are used to carry out medical research which has brought about new medicines
• They are used to develop colorful graphic scans that can show the affected parts of the body
• They are used to make the diagnosis of the disease and prescribe the medicine
• Computers are used in ambulances to locate patients and the scene of the accident
• Computers are used to help people lose weight by analyzing nutrition of a meal
• They are used by doctors to carry out medical collaboration whereby doctors work
together to come up an appropriate remedy
• Computerized machines such as the CT Scan, Magnetic imaging and ultra sound
devices have enabled the diagnosis and cure of many diseases
• They are used to demystify (test) DNA molecules and establish people’s true parentage
4. SPORTS:
• Computers are used to analyze and design new plays, make draft picks and day to
day business operation of any sports business
• They have also been used to analyze the smallest movements made by the athletes
• Computers have been used by experts to pin point wasted energy and movements
for many athletic events. This brings about improvement in performance
• A special tennis computer called computerennis, records the important plays
of a match. Then the data is used to determine how a player can improve.
• They are used to relay or broadcast sports live events like live matches on Sky sports
1. They have improved communication facilities and communication in society. This is seen
in the usage of electronic mails, telephone exchange, social networks like facebook,
voice calls through skype; where people can send and deliver messages instantly.
2. They have enabled the sharing of data and information between people in different areas.
This has facilitated easy exchange of data and ideas and thus increased the speed for
executing operations.
3. Computers have increased data accuracy, reliability and data integrity. This is
because computers do not make mistakes because they have self-check systems
which can detect errors which detect and correct errors
4. Employment opportunities have increased because of computers. Machine operators,
computer technicians, data analysts, computer engineers, software engineers,
programmers,
network administrators, lab attendants and computer tutors and trainers have been
recruited and this had improved the society’s standards of living and thus improved the
economy in general because these people pay taxes to the country.
5. It has improved data management and reduced inventory costs (costs of storage) whereby a
lot of data can be stored on computer in a very organized way and a lot of space has been
saved
as we shifted from the paper files, which consumed a lot of space to electronic files
6. Computers have facilitated the availability of stronger and more reliable defense systems.
This has been through the easy accessibility of information through satellites, internet and
designing of sophisticated weapons, usage of CCTV cameras, finger print scanners and
smoke detectors.
DISADVANTAGES
1. Moral degradation/decadence/decay. This is due to the influx of ill or immoral materials
like pictures, and videos which can be accessed by everyone including the young children
from the internet. This has increased the chances of rape, defilement, homosexuality etc
2. Computers have increased cases of loss of sight and other eye defects due to the
radiations
(emissions) from the computer screens. This is especially with long use of computers.
3. Consume a lot of power which has increased power bills in homes schools and other places.
4. Computers have caused a lot of unemployment in society today as a result of some tasks
being done by the computer or automated. Some jobs such as messengers, typists, postmen, have
reduced in importance because they can be easily done by the computer
5. Computers have increased the cost of living in our society. This is because computers require
servicing and maintenance; they increase power bills, internet charges, which may be very
expensive for some people and thus stiffening the economy.
6. Computers are liable to virus attacks especially if the computers are on the internet. These
viruses which are usually spread from one infected system or network usually cause heavy
data loss to organizations.
7. Computers have increased the rate of forgery in society today. People use computers to forge
receipts, invoices, reports and other documents to obtain money by false pretence which has
led to many losses to some organizations.
8. Personal security has been jeopardized. With the internet, personal information like bank
account numbers, PIN, and other personal info can be easily found by hackers who may use
them in wrong deals.
Windows
Windows are rectangular work areas provided on the screen. In each window a different program
or file can be run. Windows can be moved around the screen and their size and shape can be
changed at will.
Icons
These are small pictures that represent commands, files, or windows. Clicking on these icons can
execute a command. This makes the computer easier to use even by those who can’t read.
Menus
A menu is a list of choices. GUI can allow one to execute a command by clicking at a choice from
the menu.
Pointing Device
This refers to a device like the mouse which enables one to select objects by moving the
pointer around the screen.
Pointer
This is a symbol that appears on the screen which is moved to select objects and
commands. Normally, it looks like a small angled arrow though it can be changed at
will.
A computer system refers to the combination of components that make up a complete and
functioning computer. Actually it is the co-ordination that is required between the hardware;
software and human ware to enable the computer produce work or perform the required tasks.
Let’s compare the computer to the human being. A human being has got a body and a soul.
These two parts work hand in hand for existence of a human being. In case one of the two
is not with the other, there will be no operation.
Therefore, interconnection of the three components
Hard ware; the tangible parts of a computer.
Software : programs that run the computer
Human ware
For this case, the hardware is the body of a computer; the software is the soul of the
computer, then the human ware will be the person who would like to use the machine.
This person uses the software to communicate with hardware and get what he wants.
What is the system unit (system case).This is a box like computer device that contains the
internal components of a computer.
There are two categories of computer hardware defined by the way they are connected to the
system Unit. Those outside the system box and are connected externally are known as the
PERIPHERAL
A peripheral device is any piece of hardware that can be connected to a computer. “Peri”
means “outside”. so they are connected the SU from outside (externally).
Keyboard
Mouse Digital Camera
Screen/Monitor or [V.D.U.] Scanners
Diskette Microphone
Printer • Light Pen
Loud Speakers
While those inside the system box are known as SYSTEM UNIT hardware. These can only be
seen and touched when the box is opened. Such as
Processor
Hard Disk Power supply
Internal speaker Mother board
Motherboard/ Main board
Memory
The computer hardware components are also categorized further according to the functions they
perform. These are:-
1. Input devices (hardware)
2. Output devices (hardware)
3. Processing hardware/devices
4. Storage devices
5. Communication hardware.
Input Devices/Hardware
These are devices or gadgets that are used to feed data into the computer. They are devices which
help to enter data into the computer.
Each input device inputs data in a specialized way. This means that each input device is designed to
enter a specific type of data. So, the device to be used depends on the type of data wishes to input.
An example of data and the device that can be used is shown below:
Data Type Device type
Types of keyboards
• 82 keyboard
• 102 keyboard
• 102/3 keyboard
• 105 keyboard
102/3 is most common and standard keyboard currently.
Parts of a keyboard
A standard keyboard has 3 main divisions,
• The Typewriter Area (Main Typing Area).
• The Numeric Keypad and the cursor control key.
• The Function Keys area.
This is a hand held device that lets one point at the objects on the screen, click at them and move
them around the screen.
The functions of the mouse include the following:
• Right clicking • Dragging
• Pointing • Drawing pictures
• Clicking • Scrolling
• Double clicking • Selecting/highlighting
• Moving the pointer
Clicking refers to the action of pressing the left mouse button once
Double clicking refers to the action of pressing the left mouse button twice in quick succession
Right clicking refers to pressing right mouse button.
Dragging is the act of moving items around the screen
Scrolling refers to moving the long pages up or down the screen
The mouse basically is used to move the pointer to different positions on the screen.
PARTS OF A MOUSE
The mouse has 2 or 3 push buttons that are used for its input process,
• The left mouse button or primary button
• The right mouse button or secondary button
• The wheel
The left mouse button or the primary button is the most commonly used button. It is found on the left
hand side of the mouse. It carries out all the functions of the mouse apart from right clicking.
The Right Mouse button or the secondary button is found on the right hand side of the mouse. It is
used for right clicking
The wheel is found in the middle of the left and right mouse buttons. It is used to scroll long pages up
or down.
NB. The action of pressing the left mouse button once is called clicking and not left clicking as it may
be the case with the Right mouse button
MICE TYPES
▪ The Desktop Mouse.
This is commonly used with desktop PC and it has two push buttons on top and a ball
on the underside. This mouse employs the principle of moving a ball which in turn
moves rollers adjacent to it. These then transmit the electrical codes that relocate the
pointer or cursor on the different co-ordinates of the screen.
With the rise of the internet, a rolling wheel has been incorporated in between the two
buttons. This makes scrolling the long web pages over the internet easier.
Output Devices
These are devices which bring out the computer held information to the user. They accept/transfer
information from the central processing unit and produce it in a suitable form for the user.
These devices include:-
• Monitors/VDU,
• Printers,
• plotters,
• speakers
• Projectors
Information output by these devices is either in form of hardcopy or softcopy
Hardcopy refers to the tangible copy of computer held while softcopy refers to the non-tangible
(intangible) copy of computer-held information.
The common hardcopy output devices are printers and plotters while softcopy output devices are the
monitors / VDU, Projectors, 3-D spectacles and loudspeakers.
1. The Monitor
This is an output device which brings out a copy of the computer held on the screen. The output in the
screen is referred to as the softcopy (Non- tangible copy). The monitor works by converting information
generated by the computer into visual information.
* A CRT- based screen, or monitor looks like the old TV set which had an extended hind part. It
contains a tube which is used to project a beam of electrons at a fluorescent surface that emits light and
creates images.
Advantages of CRTs
Disadvantages of CRTs
• Emit higher EMR (Electromagnetic radiation) than LCD monitors
• Consume more energy than LCD Monitors
• Occupy bigger space in the room
• Not easily portable
* An LCD based screen displays visual information on a flatter and smaller screen. LCDs are frequently
used in laptop computers and flat screen monitors. They use a liquid crystal rather than a cathode ray
tube to create images on the screen
Advantages of LCDs
• They are lighter and therefore easy to transport
• Occupy little space on the desk or table
• Use less power
• Have little radiation and thus have less effect on the eyes
Disadvantages of LCDs
• They are more expensive than CRTs
• They have a very narrow viewing angle
• They have a relatively poor output compared to CRTs
• Slow response at times
2. Speakers
These produce sound outputs with today’s multimedia programs (e.g. windows, media player), speakers
have become such an important necessity. Their quality is mainly measured in Watts of power output.
Most speakers use a cone diaphragm to produce sound.
4. Projectors
These are softcopy output devices. They are used to display information for bigger audiences on bigger
screens or special wall. However, projectors require great light control for maximum results.
5. Plotters
A plotter is a hardcopy output. Plotters are used to produce output with thin straight and meandering
lines. This is because they have a pen like print head that can accurately produce lines.
6. Printers
Printers bring out computer held information on paper or any other physical medium. Print media include
paper, transparencies, cloths, some plastics, wood etc.
CATEGORIES OF PRINTERS
Printers fall into two categories. These are based on whether the image is produced by physical contact
with the print media or not. The two categories are:
• Impact printers
• Non-impact printers.
1. IMPACT PRINTERS
These are printers whose print heads physically come into contact with the print medium. This is the
reason why they make noise during printing.
Disadvantages
1. They are noisy during operation. Because of the contact between print heads and the print
medium
Inkjet/DeskJet printers
Inkjet and DeskJet printers share the same principle of printing. These work by liquid ink being spray
painted onto a paper.
Liquid ink is pushed out of the printer nozzles drop by drop or in a continuous stream.
Nozzles are tiny holes in the print head through which ink passes. The ink is pushed through the nozzles
by ink pumps which are attached to every nozzle.
Examples include:
Hp DeskJet 690
Epson stylus 640
Although these pumps work much faster, they are restricted to a rate of only 1000 dots per second
because the mechanism needs time to cool otherwise the temperature would dry out the ink.
Thermal printers
These use the principle of temperature change to create characters on paper. The print heads contains dot
heaters (heating elements) which cause characters to appear on temperature sensitive paper when heated.
Thermal printing papers normally discolor to a black or blue color in accordance to its make.
Advantages of using thermal printers
• They are nearly noiseless since they do not have any moving parts to generate the noise. The
paper is placed into the printer and characters are formed as they get heated.
• They consume very little power (almost a sixth) of other printers.
• They are reliable because they do not experience inconveniences with paper jams or blocked
nozzles
• They produce clear and crisp images with very high resolution.
Disadvantages
• They can not print on any paper because the heat generated will not cause any discoloration
without burning the entire paper.
• The paper used has a limited shelf life. It can be affected by age, sunlight, humidity and other
chemical vapors which may cause it to discolor completely there by causing the words to
disappear.
• The paper has to be specially prepared before they can be used in printing, which creates delays.
• Their print heads can not be serviced or repaired, which makes them expensive to maintain. The
whole print head must be replaced
• The printing speed is also so slow because the heads have to be allowed time to cool before the
next printing cycle.
• They have a shorter life span than other printers. Their print heads are expected to print a
maximum of 10 million characters accurately whereas other print heads like dot matrix printers
go over 50 million characters in their life span.
Laser printers
These are high quality printers with a greater NLQ (Near Letter Quality). They have a high speed in low
or no noise in printing. They can print excellent graphics.
Therefore, storage devices are components (devices) that are used in computer to record read write &
preserve data or information for retrieval
Some of them can be classified as the removable data storage devices and the others as the non
removable data storage devices
NB Storage devices/hardware/ secondary storage devices or Auxiliary storage devices are very essential
because the memory (RAM) which is mainly used during processing as the storage space loses its
contents when power is switched off.
Storage devices are divided into two categories;
• The Secondary storage devices
• The Primary Storage devices
The primary memory is the volatile memory and the secondary memory is the non volatile memory.
Basically when we talk about the data storage device, it is generally assumed to be the secondary
memory because the primary storage devices for computers are actually a part of the computer’s
memory
1. Hard Disk
High-capacity storage Consists of several inflexible, circular platters that store items electronically
enclosed in airtight, sealed case for protection
This is a round pan cake shaped, permanently sealed metallic magnetic storage device with in the
processor. It is tightly sealed to keep out contaminants like dust and smoke.
The hard disk is also known as the fixed disk because it is not portable; it is always fixed within the
system unit.
Primary storage devices have direct access to the CPU .Primary storage devices store data in a
temporary form helped by the register since register is a special high speed storage area within the CPU
and all the data must be represented in a register before it can be processed. E.g. if 2 numbers are to be
multiplied, both numbers must be in registers and the result is also placed in the register.
The register can contain the address of a memory location where data is stored rather than the actual data
itself. The number of registers a CPU has and the size of each determine the power and speed of CPU.
E.g. 32-bit CPU is one with in which each register is 32 bit wide. Therefore each CPU instruction can
manipulate 32 bits of data.
The RAM acts as the workspace of a computer. It can be likened to a desk or table with files in an
office.
It’s called Random Access Memory because it allows the user to freely read and write to it.
RAM contents are held temporarily. This is because its contents are lost once the computer or power is
has been turned off. This is why we should always save our work on a secondary storage before
switching off the power or turning the computer off. That’s why we say its volatile memory. It is
therefore advisable to keep on saving your work when using a computer
NB.Upgrading RAM is one of the quickest means, efficient and cost effective ways to boost
performance.
CHARACTERISTICS OF RAM
❖ RAM is a temporary storage.
❖ Its contents are user defined i.e. the user opens the programs and data to be held on RAM.
❖ RAM size can be changed or increased.
❖ The contents of RAM can be read and written to.
❖ RAM is volatile. This means that it can easily lose its contents
❖ RAM occupies the major portion of the main memory (70%).
TYPES OF RAM
There are two types of RAM:-
• Static RAM (SRAM) and
• Dynamic RAM (DRAM)
❖ Static RAM is very fast compared to DRAM and holds its contents as long as there is power.
❖ DRAM however; can hold its contents for only a short period of time even when power is on.
❖ The contents of DRAM can be maintained by refreshing the memory chip several times per
second.
❖ SRAM is more expensive. It’s used to make special types of memories like buffers and cache
memory. (Refer to the end of this topic)
All these instructions and information are stored on a memory known as ROM
Therefore, Data can be stored on ROM either when the computer is being manufactured or by the
computer user.
However, the disadvantages of this type of memory are that the data stored on ROM cannot be
changed!!!
ROM is used to store programmed instructions and data, which are required to remain unchanged for
long periods of time e.g. booting instructions and BIOS settings. This is because ROM is non-volatile; it
can not lose its contents.
The contents of ROM can not be changed or deleted; they can only be read, hence the name Read Only.
TYPES OF ROM
There are four types of ROM. These depend on the permanence of the instructions or data stored there.
Mask Rom: Once data has been written there, it can never be changed.
Programmable ROM: (PROM) - This allows the user to alter it only once after the content has been
written on it.
Erasable Programmable ROM (EPROM) - This has a transparent quartz window through which its
contents can be erased by exposing it to ultra violent (UV) light and then reprogrammed for another use.
Electrically Erasable Programmable Rom (EEPROM) This can be erased and reprogrammed using
electricity. An example is the basic input and output system (BIOS).
CHARACTERISTICS OF ROM
❖ Its contents can only be read.
❖ It’s non-volatile i.e. its contents can not be lost when the computer is switched off.
❖ Its contents are not user defined, they come from the manufacturer
❖ The size of ROM may not be increased or changed
❖ It can store instructions permanently or semi-permanently.
❖ It occupies the smaller portion of the main memory (30%)
This is part of the main memory which keeps only in-built set of instructions and information called
FIRMWARE. The firmware is entered into the computer at the manufacturing period by the
manufacturer. ROM keeps this information permanently whether power is on or off
It can store semi-permanent instructions because the latest versions of ROM chips can be programmed
according to the user’s specifications.
The computer can read the instructions in ROM but it can’t write to it or the instructions hence the name
Read Only Memory. The user can not keep his/her information in ROM.
Memory allows fast access to permanently stored data but prevents addition modification of the data.
RAM ROM
It is Volatile It is non-volatile
It can be read and written to Its contents are read only
It offers temporary storage Offers permanent storage
Its size can be increased Its size may not be increased
Occupies bigger portion of main memory Occupies smaller portion of memory
Contents are user defined Contents defined by the manufacturer
Processing Hardware
These are hardware devices that changes data into information in the computer. We have one processing
device in the computer called a CENTRAL PROCESSING UNIT. Some time the call it microprocessor
due to its small size.
This device is the brain of the computer and it is responsible for all operations that takes place in the
computer.
The Central Processing Unit (CPU) carries out all the data processing in the computer. It’s usually
referred to as the brain of the computer.
The CPU is sometimes referred to as the processor or central processor or the micro-processor
In terms of computing power, the CPU is the most important computing element of a computer system.
The CPU consists of three main parts:-
The two functional units and a set of workspaces that is Control Unit, Arithmetic Logic Unit (ALU) and
Main Memory/Registers as its workspace.
NB.Some examples of the processors are Pentium 1, Pentium II, Pentium III, Pentium 4, Duo - core, i -
core AMD K-6 Processors, Celeron
THE CONTROL UNIT
The control unit (or brain) controls the entire operation of the processor system during the execution of a
program.
• It controls the flow of data between the main memory and the periphery devices.
• Periphery devices or peripherals are called so because they operate from the periphery (from
outside) or outer edges of the system or outside the CPU and the main memory.
• The control unit determines the instruction to be executed, the task to be performed by the
instruction where the results are to be stored and where the next instruction is located.
• It fetches the data from the main memory and puts it in the proper order for the processor.
• It also sends the processed results back to the main memory.
• Extracts instructions from memory decodes and executes them calling on ALU when necessary.
Fetches and sends commands to system devices and peripherals.
Interprets commands i.e. it’s is the intermediary between the user and the computer.
Controls and times all tasks by the CPU (typical of Multi-tasking where processor time is shared
amongst competing tasks).
Directs the movements of electronics signals between the CPU, input, memory and output
devises. Hence the CPU acting as a data traffic warden
• Additions.
• Multiplication.
• Division.
It receives data from the Control Unit and performs either Arithmetic operations (add, subtract, multiply
and divide) or Logic operations (making a comparison and take an action based on the result) for
example If A=2 End, Else Begin. This example shows that if A is equal to 2 the program should end and
if not equal it should start the operation again.
REGISTER is a special high speed storage area within the CPU and all the data must be represented in
a register before it can be processed. E.g. if 2 numbers are to be multiplied, both numbers must be in
registers and the result is also placed in the register.
The register can contain the address of a memory location where data is stored rather than the actual data
itself. The number of registers a CPU has and the size of each determine the power and speed of CPU.
E.g. 32-bit CPU is one with in which each register is 32 bit wide. Therefore each CPU instruction can
manipulate 32 bits of data.
These memories are very vital because they increase the overall performance of data and instructions
moving in and out of the CPU.
These memories include buffers, registers and catch memory.
BUFFERS
This is a temporary holding place that may be part of the CPU or built in an input or output device.
Because the CPU is very fast compared to the input or output devices; buffers provide temporary storage
so that the CPU is set free to carry out other activities instead of waiting for all data to be entered or
output.
VIRTUAL MEMORY-Type of memory that supplement on the RAM space when the space of RAM
is finished and the computer still has data to process,
The kind of memory where the OS allocates a portion of storage (usually on the hard disk) to function as
additional RAM or the absence of RAM
CACHE MEMORY
Most modern processors incorporate small high-speed type of SRAM called Cache Memory. The
purpose of cache memory is to allow the processor to access data and instructions even faster than it
would have taken to fetch it from the relatively slow DRAM.
There are other larger units for measuring computer data or information, which include the following:-
▪ Kilobytes (KB)
▪ Megabytes (MB)
▪ Gigabytes (GB)
▪ Terabytes (TB) this means that:
1byte =8bits
3bytes=8x3 =24bits
1 character =1byes
6 =6x1
=6bytes
COMPUTER SOFTWARE
A set of instruction or commands that tells the computer hardware what to do and how to do it
OR
Set of instructions that help the computer to process data and give information
Machine intelligence in form of written programs/instructions/procedures that cause the
hardware to work
Non physical components of a computer
A set of instructions (in machine code) given to the computer to solve user problems and to
control different operations of the computer.
Software is the series of instructions that tells the hardware how to work.
Computer software is sometimes referred to as the machine’s intelligence. This is because it is the
software, which directs the hardware when performing its functions.These instructions are
written by someone we call a programmer
The act of writing/preparing theses instructions is called programming
The written instructions to the computer are given a name program.So it is very important to note that;
the computer system cannot be able to process/ execute any command without software because it’s the
software that empowers the computer hardware. Hardware + Software = A Working Computer System
The Systems software [for the computer’s self operations] and Application software [ for the end-user to
perform tasks on the computer].Examples include: Operating systems, utility software Programming
Application software [ for the end-user to perform tasks on the computer] Examples of Application
software include: General Purpose also called Off-the shelf packages and these include: Word
processors, spreadsheets, Databases, Desktop Publishers (DTP) and the second category known as
Special purpose also called Tailor-made or customized packages has examples such as: Library Mgt
system, Accounts Mgt System (for banks), Automated Teller systems, Housing/Estate management
programs .I.e. they are made basing on the need and specifications of the customer/user.
APPLICATION PROGRAM/SOFTWARE
Application software involves programs that a user can use to perform some useful tasks like writing
letters, editing photos, commect to the internet, and so on
These programs are sometimes called end user programs meaning that they cannot be used to write or
create other programs
The programs written by the user or professional software houses to solve specific problems
They are designed to solve user problems of a general nature (for users with a common and popular
objective) e.g. producing a document, making computation, designing business posters, coming up with
a database or website accounting purposes etc.
These are programs which are designed to help the user accomplish his specific tasks.
These are software programs written by users or independent software professionals to the user’s
specifications/requirements. This is done by purchasing the source code of the package and making
modifications in house, or by paying the producer of the package to customize it
Program that is designed and written just to solve the particular problem for a particular group of people.
These are not bought from shops or from the counter; they are specially written a private individual or
developed in-house by someone within the organization.
Shareware software:
Application software that is given out to people to try it for a given time and pay for some after
FREEWARE:
Is software provided at no cost to users?
Firmware
Also as stored logic is a combination of both the software and hardware recorded permanently on
electronic chips.{usually Read- Only-Memory chip that is planted into the motherboard}
Open source:
Type of application where users can be able to view the code source and make some modifications
1. User requirements
Does the package fit the user’s requirements?.i.e The user must be convinced of a product.
2. Documentation
Is there full documentation for the user? User manuals can be full of jargon and hard for a non-technical
person to understand. They should be.
3. User-friendliness
Is the package easy to use? Is the software user friendly with the menus and clear on screen. A user-
friendly package will provide prompts and will be menu-driven, giving the operator a clear choice of
what to do next.
4 Market confidence/performance of the package:
The user should consider how long the package has been on the market and how satisfied the existing
user is with the package
5 Technical requirement:
Where technical knowledge is required the person purchasing should ensure that the desired knowledge
is possessed by the staff that will be using the package.
6 After purchase service\support:
The user should know exactly how he should be helped to solve problem if they occur after purchase
7. Up-to-date
How will the package be kept up to date (e.g. what if a fault is discovered in the program by software
manufacturer? In an accounting package, what if the rate of VAT alters? Etc
:-
85
8. Modification
Can the package be modified by the user e.g. allowing users to insert amendments to format of the
format of reports or screen displays etc? Or will the software supplier agree to write a few tailor-made
amendments to the software?
9. The cost of the package
The firm should go for the package corresponding to the funds available. It is however important to
consider the costs vs. benefits
SYSTEM SOFTWARE
These are the various programs that control the way the computer operates. They manage the operation
of the computer and makes sure the computer works efficiently. System software deals with the
hardware directly. System software is usually supplied with the computer hardware.
Some of these programs reside inside the ROM and are known as firmware.
a) Utility Programs
These are also called service programs. They are used to enhance the performance of the
computer. The most common utility programs are:
• Debuggers: - Tests the flow of a program, it detects errors in the program and notifies the
user
• Sorting Utility: - This allows data to be arranged as specified by the user i.e.
ascending order, Descending order or otherwise.
• Merging Utility: - Allows data from more than one file to be combined into one.
• Copying/Backup:- This allows the creation of a duplicate copy of the original.
Allows the movement of hard disk contents to backup storage.
• Anti-virus:- This detects and removes viruses from the computer.
• Data compression:- Helps to free space on storage device (hard disk) by removing
redundant data
PROGRAMMING LANGUAGE
This is software that allows a user to write a series of instructions to define a particular task
which will then be translated to a form that is understood by the computer
These programming languages help to provide a communication between the computer
programmer and the machine
:-
86
Categories of Programming Languages
However, it is important to note that HLL must be always first be translated to machine language before
one execution
They is only one language that computes are able to understand without the use of translation program
.i.e machine language
An operating system is a group of programs that manage all the activities on the computer
This is a system program that provides an interface (connection or a link) between the computer user
and the computer hardware.
The Operating System creates an environment in which the user can run other programs. The general
functions of an Operating system are:-
1. Job Scheduling
The OS schedules and monitors jobs for continuous processing by the CPU. For example, it controls the
loading and running of programs, communicating directly with the users and dealing with user
commands to organize file and programs.
Memory Management
The operating system knows which part of the memory is in use and that one which is free. Storage
space is therefore provided for data and information in the memory by the Operating system.
Programs must be loaded in the memory before they are run (executed) hence the operating system
has the function of choosing where they should be stored in the memory
NB:
:- This area is called buffer therefore a place where data is stored 4 a short time be4 being released 4
the next processing.
88
a) Processor Management
A multi-user or multi-tasking computer system can be accessed by many users or many programs at
the same time but the CPU (processor) can only run one program at a time or one user at a time.
Therefore, the number of tasks or programs entering into the CPU for processing must be controlled
or monitored; this is done by the operating system. The operating system uses the CU to control
these processes.
Note: A Multi- user system is a system that allows many users at the same time while a Multi-
tasking allows many programs to run at the same time.
Peripheral device: are devices attached to the system unit from the outside environment. These
devices are linked up with the OS and they use a program called device driver
A program that interprets data to the devices and enable installation of multiple devices at the same
time
3. Memory Management
Operating systems determines how much memory is allocated to a particular program whenever it is
being used and for how long. Because the RAM is a scarce resource the operating systems determines
which data remains and which one is pushed out after execution.
4. Error Handling
The operating system deal with errors produced during program execution and keeps the computer
running when errors occur. It also notifies the user and normally gives suggestions on how to handle it.
:-
89
5. File Management
The operating system keeps track of the information in the computer, its location, use and status. The
collective facilities which manage computer files are called the file system.
This file system is provides a means for sorting, retrieving and sharing files. The operating system may
also provide a means of protection for data files and programs against unauthorized access and
corruption.
It can also show the program being run, ensuring that users authorized to use the computer system
access it especially in big systems.
Note: A file is a collection of related information. A folder is a collection of files
A single user or single tasking system allows one user to operate one program at a time. It cannot
support more than one person and supports only one user program at a time. An example is MS-DOS.
:-
91
Icons
These are small pictures that represent commands, files, or windows. Clicking on these icons can
execute a command. This makes the computer easier to use even by those who can’t read.
Menus
A menu is a list of choices. GUI can allow one to execute a command by clicking at a choice from
the menu.
Pointing Device
This refers to a device like the mouse which enables one to select objects by moving the pointer
around the screen.
Pointer
This is a symbol that appears on the screen which is moved to select objects and commands.
Normally, it looks like a small angled arrow though it can be changed at will.
Therefore, Windows Operating Systems are types of Graphical User Interfaces (GUI).that is based on
graphics instead of text and characterized by the use of Mouse and drop-down menus.
:-
92
FACTORS TO CONSIDER WHEN CHOOSING AN OPERATING SYSTEM
• The computers specification for example memory capacity, processor speed, hard disk capacity
etc.
• The type of computer in terms of size and make. This would tell you to buy either a PDA or
Desktop Operating system
• The application software intended for the computer. This because some applications cannot be
supported by particular operating systems
• User friendliness of the operating system
• The cost of the operating system
• Reliability and security provided by the operating system
• The number of processors and hardware it can support
• The number of users it can support
Introduction
A word processor is application software that enables a person to create, save, edit, format and print text
documents.
Word processing therefore, is the act of using a word processor to create, save, edit, format and print text
documents.
• A document can be stored in the computer for future reference in computer files and these files
do not occupy physical space like those on paper
• Using word processors is easier and more efficient because some actions are automatic for
example, the word wrap which takes the cursor to the next line if the word can not fit in the
current line
• Word processors have special editing tools such as spelling and grammar checker and the
thesaurus which help the user to the grammar and spelling mistakes
• It is very easy to correct omissions and errors in the work without affecting the structure and
neatness of the work.
• All processors have superior formatting features
SPREADSHEET PROGRAMS
These are application programs used for the manipulation of numeric data and carrying out calculations.
It is a ledger sheet that lets you enter, edit and manipulate numeric data
There are two types of spreadsheets
• Manual Spreadsheets
• Electronic Spreadsheets
Manual Spreadsheets
These are simply sheets of paper divided into rows and columns, which can be used to enter values for
example; amounts of money manually using a pen or pencil. These are common in book keeping and in
accounting offices.
Electronic Spreadsheets
Electronic spreadsheets are computer based. They are computer programs, which enable the user to enter
values in rows and columns just the same way it is done in manual spreadsheets.
Electronic spreadsheets allow one to manipulate values (numbers) mathematically using formulae.
Disadvantages of Spreadsheets
1. It’s not easy to create documents like letters, reports, or books in this program.
2. It is usually difficult to print spreadsheet because the print area must be set before printing.
3. One error created in calculating formulae can distort all the results in the worksheet.
4. Some formulae may be difficult to formulate
5. They only work when there is electricity, which means that when there is no power all work stalls
• Ms Excel, • Ms Frameworks,
• Lotus 1-2-3, • VP-Planner
• VisiCalc,
• SuperCalc,
PRESENTATION
SOFTWARE
Applications used to present information using simple texts, graphics, pictures, sounds, video etc.
Presentation software is very essential in effective communication because they assist the user to
explain ideas graphically and dramatically.
The audience can also interpret the communicator’s ideas easily (because of illustration).
Examples
- Harvard Graphics
- Lotus Freelance.
- Microsoft power point.
- Micro graphic presenter e.t.c.
Microsoft PowerPoint
A graphical application that is capable of adding illustrative graphics with text in the same document. It
can also include motion effects to enhance the presentation.
Gopher
A technology that is used to make files available over the Internet. It is a menu-based method of
searching for information on the Internet.
Online service
A business that provides its subscribers with a wide variety of data transmitted over
telecommunication lines. Enables subscribers to communicate with one another.
Newsgroup (Usenet)
These are ongoing discussion groups of people on the Internet who share a mutual interest.
Email Communications
i) Processor speed:
A faster processor will allow surfing the web at a faster speed than a slower one.
v) Bandwidth
The maximum amount of data that a transmission media can carry at a time. The higher the
bandwidth, the more data and information the channel can transmit.
iii) Telnet
It allows to logon to another system while working on another.
vii) E-learning
learning through interaction with special programs on the Internet.
viii) E-commerce
A financial business transaction that occurs over the Internet.
COMPUTER NETWORK
Advantages of Networks
Bandwidth
The maximum amount of data that a transmission media can carry at a time. The higher the
bandwidth, the more data and information the channel can transmit from one computer to another.
i) Computers
ii) Network Interface Card (NIC) – it connects the computer to the network.
iii) Network hubs and cables – a hub connects multiple computers at a central location.
iv) MODEM – a link between analog signals and digital signal of a computer.
- Reasonable pricing
- Faster Internet performance
- Provides help and installation
- Security for its clients
- Can communicate with you
An ISP is a company that enables companies or individuals to connect to the Internet. ISPs always
provide:-
- Email capabilities
- Web Hosting
- Connectivity, etc.
COMPUTER VIRUSES
A computer virus is a computer program/code that copies (can copy) itself and infects a computer
without the knowledge of the user.
Types of Viruses
There are many software codes regarded as computer viruses that can cause damage to computer
systems. They include:-
• Trojan horses
• Boot sector viruses
• Backdoors
• File viruses
• Boot sector viruses
• Hoax viruses
• Test viruses
• Worms
• Time Bombs
• Jokes
• Multipartite viruses
This destroys the booting information on the computer or storage devices. It affects the booting files and
causes failure in booting.
File viruses
These attach themselves to computer files. They usually delete files or cause erratic behaviors in the file
system.
Hoax viruses
They are usually lies; they don’t exist in real sense. They only exist in the imagination of the press and
public. They don’t exist despite the rumor of their distribution and creation. The rumour about their
creation and spread is usually spread through e-mails or the press.
This is a small program code hidden within legitimate software. The software continues to work
normally until such a time when they are activated to cause trouble. A Trojan horse does not have the
capacity to replicate (copy) itself like a worm.
Worms
This sticks in the computer memory and re-writes (replicate) itself in the memory until it can’t multiply
anymore. This causes the computer to stop working because the memory is full.
Backdoors
This may be a Trojan or a worm that allows hidden access to a computer system.
Droppers
These are programs that have been written to perform useful tasks like compressing files, previewing
video clips etc. but end up introducing viruses in the system in the process of performing their functions.
Failed virus
These are viruses that have failed to meet their goals. This is mainly due to poor programming by the
author/designer or is intercepted by a real virus. They are common on the internet when downloading
software.
Packagers
These hide the existence of a virus from virus guard by masking some codes around the actual software
programs. It is only when a virus has appeared that you realize the software had a virus.
Test virus
These are simply written to test some virus guard or anti-virus software. They are not harmful, just for
learning purposes only.
Jokes
A joke is a harmless program that does amusing things on the screen. E.g. Messages like-“Your
computer is about to explode in five minutes, please run away………….” These messages appear and
disappear in few seconds.
Sources of Viruses
Viruses spread in various ways but the most common ways are:-
Fake Games
Computers games are a common source of viruses because most games are irresistible. Virus designers
design fake games and attach virus onto them. Once a game is executed, a virus is run and activated.
These games keep infecting systems as they are installed
Contaminated systems
Contaminated computer systems can spread virus if used freely. For example, installation diskettes for a
particular application program can introduce viruses on to a system whenever that application is installed.
There by spreading the virus. It is also common for pirated software.
Freeware are software programs which are usually distributed on line free of charge while shareware
refers to those software programs, which can be shared freely amongst the users.
Symptoms of Viruses
• Damaging programs/software
• Deleting files/data on storage devices
• Formatting the hard disk.
• Boot failure
• Take up / fill up the computer memory
• Causes system crashes.
• Corruption of files
• Slows down the speed of the computer
Precautions Taken Against Viruses (Control Measures)
• Ensure that there are regulations and a policy on the usage of computers and their protection (e.g.
no foreign diskettes unless first scanned)
• Ensure that the e-mails are from a trusted source before opening them or e-mail attachments
• Avoid opening e-mails before scanning them for viruses
• Install anti-virus utility and update its virus definitions frequently for detecting and removing
viruses.
• Never start up a PC with a floppy diskette in the drive.
• Scan all the drives and files for possible virus infection before using them.
• Write protect the recovery disk before using it.
• Back up important files regularly.
this anti-virus. Examples of common anti-virus programs include Kaspersky, AVG, Norton, and
MacAfee, Avila, Avast etc
DATABASE MANAGEMENT SOFTWARE
A database is a collection of related data about a particular subject or for a specific purpose. A database
is a collection of structured and related data items organized so as to provide a consistent and controlled
access to the items.
Manual databases
These are non-computerized. These are traditional ways of recording and keeping data using simple
devices e.g. a book with a list of items in stock, a diary e.t.c.
However, these methods/databases (manual) had /have problems/weaknesses.
- Poor update of records
- Time wasting (when searching for particular item).
- Unnecessary duplication of data
- Misleading reports due to poor entry and organization.
Electronic databases
These are computer based databases. They are further categorized into Distributed database, which sit on
individual stand-alone computers and centralized databases, which sit on a database server.
• Enhancement of data integrity because it is centralized, fewer updating errors occur and greater
accuracy can be maintained.
• Ensured data independence because data is entered, stored, modified and accessed by methods
that are not affected by application programs.
• Reduction of data redundancy – storing data in one place means less duplication and less space is
required for storage
• Facilitates data sharing and integration – database systems offer users the ability to combine or to
cross reference data in many different ways.
• Improvement of access to data – data systems allow users to query the data base directly without
necessarily using application programs
• Centralization of security – it is easier to limit access to information it it is grouped together
instead of being kept in several scattered files. Most databases must be protected and kept
private.
• Reduction of costs – data entry, data storage, and the development of new application programs
are all made more economical by eliminating the duplication of data, organizations can realize
substantial savings.