Comp
Comp
DATA SIGNAL
INTRODUCTION Computers communicate by transferring data signals between themselves.
A computer network forms whenever 2 or more computers are interconnected Refers to a voltage level in the circuit which represents the flow of data.
together with other related accessories to work together. There are two types of data signals:
Non computer networks include:o00hgtr56hig a) Analog signal: data made up of continuous varying wave form similar to
a) Road networks that facilitate transfer of goods and services. voice or sound wave.
b) Telephone networks (voice networks) with many lines that criss cross a country. b) Digital signal: data made up non-continuous discrete signal.
c) Blood circulatory system in the human body.
d) The neuron system in the human brain. 2. SIGNAL MODULATION AND DEMODULATION
Process of converting data signals to a form that is suitable for transmission over
DEFINITION OF TERMS USED IN NETWORKING a transmission medium.
1. COMPUTER NETWORK a) Modulation: converting digital data signals into analog data signals.
A collection of independent entities that are arranged in such a manner as to b) Demodulation: converting digital data by superimposing it on analog carrier
exchange data, information or resources. signal which can be transmitted over analog telephone lines.
A collection of computers linked together using transmission media for the
purpose of communication and resource sharing. 3. MULTIPLEXING
2. TRANSMISSION MEDIA Process of sending multiple data signals over the same medium i.e. a wire
Transmission media refers to any physical or non-physical link between two or conductor can be made to carry several data signals either simultaneously or at
more computers and in which a signal can be made to flow from source to different times.
destination. Demultiplexing is the process of separating the multiplexed signals at the
Some of the shared resources include: receiving end.
a) Application programs. The different data signals are made to have different frequencies on the cable
hence they do not interfere with one another.
Demultiplexer
b) Printers.
Multiplexer
The different frequencies cause what is called different logical channels in the
c) Fax machines. medium.
d) Modems.
e) Storage devices.
3 Konyango Daniel
LIMITATIONS OF NETWORKING A computer network is made up of several standard elements (components) which can
1. Security issues. be classified into 3 major categories:
2. High initial cost. 1. Data communication media.
3. Moral and cultural effects. 2. Communication devices.
4. Spread of terrorism and drug trafficking. 3. Networking software.
5. Over-reliance on networks. 4. Data signal.
4 Konyango Daniel
b) Cross talk: caused by signal coupling between the different cable pairs contained b) Telephone systems use UTP which is present in most buildings hence it is easier
within a multipair cable bundle i.e. interline interference. to set up a network media because connection is already available.
c) Noise: Random unwanted signals picked up by the channel, caused by either c) Installation equipment is cheap and readily available.
cross talk or externally included impulses e.g. from sources like motors, d) It is cheap because of mass production for telephone use.
switching equipments, high current equipments etc.
d) Impendence: this is the resistance offered by the cable to the signal. Disadvantages of twisted pair cabling
a) Suffers high attenuation – a repeater is needed to amplify the signal.
II) TWISTED PAIR CABLES b) It is sensitive to electromagnetic interference and eavesdropping (tapping into
Made up of two solid copper wire strands wound around each other in a double communication channels to get information).
helix manner to reduce the development of an electromagnetic field around the c) It has low data transmission rates as compared to other cables.
two wires as they transmit data.
Mostly used to transmit both voice and data signals. III) COAXIAL CABLES
The two common types of twisted pair cables are: Specially wrapped and insulated cables that are able to transmit data at very high
a) The unshielded twisted pair (UTP) rate.
b) Shielded twisted pair (STP) They consist of central copper wire covered with a dielectric material (insulator).
The dielectric material is then surrounded by a hollow mesh conductor which is
a) Unshielded Twisted Pair (UTP) covered by a shield making the cable more resistant to electromagnetic
a) They do not have a shield that prevents electromagnetic interference (EMI) also interference than the twisted pair cable.
called (electric noise” from the environment like lightening sparks, radio signals The signal is transmitted by inner copper wire and is electrically shielded by the
and radiations from spark plugs in motor vehicles. other copper sleeve.
b) They are therefore not suitable for environments that are electrically “noisy”. The braid (mesh conductor) is made up of copper or aluminum and serves as the
ground for the carrier wire.
b) Shielded Twisted Pair (STP) Together with the insulation and any foil shield, the braid shield protects the
Similar to unshielded twisted pair except that a braided shield is wrapped around carrier wire from radio frequency interference (RFI) and electromagnetic
the wires to protect (shield) them from noise. interference (EMI).
The shielding may be a metallic foil or copper braid. Although the cable has better protection against electrical interference than the
Shielding minimizes electromagnetic interference (EMI) or radio frequency TCP, they have moderate protection against magnetic interference.
interference. The diameter of the centre core or conductor determines the attenuation rate i.e.
Twisted pair cables are categorized into 5 groups according to the type of data the thinner the core, the higher the attenuation rate.
transmitted and maximum rate of transmission as shown below: Data is carried on this cable using direct current (DC).
Category Suitable for transmitting Speed (max. limit) Coaxial cables have bandwidths of up to 1Gbps, hence they are installed in a
1 Voice Less than 1 Mbps network to form the network backbone (a link that connects two or more separate
local area networks).
2 Data 1 Mbps
3 Data 16 Mbps
Types of coaxial cables:
4 Data 20 Mbps Copper core
a) Thin coaxial cable (Thinnet)
5 Data 100 Mbps Has one dielectric insulator.
KEY: b) Thick coaxial cable (Thicknet)
Mbps – Megabits per second. Core around
Has two dielectric insulators insulation
the core and is thicker than the thinnet.
Today’s networks are approaching speeds of Gigabits per second.
Aluminum foil
Most organizations today use category 5 twisted pair cables to set up their local
area network.
Advantages of twisted pair cables: Braided shielding
a) They can support high data rates (bandwidth) of up to 100 Mbps.
a) Thinnet a) Thicknet
Fibre network.
Radio waves
d) Jacket:
It is the outer covering of the cable. 107Hz VHF
Advantages and features of fibre optic cables
1. Offer high quality transmission of signals. HF
106Hz
2. Light weight – a normal glass fibre is the size of a human hair.
3. Can transmit voice, data and video signals simultaneously.
4. Have a large bandwidth (up to 1Gbps).
7 Konyango Daniel
The electromagnetic spectrum
Main Components of a satellite transmission system
1. Transmitter earth station:
Sets up an uplink to the satellite in order to transmit data.
The uplink has a unique frequency.
2. A satellite:
Launched somewhere in an orbit that receives, amplifies and retransmits the
signal to a receiving earth station via a downlink frequency that is different from
that of the uplink so as to avoid interference with the uplink signal.
Satellite in space
Downlink
Uplink
I) MICROWAVE TRANSMISSION
A microwave is extremely high frequency (communication beam) that is
transmitted over direct line of sight path.
The method uses very high frequency radio signals to transmit data through
space.
The electromagnetic wave cannot pass obstacles and geographical barriers such
as mountains. Transmitter receiving
Due to their small wavelength, they easily release their energy in water as heat earth station earth station
hence they are also used in making microwave ovens used in domestic kitchen
appliances.
In networking, microwaves are suitable for point to point transmissions.
A signal is directed thorough a focused beam from transmitter to the receiver
station. Satellite transmission system
8 Konyango Daniel
A geostationary satellite offers a large constant line of sight to earth stations.
The area where the line of sight can easily be located is called the satellites
footprint.
The satellite transmits the signal to many recipient earth stations to form a point
to multipoint transmission.
The new trends in microwave transmission have seen the use of very small
aperture terminal (VSAT) technology.
It refers to a very small satellite dish used both in data, radio and TV
communication.
It enables direct communication instead of having to go through the state owned
satellite gateways.
The satellite produces strong signals that can be received by a satellite dish
antenna of only about 2 meters in diameter.
The signals are decoded using a decoder which is plugged directly to a television
set or a computer.
10 Konyango Daniel
Some hubs called intelligent hubs are able to monitor the way computers are If the address is the same as the one on which the router is, it passes the data
communicating on the network and keep the information in a small database of packet to the destination host by reading the host address otherwise the packet
their own called a management information base (MIB). will be routed to the next network address.
The NT server can then use this information to fine-tune the NT. Some modern routing devices combine the functionality of a bridge and a router,
Intelligent hubs can be able to manage a NT by isolating computers that are not called a brouter.
functioning properly.
Several hubs can be connected together one after another to expand a NT. VI) GATEWAYS Illustration pg 27
However, this increases the broadcast range which may lead to broadcast storms A gateway is any device that can be configured to provide access to wide area
on the network. networks or Internet.
Broadcast storm refers to a condition where a NT is overwhelmed with message One such device is the router in which the gateway software is installed.
broadcasts due to malfunctioning of NICs or hub related problems. A gateway is the most powerful network and internetwork connectivity device
because of its ability to convert data across different network architectures and
IV) BRIDGES illustration pg 25. protocols.
NT device that selectively determines the appropriate NT segment for which
message is meant for delivery through address filtering. VII) SWITCHES Illustration pg 28
A bridge can divide a busy network into segments to reduce network traffic. Unlike a hub, a switch forwards a packet directly to the address node without
broadcasting.
Purpose of using a bridge: A node refers to data terminal equipment such as a workstation or a computer on
1. To extend the length and number of stations that a segment can support. the network.
2. Reduce overall traffic flow by allowing broadcasts only in the data destination The switch does this by connecting two nodes point to point as if they were
segment of the NT. linked by a direct cable between them.
A bridge makes sure that packets that are not meant for a particular segment are Some hubs also incorporate the switching mechanisms. Such a hub is referred to
not broadcasted in that segment. as a switching hub.
Switches are more expensive than hubs. This means that one switch may be used
IV) REPEATERS as a bridge to connect several hubs in order to reduce collision problems caused
A device that receives a signal from one segment of a NT, cleans it to remove any by broadcasts.
distortion, boosts it and then sends it to another segment.
It enables NT to eliminate attenuation problems.
They are the simplest way to expand a NT because they broadcast the same
message to other NT segments.
However, they should be used with reservation, because they expand the
broadcast domain, which may lead to broadcast storms on the NT.
A broadcast storm is a condition whereby the NT is oversaturated with messages
making communication impossible.
V) ROUTERS
Interconnects different NTs and directs the transfer of data packets from source to
destination.
Routing depends on NT addresses.
Each NT has a unique identifier or address called the network address.
All the computers on the same network have the same network address nut
different host numbers.
The router receives a packet from another router on the internetwork and checks
the destination’s network address.
11 Konyango Daniel
WIRELESS COMMUNICATION DEVICES Once installed on the right hardware platform and configured as a server, the
As the cost of wireless technology goes down and the quality of service increases, operating system will provide network management tools to network
it is becoming cost effective for companies and individuals to extend the administrators for the to do the following:
capability of wired networks by integrating wireless segments into their i) Secure the network against unauthorized access.
communications. ii) Track network usage and keep a log/record of all the people who use the network.
Some of the most common devices used in wireless communication include iii) Ensure inter-operatability between various systems on the network.
access points, the antenna and the PCMCIA card. iv) Performance monitoring to ensure maximum throughput on the network.
In most cases, NT O.S. is designed as multi-user operating systems that run the
network server program.
12 Konyango Daniel
4. DATA SIGNAL
Layer Function All messages that are sent and received through the network must be represented
7 Application layer User applications run here and generate requests for data using a data signal.
transmission or open received information. Metallic media would require an electrical signal, wireless media need
6 Presentation layer Adds formatting, display and encryption information to the data electromagnetic signals while fibre optic cables need light signals.
being sent.
A signal can either be analog or digital.
5 Session layer Sets up data transmission sessions between two communicating
devices.
4 Transport layer Manages data transfer over the network to ensure reliability. NETWORK TOPOLOGIES
3 Network layer Address information is added to the packet and routing to Topology:
destination. It is the physical arrangement of computers on a network.
2 Data link layer Adds error checking information and prepares data for going onto Refers to the way in which computers and other devices have been arranged or
the physical connection. how data is passed from one computer to another in the network.
1 Physical layer The data packets are finally transmitted via the network card It is the way in which the points or stations of a network interlink (interact
through the transmission media in form of bits. together).
It determines the data paths that may be followed or used between points in the
Application layer protocols:
network.
Application protocols work at the highest layer of the OSI model. Network topology can be viewed in two ways:
They provide services to application programs. a) logical topology.
Examples of application protocols: b) Physical topology.
a) An e-mail program that enables composing or reading of e-mail messages.
b) Simple mail transfer protocol (SMTP) – An Internet protocol for transferring e- A. LOGICAL TOPOLOGY
mails. Also called signal topology.
c) File Transfer Protocol (FTP) – for file transfer. Deals with the way data passes from one device to the next on the NT.
d) Apple talk and apple share – Apple computers networking protocol suit.
Examples of logical topology
Transport layer protocols:
i) Ethernet topology.
Ensure that data is passed between computers more reliably. ii) token ring topology.
Examples of transport protocols
a) Transmission control protocol (TCP) - Responsible for delivery of sequenced I) ETHERNET TOPOLOGY
data over the network. All computers listen to the network media and can only send data when none of
b) Sequential Packet Exchange (SPX) - Part of the Novell’s internet work packet the others is sending.
exchange/sequential packet exchange (IPX/SPX) for sequenced data.
c) NetBEUI: a local area network protocol for Microsoft and IBM networks that II) TOKEN RING TOPOLOGY
establishes communication sessions between computers. A special package for data called a token goes around the network and only the
d) Apple transaction protocol: (ATP): Apple computer’s communication session and computer whose address is on the data held in the token will take up the token to
data transport protocol. read the data and then release the token.
The token can then be captured by another computer which needs to transmit
Network layer protocols data.
Provide link services.
They handle addressing and routing information, error checking and B. PHYSICAL TOPOLOGY
retransmission of requests. Refers to the physical layout or arrangement of components on the network.
Examples of network layer protocols
a) Internet protocol (IP) – it does packet forwarding and routing.
b) Internetwork packets exchange: Netwares protocol for packet forwarding and
routing. Examples of physical topology
c) NetBEUI: provides data transport services, Netbius sessions and applications. i) Star topology.
13 Konyango Daniel
ii) Bus topology. 3. It is costly, requires one complete cable per computer.
iii) Ring topology.
iv) Mesh topology. II. BUS TOPOLOGY
v) Tree/hierarchical topology. Also known as Daisy-chain topology or multipoint network.
All devices are connected to a central cable called the bus or backbone.
I. STAR TOPOLOGY
All stations are attached directly through appropriate interfacing hardware to the
A set up where all devices are connected to a central hub/server/switch.
transmission medium.
A host computer is attached to locals through multiple communication lines.
Each workstation on the network must be capable of knowing when it can and
The local computers are not linked directly to each other. cannot transmit data using the shared medium, since the cable can carry only one
Between any two stations, communication is via the central computer. message at a time.
When the hub/central machine receives data from a transmitting computer, it A terminator is attached to each end of the cable to avoid signals from bouncing
broadcasts the message to all the other nodes on the NT.
back and forth on the cable causing signal distortion.
As the data passes along the cable, each station checks whether the data is
addressed to it.
Workstation If the address matches the machine’s address, it receives the data otherwise it
rejects it.
Hub/Switch The network addresses of computers on a network is called the medium access
control (MAC) address.
Bus Terminator
Printer
Workstation
Star topology Printer
Bus topology
ADVANTAGES OF STAR TOPOLOGY
1. Star networks are easy to configure. Advantages of bus topology
2. network failures due to cables breakdown are low since cables are not shared. 1. It is easy to install.
3. failure of any computer does not affect communication in the NT, unless it has 2. Requires less physical lines hence less costly.
major effects on the host computer. 3. It is independent i.e. any single computer can’t affect communication between
4. wiring hubs increases flexibility for growth i.e. additional and deletion of nodes other computers.
does not involve interfering with the others. 4. Easy to expand, just need to add the new computer on the line.
5. allows centralization of key networking resources like concentrators and servers.
6. gives the NT administrator a focal point for NT management. It is easier for the
administrator to troubleshoot and diagnose NT related problems.
Disadvantages of star topology
1. If the central hub fails, the entire network will be grounded. Disadvantages of bus topology
2. Installation is time consuming; each node forms a segment of its own. 1. Only one node can transmit signals at a time.
14 Konyango Daniel
2. Failure or fault in the transmission line affects the whole communication
network.
3. Troubleshooting a cable fault is difficult.
4. Limits the number of computers that can be connected to the cable. Increase in
the number of computers results in an increased collision as machines compete
for transmission.
15 Konyango Daniel
Advantages of tree topology NETWORK SECURITY
1. Failure of one or more nodes does not affect the whole network. In networking, there are several ways of enforcing security, one of them is share
2. Failure of a single branch does not bring the whole network down. level and the other is user level security.
Disadvantages of tree topology a) Share level security
1. Communication path can sometimes become quite long. A simple network security used in peer to peer networks.
2. Installation can become costly and complex. The user can decide which resources to give for sharing.
Workstations Most desktop O.S. such as Windows 9x provide such kind of security.
b) User-level utility
Used on server based networks.
A network administrator assigns accounts to users.
Each user is provided with a unique name and password which he/she can use to
access network resources.
Hub
Printer
Bus/Backbone
Tree topology
1. FINANCIAL SYSTEMS
Enable organizations to manage their finances and they include:
a) Payroll systems.
b) Accounting systems.
c) Banking systems.
A. PAYROLL SYSTEMS
Screens are setup to capture the transaction data, with appropriate validations, data is inserted into the
transaction file, payroll programs then process the payroll using data from the transaction file, lookup tables and
the master file.
The master file is then updated, payroll system is produced, pay slips are printed for every employee and other
reports required by management or the tax department.
Computers are therefore used to store and process payrolls.
Backing storage is also essential for payroll systems, since the amount of data grows with time.
The primary purpose of the payroll system is to therefore process the accurate information of employees
including gross pay, deductions and the net pay.
The payroll system is designed to produce several analysis reports e.g. a breakdown of payroll expenses against
production/income of the company.
B. ACCOUNTING SYSTEMS
Accounting is the preparation and analysis of financial records for a commercial company, government or other
organizations.
Known as the “business language”, it enables decision makers to interpret financial information and use the
results in planning for the future e.g. foretelling what products or departments are doing well and which ones
are doing poorly.
It deals mainly with numbers and this is a task well suited for computers.
The processing of such tasks is simple and easy to understand to implement on the computer, and management
can establish appropriate controls and error-checking procedures to ensure the security and accuracy of the data.
18
I) CUSTOMER ORDERS ENTRY AND BILLING
Used to record incoming customer orders, authorizes delivery of items or services ordered and produces
invoices for customers who do not pay in advance or on cash basis.
V) ACCOUNTS PAYABLE
A system that keeps track of the amount the business owes others e.g. suppliers, tax organizations, transport etc.
It therefore helps the management to produce cheques for payment of this amount.
2. BANKING SYSTEMS
Since the introduction of the magnetic encoded cheques in the 1960’s, banks have become dependent on
computers for many services.
The banking industry was one of the earliest consumers of information and communication technology.
The computerized banking services include:
i) Processing customer transactions.
ii) Cheque clearing and processing.
iii) Electronic funds transfer.
iv) Internet banking.
v) Mobile banking.
19
III) ELECTRONIC FUNDS TRANSFER (EFT)
This is the movement of money between two different accounts using ICT, using a cash dispenser.
The amount withdrawn by a customer is deducted from his/her account.
Credit cards are also used when paying for goods and services where payment is transferred electronically from
the customers account to the recipients account.
3. RETAIL SYSTEMS
Used in supermarkets, distributor outlets and others for:
i) Stock control.
ii) Transactions handling at the EPOST.
I) STOCK CONTROL
Stock control or inventory control enables a user to manage his/her stock more efficiently by keeping track of
the stocks.
Accurate and up-to-date information on availability of stocks and demand are critical for business success.
It enables one to reduce the risk of under stocking or overstocking i.e. overstocking ties up valuable space and
capital that could have been used for other valuable items while under stocking causes customer dissatisfaction.
Stock control systems are therefore used for the following reasons:
a) Storing full details of the items held in stock i.e. immediately available.
b) Proving users with up-to-date information regarding stock items and prices.
c) Monitoring stock levels so that items can be ordered in good time.
d) Storing details of suppliers of stock items.
e) Storing details of pending orders.
Advantages:
a) Correct prices are used at the checkout counter.
b) It is faster since the attendant does not have to enter details manually.
4. RESERVATION SYSTEMS:
These are distributed networked systems that are used mainly to make bookings in areas such as airlines, hotels,
car-rental, theaters etc.
Bookings are made from a remote terminal connected to a centralized computer database.
To access the database, a customer makes enquiries via the remote terminal connected to the central computer.
It involves online enquiry where an individual directly requests for information through a terminal from a
central computer and receives an immediate response.
20
5. EDUCATIONAL SYSTEMS
Computers are playing an increasingly important role in educational institutions in the following ways:
i) Computer Aided Instruction (C.A.I.)
ii) Computer Aided Learning.
iii) Electronic Learning (e-learning).
iv) Computer based Simulation.
21
vi) Internet.
I) FACSIMILE (FAX)
A computerized system that is capable of transmitting complete images from one location to another via
telephone lines.
Digital images can be transmitted in aerospace programs into digital code that can be understood by computers.
The images include pictures, graphs, drawings, photographs, signatures or text.
Copies of documents are transmitted electronically and the duplicate received at the recipient’s machine i.e. can
be referred to as distant photocopying.
To send fax over the internet, a special modem called a fax modem is attached to the sending and receiving
computers.
Advantages of facsimile communications:
a) The ability to transmit an image over long distances is less than 10 seconds.
b) The ability to confirm the receipt of a transmission quickly.
c) Low cost for high-volume operations.
d) There is guaranteed security – the transmitted image is sent as a digitized code (which can be scrambled)
rather than a usable picture.
e) Convenience – the ability to store the resultant image on a computer file instead of apiece of paper.
a) Teletext
Refers to a computerized service whereby news and other information are provided on the television screens to
subscribers.
The TV is configured using a special add-on card or adapter.
The subscriber can browse for information using a remote controlled device.
It is however one way communication (simplex).
b) Videotext (viewdata)
A two way communication service (half-duplex) over a telephone line or cable TV channel.
A subscriber can interact with the service provider database and the information is displayed on a home TV
screen.
Videotex is used in reservation bookings, ordering for goods and services as well as sending e-mails.
Users of videotex can interact with the database to pay bills, order goods etc.
The services supplied through videotext and Teletext systems include:
Information on weather, TV programmes, sporting events, current news, holiday opportunities,
airline schedules and stock market data.
E-mail – transmission of electronic messages to other users.
Paying bills, ordering goods and purchasing tickets.
22
IV) VIDEO CONFERENCING
Refers to the use of computers, a digital camera, an audio capturing equipment and communication networks to
enable people in different locations to see and talk to one another.
Each participant’s computer is attached with a video camera (camcorder), speakers and a microphone.
A person can therefore participate in a virtual conference room.
All participants see each other on the computer screen as if they were sitting in a real conference room.
Video conferencing is popular in TV broadcasting stations where a field reporter interacts with newscasters and
in organizations where top managers in different geographical locations hold meetings via the Internet or the
organizations intranet.
V) TELECOMMUTING
A situation where an employee works usually at home using a computer connected to the workplace network.
It is an arrangement in which employees use microcomputers and modems to communicate with their business
offices while they work elsewhere.
Telecommuting takes advantage of the growing communication networks to reduce unnecessary travel to the
place of work, reducing travel expenses and less stress due to commuting inconveniences such as traffic jams.
Telecommuting may be practical for:
a) Writers.
b) Engineers.
c) Architects.
d) Mothers with small children.
e) Handicapped workers.
f) Individuals whose fields work take them far from the office.
Advantages of e-mail:
You do not create written documents.
You avoid at least some telephoning, eliminating busy signals, dealing with intermediate secretaries, leaving
messages or playing “telephone tag” i.e. repeatedly missing each others’ calls.
23
Messages are delivered much faster than postal delivery since they are sent electronically and therefore received
nearly instantaneously.
In many circumstances, e-mail is both cheaper and more convenient than phoning.
You can time-shift messages, i.e. you can send messages to people in different time zones even though they
might not be awake.
You can mass-distribute messages using computerized lists of recipients e.g. sales representatives.
7. INDUSTRIAL SYSTEMS
Industrial plants such as motor vehicle manufactures, chemical plants, refineries and mining plants use
computer systems in the following ways:
i) Computer Aided Design and Manufacturing
ii) Simulation.
iii) Process control.
CAD hardware:
a) a graphics workstation that allows the designer to interactively create a drawing.
b) A high resolution screen (display) to show drawings in colour and in fine detail.
c) Fast processors with a great deal of memory.
24
8. SCIENTIFIC AND RESEARCH SYSTEMS
Computers have a wide variety of applications in science, research and technology, some of which are:
i) Weather forecasting
ii) Medical research
iii) Military and space exploration science.
I) WEATHER FORECASTING
Computers help analyze current weather, they help predict the impending weather, and they help create the
visual images used for broad cast TV.
Due to the large volume of data collected from rainfall, air pressure, humidity, temperature, wind speed and
cloud cover, computers help in analyzing, processing and predicting weather patterns using such data.
Another application of computers in weather forecasting is the use of geographical information system (GIS)
and the geographical positioning system (GPS) which represent geographical data in graphical form by
positioning and superimposing it on the world map./
GIS is used to represent data on weather patterns in a clearer and a coherent/logical manner on a world map.
9. LIBRARY SYSTEMS
Libraries use computerized systems for a number of tasks e.g.
i) Lending system.
ii) Inventory control system.
iii) Cataloguing system.
I) LENDING SYSTEM:
Used to manage the issuance and return of borrowed reading materials.
Books, magazines, journals, reports etc are given unique identification numbers or codes.
Once a member borrows a book, his/her details are recorded and when the book is returned, the borrower’s
record is updated to reflect the new status.
25
II) INVENTORY CONTROL:
Involves use of computers to manage stock, which includes checking for books currently in the shelves and
those on high demand for the purpose of adding more.
Books that have become obsolete can be retired to the archives.
III) CATALOGUING
A catalogue is a collection of cards with information about each book or reference materials found in the
library.
To enhance service delivery and efficiency, computerized cataloguing has replaced the manual cards catalogue.
An electronic catalogue is updated constantly when new reference materials are acquired.
I) GAMES
Digital video disks (DVDs) and 3D multimedia games are now used to add stereo sound and digital video clips
to make games more and more realistic.
There are computer games that simulate sports such as driving, war combat etc.
Such games give the player maximum pleasure in a virtual environment on the screen.
26
Air traffic controllers are used to coordinate the movement of thousands of aircraft, keeping them at safe
distances from each other, directing them during take-off and landing from airports, directing them around bad
weather and ensuring that traffic flows smoothly with minimal delays.
Details of every flight plan (airline name, flight number, type of aircraft and equipment, intended airspeed,
cruising attitude and flight routes) are stored in a computer.
The computer generates an flight progress strip that is passed from controller throughout the flight.
All systems within the control tower also make extensive use of microprocessors to track aircrafts and convey
information between different control towers in different air spaces.
14. MARKETING
Computers are being used in a number of ways to enhance marketing, through:
i) E-commerce or e-business.
ii) Electronic presentations.
iii) Advertising.
Marketing is the planning, pricing, promotion and distribution of goods and services from producers to
consumers
I) E-COMMERCE / E-BUSINESS
Transactions are carried out electronically without physical interaction between the seller and the buyer.
A customer can visit a supplier’s website; select an item and placing it in a virtual shopping tray.
The website then tracks the whole session as the customer chooses various items and calculates the total bill.
Payment is then made through a cheque, credit card or through electronic funds transfer and the item is
subsequently shipped to the customer.
III) ADVERTISING
Using simulation, presentation and animation software, it is possible to design catchy advert materials and
video clips.
Such materials can then be displayed on billboards, broadcasted over a television or placed on the internet.
Computers cam also be used in market analysis which focuses on such matters as the product life cycle, sales
strategies, market share of competitors and sales call strategies.
27
Sales analysis is used to provide information on which products are selling well and which are selling poorly,
which sales people have the best and worst sales and which sales people are selling the most and the least etc.
I) HMD/head gear
It is made up of two tiny display screens and sound systems that channel images and sound from the source to
the eyes and ears thus presenting a stereo 3D sound effect in the virtual world.
It uses some sort of helmet visor or goggles to place small video displays in front of each eye, with special
optics to focus and stretch the perceived field of view.
A boom is an alternative to the often – uncomfortable head gear.
Screen, optical and sound systems are housed in a box and the user looks into the box through the two screens
to see the virtual world.
II) GLOVES
These are worn on hands to allow the user to navigate through the virtual world and interact with virtual objects.
The gloves have sensors that collect data about the movement of the hands and relays the data into the system.
They give the wearer a sense of touch in the virtual world.
28
Biometric devices attached to a computer are used to identify people by recognizing one or more specific
attributes such as fingerprints, voice, lips, facial features like iris colour etc.
Some of the devices include video cameras and biometric scanners.
PERSONAL NOTES
29
IMPACT OF INFORMATION TECHNOLOGY ON
SOCIETY
ISSUES RESULTING FROM THE USE OF ICT
An impact is a positive or a negative effect. ICT sector, like any other sector has its positive and negative effects at different levels in society.
1. Effects on employment.
2. Effects on automated production.
3. Issues of workers’ health.
4. Environmental issues
5. Cultural effects.
6. Breakthrough in ICT.
1. EFFECTS ON EMPLOYMENT:
The introduction of computers in the workplace has resulted in the following:
a) Creation of new jobs.
b) Replacement of computer illiterate workers.
c) Displacement of jobs that were formerly manual.
A. JOB CREATION:
It has introduced new employment opportunities that never existed before.
The use of computers in financial institutions, reservation systems, educational institutions, communications etc. has created new job titles
such as computer operators, programmers, network administrators, It or IS managers, database administrators, software developers, system
analysts etc.
B. JOB REPLACEMENT:
This is a situation whereby certain jobs disappear in an organization but reappear in another form requiring high skilled manpower.
Some clerical and repetitive tasks that required a large number of employees have been made redundant.
Computer illiterate people have been replaced with those who have the desired computer skills.
C. JOB DISPLACEMENT:
An employee is moved to another place or department where computer skills are not required, especially those not willing to acquire new skills
of using the computerized system.
To avoid losing competent employees, most employers organize in-service training for their employees on regular basis in order to help them
keep up with the rapid changes in ICT.
30
Refers to substituting mechanical and electronic devices for manual ones for more productivity i.e. the use of mechanical, electrical and
electronic devices to improve the quality and speed of office work.
A number of manufacturing industries such as vehicle assembly plants, oil refineries and food processing companies are using computers to
automate their processes with an aim of increasing production.
Computer controlled robots and assembly lines are a common feature in manufacturing industries.
DISADVANTAGES:
a) High initial cost of setting up an automated system.
b) May lead to unemployment in some areas that are labour intensive.
c) Possible lack of compatibility with software and hardware.
d) Overreliance on automated systems leads to laziness.
e) Resistance to change.
31
REASONS WHY EMPLOYEES MAY RESIST AUTOMATED SYSTEMS
a) Fear of change: people are creatures of habits and hence are afraid of change.
b) Fear of loosing their jobs: people usually associate the computer with loss of jobs and hence they will be afraid that they might end up loosing
their jobs.
c) Fear of failure: since the computer is very new in a given working environment, the people will be afraid that they might never adapt to it.
d) Loss of control: the management will be afraid that once a computer is implemented they might lose control of the organization.
e) Lack of understanding: the user may not understand the benefits of the computer system in their jobs; hence this will create resistance since
the computer will be looked upon as an intruder.
Remedies:
i) Use monitors with good resolution.
ii) Fit monitors with antiglare screens that filters excess light.
32
iii) Adjust the brightness of the screen to the intensity that is comfortable to the eyes.
iv) Use flat panel screens that do not emit so many radiations.
v) Use good overhead fluorescence tubes.
vi) Avoid flickering monitors and lighting systems.
vii) Have interludes of rests.
viii) Tilt the monitors to a convenient position.
C. ELECTROMAGNETIC EMMISIONS:
These are waves of electrical and magnetic energy that are emitted by current carrying conductors.
Users are advised to use low emission devices in order to avoid exposing themselves to excess emissions.
D. STRESS:
Mental stress is another compliant.
Many people who work at computer feel that they are expected to produce more and do it faster because computers themselves are fast.
Also those being monitored by computers frequently feel additional pressure.
33
E. ISOLATION:
People can conduct business and communication without ever coming face to face.
Computer operators can work an entire shift, taking their instructions from a computer screen, sending and receiving memos to each other
electronically without engaging in personal conversation.
These people feel isolated from other workers.
ERGONOMICS:
The science of designing the work place for the comfort and safety of the worker.
It is the study of how living and working conditions can be adapted to the information technology.
The need for better working environment has resulted to designing of special furniture to prevent backaches, and special monitors to prevent
eye strain etc.
4. ENVIRONMENTAL ISSUES:
i) Energy consumption and radiation:
Initially, computers consumed a lot of energy thereby generating a lot of heat and emitting electromagnetic radiations which are harmful to the
user.
Remedy:
Electronic devices have to be energy star compliant launched by the Environmental Protection Agency (EPA) to encourage minimal use of
power by electronic devices.
ii) Environmental issues:
Huge garbage dumps of dead computer parts, printers, ink toner cartridges, monitors and other computer accessories are disposed in landfills
hence causing environmental pollution.
There has been concern on the disposal of Nickel-cadmium laptop batteries that contain toxic cadmium which when buried in a landfill can leak
into underground water tables and catchment areas.
5. CULTURAL EFFECTS
i) Moral effects:
The rapid growth of ICT also presents challenges to our moral and cultural values.
ICT has changed the way we talk, affected our privacy, human rights and integrity.
Humans are exposed to flaming i.e. writing on-line messages that use derogatory, obscene or dirty language.
34
One can access and view pornographic materials that can lead to moral decadence.
The free flow of immoral information has negatively influenced the behavior of both young and old in the society.
To some extend, people with eroded integrity have used computers as a tool to accomplish their vices e.g. forging certificates, passports and
other documents. This means that the person is cheating and therefore his/her moral integrity has been compromised.
On the contrary, ICT has been used as a campaign platform against diseases like AIDS and drug abuse.
35
TYPES OF COMPUTER CRIMES
a) Data manipulation: Refers to altering data that enter or exit a computer e.g. changing data on a certificate.
b) Time bomb: This is the coding of a computer program to destroy itself after it has been run a certain number of times.
c) Computer virus: A program entered into a computer with the aim of destroying or altering data and spreading the destruction to other
computers on a network.
d) Trap door: Creating of a special password that gives its creator a sole access to the system.
e) Data stealing: Using a computer to steal information that has been gathered for someone else for illegitimate purpose.
f) Eavesdropping: Tapping without authorization into communication lines over which computer data and messages are sent.
g) Industrial espionage: Using computer to steal designs, marketing plans or other trade secrets from one company and selling them to
another company.
h) Piracy: This is making unauthorized copies of copyrighted computer software.
i) Fraud: This is the use of computers to cheat other people with the intention of gaining money or information.
j) Sabotage: This is the illegal destruction of data and information with the aim of causing great loss to an organization.
k) Logic bomb: It is a program that is executed when a certain set of condition is made e.g. a fired employee can load a logic bomb to a
computer to destroy when records are updated in a database.
BREAKTHROUGHS IN ICT:
There have been a lot of breakthroughs in the fields of:
Health care.
Education.
Communication – fax, e-mail, internet.
Research.
Commerce – shipping imports and exports.
Art and design.
Entertainment – music, video, games.
Transport.
36
Improvements in input, processing, storage, output and communication devices have led to faster, cheaper and more reliable data processing
devices.
Industries will become more automated.
Microprocessors of a thumb’s size can now execute instructions in a trillionth of a second hence leading to emergence of smaller but smart
devices.
a) Expert systems.
b) Natural language processing.
c) Voice recognition.
d) Voice synthesis.
e) Computer vision
f) Artificial neural networks.
g) Robotics/perception systems
37
A. EXPERT SYSTEMS:
This is software that is designed to make a computer operate at the level of a human expert in a specific narrow area of specialization.
Such software simulates/imitates the reasoning process of experts in certain well defined areas such as medical diagnosis, financial
forecasting, maintaining locomotives, locating mineral deposits etc.
D. VOICE SYNTHESIS:
These are machines that are able to create human voice or talk e.g. a computerized bank teller giving you your account balance in human
like voice.
E. COMPUTER VISION:
Scientists hope to develop computers that will process and interpret light waves just as the human brain does.
Such systems would use scanning devices to sense and interpret objects, graphics and text character shapes.
It will allow a computer to see as humans do, read and interpret text in almost any format.
ii) They are capable of recognizing patterns in large amounts of data that are too complex for the human brain. From these patterns, they
can make predictions and point out anomalies.
EXAMPLE:
In banking, the pattern of credit card usage can be tracked over time to try and generalize spending patterns of individual card owners. Incase
of loss or theft, the bank can notice the change of spending pattern and conclude that the card is in the wrong hands, hence take appropriate
security measures even before loss of the card is reported.
G. ROBOTICS/PERCEPTION SYSTEMS:
A robot is a computer controlled device that emulates a human being in carrying out tasks that would otherwise be dangerous and difficult.
Perception systems are sensing devices that emulate the 5 common sense of a human being i.e. sight, hearing, touch, smell and taste.
Such devices would operate under the control of a microprocessor.
This development would give robots artificial senses including:
i) Feeling the shape of an object.
ii) Listening to ultra sound.
iii) Detecting smell of leaking gas/chemicals.
iv) Testing quality of food.
v) Seeing using two miniature video cameras.
ADVANTAGES OF ROBOTS
1. They can work 24/7 all year round without getting bored or taking a break.
2. They can work faster than human.
3. Productivity is very high.
4. The output is of a consistently high quality.
5. They can work to great degrees of accuracy than human workers.
6. They can work in conditions that would appear hostile or dangerous to humans.
DISADVANTAGES OF ROBOTS:
1. They are expensive to build, install and maintain.
2. Not flexible as they are designed to do one job.
3. The robot may malfunction and cause a lot of chaos or a batch of faulty goods.
4. They take up the job of many people, leading to being sacked.
5. Evil people may use robots in war to manipulate biological material.
1. SYSTEM ANALYST:
Responsible for analyzing a company’s needs or problems then design and develop a computer based information system.
3. COMPUTER PROGRAMMERS:
These are people whose work entails coding i.e. formulating instructions for the computer to solve given problems.
QUALITIES OF PROGRAMMERS:
a) Good command of programming language in use.
b) Knowledge of general programming methodology and relationship between programs and hardware.
c) Creativity for developing new problem solving methods.
d) Patience and persistence.
DUTIES OF PROGRAMMERS:
a) Coding computer program using appropriate programming language.
b) Testing of programs for logical errors, syntax and semantic errors.
c) Debugging of programs.
d) Documenting programs i.e. writing manuals.
e) Designing and implementing programs.
f) Maintaining and reviewing existing computer programs.
4. DATABASE ADMINISTRATOR:
A person responsible for the design and implementation of the database.
The major purpose of computerizing an organization or institution is to store data in an organized way for easy access, retrieval and update.
DUTIES:
a) Responsible for the design and control of organization database.
b) Controls and monitors database usage through assignment of user passwords.
c) Keeping the database up-to-date by adding new records, or deleting unnecessary records.
d) Establishing the appropriate content and format of data records.
5. SOFTWARE ENGINEER:
Person skilled in software development and technical operation of computer hardware.
DUTIES:
a) Developing system and application software.
b) Developing user and technical documentation for the new software.
c) Maintaining and updating the software to meet day-to-day requirements.
6. COMPUTER ENGINEER:
Specialized personnel whose duties are to assemble the computer systems.
DUTIES:
a) Design and develop computer components e.g. motherboards, storage devices etc.
b) Design and develop engineering and manufacturing computer controlled devices such as robots.
c) Re-engineer computer components to enhance its functionality and efficiency.
7. WEB DESIGNERS:
They design website using various software tools. These webs contain pages where individuals and organizations can advertise themselves
when promoting the products.
8. WEB ADMINISTRATORS:
They administrate the organization’s websites by making sure the website is updated periodically to give the right information.
DUTIES:
a) Developing and testing websites.
b) Monitoring the access and use of internet connection by enforcing security measurers.
c) Downloading information needed by an organization from internet website.
d) Maintaining, updating and modifying information on the website.
9. COMPUTER OPERATOR:
This is a person who interfaces the user demands to the computer hardware by use of a set of special instructions known as commands.
DUTIES:
a) Entering data into the computer for processing.
b) Keeping up-to-date records of all information processing activities.
c) Responsible for the general equipment layout within the computer room.
d) Activating the computer to obey programs through use of commands.
e) Mounting the storage media e.g. disk to their drives.
DUTIES:
a) Troubleshooting computer hardware and software related problems.
b) Ensuring that all computer related accessories such as printers, storage media etc are in good condition.
c) Assembling and upgrading computers and their components.
d) Help hardware engineers in designing and creating some computer components such as storage devices, motherboards etc.
RESPONSIBILITIES:
a) Making sure that all tasks in the IT department are done correctly and on time.
b) Preparing budgets for the departments.
c) Keeping the department inventory records up-to-date.
d) Managing the human resource within the department.
RESPONSIBILITIES:
a) Training people on how to use computers and various application programs.
b) Developing training reference materials.
c) Guide learners on how to acquire knowledge through carrying out research.
d) Advising the learners on the best career opportunities in the broad field of ICT.
e) Preparing learners for ICT examinations.
RESPONSIBILITIES:
a) Setup computer network.
b) Maintain and enforce security measures on network.
c) Monitor the use of network resources.
d) Maintain and troubleshoot network related problems.
16. LIBRARIAN:
Responsible for keeping the files in various storage devices and for the physical security of the storage media.
DUTIES:
a) Ensures that there are enough physical files available for use.
b) Maintains the external files labels.
c) Ensures duplicates files are kept.
d) Ensures access of files is restricted to authorized persons.
b)Private Universities:
Self-sponsored institutions set up by individuals, churches or any other organization.
They are privately run.
Students’ enrolment depends on whether the student is capable of sponsoring himself/herself.
For them to operate, they must be registered or accredited by the commission of higher education or any other quality assurance body that
is recognized worldwide.
Accreditation leads to public acceptance and confirmation evidenced by the grant of charters by the state or accrediting bodies.
Examples:
i. Daystar University.
ii. Catholic University of Nazareth.
iii. Mount Kenya University.
iv. Kabarak university.
v. Baraton University.
vi. Catholic University of East Africa.
vii. Kenya Methodist University
Universities are authorized to offer approved Diploma, Undergraduate and Post graduate programmes.
2. RESEARCH INSTITUTIONS:
These are the other specialized research institutions that concentrate on narrow fields of study such as computer or ICT technology,
agriculture, space science etc.
It is possible to enroll in such institutions as a research trainee.
3. POLYTECHNIQUES:
These are institutions of higher learning that mostly offer Diploma and certificate courses in technical fields such as ICT, mechanics, food
production etc.
A polytechnic may also be accredited by a university or the state to offer degree programmes.
4. COLLEGES:
These are middle level institutions that offer diploma, certificates and craft courses in many disciplines such as technical, ICT, teacher
training, business management etc.
EXAMPLES OF COLLEGES:
a) Rift valley Institute of Science and Technology.
b) Kaiboi Technical Training Institute.
c) Thika Institute of Science and Technology.
d) Kiambu Institute of Science and Technology.
e) Coast Institute of Science and Technology.
f) Kirinyaga Technical Training Institute.
g) Nairobi Technical Training Institute.
h) Nyeri Technical Training Institute.
i) Kenya Technical Training Institute.
j) Kenya Science Teachers College.
k) Machakos Technical Training Institute.
The most important considerations to make before you join a college to pursue an ICT course:
a) Whether it offers ICT courses recognized both locally and internationally.
b) The cost of training with such an institution.