0% found this document useful (0 votes)
24 views134 pages

DTE Module Notes - 064655

The document outlines the role of digital technologies and Information and Communication Technologies (ICT) in education, detailing their definitions, general uses, and specific applications in various fields. It emphasizes the benefits of ICT in enhancing student motivation, collaboration, and creativity while providing examples of communication technologies used in teaching and learning. Additionally, it highlights the importance of computers in modern society, their various uses at home and in different industries, and answers frequently asked questions about their impact on daily life.

Uploaded by

elsemafut
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views134 pages

DTE Module Notes - 064655

The document outlines the role of digital technologies and Information and Communication Technologies (ICT) in education, detailing their definitions, general uses, and specific applications in various fields. It emphasizes the benefits of ICT in enhancing student motivation, collaboration, and creativity while providing examples of communication technologies used in teaching and learning. Additionally, it highlights the importance of computers in modern society, their various uses at home and in different industries, and answers frequently asked questions about their impact on daily life.

Uploaded by

elsemafut
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 134

DIGITAL TECHNOLOGIES IN

EDUCATION
CS111 DRAFT Module notes
CONTENTS PAGE
Definitions 2
General Uses Of Computers 2-6
ICT Uses In Education 7-11
ICT Uses For Development 12-16
ICT Uses For Research 17-23
Health Issues Caused By Computers 24-27
Computer Security And Ethics 28-41
Types Of Computers 42-46
Input Devices 47-66
The System Unit & The CPU 67-69
Computer Output Devices 70-74
Computer Storage Devices 75-85
Computer Software 86-92
E-Waste Management 93-96
Mobile Device Systems 97-102
ICTs And Documentation 103-105
ICTs And Record Management 106-107
Computer Uses In Data Analysis 108-109
ICTs In The Classroom 110-113
Computer Aided Design 114-117
Computer Assisted Learning & Computer Assisted Instruction 118-122
The Internet 123-134
Practical Tasks and Guidelines: Windows Download from Moodle
Word Processing Download from Moodle
Spreadsheet Download from Moodle
Databases Download from Moodle
Presentation Download from Moodle

1|Page
Graphics Download from Moodle

WHAT IS DIGITAL TECHNOLOY

WHAT IS ICT?
Information and Communication Technologies (ICT) is a broader term for Information Technology (IT),
which refers to all communication technologies, including the internet, wireless networks, cell phones,
computers, software, middleware, video-conferencing, social networking, and other media applications
and services enabling users to gather, access, retrieve, process, store, transmit/share, and manipulate
information in a digital form. A good way to think about ICT is to consider all the uses of digital
technologies that already exist to help individuals, businesses and organizations use information. These
technologies are widely used all over the world where Artificial intelligence (Expert systems, Robotics
and Language processors) is the cutting edge advancement in ICT.

What is communication technology?


Communication technology is any digital tool you can use to send and receive information. This
technology can include software, computer programs, devices and messaging systems. Successful
communication technologies are fast, efficient, convenient and easy to use. They also often allow people
to connect with each other from any place in the world

ICTED
ICTED Means information and communication Technology in Education. At Mutare teachers college it is
offered as a preliminary course (ICTED100) studied in the first semester with an aim of making students
aware and harness ICTs both during training and in the world of work.

What is a computer?
A computer is an electronic machine that works under the control of a stored program. It has the ability to
accept data, process that data, store it, transmit it and also produce the desired output. “A computer is an
electronic device that is capable of receiving, processing, and storing data in order to perform various
tasks”. It consists of hardware components such as the central processing unit (CPU), memory modules,
storage devices, input and output devices, and various interconnected circuits. The computer’s hardware
works in conjunction with software, which includes operating systems, applications, and programming
languages, to enable a wide range of functions.

Input into a computer is called data and output from a computer is called information. Computers are
used as tools to make our everyday work or activities easier.
Computers are used to create documents, send emails, play games, watch videos or films, store
information in an organized way, and also do specialized work such as home security, household
cleaning, business calculations, architectural designs, image processing, etc.

2|Page
Computers come in different forms and sizes, including desktops, laptops, tablets, smartphones, servers,
and embedded systems in various devices. The evolution of computers spans several generations, from
early mechanical calculators and analog computers to the modern digital computers that we use today.
These advancements have led to improvements in processing power, storage capacity, and overall
efficiency, revolutionizing the way we live, work, and interact with technology.

Some of the reasons why people use computers are because of that they, do not make errors like
human, are faster than humans, can work in dangerous areas, have the ability to process several
complicated tasks at the same time, do not get tired-they can work 24/7, do not require a salary,
don’t forget or lose information easily, can store large amounts of information, can find information
faster than humans and can secure information better than we do ourselves.
The world is fast changing and computers are playing a central role in these changes. Studying
computers has therefore become a necessity than a choice.
The diagram below shows parts of a computer.

Task

Identify parts of the diagram that


represents
(a) Input
(b) Processing
(c) output

General Uses of Computers


In ancient time doing any work is very harder but computer revolution make it easy. Uses of computer in
various and different fields like Hospital, business, airport, education, railway stations, shopping marts and
may more places make work easier and earlier then ancient days’ work. It makes revolutionary change in
our daily routine life or our working style.
 Information processing
 Communication
 Design and engineering
 Transportation
 Education
 Security and surveillance
 Business and finance
 Weather forecasting
 Entertainment
 Research
 Healthcare
 Agriculture
 Governance

3|Page
 Sport management
 Insurance

Uses of Computer in Different Fields


Computers have become an integral part of modern and new generation society and have a wide range of
uses across various fields. Form some of the common uses of computer we are providing you latest 12 uses
of computer in different fields are:
 Information Processing: Computers are used to process and manage vast amounts of data quickly
and accurately. This includes tasks like data entry, data analysis, and data manipulation.
 Communication: Computers enable various forms of communication, including email, instant
messaging, video conferencing, and social media. They also power communication networks and the
internet, allowing global connectivity.
 Education: Computers are used in education for interactive learning, online courses, research, and
accessing educational resources. They also play a role in virtual classrooms and remote learning
environments.
 Business and Finance: Computers are essential for managing business operations, maintaining
records, accounting, financial analysis, and online transactions. They are also used for inventory
management, customer relationship management (CRM), and electronic commerce (e-commerce).
 Entertainment: Computers are used for gaming, streaming movies and music, creating digital art, and
editing videos and photos. Virtual reality (VR) and augmented reality (AR) technologies also rely on
computers to create immersive experiences.
 Scientific Research: Computers are crucial for complex simulations, data analysis, and modeling in
scientific research. They help scientist’s process large datasets, run simulations, and conduct
experiments virtually.
 Healthcare: Computers are used for patient records management, medical imaging (such as X-rays
and MRI s), drug research, and medical diagnosis. They also enable tele medicine, allowing doctors
to remotely diagnose and treat patients.
 Design and Engineering: Computers are essential tools for architects, engineers, and designers to
create, simulate, and visualize designs. Computer-aided design (CAD) and computer-aided
engineering (CAE) software are widely used in these fields.

 Transportation: Computers control and manage various transportation systems, including air traffic
control, railway networks, navigation systems in vehicles, and autonomous vehicles.
 Security and Surveillance: Computers play a role in security systems, including surveillance
cameras, access control systems, and cybersecurity measures to protect digital assets and information.
 Weather Forecasting: Supercomputers are used for weather modeling and forecasting, enabling
accurate predictions and warnings about natural disasters.
 Agriculture: Computers assist in precision agriculture by analyzing data from sensors, satellites, and
drones to optimize planting, irrigation, and harvesting processes.
 Space Exploration: Computers are vital for controlling space missions, analyzing space data, and
managing satellite communication.

** These are just a few examples of Uses of computer, the many diverse applications of computers
across different industries and aspects of daily life. The versatility and capabilities of computers
continue to expand as technology advances. **

4|Page
Uses of Computer at Home
Computers have become an integral part of modern homes, serving a variety of purposes that enhance
communication, productivity, entertainment, and more. Here we are providing you 8 common uses of
computers at home are as follow:

 Communication: Computers enable communication through email, instant messaging, video calls,
and social media platforms, allowing family members and friends to stay connected regardless of
geographical distance.
 Education: Computers support online learning, research, and educational resources. Students can
access educational websites, online courses, and digital libraries to enhance their learning experience.
 Work from Home: Many people work remotely using computers, accessing work-related files,
participating in virtual meetings, and collaborating with colleagues through various communication
tools and platforms.
 Entertainment: Computers offer a wide range of entertainment options, including streaming movies,
TV shows, and music. They are also used for playing video games and exploring interactive
multimedia content.
 Social Media and Networking: Computers enable users to engage with social media platforms, share
updates, photos, and videos, and connect with friends and family online.
 Health and Fitness: Computers support health monitoring and fitness tracking through apps and
wearable devices. They can provide access to workout routines, health information, and diet plans.
 Online Shopping: Computers are used for online shopping, allowing users to browse and purchase a
wide range of products and services from the comfort of their homes.
 Cooking and Recipe Management: Computers can serve as recipe databases, providing access to
cooking tutorials, recipes, and meal planning apps.

** These are just a few examples of Uses of computer, the many ways computers are used in households

to enhance daily life, communication, entertainment, productivity, and personal development. **


FAQ about Uses of Computer
Q1: What are the main uses of computer?
 Computers are used for communication, data processing, entertainment, education, research, work,
creativity, automation, and much more.
Q2: How do computers help in communication?
 Computers enable communication through email, instant messaging, social media, video calls, and
online collaboration tools.
5|Page
Q3: What is the role of computers in education?
 Computers support online learning, research, access to educational resources, interactive lessons, and
digital classrooms.
Q4: How do computers contribute to entertainment?
 Computers offer entertainment options such as streaming movies, gaming, digital art creation, music
production, and virtual reality experiences.
Q5: What are the benefits of computers in the workplace?
 Computers enhance productivity by automating tasks, aiding in data analysis, facilitating
communication, and enabling remote work.
Q6: How are computers used for data analysis?
 Computers process large amounts of data quickly, generating insights and trends that inform decision-
making in various fields.
Q7: Can computers support creative activities?
 Yes, computers are used for graphic design, video editing, music composition, digital art,
photography editing, and more.
Q8: How do computers contribute to research?
 Computers simulate experiments, model complex systems, and analyze data in fields such as science,
engineering, and medicine.
Q9: How do computers impact everyday life?
 Computers are integrated into daily life for tasks like online shopping, managing finances, staying
informed, and interacting with others.
Q10: What role do computers play in automation?
 Computers automate repetitive tasks in industries like manufacturing, logistics, and customer service,
increasing efficiency.
Q11: Can computers enhance healthcare?
 Yes, computers aid medical imaging, patient records management, drug research, diagnosis, and tele
medicine.
Q12: How do computers contribute to personal productivity?
 Computers assist in scheduling, organizing tasks, managing to-do lists, and creating documents,
enhancing personal efficiency.
Q13: How are computers used for security purposes?
 Computers implement security measures such as encryption, firewalls, and authentication systems to
protect data and systems.
Q14: How do computers support remote work?
 Computers enable remote access to work resources, facilitating virtual meetings, collaboration, and
telecommuting.
Q15: Can computers be used for creative writing?
 Yes, computers are used for word processing, content creation, blogging, and publishing.
Q16: How do computers impact entertainment industries like gaming and movies?
 Computers power video game development, animation, special effects, and digital distribution
platforms for movies and music.
Q17: What is the role of computers in scientific research?
 Computers aid simulations, data analysis, and modeling in fields like physics, astronomy, chemistry,
and biology.
Q18: How do computers enhance learning and education?
 Computers offer interactive learning platforms, access to online courses, and educational apps for
various subjects.
Q19: Can computers support environmental monitoring?
 Yes, computers analyze environmental data, predict weather patterns, and monitor pollution levels to
support environmental protection efforts.
Q20: How do computers contribute to social interactions and networking?
 Computers enable social media usage, online forums, virtual communities, and global networking
opportunities.
6|Page
ICTs in education
Benefits of using ICT in education

1) It has been proven that the use of ICT in the classroom increases the motivation of the students,
showing more interest and becoming more involved in the areas they study. ICT enables the use
of innovative educational resources and the renewal of learning methods, establishing a more
active collaboration of students and the simultaneous acquisition of technological knowledge.
2) Furthermore, ICTs are of great help in developing discernment. Being able to search for various
sources and contrast them, as well as to structure information are some of the most notable skills
that students develop thanks to the use of ICT.
3) Their interest in learning grows: the use of resources as varied as videos, websites, graphics, and
games make traditional subjects more interesting. Multimedia content is a very useful tool to
bring different subjects closer to students in a complete and entertaining way.
4) Interactivity: the use of ICT in the classroom promotes the student’s active and participatory
attitude, which is involved in learning and is positioned as the protagonist.
5) Collaboration between students: Collaboration between students is clearly enhanced thanks to
various digital tools. It is much easier for them to create team projects, cooperate and learn from
each other.
6) They enhance creativity: ICT tools stimulate the development of the imagination, as well as the
initiative of all class members.
7) Increased communication: close communication between students and teachers is encouraged
through various channels, in a more spontaneous and less formal way.
8) Personalization and content up-to-date: digital environments allow real-time updating of all
information and resources. In addition, it is possible to adjust the tools and content to local and
nearby realities.

Communication Technology and tools that can be used in in teaching and


learning
Below are examples of communication technology you might encounter or use in education

1. Phone

The phone is one of the core communication technologies that most professionals have readily available.
You might use a landline phone in your office, a smartphone while traveling and internet calling while on
your computer. Most phones have communication features that go beyond sending and receiving voice
calls, including voicemail, conference calling and recording capabilities. Smartphones allow you to
perform basic work duties as well if you have an available internet connection, such as writing emails,
posting on social media and reviewing documents.

2. Email

7|Page
One of the most popular forms of communication technology is email. For decades, people have been
using email to send messages and files over the internet. Unlike traditional mail, email arrives in the
recipient's mailbox almost instantly. You might use email throughout the day to communicate with
teachers or students, send and receive documents and share text or photo files quickly and easily.

3. Blogs

Blogs are websites where students or teachers can share content, or posts, for other people to read. Blogs
can be publicly available to anyone with the website link or only accessible behind with a membership.
Individuals can use personal blogs to share information about their hobbies and lives even questions and
how they can be answered. Blogs might include not only text but also images, videos, infographics, links
and advertising.

4. Social media

Social media platforms, the earliest of which launched at the end of the 20th century, allow users to share
their experiences and opinions with a worldwide audience. They also make it easy for people to
communicate with other users on each platform. Today, most schools have corporate social media
accounts they use for branding, marketing and communication. Through these platforms, they can share
educational updates, engage with and grow their audiences and stream videos and presentations.

5. Vlogs

Vlogs are "video logs" that are basically visual versions of blogs. Rather than posting text, vloggers
upload simple videos of themselves sharing their ideas or explaining how to do something. Vloggers
typically use the camera on their computer or device or a handheld camera to record themselves saying or
doing things. You can use vlogs to:

 Present a lesson online


 Engage with your audience
 Monetize your content
 Share educational video content

6. Podcasts
Podcasts are audio-based forms of communication. Creators can record themselves discussing a topic or
telling a story, then upload and store the audio online. Audiences can download the podcast to listen to on
their devices. Successful podcasts are often those that focus on a specific topic that has a dedicated
audience, such as science, geography etc. One feature that makes podcasts so popular is listeners can
download and listen to them whenever they want. You can use a podcast to discuss a topic you're an
expert on.

7. Livestream
Livestreaming is like vlogging but it happens in real time. Individuals or schools launch live videos on
platforms such as blogs, social media or other video hosting websites. Viewers can comment on the
videos as they stream, and the host can respond to their questions immediately. You can use livestreaming
to engage with your audience, explain how to use a product or broadcast presentations and events.

8. Online chat
Web chat offers users a form of instant communication. People use chat software on social media and
business communication platforms to talk to friends, family and colleagues. Businesses often add chat
support features to their websites to help answer customers' questions immediately. You can use online
chat as a more casual method of communicating
8|Page
9. Web conferencing
Conferencing technology makes it easier for employees to communicate with each other regardless of
where they're located. Most live conference technology involves both audio and video feeds of the
attendees. Other features include computer screen-sharing capabilities and brainstorming screens. You
can use web conferencing platforms to collaborate remotely, deliver live lectures and meet with long-
distance clients.

10. Texting
Short Message Services (SMS), or texting, allows individuals to send brief messages or images through
their smartphones. This popular and informal communication technology is useful if you're unable to call
or email someone. For example, if you need to send an update or a confirmation to a colleague or client
while in a meeting, you can send them a quick text.

11. Shared calendars


Calendar sharing services allow users to invite others to see their calendars and, in some cases, add or edit
them. This form of communication helps teams coordinate their work schedules and plan tasks depending
on each individual's availability. Teams can also use shared calendars for project management purposes
and to help employees manage meetings and appointments.

12. Forums
A group forum is an online platform where people can post and respond to questions. Forums are often
organized by topic, allowing users to communicate about their shared interests or to troubleshoot common
issues. One benefit of forums is they contain records of conversations so you can track a group's progress
and search for specific information.

13. Wikis
A wiki is a website for crowdsourcing information, where any member can view, add or edit content. You
can set up private wikis for your department or company on many business communication platforms.
Your team can add information to relevant wikis to create a shared knowledge base for all members to
reference.

14. Collaborative documents


Collaborative documents, such as virtual whiteboards and online word processors, allow multiple people
to work on the same document. Several people can access, edit and comment on a file simultaneously.
These tools are useful for teams that create and edit content and can help them produce an accurate and
shared final product.

15. Wearable Technology


You can carry various types of wearable technology on your body to make communication quick, easy
and hands-free. Smart watches, for example, respond to the wearer's voice commands to answer
questions, make phone calls, send meeting reminders and take notes. This technology is useful for
professionals who travel frequently, are away from their computer and multitask many projects. Other
examples of wearable technology in the workplace include smart glasses and exercise bracelets.

16. Smart Speakers


You can place smart speakers in your home or office to act as voice-activated personal assistants. Using a
voice command, you can ask the device questions or tell it to perform duties such as scheduling a
meeting, calling a client or adding an item to your task list. They make work and communications more
efficient, particularly for those professionals who work remotely or juggle multiple responsibilities.

17. BlackBoard

9|Page
BlackBoard is a popular teaching tool that comes with numerous capabilities. Teachers can
easily administer tests, monitor performance, manage syllabus and even upload grades. This can save
you from the hassle of writing everything on paper, and also from an aching wrist. Students can
equally benefit from this tool because they can access all the information, including grades,
assignments, attendance, that you upload on the platform. The best part is that all this comes in one
platform. So, you won’t need multiple applications to manage it all.

18. Google Classroom


Google Classroom, as the name suggests, is a virtual classroom that makes learning easy and fun.
Teachers can integrate educational apps or websites and create interactive assignments. You can
include a slideshow, a small game, or an entertaining YouTube video full of information. This way,
kids learn better and enjoy their learning experience. Also, Google Classroom allows you to go
paperless. You can easily create paperless assignments and grade students within a few minutes. This
way, you can save time and focus more on improving the learning experience. Furthermore, you can
create a separate drive folder for assignments, grade sheets, attendance sheets, etc. And you can access
all this on the go, even from your mobile or laptop. What’s more, Google Classroom allows virtual
meetings. You can host parent-teacher meeting sessions online from your home. It’s beneficial both
for you and the parents, especially during the lockdowns. All in all, Google Classroom offers a
complete solution for online teaching.

19. Trello
Trello is a collaborative tool that is used widely in IT companies with large teams. Fortunately, it has
several applications for you educators as well. If you prefer project-based learning for students, Trello
is for you. Trello has these digital boards. You can create different boards for assignments, test papers,
etc. And in those boards, you can create cards. Furthermore, you can discuss a particular topic in that
card. You can invite your students to view that card. And the students can put in comments, doubts, or
ask questions and even attach images, videos, etc. Also, students can easily look at their projects, set
deadlines, and track progress online. In a nutshell, Trello takes a lot of burden off your shoulder while
enriching the learning experience for kids.

20. Microsoft Teams


Microsoft Teams is another popular tool for IT professionals. And similar to Trello, it has several
applications for teachers and educators. Microsoft Teams is a Microsoft Office 365 product. It simply
means you can host meetings, chat, share files, and use every Microsoft Office app using Teams. One
of the best features Teams comes with is the Class Notebooks from One Note. Class Notebooks
resemble individual student notebooks (physical) but come with additional features and ease of use.
Teachers can assign individual notebooks to students and provide them with real-time feedback. You
can easily distribute exams, handouts, quizzes, and homework instantly to your students. Also, the
students can use amazing tools within Teams for taking notes and highlighting important things. This
helps the students engage more and enjoy learning. All in all, Teams can reduce the manpower and can
completely replace the use of paper. It’s yet another amazing tool that ensures effective education
online.

21. Online Coding Websites such as DataCamp, HackerRank, Coderbyte


No minimum age exists when it comes to learning how to code.
Mark Zuckerberg, the owner of Meta (formerly Facebook), said that his daughter, who’s just three, has
started coding already. Now, how can you beat that? If you want your students/kids to learn how to code,
make sure it’s practical. Practicing code on paper is simply a waste of time. And it also kills the creative
talent of the students. This is where the websites such as DataCamp, HackerRank, Coderbyte, etc., come
into play. Using such websites, your students can implement what they’ve learned instantly. Also, such
websites feature several tricky problems that your students will enjoy. The best part is that most websites
are free and accessible from any device. It simply means none of your students will need particular
hardware (laptop/PC) to code. A normal PC or a mobile with an internet connection would do.
10 | P a g e
Subject Specific Tools
All of the above ICT tools for teaching and learning help in generalized learning. However, when it
comes to specific subjects, special tools are required. Let’s talk about them below:

ICT Tools for Teaching Geography


 Google Maps: With Google Maps, kids can learn to find the distance between two places
and look at 360-degree images of places. This can help your students become familiar
with multiple locations across the world.
 Google Earth: This tool shows the entire earth with every location and supports an
amazing zoom feature. Kids can learn about different regions, landmasses, and water
bodies in a fun way.

ICT Tools for Teaching Mathematics


 CanFigureIt Geometry: This tool makes learning geometry pretty easy. You can teach
kids about several mathematical proofs and theorems in an engaging way.
 CueThink: You can use this tool to teach kids how to solve math problems in four steps:
understand, plan, solve, and review.

ICT Tools for Teaching Biology


When it comes to Biology, you can take the help of:
 Microsoft PowerPoint: You can use HD images and create slides to clear the biological
concepts for the kids. Also, you can download templates from Slidesgo and make the job
even easier.
 YouTube: What’s better than using videos for explaining complex biological processes via
YouTube videos? From digestion to excretion, you can find plenty of child-safe content on
YouTube.

ICT Tools for Teaching History


Here again, you can use the above-listed tools but in a different manner:
 YouTube: You can find historical movies related to the chapter you’re teaching for kids to
remember.
 Microsoft PowerPoint: You can create slideshows with minimal details such as dates,
names, locations, and events, etc. This way, kids can learn facts easily and for longer
durations.

1) Discuss with a friend the ICTs we can use in the home


2) What ICTs do we normally use to communicate with friends?
3) What ICTs can we use to create and share videos with relatives abroad?
4) Why is ICT an important course to you?

11 | P a g e
Information and Communication Technologies for
Development

Information and communication technologies for development (ICT4D) refers to the application of
information and communication technologies (ICT) toward social, economic, and political development,
with a particular emphasis on helping poor and marginalized people and communities. It aims to help in
international development by bridging the digital divide and providing equitable access to technologies.
ICT4D is grounded in the notions of "development", "growth", "progress" and "globalization" and is often
interpreted as the use of technology to deliver a greater good. Another similar term used in the literature is
"digital development". ICT4D draws on theories and frameworks from many disciplines, including
sociology, economics, development studies, and library, information science, and communication studies.

Sustainable Development Goals

In 2015, the UN Development Program and the UN Development group postulated a set of 17 goals whose
ultimate goal is to transform the world into a better one with emphasis to developing countries. Some of
the goals included are aims to end extreme hunger, poverty and gender inequality.[98] While none of the
Sustainable Development Goals are specifically meant for Information and Communication Technologies,
the 2030 Agenda for Sustainable Development believes that it can help at some extent in achieving the
SDGs adding that "The spread of information and communication technology and global
interconnectedness has great potential to accelerate human progress, to bridge the digital divide and to
develop knowledge societies".[99] The International Telecommunication Union also shares this sentiment
and considers that the ICTs can "fast forward progress on the SDGs" which would fundamentally improve
the lives of the people.[100]

1. Goal Number 1: No Poverty


Currently, there are over two billion people in the world who don't have a bank account. Digital
financial services through ICT helps these people engage with digital economy. It has been proven
that access to financial services empowers people to get out of poverty. Information services can
also provide accurate and timely financial information to the people which promulgates their rights
to economic resources and market perceptions which would ultimately benefit all those who are
concerned.
2. Goal Number 2: Zero Hunger
It is evident that the skyrocketing number of the world's population signals the need for new
methods in order to improve crop yields. Through ICT, farmers can gain access to information
systems that provide content such as weather forecasts, trading information and training courses
that are tailored to their needs.
3. Goal Number 3: Good Health & Well-being
ICTs have the potential to bring the medical personnel and their patients closer wherever they may
be. Patients can remotely contact health care services for help. Health care workers can run tests
that would otherwise be impossible without the help of ICTs such as conducting remote diagnostic
check-up of their patients and prescribing treatment solutions.
Analyzing all of these data in a large scale would help in analyzing trends, create forecasts about
disease outbreaks, improving traditional and ICT-based health services and more.
4. Goal Number 4: Quality Education

12 | P a g e
Education is where a citizen is prepared.[104] E-learning systems serve as a leeway in educating
learners through ICT.[105] With these technologies, it can contribute a worldwide spread of access
and quality in education for all, as well as excellent delivery.[106] Teachers have pointed out that
with the implementation of ICT in their school, it has helped enhance the students' attention and
perception skills.[107] Around the globe, there are programs that are self-paced, available
competitive college courses from known universities with certification, online competitions and
labs which in turn act as tools for livelihood opportunities. There are also smart systems that
analyses the learning pattern of the student which it uses in constructing individual learning plans
as maximized pedagogy.[105] In Europe, it has been said the use of ICT is one of the big fundamental
factors in improving quality education. The implementation of the use of ICT in education is highly
encouraged by the European Commission in their E-Learning Action Plan wherein one of their
goals are, "to improve the quality of learning by facilitating access to resources and services as well
as remote exchange and collaboration".[107]
5. Goal Number 5: Gender Equality
Access to ICT helps women in understanding the importance of their productive and reproductive
roles in the society at the local community, government and global level. Women can be
empowered as economic, social and political actors by providing new space and opportunity where
they can contribute to the community. These opportunities can be in form of advocacy, ICT-based
entrepreneurship or other community development activities through ICT.
6. Goal Number 6: Clean Water and Sanitation
Contaminated water and inadequate sanitation accounts to more than 800,000 deaths annually.
ICTs can provide ways for smarter water management such as automated systems handling the
measurement and observation of the water supply and propose possible solutions and interventions
based on the data gathered. ICTs can also be used to provide data to practitioners in the field
enabling them to provide more water, sanitation and hygiene (WASH) services.
7. Goal 7: Affordable and Clean Energy
ICT-powered solutions such as smart electrical grids, smart homes and buildings, and automated
industrial processes can be deployed to replace their inefficient counterparts towards usability
and energy efficiency.
ICTs are also being developed to create a lesser carbon-footprint so as to make them
environmentally sound.
8. Goal 8: Decent Work and Economic Growth
ICTs are paving way for interested entities to conduct business virtually anywhere in the world.
Some of examples of these businesses are online education platforms, computing services and
online boutiques. This creates a plethora of new employment opportunities which ultimately fosters
market growth.
9. Goal Number 9: Industry, Innovation and Infrastructure
ICT is a crucial tool in industrialization. In emerging information and knowledge societies, open
access to academic research, online collaboration and optimization of ICT enable countries to
provide infrastructures well-suited for knowledge-based societies such as power networks,
transportation systems, water supplies and communication networks.
10. Goal Number 10: Reduced Inequalities
ICTs can help reduce inequality within and between countries by providing knowledge to the
disadvantaged section of the society such as those living with disabilities and women. For example,
to those who are visually challenged, there are now accessibility solutions that accept speech as
input and output for computing operations. Interactive lectures can also be used to engage people
into learning and developing their ICT skills with the goal of bridging the digital divide.
11. Goal Number 11: Sustainable Cities and Communities
City management can be done effectively with the help of ICTs. Innovative concepts such as smart
buildings, smart waterworks facilities and intelligent transport systems not only provide increased
work efficiency but also boasts a reduced energy consumption and waste impact.[114]
12. Goal Number 12: Responsible Consumption and Production

13 | P a g e
ICTs application help participate in the dematerialization and virtualization of materials such as the
case of virtual receipts and electronic books replacing their paper-based counterparts.
Innovative ICT applications can also stimulate a sustainable consumption and production of
resources. Some examples of these include smart grids, cloud computing and ICT-based power
plants.
13. Goal Number 13: Climate Action
ICTs such as satellite monitoring are critical in monitoring the earth, interacting with climate and
weather information, generating forecasts and using results gathered to enable early warning
systems.
Besides monitoring the effects of climate change, ICTs also play a role in alleviating the effects of
climate change by providing timely and accurate forecasting and early warning systems.
Private standard-setting organizations such as ISO contributed plans on climate change. One of
them, the ISO 14001, sets requirement for environmental management system (EMS) and obliges
organizations to identify and systematically reduce any harmful effects it may have on the
environment. Organizations must agree to practice energy saving, pollution control, waste
management, and proper consumption of raw materials.
14. Goal Number 14: Life Below Water
Utilization of ICTs can also pave the way to the conservation and responsible use of oceans and
the marine resources that they hold. Satellite-based monitoring can improve overall monitoring and
reporting efficiencies which results to increased liability. On a smaller scale, local sensors and other
related systems can also deliver real-time updates to improve the accuracy and efficiency of data
gathered from satellite-based monitoring.
Big data from the monitoring activities can be analyzed to look for short and long-term trends in
terms of pollution, weather patterns and migration cycles.
15. Goal Number 15: Life on Land
ICTs can play a major role in the conservation of terrestrial ecosystems and prevention of
biodiversity loss. Like on oceans and marine resources, global monitoring systems such as satellite-
based monitoring can improve the monitoring efforts which would increase accountability. As a
result, several illegal activities such as poaching and illegal wildlife trade can be alleviated through
this way.
Data gathered from the monitoring activities can be used to analyses trends in terms of biodiversity,
changes in ecosystems as well as to plan mitigation efforts.
The Environment Public Authority in Kuwait has created an environmental portal, Beatona.net.
The portal aims to share verified environmental information to the public. One of the key feature
of this portal is the ability of the public to interact with it by reporting environmental phenomena
and illegal activities.
16. Goal Number 16: Peace, Justice & Strong Institutions
ICTs can help in strengthening the accountability and reliability of institutions. The emerging trend
of governments opening their data to the public increases transparency ratings, enables citizens and
helps stimulate financial growth. ICTs are also vital in areas such as monitoring and tracking
government data and public demographics.
ICTs are also important when natural or man-made disasters occur because it is responsible for
retrieving, communicating and sending reliable and timely crisis information. This allows efficient
and correct solutions to be carried out. In the future, analysis of big data can also pave way to
accurate forecasting and early warning systems which would be open to anyone.
17. Goal Number 17: Partnerships for the Goals
Ultimately, ICT plays the biggest role in SDG, although not specifically mentioned. But with the
three pillars of sustainable development namely economic growth, social inclusion and
environmental sustainability, it is no doubt needed in providing innovative and effective means of
implementation in a global scale. It helps in enhancing international coordination, multi-
stakeholder partnerships, data monitoring and accountability.

14 | P a g e
The Sustainable Development Goals is an opportunity for the world to work together to reach goals
such as ending poverty, protecting the earth and ensuring prosperity for the planet. Technology if
used effectively will accelerate the SDG's task of reaching its goals.
In order for SDGs to achieve their goals, changes are required of each sector. Development sectors
like livelihood, agriculture, health, education, water, sanitation and power, infrastructure, disaster
relief, government and human rights, environmental protection and crosscutting should achieve
their goals of ending poverty by providing sustainable agriculture to ensure food security and
improved nutrition for people to have healthy lives. Sustainable management of water, sanitation
and modern energy should be achieved as well as the construction of safe and resilient infrastructure
for communities. Laws promulgating equal rights should also be achieved. Lastly, protection of the
environment should be undertaken.
ICT can address the needs and provide benefits to various organizations and individuals. These
organizations include consumers, entrepreneurs or employees, businesses, government agencies
and civil society organizations.

18.

Gaps – New Development-Oriented Priorities

Shown below is a list of the 16 largest ICT4D gaps (as of 2016) arranged in a descending order according
to the priority it receives. In an online article, Heeks states that ICT4D analyses tend to underplay its
negative impacts. The "Dark Side of ICT's" is placed 15th in the list – just a place away from the least
prioritized ICT4D gap.

These gaps, along with other key topics, are used to come up with a list of post-2015 ICT4D priorities
which in turn will be of valuable use in ICT4D activities of policymakers, strategists and practitioners.

Again, this list is topics that are under-represented in post-2015, but not a totality of ICT4D priorities.
Works on ICT and education, ICT and health, ICT infrastructure and few others which is not on the list
shall continue during this period.

1. Environment – to develop Green IT for mitigation of climate change, weather early warning
systems, minimization of e-waste. Also, noteworthy is climate change adaptation which is rather a
major issue among the global South. Concurrent is the need for ‘strategy.’ That more than
monitoring, mitigating, and being able to adapt to climate change is by using ICTs as a guide in
making policies and programs of action.
2. Sustainability – composed of economic prosperity, social infusion, and environmental
sustainability, which are needed to be balanced for it cannot be maximized all at the same time.
With reference to Brundtland Report definition of sustainable development (WCED 1987:43), there
are two concepts contained: the need of the world and the imposed limitations of the environment.
Development that fulfils the needs of the present without compromising the future resources.
3. Poverty – focus more on poverty specifics such as policies, poverty reduction/ eradication
programs and projects rather than generic ICT priorities. ICT4D should resolve its failures to
practically engage with poverty eradication and environmental sustainability, meaningfully involve
with discourses on theories of poverty and development concepts, and determine its role in the
emerging development.
4. Development Finance – use of ICT to monitor aid flows and debts, mainstream banking and
finance, improve tax system and taxation of ICT, ICT-enabled investments, e-remittances.
5. Basic Needs – able to prioritize the usage if ICT based on basic needs of the people using on
Maslow's hierarchy of needs. In that way, it is not ignoring other aspects for the use of higher levels
of ICT but being able to address the essential needs of especially the neediest citizens.

15 | P a g e
6. Economic Development: Growth, Jobs and the Digital Economy – intensifying an existing area
of economic activity and extensive application of ICT to extend the range of economic activity.
The ICT sector had spread widely through mobile-jobs it created and new business models it
prompted. It continues to thrive down into the poor communities resulting to their growth and
income.
7. Development 2.0 – emphasis on 5 transformative shifts (1. Leave no one behind, 2. Put sustainable
development at the core, 3. Transform economies, 4.Build peace, 5. Forge new global partnership).
It means ICT4D needs to do more on connecting ICTs to the transformation of development. It is
in a way transforming processes and structures of development with understanding of its extent and
content.
8. Accountability and Transparency – Free and open information must be monitored, evaluated and
controlled in order to combat corruption specifically with public officials. However, this improved
data flow is equally important to be applied among private sector firms and markets especially
openness and transparency with these development stakeholders are the ones mostly neglected.
9. Data Revolution – have 3 dominant aspects: Big development data, Open development data, and
Real Time development data. Data revolution is yet to unleash its full potential when able to
thoroughly connect with ICT4D.
10. Cross Border Flows – supports immigrant and emigrant population, enable international trade,
and investment. This will increase even more global connections and economic ties.
11. Peace and Security – uses of ICT in mainstream peace and security, across the cycle from
insecurity through conflict to post-conflict reconstruction, reconciliation and peace building; from
the micro of violence within households to the macro of regional warfare; and bringing in issues
from application design and implementation to strategic and policy matters.
12. Urban Development – support the inexorable growth, creation and implementation of urban
strategies, facilitating urban planning, improving urban governance and design, ecosystems
services and infrastructure.
13. Resilience – need to form its own particular sub-domain of ICT4D activity. It is to ensure to survive
risks and external threats which include anticipated social, economic and environmental shocks.
Resilience used to refer only to environmental aspect but it has grown to be applied on systems as
well, like in other development initiatives. It is not to merely sustain but also aims to transform.
14. Inclusive Development – to do more than just address digital divides – and to engage with the
breadth of inclusive development. This alternative approach refers to different divides, different
excluded groups other than in terms of information access and availability. Those who are at the
rear end in terms of equality, vulnerability, social justice. They are the ethnic minorities, the women
and youth, the disabled, among others. ICT4D agendas and mechanisms lead to developing
inclusive informatics innovation, inclusive business models and the like.
15. The Dark Side of ICT – costs and failures, development of a Cluedo piece-shaped labor market,
the loss of work/life balance and growing stress, negative impacts of ICT use on health, learning
and cognitive development especially among children
16. Changing the Language and Worldview of ICT4D – An informatics label will allow WSIS, the
UN Group on the Information Society (UNGIS) and other ICT4D stakeholders to lay claim to the
data revolution. Without this, the data revolution will drag attention and resources down its own
potentially-isolated path.[162]

Other issues

The other issues that affects the innovation are: legal and regulatory, moral and ethical, social,
economic, technology, language and script, and security.

1. E-waste through improved design and recycling


In the Development Goals, under Environmental and Sustainability is the topic on waste which
is an important aspect of the relation between ICTs and environment. When ICT goes faulty
and obsolete they become waste. It's necessary to pay a particular attention on the impact of
16 | P a g e
electrical and electronic wastes. Assessing the side-effects of ICT waste or electronic waste
disposal – CRTs, busted fluorescent lamp, used lead-acid batteries, ink toners and cartridges,
used oil, contaminated containers etc. The installation of standardized solutions on E-waste
management such as improved design example The International Telecommunications Union
(ITU) approved new standards for green ICT, including an environmentally friendly charger
for laptops and other portable devices and green batteries for smartphones and handheld
devices

APPLICATION OF COMPUTERS FOR RESEARCH

Almost every person is involved in research of one type or another. Research takes place in homes,
school and other organizations. Nurses, teachers, students, etc. use computers for research.
Research can be carried out to do the following

1. Finding job vacancies and other vacancies in institution locally or abroad


2. Making research on Online news
3. Making researches for products and services available in organizations
4. Researching for new methods, equipment and skills.
5. Find information for a college research paper

• Computer Education: Many people in his world are seeking to understand how to use
computers i.e. the young and old, especially how to use the internet.

• Purpose of using Computer: The research scholars are using computer for preparing
assignment, project, research and some extend to entertainment rather business purpose

• Internet and World Wide Web: A rich source of information though online databases,
journals and information updates. The research scholars are not only depending upon the
school or university Internet Centre’s but also Cyber cafes and free WIFI zones.

• Computers are used in scientific research in data analysis because they are able to analyse
data with extreme speeds. For example, computers are able to analyse percentages of
materials present in a chemical or to determine the temperature at which certain chemical
compounds break down.
• Computers are used to solve complex mathematical equations in order to determine if data is
valid or if a certain structure of molecules will remain stable. If computers are used
calculations are done faster and also human error is reduced.
• Computers are used in simulations and modelling. Modelling is representing the real system
using computer models or programs at smaller scale allowing the system behaviour to be
studied which is often either not possible or too risky in the real world. For example,
computers are used to perform space simulations by modelling extreme environments and
complex flight situations, predicting climate patterns or simulating how engineered products
might perform in the field, etc.
• Today artificial intelligent studies are fast growing in the area of research providing tools to
create and compose new ideas, analyse, validate, track, combine, summarise, perform
grammar, plagiarism checks etc.

17 | P a g e
The following are the uses of computers in the process

1. To store (on a PC or on internet servers) and retrieve researched data for further
manipulation such as editing or printing
2. Accessing the internet for Bibliographic databases, E-books, Audio-Video, Full-text
databases and E-journals.
3. Using the computer stored applications to read more information on a topic
4. Using simulation software during study
5. Making calculations wherever needed using spreadsheet and calculators programs
6. Analyzing data using computer based methods
7. Printing of finished works.
8. Communicating with others doing the same or similar research, or communicating with
online experts.
9. Formatting a research document to make it presentable
10. Researchers take advantage of mobility. Laptops, tablets, etc. can be carried around for
research. People in remote areas now have access to information.
11. The use of internet has led to the creation of a global village thus sharing information has
become easy. E-mails and social media have made it easier to pass on information.
12. Research for labor has been on the increase as people now look for employment in other
countries and also work for them without having to visit those country physically
13. Researchers through technology can collaborate, do video conferencing and group
learning.

The Research Process


The Steps in Research Process

Research process consists of series of actions necessary to carry out research work effectively. The
sequencing of these steps listed below

1. Formulating the research problem;


2. Extensive literature survey;
3. Developing the hypothesis;
4. Preparing the research design;
5. Determining sample design;
6. Data Collection;
7. Project Execution;
8. Data Analysis;
9. Hypothesis testing;
10. Generalizations and interpretation,
11. Preparation of the report or presentation of the results, i.e., formal write-up of conclusions of
the research.

Computers in Research

Computers are used in scientific research extremely and it is an important tool. Research process can
also be done through computers. Computers are very useful and important tool for processing huge
number of samples. It has many storage devices like compact discs and auxiliary memories. Data can
18 | P a g e
be used from these storage devices and retrieved later on. There are various steps necessary to
effectively carry out research and the desired sequencing of these steps in the research process. This
data can be used for different phases of research process.

There are five major phases of the research process:

1. Conceptual phase
2. Design and planning phase
3. Data collection phase
4. Data Analysis phase and
5. Research Publication phase

Conceptual Phase and Computer

The conceptual phase consists of formulation of research problem, extensive literature survey,
theoretical frame work and developing the hypothesis.

Computer helps in searching the existing literature in the relevant field of research. It helps in finding
the relevant existing research papers so that researcher can find out the gap from the existing
literature. Computers help for searching the literatures and bibliographic reference stored in the
electronic database of the World Wide Web’s.

It can be used for storing relevant published articles to the retrieved whenever needed. This has the
advantage over searching the literatures in the form of journals, books and other newsletters at the
libraries which consume considerable amount of time and effort.

Bibliographic references can also be stored in World Wide Web. In the latest computers, references
can be written easily in different styles. Researcher need not visit libraries .It helps to increase time
for research. It helps researchers to know how theoretical framework can be built.

Design and Planning Phase and Computer

Computer can be used for, deciding population sample, questionnaire designing and data collection.
They are different internet sites which help to design questionnaire. Software’s can be used to
calculate the sample size. It makes pilot study of the research possible. In pilot study, sample size
calculation, standard deviations are required. Computer helps in doing all these activities.

Role of Computers in Data collection phase

Empirical phase consists of collecting and preparing the data for analysis:

In research studies, the preparation and computation of data are the most labor-intensive and time
consuming aspect of the work. Typically the data will be initially recorded on a questionnaire or
record for suitable for its acceptance by the computer. To do this the researcher in connection
with the statistician and the programmer, will convert the data into Microsoft word file or excel
spreadsheet or any statistical software data file. These data can be directly used with
statistical Software’s for analysis.

Data collection and Storage:

The data obtained from the research subjects are stored in computes in the form of word files or
excel spread sheets or any statistical software data file. This has the advantage of

19 | P a g e
making necessary corrections or editing the whole layout of the tables if needed, which is
impossible or time consuming in case of writing in hand written. Thus, computers help in data
editing, data entry, and data management including follow up actions etc. computers also allow
for greater flexibility in recording and processing the data while they are collected as well as
greater ease during the analysis of these data.

Data exposition:

The researchers are anxious about seeing the data: what they look like; how they are distributed
etc. Researchers also examine different dimension of variables or plot them in various charts using
a statistical application.

Data Analysis and Computer:

Data Analysis and Computer phase consist of the analysis of data, interpretation and hypothesis
testing. Data analysis phase consist of statistical analysis of the data and interpretation of results.
Data analysis and interpretation can be done with the help of computers. For data analysis,
software’s available. These software help in using the techniques for analysis like average,
percentage, correlation and all the mathematical calculations.

Software’s used for data analysis are SPSS, STATA, SYSAT etc. Computers are useful not only
for statistical analysis, but also to monitor the accuracy and completeness of the data as they are
collected. This software’s also display the results in graphical chart or graph form.

Computers are used in interpretation also. They can check the accuracy and authenticity of data.
It helps is drafting tables by which a researcher can interpret the results easily. These tables give
a clear proof of the interpretation made by researcher.

Role of Computer in Research Publication

After interpretation, computer helps is converting the results into a research article or report which
can be published. This phase consists of preparation of the report or presentation of the results,
i.e., formal write-up of conclusions reached. This is the research publication phase. The research
article, research paper, research thesis or research dissertation is typed in word processing
software and converted to portable data format (PDF) and stored and/or published in the world
wide web. Online sites are available through we can convert our word file into any format like
html, pdf etc.

Various online applications are also available for this purpose. Even one can prepare our
document using online word processing software and can store/edit/access it from anywhere using
internet.

References and computer:

After completing the word document, a researcher need to give source of the literature studied
and discussed in references. Computers also help in preparing references. References can be
written in different styles. All the details of author’s journals, publication volume Books can be
filled in the options “reference‟ given in computer and it automatically change the information
into the required style. Software used to manage the references.

A researcher needs not to worry about remembering all the articles from where literature in
taken, it can be easily managed with the help of computers.

20 | P a g e
Simulation:

Simulation is the imitation of the operation of a real-world process or system


over time. Simulation is used in many contexts, such as simulation of technology for performance
optimization, safety
engineering, testing, training, education, and videogames. Often, computer experiments are used
to study simulation models. Simulation can be used to show the eventual real effects of alternative
conditions and courses of action. Simulation is mainly used when the real system cannot be
engaged, because it may not be accessible, or it may be dangerous or unacceptable to engage, or
it is being designed but not yet built, or it may simply not exist. Using computers the simulation
in research carried out in various fields.

Role of Computers in Scientific Research:

There are various computer applications used in scientific research. Some of the most important
applications used in scientific research are data storage, data analysis, scientific simulations,
instrumentation control and knowledge sharing.

Data Storage

Experimentation is the basis of scientific research. Scientific experiment in any of the natural
sciences generates a lot of data that needs to be stored and analyzed to derive important
conclusions, to validate or disprove hypotheses. Computers attached with experiential
apparatuses, directly record data as its generated and subject it to analysis through specially
designed software. Data storage is possible in SPSS data file, lotus spreadsheet, excel spreadsheet,
DOS text file etc.

Data Analysis

Analyzing huge number of statistical data is made possible using specially designed algorithms
that are implemented by computers. This makes the extremely time-consuming job of data
analysis to be matter of a few minutes. In genetic engineering, computers have made the
sequencing of the entire human genome possible. Data got from different sources can be stored
and accessed via computer networks set up in research labs, which makes collaboration simpler.

Scientific Simulations

One of the prime uses of computers in pure science and engineering projects is the running of
simulations. A simulation is a mathematical modelling of a problem and a virtual study of its
possible solutions.

For example, astrophysicists carry out structure formation simulations, which are aimed at
studying how large-scale structures like galaxies are formed. Space missions to the Moon, satellite
launches and interplanetary missions are first simulated on computers to determine the best path
that can be taken by the launch vehicle and spacecraft to reach its destination safely.

Instrumentation Control

Most advanced scientific instruments come with their own on-board computer, which can be
programmed to execute various functions. For example, the Hubble Space Craft has its own on-
board computer system which is remotely programmed to probe the deep space. Instrumentation
control is one of the most important applications of computers.

21 | P a g e
Knowledge Sharing through Internet

In the form of Internet, computers have provided an entirely new way to share knowledge. Today,
anyone can access the latest research papers that are made available for free on websites. Sharing
of knowledge and collaboration through the Internet has made international cooperation on
scientific projects possible.

Through various kinds of analytical software programs, computers are contributing to scientific
Research in every discipline, ranging from biology to astrophysics, discovering new patterns and
providing novel insights.

When the work in neural network based artificial intelligence advances and computers are granted
with the ability to learn and think for them, future advances in technology and research will be
even more rapid.

Tools and Applications Used In the Research Process Statistical Analysis Tool: SPSS

SPSS is the most popular tool for statisticians. SPSS stands for Statistical Package for Social
Sciences.

It provides all analysis facilities like following and many more.

 Provides Data view & variable view


 Measures of central tendency & dispersion
 Statistical inference
 Correlation & Regression analysis
 Analysis of variance
 Non parametric test
 Hypothesis tests: T-test, chi-square, z-test, ANOVA, Bipartite variable….
 Multivariate data analysis
 Frequency distribution
 Data exposition by using various graphs like line, scatter, bar, ogive, histogram,
 Pie chart…

Data Analysis Tool:

Spreadsheet Packages

A spreadsheet is a computer application that simulates a paper worksheet. It displays multiple


cells that together make up a grid consisting of rows and columns, each cell containing ethereal
alphanumeric text or numeric values. Microsoft Excel is popular spreadsheet software. Others
spreadsheet packages are Lotus 1-2-3Quattro Pro, Javeline Plus, Multiplan, VisiCalc, Supercalc,
Plan Perfect etc.

Other Statistical Tool

SAS, S-Plus, LISREL, Eviews etc.

Word Processor Packages

22 | P a g e
A word processor (more formally known as document preparation system) is a computer
application used for the production (including composition, editing, formatting, and possibly
printing) of any sort of printable material.

The word processing packages are Microsoft Word, WordStar, Word perfect, Amipro etc.

Presentation Software

A presentation program is a computer software package used to display information, normally in


the form of a slide show. It typically includes three major functions: an editor that allows text
inserted and formatted a method for inserting and manipulating graphic images and a slideshow
system to display the content. The presentation packages are Microsoft Power point, Lotus
Freelance Graphics, Corel Presentations, Apple keynote etc.

Database Management Packages (DBMS)

Database is an organized collection of information. A DBMS is a software designed to manage a


database. Various Desktop Databases are Microsoft Access, Paradox, Dbase or DbaseIII+,
FoxBase, Foxpro/ Visual Foxpro, FileMaker Procommercial Database Servers that supports
multiuser are Oracle, Ms-SQL Server, Sybase, Ingres, Informix, DB2 UDB (IBM), Unify,
Integral, etc.

Open source Database packages are MySQL, PostgreSQL, and Firebird etc.

Browsers A web browser is a software application which enables a user to display and interact
with text, images, videos, music, games and other information typically located on a Web page at
a website on the World Wide Web or a local area network.

Examples are Microsoft Internet explorer, Mozilla Firefox, Opera, Netscape navigator, Chrome.

Advantages of Using Computers for Research


1. Easy and quick access to information
2. Access of information from anywhere on the globe
3. More research contacts sources can be reached.
4. Downloads can be done for later and offline viewing
5. Easy and cheaper to send and receive information
6. More information can be carried around unlike using hardcopy research work

Challenges With Online Rrsearch


1. Cyber bullying, hacking and malware are big challenges
2. Promote plagiarism and piracy is on the increase
3. Network and electricity availability may become a challenge in research
4. Children tend to be overtaken by culture exchange events
5. Organization time and resources are being abused by researchers.

23 | P a g e
Health Problems Caused by use of Computers
Technology has become an inseparable part of our lives and has become a necessity in almost every
field of work. It makes our lives easier in some ways and maybe even less expensive, but it can be rather
frustrating too. If your occupation require you to spend an extended amount of time in front of the
computer say over 4 hours a day, you could be at an increased risk of developing certain health problems
including the following:

1. Musculoskeletal Problems
 This includes areas of your body such as your back, neck, chest, arms, shoulders and feet.
 Having sore muscles and complaints of the muscles being tired are common.
 Numbness may occur in the arms and hands.
 These troubles may occur because the posture you assume when using the computer is most likely
incorrect.
 You may find that you are sitting in an uncomfortable chair, or that you have a workstation that is
not ergonomically correct for your body.
 Carpal tunnel syndrome CTS is a stress-related injury caused by repetitive movement of joints,
especially the wrist, and can lead to numerous musculoskeletal problems. It has become very
common among Computer professionals due to poorly placed computer components and extensive
typing over a long period of time.

Tips to Consider
 Find a correct height for both your desk and chair so that your computer screen is at eye level or
slightly lower.
 Sit with your back straight, legs at 90 degree angles to the floor, and feet resting flat on the floor.
 ALWAYS take small breaks from your computer work to stretch your muscles, keep your blood
flowing, and to rest your eyes.

2. Vision Problems
 Computers are notorious for their bright lights, glare and flickering images that can cause strain
on your eyes. In many cases, frequent computer users develop computer vision syndrome,
which is a degenerative eye problem which can result in severely reduced eyesight (Myopia),
blurred vision, overall eye tiredness and even Glaucoma. Video screens have a design process for
user interface. Video screens can cause eyestrain from prolonged viewing. Cathode ray tubes are
what are used to display the information on your computer. These send-off radiation. This is a
concern that has been taken into account when designing better computer screens for user
interface

 Finding that you constantly focusing on the screen with delays in blinking can result in drying out
your eyes.
24 | P a g e
Tips to Consider
 Make sure to adjust the brightness on your computer screen so that your eyes are not as strained. For
example, if you are sitting in a dark room your computer screen will most likely be very bright and
cause your eyes to strain, so to save your eyes you should lower the brightness.
 Tilt your screen to decrease any glare.
 Maintain a proper vision distance from the screen, and do not forget to blink.

3. Repetitive Stress Injuries


 You may notice pain in your neck, shoulders, or really anywhere from the shoulders to your fingers
related to repetitive muscle use.
 Using the computer may cause you to use your muscles in an odd way that may cause increased
stiffness, pain, or swelling in any of those areas.
 One of the most common conditions related to repetitive use of your muscles when using the computer
is carpal tunnel syndrome.

Tips to Consider
 Place your mouse at a location next to the keyboard that will require you to move your whole arm to
get to it rather than just twisting your wrist outward to reach it and move it.
 Type gentle to decrease the stress put on each of your fingers.
 Keep your wrists flexible when typing; avoid keeping them fixed in a certain position; keeping them
flexible will avoid repetitive, strenuous stress.
 Relax your arms and try to get a few stretches in when you are not typing or using your mouse.

4. Headaches
 Headaches are common and may occur because of the increased muscle tension or from pain in the
neck.
 Any vision problems, or continued strain on the eyes can also cause headaches.

Tips to Consider
 Attend regular eye exams in order to work toward correcting any vision problems.
 Try your best to keep your neck straight in front of the computer and take breaks.

5. Obesity
 Prolonged use of computers may lead to an overall sedentary lifestyle that lacks adequate physical
activity and/or exercise.
 In children prolonged use of computers, or electronics in general, is a major contributing factor to
obesity.

Tips to Consider
 Set limits for your children when they are using electronics.
 Encourage outdoor play or a certain hobby that may take away time spent using electronics in order to
lead a more active lifestyle.
 As for adults, if your occupation requires computer use for up to 8 hours daily, you should not use a
computer again when you get home…you should take a break and try to squeeze in some exercise
until you go back to work.

6. Stress Disorders
 Technology impacts our behaviors and emotions.
 Prolonged use of computers may be accompanied by poor health and increased pressure placed on you
in your workplace environment, which could both lead to stress.

25 | P a g e
 The longer your stress occurs and is left untreated, the greater your chances are of contracting more
serious health problems.
 Stress can lead to decreased attention span, lack of concentration, dizziness and becoming easily
burned out.
 Excessive use of electronic screen media can have ill effects on mental health related to cognition, and
behavior—and may even result in psychosis in the form of hallucination. She calls this "Electronic
Screen Syndrome" (ESS). She claims the root of these symptoms appears to be linked to repeated
stress on the nervous system, making self-regulation and stress management less efficient.

Tips to Consider
 Promote your own health and prevent future health conditions or worsening the ones you already have
by seeking treatment options for any stress that you may encounter.
 Try things from yoga, to natural remedies, to medications as prescribed by a medical provider to
combat your stress.

7. Laptop Use Injuries


 Laptop injuries fall into a category of their own; there is a growing use of laptops that continues to
cause more pain and strain among those individuals who use them.
 Laptops are designed for short periods of use for those who do not have access to desktop computer.
 In present day individuals choose to use laptops over desktops more frequently, due to convenience.
 The problem is this: the screen and keyboard are very close together and there is really no right way to
use a laptop because if you position the screen at the right height for your back and neck, it will cause
you to have to lift your arms and shoulders too high to use it and vice versa…no matter what it will
probably cause a problem for you somewhere.

Tips to Consider
 Use a desktop computer that is set up ergonomically-correct for you as frequently as possible; only use
a laptop intermittently.
 Use separate laptop equipment, such as a wireless mouse or keyboard or a laptop stand.
 As always, take frequent breaks.
 If you have to take your laptop with you, make sure to carry it in a backpack or luggage; otherwise it
may cause extra strain on your muscles from carrying it.

8. Sleeping Problems
 Artificial lighting that is given off from computer screens can actually trick your brain and suppress its
release of melatonin – the substance that assists your sleeping patterns.

Tips to Consider
 Refrain from using a computer right before going to bed.
 Resort to reading a book or something to that degree prior to going to bed, so falling asleep may come
more easily for you.

9. Hearing Loss from Headphones


 At times you may be required to use headphones in order to better concentrate on something or maybe
because the background noise level is too high.
 Frequently individuals will turn the volume up very high, when actually it would not even need to be
close to that volume to hear the audio effectively.
 Listening to audio with headphones on a consistent basis and using a volume that is too high can result
in hearing impairment.

Tips to Consider

26 | P a g e
 Keep the volume of your headphones down to a tolerable level, one that blocks out any extra noise
but that is just loud enough for you to hear.
 Listening to your headphones at approximately 80 decibels is recommended; if you are unaware of
what that sound level is it can easily be researched.

10. Increased Risk of Blood Clots


 Being immobile and not allowing your blood a chance to get moving around your extremities may
cause it to pool, creating build-up of blood cells that will eventually clot (or stick together) due to not
being able to be circulated around.
 Blood clots can be life-threatening if they break away from where they are lodged and travel to
another area, such as your lungs.
 Sitting in one position for too long (especially if your legs are crossed), generally over a period of
over 4 hours, can greatly increase your risk for this.

Tips to Consider
 Avoid crossing your legs when using a computer for an extended period of time.
 Take many breaks and stretch your legs to get the blood flowing to decrease the chance of it pooling
in your extremities.
 If you do have to sit for an extended period, make sure to bend and move your extremities even
while sitting because any little bit will help.

27 | P a g e
Security and Ethics (Unhu/Ubuntu/Vumunhu)
COMPUTER ETHICS

Ethics is a set of moral principles that govern the behavior of a society, group or individual.
Computer ethics is set of moral principles that regulate the use of computers.
Some common issues of computer ethics include intellectual property rights, privacy concerns, and how
computers affect society. Computers should be used without damaging or violating the moral values and
beliefs of any individual, society or organization. Computer ethical principles includes methods and
procedures to avoid infringing copyrights, trademarks and the unauthorized distribution of digital content.
Computer ethics also entails the behavior and approach of a human operator, workplace ethics and
compliance with the ethical standards that surround computer use.

TYPES OF COMPUTER ETHICS


Computer ethics are divided into three types:
* The ethics of using computers between the person and the same.
* The ethics of using computers between the person and the other.
* Ethics between the user and device.

The Ten Commandments of computer ethics

1. Do not use the computer in ways that may harm other people.
Explanation: It include physical injury physical injury, harming or corrupting other users' data or files, it
is wrong to use a computer to steal someone's personal information, Manipulating or destroying files,
writing programs which on execution lead to stealing, copying or gaining unauthorized access to other
users' data, being involved in practices like hacking, spamming, phishing or cyber bullying does not
conform to computer ethics.

2. Do not use computer technology to cause interference in other users' work.


Explanation: Computer software can be used in ways that disturb other users or disrupt their work.
Viruses and malware for example, are programs meant to harm useful computer programs or interfere with
the normal functioning of a computer.
3. Do not spy on another person's computer data.
Explanation: it is wrong to read someone else's email messages or files. Obtaining data from another
person's private files is nothing less than breaking into someone's room and this is invasion of privacy.
4. Do not use computer technology to steal information.
Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is
wrong to acquire personal information of employees from an employee database or patient history from a

28 | P a g e
hospital database or client record in a bank etc., such information that is meant to be confidential. Illegal
electronic transfer of funds is a type of fraud.
5. Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has become viral today, because of the Internet. This also means that
false news or rumors can spread speedily through social networking sites or emails. Being involved in the
circulation of incorrect information is unethical. Direct or indirect involvement in the circulation of false
information is ethically wrong. Giving wrong information can hurt other parties or organizations that are
affected by that particular theme.

6. Refrain from copying software or buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the
original work of the individual who created it. It is copyrighted in his/her name. In case of a developer
writing software for the organization she works for, the organization holds the copyright for it. Copyright
holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is
unethical and also encourages others to make copies illegally.

7. Do not use someone else's computer resources unless authorized to.


Explanation: Multi-user systems have user specific passwords. Breaking into some other user's password,
thus intruding his/her private space is unethical. It is not ethical to hack passwords for gaining
unauthorized access to a password-protected computer system. Accessing data that you are not authorized
to access or gaining access to another user's computer without her permission is not ethical.

8. Simply put: It is wrong to claim ownership on a work which is the output of someone else's intellect.
Explanation: Programs developed by a software developer are her property. If he is working with an
organization, they are the organization's property. Copying them and propagating them in one's own name
is unethical. This applies to any creative work, program or design. Establishing ownership on a work
which is not yours is ethically wrong.

9. Before developing a software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader perspective
of looking at technology. A computer software on release, reaches millions. Software like video games and
animations or educational software can have a social impact on their users. When working on animation
films or designing video games, for example, it is the programmer's responsibility to understand his target
audience/users and the effect it may have on them. For example, a computer game for kids should not have
content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A
software developer/development firm should consider the influence their code can have on the society at
large.
10. In using computers for communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we follow in the real world applies to communication over
computers as well. While communicating over the Internet, one should treat others with respect. One
should not intrude others' private space, use abusive language, make false statements or pass irresponsible
remarks about others. One should also be considerate with a novice computer user.

THE DATA PROTECTION ACT (1984)


This tries to regularize the use of automatically processed individual information by organizations.
The Act outlines some of the following rules:

29 | P a g e
Organizations using personal data must be registered. Data about individuals must be obtained fairly
and lawfully for the purpose collected for. Data must be used only for the specific purpose collected
for and may only be disclosed in accordance with such a purpose. Data collected must not be
excessive for the purpose collected for but must be adequate and relevant. Data collected must be
accurate, up-to-date and kept no longer than necessary. Data must be protected from unauthorized
access or loss. Individuals with collected data have the right to view it and make alterations where
necessary.

PRIVACY
Data privacy, or Information privacy or data protection is the privacy of personal information and
usually relates to personal data stored on computer systems.
The need to maintain information privacy is applicable to collected personal information, such as
medical records, financial data, criminal records, political records, business related information or
website data. There are laws that govern and regulate the extent to which personal data may be
used.
The following organizations are the most common sources of violation of personal data.

 Healthcare records
 Criminal justice investigations and proceedings
 Financial institutions and transactions
 Biological traits, such as genetic material
 Residence and geographic records
 Web surfing behavior or user preferences using persistent cookies
 Academic institution
 Recreational site
 Employee institutions

While organization data may be violated by employees, customers and hackers.

COMPUTER SECURITY
In the computer industry, the term security or the phrase computer security refers to techniques for
ensuring that data stored in a computer cannot be read or compromised by any individuals without
authorization. It is basically is the protection of computer systems and information from harm, theft, and
unauthorized use. It is the process of preventing and detecting unauthorized use of your computer system.
Computer security ensures that a business's data and computer systems are safe from breaches and
unauthorized access. Computer security is important because it makes sure that your information and
data are safe. Computer security therefore deals with the protection of
(a) The computer itself and its accessories
(b) Computer data or information
(c) Computer software

In a broad sense, System security is


the protection of information and information systems against unauthorized
access or modification of information,
whether in storage, processing, or transit, and against denial of service to authorized users. System securit
y includesthose measures necessary to detect, document, and counter such threats. The process makes
sure computer software and information is confidential, available, and assuring its integrity.
30 | P a g e
Computer security is mainly concerned with three main areas:
1) Confidentiality - ensuring that information is available only to the intended audience

2) Integrity - protecting information from being modified by unauthorized parties

3) Availability - protecting information from being modified by unauthorized parties

SECURITY & DATA INTEGRITY THREATS

The range of means by which the security and integrity of computing resources can be threatened is very
broad, and encompasses:

 Operator error (for example a user inadvertently deleting the wrong file).
 Hardware or media failure (either as a result of wear-and-tear, old age or accidental damage).
 Theft or sabotage (of hardware and/or data or its media).
 Hackers (who obtain unauthorized access to online accounts or other systems).
 Malware (any form of virus, including ransomware).
 Power surges and/or outages (which are one of the most common means of hard disk corruption
and hardware damage).
 Flood, fire, storm or other natural disasters.
 Fraud or embezzlement.
 Industrial espionage.
 Terrorism

Data security is done or ensured by using various ways such as


1. Data validation
2. Using password to open a database file
3. Using access limits to data in the database
4. Database encryption
5. Designing Read-Write permission to records or files.
6. Training users
7. Providing documentation and user help desk.
8. Securing the computer from physical and malware
9. Backing up data regular

Computer security can therefore be classed as physical security and data or software security
PHYSICAL SECURITY
The following are threats that can cause computer or information loss or damage
1. Storms
2. Burglars (thief)
3. Dust
4. Heat
5. Fire
6. Electrical faults
7. Accidental loss

31 | P a g e
How to protect a computer from physical damage
(a) Storms:
 build false floors,
 keep backup,
 Build computer labs in upper rooms.
 Cover your computers
 Use storm detectors and early warning systems
(b) Burglars:
 Install burglars bars in computer rooms
 Install alarms
 Install CCTV
 Install electronic security doors
 Lock the computer room
 Hire a security guard
 Lock computers onto desks
 Use biometric doors
(c) Dust:
 Use computer covers
 Do not open windows
 Take computer for servicing (blowing off dust)
(d) Heat:
 Use air conditioners
 Provide free air circulation near a computer.
(e) Fire:
 Keep a fire extinguisher
 Use smoke detectors and early warning systems

(f) Electrical faults:


 use surge protectors
 remove all naked wires
 use correct connections (avoid short cuts)
 Do not overload a socket or an adapter.
(g) Accidental loss:
 Keep a backup
 Do not move around with easily lost devices
 Secure memory stick with a neck string.

OTHER PHYSICAL SECURITY MEASURES

1. Make sure the most vulnerable devices are in that locked room
2. Use rack mount servers
3. Keep intruders from opening the case
4. Protect the portables
5. Disable the drives
6. Protect your printers
DATA /SOFTWARE LOSS OR DAMAGE
Threats to data and software examples are

32 | P a g e
1. Virus or malicious software
2. Accidental loss
3. Hackers
4. Sniffing
5. Software piracy
6. etc.

SOLUTIONS TO DATA AND SOFTWARE THREATS


1. Use two-factor authentication
2. Use Strong Passwords
3. Use Cloud Encryption
4. Use a Strong Firewall
5. Do Not Allow Users to Bring Jailbroken Devices to the Office
6. Have Ad-blocker Installed
8. Update your Software
9. Secure your Mobile Devices
10. Monitor Your Network
11. Prevent the installation or execution of unauthorized software or content.
12. Don’t let non-admin users be logged in as administrators or root.
13. Secure your e-mail. Convert all incoming HTML content to plain text and block all file extensions by
default, except the handful or two you want to allow.
14. Implement anti-virus, anti-spam, and anti-spyware tools on the gateway and/or at the host-level.
15. Scan for and investigate unexpected listening TCP or UDP ports on your network.
17. Automate security. If you don’t automate it, you won’t do it consistently.
18. Educate staff and employees about security risks and create appropriate policies and procedures.
Practice change and configuration management. Enforce penalties for non-compliance.

19. Remove or disable accounts upon loss of eligibility: Separate user and administrator accounts:
20. Administrator accounts must not be used for non-administrative purposes.
21. Use unique passwords for administrator accounts: Throttle repeated unsuccessful login-attempts:
22. A maximum rate for unsuccessful login attempts must be enforced. Account lockout is not required,
but the rate of unsuccessful logins must be limited.
23. Enable session timeout: Sessions must be locked or closed after some reasonable period.
24. Enforce least privilege: Non-administrative accounts must be used whenever possible. User accounts
and server processes must be granted the least-possible level of privilege that allows them to perform
their function.
25. Enable system logging and auditing: The facilities required to automatically generate, retain, and
expire system logs must be enabled.
26. Access control: Access to confidential data must be provided on a least-privilege basis. No person or
system should be given access to the data unless required by business process. In such cases where
access is required, permission to use the data must be granted by the data steward.
27. For data loss, use data recovery tools such as RECUVA and many others
28. Also create a recovery plan

CYBERCRIME
Computer Crime or cybercrime is the use of a computer to take or alter data, or to gain unlawful use
of computers or services. Computer crime is an act performed by a knowledgeable computer
user, sometimes referred to as a hacker that illegally browses or steals a company's or individuals

33 | P a g e
private information. In some cases, this person or group of individuals may be malicious and
destroy or otherwise corrupt the computer or data files.

Categories of Cyber Crime


Cybercrimes are broadly categorized into three categories, namely crime against
1. Individual
2. Property
3. Government

Individual: This type of cybercrime can be in the form of cyber stalking, distributing pornography,
trafficking and “grooming”.
Property: In the cyber world criminals resort to stealing and robbing using computers. In this case,
they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous
purchases online; run a scam to get naïve people to part with their hard earned money; use malicious
software to gain access to an organization’s website or disrupt the systems of the organization.
Government: Crimes against a government are referred to as cyber terrorism. If successful, this
category can wreak havoc and cause panic amongst the civilian population. In this category, criminals
hack government websites, military websites or circulate propaganda. The perpetrators can be
terrorist outfits or unfriendly governments of other nations.
Types of Cybercrime Acts

1. Hacking: Hacking is gaining illegal or unauthorized access by breaking into a file, computer
or network to access information.
2. Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software.
3. Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails.
4. Identity Theft: In this cybercrime, a criminal accesses data about a person’s bank account,
credit cards, Social Security, debit card and other sensitive information to siphon money or to
buy things online in the victim’s name. It can result in major financial losses for the victim and
even spoil the victim’s credit history.
5. Malicious Software: These are Internet-based software or programs that are used to disrupt
a network. The software is used to gain access to a system to steal sensitive information or
data or causing damage to software present in the system.
6. Child soliciting and Abuse: This is also a type of cybercrime wherein criminals solicit
minors via chat rooms for the purpose of child pornography.
7. Online Identity theft
Identity theft and fraud is one of the most common types of cybercrime. The term Identity
Theft is used, when a person purports to be some other person, with a view to creating a
fraud for financial gains.

8. Ransomware
This is one of the detestable malware-based attacks. Ransomware enters your computer
network and encrypts your files using public-key encryption, and unlike other malware this
encryption key remains on the hacker’s server. Attacked users are then asked to pay huge
ransoms to receive this private key.

34 | P a g e
9. Spam
Spamming and phishing are two very common forms of cybercrimes. There is not much you
can do to control them. Spam is basically unwanted emails and messages sent onto an online
computer.

10. Phishing is a method where cyber criminals offer a bait so that you take it and give out the
information they want. The bait can be in form of a business proposal, announcement of a
lottery to which you never subscribed, and anything that promises you money for nothing
or a small favor. There are online loans companies too, making claims that you can get
insecure loans irrespective of your location. Doing business with such claims, you are sure
to suffer both financially and mentally.

11. Social Engineering


Social engineering is a method where the cyber criminals make a direct contact with you
using emails or phones – mostly the latter. They try to gain your confidence and once they
succeed at it, they get the information they need. This information can be about you, your
money, your company where you work or anything that can be of interest to the cyber
criminals. It is easy to find out basic information about people from the Internet. Using this
information as the base, the cyber criminals try to befriend you and once they succeed, they
will disappear, leaving you prone to different financial injuries directly and indirectly.

12. Malvertising
Malvertising is a method whereby users download malicious code by simply clicking at
some advertisement on any website that is infected. In most cases, the websites are innocent.
It is the cyber criminals who insert malicious advertisements on the websites without the
knowledge of the latter.

13. PUPs
PUPs, commonly known as Potentially Unwanted Programs are less harmful but more
annoying malware. It installs unwanted software in your system including search agents and
toolbars. They include spyware, adware, as well as dialers. Bitcoin miner was one of the
most commonly noticed PUPs in 2013.

14. Scams
For making a quick profit, to cheat or swindle. Notable among Internet scams are, scams
which misuse the Microsoft name and other general tech support scams. Scammers phone
computer users randomly and offer to fix their computer for a fee. Every single day,
scores of innocent people are trapped by scam artists into Online Tech Support Scams
and forced to shell out hundreds of dollars for non-existent computer problems. Eg Click
Fraud: Repeated clicking on an advert to either increase a site's revenue or to use up a
competitors advertising budget.

15. Pharming: False websites that fish for personal and financial information by planting
false URLs in Domain Name Users.
16. Fraud A wide-ranging term for theft and fraud committed using a credit card or any
similar payment mechanism as a fraudulent source of funds in a transaction. Also the
manipulation of computer records for personal gain or credit. Salami slicing a form of
fraud which is committed by the practice of stealing money repeatedly in extremely small
quantities

35 | P a g e
17. Forgery
The process of making, adapting, or imitating objects, statistics, or documents, with the
intent to deceive. Digital Forgery: New technologies are used to create fake checks,
passports, visas, birth certificates with little skill or investments.

18. Intellectual property theft, including software piracy.

19. Industrial espionage - access to or theft of computer materials.

20. Spoofing, is a cybercrime. It is a fraudulent or malicious practice in which


communication is sent from an unknown source disguised as a source known to the
receiver. Spoofing is most prevalent in communication mechanisms that lack a high level
of security.
21. Sniffing is a cybercrime which uses illegal data interception technologies. A Sniffer is a
program that monitor or read all network traffic passing in and out over a network. It is
also called eavesdropping.

Ways to Prevent Computer Crime


1. Restrict Access To Computers
An obvious way to prevent computer crime is to properly restrict access to all terminals on a
network or on a single computer in the home of office. Make sure access to the computer is only
possible with a secret password to avoid physical intrusion on the home terminal or office terminal.
Do not leave the computer on and connected to the Internet when it is not in use.
2. Install antivirus programs on your computers
Viruses may break the immunity of your computers, making them vulnerable to external attacks. It
is advisable to install latest antivirus programs on your computers and to keep them regularly
updated.
3. Install firewalls
a firewall is a software or hardware that disallows information from making its way into the
network without authorization. The firewall will block out any data that has not been intentionally
permitted by the network administrator.

4. Upgrade your Operating System


Latest versions are always equipped with the most potent protection against cyber-attacks.
5. Install intrusion detection
a good intrusion detection tool will notify you immediately your system is breached. After
installing it, make it mandatory for each employee to monitor his or her systems with for signs of
intrusion
6. Back-up your information regularly
the safety of your business is more guaranteed if you regularly back up your information. You
should back up your files, data, and other resources that are the backbones of your business.
You can always turn to the backed up files in case of data loss through the invasion.
7. Restrict Access to Sensitive Information

36 | P a g e
Restrict access to all the sensitive information about yourself or your business. You can do so by
using strong passwords as well as user access levels in the case of database information.
8. Hire a Security Expert
His job is to routinely check your systems for potential risks and prevent them. As a business
expands in its operations, it creates greater loopholes for access. In case of intrusion, an expert, will
use his expertise to mitigate the damages.
9. Use separate machines
To have totally separate and isolated machines for external access and separate isolated machines
for internal communications. When a secure computer and a computer for external access are in the
same building, communications between them should be via memory sticks or Cds and not via wire
or cable or otherwise.

10. Disabling Features in Microsoft Windows that makes my computer vulnerable to attacks.

Security Measures Every Organization Must Consider

1. Data Classification
In order to protect your critical assets, you need to know exactly where they are. Data classification
software will automatically scan your repositories, both on premise and cloud-based, and classify
sensitive data as it is found. Some solutions allow you to select a pre-defined classification
taxonomy, which allows you to classify certain types of data.

2. Strict Access Controls


Given that privileged account misuse is one of the leading causes of data breaches, it is imperative
that you restrict access to critical systems, accounts, and data, in accordance with the Principal of
Least Privilege (PoLP). In other words, users should only be granted access to the assets they need to
perform their role, and access should be revoked when it is no longer required.

3. Monitoring Privileged Account Access


You must ensure that you carefully monitor all access to privileged accounts, and receive real-time
alerts when they are accessed in a way that is deemed suspicious. Examples of suspicious events
include;
 A user accessing a privileged account outside of office hours;
 A user accessing an inactive or shared user account;
 A user accessing the network from an unrecognized location or device;
 A user accessing data they don’t normally access;
 A user repeatedly enters the wrong credentials to access their account.

4. Encrypting Sensitive Data


All sensitive data should be encrypted, both at rest and in transit. The use of encryption is one of the
simplest and most effective ways of preventing unauthorized access to sensitive data, yet it is still
one of the most overlooked.

5. Security Awareness training

37 | P a g e
Since a large number of security incidents are caused by negligent insiders, security awareness
training is crucially important. Employees must understand the importance of good password
hygiene and must be trained to identify suspicious email/SMS messages, as well as phone calls. They
will need to check for email messages that are sent from public email domains, messages with poor
spelling and grammar, and messages that create a sense of urgency. Employees should never
download attachments from unknown senders or click on links to untrusted websites.

6. Network Segregation and Segmentation


Network segregation is where critical networks are isolated from public access, whereas network
segmentation is where a network is divided into smaller sub-networks. Both network segregation and
segmentation play an important role in establishing a zero-trust architecture, which assumes that all
users are potentially malicious, and should thus verify their identity anytime they need access to
critical resources.

7. Cloud Security
Cloud security is a broad term that involves a wide range of security measures, ranging from
implementing robust access controls to encrypting sensitive data, and carefully reviewing all security
settings and agreements associated with your cloud service provider. You must ensure that your
chosen security solutions are able to discover, classify and monitor all sensitive data stored in the
cloud.

8. Application Security
It is common for web applications to contain vulnerabilities, hence why we need to install
updates/patches. Broken access control methods, cryptographic failures, and security
misconfiguration are among some of the vulnerabilities that exist in modern applications. One of the
most common types of application security threats is insecure web forms, which will expose the
application to SQL injection attacks. If the application developer fails to properly sanitize the web
form inputs, attackers can inject code into them that queries the underlying database. In some cases,
the attacker is able to extract large amounts of valuable data using this approach.

9. Patch Management
All systems and applications must be patched in a timely manner. If your company uses lots of
proprietary software, it’s generally a good idea to use an automated patch management solution to
ensure that you don’t miss anything.

10. Physical Security


While not as relevant as it once was, it is still crucially important that your server rooms and
workstations are properly secured using locks, alarms, ID badges, CCTV cameras, and any other
methods that will prevent unauthorized access.

11. Disaster Recovery Planning

Both individuals and in particular businesses should have plans in place to cover the eventuality of
hardware failure or loss and/or data loss or corruption. Such disaster recovery or "business
continuity" plans need to address how data would be recovered, what hardware would be used to run
critical applications, and by whom. Such plans particularly need to take into account any current use
of out-of-date software applications that may not be able to be replaced and/or run on replacement
hardware and operating systems. To recover back-ups of data that cannot be run on any available
hardware and software will not in any way ensure business continuity!
38 | P a g e
Depending on the types of threat they are intended to cover, disaster recovery plans may rely on one
of a mix of strategies (and a mix is arguably often best). One option is on-site standby, where
duplicate systems exist that can be used to run critical operations (provided that data is still available
or can be recovered). The need arises.

As an alternative to on-site standby, some sort of off-site standby is very common. If a company has
multiple buildings or premises, then it makes sense both to hold off-site back-ups across these
locations, and to ensure that key system functionality can be duplicated across sites.

Some businesses also have "reciprocal agreements" with other companies to make use of their
computers to run key operations in the event of a disaster (such as a fire that destroys their premises).

As a final element of disaster recovery planning, replacement purchase plans should be in place. In
the event of fire or theft, the last thing most individual users or companies would want to be thinking
about is where to purchase new computer equipment from, and what specification to choose.
How can you secure your computer from hackers?

1. Use a firewall to secure your computers from hackers.


Windows and macOS have built-in firewalls — software designed to create a barrier between your
information and the outside world. Firewalls prevent unauthorized access to your business network
and alert you to intrusion attempts.
Ensure the firewall is enabled before going online. You can also purchase a hardware firewall from
companies like Cisco, Sophos or Fortinet, depending on your broadband router, which also has a
built-in firewall that protects your network. If you have a larger business, you can purchase an
additional business networking firewall.

2. Install antivirus software to thwart hackers.


Antivirus software is a small business cybersecurity necessity. Computer viruses and malware are
everywhere. Antivirus programs like Bitdefender, Panda Free Antivirus, Malwarebytes, and Avast
protect your computer against unauthorized code or software that may threaten your operating
system. Viruses may have easy-to-spot effects — for example, they might slow your computer or
delete critical files — or be less conspicuous. Antivirus software plays a major role in protecting
your system by detecting real-time threats to ensure your data is safe. Some advanced antivirus
programs provide automatic updates, further protecting your machine from the new viruses that
emerge daily. After installing an antivirus program, don’t forget to use it. Run or schedule regular
virus scans to keep your computer virus-free.

3. Install an antispyware package to protect your business.


Spyware is software that secretly monitors and collects personal or organizational information. It’s
hard to detect and remove and usually delivers unwanted ads or search results intended to direct you
to specific (often malicious) websites. Some spyware records every keystroke to gain access to
passwords and other financial information. Antispyware concentrates exclusively on this threat but is
often included in major antivirus packages, including Webroot, McAfee, and Norton. Antispyware
packages provide real-time protection by scanning all incoming information and blocking threats.

4. Use complex passwords to prevent network intrusions.


Using strong passwords is a crucial way to prevent network intrusions. The more secure your
passwords are, the harder it is for hackers to invade your system. Secure passwords are usually
longer and more complex. Use a password with at least eight characters and a combination of
numbers, uppercase and lowercase letters, and computer symbols. Hackers have an arsenal of tools

39 | P a g e
to break short, easy passwords in minutes. Don’t use recognizable words or combinations
representing birthdays or other information hackers can connect to you. Don’t reuse passwords,
either. If you have too many passwords to remember, consider using a password manager, such as
Dashlane, Sticky Password, LastPass, or Password Boss.

5. Keep your OS, apps and browser updated.


Always install operating system updates. Most updates include security fixes that prevent hackers
from accessing and exploiting your data. The same goes for apps. Today’s web browsers are
increasingly sophisticated, especially regarding privacy and security. Review your browser security
settings in addition to installing all new updates. For example, you can use your browser to prevent
websites from tracking your movements, which increases your online privacy. You can also use a
private browsing mode or install a browser specifically focused on security, like DuckDuckGo or
Epic Privacy Browser.

6. Ignore spam to stop hackers from infiltrating your system.


Beware of email messages from unknown parties, and never click on links or open attachments that
accompany them. Inbox spam filters have become good at catching the most conspicuous spam. But
more sophisticated phishing emails that mimic your friends, associates and trusted businesses (like
your bank) have become common, so keep your eyes open for anything that looks or sounds
suspicious.

7. Back up your computer to rebuild if necessary.


If your business is not already backing up its hard drive, begin immediately. Backing up your
information is critical if hackers successfully get through and trash your system. Always ensure you
can rebuild as quickly as possible after suffering any data breach or loss. Backup utilities built into
macOS (Time Machine) and Windows (File History) are good places to start. An external backup
hard drive can also provide enough space for these utilities to operate properly. Additionally, backing
up to Google’s cloud backup system is seamless and straightforward.

7. Shut machines down to become a less visible hacker target.


Many businesses, especially those operating a web server, are “all systems go” all the time.
However, if you’re not operating a complex internet-based company, switch off your machine
overnight or during long stretches when not working. When it’s always on, your computer is a
more visible and available hacker target. Shutting down breaks the connection a hacker may have
established with your network and disrupts any possible mischief.

9. Use virtualization to protect your network.


Not everyone needs to take this route. However, if you visit sketchy websites, expect to be
bombarded with spyware and viruses. While the best way to avoid browser-derived intrusions is to
steer clear of unsafe sites, virtualization allows you to run your browser in a virtual environment, like
Parallels or VMware Fusion that sidesteps your operating system to keep it safer.

10. Secure your network to hold intruders at bay.


Routers don’t usually come with the highest security settings enabled. When you set up your
network, log in to the router and choose a password using a secure, encrypted setup. This prevents
intruders from infiltrating your network and messing with your settings.

40 | P a g e
11. Use two-factor authentication as an additional defense layer.
Passwords are the first line of defines against computer hackers. However, a second layer boosts
protection. Many sites let you enable two-factor authentication, which boosts security because it requires
you to type in a numerical code — sent to your phone or email address — in addition to your password
when logging in.

12. Use encryption to hide information from hackers.


Even if cybercriminals gain access to your network and files, computer encryption can prevent them
from accessing that information. You can encrypt your Windows or macOS hard drive with
BitLocker (Windows) or FileVault (Mac), encrypt USB flash drives with sensitive information,
and use a VPN to encrypt web traffic. Additionally, only shop at encrypted websites; you can spot
them immediately by the “https” in the address bar accompanied by a closed-padlock icon.

How can you secure your phone from hackers?

The rest of our tips will address securing mobile devices from hackers, which requires unique
security measures. Consider the following mobile device management tips.

13. Turn off Bluetooth to protect your mobile device.


When you’re not using Bluetooth, turn it off. Keeping your Bluetooth on but dormant opens another
back door for computer hackers.

14. Don’t use unsecured public Wi-Fi.


Unsecured Wi-Fi is a severe cybersecurity risk when traveling for business or working away from
the office. Password-free, widely used Wi-Fi networks have no security features. As such, they’re
prime targets for computer hackers.

15. Download a security app on your phone or mobile device.


Install a security app on your phone, just as you should install a firewall, antivirus software, and an
antispyware package on your computer. Popular options include Avast and Bitdefender.

16. Use a better passcode to protect your phone.


Unlock codes like 0000 and 1234 are easy to remember, but they’re also easy to guess. Instead, opt
for a randomly generated six-number passcode.

17. Switch off autocomplete on your mobile device.


Autocomplete is the feature that guesses what you’re typing and completes the word, phrase or other
information for you. While convenient, this tool all but hands your email address, mailing address,
phone number, and other important information to hackers. Switch it off.

18. Clear your browsing history on your mobile device.


Your mobile web browser has a browsing history just as your computer does. Clear it often —
including cookies and cached files — to give hackers as little information as possible to work with if
they do break into your phone.

41 | P a g e
TYPES OF COMPUTERS
TYPES OF COMPUTERS
Computers can be classified according size, processing power or use. There are four major
types of computers namely: PCs or microcomputers, Mini computers, Mainframe computers
and Super computers.
1. Microcomputers or PC (Personal computers)
These are all small computers and those that can be used by one user at a time. They are further
classified as Desktop computers and Portable or Mobile computers.

(a) Palmtops are portable computers that can be used while being held on the palms. Palmtops
are a type of microcomputers. Most have a touch sensitive screen. Examples include smart-
phones, PDA, iPads, calculators, tablets and wearables-such as smart watches.

(b) Laptops: are portable computers that can be used whilst on the laps, table or desk. They are
also a type of microcomputers. Examples include Net books and Notebooks. They’re battery
powered and have fixed keyboards and touch pads.

42 | P a g e
Advantages Of Laptops Disadvantages OF Laptops
Portable, can be more powerful than Relatively expensive, need frequent
desktops, can be used instantly, low upgrades, easily stolen, health hazard
power usage. (Repetitive strain injury (RSI) and eye
strain.

(c) Desktops: these are computers that can only be usable if placed on a desk or table. They are
also a type of microcomputer larger and heavier than palm tops and laptops. Desktops
usually comprise of a separate keyboard, mouse, System unit, printer, and other peripherals.
They are commonly used in offices, homes, schools, banks, for security, in weather stations
and small business applications.
Advantages Of Desktops Disadvantages OF Laptops
Cheaper than laptops, have a longer life span Not portable, use lot of desk space, not
compared to portables, better option for battery powered and too much cabling.
gaming apps, more secure than portables.
Advantages of Microcomputers Disadvantages of Microcomputers
-Most of them are portable and handy -Some are portable and some are not.
-relatively cheap and easy to work with -smaller capacity compared to mini,
-they are general purpose machines mainframe and supercomputers
-can process small to huge amounts of data -easily stolen.
-some operate on battery and can be used in areas -some have limited use
where there is no electricity.

2. Minicomputers/Midrange computers

Minicomputer or midrange computer: Is a multiprocessing computer that is smaller, less


expensive, and less powerful than a mainframe or supercomputer, but more expensive and
more powerful than a personal computer. Can support up to about 200 users at the same
time. Minicomputers are used for scientific and engineering computations, business-
transaction processing, file handling, and database management, and are often now referred
to as small or midsize servers, used by small and midsized companies.

Advantages of Minicomputers Disadvantages of Minicomputers


-more powerful than micros -less powerful than mainframe
-huge storage -more expensive than microcomputer
-fast in processing than microcomputers -not suitable for personal use

3. Mainframes

43 | P a g e
Mainframes acquired their name because of their size, typically as large as a six-foot-tall closet.
They also required specialized heating, ventilation and cooling, as well as a dedicated power
supply. In practice, this meant a separate room had to be dedicated to house the mainframe
computer systems. They are used by institutions to serve multiple users from personal
computers used by individuals. Mainframe computers are capable of handling and processing
very large amounts of data very quickly - much more data than a typical individual needs to
work with on his or her own computer.

Uses of Mainframe Computers


-can be used in big business networks, for educational designs, for scientific experiments on
global warming, for storage of global data in various areas such as weather forecast, for
earthquake and tsunami warnings, for airlines networks, supermarkets networks, government
Departments networks, car manufacturer networks, internet storage servers, transaction
processing, storage of census information, etc.

Advantages of Mainframes Disadvantages of Mainframes


-more powerful than micros and minis. -less powerful than supercomputer
-huge storage -most expensive to buy, operate and maintain
-fast in processing than microcomputers than microcomputer and minicomputers.
-can process huge amount of data. -not suitable for personal use
-can connect so many computers and so many -require special room well ventilated by air
networks. cons
-have time sharing capacity -produce a lot of heat
-can deal with complex mathematical business

4. Super computers

The most powerful and fastest type of computer. A supercomputer is a type of computer that is very
expensive and has massive computing power. They are used for specialized applications that
require immense amounts of mathematical calculations. They run a small number of programs at a
time thus making them fast. They can process billions or trillions of calculations or computations
per second. Their sizes can vary; they can be as small as microcomputers or as big as mainframes
They can be used for weather forecasting, for scientific and engineering applications,
animated graphics, fluid dynamic calculations, nuclear energy research, and petroleum exploration.
They are also use for scientific work such as testing bombs and modeling of aircrafts and climate
predictions.
44 | P a g e
The chief difference between a supercomputer and a mainframe is that a supercomputer channels
all its power into executing a few programs as fast as possible, whereas a mainframe uses its power
to execute many programs concurrently.

Advantages of Supercomputers Disadvantages of Supercomputers


-fastest of all -most expensive
-sizes differ -may be bigger than mainframes
-they are specialized

5. OTHER CLASSIFICATION/ TYPES OF COMPUTERS


(a) GENERAL PURPOSE COMPUTERS
-All types of computers that can perform many tasks on the same machine, like playing games,
music, word-processing, calculation, graphics, etc. -an example is a desktop and laptop.
(b) SPECIAL PURPOSE COMPUTERS
Computers designed to perform only one job or task, e.g. monitors patients in a hospital, Disk
washer, and digital cameras.
(c) EMBEDED COMPUTERS or DEDICATED COMPUTERS
-These are non-computer equipment that uses microprocessors.
-they are also called automated machines
-they are dedicated computers

Examples of embedded computers


Washing machines, cameras, microwave cookers, refrigerators, video recorders, sewing machines,
air cons, toys, rice cooker, dish washing machine, TV, alarms, clocks, radios, DVD players, etc.
(d) HYBRID COMPUTERS
A computer capable of performing digital and analogue operation on the same device.
E.g. flight simulator and an intelligent robot and also a modem
They are common in Science and engineering applications, Airplane design and flight
simulators and in military uses such as anti-aircraft and gun aiming.
(e) ANALOGUE COMPUTERS
Computers that handle data of a continuous form. They work with the aid of sensors. E.g.
analogue watches (those with arms)
-They process data in form of electrical voltages and hydraulic pressures.
-They are similar in operation to measuring devices and thus measure variable
magnitudes.
-Output from analog computers is often in form of smooth graphs from which
information can be read
E.g. Temperature readers, voltage, sunshine, car and wind speed, sound, light etc.
-analogue computers are mostly used in research and engineering institutions

(f) DIGITAL COMPUTERS

45 | P a g e
-a computer that represent data in bits e.g. digital watches. Computers that handle data of
a discrete values, i.e. digital data. Zeros and ones.
-Are the most common types of computers which store, process and represent data in
discrete values of 1s and 0s.
-They also use the value 1 to mean ON and 0 to mean OFF
-Each number, letter or special symbol is represented as series of various combinations of
1s and 0s.
-used to store record and manipulate files
-examples are Digital watch, desktops, laptops,
-Digital computers are used in business, schools, hospitals and homes

COMPUTER HARDWARE
These are the physical mechanical or tangible components of a computer. From the diagram
above, examples are printer, System unit, speaker etc. Computer hardware is classified as
(a) input hardware
(b) and the Processor
(c) output hardware
(d) storage hardware
(e) communication or network hardware

ELEMENTS OF A COMPUTER

INPUT-A stage or process by which data is entered into the computer using a variety of methods.
E.g. using the keyboard to type a letter, using a scanner to input a picture, writing on the computer
screen using a stylus pen. Etc.
PROCESS- A stage when input data is transformed from one state into another. E.g. calculated,
sorted, compared, formatted, etc. for example sound data captured though a microphone can be
processed and stored as an mp3 audio file.
STORAGE
-When data or information is stored into the computer for future use. Each individual piece of
information is stored under a unique name in a unique folder. A received email can be stored for
future use. Download notes from the internet can be kept in the computer.
OUTPUT
-This is the result of processing presented as hardcopy or softcopy.

46 | P a g e
Hardcopy is tangible output such as on paper while softcopy is information displayed on a screen.
CONTROL
-This an ongoing process where a computer (itself) coordinates the general activities of the whole
computer’s internal or external processes. E.g. handling computer interrupts, handling computer
errors, managing two or more programs running on the same computer, fetching data and executing
the instructions as to how the data should be correctly processed etc.

INPUT DEVICES
These are Devices that receive data or instructions from sources outside the computer (CPU). OR -
A category of hardware that is used to enter data into the computer.
-some input devices are for Direct entry devices such as the keyboard and mouse while other input
devices are Automatic data entry devices such as Optical mark readers, bar code readers,
biometric devices, Optical mark readers, smart cards etc.
-all input devices whatever the size or name, get raw data or instructions to the computer for
processing.
EXAMPLES OF INPUT DEVICES
-keyboard, mouse, scanners, joystick, touch pads, document readers, web camera, digital camera,
microphone, sensors, data loggers , Touch sensitive screens, stylus, light pen, magnetic stripe
reader, chip and pin readers, smart card readers. Signature pads, eye pattern detection system, finger
print detection systems etc.

1. Mouse
-A mouse is a pointing input device that is used to input data or instructions by clicking on items on
the screen. A mouse is a pointing input device that rolls on a flat surface to control a pointer on the
screen.

USES OF A MOUSE
Opening, closing and minimizing software and
document windows.
-moving, deleting or grouping items
-useful when editing images.
-clicking and dragging item during movement or
copying and pasting
-position the cursor when typing
-scrolling up and down or left and right a document
-selecting options from a menu or from a set of
icons.
Mice are used on desktop computers and can also
be connected to a laptop as an alternative to the
laptop touch pad.

47 | P a g e
-optical mouse detects movement using a special light (infrared beam) instead of ball.
- A mouse can have a scroll button (wheel) which speeds up the process of moving through a
displayed document.
-some mice are codeless
-most mice take up a shape like a real mouse (creature)
-another special mouse is called a tracker ball
Advantages of mice Disadvantages of mice
-optical mice do not pick up dirty easily. -old mouse types get dirty easily.
-faster than the keyboard -people with disability of hands cannot use a
-allows rapid navigation through folders and mouse
applications -They quickly get damaged
-small and take up little desk space. -they are difficult to use if there is no flat
surface

2. KEYBOARD
-a device used to enter data or instruction into the computer mostly by typing.
TYPES OF KEYBORDS

1. QWERTY KEYBOARD.
Or standard keyboard spell
QWERTY on the first line of
letters hence are called QWERTY
keyboards.

2. CONCEPT KEYBOARDS
Are special and specific purpose input devices.
-they are intelligent input devices containing
their own chips to process instructions.
-each key has its ASCII equivalent. -uses icons
and phrases instead of letters.
-they are not common keyboard because they
are not standardized.
-they are used in fast food restaurants, offices,
shops, bars and cinemas where single key
represent an item. E.g. a key labeled TAX may -numeric keypad may be common in retail
result in the computer calculating tax once like supermarkets and ATMs As well As Chip
pressed and Pin Machines including EPOS.
-used when working with spreadsheets

48 | P a g e
3. ERGONOMICS KEYBOARD
Have shapes and design that help
reduce health related problems such
as Carpal tunnel problem and RSI
(repetitive strain injury.)
-most have funny shapes.

-ergonomic keyboards allow hands to be


comfortably placed on keyboard.

4. BRAILLE KEYBOARDS
-are used for visually
impaired people. Its letters
can be felt by the finger
because they are embossed
on the keyboard surface.

Advantages of a keyboard Disadvantages of a keyboard


-always available as a standard input device -different lay require users to study them
-well tried technology and a well-known data before use.
entry method. -difficult to use at first.
-easy to use once mastered -causes repetitive strain injury (a health
-data can be verified before processing as it problem)
appears on the screen. -slow when entering large amounts of data.
-concept keyboard are fast to use than stand -typing mistakes are common with keyboards.
keyboards. -those with arm problems find it difficult to
-concept keyboard are usually waterproof use.
-there are special concept keyboards designed -keyboard entry is slow to beginners and when
for young children. compared to other devices such as the mouse.
-concept keyboard are available for -take more desk space than the mouse.
handicapped people such as fingerless, or -concepts keyboard are limited to specific
single fingered hands. applications.
-most familiar input device. -Key arrangements make typing difficult.
-standard keyboard gets dirt easily

3. SCANNERS
A scanner is an optical input device that reads a pattern of printed bars that appear on products.
TYPES of scanners
4. BARCODE READERS
-a barcode reader an optical input device used to enter product identification code made of printed
thick and thin bars into the computer
-a bar code is a product identification code made of printed thick and thin bars.

49 | P a g e
Fixed Bar code
reader

-This is not meant to


be moved around

Information shown on supermarket products differs with the country or system used one being the
European Article system. This shows information such as product
1. Country of origin (country code)
2. Manufacturers number (company code)
3. Product number or code
-After the above information is read from the product bar code, the computer then looks up for
more information from a computer database such as
-name of product
-the price
-etc.
A latest development in bar code scanning called 360 scanner is capable of scanning a product bar
code 360 degrees so whichever way the product is placed on the reader a reading will be taken. This
is a faster way of scanning.
Application Areas of Bar Code Readers
-often built-in POS terminals in supermarkets or shops
-library check out points
-they are used for automatic stock entry
--used in luggage handling systems at air ports, sea port or in warehouses s
-used to read bar codes on shop products, videos, books, food, etc.

Advantages of a bar code reader


-When used to input data, they Improve data safety
-it is a tried and tested technology that can be trusted.
-when an item price is changed, only the central database needs to be changed.
-if the bar code reader fails to read, data (numbers below the bar code) can be entered manually.
-accurate
-customers can be saved quickly.

Disadvantages of a bar code reader


-an expensive system to install.
-staff training is expensive
-workers can swap bar codes on supermarket items thus undercharging or overcharging (or
misinform the computer)

6. HAND HELD SCANNERS OR WANDS


Similar to bar code readers except that they are hand held.
-used in supermarkets
-suitable for small sized and big immovable products
-advantages and disadvantages are similar to those of the bar code reader.

50 | P a g e
Hand held scanner

Hand held scanner for bar codes or


QR codes. QR (Quick Response)
codes. QR codes are used to take a
piece of information from a
transitory media and put it into a
computer.

7. DOCUMENT SCANNERS/READERS
-these are types of scanners that read written documents, text or images.

TYPES ARE
Flatbed scanner

Flatbed scanner

A scanner that provides a flat,


glass surface to hold a sheet of
paper, book or other object for
scanning. It is a document
reader.

-it is a document reader. It is flipped up and then an image is placed on a glass surface. The user
closes the lid before scanning a document.
-the scan head moves across the image to scan it.
-most common in supermarkets, department stores and educational institutions as well as in photo
processing shops

MICR (Magnetic Ink Character Recognition/Reader)


MICR is an input device for reading special characters written in magnetic ink found at the bottom
of a bank cheque.

MICR
(Magnetic Ink Character Reader)

On the cheque the following information


is read
1. Cheque number
2. Branch code/number
3. Account number

51 | P a g e
Magnetic ink characters are numbered characters (of a special shape or font) that we find at the
bottom of a cheque.
-these characters contain iron particles that make it easy to read cheque data.
-these numbers represent special information about the cheque.
These are automatic data entry devices used in banks for clearing cheques.

OCR (Optical character reader)


-is the identification of printed or written text characters by a computer.
-a light sensitive input device that detects typed or handwritten characters and convert them into a
machine readable and editable form.
The characters are optical in the sense that both human and computers can see them.

OCR
(Optical character reader)
Optical Character Recognition is a
technology that enables you to convert
different types of documents, such as
scanned paper documents, PDF files or
images captured by a digital camera into
editable and searchable data.

A printed document or handwritten document is taken to an OCR. The OCR scans it as an image
then using special software; each individual text character is recognized as then together is stored in
the computer as a word processing document.

-used to scan financial documents such as company accounts, directly into a spreadsheet.
--used to scan text directly into a word processor
.-used in insurance companies
-used in billing systems (gas, electricity, water and telephone bills forms)
-Processing of bank GIRO- forms
-used on tablets or PDA where a tablet/PDA can accept handwritten data from a stylus pen and
convert it into different document formats for future use.
-used in some passport application forms
-used in car monitoring systems in conjunction with CCTV. CCTV captures car registration number
and print it, then OCR captures printed number for registration and insurance verification

OMR (optical mark reader/recognition)


OMR is an optical input device that automatically reads paper based characters (i.e. Text or marks
manually written in pen or pencil.) Into the computer.
-the technique is also called MARK SENSING. (Mark sensor- for the device)
- The optical mark reader detects pen or pencil marks upon the form or paper and relays this
information to the computer for storage.
-users prepare documents with pen or pencil on paper and then taken them to an OMR for
automatic input to the computer.
- OMR use is application based. That means not all computer systems use OMR technology.

52 | P a g e
OMR
(Optical mark reader)
-a document scanner. Optical Mark
reading (OMR) is a method of entering
data into a computer system. Optical
Mark Readers reads pencil or pen marks
made in pre-defined positions on paper
forms as responses to questions or tick list
prompts

APPLICATION AREAS of OMR


-used to read questionnaire responses.
-widely used to read and mark multiple choice examinations
-used for reading election voting forms responses
-lottery tickets use OMR technology
-attendance registers in schools can be designed for OMR
-some enrolment and registration systems use OMR technique
-used in systems where results of processing are needed quickly.
-used for football pools coupons

7. BIOMETRIC SCANNER
-A pattern recognition system which makes a personal identification based on person’s unique
physical characteristics
Biometric scanner

Used to capture unique features


of the human body.

VARIATIONS
-face recognition biometric
scanner
-finger print matching USES
-iris and retinal scanner -users come and talk into, touch looks etc. into the scanner
-voice recognition system as a way of inputting data.
-Hand geometry -can be used in mobile phone
-desktop and laptop computers
-smart cards
-can be used to control entry to buildings
-can be used to replace keys in a car
Advantages of biometrics
-no need to remember or carry personal identification
-a good security measure
-the person has to be present thus theft and fraud is reduced.
Disadvantages of biometrics
-not yet sufficiently accurate, paper documents still necessary
-computers are prone to error.

Advantages of all types of scanners Disadvantages of all types of scanners


-it takes long to digitize long documents
53 | P a g e
-scanned document can be saved in different -the quality of scanned document might be
document formats compromised due to scanner resolution.
-paper copies can be stored electronically
where there is no wear and tear.
-images can be stores for editing at a later date
-they are faster and more accurate than typing
again
-it is possible to recover damaged images by
scanning them and then use appropriate
software to produce an acceptable copy

8. Touch Pads or track pads. Or touch sensitive pad.


A touch pad is a pointing input device used on laptop. A small flat, square finger or stylus moving
surface found below the spacebar on laptops.

-users move a finger across a touch


surface and in so doing the movement in
translated into pointer movement on the
screen
--track pad include two or three buttons
under the pad that are used the same way
as mouse buttons and these can also be
strike sensitive.
-to select users move a finger on the
touch pad and them tap using the finger
if a desired position is reached.

9. Joystick (Game controllers)


-an input device originally designed for playing computer games. They can be bought separately or
are found fixed on game pads.

-similar to a tracker ball I use. -The device consists of a stick located into a socket. Moving the
stick (lever) produces corresponding movements of an image or cursor on the screen in a similar
direction.
The joystick has one or more buttons to facilitate further input. - Those used for games are called
game controllers. Disabled people can use them.

-used on computers for


playing games
-used on TVs for playing
games
-used in ultrasound
scanners in hospitals
-can be used separately
on can be built-in on
game pads.
-used in aero planes by
fighter pilots
-used in car driving
simulators

54 | P a g e
10. WEBCAM

(Web camera) A digital video


camera designed to capture
motion pictures or still images
or photographs and transmit
then over the internet. - A
webcam is a type of video
camera
-it can also take still pictures
or photographs.

-used to input moving images from a fixed position


-webcam are used on laptops and notebooks where they are in-built.
-a webcam can be externally connected to a desktop.
-used on voice over internet protocol systems (video conversations over the internet where sound and
picture are found)
-used in video conferencing.
-used for virtual classrooms environments where student listens and view their teacher from the
comfort of their homes.
-used in e-commerce by advertising organizations
-used for checking children activities in nursery schools
-used in weather forecasting around the globe,
-used in traffic monitoring systems in roads
-used for on line charting e.g. on SKYPE

Advantages of web cameras


-can be installed at home or workplace as a security method to be vied over the internet at a distance.
-captured images can be stored for editing before transmission
-photographs and videos captured can viewed on a variety of internet based device e.g. smart phone
and TVs
-digital photos and images can be sent by e-mail
-captured data can be broadcast over internet, so that TV programs can be available on demand.
-Pictures and videos can be stored in a convertible format.
-can view data as it is or was at source.

-people can keep in contact with each other without need to travel.

Disadvantages of web cameras


-output is affected if there is not internet connection.
-the video output may have poor resolution.
-fixed position and usually can see one view
-need for a huge backing storage
-May slow down the internet during uploading -if large and bulky

11. DIGITAL CAMERA


55 | P a g e
-a digital camera is an input device that captures an image and stores it in a memory in a format
suitable for saving and displaying on a computer.
-an input device used to capture photogram’s and or films for entry into the computer where they
can be edited.
-they are used by both at home and for business
-they are used by photographers as a way of life
-They are used in adverting
-they are used by news agents or journalists
-Digital cameras can be connected to a computer or photo printer directly using a USB cable or
use a portable card or else using Infrared technology.
-mobile phone have digital camera too fixed on them.

ADVANTAGES of digital cameras


-they are hand held.
-images can be of high resolution
-most cameras accept additional memory
-moving images from camera to computer is easy
-a wide range of digital cameras are available.
-digital cameras are not very expensive
-users can edit the images in a number of ways
-uploading photographs to a computer is fast
-digital photo are cheap to develop than film based ones.
-it is easy to delete an image from card and memory
-the memory cards used can serve several hundreds of images.
-quicker to produce a photo even while you wait.
-no need to use chemicals in developing
-a number of images can be taken for later comparison
-images can be placed in documents such as spreadsheets or word.
-can use software to improve the image.
-digital cameras are portable.
-memory card readers are available in shops.

DISADVANTAGES of digital cameras


-once camera cards are on PC, they can be affected by virus.
-there is need for training to be able to use them effectively
- Films consume more camera memory.
-sense of original art is lost as computers can help edit a photo.
-Resolution varies from camera to camera.
-in real practice, memory easily gets full.
56 | P a g e
-some films used to produce had high quality image better than some digital cameras.
-computer skills are required to use a digital camera.
-special software is needed to edit a camera image

12. MICROPHONE
An analogue input device for voice or sound (audio) data only.
-used in presentations on a large gathering just for amplified output.
-used in studios in music applications, used in churches , used for setting up voice recognition
systems, used in video conferencing, used on mobile phones and PDA for speech input, used on
PC , used together with voice recognition systems, used in voice mail systems or messages
-used with MIDI systems (Musical instrument digital interface- i.e. hardware and software that
connects musical instruments to a computer), used in natural language processing systems, used
in cars, used in voice over internet protocol (VoIP) platforms.

ADVANATAGE of microphones DISADVANTAGES of microphones


-easy to set up -software has to be trained to understand
-promote hands free voice
-One can dictate letters and other documents -users needs to determine the distance of
directly into a word processor mouth from microphone otherwise input is
-can take part in telecommunication disturbed.
platforms -background noises can cause problems
-can add spoken words to a website, -prone to error
presentation or other multimedia products. -sound files when stored take up a lot of disk
-can be effectively used by disabled who space
cannot type -microphones easily get damaged if not
-some microphones are cheap to buy. properly handled.
-faster than typing -some with short circuits causes shock.

12. DATA LOGGERS


-a data logger is an automatic input device that collects and store information provided to it by
a sensor(s)
-Data logging is the automatic collection and storage of information provided by sensors at set
intervals.

57 | P a g e
USES OF DATA LOGGERS
Used in traffic control systems in roads, Data collection at weather stations, in a greenhouse
system, used in hospitals in intensive care units.
-Data loggers with permanent computer connections are suitable for science experiments in
schools.
-In pollution measurement system e.g. in rivers or dams
NB -data logging has many application and fields that cannot be exhausted in this column.

13. TOUCH SENSITIVE SCREENS

-a touch screen is an input device that can detect the presence and location of a touch to the
screen and also respond to the touch.
-touch screens respond to touch because they use sensors to detect the touch.
-the type of sensors used differs with the touch screen technology.
-the touch screen is a special type of an LCD

-used in kiosks, airports, railway stations, tourism offices etc. for public information, on
tablets/PDA, on smart phones, on finger prints detection systems e.g. at some ATMs at bank,
used in shops at POS terminals, used in fast foods restaurants and bars , used in department
stores and supermarkets, used as part of INTERACTIVE WHITE BOARDS (large wall
screens) for education, used in CBT for answering on-screen tests.

ADVANTAGES of touch sensitive screen DISADVANTAGES of touch sensitive


-simple to use ,can be used whilst standing or screens
in bed, Do not take up lot of useful space esp., -screens can get dirty, bacteria/germs can be
Smartphone easily spread when everyone touches the

58 | P a g e
-they are tamper proof, i.e. other data besides Same screen, they cost more than their
what it understands cannot be entered, they are alternative input devices
less dirty than keyboard and mice, they are -once screen is damaged, whole device stops
easy to clean, data and instruction entry is fast working, they have limited uses, lead to
strain of muscles i.e. RSI

14. SENSORS
-A sensor is an input device that detects an environmental condition and responds by outputting
a signal. It is used to detect physical quantities from the environment for input to the computer.
-a sensor is an input device that is used to detect an external change in an environment.
SOME TYPES OF SENSORS
TEMPERATURE SENSOR -used in central heating systems to measure temperature so that
computers can control it.-used in hospital intensive care units for body and room temp
measurements.-used at weather stations-control system of a furnace -automatic washing
machines
-Used to monitor/control in chemical processing -microwave ovens

PRESSURE SENSOR -Used on touch screens -used in traffic control systems e.g. counting
vehicles on the road -used in hydraulics systems -bugler alarm systems to detect intruders -
washing machines
-In robots -environmental monitoring systems

LIGHT SENSOR
Used in photo processing machines, street lights, home lighting systems, etc.

SOUND SENSOR
-they detect sound esp. of a specific pattern and thus they can be used in different setups.
-environmental heath office can use sound sensors to detect level of sound from the
neighborhood such as from bars, homes, etc. where music is being played. -Burglar alarm
systems, -monitoring liquids power flowing in pipes.

HUMIDITY /MOISTURE SENSOR


-Used to determine the amount of moisture in an environment (in air or soil). They are used in
Weather stations -greenhouse -environmental monitoring systems -factories where moisture
level is critical-manufacture of microchips -spray painting systems -used in dams and river
beds.

59 | P a g e
PROXIMITY SENSOR
The sensor has two parts. If the parts are moved away from each other, then a signal is output.
-also detects distance from objects. -installed in windows to report burglary by use of alarms.
-used in cars to warn driver of objects ahead or behind.

MERCURY TILT SWITCH


-if a device is moved or tilted, a blob of mercury in the switch touches it and completes a
circuit. -Used in pinball machines -used to trigger an alarm -used in vending machines.

POSTION SENSOR
-it detects an angle of turn, rotation /or spindle. -used in robot arms

PH sensor
-This Type of Sensor Is Usually submerged In Liquids, Soil or Solutions -Used to find out how
basic or acidic a solution is. -Greenhouses to monitor soil acidity -chemical processing plants, -
environmental monitoring. -used to measure acidity in rivers (pollution monitoring)

SOME OTHER TYPE OF SENSORS


-PIR motion detector
-shock and inertia sensor
-magnetic switch sensor
-panic button (PAB)
-rainfall detectors
-wind speed detectors
ADVANTAGES OF SENSORS DISADVANTAGES OF SENSORS
-they are continuous and reliable -sensors cannot interpret data
-they collect data that human being cannot -sensors detection of environmental data is
gather or present accurately very much restricted to a specific area.
-data recorded by sensor is presents into a
way that a computer can handle
-limit human labor e.g. travelling

15. STYLUS PEN (see touch sensitive screen)


A pen like input device that can be used on a screen to draw point and select as well as write as
if using a manual pen. A stylus pen is a development from a light pen.

To use it you hold the pen in your hand and write or draw on a special pad or directly onto the
screen.
-the pen can also be used as a pointing device and to select options on the screen
-they can be used to write documents as save them in a desired document format such as word
or pdf.
-they are modern pens that are used with LCD screens.
-the computer that used a stylus pen must have special software, a dictionary of terms

ADVANTAGES of touch sensitive DISADVANTAGES of touch sensitive


screens screens
They are used on signature pads, -on tablets -can be easily lost
and PDAs and -on some smart phones --can be uncomfortable as hand remains
-can be used to detect people handwriting firmly fixed to the pen for long

60 | P a g e
-faster to enter data in own handwriting as -sometimes there are problems of lag (delay)
people are used to manual pens already when drawing

16. LIGHT PEN


-an input device used for drawing or selecting images on a graphical display unit. -it can be
used to draw. It can be used to select options of commands.
-You hold the pen in your hand and write or draw on a special pad or directly onto the screen.
-the pen can also be used as a pointing device and to select options on the screen
-a light pen is a light sensitive input device which when placed onto the screen its pixels
position is detected and coded special monitoring software.
-the light pen contains a sensor.
-it has the same uses as that of a mouse.
-they were common with CRT screens and technology changed; they are very few in existence.
Nb. Can only be used to draw and also point and select.
-popular in CAD (computer aided design) systems and are also used on graphic tablets

ADVANTAGES of light pens DISADVANTAGES of light pens


-easier to use than a mouse or keyboard. -can be uncomfortable as hand remains
-produces more accurate lines when drawing firmly fixed to the pen for long
than a mouse. -can only be used with CRT type screen and
-they have greater accuracy in pointing than not LCD and TFT (Thin film transistor)
when using fingers. screens
-can be used where there is no space for -easily get lost
keyboard or mouse. -sometimes there are problems of lag (delay)
-easy to keep clean when drawing.
-portable -not very accurate in drawing.

16. MAGNETIC STRIPE READERS


-an input device that reads information from a stripe on the surface of a plastic. The stripe
contains data such as account number and expiry date.
-trips of magnetized material can be built into plastic cards for identification use purposes.
-The device reads a short length of magnetic tape stuck on the surface of a tag, card or
document. Tags with stripes identify the item they are attached to.
-the stripe is usually a black row at the back of the card.
-the card is passed through the reader when reading. (Swiping the card)

61 | P a g e
-examples of data is stored on the stripe can be account number, start date and expiry date and
bank/sort code, branch code, security number etc. of the card.

-some card systems allow users to write additional information on the stripe such as signatures.
-the card reader reads the magnetized data and converts them into digital symbols for the
computer to understand.

Also known as LOYALTY CARDS and are used in the following ways:

(a) Used as CREDIT CARD (like debit cards but these do not deduct money from issuing
organization immediately. The organization will makes payments at a later stage or date
after card has been used. E.g. VISA and MASTERCARD.

(b) used as bank cards

(c) used A phone Card

(d) Used as DEBIT CARD (they are issued by bank and can used in supermarkets for cash
withdraws or for purchases) users of the card must have a bank account from which the
money is withdrawn.

(e) used for Cash issuance at ATMs

(f) used as PREPAID CARDS


(Prepaid cards are like debit cards only that the owner does need to have a bank
account number when using them. Users can only use money stored on the card.)

(g) used as prepayment cards on internet use or DSTV decoders

(h) used on security doors to control access to building as

ELECTRRONIC KEY CARDS

(i) For registration systems


(j) Used in EFTPOS (electronic funds transfer point of sale) system
62 | P a g e
(k) used in travel systems such as trains and underground ticketing systems

17. SMART CARD READER


-is an input device used to read data on a loyalty card with a microprocessor chip embedded in
it. -a technology slowly replacing magnetic stripe card readers. -a smart card looks like a credit
card or debit card but they work differently. -smart cards have built in tiny microprocessor chip
that keeps track of a user’s transaction.

The processor chip is loaded with personal identification details such ads DOB, home address
and PIN hence can be used like a passport. -data on the chip can be updated and it stores more
user information than on strips. -it is also a swipe card. -the chip can also do some processing
in the card as well storing new information.

They are use -in banks -by government agencies for travelling -in libraries to read borrowers
number
-At filling stations -used as ID Cards -can be used as public passport passes -used with satellite
systems to decode program signals -they are used as driving licenses. -used to withdraws cash
at ATMs

18. CHIP AND PIN READERS


-is an input device used to read data on a loyalty card with a microprocessor chip embedded in
it and is mainly used in payment systems. -they are similar to smart card readers but are used at
EFTPOS
-they are a little bigger and like a calculator in shape.
NB. A smart card can be read by a smart card reader or chip and pin reader.

-the reader has a slot in which the card is slotted to be read. It is not swiped.
-a PIN is entered using a number keypad
-the reader has a small screen that displays instructions.
-usually data stored in the chip is encrypted.

-used by users inside the banks on a bank teller desk.


-mostly used in systems involving payments (restaurants, supermarkets, travel agents etc.
63 | P a g e
ADVANTAGES OF MAGNETIC STRIPE DISADVANTAGES OF MAGNETIC
CHIP AND PIN READERS AND SMART STRIPE CHIP AND PIN READERS AND
CARDS SMART CARDS
-cards are portable
-data on the card can be input directly to a -on registration systems, they can lead to
computer long queues
-reading is usually accurate. -data on the stripe can be affected by
-data entry is faster than keying electromagnetic radiation
-cards are not affected by oil, water or -data on cards can be copied and edited
moisture, so they are robust giving thieves an opportunity for fraud.
-the system promotes the development of a -cards are easily damaged and are easily lost
paperless society -there are times when reader fails to read
-cards holders do not have to move with cash -they are affected when computer network is
of hand. down usually in banking system
-avoids possible typing errors on manual entry -users cannot see information on the card
-not affected by water -hold small amount of data
-magnetic fields easily damage the stored
data.
-there are possibilities of duplication for
fraud.

19. GRAPHIC TABLET/GRAPHIC PAD


- This is a special screen sensitive pad (graphic board) that is used for graphics with a stylus
pen. It is used to draw or write using a stylus pen.
-A hardware device for input of freehand computer graphics into the computer using a stylus. It
is a separate pad that is connected to a computer.

-as the user draws or writes on the pad the drawing is directly entered into the computer and can
be stored in the computer.
-they are ideal for inputting free hand drawings.
-they can be used for retouching digital photographs
-items can be added to it by clicking on it with a stylus.
-They are used for inputting free hand drawing into the computer
-retouching digital photographs
-used in CAD systems

ADVANTAGES OF GRAPHIC TABLET/GRAPHIC PAD

64 | P a g e
-mostly used in countries like Japan and China were their alphabet is more of drawing than our
letters.
-more accurate to draw using stylus than using a mouse
-drawing icons and buttons are on the tablet and not on the screen, this leaves the screen for the
full display of the image

DISADVANTAGES OF GRAPHIC TABLET/GRAPHIC PAD


-specialist tablets are expensive.

20. REMOTE CONTROL


A remote control is an infrared device used to control other devices. The remote control has
two lights (LEDs) at the front where one is for signal and one is for the user to ensure that the
remote is working. These lights light when a key is pressed. -once a button is pressed, infrared
pulses (invisible to the human eye) are sent to the receiver for decoding and responding to the
signal.

-the transmitter of the pulse is usually a light emitting diode, at the front of the remote control.
The receiver is always on the front of the receiver and ones it receives a signal it sent it to a
processor for decoding and acting.
-the strength of the infrared varies, some close some a far.
-It is used on DVD readers, home-theaters systems, satellite receivers, HI-FI music systems,
multimedia projector, model cars, toys, garage doors

ADVANTAGES OF REMOTE DISADVANTAGES OF REMOTE CONTROL


CONTROL -require batteries to run
-less human movement to operate -inaccessible or hidden device can be operated.
a device -some devices cannot operate without the remote
-portable. control hand set
-batteries are cheap -once dropped they are damaged easily.

20. INTERACTIVE WHITEBOARDS/SMARTBOARDS

An interactive whiteboard is a large, interactive screen that connects a computer and a projector.
The projector projects the computer's desktop onto the screen of the interactive whiteboard. The user
can control the computer by using a special pen, finger or another tool to touch the screen of the
interactive whiteboard. Normally, interactive whiteboards are fixed on walls. However, there are
some mobile interactive whiteboards. Interactive whiteboards are used in many different places such
as in classrooms, in work groups and in training rooms for professional coaching. Interactive
whiteboards are the modern version of the traditional whiteboards used in schools.
65 | P a g e
The use of projectors comes with several pros and cons

Advantages Of Interactive Whiteboards Disadvantages Of Interactive Whiteboards


-Clear graphics -Expensive/high cost
-Interactivity for teachers and students -Require specific software
-Projection of computer images on a larger -Require extra training for teachers
screen for audience viewing -Touch sensitive board has limitations;
-Manipulation of computer functions while sometimes is not sensitive enough
standing (rather than from the computer) -Speakers are not loud enough sometimes
-Incorporation of video and images into -Eye sight damage due to glare or sunlight.
traditional teaching lessons -sometimes data is distorted.
-little children may not read at the top of
screen
-Teachers need proper training.

66 | P a g e
SYSTEM UNIT & the CPU
The system unit or casing has many parts. See diagram below.

COMPONENTS OF SYSTEM UNIT

Motherboard:-The motherboard is the main circuit board of microcomputer. It is also known as main
board or system board. The CPU is fixed on a motherboard.

67 | P a g e
CPU:-The Central Processing Unit, is the central electronic chip that processes data in the computer
according to given instruction. See further explanations below.

Memory:-Memory is the part of computer that temporarily store application documents, and system
operating information. (This will be described in the following chapters.)

Bus:-A bus is an electronic line that allows is and OS instructions and data to move from one place to
another.

Expansion Slot:-expansion slot appear on the motherboard. They are sockets into which adapters
(additional components) are connected.

Ports and connectors: -A port is connector located on the motherboard directly or through the system
casing.

Bays:-a bay is a space inside the computer case where a hard drive, floppy drive or CD- ROM drive sits.

Power supply:-A power supply changes normal house hold electricity into electricity that a computer
can use.

Sound components: - A sound card lets a computer play and record high quality sound.

THE CPU or PROCESSOR


The processor is commonly called the CPU or Central processing Unit.
-The CPU if found inside the system unit casing together with a number of other components.
-this is the brain or heart of the computer.
-data is transformed into information and this is called PROCESSING
-the CPU is the main part of the computer where data is processed and the entire system is coordinated.

68 | P a g e
-It is made up mainly of the ALU (Arithmetic logic unit, and the control unit (CU), however the
main memory also plays an important part.
-computer systems with more than one processor do multiprocessing. Dual Core means two processors,
Corei3 means 3 processors, and corei7 means 7 processors. The more the processors the faster the
computer.

The purpose of the CPU or processor is to


-organize and carry out (process) instructions that come from either the user or software.
-to control the sequence of instructions
-control other parts of the computer

Arithmetic Logic Unit Control Unit REGISTERS

-performs arithmetic - fetches instructions that Register is one of a small set of


(addition, multiplication etc.) specifies how data is to be data holding places that are
processed, part of a CPU. There are
-Performs logical operations -decodes the instructions various types
e.g. and execute them. of Registers those are used for
= equal to -coordinates and control various purposes. Some Mostly
<less than hardware operations. used Registers are
>greater than Accumulator (AC),
<=less than or equal to Data Register (DR),
Address Register (AR),

69 | P a g e
>= greater than or equal to Program Counter (PC),
<>not equal Memory
Data Register (MDR),
Index Register (IR), and
Memory Buffer Register
(MBR). Registers are used for
performing the various
operations.

COMPUTER OUTPUT
To view what the computer has processed for us we use what we call OUTPUT DEVICES. Visual
devices (including Visual Display Units [VDUs], screens, OR monitors) Hard copy devices
(including ink jet printer, laser printers, dot-matrix printers, and plotters), Sound devices AND
Computer controlled devices (including robots) These devices show us information in various
forms that is as softcopy, or hardcopy as well as sound or light. These output devices are actually
peripherals that receives data from a computer, usually for display, projection, or physical
reproduction. Below are the most common output devices.

1. MONITOR OR SCREEN OR VISUAL DISPLAY UNIT


Features of a monitor include monitor Size, Color, Resolution and Video Display Adapter
type.

Liquid Crystal Display Cathode Ray Tube Plasma Thin film


(LCD) Monitor (CRT) Monitor transistor (TFT)
screen

LCD SCREEN
 LCD screens are most often seen on portable or laptop computers
 Most are touch screens
 These are used in these applications because they are small and light.
 Also used where space is at the premium.

70 | P a g e
 The molecules this substances line up in such a way that the light behind the screens and
creates an image.
 Use in banks and Multinational companies

CRT MONITOR
 Creates the image on the screen through electronic beam
 This is same type that is use in Television
 It consists of one or more guns
 These guns generate red, green and blue (RGB) colors.
 Some allow light pen use
 Not tough sensitive

A Monitor is the most commonly used output device used to display results of processing.
Pictures on a monitor are formed with picture elements called PIXEL. Monitors may be
Monochrome that will display results in Black & White. Color Monitors are also available. They
display results in multi colors. The latest type monitor screen is the plasma type for TV sets.
Monitor produces soft copy output.

TFT (Thin Film Transistor) SCREENS


Used with newer desktops. Screen made of thousands of tiny pixels. Each pixel is made up of
three transistors RED, GREEN, BLUE. Image color is made up of the intensity of each of the
combination of colors.

ADVANTAGES OF TFT SCRENNS DISADVANTAGES OF TFT SCRENNS


-They are lighter than CRT -not easy to repair
-take up less desk space -Brightness may not be adequate in some
-consume less power circumstances
-less eye damage(less radiation) -resolution not suitable for professional
-do not produce lots of heat application
-there can be a mix up of colors.
-they are not touch screens

2. PRINTERS
 A printer prints character, symbols and graphics on paper.
 Printers are used to produce hard copy output.
 Print resolution is commonly measured in dots per inch (dpi)
 They have vast differences and are for different uses
 Two major categories or types of printers are:
Impact Printer and Non-Impact Printer

IMPACT PRINTER
-act like a typewriter
It prints characters or images by striking a print hammer or wheel against an inked ribbon.
Examples of impact printers include Dot matrix printer, Line printer, Daisy wheel Printer, chain
printer and drum printer.

NON IMPACT PRINTERS


 Prints characters and graphics on a piece of paper without striking the paper.
 These printers are faster than impact printers
 Examples are Inkjet printer, Laser printer and Thermal printer

71 | P a g e
Which category does each of the following printers fall?
Dot Matrix LaserJet Ink jet printers Braille printer
Printer printers

………………
……………… …………………
…………………

The Braille is mainly used by the blind. The most common printer types are the once given above
though the matrix printer is also finding its way out of the system.

The INK JET printer


It prints characters and graphics by spraying tiny drops of liquid ink on paper
The print head of an inkjet printer consists of nozzles
It has two cartridges black and color
These printers can produce quality text and graphics in both black and color
slower than laser printer but faster than dot matrix printer
They can print 1 to 6 pages per minute
Cheaper to purchase and expensive to run
Satisfactory in color
Ink smudges, ink is expensive, and ink does not last long.

The LASERJET printer


o Creates image on the paper by the laser beam
o Also called page printer because they print complete page at a time
o It contain toner
o Throws magnetic powder on paper in the form of microscopic dots
o Printer supplies last longer
o More reliable than dot-matric and inkjet
o No wet pages as with inkjet
o Lower maintenance cost
o Produce very high quality print

The THERMAL printer


 Is a printer that uses heat process to transfer colored dyes or inks to the paper
 Is the best color printers currently available but it is very expensive

3. Speaker

Multimedia desktop headphones


speakers

72 | P a g e
Speaker produces sound output. We can listen to recorded voices, sounds or music with the help of
speaker. Computer Speaker produces sound output with the help of sound card fixed on a computer
motherboard.

4. Plotter

Plotters are used to draw different designs of buildings or internal structure of machines. Mostly
Engineers and Architects use plotters. They are in different types, shapes and sizes. They use large
sized paper, produces high quality printouts, are slower and they are expensive to buy.

5. Multimedia Projector.

Multimedia projector is used to produce computer output on a big screen for larger audience or
viewers to see. These are used in meeting rooms or in classrooms, training rooms, lecture rooms,
advertising places. They can also project from a DVD player or TV.

ADVANTAGES OF A MULTIMEDIA ADVANTAGES OF A MULTIMEDIA


PROJECTOR PROJECTOR
-many people can view (shared screen) -image quality may get poor
-people need not to be very close -projector produces heat that requires cooling
-Makes explanations easier -projector has limited operating time
-a dark room is always needed.

1. CONTROL DEVICES

actuators motor buzzer lights heaters

73 | P a g e
An actuator is device for moving or controlling something, motors are used to rotate
machinery, e.g. house fans. A buzzer or beeper is an audio signaling device, typical uses of
buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse
click or keystroke. Light output light like security light or street light after certain input or certain
action. A heater converts electrical energy into heat.

7. Global Positioning System, GPS


Short for Global Positioning System, GPS is a network of satellites that helps users determines a
location of an object on Earth.

GPS is a system of 30 or more navigation satellites circling Earth. These satellites constantly send
out signals. A GPS receiver e.g. the one in your phone listens for these signals. Once the receiver
calculates its distance from four or more GPS satellites, it can figure out where an object is located.
So for a device to be located on the earth it should have a receiver.

GPS system. Is made up of three parts:


satellites, ground stations, and receivers. The
ground stations use radar system. Radar is a
detection system that uses radio waves to
determine the range, angle, or velocity of
objects. It can be used to detect aircraft, ships,
spacecraft, guided missiles, motor vehicles,
weather formations, and terrain.

74 | P a g e
COMPUTER STORAGE
COMPUTER STORAGE

IMPORTANT TERMS
(a) DVD DRIVE- used to read CD and DVD only. Some can also write
Both the CD and DVD i.e. DVD writer.

(b) CD DRIVE- used to read CD only. Some can also write the CD

(c) FLOPPY DRIVE- used to store and retrieve data from Floppy disks only.

(d) TAPE DRIVE- used to store and retrieve data from specific type
Of magnetic tape. Drive varies with type of tape used.

(e) VIRTUAL MEMORY


Temporal storage space on the disk, memory required by the
Computer to store programs bigger than RAM can contain.

(f) BUFFER
Temporal memory in the computer used in data spooling during
Input and output of information.

(g) PORT
A connection point onto a computer for a peripheral device.

(h) Storage- is a description of the process of keeping computer software, data or information.

(i) Storage media are parts of a computer that keep computer programs or data either temporary
or permanently. A collective name for disks, tapes and memory cards etc.

(j) storage devices


-the piece of device that is used to record or retrieve data from a storage media.

THE 2 types of computer storage are:


-primary storage, and
-secondary storage
75 | P a g e
PRIMARY STORAGE
Is also called immediate access memory or, Main memory or Core storage or Working memory or
Primary memory or internal memory. It is found inside the computer on a motherboard fixed on a
memory chip slotted onto the motherboard. Primary memory (main memory) is the group of chips
inside the computer that holds data temporary whilst processing takes place. This data is readily
available for computer use.

Primary memory is used in computers of all types, modern printers and some cameras. -It is used to
hold programs (operating system or control programs or application programs) that are waiting to
be processed.
-It is used to hold application programs that are currently being processed.
- It is used to hold data that is waiting processing
-used to hold input data during processing
-used to hold information immediately after it has been processed ready to be output.

-there are two types of primary storage namely RAM and ROM (Random access memory and
Read only memory)
-at the time of writing of this book some computers have a RAM capacity of 16 Gigabytes.

RAM (Random access memory.)


-data held in RAM is temporal. The contents of RAM disappear if computer is switched off hence
it is said to be volatile and is used to store user data operating software and application programs.
-RAM is used to hold data during processing
-holds operating system control programs during processing
-holds application programs during processing.

Types of RAM are


DYNAMIC RAM (DRAM) STATIC RAM (SRAM)
-memory contents slowly leaks from the -The contents of this memory do not change
storage cells and must be topped up (refreshed) as long as the computer has a constant power
constantly. supply.

ADVANDAGE O F RAM DISADVANTAGES OF RAM


-data is written and read at a very high speed. -it is volatile i.e. it loses contents when power
-computer has fast access to data in main is cut.
memory. -storage is limited.
-it can be updated (added) -older computers have too little storage
-RAM chips are locally available. capacity for RAM

76 | P a g e
ROM (Read only memory)
Read only memory). -holds data and programs that cannot be changed by the user. Information on a
ROM chip is called firmware. They are hard-wired onto the motherboard. When a computer is
switched on, the first programs to run on the computer comes from ROM.
-ROM is permanent, nonvolatile and is used for booting routines.

Types are PROM, EPROM, and EAPROM.


All forms of ROM are used to hold programs used to boot a computer IE (to load the O/S when a
computer is switched on. -Stores BOIS (basic input output system (information needed by the
computer at start up. -stores control programs needed by the computer. -stores translator programs.
-The ROM technology is used in the manufacture of CDs and DVDs. -ROM is a type of WORM
(write once Read many times) technology
PROM -Programmable read only memory. This memory allows the user to
program it, but once programmed it becomes permanent ROM.
-differs from normal ROM in that ROM comes programmed by the
manufacturer while PROM can be done by the user.
EPROM -Erasable programmable ROM. It is like PROM but its advantage is that it
(Electrically can be programmed over and over again using a special erasing and
Programmable Read programming device.
Only Memory) -the memory is first removed from the computer if there is need to erase
and reprogram it.
EEPROM or Electrically Erasable Programmable Read Only Memory
(EAPROM) Electrically Alterable Programmable Read Only Memory.
-just like EPROM, the difference is that the memory is not manually
removed from the computer. The processing is however done electrically
and it is slower to reprogramming EPROM electrically

ADVANDAGEs OF ROM DISADVANTAGES OF ROM


-memory is permanent (even when the -not easy to change (Nonvolatile)
computer is accidentally switched off, ROM -electronic errors can happen during erasure
is not affected) and this affects the process
-it is non-volatile

SECONDARY STORAGE

77 | P a g e
Is also known as backing storage, auxiliary storage, external storage, or permanent memory.
SECONDARY STORAGE -includes disks, tapes, memory sticks, memory cards, pen drives etc.
that are connected to the computer motherboard through ports or cables.

HARD DISK
-circular storage media made of a metal coated with a magnetized material
-there are two types i.e.
 fixed hard disks and
 External hard disks.
-data is stored randomly onto the surface.
-data is stored in-situ randomly onto the surface, i.e. that means in can be overwritten.
-There are several types and sizes of hard disks
-The common once are the Desktop and laptop hard disks, but we also have Mass storage HD
Media disk used for a variety of applications especially in broadcasting business.

(a) FIXED HARD DISK


(Fixed permanently in the computer) may contain multiple disks called a disk platter or disk pack.
This platter is actually a disk pack that can be changed. It gives the inseparable disks a cylindrical
shape and has read write heads in between disks and one drive spindle for all the disks in the middle
of the disks.
-the disk surface is made up of tracks, sections and inter-block gap separating the sectors.

Track. A circular data storage space on a disk.


Sector: a section of the disk made up of a number of tracks
Inter block gap- blank spaces that separate sectors on a disk
Cylinder- the same track number across all disks on a disk platter/pack.

78 | P a g e
-Fixed hard disk are used to store operating systems and application programs
-external disks can be used for backup
- External hard disks can be used to boot up computers that fail
-external hard disks are used to store data and programs that need to be transferred from one
computer to another.
-all the two types can be used to store user information.
-fixed hard disks are used in real time systems (e.g. robots, control systems and airline booking etc.
-fixed disks are also used as file servers for computers on a network or on internet.

(b) EXTERNAL HARD DISK


-A hard disk externally connected to a computer through a port (usually USB port). They vary in
sizes, capacities and manufactures. -they are portable hard disk that work the same way as fixed
hard disk.

They are connected to a computer via a USB port. -data is stored randomly onto the surface.
-mostly used for backing up data and software.
-they are used to transfer files from one computer to another
-can be used to store personal information.

(c.) OPTICAL DRIVES


All types of CD and DVD are called optical devices. They use laser technology to read or write
data from/to the disk.
WORM devices: A section of types of CD and DVD that are Written Once Read Many times.

(i) CD (COMPACT DISK)


-a flat portable circular optical storage media
-it is a type of WORM device (write once read many) times
-also called CD ROM

79 | P a g e
CDs Store data as a series of (optical pattern called) bumps using laser beam technology. They are
read only memory devices.
-can store up to 700MB
-differs with DVD in that their surfaces are lighter in appearance and have a smaller capacity
-Again a CD drive cannot read a DVD while a DVD drive can read both the CD and DVD.
-data is stored randomly onto the surface.

There are two types of CDs namely


CD-R and CD-WR

1. CD-R (Compact disk recordable)


-CD-R allows data to be stored on it only once.
-Cannot be recycled.

2. CD-WR (Compaq disk rewritable)


-it allows data to be store over and over again. Each time data is written again, the old is first
deleted and before a fresh writing is done. (No overwriting such as is done on hard disks.
-Used to record television programs

USES OF CDs
-used to hold music and software for distribution., used to hold animation files, used to store
computer data and programs, used to boot up a computer., used for back up, Most common on PCs,
most software is sold on CD rather than DVD, used for archive data

(ii) DVDs (Digital Versatile disk)


-a flat circular optical storage media used to store audio and video data.
-WORM device (write once read many) times

80 | P a g e
-also called DVD ROM
-DVDs differ with CDs in that their surfaces are dark in appearance and have a bigger capacity
-some store up-to 4.7 GB of data and others 8.5GB other up-to 100GB
-data is stored randomly onto the surface.

Types of DVDs are


 DVD-R
 DVD-WR
 DVD RAM
 Blu-ray disk

1. DVD-R (digital versatile disk recordable)


DVD allows data to be stored on it only once. Cannot be recycled.
2. DVD WR (Digital versatile disk rewritable)
-it allows data to be stored over and over again. Each time data is written again, the old data is first
deleted before a fresh writing is done (cannot be overwritten such as is done with hard disks.

3. DVD RAM (Digital Versatile Disk Random Access memory)


-has same properties with DVD WR in that data can be recorded many times.
-it allows several and repeated erasure and recording of data just as it is on computer internal RAM.
They can be used as many times as possible.
-have long life of about 30 yrs.
-they have fast access to data,
-files are fairly small,
-have large capacity about 9.4 Gigabytes
-can allow simultaneous reading and writing to data.
- However their drives are less compatible
-three to four times more expensive than DVD WR.

4. Blu-ray (BD-R)
-a blue laser is used to read or write Blu-ray disks as opposed to the red laser used in most
conventional CDs and DVDs. The Blu-ray use a shorter wavelength in reading and writing
information and this makes them faster to use.
-a new technology with a high capacity than other DVD types (from 25GB, 50GB, 100GB)
-used to store high definition videos and films
-it is possible to playback a Blu-ray video disk and record it simultaneously onto another media.
-data access is faster than on other DVD types.
-However they are expensive -They allow data encryption at disk-write time and this is helpful as it
avoids piracy.

USES OF DVDs
-Used to store videos and films for sale or distribution.
-Used for back up
-Most common used on PCs and DVD players
81 | P a g e
-used to archive data
-used for storing TV programs that do not need any update
-Blu-ray disks are used to store high definition (HD) videos
-Blu-ray disks are used for long play films- 2 hours of HDTV and 13 hours on standard definition
TV.
-blue ray are also used in home video consoles.
-blue ray are used as back up for hard disks.
-DVD RAMS - Used in satellite receivers and Camcorders.

(d) MAGNETIC TAPE


-A thin continuous film strip of plastic coated with a magnetic layer of iron particles.
-Magnetic tape differ in types however the computer tape drive is just like the CD drive, that is
mounted onto the computer for tape use.
-the cassette tape is used in radios while the video tape is used for Video tape players.
-data is stored serially or sequentially.
-data transfer rate (writing) is faster than data retrieval rate.

Uses of Magnetic Tapes


-Used to store data, music, films and programs.
-used on radios, video cassette players
-Used on computers to store data and programs
-as computer back up by network servers.
-used in high hit rate applications (batch processing applications) such as electricity, water, gas
billing, payroll systems.

(e) SOLID STATE STORAGE DEVICES

(i) MEMORY CARDS


-These are small cards that are used to store data
-they are an example of solid state devices.
-data is stored on a chip inside them

-they are also called flash memory of HD cards


-they store data randomly on their storage spaces.
Types of memory cards are tabulated below:

Compact Flash (CF) Secure Digital (SD) mini cards

82 | P a g e
Smart Media cards Multimedia cards.

Secure Digital (SD) micro cards xD cards

-they are an example of EEPROM memory type.


-old PC and laptops can only read them with a separate card reader through USB port.

USES OF MEMORY CARDS


-they are used to store data that needs to be transferred to a computer at a later stage.
-used in digital cameras, mobile phones, palmtops, laptops and MP3 and MP4 platters.
-can be used in digital photo processing system.
-used to stored photos on digital cameras.
-used as back up for data.

(ii) MEMORY STICKS/FLASH DISKS OR FLASH MEMORY


-memory devices that use USB connection to a computer.
-they are an example of solid state devices.
-data is stored on a chip inside them
-they are sometimes referred to as dongles, (a term used to describe all types of memory plugged in
using USB port)

83 | P a g e
They have several names i.e.
1. Pen drives
2. Memory sticks
They consist of PCB (printed circuit boards) enclosed in a plastic case.
-can store 1GB, 2GB, 4GB, 8GB, 16GB, 32GB, 64GB, 128GB, 256GB etc.
-they store data directly/randomly on their storage spaces.

USES OF MEMORY STICKS


-used to store photographs
-used to store music
-used to store computer data
-can also be used to store or transfer computer programs from one computer to another.
-mostly used by teachers and school pupils
-used by mobile business officers such as marketing personnel.

(f) FLOPPY DISK


A single thin disk made of a flexible plastic. -also called diskette. -stores data on both sides.
Each side has its own read write head. -they store data in-situ randomly on their storage spaces.
There are no-longer in use today.

They were used


- To boot up a computer.
- On desktop PC to hold data files
- To hold driver software for hardware installations
- To transfer data from one computer to another.
-used as back up.

ADVANTAGES OF SECONDARY STORAGE


-they are permanent storage device.
-external hard disks are portable.
-all hard disks are fast when transferring and accessing data.
-all hard disk are even faster than DVD, CD, tapes, floppies and flash memory
-they have a very large storage capacity.

84 | P a g e
-most have long life span except for floppy disks and CDs
-it is easier to store and update data on disks.
-large storage capacity for most disks and tapes and flash memory

DISADVANTAGES OF SECONDARY STORAGE


-fixed hard disks are not portable.
-all hard disks do not effectively utilize memory space
-are prone to crushing if computers are frequently not properly shut down.
-they are heavily affected by viruses
-external hard disks can be damaged if they are not properly handled e.g. if they fall, exposed to
heat and water.
-memory cards and sticks are easily lost or stolen
-On DVD WR the rate of data transfer is slower than with DVD-R
-Not robust
-Not durable if used often
-blue ray are not common and many computers dot even have the drives.
-data transfer and access rate is slower than that of hard disks.
-Rewritable disks are more expensive than recordable once.
-once burned (written) it becomes permanent

85 | P a g e
COMPUTER SOFTWARE
Software refers to all the various programs that are run on a computer system. These
programs are installed in a computer to make the computer or other related devices usable,
otherwise a computer is not usable without software. Software is logical in nature while hardware is
physical.

SOME SOFTWARE TERMS


Applets are small applications that sometimes come with the operating system as "accessories."
They can also be created independently using the Java or other programming languages.

Shareware : software usually intended for sale after a customer has had a trial period.

Lite ware : shareware with some capabilities disabled.

Freeware : free software, but with copyright restrictions, usually given for testing for a specific
testing period.

Public domain software :free software with no restrictions.

Open source: (software where the source code is furnished and users agree not to limit the
distribution of improvements.

Malware: This stands for malicious software. Most common forms of malware are Trojan
horses, worms and viruses.

Software is divided commonly into two main categories: namely system software and
Application software.

A.) System software: programs that control the basic functions of a computer and comes usually
preinstalled with the machine. System software refers to programs that controls and
coordinates all operations (internal and external) of computer system. Most System software
operations are invisible to the user.

System software controls and coordinates the procedures and functions of computer hardware and
ensures that there is good communication between hardware, software and the user. Systems
86 | P a g e
software carries out middleman tasks to ensure communication between other software and
hardware to allow harmonious coexistence with the user. System software is the first layer of
software to be loaded into memory every time a computer is powered up.
Systems software categories
 Operating system: Harnesses communication between hardware, system programs, and other
applications.
 Utility: perform diagnostic, maintenance and routine computer tasks and ensures optimum
functionality of devices and applications.
 Translator: Translates Assembly language and high-level languages to low-level machine
codes.
 Device driver: Enables device communication with the OS and other programs.
 Firmware: Enables device control and identification.
Operating
system:
Utility:
Translator:
Device driver

1. Operating System (OS)


An operating system (OS) is system software that manages computer hardware and software
resources and provides common services for computer programs. It is installed first on a computer
to allow devices and applications to be identified and also for them to be usable.

Types of Operating Systems


 Real-Time OS: Is installed in special purpose embedded systems like robots, cars, and
modems.
 Single-user and single-task OS: Are installed on single-user devices like phones.
 Single-user and multitask OS: Are installed on contemporary personal computers.
 Multi-user OS: Is installed in network environments where many users have to share
resources. Server OSs are examples of multi-user operating systems.
 Network OS: Is used to share resources such as files, printers in a network setup.
 Internet/Web OS: Is designed to run on the browser that is online.
 Mobile OS: Is designed to run on mobile phones, tablets and other mobile devices.

Functions of Operating Systems


 They provide the interface between the user and hardware through GUI.
 Manages and allocates memory space for applications.
 Processes the management of applications, input/output devices, and instructions.
 Configures and manages internal and peripheral devices.
 Manages single or multi-user storage in local and network computers.
 Security management of files and applications.
 Manages input and output devices.
 Detects, installs, and troubleshoots devices.
 Monitors system performance through Task Manager and other tools.
 Produce error messages and troubleshooting options.
 Implement interface for network communication.
 Manages printers in single or multi-user systems.
 Internal or network file management.

Examples of Operating Systems

87 | P a g e
Popular OSs for computers are: Windows 3.1, XP, 10, Windows 8, Mac OS X, and Ubuntu,
Windows 10, etc.
Popular network/server OS are: Ubuntu Server, Windows Server, Red Hat Enterprise, and
Linux
Popular internet/web OS are: Chrome OS, Club Linux, and Remix OS
Popular mobile OS are: iPhone OS, Android OS, and Windows Phone OS

2. Utilities
Utilities are system software programs designed to perform diagnostic and maintenance tasks for
the computer. It is a type of system software which sits between system and application software.
They come in handy to ensure the computer functions optimally.
Most are third-party tools but they may come bundled with the operating system.
Examples and features of utility software include:
 Antivirus and security software for the security of files and applications, e.g., Malware bytes,
Microsoft Security Essentials, and AVG.
 Disk partition services such as Windows Disk Management, Ease Partition Master, and
Partition Magic.
 Disk defragmentation to organize scattered files on the drive. Examples include Disk
Defragmenter, Perfect Disk, Disk Keeper, Comodo Free Firewall, and Little Snitch.
 File Compression to optimize disk space such as WinRAR, Winzip, and 7-Zip.
 Data backup for security reasons, e.g., Cobian, Clonezilla, and Comodo.
 Hardware diagnostic services like Hard Disk Sentinel, Memtest, and Performance Monitor.
 Data recovery to help get back lost data. Examples include iCare Data Recovery, Recuva, and
EaseUs Data Recovery Wizard.
 Firewall for protection against external threats, e.g., Windows Firewall.
 Etc.

3. Language Translators
These are intermediate programs are used by software programmers to translate high-level language
source code to machine language code. Popular translator languages are assemblers, compilers and
interpreters. They're usually designed by computer manufacturers.
(a) An assembler is a low level language translator that takes basic
computer instructions written in assembly language i.e. language written pneumonic codes,
and convert the codes into a pattern of Bits (BInary digiTS) called machine language.
Machine language is a language of zeros and ones. This is the language that all computers
understand.

(b) Interpreters and compilers all translate high level language into machine readable
form however they differ in the way they translate.
Besides simplifying the work of software developers, translators help in various design tasks.
They;
 Identify syntax errors during translation, thus allowing changes to be made to the code.
 Provide diagnostic reports whenever the code rules are not followed.
 Allocate data storage for the program.
 List both source code and program details.

4. Device Drivers
A device driver is a piece of software that controls a particular type of device (peripheral) which
may be attached to your computer, such as a keyboard or a mouse. Each peripheral device that we

88 | P a g e
connect to the computer must have its unique driver software installed. Driver software ensures
communication of a specific device with the operating system. By default certain for devices
already in the market come with the operating system and some have to be added at a later time
when the a new device is added to the computer.
Examples of devices which require drivers:
 Mouse
 Keyboard
 Soundcard
 Display card
 Network card
 Printer
If a device is newer than the operating system, the user may have to download drivers from
manufacturer websites or alternative sources.

5. Firmware
Firmware or microcode is software that is loaded into a special area on a microprocessor or read-
only memory (ROM) this software is permanent or may be changed after a long period of using the
computer. Firmware is embedded in ROM, or EPROM memory chip for the OS to identify it. It
directly manages and controls all activities of any single hardware. Examples are:

The BIOS program (Basic Input/output System) is a program that runs during POST (Power on
Self-Test) and it checks the computer to make sure all basic configured devices are connected and
are in place and ready to be usable. It is the first software to run when a computer is switched on. It
first checks to make sure components like the processor, RAM, keyboard, mouse and disk drives
are functional. If all the crucial and configured components are fine, it will run the boot loader.
 The boot program (boot loader) this program loads the operating system into the computer's
main memory or random access memory (RAM).
The major difference between firmware and device drivers is that firmware will always reside
within ROM or the processor while drivers are installed into the operating system. All are
used to identify computer devices.

B.) Application software: these are programs or apps that help users to perform specialized tasks,
functions or activities on a computer, such as accounting, communicating, data processing, word
processing etc. They are used to solve user problems or tasks.

It is a term used for software created for a specific purpose. Application software is a
program or collection of programs used by end users.

Application software are used to directly manipulate text (alphabetic letters and symbols),
images or graphics (pictures, drawings and diagrams), numbers (digits 0-9.) audio and
video data.

89 | P a g e
TYPES OF APPLICATION SOFTWARE
A.) Application Software Suite (also known as integrated package, Off -The-Shelf Software
or General Purpose software) or commercial off-the-shelf (COTS) software. Software suite is a
collection of separate application programs bundled and sold as a group. The individual
programs in the package usually have related functions, features and user interfaces, and may be
able to interact with each other, e.g. open each other's files. Business applications often come in
suites.
E.g. Microsoft Office
LibreOffice
iWork
Software suites come in four different types namely productivity, specialized, utility and
personal.

B.) Custom software (also known as bespoke software, tailor-made software, special purpose or
on-the-shelf software) is software that is specially developed to meet unique specific organization
business needs. It is not developed for the mass market. Since custom software is developed for a
single customer it can accommodate that customer's particular needs, preferences and
expectations.
E xa m pl e s of suc h cust om m ade pro gram s are
 C o nt ent Ma na ge ment S yst e m ( CMS )
 C ust o mer R el at i ons hi p Ma na ge ment ( C RM)
 B usi nes s Pr o cess Aut o ma t i o n S yst e m
 A ut o mat e d In vo i ci n g
 C o mp an y -F a ci n g / C ust o mer -F aci n g Web Po r t al s
 E co mme r ce sof t war e s ol ut i ons
 B u g t r ac ki n g sof t wa r e

BENEFITS OF CUSTOM MADE SOFTWARE

1. Simplicity
Bespoke software is designed specifically around your business so you don’t have to worry
about unwanted features or unfamiliar terminology that is not appropriate to your business.
This reduces learning time and is obviously more efficient to use.
2. Branding and Identity
With unique tools, such as forms and auto messages in your brand voice, you will stand out
from the crowd. Sometimes even a simple detail can be a key differentiator between you and
the competition.
3. Efficient Workflow
it is both faster and easier to use.
4. Complete Development Ownership
There is no pressure to upgrade. This also means you won’t have problems such as new
versions not being backwards compatible with old data or the screen layout changing and
incurring a new learning curve. It’s your software, and your decision.
5. Potential Marketability
a bespoke solution for you could become an off-the-shelf solution for other businesses. You
can sell it and make money.
6. Locally specific
most countries will have unique geographic parameters, such as currency, time-zones and
obviously languages. They may also have different considerations for tax, VAT, and import
duties. These can be fully customized to your geographical areas.
90 | P a g e
7. Integration
Bespoke software can generally be customized to integrate smoothly with any other key
software used within the business – and introducing new applications doesn’t mean the
previous integrations will stop working.

WHAT TO CONSIDER WHEN PURCHASING APPLICATION SOFTWARE

 Functionality Needed-can it solve your challenges


 Implementation-how long and complicated is it to implement.
 Support-can you get support from developers.
 IT Infrastructure-does it work well with the machines you have.
 Global expertise-is the owner a well-known service provider
 Pricing –how much does it cost.

CATEGORIES OF APPLICATION SOFTWARE


Multimedia Software: Multimedia software allow users to create images, audios and videos.
Examples of these include Media Player, Virtual DJ, Quick time player etc.

Word Processing software - Use this kind of tool to create and edit documents such as type letters,
type novels, type notes, etc. Examples are MS Word, WordPerfect, MS Works, AppleWorks, and
Lotus Word Pro.

Desktop Publishing software - Use this software to make signs, banners, greeting cards,
illustrative worksheets, newsletters, etc. examples are Adobe PageMaker, MS Word, MS Publisher,
AppleWorks, MS Works, Quark Express.

Spreadsheet software - Use this kind of tool to compute number-intensive problems such as
budgeting, forecasting, etc. A spreadsheet will plot nice graphs very easily. Examples are MS
Excel, Quattro Pro, Lotus 1-2-3, MS Works, and AppleWorks.

Database software - Use this software to store data such as address, membership and other text
information. A database can be used to easily sort and organize records. Examples are, Filmmaker
Pro, AppleWorks, MS Works, Corel Paradox, Microsoft Access, Lotus Approach, Boland,
and Dbase IV

Presentation software - Use this software to create multimedia stacks of cards/screens that can
effectively present a lesson or a sales pitch. The user often clicks on buttons to advance to the next
screen in a sequence. Examples are MS PowerPoint, AppleWorks (slideshows), Hyper Studio,
Flash, Director, HyperCard, Digital Chisel, SuperCard, and Corel Envoy.

Internet Browsers - This software allows one to surf the Web. Often they can read email and
create Web pages too. Examples are Netscape Navigator (or Netscape Communicator), MS Internet
Explorer, AOL Browser, Google Chrome, UC browser etc.

Email programs - These programs send and receive email. Examples are Netscape Messenger
(part of Netscape Communicator), MS Outlook Express, MS Outlook, Eudora, AOL browser.

Graphics Programs (pixel-based) - This software allows one to touch up photographs and create
graphics from scratch. Examples are Adobe Photoshop, Paint Shop Pro, AppleWorks, MS Works,
MS Paint (comes free on Windows PC's), Painter etc.

91 | P a g e
Graphics Programs (vector-based) - This software creates graphics that are similar to
illustrations or cartoon drawings. Adobe Illustrator, Corel Draw, AppleWorks, MS Works.

Communications software - This software allows two computers with modems to communicate
through audio, video, and/or chat-based means. Examples are MS NetMeeting, AOL Instant
Messenger, IRC, ICQ, and CU-SeeMe.

Educational software has the content or features adapted for use in by educators or students. For
example, it may deliver evaluations (tests), track progress through material, or include collaborative
capabilities. More Examples are Driving test software, Interactive geometry software, Language
learning software, Notetaking (Comparison of notetaking software), Software for enabling
simulated dissection of human and animal bodies (used in medical and veterinary college
courses)[4], Spelling tutor software, Typing tutors, Reading Instruction, Medical and healthcare
educational software

Entertainment Software: can refer to video games, screen savers, programs to display motion
pictures or play recorded music, and other forms of entertainment which can be experienced
through use of a computing device. Can also be part of multimedia software?

Programming software or Software development tool:


-programming software is software which helps the programmer in developing other
software. Programming software is a program or set of programs which helps the
software developers by assisting them in creating, debugging and maintaining other
programs and applications. Programming software is also known as programming
tool or software development tool. Examples are Java, C, C++, Visual Basic, C
Sharp(C#), PHP, Python, Ruby, JavaScript, SQL, etc.

Mobile Application software (Mobile App)


A mobile application, most commonly referred to as an app, is a type of application software
designed to run on a mobile device, such as a Smartphone or tablet computer. Mobile applications
frequently serve to provide users with similar services to those accessed on PCs. Apps are generally
small, individual software units with limited function. A mobile application also may be known as
an app, web app, online app, iPhone app or Smartphone app.
Exercises

92 | P a g e
E-WASTE MANAGEMENT
Before we can talk about managing e-waste we need to understand what e-waste is.

E-waste (Digital rubbish)

What is e-waste?

E-waste is electronic products that are unwanted, not working, and nearing or at the end of their “useful
life. E-waste is any electrical or electronic equipment that’s been discarded. This includes working and
broken items that are thrown in the garbage or donated to a charity reseller like Goodwill. Often, if the
item goes unsold in the store, it will be thrown away. E-waste is particularly dangerous due to toxic
chemicals that naturally leach from the metals inside when buried.

List of Common E-waste Items:


Home Appliances
 Microwaves
 Home Entertainment Devices
 Electric cookers
 Heaters
 Fans

Communications and Information Technology Devices


 Cell phones
 Smartphones
 Desktop Computers
 Computer Monitors
 Laptops
 Circuit boards
 Hard Drives

Home Entertainment Devices


 DVDs
93 | P a g e
 Blue Ray Players
 Stereos
 Televisions
 Video Game Systems
 Fax machines
 Copiers
 Printers

Electronic Utilities
 Massage Chairs
 Heating Pads
 Remote Controls
 Television Remotes
 Electrical Cords
 Lamps
 Smart Lights
 Night Lights
 Treadmills
 FitBits
 Smart Watches
 Heart Monitors
 Diabetic Testing Equipment

Office and Medical Equipment

 Copiers/Printers
 IT Server Racks
 IT Servers
 Cords and Cables
 WiFi Dongles
 Dialysis Machines
 Imaging Equipment
 Phone & PBX systems
 Audio & Video Equipment
 Network Hardware (i.e. servers, switches, hubs, etc.)
 Power Strips & Power Supplies
Uninterrupted Power Supplies (UPS Systems)
 Power Distribution Systems (PDU’s)
 Autoclave
 Defibrillator

Today, though, a growing amount of e-waste is not considered to be products that have stopped working
or become obsolete. Technological advances are coming at us at such a dizzying speed that a lot of
electronic devices that still work fine are the ones considered obsolete.

Impact of e-waste
China, the U.S. and India contribute around 20 million metric tons of e-waste combined annually, both
imported and exported. Part of the problem is poor care in disposal: It's estimated that only 17% of all e-
waste is properly collected and recycled.

94 | P a g e
In fact, improper and unnecessary disposal of e-waste has a growing and quantifiable negative effect on
the biosphere, human health, and national and personal security. Proper handling of e-waste is important,
but its practice is controversial and can be highly dangerous to humans handling the e-waste.

Biosphere health

Many complex electronic devices contain up to 60 precious metals and elements. Separating and
controlling these metals is extremely difficult and often hazardous to the biosphere. Melting down or
incinerating electronic devices contributes to the increased presence of lead in landfills globally. Further,
the emission of toxic fumes and gases is a leading factor in environmental degradation, climate change,
pollution and contaminated water supply.

Human health

Items such as smartphones and computers contain several hazardous elements. Exposure to these toxic
materials harms humans and can adversely affect the nervous system, heart, and brain, kidneys, liver and
reproductive system.

Many of these electronic appliances and devices contain high levels of lead, mercury and cadmium -- all
known carcinogens. Waste management workers handle these hazardous materials. Exposure to them has
been linked to lung disease, thyroid issues, birth defects, behavioural changes, and cancer in children and
young adults.

Liquid-crystal display and plasma screens, each containing toxins and carcinogens necessary for their
displays, are among the worst offenders. As a result of improper disposal and overburdened landfills, the
risk of exposure has spread to more and smaller communities and their residents.

Security

In addition, the improper disposal and recycling of smartphones and similar devices has created an
imposing threat to national and personal security. Smartphones and computers contain sensitive data
subject to leaks and data breaches. Many of these devices contain highly classified and sensitive
information, yet their easy-to-use nature makes hacking into them simpler.

Completely erasing sensitive data prior to discarding old devices is crucial in mitigating security threats.
What is E-Waste Management?

E-waste management refers to properly disposing and managing electronic waste, including old or
discarded electronic gadgets such as phones, computers, and televisions. The process involves the
collection, transportation, recycling, refurbishing, and disposal of electronic waste in an environmentally-
friendly manner.

The goal of e-waste management is to reduce the negative impact of electronic waste on the environment
and human health by minimizing pollution, conserving natural resources and energy, and promoting
sustainability. Proper e-waste management also ensures the recovery of valuable materials from electronic
waste, such as copper, silver, and gold, to create new products.

Approaches to E-Waste Management

95 | P a g e
There are several approaches to e-waste management. Ensuring that any approach taken is sustainable,
cost-effective, and minimizes the environmental impact is essential. Here are some examples of
approaches to e-waste management:

 Reduction of e-waste production by encouraging people to buy fewer electronics and to use their
devices for longer periods before replacing them
 Reuse and refurbishment of old electronics to extend the life of the devices and reduce the need
for new products to be made from raw materials
 Recycling of e-waste to break down old electronics into their component parts so they can be
reused in new products or disposed of safely without harming the environment
 Proper disposal of e-waste through designated drop-off centers or adherence to local regulations
for environmental protection
 Donating used electronics to non-profit organizations that provide low-cost or free technology to
underserved communities
 Implementing extended producer responsibility (EPR) programs that require manufacturers to
take back and recycle their products, incentivizing them to design devices that are easier to
recycle or repair
 Adopting circular economy principles that promote the reuse and recycling of materials to
prevent them from becoming waste
The Challenges of Managing E-Waste
The world is becoming increasingly digital, and with that comes an increase in the amount of electronic
waste (e-waste). Managing e-waste poses several challenges, some of which include the following:

Rapid Technological Advancements


The rapid pace of technological advancements means that electronic devices become obsolete quickly.
This has resulted in an increase in the amount of e-waste generated, which makes it difficult to keep up
with proper disposal and recycling.

Hazardous Materials
Electronic devices can contain hazardous materials such as mercury, lead, brominated flame retardants,
and cadmium. These materials can harm human health and the environment if not appropriately handled
during disposal and recycling.

Lack of Proper Disposal Infrastructure


In many countries, there is a lack of proper infrastructure to manage e-waste. This means that much of the
generated e-waste is in landfills or illegally exported to developing countries with lower environmental
standards.

Informal Recycling Sector


In some countries, informal recycling sectors have emerged to process e-waste. However, these sectors
are often unregulated and use crude and unsafe methods that can result in environmental and health risks
for workers and the local communities.

Data Security and Privacy


Electronic devices often contain sensitive data such as personal information, financial data, and
intellectual property. Therefore, improper disposal of these devices can lead to data breaches and identity
theft.

High Cost of Recycling


Recycling electronic devices can be expensive due to the high cost of separating and processing the
materials used in their construction.

96 | P a g e
Addressing these challenges requires a coordinated effort from governments, businesses, and individuals
to prioritize the proper disposal and recycling of electronic devices while minimizing their environmental
and health impacts.

Mobile device systems


A mobile device is a handheld computer, usually small enough to be carried in one hand e.g.
smartphones, smartwatches, tablets, laptop computers, handheld gaming consoles, and e-readers,
wearables (e.g., smart watches), smart home devices, and more. These devices are now extensively used
for mobile learning.

Mobile Learning in education is transforming learning for digital natives. Mobile learning in
education is an extremely friendly way to adopt modern teaching methodologies. Not only does it support
visual learning (via audio, video, and images), but it also makes learning dynamic and fast-paced, thereby
keeping students more engaged in a classroom as it conveys course material in a much more effective
fashion.

Characteristics of Mobile Devices


There is a great variety of mobile devices. Phones, tablets, e-readers, and other mobile devices share some
common characteristics, including:

 Small enough to be carried easily


 Operates without a physical connection to electricity; uses a battery to store power
 Able to send and receive information wirelessly, using cellular data, Bluetooth, or Wi-Fi
 Features a user interface, such as a touchscreen or keyboard
 Includes internal data storage
 Often includes communication functions for voice or video calling
 May include sensors to record and store information, such as a camera, compass, or activity
monitor

Types of Mobile Technology

SMS
SMS, which stands for Short Message Service, is a text-based communication service. It is used to send
messages to mobile devices. SMS can be used on all mobile devices, and it’s not encrypted.

97 | P a g e
MMS
MMS stands for Multimedia Messaging Service. MMS is a text message that contains multimedia
content, such as pictures and videos. These messages can be sent between phones (or from a phone to a
computer) and are most commonly used on cellular networks.
The most common media types include pictures, sounds, and images such as GIFs or memes (see:
Texting Trends). You can also send videos in your MMS messages!

4G
4G is the fourth generation of cellular technology and has been around since 2010. The first generation
was 1G, which used analog signals to transmit voice calls and text messages. 2G saw the introduction of
digital networks and data transmissions, enabling faster speeds than its predecessor. 3G brought higher
data rates through wider bandwidths and support for more devices at once; 4G took these improvements
further by increasing maximum speeds even more (to 100 Mbps) while also reducing latency times.

5G
5G is the fifth generation of mobile telephony, succeeding 4G LTE. It is a wireless communication
standard in the form of an international standard that was completed by 3GPP in December 2017 and will
be officially published in June 2019.
The goal of 5G is to provide high-speed and low-latency data connections without congestion, which
means that it can handle thousands of users simultaneously with minimal delay or dropouts.

GSM
GSM stands for the Global System for Mobile Communications. It’s a type of mobile network that uses a
technology called Global System for Mobile Communications (GSM). The GSM network is used by more
than 80% of mobile phone users to make calls, send text messages and browse the internet.
A GSM network comprises two main parts: the MSC (Mobile Switching Centre) and BTS (Base
Transceiver Station).

CDMA
CDMA stands for Code Division Multiple Access, or CDMA. CDMA is a wireless technology standard
that allows multiple users to simultaneously use the same frequency band. This is unlike other
technologies, such as TDMA and GSM, in which each user is assigned a specific frequency band. Only
one user can communicate at any given time on that specific frequency.

WIFI
Wi-Fi is a family of technologies that allows electronic devices to exchange data or connect to the
Internet wirelessly using radio waves. Wi-Fi is an IEEE 802.11 standard that defines the use of radio
frequencies (RF) in the 2.4 gigahertz (GHz) band and 5 GHz band for telecommunication applications
such as wireless local area network (WLAN), Wireless Wide Area Networks (WWAN), and Local area
network (LAN).

Benefits of Mobile Learning Or M-Learning for schools

 Build and maintain classroom community by creating safe spaces that allow for peer interaction
as well as anonymity.
 Increase student interest and motivation by providing multiple means and opportunities for
participation.
 Illustrate concepts or topics more clearly.
 Develop students' emotional, cognitive, and technology-based skills for their future careers.
 Increase engagement by having students use their mobile devices to generate, collect, and
analyses data.
 Identify and adapt to gaps in student learning.
98 | P a g e
 Facilitate a more efficient feedback cycle for student learning.
 Get through basic concepts more quickly, allowing students more time to engage deeply with
complex concepts.
 On-the-go learning
 Better collaboration
 Multi-device support: Another significant benefit of mobile learning in education is that of
multi-device support. Unlike other e-learning methods, the mobile learning environment supports
the availability of the same course on various devices, including computers, smartphones, laptops,
and tablets.
 Higher retention and better completion rates: The bite-sized and concise content presented in
m-learning platforms offers immense flexibility to learners to complete and begin courses as per
their own convenience. This leads to better completion rates, high retention of the content, and an
extremely impactful mobile learning user experience.
 Engaging design formats to learn from: M-Learning features a range of interesting design
formats such as interactive videos, animated videos, and so on that are extremely popular among
learners. This kind of personalization in learning adds to the sense of engagement and also helps
learners stay on track with their training.
 Driving performance: The rapid growth of the mobile internet has also made educational
institutes use m-Learning as an innovative solution to meet their students’ learning needs and
improve their performance.
 Defined learning path: The popularity of m-Learning platforms is also attributed to the
continuous and personalized learning path they offer. Learners enjoy the convenience of course
organizers and phone-based reminders integrated with the m-Learning platforms they use.
Further, they can get ongoing notifications and updates on new courses and recommendations,
which they can check anywhere and anytime.
 Convenient and Flexible: One of the biggest advantages of mobile learning is its convenience
and flexibility. With mobile learning, learners can access educational materials and engage in
learning activities at any time, from any location. This makes it possible to fit learning into a busy
schedule, no matter how hectic it may be. Mobile learning also enables learners to study at their
own pace, allowing them to take as much or as little time as they need to absorb the information.
 Improved Engagement: Mobile learning can also lead to improved engagement, as it provides a
more interactive and personalized learning experience. With features like gamification,
simulations, and interactive multimedia, mobile learning can help keep learners engaged and
motivated. This can result in better retention of information and a more enjoyable learning
experience.
 Increased Accessibility: Mobile learning can also increase accessibility to education, particularly
for learners who may not have access to traditional classroom settings. For example, mobile
learning can be used to provide education in remote or underserved communities, or to
individuals who may have difficulty accessing traditional classroom settings.
 Cost-Effectiveness: Mobile learning can also be more cost-effective than traditional classroom-
based learning. By reducing the need for physical classrooms, instructors, and materials, mobile
learning can save schools and businesses a significant amount of money. Additionally, the cost of
mobile devices is continuing to decrease, making mobile learning an increasingly affordable
option.

Challenges associated with mobile learning.


 Lack of training
 Connectivity/internet problems
 Lack of understanding of technology use
 Prohibited to use mobile gadgets at school
 Power cuts/Power problems
 Downloading of non-educational material
99 | P a g e
 Technophobia
 Lack of software
 Unavailability of mobile gadgets
 Viruses problems
 Slow internet
 Lack of time

 Lack of tailored learning approaches: Adapting to the individual needs and preferences of each
learner is a goal that is impractical in many traditional classroom environments.
 Lack of analytics and data to benchmark performance: One of the challenges faced by most
education systems is the lack of enough data and analytics to compare student performances.
Whereas mobile learning allows educators to track and benchmark student performance across
multiple parameters such as student history or subject to provide a more holistic and richer way of
assessing student performance.
 Less qualified teachers: Less qualified or under-trained educators fail to contribute meaningfully
due to the lack of effective teaching strategies and lesson plans, which is one of their core
responsibilities. Mobile learning in education mitigates this challenge by providing access to a
range of dedicated resources to help trainers and educators share best practices.

Internet Communication
Internet communication enables you to communicate with people over the web. The communication
process takes place in any form, such as messages, voice, video calls, etc. The biggest reason people are
shifting towards this technology for communication is cost savings.

You will find several applications over the web that allow app-to-app, click-to-call, and app-to-phone call
services without imposing any calling charge for web interaction facility.

WhatsApp, Skype, Google meet, and messenger are some of the most popular applications that allow
users easier access to communication services.

Some of the forms of Internet communication

Telephones calls: The telephone remains a fundamental communication technology. It enables voice
conversations over long distances and has evolved into mobile phones, which are now ubiquitous.

Instant Messaging
Instant messaging is a highly used online chat technology that allows users to communicate with others in
real time via an internet-based chat room.
The messaging tool eliminates the need to place a call for accessing information and helps you to have a
much easier communication interface for instant information sharing. Yahoo Messenger, Google
Messenger, MSN, and Messenger are a few popular instant messaging tools that help users to
communicate irrespective of their geographical locations.

VoIP and Internet Phone Service


Internet telephone services utilize the Internet as a bridge that helps them to route telephonic calls to
designated numbers instead of traditional phone lines.
The working functionality of voice over internet protocol (VoIP) is easily understandable, and it sends
voice packets using IP instead of PSPN (public switch telephone network). Once the voice packets reach
the pre-decided destinations, it again gets converted into voice data for the receivers.

100 | P a g e
Internet phone systems are widely being used by users and businesses that need to communicate globally.
They are cost-effective and allow you to call globally without imposing high charges.

Email
As per a recent survey, you will be amazed to know that the number of active email users will touch 4.3
billion by 2023. It is one of the most effective modes of communication and an advanced way of
exchanging media files.
Users can create their email ID through web portals like Microsoft Outlook, Gmail, and Yahoo. You only
need an active email ID if you want to communicate through the same.

Social Media Platforms


Social media, an integral part of our lives and is considered one of the most popular internet
communication methods today. You all will be aware of the social media platforms like Facebook,
Instagram, Twitter, WhatsApp, etc. These channels have gained immense popularity among every age
group.
The social media platform helps users instantaneously communicate with others and offers several
features that enhance user experience while communicating.
Social media channels are not just limited to chat room facilities. Users are allowed to access multiple
features while communicating. They can make video and audio calls along with a chat room facility.
Also, they can share various documents and media files over web channels.

Online forums and discussion


An online forum is an internet space structured around and dedicated to conversation, usually
through posting questions, answers, and responses. An online discussion is a communication tool for
dialogue in an online course. It usually consists of an original post, usually a question or a provocative
statement, which other participants then answer or respond to in subsequent posts. The purpose of using
discussions in an online course is to provide opportunities for students to interact with each other, the
content, and the instructor. In an online discussion, the students are responsible for learning the material
and teaching each other, while the instructor facilitates the process from the side.

Blogs
A blog is an online journal or informational website that offers regularly updated content about a
topic. It presents information in reverse chronological order and is written in an informal or
conversational style. Most blogs are run by one person, the blogger, and are hosted on a website or
blogging platform. Blog posts can contain lots of multimedia content, from text to images, videos and
social media clippings.
Examples of online blogs include:
 Marketing and social media blogs, such as Brilliant Business Moms, which publishes tips for mom
entrepreneurs who want to build a business and balance family life.
 Personal finance blogs, such as Bravely Go.
 Tech blogs, such as Renewed Macs.
 Photography blogs, such as Path.
 Health blogs, such as The Squeeze Magazine.

Vlogs: Video blogs (vlogs) have gained prominence. Vloggers create video content on various topics,
from travel experiences to cooking tutorials.

Collaborative tools
Collaboration tools are system software or non-technological devices that help people to
collaborate. They support a group of two or more individuals to accomplish a common goal or
objective. They ease the process of communication, collaboration, and project management.
Here are some examples of collaboration tools that facilitate communication and teamwork:
101 | P a g e
1. Slack: A popular messaging platform for real-time communication within teams. It allows
channels, direct messages, and file sharing.

2. Microsoft Teams: Integrated with Office 365, Teams offers chat, video conferencing, document
collaboration, and project management features.
3. Trello: A visual project management tool that uses boards, lists, and cards to organize tasks and
track progress.

4. Asana: A task and project management tool that helps teams coordinate work, assign tasks, and
set deadlines.

5. Google Workspace (formerly G Suite): Includes tools like Google Drive, Google Docs, Sheets,
and Slides for collaborative document creation and sharing.
6. Zoom: A video conferencing platform for virtual meetings, webinars, and screen sharing.

7. Jira: Primarily used for software development, Jira helps teams manage tasks, bugs, and agile
workflows.

8. Basecamp: A project management and team collaboration tool with features like to-do lists, file
storage, and messaging.

9. GitHub: A platform for version control and collaborative software development using Git.
10. Notion: Combines note-taking, task management, and wiki-style documentation in one platform.

Video conferencing
Video conferencing is a technology that allows users in different locations to hold real-time face-to-face
meetings, often at little to no cost. It is a live video-based meeting between two or more people that uses
the Internet to facilitate live, face-to-face interactions and collaboration through audio, video, screen
sharing, and chat

Examples of video conferencing tools and software include


 Zoom
 Webex Meetings
 Google Meet
 Microsoft Teams
 Whereby
 Skype
 Etc

Podcasts: Podcasts are audio programs available for streaming or download. They cover diverse subjects,
from storytelling to educational content.

Livestream: Livestreaming allows real-time broadcasting of events, conferences, or performances over


the internet. It enables global audiences to participate virtually.

Online Chat: Instant messaging services and chat applications allow real-time text communication.
Examples include WhatsApp, Slack, and Telegram.

102 | P a g e
Application of computers for ICT documentation
ICT documentation is an internal library of information for use by ICT teams or users to help them go
about their day-to-day roles. ICT documentation is all about orderliness, organization, maintaining
standards, presentation and effectiveness etc.

It provides information such as:


 guidance on how IT systems work
 network, system, and device configurations
 how to execute processes and rectify issues
 incident response plans
 operational procedures

A fully featured ICT documentation system will provide convenient real-time access to a highly
searchable and centralized knowledge base, serving as a single source of truth for all the information the
an organization ICT systems.

The ultimate goal of ICT documentation is to help employees avoid wasting valuable time tracking
down the information they need to perform a specific task. It shares much in common with technical
documentation, which comprises externally-facing manuals and user guides that explain how to use a
product or service.

The Benefits of ICT Documentation


Improved Efficiency
IT documentation helps staff get their work done more quickly. It provides clear steps on how to do
things properly—in line with standard company procedures. This reduces the scope for operational
mistakes and streamlines workflows.

Faster Learning

103 | P a g e
With proper documentation, companies can shrink the learning curve for new employees. Newcomers can
quickly become a productive part of the team and will even be able to perform complex tasks without the
time-consuming involvement of more senior members of the IT team.

Better Visibility
Good documentation improves visibility into ICT assets and processes. This boosts understanding of
computer systems, providing useful insights for undertakings such as:
 new development projects
 infrastructure provisioning
 standardization of technology
 regulatory compliance

Reduced Risk
IT documentation provides important reference material that can help prevent rogue configurations and
many other operational and coding mistakes. It can also aid security teams by storing information about
vulnerability remediation workflows and details on how to identify, contain, or recover from a
cyberattack. And, if it supports restricted access capabilities, it can also serve as a secure place for storing
certain types of credentials.

Types of ICT Documentation

Different types of documentation serve different roles. The following are the main categories of IT
documentation, each of which is based on the fundamental purpose it serves.
Infrastructure Documentation
Infrastructure documentation refers to information about the physical and virtual components of an IT
environment. This includes servers, storage, networks, and other hardware, as well as virtual machines,
software, applications, and data. It provides a comprehensive view of the IT landscape, helping IT staff to
understand how different components interact with each other.
For instance, a network diagram, a part of infrastructure documentation, illustrates how various devices
are connected in a network. This aids in troubleshooting network issues and planning network upgrades.
Similarly, server documentation details the specifications, configurations, and status of servers, guiding
the team in server management and maintenance.

Operational Workflows
Operational workflows documentation depicts the processes and procedures followed in the day-to-day
operations of an organization’s IT department. This includes routine tasks, such as system maintenance
and data backup, as well as complex operations like software deployment and network configuration.
This form of documentation is essential for maintaining consistency in IT operations. It ensures that tasks
are performed in a standardized manner, minimizing errors and improving efficiency. It also serves as a
training manual for new employees, helping them understand and follow the established procedures.
In addition, documenting operational workflows facilitates process optimization. It allows for the
identification and elimination of bottlenecks, improving productivity and service quality.

Project-Based Documentation
Project-based documentation is mainly associated with specific IT projects. It provides details about the
project’s goals, timelines, resources, stakeholders, and progress. This documentation is crucial for
planning, executing, and controlling ICT projects effectively.
To illustrate, a project plan, a critical component of project-based documentation, outlines the project’s
objectives, tasks, dependencies, and deadlines. This facilitates clear communication among team
members and stakeholders, ensuring everyone is on the same page. Furthermore, risk registers and change
logs help in identifying potential risks and managing changes during the project lifecycle.

Technical Support Information


104 | P a g e
Technical support information serves as a repository of knowledge for resolving common ICT issues.
This includes troubleshooting guides, FAQs, knowledge base articles, and help desk ticket histories. This
type of documentation is particularly useful for IT support teams, enabling them to quickly diagnose and
fix problems.
For instance, a step-by-step resolution guide can help IT support staff to resolve a recurring issue without
having to reinvent the wheel each time. Similarly, a well-maintained helpdesk ticket history can provide
insights into common issues, their causes, and effective solutions, thereby enhancing the efficiency of the
support process.

Technical Documentation
Technical documentation provides in-depth information about the architecture, design, and operation of
IT systems and applications. This includes system specifications, architectural diagrams, data models,
APIs, and code documentation. This documentation is primarily intended for ICT professionals who
design, develop, and maintain these systems.
For example, data model documentation describes the structure, relationships, and constraints of data
elements, guiding database administrators in managing databases. Similarly, API documentation provides
details about the functions, parameters, and return types of APIs, assisting developers in integrating
systems and building applications.

User Documentation

User documentation is designed to assist end-users in using ICT systems and applications effectively.
This includes user manuals, tutorials, quick start guides, and online help. This type of documentation is
essential for ensuring that users can accomplish their tasks with minimal assistance from IT support.

A well-written user manual, for instance, provides clear instructions on how to use an application,
reducing the learning curve for users. Similarly, an online help system provides instant answers to user
queries, improving user satisfaction and productivity.

105 | P a g e
The Role of ICT in Records Management
If you have ever worked in a large business, you will know that the sheer volume of paperwork is
enormous.

Thankfully, the days of filing cabinets are fast coming to an end. Even email inboxes are incapable of
coping with the data we generate daily. But what if there was a way to make things even more efficient?

Information and Communications Technology (ICT) and document management solutions are essential in
this process. Here we will explain how digitization can help better transform your records management
processes.

Businesses Have to Deal with Vast Quantities of Documentation daily.

Records are an important part of every business as they enable us to keep track of your company's
activities and operations. When it comes to managing records, there are several vital considerations you
need to bear in mind.

Legal and Regulatory Requirements


We must keep records for various legal purposes, including tax reporting and accounting
requirements, as these documents can also become evidence during legal proceedings if necessary.
In such cases, the information contained within the records must always be accurate and up-to-date
because inadequate record-keeping can land you in hot water if your business ends up in court,
regardless of whether you're at fault.

Business Needs
There are also business reasons why certain documents must be retained longer than others, for
example, legal and fiscal records. Specific regulations relating to records depend on an
organization’s location, business type, or industry. As an industry leader, Daisy's software solutions
cater to all business needs, including electronic document management, AI & APA and more.

106 | P a g e
Necessary Documentation Is Vital for Day-to-Day Operations
We cannot overstate the importance of documentation. It is vital for day-to-day operations, not only
for regulatory and legal purposes but for many others. For instance, without it, employees may
make critical errors at work or clients could be over or undercharged, resulting in your company
losing business or worse. Furthermore, you might need to refer to one of your employee's contracts
to resolve a disagreement. Documentation also plays a vital role in business continuity planning
(BCP), risk management, disaster recovery, and many other business resilience strategies.
Accessing this information quickly and efficiently is hugely beneficial, negates the need for sifting
through paper, and saves time.

Serious Shortcomings of Manual Records Management


Managing records includes collecting, classifying, storing, preserving and disposing of paper-based
and electronic records, but doing so manually has serious shortcomings.
These shortcomings exist because physical documents are challenging to find, but more
importantly, they are easily destroyed or mislaid. Equally, copies you're not aware of could always
appear at a later date, which is not suitable for compliance with the POPI Act of South Africa.

Advantages of ICT in the Records Management Process


There are many benefits to using ICT in the records management process, and one of the main ones is
cost reduction. Using ICT records management reduces the amount of paper your company uses and
increases efficiency. A company can improve its efficiency in various ways, including using file servers
and databases for storage and document imaging systems such as scanners and printers to save on labor
costs.
Increasing productivity is another advantage. An adequate record management system will make it easier
for employees to quickly find documents they need because they are all stored together instead of
scattered across various filing cabinets around the office space.

Digitization
Digitization is the process of scanning physical documents into digital files. This process can take place
via several different methods.
Scanning involves using a scanner to capture an image of every page in a paper file. Most scanners have
an automatic document feeder, which moves the document through and scans it at high speed.
First, OCR (Optical Character Recognition) captures text from images. Then it is converted into text files
that can be edited more easily than scanned documents (although there will still be some issues with
handwriting recognition).

Efficiency Matters
Using ICT effectively enables staff members to access information when they need it quickly. They don't
have to waste time manually searching through documents to find what they need. Instead, they can
retrieve the documents or records they need by using keywords to search for the most-viewed documents.
This way, employees save time by completing tasks faster and avoid errors resulting from incorrect
information, thus saving money.
They can also access information from home, which has become vital since the work-from-home
revolution has begun.

Using ICT in Records Management Is Great


Compared with manual methods, using ICT in records management dramatically increases efficiency and
also reduces costs. Thus, it is a highly effective and efficient way to manage business documents, emails
and other essential data. The ability to search for information quickly and accurately has saved companies
time and money by reducing the need for manual storage space and improving efficiency.

Exercise
4 What records should a school, as a learning institution, keep?
107 | P a g e
5 What records should a teacher keep for his or her learners?

Computer Use in Data Analysis


Data analysis is the practice of working with data to glean useful information, which can then be used to
make informed decisions.
Computers are useful in data analysis because they can be used to monitor the accuracy and completeness
of the data as they are collected.

Other ways computers are used in data analysis include:


 display the results in graphical chart or graph form
 Combining multiple datasets
 Presenting data effectively
 Making future predictions
 Analysing temporal patterns
 Extracting insights from text
 Ensuring data accuracy
 Merging disparate data sources
 Plagiarism checking
 Grammar and spelling checking
 Paraphrasing

Data analysis process


As the data available to companies continues to grow both in amount and complexity, so too does the need
for an effective and efficient process by which to harness the value of that data. The data analysis process
typically moves through several iterative phases and there are several software that can be helpful at each
stage. Let’s take a closer look at each.

 Identify the business question you’d like to answer. What problem is the company trying to solve?
What do you need to measure, and how will you measure it?

 Collect the raw data sets you’ll need to help you answer the identified question. Data collection might
come from internal sources, like a company’s client relationship management (CRM) software, or
from secondary sources, like government records or social media application programming interfaces
(APIs).

108 | P a g e
 Clean the data to prepare it for analysis. This often involves purging duplicate and anomalous data,
reconciling inconsistencies, standardizing data structure and format, and dealing with white spaces
and other syntax errors.

 Analyse the data. By manipulating the data using various data analysis techniques and tools, you can
begin to find trends, correlations, outliers, and variations that tell a story. During this stage, you might
use data mining to discover patterns within databases or data visualization software to help transform
data into an easy-to-understand graphical format.

 Interpret the results of your analysis to see how well the data answered your original question.
What recommendations can you make based on the data? What are the limitations to your
conclusions?

Types of data analysis


Descriptive analysis
Descriptive analysis tells us what happened. This type of analysis helps describe or summarize quantitative
data by presenting statistics. For example, descriptive statistical analysis could show the distribution of sales
across a group of employees and the average sales figure per employee.
Descriptive analysis answers the question, “what happened?”

Diagnostic analysis
If the descriptive analysis determines the “what,” diagnostic analysis determines the “why.” Let’s say a
descriptive analysis shows an unusual influx of patients in a hospital. Drilling into the data further might
reveal that many of these patients shared symptoms of a particular virus. This diagnostic analysis can help
you determine that an infectious agent—the “why”—led to the influx of patients.
Diagnostic analysis answers the question, “why did it happen?”

Predictive analysis
So far, we’ve looked at types of analysis that examine and draw conclusions about the past. Predictive
analytics uses data to form projections about the future. Using predictive analysis, you might notice that a
given product has had its best sales during the months of September and October each year, leading you to
predict a similar high point during the upcoming year.
Predictive analysis answers the question, “what might happen in the future?”

Prescriptive analysis
Prescriptive analysis takes all the insights gathered from the first three types of analysis and uses them to
form recommendations for how a company should act. Using our previous example, this type of analysis
might suggest a market plan to build on the success of the high sales months and harness new growth
opportunities in the slower months.

Some of the software used for data analysis include SPSS, STATA, and SYSAT, Microsoft Excel, Word
processing, etc.

109 | P a g e
ICTs in the classroom
1. PLANNING USES
a) Preparing Schemes of work using Word processing
b) Preparing Daily lesson Plan using Word processing
c) Preparing learners notes and teaching notes for lessons
d) Preparing Instruction Media such as Work cards, reading cards, cut outs for charts etc.
e) Preparing exercises, tests and examinations
f) Preparing department minutes
g) The teacher can research before teaching using the computer and internet research tools
available on the web.
h) Etc.

2. LESSON DELIVERY
(a) Learners can read/ study prepared notes from the desktops/laptops in the classroom
(b) Learners can watch videos or listen to audio lessons from the computer
(c) Learners can watch a PowerPoint presentation projector onto the walls by the teacher
(d) Computers can be used as CCTV for learner monitoring during learning
(e) Learners can write exercises, tests or examinations on the computer without needing to
use pen and paper
(f) Learners can print their work for submission of hardcopies to the teachers for marking
(g) The teacher can do online distance learning using various platforms (video conferring,
social media, bulletin boards, forums, chats etc.) with students.
(h) Learners can do discussions and presentations with the aid of an interactive whiteboard,
smart whiteboard, or the normal un-interactive whiteboard.
(i) The teacher can record learners during learning for them to replay later at home or
some other time…this helps students discover what they can do and also revise at own
time.
(j) Discussion in the same classroom can take place using smartphones
(k) Learners can be tasked to do a brief research on the internet in the same lesson
(l) Dictionaries, spelling check, paraphrasing, antiplagiarism, references, data analysis, and
data presentation etc. tools can be used by students to perfect their written work and
researches.
(m) Those with various disabilities can get the computer as an aid, such as electronic
braille, voice synthesizers, sound/audio output, and demonstration or experiment
110 | P a g e
videos. The deaf, dump and physically challenged learners will appreciate such
developments.
(n) Learners can learn practical work such as table creation, drawing, image processing,
music mixing, video processing and several electronic art works- this is a pragmatic
learning approach
(o) Learners can do edutainment in various subject areas such as attempting quiz, playing
educative games, music videos, listening to various teaching staff online or offline in
the classroom etc.
(p) The computer can be used for drill and practice
(q) In geography various devices with sensor can help take real time atmospheric
measurements such as humidity, cloud cover, temperature
(r) The computer sensors can be used to offer danger warning signs to the teacher and the
learners such as storm, rain, fire, etc.
(s) Digital camera can be used to capture images in a lesson that may be required for future
use or records.

3. RECORD KEEPING
(a) Learners progress records can be prepared using Spreadsheet software/ Even Word-
processing software
(b) Learners remedial and extension work templates/records can be done using Word-
processing software
(c) Learners social records can be created using database software
(d) Record of textbooks and other inventory martials can be created using various software
by the teacher

4. HARDWARE AND SOFTWARE THAT CAN BE USEFULL IN A LESSON

Hardware
(a) Speakers
(b) Microphones
(c) (Min PA system)
(d) Multimedia projector
(e) The laptop/desktop
(f) TV screens
(g) External hard drives
(h) Memory sticks and CDs
(i) Mobile phones
(j) Printers
(k) Telephone
(l) Uninterruptible power supply
(m) Danger detecting sensors
(n) Internet connection
(o) Air conditioners
(p) Electronic braille
(q) Voice synthesizers
(r) Video recorder
(s) Digital camera
(t) CCTV
(u) etc.

Software
(a) Email
(b) Data sharing apps (Bluetooth, ShareIt, etc.)
111 | P a g e
(c) Application packages ( Microsoft office)
(d) Antivirus software
(e) Graphics software
(f) Internet software

Question and possible answers


Discuss the advantages and disadvantages of ICTs in education.

(a) Advantages of ICT in education


i. It improves concentration and comprehension. The activities carried out through
digital and interactive tools increase student concentration and, therefore, they
assimilate concepts more quickly, enhancing learning. This type of tool involves
students in more practical learning, with the aim of reinforcing what they have
learnt.

ii. It promotes student flexibility and autonomy. New technologies promote


autonomous learning for students. With the incorporation of digital alternatives such
as online courses, each student can learn at their own pace, optimizing time and
resources thanks to the flexibility provided by digitalization and connectivity.

iii. It encourages critical thinking. The diverse sources of information that technologies
provide bring new points of view to students. In this way, information and
communication technologies encourage debate and the acceptance of other people’s
opinions. In addition, the exchange of thoughts allows students to learn about
different cultures.

iv. It facilitates communication between teachers and students. The whole educational
community has quick access to the same resources. In this way, digital tools allow
direct and immediate interaction, without the need to be physically present. This was
especially important during the confinement experienced during the 2020 health
crisis.

v. Increased classroom productivity and collaborative work. New technologies in the


classroom, specifically those that allow access to online content, improve learning
productivity by optimizing instruction time, and thanks to connectivity, it feeds
collaborative work, thanks to new teaching formulas.

vi. It stimulates motivation. The incorporation of technologies in the classroom


improves the motivation of students, it is a quick and practical technique to stimulate
the study of new concepts. Digital tools are the daily communicative support of the
new generations, therefore, they are easily handled in this environment.

vii. It incorporates new learning methods. Another of the advantages of ICT in education
is that teaching professionals can incorporate new teaching methodologies, thus
improving academic results and encouraging dynamism in the classroom. Moreover,
their use implies the development of the digital skills needed to avoid the digital
divide.

112 | P a g e
Disadvantages of ICT in education
i. Distractions and lack of attention. Digitalization means opening up unlimited access to
multiple resources and sources of information, such as web pages, social networks or
chats, and therefore, they take attention away from the subject matter.
ii. Excessive impact. Excessive and inappropriate use can lead students to a compulsive
relationship with technology, which can lead to an inability to control consumption
and, consequently, have adverse effects on the student’s health, social, family and
academic life.
iii. It reduces the development of other skills. Practices such as writing, public speaking
and reasoning may be nullified by the widespread adoption of digitization in
academic institutions. This has been demonstrated in a recent study conducted by the
University of California. The report details that the social skills of the new
generations are based on the digital environment, therefore, direct personal
communication can be affected.
iv. Consumption of false information. Much of the information available on the internet is
false or incomplete. This fact has a direct influence on the media literacy of students,
especially in the early educational stage, since half of them do not know how to
detect false news.
v. Theft of personal data. A lack of knowledge about the dangers of cybercrime can
unintentionally expose pupils’ data, especially if they are minors, for example, by
sharing photos with strangers.
vi. It reduces human contact. With the incorporation of new technologies, the learning
process becomes more distant and the physical relationship with teachers and
classmates decreases. As a consequence, by reducing human contact, isolation can
appear and become an obstacle to students’ personal development.
vii. It amplifies bullying. A complex subject to deal with and one of the biggest risks is
bullying. The lack of physical contact can lead to a loss of assertiveness and misuse
of online tools and platforms, which can lead to digital bullying situations.

113 | P a g e
Computer Aided Design
Computer-aided design (CAD) is a way to digitally create 2D drawings and 3D models of real-world
products before they’re produced by manufacturing companies. With 3D CAD, you can share, review,
simulate, and modify designs easily, opening doors to innovative and differentiated products that get to
the market fast.
The most common types of CAD:

2D CAD
Two-dimensional, or 2D CAD, involves creating flat, two-dimensional drawings composed of lines,
circles, and curves. 2D computer-aided design is generally used for architectural blueprints or
engineering layouts, such as building plan drawings etc.

3D CAD
Three-dimensional CAD, or 3D CAD, is more advanced and involves the creation of solid objects in
a three-dimensional space. 3D CAD allows engineers and architects to view and manipulate their
designs from different angles, giving them a better understanding of how the final product will look
and function.

Freeform CAD
Freeform CAD tools allow for the design of complex and unconventional shapes that may not be
possible with traditional 2D or 3D CAD tools. This type of computer-aided design is frequently
used in the fashion and entertainment industries for tasks such as designing clothing or creating CGI

Five examples of CAD software:


 AutoCAD: One of the first CAD software to hit the market was AutoCAD from Autodesk,
which has a strong reputation in several industries. This CAD program is used for 2D and
3D drafting and design. It can produce designs, equipment layouts, section planes, model
documentation, and more. The secret to success is mastering AutoCAD and other 3D CAD
programs. The software is designed for experts with backgrounds in algorithmic model
programming.

 SolidWorks: This 3D modelling CAD software is widely utilized in the mechanical


engineering and design fields. A variety of capabilities, including tools for design
validation or reverse engineering, are included in the Solid works software.

114 | P a g e
 FreeCAD: FreeCAD is an open-source parametric modeller that excels in all vital CAD
applications, including product design, mechanical engineering, and architecture.
Developers used Python to build the top layers of FreeCAD, which is already equipped
with program customization features. You can use the 2D forms you create with FreeCAD
as a starting point to design other items. It’s a multiplatform (Windows 11, Mac, and
Linux), highly customizable, and extendable piece of software.

 TinkerCAD: A web browser-based 3D modelling tool called Tinker CAD is available


online and is free to use. It gained popularity as a tool for making models for 3D printing
since it became accessible in 2011.

 Inventor: The Autodesk-provided CAD software is a powerful program built specifically


for mechanical design, making it a specialized tool for 3D design, documentation, and
product simulation. With integrated tools for sheet metal, frame, tube, and power design,
the software Inventor combines parametric, direct, free-form, and rule-based design
functions. Additionally, this CAD software facilitates the interchange of ideas via a secure
cloud-based service and links designs with incoming client data.

Where is Computer-Aided Design Used?


CAD is employed in a wide range of industries, from architecture and engineering to fashion design
and entertainment. This technology has become a cornerstone for many businesses, enabling them to
streamline their design processes and produce more detailed and accurate designs.

Engineering Projects
Engineers use CAD for creating designs and technical drawings of machinery, systems, and
infrastructure. For example, CAD is employed in designing automotive parts, bridges, tunnels, and
even in aerospace technology for designing aircraft and space vehicles.

Architecture and Interior Design


CAD plays a pivotal role in both architecture and interior design. Architects use it to create detailed
architectural designs, from conceptual design to layout, and the final draft. The designs are not just
limited to the building’s exterior but also include intricate interior design details. Interior designers
use CAD to optimize space, experiment with different layouts, and visualize the f inal look in 3D
before the physical implementation begins. The CAD model becomes a valuable communication
tool between architects, interior designers, and clients.

Manufacturing and Product Design


Computer-aided design significantly influences the manufacturing industry, radically changing
traditional manufacturing methods. It enables the generation of accurate 3D models of product
designs, which serve as a digital prototype before the actual manufacturing begins. CAD’s precision
helps in identifying possible design flaws, thereby lowering product development costs. Moreover,
CAD facilitates rapid prototyping, reducing the need for costly physical prototypes. In the realm of
product design, CAD proves crucial for a multitude of objects. From creating complex electronic
devices to simple furniture pieces, CAD makes it all seamless. Even industries like jewellery and
fashion have embraced CAD to create intricate designs.

Education and Training


Many educational institutes offer CAD certificate programs that equip learners with the skills
necessary to work with CAD systems effectively. Students pursuing an associate or bachelor’s
degree in engineering, architecture, and similar fields often find CAD training to be an essential part

115 | P a g e
of their curriculum. In High schools and colleges CAD software’s are mainly used by students in
technical and practical areas such as
 Computer science
 Agriculture
 Technical graphics
 Fashions and fabrics etc.

Automotive Industry
In the automotive industry, CAD is used to design every component of a vehicle, from the
bodywork to the engine parts. This allows manufacturers to test and modify designs before a
physical prototype is created, thus saving time and money.

Fashion Industry
The fashion industry also reaps the benefits of CAD by creating digital prototypes of clothing
designs. These virtual models can be altered and tested for various materials and cuts before any
physical components are produced.
What are the Benefits of CAD over Traditional Sketching and Manual Drafting?

The advent of CAD has redefined traditional sketching and manual drafting, bringing a plethora of
advantages. Here are a few:
 Accuracy and Precision: CAD tools offer a level of detail and precision that is hard to
match with manual drafting. They allow the user to zoom in and modify the design to the
smallest detail, leading to a higher quality final draft.
 Efficiency and Productivity: With CAD, design changes and updates can be executed
swiftly, without having to start from scratch as in manual drafting. This increases
productivity by saving time and resources.
 3D Visualization: Unlike manual drafting, CAD provides the ability to create and
manipulate 3D models. These 3D models offer a better understanding of the design,
including a realistic visualization of the final product.
 Error Reduction: CAD software comes with features that automatically check for
inconsistencies, design flaws, or errors in the model, significantly reducing the chance of
mistakes.
 Ease of Sharing and Collaboration: CAD files can be easily shared and accessed across
different platforms, making it easier for teams to collaborate. Digital files also simplify the
process of maintaining, tracking, and updating design documents.

Are There Any Disadvantages of Using CAD?


 High-end CAD software can be expensive to purchase and maintain. Also, the hardware
needed to run these programs efficiently can also entail a significant investment.
 Learning CAD can also be challenging. While some basic CAD software is user-friendly,
more advanced systems can have steep learning curves. Professionals may require extensive
training to master these tools.
 Additionally, over-reliance on CAD could potentially stifle creativity. As designs are
constrained by the capabilities of the software, designers may find their creativity limited by
the tool rather than enhanced by it.

What are the Differences between CAD and CAM?


CAD and CAM are two technologies often used together in the design and manufacturing industries.
While they both play crucial roles in these sectors, they serve different purposes.
CAD, or Computer-Aided Design, as we’ve explored, involves using computer software to create,
modify, analyse, or optimize a design. It is predominantly used in the design stage of a product’s

116 | P a g e
lifecycle, turning conceptual design into detailed, technical drawings and 3D models. It ensures that
designs are precise, amendable, and ready for production or construction.
On the other hand, CAM, which stands for Computer-Aided Manufacturing, is the use of software
and computer-controlled machinery to automate manufacturing processes. It is typically used after
the design phase. CAM software takes the design data from CAD software and uses it to control the
machinery that creates the final product. It facilitates the manufacturing process by providing
detailed instructions to CNC machines about how to make the product.

What are Future Trends in CAD?


As we look towards the future, CAD is poised for exciting developments. Here are some trends we
expect to shape the CAD landscape:
 Cloud-Based CAD: As with many other software applications, computer-aided design is
moving towards the cloud. Cloud-based CAD allows for better collaboration, easier access
to designs from anywhere, and lower costs as it eliminates the need for expensive
hardware and continual software upgrades.
 Artificial Intelligence (AI) and Machine Learning (ML): AI and ML are set to play a
substantial role in CAD. These technologies can automate routine design tasks, identify
design patterns, and even suggest design improvements, making the design process more
efficient and intelligent.
 Virtual Reality (VR) and Augmented Reality (AR): VR and AR can provide immersive
design experiences, allowing designers to visualize and interact with 3D models in a more
realistic environment. They can also be used to present designs to clients in a more
engaging and understandable way.
 Generative Design: This is a design method where the designer inputs goals and constraints
into the CAD software, and the software uses algorithms to generate optimal design
options. It allows designers to explore a wide range of design possibilities quickly and can
lead to innovative solutions that a human designer might not consider.

117 | P a g e
Computer Assisted Learning/Computer assisted Instruction
Computer Assisted Instruction (CAI) is defined as the use of computers and software applications to
teach concepts or skills. Computer-assisted learning is the process of using computers and software
applications to help students learn. Both Computer assisted instruction and Computer assisted learning
commonly refer to the use of computers and software applications for teaching-learning activities.

It includes the use of other electronics such as CD or MP3 players (or record players in the 1960s), DVD
players, tablets, smartphones and televisions, desktops, internet searches, etc. for teaching and learning
purposes. These tools can be used to better illustrate a point the teacher is trying to make, or to heighten
engagement among students.

The following terms all refer to variation of computer assisted learning or instruction.
Computer Aided Learning (CAL)
Computer Aided Instruction (CAI)
Computer Based Education (CBE) – This includes teaching and learning
Computer Based Instruction (CBI)
Computer Enriched Instruction (CEI)
Computer Managed Instruction (CMI) New Terminology
Web Based Training - (This is solely internet based)
Web Based Learning - (This is solely internet based)
Web Based Instruction-(This is solely internet based)

APPLICATION OF CAL/CAI

Visual Learning
Many students are visual learners, and benefit greatly from seeing an image or an example of the terms
being discussed in class. Computers are a great help with this, because teachers have the entire internet at
their disposal. You can easily search the web for pictures to help your students see what you mean and
have an image to associate with the word you’re describing. You can also use videos from DVDs,
YouTube or your own personal projects to help illustrate a point. Seeing something really happening or
really being used in a video makes it much more real to the learner, so they remember it much longer.

Learning through audio

118 | P a g e
Listening practice is a vital part of learning. CAL helps with this by enabling you to play music or record
conversations, so your students can listen to what is being said. They can then emulate the speakers and
try to say concepts as they have heard them.

Tests
Computers are a great way to give students exams. You can either create your own test or have them sit at
the classroom computers to take it, or you can find pre-written tests and other exam materials on the
internet and use those in your lessons. Taking tests on the computer can help students feel less rushed and
can make them feel as if they have more privacy than they would if they were in a crowded classroom.
Computers can mark the test and provide feedback to learners.

Games
Games are perhaps one of the best ways to use CAL in the classroom. Students (especially young ones)
love playing computer games or doing puzzles or crosswords etc. in an edutainment environment.

Internet searches
Another way where students do searches of information such as definition of terms etc. on the internet.

Online Courses
CAL can include online courses. These courses can be taken on one’s own time at home, possibly as a
part of a full college course load, or they can be taken as a supplement to a subject they are already taking
in person.

Online Collaborator learning


Online collaborative learning means participants learning together in teams using information
communication technologies. One of the most common uses is online-discussion boards between
classmates and the instructor.

• Tutorials

Tutorial software provides information about diverse topics, essentially taking on the role of the
instructor. In many cases, the technology quizzes and evaluates the student’s comprehension of the
subject matter using an interactive process and delivering feedback.

QUESTION:
1. Explain how you can employ each of the above stated CAL applications to teach the topic of your
choice in your subject area.
2. Explain how disabled students can use CA/CAI in schools. I.e. (deaf, dump, visually impaired
and hand-capped.)

Advantages of CAL/CAI
 Are infinitely patient
 Never get tired
 Never get frustrated or angry
 Allow students to work privately
 Never forget to correct or praise
 Are fun and entertaining Individualize learning
 Are self-paced
 Do not embarrass students who make mistakes
 Make it possible to experiment with different options
119 | P a g e
 Give immediate feedback
 Are more objective than teachers
 Free teachers for more meaningful contact with students
 Are impartial to race or ethnicity
 Are great motivators
 Give a sense of control over learning
 Are excellent for drill and practice
 Call for using sight, hearing, and touch
 Teach in small increments
 Help students improve their language usage
 Build proficiency in computer use, which will be valuable later in life
 Eliminate the drudgery of doing certain learning activities by hand (e.g., drawing graphs)
 Work rapidly--closer to the rate of human thought.
  It can utilize the capabilities of multimedia.
  It can enhance decision making abilities, etc.

Disadvantages of CAL/CAI
 -It Can Be Expensive
Cost is perhaps the biggest barrier to using CAL in the classroom. Computers, electronic devices
and software are expensive. As such, having a computer for each student is just not a realistic
goal for some classrooms.

 It Can Be Difficult for Teachers to Implement


Any time electronics become involved in something, it gets more complicated, at least initially.
Teachers have to learn how to use the tech themselves before they can have their students use it,
and sometimes the proper training can take up a lot of precious time. We have all had that teacher
who wastes a bunch of time during the lesson because they don’t know how to use the computer
or the overhead projector… no one wants to be that teacher!

 CAL Activities Don’t Always Fit the Teacher’s Goals


When using third-party programs, videos or lessons, it’s sometimes hard to find one that exactly
fits your needs or teaching style. There are going to be times when an online quiz doesn’t have
the exact words you want to test for, or that the video you are watching uses every part of speech
you need to highlight. Teachers have to find a way to integrate CAL into their lessons without
letting it dictate the material to be learned, and sometimes finding the balance can be tough.

 It Can Lead to Isolation Among Students


While an individual, personalized learning experience is a good thing, the isolation it can lead to
is not. Just imagine a classroom full of students, each at their own computer, not looking at each
other and only interacting with that computer in front of them. Socializing is an important part of
language use, and we learn new things about language from interacting with each other. Students
need other students to help them learn, and CAL can inhibit this.

 Some of the content in a CAL/CAI package can be outdated.

Some CAL software tools you can make use


 Tutorial software’s e.g. W3 schools
 Social media software e.g. YouTube, WhatsApp
 Problem solving software e.g. Shapeup
120 | P a g e
 Simulation software e.g. Games etc.
 Tool software- for educational tools e.g. Inspirational)
 Moodle
 Modelena
 Google classroom
 Myvista
 Microsoft Azure
 MATLAB
 etc.

E-LEARNING

E learning is any form of learning in which digital communication, electronic devices or the internet is
used to support the learning process.

It is the use of technology to enable people to learn anytime and anywhere i.e. learning through the use of
electronic media(such as TVs, Computers, radios, CD ROMs, audio and video, online lectures, e-mail,
screen sharing, chats, fax, news groups, quick reference guides, etc. ) It is important to remember that it
does not necessarily require either a computer or an internet connection but only the use of electronics.

Online Teaching and Learning


When teaching and learning is web based/internet based it is called online teaching or learning. Social
media, Learning management software, You-tube, Virtual classrooms etc. are a few of many forms of
online platforms for teaching and learning.
M-learning
Mobile learning means learning using portable devices that allow the student to learn in different
environments and whilst on the move instead of being restricted to a classroom setting or tied to a
desk. Mobile learning is, of course, by its electronic nature, a subset of e-learning, but it refers far
more specifically to these handheld devices and portable technology.

Advantages and Disadvantages of eLearning


 Class work can be scheduled around work and family
 Reduces travel time and travel costs for off-campus students
 Students may have the option to select learning materials that meets their level of knowledge and
interest
 Students can study anywhere they have access to a computer and Internet connection
 Self-paced learning modules allow students to work at their own pace
 Flexibility to join discussions in the bulletin board threaded discussion areas at any hour, or visit
with classmates and instructors remotely in chat rooms
 Instructors and students both report eLearning fosters more interaction among students and
instructors than in large lecture courses
 eLearning can accommodate different learning styles and facilitate learning through a variety of
activities
 Develops knowledge of the Internet and computers skills that will help learners throughout their
lives and careers

121 | P a g e
 Successfully completing online or computer-based courses builds self-knowledge and self-
confidence and encourages students to take responsibility for their learning
 Learners can test out of or skim over materials already mastered and concentrate efforts in
mastering areas containing new information and/or skills
 Faster delivery. Organizing training sessions can be time-consuming and expensive—especially
if your employees are scattered around the country or the world. With e-learning, employees can
get the training they need when they need
 Learners may have the option to select learning materials that meets their level of knowledge and
interest
 Learners can study wherever they have access to a computer and Internet
 Self-paced learning modules allow learners to work at their own pace
 Flexibility to join discussions in the bulletin board threaded discussion areas at any hour, or visit
with classmates and instructors remotely in chat rooms
 Different learning styles are addressed and facilitation of learning occurs through varied activities
 Development of computer and Internet skills that are transferable to other facets of learner's lives
 Successfully completing online or computer-based courses builds self-knowledge and self-
confidence and encourages students to take responsibility for their learning

Disadvantages of online or computer-based learning


Learners with low motivation or bad study habits may fall behind
 Without the routine structures of a traditional class, students may get lost or confused about course
activities and deadlines
 Students may feel isolated from the instructor and classmates
 Instructor may not always be available when students are studying or need help
 Slow Internet connections or older computers may make accessing course materials frustrating
 Managing computer files and online learning software can sometimes seem complex for students
with beginner-level computer skills
 Hands-on or lab work is difficult to simulate in a virtual classroom
 Unmotivated learners or those with poor study habits may fall behind
 Lack of familiar structure and routine may take getting used to
 Students may feel isolated or miss social interaction
 Instructor may not always be available on demand
 Slow or unreliable Internet connections can be frustrating
 Managing learning software can involve a learning curve
 Some courses such as traditional hands-on courses can be difficult to simulate

122 | P a g e
The Internet
Internet (International Network)

The internet (THE INFORMATION SUPERHIGHWAY)


The internet is a global network of interconnected networks connected to each other by telephone
lines and satellite systems. It is a worldwide network of computer networks.

The Internet is a complicated information storage system where files are located in thousands of
sites across the world. The files contain a variety of information ranging from text, graphics, and
software, video and audio recordings.

Internet Service Providers (ISP)


Are government, large companies or universities which run networks that acts as a gateway and
connects all other users to the Internet.
Individuals and other companies go through these companies to have a connection on the Internet.
In Zimbabwe examples of the ISPs are:

(a) Africa online


(b) samara
(c) zarnet
(d) mweb
(e) ecoweb
(f) econet
(g) ZOL

ISP may also be referred to as IAP (Internet Access Providers). They sale internet services to uses.
This is where we make payment to, to get airtime for using the internet. Once registered with an
ISP, users are given an Internet address that makes it possible for his or computer to be identified
on the internet.

Internet Address

123 | P a g e
In order to access content on the internet, a uniform resource locator, or URL, is required, which is also
known as a web address.

Parts of an Internet Address

Protocol: The protocol defines how your browser handles the data and what type of connection is
established. EXAMPLES ARE (HTTP) (HTTPS (FTP)

Domain Name: The domain name part of the web address is the unique identifier for the website on the
internet. It is usually made up of the name of the website in order to make it easy for visitors to
remember. In the web address "http://www.fbi.gov/about-us" for example, the domain name is the
"fbi.gov" part.

Domain Extension: The domain extension follows the domain name and is used to denote what type of
website it is. For example, a government website ends in the extension ".gov" while an education website
might end in ".edu." The ".com" extension used to denote a commercial website

Path : The path is the section of the web address after the domain extension that indicates to your browser
which folder or file to open. In the web address "http://www.fbi.gov/about-us/cjis/background-
checks/address-verification/addresscard.pdf" for example, the path is the "/about-us/cjis/background-
check/

Filename: The name of the file one is searching on the net.


"addresscard.pdf" is the filename.

The most common types of top-level domains are:


Educational Besides the institution's official web pages, students or faculty members can
.edu Institution also publish personal pages on these web sites.
Anyone, anywhere in the world can have this type of web site. This is the
most common type of site for companies and is often used to advertise and
Commercial sell products, as well as to post company annual reports and other financial
.com Entity information. Online journals or newspapers also have .com web pages.
This designation is used for any type of organization, including nonprofit
.org Organization organizations.
Originally designated for organizations directly involved in Internet
organizations, .net can now be used by anyone -- companies, organizations,
Network and individuals. It is often used by businesses when the desired name under
.net Provider, etc. ".com" is already registered by another organization.

Originally only for the federal government, .gov is now used for any level of
government. These sites are used to publish tax forms, census information,
.gov Government legislation, and other government news or information.

What can we do with the internet?


(Internet services)

124 | P a g e
(a) e-mail facility – one can create an e-mail address on the Internet and send or receive e-
mail messages
(b) browsing and downloading information to one’s computer
(c) file transfer from one computer to another using the FTP(File Transfer Protocol)
(d) Internet shopping and banking
(e) newsgroups and chartrooms which allows one to access a wide range of information
and postings from various registered users
(f) previewing movies and playing audio recordings(music)
(g) business and academic research
(h) electronic libraries which allows one to access an electronic copy of a book provided
you a registered member
(i) viewing some TV channels and radio stations
(j) bulletin board services where one can post a question which will be answered by
anyone
(k) e-commerce (buying and selling over the internet)
(l) teleconferencing(a methods of holding discussions with several people in different
location over the internet)

Equipment Necessary To Access The Internet


(a) PC
(b) MODEM (Modulator / DEModulator)
(c) Telephone line
(d) Specialist connection software(provided by ISP)

Once you have the above, you then contact an ISP who will issue the following:

(a) IP( Internet Protocol) address


(b) Telephone number(to dial in order to get a connection)

ADVANATGES OF THE INTERNET DISADVANTAGES OF INTERNET


-can be accessed from anywhere -expensive equipment used
-information is up to date -One needs training ,knowledge and skills to
-multimedia can be used use internet
-huge amounts of information available -problems of hackers
-Search engine assist in finding information -problems of virus distribution
-different types of computers can be used -facilitates breaking of copyright rules
-using emails makes communication easier -leads to loss of privacy
and cheaper -causes addiction
-pornography to young people is an ethical
problem

E-Mail (Electronic Mail)


Is a text message created on a computer and sent over a computer and telecommunications
network. The text message is sent over a telephone system from the sending computer to a
central computer known as the electronic post office, which allocates disk space to act as
an electronic mail box for each user. To access the mailbox, the user will have to enter the
password, which acts as a key to the mailbox. The password is important because it acts as
a security measure for the mailbox. To be able to use and receive e-mails, the user must

125 | P a g e
have an e-mail address and a computer connected to a telephone line with either an in-built
MODEM or external MODEM.

Example of an e-mail address

The above simply means, tindo has an e-mail account with an academic institution called
mutareteachers based in Zimbabwe.
NOTE:
Ac: refers to academic institution such as college, university or school
Org: refers to organization
Co/com : refers to company or co-operation or commercial organization

E-mail address may differ with organizations as shown below:

[email protected]
[email protected]
[email protected],
[email protected]

The whole e-mail address is written in small letters.

E-Commerce
E-commerce is buying and selling goods and service online. It is doing business on the
Internet. Below are example of e-commerce

 Online shopping
Buying and selling goods on the Internet. Buyers browse and purchase products with mouse
clicks.

 Electronic Payments
When you are buying goods online and paying online. It reduces the inefficiency associated
with writing and mailing cheques. It also does away with many of the safety issues that arise
due to payment made in currency notes.

 Online auctions
Online auctions are an efficient mechanism for price discovery. Many buyers find the auction
shopping mechanism much interesting than regular storefront shopping.

 Internet banking
Performing bank transaction using the internet, such as money transfers.

 Online ticketing
Air tickets, movie tickets, train tickets, play tickets, tickets to sporting events, and just about
any kind of tickets can be booked online. Online ticketing does away with the need to queue
up at ticket counters.
126 | P a g e
Advantages of Ecommerce
 Faster buying/selling procedure, as well as easy to find products.
 Buying/selling 24/7.
 More reach to customers, there is no theoretical geographic limitations.
 Low operational costs and better quality of services.
 No need of physical company set-ups.
 Easy to start and manage a business.
 Customers can easily select products from different providers without moving around
physically.
 Using E-commerce site will decrease the cost related with client’s base,
consumer loyalties and higher deals it produces.
 The Problems related with running a retail location will lessen on the grounds
due to reason that exchange is done through a site and not through a guiding
store, likewise, the cost of lighting, leasing, staffing and restocking a store will
totally take out.
 Your business can reach every corner of the geographical location, it empowers
the business to reach in worldwide markets with national and global requests.
What’s more, your business action is no longer limited with any geological
limitations.
 With this, and even private company can get to the worldwide markets for
offering and purchasing of products and ventures.
 The client or consumer can buy and pay the amount and transactions is carried
out 24 hours a day and on holidays and weekends.
 It gives the consumer an option to compare the prices and at the same time also
benefited the customers for cheaper products at fine quality.
 No need to stand in big queues or on hold waiting for your turn.
 Various amazing deals and coupons are available to provide an extra discount.
 Managing the stocks, and inventory is an easy process also the records of
payments and payouts can be done easily.

Disadvantages of Ecommerce
 Any one, good or bad, can easily start a business. And there are many bad sites which
eat up customers’ money.
 There is no guarantee of product quality.
 Mechanical failures can cause unpredictable effects on the total processes.
 As there is minimum chance of direct customer to company interactions, customer
loyalty is always on a check.
 There are many hackers who look for opportunities, and thus an ecommerce site,
service, payment gateways, all are always prone to attack.
 Delivery time of the product is more.
 Unavailability of touching off and feeling of the product.
 In case of items of clothing you have to buy without trying.
 Sometimes wrong or damaged product is delivered then the problem of returning
and getting money back is a still difficult process.
 You have to wait for the delivery person because he can come at any time doesn't
matter you are busy or what you have to collect your item or should wait for
some extra days.
 Sometimes you find an image of the product very attractive but the product you
received does not match with the image you actually viewed on the website.

127 | P a g e
 Internet access is still not cheaper and is inconvenient to use for many potential
customers like one living in remote villages.
 Every people is not digitally literate so that he/she is not capable of buying the
product.

INTERNET, INTRANET AND EXTRANET

Difference between internet, intranets and extranets differ?

THE INTERNET
International network of computers.
The internet is defined as a global network of linked computers, servers, phones, and smart appliances that
communicate with each other using the transmission control protocol (TCP) standard to enable the fast
exchange of information and files, along with other types of services.

Uses of the Internet


Some of the important usages of the internet are:
 Online Businesses (E-commerce): Online shopping websites have made our life easier, e-commerce
sites like Amazon, Flipkart, and Myntra are providing very spectacular services with just one click
and this is a great use of the Internet.
 Cashless Transactions: All the merchandising companies are offering services to their customers to
pay the bills of the products online via various digital payment apps like Paytm, Google Pay, etc.
UPI payment gateway is also increasing day by day. Digital payment industries are growing at a rate
of 50% every year too because of the INTERNET.
 Education: It is the internet facility that provides a whole bunch of educational material to everyone
through any server across the web. Those who are unable to attend physical classes can choose any
course from the internet and can have point-to-point knowledge of it just by sitting at home. High-
class faculties are teaching online on digital platforms and providing quality education to students
with the help of the Internet.
 Social Networking: The purpose of social networking sites and apps is to connect people all over
the world. With the help of social networking sites, we can talk, and share videos, and images with
our loved ones when they are far away from us. Also, we can create groups for discussion or for
meetings.
 Entertainment: The Internet is also used for entertainment. There are numerous entertainment
options available on the internet like watching movies, playing games, listening to music, etc. You
can also download movies, games, songs, TV Serial, etc., easily from the internet.
Security and the Internet
Very huge amount of data is managed across the Internet almost the time, which leads to the risk of data
breaching and many other security issues. Both Hackers and Crackers can lead to disrupting the network
and can steal important information like Login Credentials, Banking Credentials, etc.

Steps to Protect the Online Privacy


 Install Antivirus or Antimalware.
 Create random and difficult passwords, so that it becomes difficult to guess.
 Use a private browsing window or VPN for using the Internet.
 Try to use HTTPS only for better protection.
 Try to make your Social Media Account Private.
 If you are not using any application, which requires GPS, then you can turn GPS off.
 Do not simply close the tab, first log out from that account, then close the tab.
 Try to avoid accessing public Wi-Fi or hotspots.
 Try to avoid opening or downloading content from unknown sources.

128 | P a g e
There is an element of the Internet called the Dark Web, which is not accessible from standard browsers.
To keep safe our data, we can use Tor and I2P, which helps in keeping our data anonymous that helps in
protecting user security, and helps in reducing cybercrime.

Social Impact of the Internet


The social impact of the Internet can be seen in both ways. Some say it has a positive impact as it helps
in gaining civic engagement, etc. whereas some say it has a negative impact as it increased the risk of
getting fooled by someone over the internet, getting withdrawal from society, etc.
Whatever the impact of Social Media, one thing is that it changed the way of connecting and interacting
with others in society. The number of people increasing day by day on social media platforms which
helps in constructing new relationships over social media, new communities are made on social media in
the interest of the people. Social Media platforms like Facebook, Instagram, LinkedIn, etc. are the most
used social media platform for both individual and business purposes where we can communicate with
them and perform our tasks.

Advantages of the Internet


 Online Banking and Transaction: The Internet allows us to transfer money online through the net
banking system. Money can be credited or debited from one account to the other.
 Education, Online Jobs, Freelancing: Through the Internet, we are able to get more jobs via online
platforms like LinkedIn and to reach more job providers. Freelancing on the other hand has helped
the youth to earn a side income and the best part is all this can be done via the INTERNET.
 Entertainment: There are numerous options for entertainment online we can listen to music, play
games can watch movies, and web series, and listen to podcasts, YouTube itself is a hub of knowledge
as well as entertainment.
 New Job Roles: The Internet has given us access to social media, and digital products so we are
having numerous new job opportunities like digital marketing and social media marketing online
businesses are earning huge amounts of money just because the Internet is the medium to help us to
do so.
 Best Communication Medium: The communication barrier has been removed from the Internet.
You can send messages via email, WhatsApp, and Facebook. Voice chatting and video conferencing
are also available to help you to do important meetings online.
 Comfort to humans: Without putting any physical effort you can do so many things like shopping
online it can be anything from stationeries to clothes, books to personal items, etc. You can books
train and plane tickets online.
 GPS Tracking and google maps: Yet another advantage of the internet is that you are able to find
any road in any direction, and areas with less traffic with the help of GPS on your mobile.

Disadvantages of the Internet


 Time Wastage: Wasting too much time on the internet surfing social media apps and doing nothing
decreases your productivity rather than wasting time on scrolling social media apps one should utilize
that time in doing something skillful and even more productive.
 Bad Impacts on Health: Spending too much time on the internet causes bad impacts on your health
physical body needs some outdoor games exercise and many more things. Looking at the screen for
a longer duration causes serious impacts on the eyes.
 Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some of the crimes
which are on the verge these days. Your system which contains all the confidential data can be easily
hacked by cybercriminals.
 Effects on Children: Small children are heavily addicted to the Internet watching movies, and games
all the time is not good for their overall personality as well as social development.
 Bullying and Spreading Negativity: The Internet has given a free tool in the form of social media
apps to all those people who always try to spread negativity with very revolting and shameful
messages and try to bully each other which is wrong.

129 | P a g e
THE INTRANET
An intranet works on a private network of computers. Only authorized people and systems can access it.
It is contained within an enterprise that is used to securely share company information and computing
resources among employees. An intranet can also be used for working in groups and teleconferences.
Intranets encourage communication within an organization. They let employees easily access important
information, links, applications, forms and databases of company records. A database that includes all the
usernames of employees who have access rights to the network is often used to maintain intranet security.

How are intranets used?


Organizations use intranets in a variety of ways depending on their needs. These include the following:
 Central repository. Intranets become the main repository where important information and company
data are stored.
 Collaboration. These internal networks provide a way to share information that makes it easier for
employees to work together.
 Personalization. Intranets provide personalized content to employees based on their role within the
company.
 Communication. They make employee directories, company news and organization charts readily
available, improving internal corporate communications.
 Easy access to information. Intranets provide easy access to information about company policies,
benefits and updates.
 Social elements. Social media features let employees create an account, post content and status alerts
and browse a newsfeed.
 Project management. To-do lists, employee directories, status updates and other resources aid users
in project management.
 Automation. Intranets streamline everyday activities by helping to automate repeatable tasks.

What are the advantages of an intranet?


Some potential benefits of using an intranet include the following:
 improved communication, information sharing and collaboration within a business;
 simplified records management;
 streamlined tracking of requests;
 a testing environment for new ideas before they are implemented on a company's webpage;
 improved corporate culture that focuses on employees and encourages participation and interaction;
and
 A favorable return on investment from low implementation and operating costs.

What are the disadvantages of an intranet?


There are also challenges when implementing an intranet, including these:
 Low user participation rates can result in a lack of the content, communications and documents
needed to make the intranet beneficial.
 The high cost of personnel leads to inadequate support for intranet users. As a result, when
software bugs or other issues arise, problems are not resolved quickly.
 The network must be managed, with regular inspections and maintenance checks to ensure it is
running properly and content is fresh and relevant.
 A lack of proper ownership or ownership being distributed among groups complicates network
responsibilities and management.
 A lack of mobile device and remote support creates problems, including limiting the ability of remote
workers to access information on the intranet.

EXTRANET
An extranet is an intranet that grants access to those outside of an organization to certain information and
applications. Third parties such as business partners, suppliers, vendors, key customers, other
130 | P a g e
organisations, vendors etc. are given access to certain parts of the organization's intranet. It is a private
network similar to an intranet, but typically open to external parties (authorised partners), the main
purpose of an extranet is to allow users to exchange data and
An Extranet (also known as company portal) allow companies to integrate operations with external
stakeholders where they can access information, view schedules, communicate with the business, submit
orders etc.

How extranet can benefit your business


As companies increasingly rely on geographically dispersed teams, finding efficient ways to
communicate and collaborate across borders becomes essential. Enter the world of extranets. If you've
ever asked yourself, "what is extranet?” you're about to discover the key to unlocking untapped potential
in business operations.

1. Improve collaboration with partners and supplies


What is extranet network in the world of modern business? Imagine a digital space where your
organisation can seamlessly connect with its partners, suppliers, and other third parties. No more time-
wasting email threads or miscommunicated directives.

Extranets allow for real-time collaboration on documents, clearer communication channels, and a
centralised space for all collaborative operations.

Consider a retail business that sources products from multiple suppliers globally. An extranet can offer a
dedicated space where suppliers upload their inventory in real-time, product specs are shared, and
collaborative edits on product designs are made seamlessly. Instead of lengthy email chains that could
lead to oversight, all communications are centralised, and everyone remains updated.

2. Enhanced Customer Service


From providing customers with a portal to view real-time order statuses to facilitating direct
communications, an extranet system ensures your customers are always in the loop. This transparency not
only enhances trust but also minimises potential misunderstandings and errors.

Take a real estate company, for instance. They could use an extranet portal where clients can log in to
view property documentation, check the progress of their property transactions, or even schedule
viewings. Such a system reduces miscommunication, builds trust, and provides customers with a sense of
involvement and clarity in the process.
3. Increased Efficiency
One of the significant advantages of extranet is its power to streamline processes. Instead of toggling
between various platforms or waiting on responses from external partners, an extranet centralises
interactions and necessary data. This reduces the time spent on administrative tasks, allowing teams to
focus on what they do best.

A large consultancy firm working on a nationwide project can use an extranet to consolidate research data
from various regions. Instead of multiple regional teams sending in reports in varying formats, they could
update a unified template on the extranet. This would ensure that when the head office collates data, it's
uniform, comprehensive, and ready for analysis.

4. Reduced Costs
While setting up an extranet might require an initial investment, the long-term savings are notable. Think
about the reduced overheads: fewer physical meetings mean less travel. Digitised and streamlined
processes mean less paperwork and quicker turnarounds. Over time, these savings can be substantial.

131 | P a g e
Securing Your Extranet / Portal
In a world where cyber threats are ever-evolving, securing your extranet should be top priority.
Remember, while intranets focus on internal operations, extranets are exposed to external entities, which
can sometimes introduce vulnerabilities.

 Authentication: Implement strong authentication methods. Two-factor authentication (2FA) or


multi-factor authentication (MFA) are excellent choices.
 Data Encryption: Ensure that data, both in transit and at rest, is encrypted. This shields sensitive
information from potential breaches.
 Regular Audits: Regularly evaluate and audit you’re extranet's security protocols. This proactive
approach helps in identifying potential vulnerabilities before they become threats.

Managing Your Extranet / Portal Users

With multiple users accessing the extranet, often from diverse geographical locations, user management is
crucial. Here's what to consider:

 Defined User Roles: Clearly define user roles. Not every partner or external entity needs access
to all information. Assign permissions based on roles to ensure data integrity.
 Onboarding & Training: As you onboard new users, provide them with adequate training. This
not only acquaints them with the platform but also informs them of best practices and security
protocols.
 Monitoring & Reporting: Keep a keen eye on user activity. Advanced CMS platforms will offer
detailed logging and reporting features. If any suspicious activity arises, being able to trace
actions back to specific users can be invaluable.

What are the Advantages and Disadvantages of Extranet?


Advantages:
 Enhanced collaboration with external stakeholders, streamlined supply chain management, and
better customer engagement.
 The key benefit of a quality extranet is the speed and ease at which you can share data and
communications with certain groups of people. Simply add information once, and you can set
access permissions to determine who will be able to view and use that information. This
information is accessible from any device and any location.
 With greater communication comes greater efficiency and productivity. An extranet helps to
reduce frustrations, frictions and miscommunications between your team and those who
communicate with them. You can save time on inventory management, workflows and a range of
other aspects.

Disadvantages:
 Potential security risks if not adequately managed and the need for ongoing maintenance and
monitoring.
 Extranets can be complex to plan and set up because every organization’s needs are different.
However, your choice in provider can make all the difference. Choosing a well-structured
extranet CMS and an experienced provider can result in a straightforward process and a
successful result.
 Extranets can be costly, but again your choice of provider can make all the difference between a
cost-prohibitive or cost-effective extranet solution. With Elcom, for example, you could even
choose to incorporate your intranet, e-learning and website CMS into the same system to
minimize costs.

132 | P a g e
ExamplesofExtranet/PortalApplications
1. Supplier Portals
Overview: Supplier Portals are a dedicated platform that allows businesses to manage and communicate
with their vendors and suppliers. It can oversee every aspect, from procurement to payments.

Example: A large retail chain utilising a supplier portal to coordinate with hundreds of suppliers. They
can place orders, track shipments, process invoices, and handle disputes, all within a unified space.

Benefits:
 Streamlined operations reducing order-to-delivery times.
 Real-time monitoring leading to better inventory management.
 Improved vendor relationships through transparent and efficient communication.

2. Collaborative and Community Portals


Overview: Collaboration and portals are dedicated platforms where multiple organisations can work
together on joint projects. It's a space where teams can share files, collaborate in real-time, and track
project milestones.

Example: A construction project involving employees, architects, contractors, suppliers, and regulatory
bodies. Each party can access relevant documents, provide input, and track project progress.

Benefits:
 Consolidation of resources, reducing back-and-forth and potential errors.
 Enhanced transparency among all stakeholders.
 Faster decision-making due to real-time updates and communication.

3. Customer Portals
Overview: These portals are designed to provide customers with a personalised space where they can
access resources, raise queries, or even make purchases. There are also membership portals for
customers who have signed up to membership programs.

Example: A software-as-a-service (SaaS) company offering a portal where clients can access training
materials, log support tickets, download software updates, and interact with community forums.

Benefits:
 Strengthened customer relationships through personalized experiences.
 Reduced customer support overheads as users can access self-help resources.
 Increased customer retention through the provision of value-added services.

4. Training Portals
Overview: Organisations, especially in sectors like healthcare or finance, often use extranets to provide
training modules and certification processes for external stakeholders.

Example: A pharmaceutical company offering an extranet platform where medical professionals can
access training on new drugs, attend webinars, and even obtain certifications after successful assessments.

Benefits:
 Ensuring that external professionals are up-to-date with the latest products or services.
 Establishing a standardized training mechanism.
 Building brand loyalty and credibility among professionals.

133 | P a g e
5. Partner Portals
Overview: Businesses can provide an up-to-date company information and communications exclusively
for their distributors and partners, allowing them to check availability, specifications, and pricing.

Example: An electronics manufacturer giving its global distributors access to their latest product range,
promotional materials, and even exclusive distributor discounts.

Benefits:
 Empowering partners with the information they need to sell effectively.
 Ensuring consistent product information dissemination.
 Enhancing sales strategies based on real-time product updates and availability.

To provide a clearer understanding, let's take a look at a concise comparison of these three platforms:
Characteristics Extranet / Portal Intranet Internet
Access Restricted to specific external and Restricted to organization Open to all users
internal users members worldwide
Purpose Collaboration with trusted Internal communications Global sharing and
external parties and operations communication
Security High (specific access controls) High (restricted to Varies (from highly
employees) secure to public)
Examples of Vendor management, supply chain Employee portals, HR Websites, global
Usage communications, partner resources, internal comms platforms, public
collaboration forums
Costs and Moderate (specific setup required) Moderate-High Low-Moderate
Infrastructure (customized setup) (depending on scale)

SMS
SMS, which stands for Short Message Service, is a text-based communication service. It is used to send
messages to mobile devices. SMS can be used on all mobile devices, and it’s not encrypted.

Task
1. There are three terms whose meanings are often confused. These are:
 Internet
 Intranet
 Extranet

Find the meaning of each and how they differ from each other.

2. How the internet be used for communication.

134 | P a g e

You might also like