DTE Module Notes - 064655
DTE Module Notes - 064655
EDUCATION
CS111 DRAFT Module notes
CONTENTS PAGE
Definitions 2
General Uses Of Computers 2-6
ICT Uses In Education 7-11
ICT Uses For Development 12-16
ICT Uses For Research 17-23
Health Issues Caused By Computers 24-27
Computer Security And Ethics 28-41
Types Of Computers 42-46
Input Devices 47-66
The System Unit & The CPU 67-69
Computer Output Devices 70-74
Computer Storage Devices 75-85
Computer Software 86-92
E-Waste Management 93-96
Mobile Device Systems 97-102
ICTs And Documentation 103-105
ICTs And Record Management 106-107
Computer Uses In Data Analysis 108-109
ICTs In The Classroom 110-113
Computer Aided Design 114-117
Computer Assisted Learning & Computer Assisted Instruction 118-122
The Internet 123-134
Practical Tasks and Guidelines: Windows Download from Moodle
Word Processing Download from Moodle
Spreadsheet Download from Moodle
Databases Download from Moodle
Presentation Download from Moodle
1|Page
Graphics Download from Moodle
WHAT IS ICT?
Information and Communication Technologies (ICT) is a broader term for Information Technology (IT),
which refers to all communication technologies, including the internet, wireless networks, cell phones,
computers, software, middleware, video-conferencing, social networking, and other media applications
and services enabling users to gather, access, retrieve, process, store, transmit/share, and manipulate
information in a digital form. A good way to think about ICT is to consider all the uses of digital
technologies that already exist to help individuals, businesses and organizations use information. These
technologies are widely used all over the world where Artificial intelligence (Expert systems, Robotics
and Language processors) is the cutting edge advancement in ICT.
ICTED
ICTED Means information and communication Technology in Education. At Mutare teachers college it is
offered as a preliminary course (ICTED100) studied in the first semester with an aim of making students
aware and harness ICTs both during training and in the world of work.
What is a computer?
A computer is an electronic machine that works under the control of a stored program. It has the ability to
accept data, process that data, store it, transmit it and also produce the desired output. “A computer is an
electronic device that is capable of receiving, processing, and storing data in order to perform various
tasks”. It consists of hardware components such as the central processing unit (CPU), memory modules,
storage devices, input and output devices, and various interconnected circuits. The computer’s hardware
works in conjunction with software, which includes operating systems, applications, and programming
languages, to enable a wide range of functions.
Input into a computer is called data and output from a computer is called information. Computers are
used as tools to make our everyday work or activities easier.
Computers are used to create documents, send emails, play games, watch videos or films, store
information in an organized way, and also do specialized work such as home security, household
cleaning, business calculations, architectural designs, image processing, etc.
2|Page
Computers come in different forms and sizes, including desktops, laptops, tablets, smartphones, servers,
and embedded systems in various devices. The evolution of computers spans several generations, from
early mechanical calculators and analog computers to the modern digital computers that we use today.
These advancements have led to improvements in processing power, storage capacity, and overall
efficiency, revolutionizing the way we live, work, and interact with technology.
Some of the reasons why people use computers are because of that they, do not make errors like
human, are faster than humans, can work in dangerous areas, have the ability to process several
complicated tasks at the same time, do not get tired-they can work 24/7, do not require a salary,
don’t forget or lose information easily, can store large amounts of information, can find information
faster than humans and can secure information better than we do ourselves.
The world is fast changing and computers are playing a central role in these changes. Studying
computers has therefore become a necessity than a choice.
The diagram below shows parts of a computer.
Task
3|Page
Sport management
Insurance
Transportation: Computers control and manage various transportation systems, including air traffic
control, railway networks, navigation systems in vehicles, and autonomous vehicles.
Security and Surveillance: Computers play a role in security systems, including surveillance
cameras, access control systems, and cybersecurity measures to protect digital assets and information.
Weather Forecasting: Supercomputers are used for weather modeling and forecasting, enabling
accurate predictions and warnings about natural disasters.
Agriculture: Computers assist in precision agriculture by analyzing data from sensors, satellites, and
drones to optimize planting, irrigation, and harvesting processes.
Space Exploration: Computers are vital for controlling space missions, analyzing space data, and
managing satellite communication.
** These are just a few examples of Uses of computer, the many diverse applications of computers
across different industries and aspects of daily life. The versatility and capabilities of computers
continue to expand as technology advances. **
4|Page
Uses of Computer at Home
Computers have become an integral part of modern homes, serving a variety of purposes that enhance
communication, productivity, entertainment, and more. Here we are providing you 8 common uses of
computers at home are as follow:
Communication: Computers enable communication through email, instant messaging, video calls,
and social media platforms, allowing family members and friends to stay connected regardless of
geographical distance.
Education: Computers support online learning, research, and educational resources. Students can
access educational websites, online courses, and digital libraries to enhance their learning experience.
Work from Home: Many people work remotely using computers, accessing work-related files,
participating in virtual meetings, and collaborating with colleagues through various communication
tools and platforms.
Entertainment: Computers offer a wide range of entertainment options, including streaming movies,
TV shows, and music. They are also used for playing video games and exploring interactive
multimedia content.
Social Media and Networking: Computers enable users to engage with social media platforms, share
updates, photos, and videos, and connect with friends and family online.
Health and Fitness: Computers support health monitoring and fitness tracking through apps and
wearable devices. They can provide access to workout routines, health information, and diet plans.
Online Shopping: Computers are used for online shopping, allowing users to browse and purchase a
wide range of products and services from the comfort of their homes.
Cooking and Recipe Management: Computers can serve as recipe databases, providing access to
cooking tutorials, recipes, and meal planning apps.
** These are just a few examples of Uses of computer, the many ways computers are used in households
1) It has been proven that the use of ICT in the classroom increases the motivation of the students,
showing more interest and becoming more involved in the areas they study. ICT enables the use
of innovative educational resources and the renewal of learning methods, establishing a more
active collaboration of students and the simultaneous acquisition of technological knowledge.
2) Furthermore, ICTs are of great help in developing discernment. Being able to search for various
sources and contrast them, as well as to structure information are some of the most notable skills
that students develop thanks to the use of ICT.
3) Their interest in learning grows: the use of resources as varied as videos, websites, graphics, and
games make traditional subjects more interesting. Multimedia content is a very useful tool to
bring different subjects closer to students in a complete and entertaining way.
4) Interactivity: the use of ICT in the classroom promotes the student’s active and participatory
attitude, which is involved in learning and is positioned as the protagonist.
5) Collaboration between students: Collaboration between students is clearly enhanced thanks to
various digital tools. It is much easier for them to create team projects, cooperate and learn from
each other.
6) They enhance creativity: ICT tools stimulate the development of the imagination, as well as the
initiative of all class members.
7) Increased communication: close communication between students and teachers is encouraged
through various channels, in a more spontaneous and less formal way.
8) Personalization and content up-to-date: digital environments allow real-time updating of all
information and resources. In addition, it is possible to adjust the tools and content to local and
nearby realities.
1. Phone
The phone is one of the core communication technologies that most professionals have readily available.
You might use a landline phone in your office, a smartphone while traveling and internet calling while on
your computer. Most phones have communication features that go beyond sending and receiving voice
calls, including voicemail, conference calling and recording capabilities. Smartphones allow you to
perform basic work duties as well if you have an available internet connection, such as writing emails,
posting on social media and reviewing documents.
2. Email
7|Page
One of the most popular forms of communication technology is email. For decades, people have been
using email to send messages and files over the internet. Unlike traditional mail, email arrives in the
recipient's mailbox almost instantly. You might use email throughout the day to communicate with
teachers or students, send and receive documents and share text or photo files quickly and easily.
3. Blogs
Blogs are websites where students or teachers can share content, or posts, for other people to read. Blogs
can be publicly available to anyone with the website link or only accessible behind with a membership.
Individuals can use personal blogs to share information about their hobbies and lives even questions and
how they can be answered. Blogs might include not only text but also images, videos, infographics, links
and advertising.
4. Social media
Social media platforms, the earliest of which launched at the end of the 20th century, allow users to share
their experiences and opinions with a worldwide audience. They also make it easy for people to
communicate with other users on each platform. Today, most schools have corporate social media
accounts they use for branding, marketing and communication. Through these platforms, they can share
educational updates, engage with and grow their audiences and stream videos and presentations.
5. Vlogs
Vlogs are "video logs" that are basically visual versions of blogs. Rather than posting text, vloggers
upload simple videos of themselves sharing their ideas or explaining how to do something. Vloggers
typically use the camera on their computer or device or a handheld camera to record themselves saying or
doing things. You can use vlogs to:
6. Podcasts
Podcasts are audio-based forms of communication. Creators can record themselves discussing a topic or
telling a story, then upload and store the audio online. Audiences can download the podcast to listen to on
their devices. Successful podcasts are often those that focus on a specific topic that has a dedicated
audience, such as science, geography etc. One feature that makes podcasts so popular is listeners can
download and listen to them whenever they want. You can use a podcast to discuss a topic you're an
expert on.
7. Livestream
Livestreaming is like vlogging but it happens in real time. Individuals or schools launch live videos on
platforms such as blogs, social media or other video hosting websites. Viewers can comment on the
videos as they stream, and the host can respond to their questions immediately. You can use livestreaming
to engage with your audience, explain how to use a product or broadcast presentations and events.
8. Online chat
Web chat offers users a form of instant communication. People use chat software on social media and
business communication platforms to talk to friends, family and colleagues. Businesses often add chat
support features to their websites to help answer customers' questions immediately. You can use online
chat as a more casual method of communicating
8|Page
9. Web conferencing
Conferencing technology makes it easier for employees to communicate with each other regardless of
where they're located. Most live conference technology involves both audio and video feeds of the
attendees. Other features include computer screen-sharing capabilities and brainstorming screens. You
can use web conferencing platforms to collaborate remotely, deliver live lectures and meet with long-
distance clients.
10. Texting
Short Message Services (SMS), or texting, allows individuals to send brief messages or images through
their smartphones. This popular and informal communication technology is useful if you're unable to call
or email someone. For example, if you need to send an update or a confirmation to a colleague or client
while in a meeting, you can send them a quick text.
12. Forums
A group forum is an online platform where people can post and respond to questions. Forums are often
organized by topic, allowing users to communicate about their shared interests or to troubleshoot common
issues. One benefit of forums is they contain records of conversations so you can track a group's progress
and search for specific information.
13. Wikis
A wiki is a website for crowdsourcing information, where any member can view, add or edit content. You
can set up private wikis for your department or company on many business communication platforms.
Your team can add information to relevant wikis to create a shared knowledge base for all members to
reference.
17. BlackBoard
9|Page
BlackBoard is a popular teaching tool that comes with numerous capabilities. Teachers can
easily administer tests, monitor performance, manage syllabus and even upload grades. This can save
you from the hassle of writing everything on paper, and also from an aching wrist. Students can
equally benefit from this tool because they can access all the information, including grades,
assignments, attendance, that you upload on the platform. The best part is that all this comes in one
platform. So, you won’t need multiple applications to manage it all.
19. Trello
Trello is a collaborative tool that is used widely in IT companies with large teams. Fortunately, it has
several applications for you educators as well. If you prefer project-based learning for students, Trello
is for you. Trello has these digital boards. You can create different boards for assignments, test papers,
etc. And in those boards, you can create cards. Furthermore, you can discuss a particular topic in that
card. You can invite your students to view that card. And the students can put in comments, doubts, or
ask questions and even attach images, videos, etc. Also, students can easily look at their projects, set
deadlines, and track progress online. In a nutshell, Trello takes a lot of burden off your shoulder while
enriching the learning experience for kids.
11 | P a g e
Information and Communication Technologies for
Development
Information and communication technologies for development (ICT4D) refers to the application of
information and communication technologies (ICT) toward social, economic, and political development,
with a particular emphasis on helping poor and marginalized people and communities. It aims to help in
international development by bridging the digital divide and providing equitable access to technologies.
ICT4D is grounded in the notions of "development", "growth", "progress" and "globalization" and is often
interpreted as the use of technology to deliver a greater good. Another similar term used in the literature is
"digital development". ICT4D draws on theories and frameworks from many disciplines, including
sociology, economics, development studies, and library, information science, and communication studies.
In 2015, the UN Development Program and the UN Development group postulated a set of 17 goals whose
ultimate goal is to transform the world into a better one with emphasis to developing countries. Some of
the goals included are aims to end extreme hunger, poverty and gender inequality.[98] While none of the
Sustainable Development Goals are specifically meant for Information and Communication Technologies,
the 2030 Agenda for Sustainable Development believes that it can help at some extent in achieving the
SDGs adding that "The spread of information and communication technology and global
interconnectedness has great potential to accelerate human progress, to bridge the digital divide and to
develop knowledge societies".[99] The International Telecommunication Union also shares this sentiment
and considers that the ICTs can "fast forward progress on the SDGs" which would fundamentally improve
the lives of the people.[100]
12 | P a g e
Education is where a citizen is prepared.[104] E-learning systems serve as a leeway in educating
learners through ICT.[105] With these technologies, it can contribute a worldwide spread of access
and quality in education for all, as well as excellent delivery.[106] Teachers have pointed out that
with the implementation of ICT in their school, it has helped enhance the students' attention and
perception skills.[107] Around the globe, there are programs that are self-paced, available
competitive college courses from known universities with certification, online competitions and
labs which in turn act as tools for livelihood opportunities. There are also smart systems that
analyses the learning pattern of the student which it uses in constructing individual learning plans
as maximized pedagogy.[105] In Europe, it has been said the use of ICT is one of the big fundamental
factors in improving quality education. The implementation of the use of ICT in education is highly
encouraged by the European Commission in their E-Learning Action Plan wherein one of their
goals are, "to improve the quality of learning by facilitating access to resources and services as well
as remote exchange and collaboration".[107]
5. Goal Number 5: Gender Equality
Access to ICT helps women in understanding the importance of their productive and reproductive
roles in the society at the local community, government and global level. Women can be
empowered as economic, social and political actors by providing new space and opportunity where
they can contribute to the community. These opportunities can be in form of advocacy, ICT-based
entrepreneurship or other community development activities through ICT.
6. Goal Number 6: Clean Water and Sanitation
Contaminated water and inadequate sanitation accounts to more than 800,000 deaths annually.
ICTs can provide ways for smarter water management such as automated systems handling the
measurement and observation of the water supply and propose possible solutions and interventions
based on the data gathered. ICTs can also be used to provide data to practitioners in the field
enabling them to provide more water, sanitation and hygiene (WASH) services.
7. Goal 7: Affordable and Clean Energy
ICT-powered solutions such as smart electrical grids, smart homes and buildings, and automated
industrial processes can be deployed to replace their inefficient counterparts towards usability
and energy efficiency.
ICTs are also being developed to create a lesser carbon-footprint so as to make them
environmentally sound.
8. Goal 8: Decent Work and Economic Growth
ICTs are paving way for interested entities to conduct business virtually anywhere in the world.
Some of examples of these businesses are online education platforms, computing services and
online boutiques. This creates a plethora of new employment opportunities which ultimately fosters
market growth.
9. Goal Number 9: Industry, Innovation and Infrastructure
ICT is a crucial tool in industrialization. In emerging information and knowledge societies, open
access to academic research, online collaboration and optimization of ICT enable countries to
provide infrastructures well-suited for knowledge-based societies such as power networks,
transportation systems, water supplies and communication networks.
10. Goal Number 10: Reduced Inequalities
ICTs can help reduce inequality within and between countries by providing knowledge to the
disadvantaged section of the society such as those living with disabilities and women. For example,
to those who are visually challenged, there are now accessibility solutions that accept speech as
input and output for computing operations. Interactive lectures can also be used to engage people
into learning and developing their ICT skills with the goal of bridging the digital divide.
11. Goal Number 11: Sustainable Cities and Communities
City management can be done effectively with the help of ICTs. Innovative concepts such as smart
buildings, smart waterworks facilities and intelligent transport systems not only provide increased
work efficiency but also boasts a reduced energy consumption and waste impact.[114]
12. Goal Number 12: Responsible Consumption and Production
13 | P a g e
ICTs application help participate in the dematerialization and virtualization of materials such as the
case of virtual receipts and electronic books replacing their paper-based counterparts.
Innovative ICT applications can also stimulate a sustainable consumption and production of
resources. Some examples of these include smart grids, cloud computing and ICT-based power
plants.
13. Goal Number 13: Climate Action
ICTs such as satellite monitoring are critical in monitoring the earth, interacting with climate and
weather information, generating forecasts and using results gathered to enable early warning
systems.
Besides monitoring the effects of climate change, ICTs also play a role in alleviating the effects of
climate change by providing timely and accurate forecasting and early warning systems.
Private standard-setting organizations such as ISO contributed plans on climate change. One of
them, the ISO 14001, sets requirement for environmental management system (EMS) and obliges
organizations to identify and systematically reduce any harmful effects it may have on the
environment. Organizations must agree to practice energy saving, pollution control, waste
management, and proper consumption of raw materials.
14. Goal Number 14: Life Below Water
Utilization of ICTs can also pave the way to the conservation and responsible use of oceans and
the marine resources that they hold. Satellite-based monitoring can improve overall monitoring and
reporting efficiencies which results to increased liability. On a smaller scale, local sensors and other
related systems can also deliver real-time updates to improve the accuracy and efficiency of data
gathered from satellite-based monitoring.
Big data from the monitoring activities can be analyzed to look for short and long-term trends in
terms of pollution, weather patterns and migration cycles.
15. Goal Number 15: Life on Land
ICTs can play a major role in the conservation of terrestrial ecosystems and prevention of
biodiversity loss. Like on oceans and marine resources, global monitoring systems such as satellite-
based monitoring can improve the monitoring efforts which would increase accountability. As a
result, several illegal activities such as poaching and illegal wildlife trade can be alleviated through
this way.
Data gathered from the monitoring activities can be used to analyses trends in terms of biodiversity,
changes in ecosystems as well as to plan mitigation efforts.
The Environment Public Authority in Kuwait has created an environmental portal, Beatona.net.
The portal aims to share verified environmental information to the public. One of the key feature
of this portal is the ability of the public to interact with it by reporting environmental phenomena
and illegal activities.
16. Goal Number 16: Peace, Justice & Strong Institutions
ICTs can help in strengthening the accountability and reliability of institutions. The emerging trend
of governments opening their data to the public increases transparency ratings, enables citizens and
helps stimulate financial growth. ICTs are also vital in areas such as monitoring and tracking
government data and public demographics.
ICTs are also important when natural or man-made disasters occur because it is responsible for
retrieving, communicating and sending reliable and timely crisis information. This allows efficient
and correct solutions to be carried out. In the future, analysis of big data can also pave way to
accurate forecasting and early warning systems which would be open to anyone.
17. Goal Number 17: Partnerships for the Goals
Ultimately, ICT plays the biggest role in SDG, although not specifically mentioned. But with the
three pillars of sustainable development namely economic growth, social inclusion and
environmental sustainability, it is no doubt needed in providing innovative and effective means of
implementation in a global scale. It helps in enhancing international coordination, multi-
stakeholder partnerships, data monitoring and accountability.
14 | P a g e
The Sustainable Development Goals is an opportunity for the world to work together to reach goals
such as ending poverty, protecting the earth and ensuring prosperity for the planet. Technology if
used effectively will accelerate the SDG's task of reaching its goals.
In order for SDGs to achieve their goals, changes are required of each sector. Development sectors
like livelihood, agriculture, health, education, water, sanitation and power, infrastructure, disaster
relief, government and human rights, environmental protection and crosscutting should achieve
their goals of ending poverty by providing sustainable agriculture to ensure food security and
improved nutrition for people to have healthy lives. Sustainable management of water, sanitation
and modern energy should be achieved as well as the construction of safe and resilient infrastructure
for communities. Laws promulgating equal rights should also be achieved. Lastly, protection of the
environment should be undertaken.
ICT can address the needs and provide benefits to various organizations and individuals. These
organizations include consumers, entrepreneurs or employees, businesses, government agencies
and civil society organizations.
18.
Shown below is a list of the 16 largest ICT4D gaps (as of 2016) arranged in a descending order according
to the priority it receives. In an online article, Heeks states that ICT4D analyses tend to underplay its
negative impacts. The "Dark Side of ICT's" is placed 15th in the list – just a place away from the least
prioritized ICT4D gap.
These gaps, along with other key topics, are used to come up with a list of post-2015 ICT4D priorities
which in turn will be of valuable use in ICT4D activities of policymakers, strategists and practitioners.
Again, this list is topics that are under-represented in post-2015, but not a totality of ICT4D priorities.
Works on ICT and education, ICT and health, ICT infrastructure and few others which is not on the list
shall continue during this period.
1. Environment – to develop Green IT for mitigation of climate change, weather early warning
systems, minimization of e-waste. Also, noteworthy is climate change adaptation which is rather a
major issue among the global South. Concurrent is the need for ‘strategy.’ That more than
monitoring, mitigating, and being able to adapt to climate change is by using ICTs as a guide in
making policies and programs of action.
2. Sustainability – composed of economic prosperity, social infusion, and environmental
sustainability, which are needed to be balanced for it cannot be maximized all at the same time.
With reference to Brundtland Report definition of sustainable development (WCED 1987:43), there
are two concepts contained: the need of the world and the imposed limitations of the environment.
Development that fulfils the needs of the present without compromising the future resources.
3. Poverty – focus more on poverty specifics such as policies, poverty reduction/ eradication
programs and projects rather than generic ICT priorities. ICT4D should resolve its failures to
practically engage with poverty eradication and environmental sustainability, meaningfully involve
with discourses on theories of poverty and development concepts, and determine its role in the
emerging development.
4. Development Finance – use of ICT to monitor aid flows and debts, mainstream banking and
finance, improve tax system and taxation of ICT, ICT-enabled investments, e-remittances.
5. Basic Needs – able to prioritize the usage if ICT based on basic needs of the people using on
Maslow's hierarchy of needs. In that way, it is not ignoring other aspects for the use of higher levels
of ICT but being able to address the essential needs of especially the neediest citizens.
15 | P a g e
6. Economic Development: Growth, Jobs and the Digital Economy – intensifying an existing area
of economic activity and extensive application of ICT to extend the range of economic activity.
The ICT sector had spread widely through mobile-jobs it created and new business models it
prompted. It continues to thrive down into the poor communities resulting to their growth and
income.
7. Development 2.0 – emphasis on 5 transformative shifts (1. Leave no one behind, 2. Put sustainable
development at the core, 3. Transform economies, 4.Build peace, 5. Forge new global partnership).
It means ICT4D needs to do more on connecting ICTs to the transformation of development. It is
in a way transforming processes and structures of development with understanding of its extent and
content.
8. Accountability and Transparency – Free and open information must be monitored, evaluated and
controlled in order to combat corruption specifically with public officials. However, this improved
data flow is equally important to be applied among private sector firms and markets especially
openness and transparency with these development stakeholders are the ones mostly neglected.
9. Data Revolution – have 3 dominant aspects: Big development data, Open development data, and
Real Time development data. Data revolution is yet to unleash its full potential when able to
thoroughly connect with ICT4D.
10. Cross Border Flows – supports immigrant and emigrant population, enable international trade,
and investment. This will increase even more global connections and economic ties.
11. Peace and Security – uses of ICT in mainstream peace and security, across the cycle from
insecurity through conflict to post-conflict reconstruction, reconciliation and peace building; from
the micro of violence within households to the macro of regional warfare; and bringing in issues
from application design and implementation to strategic and policy matters.
12. Urban Development – support the inexorable growth, creation and implementation of urban
strategies, facilitating urban planning, improving urban governance and design, ecosystems
services and infrastructure.
13. Resilience – need to form its own particular sub-domain of ICT4D activity. It is to ensure to survive
risks and external threats which include anticipated social, economic and environmental shocks.
Resilience used to refer only to environmental aspect but it has grown to be applied on systems as
well, like in other development initiatives. It is not to merely sustain but also aims to transform.
14. Inclusive Development – to do more than just address digital divides – and to engage with the
breadth of inclusive development. This alternative approach refers to different divides, different
excluded groups other than in terms of information access and availability. Those who are at the
rear end in terms of equality, vulnerability, social justice. They are the ethnic minorities, the women
and youth, the disabled, among others. ICT4D agendas and mechanisms lead to developing
inclusive informatics innovation, inclusive business models and the like.
15. The Dark Side of ICT – costs and failures, development of a Cluedo piece-shaped labor market,
the loss of work/life balance and growing stress, negative impacts of ICT use on health, learning
and cognitive development especially among children
16. Changing the Language and Worldview of ICT4D – An informatics label will allow WSIS, the
UN Group on the Information Society (UNGIS) and other ICT4D stakeholders to lay claim to the
data revolution. Without this, the data revolution will drag attention and resources down its own
potentially-isolated path.[162]
Other issues
The other issues that affects the innovation are: legal and regulatory, moral and ethical, social,
economic, technology, language and script, and security.
Almost every person is involved in research of one type or another. Research takes place in homes,
school and other organizations. Nurses, teachers, students, etc. use computers for research.
Research can be carried out to do the following
• Computer Education: Many people in his world are seeking to understand how to use
computers i.e. the young and old, especially how to use the internet.
• Purpose of using Computer: The research scholars are using computer for preparing
assignment, project, research and some extend to entertainment rather business purpose
• Internet and World Wide Web: A rich source of information though online databases,
journals and information updates. The research scholars are not only depending upon the
school or university Internet Centre’s but also Cyber cafes and free WIFI zones.
• Computers are used in scientific research in data analysis because they are able to analyse
data with extreme speeds. For example, computers are able to analyse percentages of
materials present in a chemical or to determine the temperature at which certain chemical
compounds break down.
• Computers are used to solve complex mathematical equations in order to determine if data is
valid or if a certain structure of molecules will remain stable. If computers are used
calculations are done faster and also human error is reduced.
• Computers are used in simulations and modelling. Modelling is representing the real system
using computer models or programs at smaller scale allowing the system behaviour to be
studied which is often either not possible or too risky in the real world. For example,
computers are used to perform space simulations by modelling extreme environments and
complex flight situations, predicting climate patterns or simulating how engineered products
might perform in the field, etc.
• Today artificial intelligent studies are fast growing in the area of research providing tools to
create and compose new ideas, analyse, validate, track, combine, summarise, perform
grammar, plagiarism checks etc.
17 | P a g e
The following are the uses of computers in the process
1. To store (on a PC or on internet servers) and retrieve researched data for further
manipulation such as editing or printing
2. Accessing the internet for Bibliographic databases, E-books, Audio-Video, Full-text
databases and E-journals.
3. Using the computer stored applications to read more information on a topic
4. Using simulation software during study
5. Making calculations wherever needed using spreadsheet and calculators programs
6. Analyzing data using computer based methods
7. Printing of finished works.
8. Communicating with others doing the same or similar research, or communicating with
online experts.
9. Formatting a research document to make it presentable
10. Researchers take advantage of mobility. Laptops, tablets, etc. can be carried around for
research. People in remote areas now have access to information.
11. The use of internet has led to the creation of a global village thus sharing information has
become easy. E-mails and social media have made it easier to pass on information.
12. Research for labor has been on the increase as people now look for employment in other
countries and also work for them without having to visit those country physically
13. Researchers through technology can collaborate, do video conferencing and group
learning.
Research process consists of series of actions necessary to carry out research work effectively. The
sequencing of these steps listed below
Computers in Research
Computers are used in scientific research extremely and it is an important tool. Research process can
also be done through computers. Computers are very useful and important tool for processing huge
number of samples. It has many storage devices like compact discs and auxiliary memories. Data can
18 | P a g e
be used from these storage devices and retrieved later on. There are various steps necessary to
effectively carry out research and the desired sequencing of these steps in the research process. This
data can be used for different phases of research process.
1. Conceptual phase
2. Design and planning phase
3. Data collection phase
4. Data Analysis phase and
5. Research Publication phase
The conceptual phase consists of formulation of research problem, extensive literature survey,
theoretical frame work and developing the hypothesis.
Computer helps in searching the existing literature in the relevant field of research. It helps in finding
the relevant existing research papers so that researcher can find out the gap from the existing
literature. Computers help for searching the literatures and bibliographic reference stored in the
electronic database of the World Wide Web’s.
It can be used for storing relevant published articles to the retrieved whenever needed. This has the
advantage over searching the literatures in the form of journals, books and other newsletters at the
libraries which consume considerable amount of time and effort.
Bibliographic references can also be stored in World Wide Web. In the latest computers, references
can be written easily in different styles. Researcher need not visit libraries .It helps to increase time
for research. It helps researchers to know how theoretical framework can be built.
Computer can be used for, deciding population sample, questionnaire designing and data collection.
They are different internet sites which help to design questionnaire. Software’s can be used to
calculate the sample size. It makes pilot study of the research possible. In pilot study, sample size
calculation, standard deviations are required. Computer helps in doing all these activities.
Empirical phase consists of collecting and preparing the data for analysis:
In research studies, the preparation and computation of data are the most labor-intensive and time
consuming aspect of the work. Typically the data will be initially recorded on a questionnaire or
record for suitable for its acceptance by the computer. To do this the researcher in connection
with the statistician and the programmer, will convert the data into Microsoft word file or excel
spreadsheet or any statistical software data file. These data can be directly used with
statistical Software’s for analysis.
The data obtained from the research subjects are stored in computes in the form of word files or
excel spread sheets or any statistical software data file. This has the advantage of
19 | P a g e
making necessary corrections or editing the whole layout of the tables if needed, which is
impossible or time consuming in case of writing in hand written. Thus, computers help in data
editing, data entry, and data management including follow up actions etc. computers also allow
for greater flexibility in recording and processing the data while they are collected as well as
greater ease during the analysis of these data.
Data exposition:
The researchers are anxious about seeing the data: what they look like; how they are distributed
etc. Researchers also examine different dimension of variables or plot them in various charts using
a statistical application.
Data Analysis and Computer phase consist of the analysis of data, interpretation and hypothesis
testing. Data analysis phase consist of statistical analysis of the data and interpretation of results.
Data analysis and interpretation can be done with the help of computers. For data analysis,
software’s available. These software help in using the techniques for analysis like average,
percentage, correlation and all the mathematical calculations.
Software’s used for data analysis are SPSS, STATA, SYSAT etc. Computers are useful not only
for statistical analysis, but also to monitor the accuracy and completeness of the data as they are
collected. This software’s also display the results in graphical chart or graph form.
Computers are used in interpretation also. They can check the accuracy and authenticity of data.
It helps is drafting tables by which a researcher can interpret the results easily. These tables give
a clear proof of the interpretation made by researcher.
After interpretation, computer helps is converting the results into a research article or report which
can be published. This phase consists of preparation of the report or presentation of the results,
i.e., formal write-up of conclusions reached. This is the research publication phase. The research
article, research paper, research thesis or research dissertation is typed in word processing
software and converted to portable data format (PDF) and stored and/or published in the world
wide web. Online sites are available through we can convert our word file into any format like
html, pdf etc.
Various online applications are also available for this purpose. Even one can prepare our
document using online word processing software and can store/edit/access it from anywhere using
internet.
After completing the word document, a researcher need to give source of the literature studied
and discussed in references. Computers also help in preparing references. References can be
written in different styles. All the details of author’s journals, publication volume Books can be
filled in the options “reference‟ given in computer and it automatically change the information
into the required style. Software used to manage the references.
A researcher needs not to worry about remembering all the articles from where literature in
taken, it can be easily managed with the help of computers.
20 | P a g e
Simulation:
There are various computer applications used in scientific research. Some of the most important
applications used in scientific research are data storage, data analysis, scientific simulations,
instrumentation control and knowledge sharing.
Data Storage
Experimentation is the basis of scientific research. Scientific experiment in any of the natural
sciences generates a lot of data that needs to be stored and analyzed to derive important
conclusions, to validate or disprove hypotheses. Computers attached with experiential
apparatuses, directly record data as its generated and subject it to analysis through specially
designed software. Data storage is possible in SPSS data file, lotus spreadsheet, excel spreadsheet,
DOS text file etc.
Data Analysis
Analyzing huge number of statistical data is made possible using specially designed algorithms
that are implemented by computers. This makes the extremely time-consuming job of data
analysis to be matter of a few minutes. In genetic engineering, computers have made the
sequencing of the entire human genome possible. Data got from different sources can be stored
and accessed via computer networks set up in research labs, which makes collaboration simpler.
Scientific Simulations
One of the prime uses of computers in pure science and engineering projects is the running of
simulations. A simulation is a mathematical modelling of a problem and a virtual study of its
possible solutions.
For example, astrophysicists carry out structure formation simulations, which are aimed at
studying how large-scale structures like galaxies are formed. Space missions to the Moon, satellite
launches and interplanetary missions are first simulated on computers to determine the best path
that can be taken by the launch vehicle and spacecraft to reach its destination safely.
Instrumentation Control
Most advanced scientific instruments come with their own on-board computer, which can be
programmed to execute various functions. For example, the Hubble Space Craft has its own on-
board computer system which is remotely programmed to probe the deep space. Instrumentation
control is one of the most important applications of computers.
21 | P a g e
Knowledge Sharing through Internet
In the form of Internet, computers have provided an entirely new way to share knowledge. Today,
anyone can access the latest research papers that are made available for free on websites. Sharing
of knowledge and collaboration through the Internet has made international cooperation on
scientific projects possible.
Through various kinds of analytical software programs, computers are contributing to scientific
Research in every discipline, ranging from biology to astrophysics, discovering new patterns and
providing novel insights.
When the work in neural network based artificial intelligence advances and computers are granted
with the ability to learn and think for them, future advances in technology and research will be
even more rapid.
Tools and Applications Used In the Research Process Statistical Analysis Tool: SPSS
SPSS is the most popular tool for statisticians. SPSS stands for Statistical Package for Social
Sciences.
Spreadsheet Packages
22 | P a g e
A word processor (more formally known as document preparation system) is a computer
application used for the production (including composition, editing, formatting, and possibly
printing) of any sort of printable material.
The word processing packages are Microsoft Word, WordStar, Word perfect, Amipro etc.
Presentation Software
Open source Database packages are MySQL, PostgreSQL, and Firebird etc.
Browsers A web browser is a software application which enables a user to display and interact
with text, images, videos, music, games and other information typically located on a Web page at
a website on the World Wide Web or a local area network.
Examples are Microsoft Internet explorer, Mozilla Firefox, Opera, Netscape navigator, Chrome.
23 | P a g e
Health Problems Caused by use of Computers
Technology has become an inseparable part of our lives and has become a necessity in almost every
field of work. It makes our lives easier in some ways and maybe even less expensive, but it can be rather
frustrating too. If your occupation require you to spend an extended amount of time in front of the
computer say over 4 hours a day, you could be at an increased risk of developing certain health problems
including the following:
1. Musculoskeletal Problems
This includes areas of your body such as your back, neck, chest, arms, shoulders and feet.
Having sore muscles and complaints of the muscles being tired are common.
Numbness may occur in the arms and hands.
These troubles may occur because the posture you assume when using the computer is most likely
incorrect.
You may find that you are sitting in an uncomfortable chair, or that you have a workstation that is
not ergonomically correct for your body.
Carpal tunnel syndrome CTS is a stress-related injury caused by repetitive movement of joints,
especially the wrist, and can lead to numerous musculoskeletal problems. It has become very
common among Computer professionals due to poorly placed computer components and extensive
typing over a long period of time.
Tips to Consider
Find a correct height for both your desk and chair so that your computer screen is at eye level or
slightly lower.
Sit with your back straight, legs at 90 degree angles to the floor, and feet resting flat on the floor.
ALWAYS take small breaks from your computer work to stretch your muscles, keep your blood
flowing, and to rest your eyes.
2. Vision Problems
Computers are notorious for their bright lights, glare and flickering images that can cause strain
on your eyes. In many cases, frequent computer users develop computer vision syndrome,
which is a degenerative eye problem which can result in severely reduced eyesight (Myopia),
blurred vision, overall eye tiredness and even Glaucoma. Video screens have a design process for
user interface. Video screens can cause eyestrain from prolonged viewing. Cathode ray tubes are
what are used to display the information on your computer. These send-off radiation. This is a
concern that has been taken into account when designing better computer screens for user
interface
Finding that you constantly focusing on the screen with delays in blinking can result in drying out
your eyes.
24 | P a g e
Tips to Consider
Make sure to adjust the brightness on your computer screen so that your eyes are not as strained. For
example, if you are sitting in a dark room your computer screen will most likely be very bright and
cause your eyes to strain, so to save your eyes you should lower the brightness.
Tilt your screen to decrease any glare.
Maintain a proper vision distance from the screen, and do not forget to blink.
Tips to Consider
Place your mouse at a location next to the keyboard that will require you to move your whole arm to
get to it rather than just twisting your wrist outward to reach it and move it.
Type gentle to decrease the stress put on each of your fingers.
Keep your wrists flexible when typing; avoid keeping them fixed in a certain position; keeping them
flexible will avoid repetitive, strenuous stress.
Relax your arms and try to get a few stretches in when you are not typing or using your mouse.
4. Headaches
Headaches are common and may occur because of the increased muscle tension or from pain in the
neck.
Any vision problems, or continued strain on the eyes can also cause headaches.
Tips to Consider
Attend regular eye exams in order to work toward correcting any vision problems.
Try your best to keep your neck straight in front of the computer and take breaks.
5. Obesity
Prolonged use of computers may lead to an overall sedentary lifestyle that lacks adequate physical
activity and/or exercise.
In children prolonged use of computers, or electronics in general, is a major contributing factor to
obesity.
Tips to Consider
Set limits for your children when they are using electronics.
Encourage outdoor play or a certain hobby that may take away time spent using electronics in order to
lead a more active lifestyle.
As for adults, if your occupation requires computer use for up to 8 hours daily, you should not use a
computer again when you get home…you should take a break and try to squeeze in some exercise
until you go back to work.
6. Stress Disorders
Technology impacts our behaviors and emotions.
Prolonged use of computers may be accompanied by poor health and increased pressure placed on you
in your workplace environment, which could both lead to stress.
25 | P a g e
The longer your stress occurs and is left untreated, the greater your chances are of contracting more
serious health problems.
Stress can lead to decreased attention span, lack of concentration, dizziness and becoming easily
burned out.
Excessive use of electronic screen media can have ill effects on mental health related to cognition, and
behavior—and may even result in psychosis in the form of hallucination. She calls this "Electronic
Screen Syndrome" (ESS). She claims the root of these symptoms appears to be linked to repeated
stress on the nervous system, making self-regulation and stress management less efficient.
Tips to Consider
Promote your own health and prevent future health conditions or worsening the ones you already have
by seeking treatment options for any stress that you may encounter.
Try things from yoga, to natural remedies, to medications as prescribed by a medical provider to
combat your stress.
Tips to Consider
Use a desktop computer that is set up ergonomically-correct for you as frequently as possible; only use
a laptop intermittently.
Use separate laptop equipment, such as a wireless mouse or keyboard or a laptop stand.
As always, take frequent breaks.
If you have to take your laptop with you, make sure to carry it in a backpack or luggage; otherwise it
may cause extra strain on your muscles from carrying it.
8. Sleeping Problems
Artificial lighting that is given off from computer screens can actually trick your brain and suppress its
release of melatonin – the substance that assists your sleeping patterns.
Tips to Consider
Refrain from using a computer right before going to bed.
Resort to reading a book or something to that degree prior to going to bed, so falling asleep may come
more easily for you.
Tips to Consider
26 | P a g e
Keep the volume of your headphones down to a tolerable level, one that blocks out any extra noise
but that is just loud enough for you to hear.
Listening to your headphones at approximately 80 decibels is recommended; if you are unaware of
what that sound level is it can easily be researched.
Tips to Consider
Avoid crossing your legs when using a computer for an extended period of time.
Take many breaks and stretch your legs to get the blood flowing to decrease the chance of it pooling
in your extremities.
If you do have to sit for an extended period, make sure to bend and move your extremities even
while sitting because any little bit will help.
27 | P a g e
Security and Ethics (Unhu/Ubuntu/Vumunhu)
COMPUTER ETHICS
Ethics is a set of moral principles that govern the behavior of a society, group or individual.
Computer ethics is set of moral principles that regulate the use of computers.
Some common issues of computer ethics include intellectual property rights, privacy concerns, and how
computers affect society. Computers should be used without damaging or violating the moral values and
beliefs of any individual, society or organization. Computer ethical principles includes methods and
procedures to avoid infringing copyrights, trademarks and the unauthorized distribution of digital content.
Computer ethics also entails the behavior and approach of a human operator, workplace ethics and
compliance with the ethical standards that surround computer use.
1. Do not use the computer in ways that may harm other people.
Explanation: It include physical injury physical injury, harming or corrupting other users' data or files, it
is wrong to use a computer to steal someone's personal information, Manipulating or destroying files,
writing programs which on execution lead to stealing, copying or gaining unauthorized access to other
users' data, being involved in practices like hacking, spamming, phishing or cyber bullying does not
conform to computer ethics.
28 | P a g e
hospital database or client record in a bank etc., such information that is meant to be confidential. Illegal
electronic transfer of funds is a type of fraud.
5. Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has become viral today, because of the Internet. This also means that
false news or rumors can spread speedily through social networking sites or emails. Being involved in the
circulation of incorrect information is unethical. Direct or indirect involvement in the circulation of false
information is ethically wrong. Giving wrong information can hurt other parties or organizations that are
affected by that particular theme.
6. Refrain from copying software or buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the
original work of the individual who created it. It is copyrighted in his/her name. In case of a developer
writing software for the organization she works for, the organization holds the copyright for it. Copyright
holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is
unethical and also encourages others to make copies illegally.
8. Simply put: It is wrong to claim ownership on a work which is the output of someone else's intellect.
Explanation: Programs developed by a software developer are her property. If he is working with an
organization, they are the organization's property. Copying them and propagating them in one's own name
is unethical. This applies to any creative work, program or design. Establishing ownership on a work
which is not yours is ethically wrong.
9. Before developing a software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader perspective
of looking at technology. A computer software on release, reaches millions. Software like video games and
animations or educational software can have a social impact on their users. When working on animation
films or designing video games, for example, it is the programmer's responsibility to understand his target
audience/users and the effect it may have on them. For example, a computer game for kids should not have
content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A
software developer/development firm should consider the influence their code can have on the society at
large.
10. In using computers for communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we follow in the real world applies to communication over
computers as well. While communicating over the Internet, one should treat others with respect. One
should not intrude others' private space, use abusive language, make false statements or pass irresponsible
remarks about others. One should also be considerate with a novice computer user.
29 | P a g e
Organizations using personal data must be registered. Data about individuals must be obtained fairly
and lawfully for the purpose collected for. Data must be used only for the specific purpose collected
for and may only be disclosed in accordance with such a purpose. Data collected must not be
excessive for the purpose collected for but must be adequate and relevant. Data collected must be
accurate, up-to-date and kept no longer than necessary. Data must be protected from unauthorized
access or loss. Individuals with collected data have the right to view it and make alterations where
necessary.
PRIVACY
Data privacy, or Information privacy or data protection is the privacy of personal information and
usually relates to personal data stored on computer systems.
The need to maintain information privacy is applicable to collected personal information, such as
medical records, financial data, criminal records, political records, business related information or
website data. There are laws that govern and regulate the extent to which personal data may be
used.
The following organizations are the most common sources of violation of personal data.
Healthcare records
Criminal justice investigations and proceedings
Financial institutions and transactions
Biological traits, such as genetic material
Residence and geographic records
Web surfing behavior or user preferences using persistent cookies
Academic institution
Recreational site
Employee institutions
COMPUTER SECURITY
In the computer industry, the term security or the phrase computer security refers to techniques for
ensuring that data stored in a computer cannot be read or compromised by any individuals without
authorization. It is basically is the protection of computer systems and information from harm, theft, and
unauthorized use. It is the process of preventing and detecting unauthorized use of your computer system.
Computer security ensures that a business's data and computer systems are safe from breaches and
unauthorized access. Computer security is important because it makes sure that your information and
data are safe. Computer security therefore deals with the protection of
(a) The computer itself and its accessories
(b) Computer data or information
(c) Computer software
The range of means by which the security and integrity of computing resources can be threatened is very
broad, and encompasses:
Operator error (for example a user inadvertently deleting the wrong file).
Hardware or media failure (either as a result of wear-and-tear, old age or accidental damage).
Theft or sabotage (of hardware and/or data or its media).
Hackers (who obtain unauthorized access to online accounts or other systems).
Malware (any form of virus, including ransomware).
Power surges and/or outages (which are one of the most common means of hard disk corruption
and hardware damage).
Flood, fire, storm or other natural disasters.
Fraud or embezzlement.
Industrial espionage.
Terrorism
Computer security can therefore be classed as physical security and data or software security
PHYSICAL SECURITY
The following are threats that can cause computer or information loss or damage
1. Storms
2. Burglars (thief)
3. Dust
4. Heat
5. Fire
6. Electrical faults
7. Accidental loss
31 | P a g e
How to protect a computer from physical damage
(a) Storms:
build false floors,
keep backup,
Build computer labs in upper rooms.
Cover your computers
Use storm detectors and early warning systems
(b) Burglars:
Install burglars bars in computer rooms
Install alarms
Install CCTV
Install electronic security doors
Lock the computer room
Hire a security guard
Lock computers onto desks
Use biometric doors
(c) Dust:
Use computer covers
Do not open windows
Take computer for servicing (blowing off dust)
(d) Heat:
Use air conditioners
Provide free air circulation near a computer.
(e) Fire:
Keep a fire extinguisher
Use smoke detectors and early warning systems
1. Make sure the most vulnerable devices are in that locked room
2. Use rack mount servers
3. Keep intruders from opening the case
4. Protect the portables
5. Disable the drives
6. Protect your printers
DATA /SOFTWARE LOSS OR DAMAGE
Threats to data and software examples are
32 | P a g e
1. Virus or malicious software
2. Accidental loss
3. Hackers
4. Sniffing
5. Software piracy
6. etc.
19. Remove or disable accounts upon loss of eligibility: Separate user and administrator accounts:
20. Administrator accounts must not be used for non-administrative purposes.
21. Use unique passwords for administrator accounts: Throttle repeated unsuccessful login-attempts:
22. A maximum rate for unsuccessful login attempts must be enforced. Account lockout is not required,
but the rate of unsuccessful logins must be limited.
23. Enable session timeout: Sessions must be locked or closed after some reasonable period.
24. Enforce least privilege: Non-administrative accounts must be used whenever possible. User accounts
and server processes must be granted the least-possible level of privilege that allows them to perform
their function.
25. Enable system logging and auditing: The facilities required to automatically generate, retain, and
expire system logs must be enabled.
26. Access control: Access to confidential data must be provided on a least-privilege basis. No person or
system should be given access to the data unless required by business process. In such cases where
access is required, permission to use the data must be granted by the data steward.
27. For data loss, use data recovery tools such as RECUVA and many others
28. Also create a recovery plan
CYBERCRIME
Computer Crime or cybercrime is the use of a computer to take or alter data, or to gain unlawful use
of computers or services. Computer crime is an act performed by a knowledgeable computer
user, sometimes referred to as a hacker that illegally browses or steals a company's or individuals
33 | P a g e
private information. In some cases, this person or group of individuals may be malicious and
destroy or otherwise corrupt the computer or data files.
Individual: This type of cybercrime can be in the form of cyber stalking, distributing pornography,
trafficking and “grooming”.
Property: In the cyber world criminals resort to stealing and robbing using computers. In this case,
they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous
purchases online; run a scam to get naïve people to part with their hard earned money; use malicious
software to gain access to an organization’s website or disrupt the systems of the organization.
Government: Crimes against a government are referred to as cyber terrorism. If successful, this
category can wreak havoc and cause panic amongst the civilian population. In this category, criminals
hack government websites, military websites or circulate propaganda. The perpetrators can be
terrorist outfits or unfriendly governments of other nations.
Types of Cybercrime Acts
1. Hacking: Hacking is gaining illegal or unauthorized access by breaking into a file, computer
or network to access information.
2. Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software.
3. Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails.
4. Identity Theft: In this cybercrime, a criminal accesses data about a person’s bank account,
credit cards, Social Security, debit card and other sensitive information to siphon money or to
buy things online in the victim’s name. It can result in major financial losses for the victim and
even spoil the victim’s credit history.
5. Malicious Software: These are Internet-based software or programs that are used to disrupt
a network. The software is used to gain access to a system to steal sensitive information or
data or causing damage to software present in the system.
6. Child soliciting and Abuse: This is also a type of cybercrime wherein criminals solicit
minors via chat rooms for the purpose of child pornography.
7. Online Identity theft
Identity theft and fraud is one of the most common types of cybercrime. The term Identity
Theft is used, when a person purports to be some other person, with a view to creating a
fraud for financial gains.
8. Ransomware
This is one of the detestable malware-based attacks. Ransomware enters your computer
network and encrypts your files using public-key encryption, and unlike other malware this
encryption key remains on the hacker’s server. Attacked users are then asked to pay huge
ransoms to receive this private key.
34 | P a g e
9. Spam
Spamming and phishing are two very common forms of cybercrimes. There is not much you
can do to control them. Spam is basically unwanted emails and messages sent onto an online
computer.
10. Phishing is a method where cyber criminals offer a bait so that you take it and give out the
information they want. The bait can be in form of a business proposal, announcement of a
lottery to which you never subscribed, and anything that promises you money for nothing
or a small favor. There are online loans companies too, making claims that you can get
insecure loans irrespective of your location. Doing business with such claims, you are sure
to suffer both financially and mentally.
12. Malvertising
Malvertising is a method whereby users download malicious code by simply clicking at
some advertisement on any website that is infected. In most cases, the websites are innocent.
It is the cyber criminals who insert malicious advertisements on the websites without the
knowledge of the latter.
13. PUPs
PUPs, commonly known as Potentially Unwanted Programs are less harmful but more
annoying malware. It installs unwanted software in your system including search agents and
toolbars. They include spyware, adware, as well as dialers. Bitcoin miner was one of the
most commonly noticed PUPs in 2013.
14. Scams
For making a quick profit, to cheat or swindle. Notable among Internet scams are, scams
which misuse the Microsoft name and other general tech support scams. Scammers phone
computer users randomly and offer to fix their computer for a fee. Every single day,
scores of innocent people are trapped by scam artists into Online Tech Support Scams
and forced to shell out hundreds of dollars for non-existent computer problems. Eg Click
Fraud: Repeated clicking on an advert to either increase a site's revenue or to use up a
competitors advertising budget.
15. Pharming: False websites that fish for personal and financial information by planting
false URLs in Domain Name Users.
16. Fraud A wide-ranging term for theft and fraud committed using a credit card or any
similar payment mechanism as a fraudulent source of funds in a transaction. Also the
manipulation of computer records for personal gain or credit. Salami slicing a form of
fraud which is committed by the practice of stealing money repeatedly in extremely small
quantities
35 | P a g e
17. Forgery
The process of making, adapting, or imitating objects, statistics, or documents, with the
intent to deceive. Digital Forgery: New technologies are used to create fake checks,
passports, visas, birth certificates with little skill or investments.
36 | P a g e
Restrict access to all the sensitive information about yourself or your business. You can do so by
using strong passwords as well as user access levels in the case of database information.
8. Hire a Security Expert
His job is to routinely check your systems for potential risks and prevent them. As a business
expands in its operations, it creates greater loopholes for access. In case of intrusion, an expert, will
use his expertise to mitigate the damages.
9. Use separate machines
To have totally separate and isolated machines for external access and separate isolated machines
for internal communications. When a secure computer and a computer for external access are in the
same building, communications between them should be via memory sticks or Cds and not via wire
or cable or otherwise.
10. Disabling Features in Microsoft Windows that makes my computer vulnerable to attacks.
1. Data Classification
In order to protect your critical assets, you need to know exactly where they are. Data classification
software will automatically scan your repositories, both on premise and cloud-based, and classify
sensitive data as it is found. Some solutions allow you to select a pre-defined classification
taxonomy, which allows you to classify certain types of data.
37 | P a g e
Since a large number of security incidents are caused by negligent insiders, security awareness
training is crucially important. Employees must understand the importance of good password
hygiene and must be trained to identify suspicious email/SMS messages, as well as phone calls. They
will need to check for email messages that are sent from public email domains, messages with poor
spelling and grammar, and messages that create a sense of urgency. Employees should never
download attachments from unknown senders or click on links to untrusted websites.
7. Cloud Security
Cloud security is a broad term that involves a wide range of security measures, ranging from
implementing robust access controls to encrypting sensitive data, and carefully reviewing all security
settings and agreements associated with your cloud service provider. You must ensure that your
chosen security solutions are able to discover, classify and monitor all sensitive data stored in the
cloud.
8. Application Security
It is common for web applications to contain vulnerabilities, hence why we need to install
updates/patches. Broken access control methods, cryptographic failures, and security
misconfiguration are among some of the vulnerabilities that exist in modern applications. One of the
most common types of application security threats is insecure web forms, which will expose the
application to SQL injection attacks. If the application developer fails to properly sanitize the web
form inputs, attackers can inject code into them that queries the underlying database. In some cases,
the attacker is able to extract large amounts of valuable data using this approach.
9. Patch Management
All systems and applications must be patched in a timely manner. If your company uses lots of
proprietary software, it’s generally a good idea to use an automated patch management solution to
ensure that you don’t miss anything.
Both individuals and in particular businesses should have plans in place to cover the eventuality of
hardware failure or loss and/or data loss or corruption. Such disaster recovery or "business
continuity" plans need to address how data would be recovered, what hardware would be used to run
critical applications, and by whom. Such plans particularly need to take into account any current use
of out-of-date software applications that may not be able to be replaced and/or run on replacement
hardware and operating systems. To recover back-ups of data that cannot be run on any available
hardware and software will not in any way ensure business continuity!
38 | P a g e
Depending on the types of threat they are intended to cover, disaster recovery plans may rely on one
of a mix of strategies (and a mix is arguably often best). One option is on-site standby, where
duplicate systems exist that can be used to run critical operations (provided that data is still available
or can be recovered). The need arises.
As an alternative to on-site standby, some sort of off-site standby is very common. If a company has
multiple buildings or premises, then it makes sense both to hold off-site back-ups across these
locations, and to ensure that key system functionality can be duplicated across sites.
Some businesses also have "reciprocal agreements" with other companies to make use of their
computers to run key operations in the event of a disaster (such as a fire that destroys their premises).
As a final element of disaster recovery planning, replacement purchase plans should be in place. In
the event of fire or theft, the last thing most individual users or companies would want to be thinking
about is where to purchase new computer equipment from, and what specification to choose.
How can you secure your computer from hackers?
39 | P a g e
to break short, easy passwords in minutes. Don’t use recognizable words or combinations
representing birthdays or other information hackers can connect to you. Don’t reuse passwords,
either. If you have too many passwords to remember, consider using a password manager, such as
Dashlane, Sticky Password, LastPass, or Password Boss.
40 | P a g e
11. Use two-factor authentication as an additional defense layer.
Passwords are the first line of defines against computer hackers. However, a second layer boosts
protection. Many sites let you enable two-factor authentication, which boosts security because it requires
you to type in a numerical code — sent to your phone or email address — in addition to your password
when logging in.
The rest of our tips will address securing mobile devices from hackers, which requires unique
security measures. Consider the following mobile device management tips.
41 | P a g e
TYPES OF COMPUTERS
TYPES OF COMPUTERS
Computers can be classified according size, processing power or use. There are four major
types of computers namely: PCs or microcomputers, Mini computers, Mainframe computers
and Super computers.
1. Microcomputers or PC (Personal computers)
These are all small computers and those that can be used by one user at a time. They are further
classified as Desktop computers and Portable or Mobile computers.
(a) Palmtops are portable computers that can be used while being held on the palms. Palmtops
are a type of microcomputers. Most have a touch sensitive screen. Examples include smart-
phones, PDA, iPads, calculators, tablets and wearables-such as smart watches.
(b) Laptops: are portable computers that can be used whilst on the laps, table or desk. They are
also a type of microcomputers. Examples include Net books and Notebooks. They’re battery
powered and have fixed keyboards and touch pads.
42 | P a g e
Advantages Of Laptops Disadvantages OF Laptops
Portable, can be more powerful than Relatively expensive, need frequent
desktops, can be used instantly, low upgrades, easily stolen, health hazard
power usage. (Repetitive strain injury (RSI) and eye
strain.
(c) Desktops: these are computers that can only be usable if placed on a desk or table. They are
also a type of microcomputer larger and heavier than palm tops and laptops. Desktops
usually comprise of a separate keyboard, mouse, System unit, printer, and other peripherals.
They are commonly used in offices, homes, schools, banks, for security, in weather stations
and small business applications.
Advantages Of Desktops Disadvantages OF Laptops
Cheaper than laptops, have a longer life span Not portable, use lot of desk space, not
compared to portables, better option for battery powered and too much cabling.
gaming apps, more secure than portables.
Advantages of Microcomputers Disadvantages of Microcomputers
-Most of them are portable and handy -Some are portable and some are not.
-relatively cheap and easy to work with -smaller capacity compared to mini,
-they are general purpose machines mainframe and supercomputers
-can process small to huge amounts of data -easily stolen.
-some operate on battery and can be used in areas -some have limited use
where there is no electricity.
2. Minicomputers/Midrange computers
3. Mainframes
43 | P a g e
Mainframes acquired their name because of their size, typically as large as a six-foot-tall closet.
They also required specialized heating, ventilation and cooling, as well as a dedicated power
supply. In practice, this meant a separate room had to be dedicated to house the mainframe
computer systems. They are used by institutions to serve multiple users from personal
computers used by individuals. Mainframe computers are capable of handling and processing
very large amounts of data very quickly - much more data than a typical individual needs to
work with on his or her own computer.
4. Super computers
The most powerful and fastest type of computer. A supercomputer is a type of computer that is very
expensive and has massive computing power. They are used for specialized applications that
require immense amounts of mathematical calculations. They run a small number of programs at a
time thus making them fast. They can process billions or trillions of calculations or computations
per second. Their sizes can vary; they can be as small as microcomputers or as big as mainframes
They can be used for weather forecasting, for scientific and engineering applications,
animated graphics, fluid dynamic calculations, nuclear energy research, and petroleum exploration.
They are also use for scientific work such as testing bombs and modeling of aircrafts and climate
predictions.
44 | P a g e
The chief difference between a supercomputer and a mainframe is that a supercomputer channels
all its power into executing a few programs as fast as possible, whereas a mainframe uses its power
to execute many programs concurrently.
45 | P a g e
-a computer that represent data in bits e.g. digital watches. Computers that handle data of
a discrete values, i.e. digital data. Zeros and ones.
-Are the most common types of computers which store, process and represent data in
discrete values of 1s and 0s.
-They also use the value 1 to mean ON and 0 to mean OFF
-Each number, letter or special symbol is represented as series of various combinations of
1s and 0s.
-used to store record and manipulate files
-examples are Digital watch, desktops, laptops,
-Digital computers are used in business, schools, hospitals and homes
COMPUTER HARDWARE
These are the physical mechanical or tangible components of a computer. From the diagram
above, examples are printer, System unit, speaker etc. Computer hardware is classified as
(a) input hardware
(b) and the Processor
(c) output hardware
(d) storage hardware
(e) communication or network hardware
ELEMENTS OF A COMPUTER
INPUT-A stage or process by which data is entered into the computer using a variety of methods.
E.g. using the keyboard to type a letter, using a scanner to input a picture, writing on the computer
screen using a stylus pen. Etc.
PROCESS- A stage when input data is transformed from one state into another. E.g. calculated,
sorted, compared, formatted, etc. for example sound data captured though a microphone can be
processed and stored as an mp3 audio file.
STORAGE
-When data or information is stored into the computer for future use. Each individual piece of
information is stored under a unique name in a unique folder. A received email can be stored for
future use. Download notes from the internet can be kept in the computer.
OUTPUT
-This is the result of processing presented as hardcopy or softcopy.
46 | P a g e
Hardcopy is tangible output such as on paper while softcopy is information displayed on a screen.
CONTROL
-This an ongoing process where a computer (itself) coordinates the general activities of the whole
computer’s internal or external processes. E.g. handling computer interrupts, handling computer
errors, managing two or more programs running on the same computer, fetching data and executing
the instructions as to how the data should be correctly processed etc.
INPUT DEVICES
These are Devices that receive data or instructions from sources outside the computer (CPU). OR -
A category of hardware that is used to enter data into the computer.
-some input devices are for Direct entry devices such as the keyboard and mouse while other input
devices are Automatic data entry devices such as Optical mark readers, bar code readers,
biometric devices, Optical mark readers, smart cards etc.
-all input devices whatever the size or name, get raw data or instructions to the computer for
processing.
EXAMPLES OF INPUT DEVICES
-keyboard, mouse, scanners, joystick, touch pads, document readers, web camera, digital camera,
microphone, sensors, data loggers , Touch sensitive screens, stylus, light pen, magnetic stripe
reader, chip and pin readers, smart card readers. Signature pads, eye pattern detection system, finger
print detection systems etc.
1. Mouse
-A mouse is a pointing input device that is used to input data or instructions by clicking on items on
the screen. A mouse is a pointing input device that rolls on a flat surface to control a pointer on the
screen.
USES OF A MOUSE
Opening, closing and minimizing software and
document windows.
-moving, deleting or grouping items
-useful when editing images.
-clicking and dragging item during movement or
copying and pasting
-position the cursor when typing
-scrolling up and down or left and right a document
-selecting options from a menu or from a set of
icons.
Mice are used on desktop computers and can also
be connected to a laptop as an alternative to the
laptop touch pad.
47 | P a g e
-optical mouse detects movement using a special light (infrared beam) instead of ball.
- A mouse can have a scroll button (wheel) which speeds up the process of moving through a
displayed document.
-some mice are codeless
-most mice take up a shape like a real mouse (creature)
-another special mouse is called a tracker ball
Advantages of mice Disadvantages of mice
-optical mice do not pick up dirty easily. -old mouse types get dirty easily.
-faster than the keyboard -people with disability of hands cannot use a
-allows rapid navigation through folders and mouse
applications -They quickly get damaged
-small and take up little desk space. -they are difficult to use if there is no flat
surface
2. KEYBOARD
-a device used to enter data or instruction into the computer mostly by typing.
TYPES OF KEYBORDS
1. QWERTY KEYBOARD.
Or standard keyboard spell
QWERTY on the first line of
letters hence are called QWERTY
keyboards.
2. CONCEPT KEYBOARDS
Are special and specific purpose input devices.
-they are intelligent input devices containing
their own chips to process instructions.
-each key has its ASCII equivalent. -uses icons
and phrases instead of letters.
-they are not common keyboard because they
are not standardized.
-they are used in fast food restaurants, offices,
shops, bars and cinemas where single key
represent an item. E.g. a key labeled TAX may -numeric keypad may be common in retail
result in the computer calculating tax once like supermarkets and ATMs As well As Chip
pressed and Pin Machines including EPOS.
-used when working with spreadsheets
48 | P a g e
3. ERGONOMICS KEYBOARD
Have shapes and design that help
reduce health related problems such
as Carpal tunnel problem and RSI
(repetitive strain injury.)
-most have funny shapes.
4. BRAILLE KEYBOARDS
-are used for visually
impaired people. Its letters
can be felt by the finger
because they are embossed
on the keyboard surface.
3. SCANNERS
A scanner is an optical input device that reads a pattern of printed bars that appear on products.
TYPES of scanners
4. BARCODE READERS
-a barcode reader an optical input device used to enter product identification code made of printed
thick and thin bars into the computer
-a bar code is a product identification code made of printed thick and thin bars.
49 | P a g e
Fixed Bar code
reader
Information shown on supermarket products differs with the country or system used one being the
European Article system. This shows information such as product
1. Country of origin (country code)
2. Manufacturers number (company code)
3. Product number or code
-After the above information is read from the product bar code, the computer then looks up for
more information from a computer database such as
-name of product
-the price
-etc.
A latest development in bar code scanning called 360 scanner is capable of scanning a product bar
code 360 degrees so whichever way the product is placed on the reader a reading will be taken. This
is a faster way of scanning.
Application Areas of Bar Code Readers
-often built-in POS terminals in supermarkets or shops
-library check out points
-they are used for automatic stock entry
--used in luggage handling systems at air ports, sea port or in warehouses s
-used to read bar codes on shop products, videos, books, food, etc.
50 | P a g e
Hand held scanner
7. DOCUMENT SCANNERS/READERS
-these are types of scanners that read written documents, text or images.
TYPES ARE
Flatbed scanner
Flatbed scanner
-it is a document reader. It is flipped up and then an image is placed on a glass surface. The user
closes the lid before scanning a document.
-the scan head moves across the image to scan it.
-most common in supermarkets, department stores and educational institutions as well as in photo
processing shops
MICR
(Magnetic Ink Character Reader)
51 | P a g e
Magnetic ink characters are numbered characters (of a special shape or font) that we find at the
bottom of a cheque.
-these characters contain iron particles that make it easy to read cheque data.
-these numbers represent special information about the cheque.
These are automatic data entry devices used in banks for clearing cheques.
OCR
(Optical character reader)
Optical Character Recognition is a
technology that enables you to convert
different types of documents, such as
scanned paper documents, PDF files or
images captured by a digital camera into
editable and searchable data.
A printed document or handwritten document is taken to an OCR. The OCR scans it as an image
then using special software; each individual text character is recognized as then together is stored in
the computer as a word processing document.
-used to scan financial documents such as company accounts, directly into a spreadsheet.
--used to scan text directly into a word processor
.-used in insurance companies
-used in billing systems (gas, electricity, water and telephone bills forms)
-Processing of bank GIRO- forms
-used on tablets or PDA where a tablet/PDA can accept handwritten data from a stylus pen and
convert it into different document formats for future use.
-used in some passport application forms
-used in car monitoring systems in conjunction with CCTV. CCTV captures car registration number
and print it, then OCR captures printed number for registration and insurance verification
52 | P a g e
OMR
(Optical mark reader)
-a document scanner. Optical Mark
reading (OMR) is a method of entering
data into a computer system. Optical
Mark Readers reads pencil or pen marks
made in pre-defined positions on paper
forms as responses to questions or tick list
prompts
7. BIOMETRIC SCANNER
-A pattern recognition system which makes a personal identification based on person’s unique
physical characteristics
Biometric scanner
VARIATIONS
-face recognition biometric
scanner
-finger print matching USES
-iris and retinal scanner -users come and talk into, touch looks etc. into the scanner
-voice recognition system as a way of inputting data.
-Hand geometry -can be used in mobile phone
-desktop and laptop computers
-smart cards
-can be used to control entry to buildings
-can be used to replace keys in a car
Advantages of biometrics
-no need to remember or carry personal identification
-a good security measure
-the person has to be present thus theft and fraud is reduced.
Disadvantages of biometrics
-not yet sufficiently accurate, paper documents still necessary
-computers are prone to error.
-similar to a tracker ball I use. -The device consists of a stick located into a socket. Moving the
stick (lever) produces corresponding movements of an image or cursor on the screen in a similar
direction.
The joystick has one or more buttons to facilitate further input. - Those used for games are called
game controllers. Disabled people can use them.
54 | P a g e
10. WEBCAM
-people can keep in contact with each other without need to travel.
12. MICROPHONE
An analogue input device for voice or sound (audio) data only.
-used in presentations on a large gathering just for amplified output.
-used in studios in music applications, used in churches , used for setting up voice recognition
systems, used in video conferencing, used on mobile phones and PDA for speech input, used on
PC , used together with voice recognition systems, used in voice mail systems or messages
-used with MIDI systems (Musical instrument digital interface- i.e. hardware and software that
connects musical instruments to a computer), used in natural language processing systems, used
in cars, used in voice over internet protocol (VoIP) platforms.
57 | P a g e
USES OF DATA LOGGERS
Used in traffic control systems in roads, Data collection at weather stations, in a greenhouse
system, used in hospitals in intensive care units.
-Data loggers with permanent computer connections are suitable for science experiments in
schools.
-In pollution measurement system e.g. in rivers or dams
NB -data logging has many application and fields that cannot be exhausted in this column.
-a touch screen is an input device that can detect the presence and location of a touch to the
screen and also respond to the touch.
-touch screens respond to touch because they use sensors to detect the touch.
-the type of sensors used differs with the touch screen technology.
-the touch screen is a special type of an LCD
-used in kiosks, airports, railway stations, tourism offices etc. for public information, on
tablets/PDA, on smart phones, on finger prints detection systems e.g. at some ATMs at bank,
used in shops at POS terminals, used in fast foods restaurants and bars , used in department
stores and supermarkets, used as part of INTERACTIVE WHITE BOARDS (large wall
screens) for education, used in CBT for answering on-screen tests.
58 | P a g e
-they are tamper proof, i.e. other data besides Same screen, they cost more than their
what it understands cannot be entered, they are alternative input devices
less dirty than keyboard and mice, they are -once screen is damaged, whole device stops
easy to clean, data and instruction entry is fast working, they have limited uses, lead to
strain of muscles i.e. RSI
14. SENSORS
-A sensor is an input device that detects an environmental condition and responds by outputting
a signal. It is used to detect physical quantities from the environment for input to the computer.
-a sensor is an input device that is used to detect an external change in an environment.
SOME TYPES OF SENSORS
TEMPERATURE SENSOR -used in central heating systems to measure temperature so that
computers can control it.-used in hospital intensive care units for body and room temp
measurements.-used at weather stations-control system of a furnace -automatic washing
machines
-Used to monitor/control in chemical processing -microwave ovens
PRESSURE SENSOR -Used on touch screens -used in traffic control systems e.g. counting
vehicles on the road -used in hydraulics systems -bugler alarm systems to detect intruders -
washing machines
-In robots -environmental monitoring systems
LIGHT SENSOR
Used in photo processing machines, street lights, home lighting systems, etc.
SOUND SENSOR
-they detect sound esp. of a specific pattern and thus they can be used in different setups.
-environmental heath office can use sound sensors to detect level of sound from the
neighborhood such as from bars, homes, etc. where music is being played. -Burglar alarm
systems, -monitoring liquids power flowing in pipes.
59 | P a g e
PROXIMITY SENSOR
The sensor has two parts. If the parts are moved away from each other, then a signal is output.
-also detects distance from objects. -installed in windows to report burglary by use of alarms.
-used in cars to warn driver of objects ahead or behind.
POSTION SENSOR
-it detects an angle of turn, rotation /or spindle. -used in robot arms
PH sensor
-This Type of Sensor Is Usually submerged In Liquids, Soil or Solutions -Used to find out how
basic or acidic a solution is. -Greenhouses to monitor soil acidity -chemical processing plants, -
environmental monitoring. -used to measure acidity in rivers (pollution monitoring)
To use it you hold the pen in your hand and write or draw on a special pad or directly onto the
screen.
-the pen can also be used as a pointing device and to select options on the screen
-they can be used to write documents as save them in a desired document format such as word
or pdf.
-they are modern pens that are used with LCD screens.
-the computer that used a stylus pen must have special software, a dictionary of terms
60 | P a g e
-faster to enter data in own handwriting as -sometimes there are problems of lag (delay)
people are used to manual pens already when drawing
61 | P a g e
-examples of data is stored on the stripe can be account number, start date and expiry date and
bank/sort code, branch code, security number etc. of the card.
-some card systems allow users to write additional information on the stripe such as signatures.
-the card reader reads the magnetized data and converts them into digital symbols for the
computer to understand.
Also known as LOYALTY CARDS and are used in the following ways:
(a) Used as CREDIT CARD (like debit cards but these do not deduct money from issuing
organization immediately. The organization will makes payments at a later stage or date
after card has been used. E.g. VISA and MASTERCARD.
(d) Used as DEBIT CARD (they are issued by bank and can used in supermarkets for cash
withdraws or for purchases) users of the card must have a bank account from which the
money is withdrawn.
The processor chip is loaded with personal identification details such ads DOB, home address
and PIN hence can be used like a passport. -data on the chip can be updated and it stores more
user information than on strips. -it is also a swipe card. -the chip can also do some processing
in the card as well storing new information.
They are use -in banks -by government agencies for travelling -in libraries to read borrowers
number
-At filling stations -used as ID Cards -can be used as public passport passes -used with satellite
systems to decode program signals -they are used as driving licenses. -used to withdraws cash
at ATMs
-the reader has a slot in which the card is slotted to be read. It is not swiped.
-a PIN is entered using a number keypad
-the reader has a small screen that displays instructions.
-usually data stored in the chip is encrypted.
-as the user draws or writes on the pad the drawing is directly entered into the computer and can
be stored in the computer.
-they are ideal for inputting free hand drawings.
-they can be used for retouching digital photographs
-items can be added to it by clicking on it with a stylus.
-They are used for inputting free hand drawing into the computer
-retouching digital photographs
-used in CAD systems
64 | P a g e
-mostly used in countries like Japan and China were their alphabet is more of drawing than our
letters.
-more accurate to draw using stylus than using a mouse
-drawing icons and buttons are on the tablet and not on the screen, this leaves the screen for the
full display of the image
-the transmitter of the pulse is usually a light emitting diode, at the front of the remote control.
The receiver is always on the front of the receiver and ones it receives a signal it sent it to a
processor for decoding and acting.
-the strength of the infrared varies, some close some a far.
-It is used on DVD readers, home-theaters systems, satellite receivers, HI-FI music systems,
multimedia projector, model cars, toys, garage doors
An interactive whiteboard is a large, interactive screen that connects a computer and a projector.
The projector projects the computer's desktop onto the screen of the interactive whiteboard. The user
can control the computer by using a special pen, finger or another tool to touch the screen of the
interactive whiteboard. Normally, interactive whiteboards are fixed on walls. However, there are
some mobile interactive whiteboards. Interactive whiteboards are used in many different places such
as in classrooms, in work groups and in training rooms for professional coaching. Interactive
whiteboards are the modern version of the traditional whiteboards used in schools.
65 | P a g e
The use of projectors comes with several pros and cons
66 | P a g e
SYSTEM UNIT & the CPU
The system unit or casing has many parts. See diagram below.
Motherboard:-The motherboard is the main circuit board of microcomputer. It is also known as main
board or system board. The CPU is fixed on a motherboard.
67 | P a g e
CPU:-The Central Processing Unit, is the central electronic chip that processes data in the computer
according to given instruction. See further explanations below.
Memory:-Memory is the part of computer that temporarily store application documents, and system
operating information. (This will be described in the following chapters.)
Bus:-A bus is an electronic line that allows is and OS instructions and data to move from one place to
another.
Expansion Slot:-expansion slot appear on the motherboard. They are sockets into which adapters
(additional components) are connected.
Ports and connectors: -A port is connector located on the motherboard directly or through the system
casing.
Bays:-a bay is a space inside the computer case where a hard drive, floppy drive or CD- ROM drive sits.
Power supply:-A power supply changes normal house hold electricity into electricity that a computer
can use.
Sound components: - A sound card lets a computer play and record high quality sound.
68 | P a g e
-It is made up mainly of the ALU (Arithmetic logic unit, and the control unit (CU), however the
main memory also plays an important part.
-computer systems with more than one processor do multiprocessing. Dual Core means two processors,
Corei3 means 3 processors, and corei7 means 7 processors. The more the processors the faster the
computer.
69 | P a g e
>= greater than or equal to Program Counter (PC),
<>not equal Memory
Data Register (MDR),
Index Register (IR), and
Memory Buffer Register
(MBR). Registers are used for
performing the various
operations.
COMPUTER OUTPUT
To view what the computer has processed for us we use what we call OUTPUT DEVICES. Visual
devices (including Visual Display Units [VDUs], screens, OR monitors) Hard copy devices
(including ink jet printer, laser printers, dot-matrix printers, and plotters), Sound devices AND
Computer controlled devices (including robots) These devices show us information in various
forms that is as softcopy, or hardcopy as well as sound or light. These output devices are actually
peripherals that receives data from a computer, usually for display, projection, or physical
reproduction. Below are the most common output devices.
LCD SCREEN
LCD screens are most often seen on portable or laptop computers
Most are touch screens
These are used in these applications because they are small and light.
Also used where space is at the premium.
70 | P a g e
The molecules this substances line up in such a way that the light behind the screens and
creates an image.
Use in banks and Multinational companies
CRT MONITOR
Creates the image on the screen through electronic beam
This is same type that is use in Television
It consists of one or more guns
These guns generate red, green and blue (RGB) colors.
Some allow light pen use
Not tough sensitive
A Monitor is the most commonly used output device used to display results of processing.
Pictures on a monitor are formed with picture elements called PIXEL. Monitors may be
Monochrome that will display results in Black & White. Color Monitors are also available. They
display results in multi colors. The latest type monitor screen is the plasma type for TV sets.
Monitor produces soft copy output.
2. PRINTERS
A printer prints character, symbols and graphics on paper.
Printers are used to produce hard copy output.
Print resolution is commonly measured in dots per inch (dpi)
They have vast differences and are for different uses
Two major categories or types of printers are:
Impact Printer and Non-Impact Printer
IMPACT PRINTER
-act like a typewriter
It prints characters or images by striking a print hammer or wheel against an inked ribbon.
Examples of impact printers include Dot matrix printer, Line printer, Daisy wheel Printer, chain
printer and drum printer.
71 | P a g e
Which category does each of the following printers fall?
Dot Matrix LaserJet Ink jet printers Braille printer
Printer printers
………………
……………… …………………
…………………
The Braille is mainly used by the blind. The most common printer types are the once given above
though the matrix printer is also finding its way out of the system.
3. Speaker
72 | P a g e
Speaker produces sound output. We can listen to recorded voices, sounds or music with the help of
speaker. Computer Speaker produces sound output with the help of sound card fixed on a computer
motherboard.
4. Plotter
Plotters are used to draw different designs of buildings or internal structure of machines. Mostly
Engineers and Architects use plotters. They are in different types, shapes and sizes. They use large
sized paper, produces high quality printouts, are slower and they are expensive to buy.
5. Multimedia Projector.
Multimedia projector is used to produce computer output on a big screen for larger audience or
viewers to see. These are used in meeting rooms or in classrooms, training rooms, lecture rooms,
advertising places. They can also project from a DVD player or TV.
1. CONTROL DEVICES
73 | P a g e
An actuator is device for moving or controlling something, motors are used to rotate
machinery, e.g. house fans. A buzzer or beeper is an audio signaling device, typical uses of
buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse
click or keystroke. Light output light like security light or street light after certain input or certain
action. A heater converts electrical energy into heat.
GPS is a system of 30 or more navigation satellites circling Earth. These satellites constantly send
out signals. A GPS receiver e.g. the one in your phone listens for these signals. Once the receiver
calculates its distance from four or more GPS satellites, it can figure out where an object is located.
So for a device to be located on the earth it should have a receiver.
74 | P a g e
COMPUTER STORAGE
COMPUTER STORAGE
IMPORTANT TERMS
(a) DVD DRIVE- used to read CD and DVD only. Some can also write
Both the CD and DVD i.e. DVD writer.
(b) CD DRIVE- used to read CD only. Some can also write the CD
(c) FLOPPY DRIVE- used to store and retrieve data from Floppy disks only.
(d) TAPE DRIVE- used to store and retrieve data from specific type
Of magnetic tape. Drive varies with type of tape used.
(f) BUFFER
Temporal memory in the computer used in data spooling during
Input and output of information.
(g) PORT
A connection point onto a computer for a peripheral device.
(h) Storage- is a description of the process of keeping computer software, data or information.
(i) Storage media are parts of a computer that keep computer programs or data either temporary
or permanently. A collective name for disks, tapes and memory cards etc.
Primary memory is used in computers of all types, modern printers and some cameras. -It is used to
hold programs (operating system or control programs or application programs) that are waiting to
be processed.
-It is used to hold application programs that are currently being processed.
- It is used to hold data that is waiting processing
-used to hold input data during processing
-used to hold information immediately after it has been processed ready to be output.
-there are two types of primary storage namely RAM and ROM (Random access memory and
Read only memory)
-at the time of writing of this book some computers have a RAM capacity of 16 Gigabytes.
76 | P a g e
ROM (Read only memory)
Read only memory). -holds data and programs that cannot be changed by the user. Information on a
ROM chip is called firmware. They are hard-wired onto the motherboard. When a computer is
switched on, the first programs to run on the computer comes from ROM.
-ROM is permanent, nonvolatile and is used for booting routines.
SECONDARY STORAGE
77 | P a g e
Is also known as backing storage, auxiliary storage, external storage, or permanent memory.
SECONDARY STORAGE -includes disks, tapes, memory sticks, memory cards, pen drives etc.
that are connected to the computer motherboard through ports or cables.
HARD DISK
-circular storage media made of a metal coated with a magnetized material
-there are two types i.e.
fixed hard disks and
External hard disks.
-data is stored randomly onto the surface.
-data is stored in-situ randomly onto the surface, i.e. that means in can be overwritten.
-There are several types and sizes of hard disks
-The common once are the Desktop and laptop hard disks, but we also have Mass storage HD
Media disk used for a variety of applications especially in broadcasting business.
78 | P a g e
-Fixed hard disk are used to store operating systems and application programs
-external disks can be used for backup
- External hard disks can be used to boot up computers that fail
-external hard disks are used to store data and programs that need to be transferred from one
computer to another.
-all the two types can be used to store user information.
-fixed hard disks are used in real time systems (e.g. robots, control systems and airline booking etc.
-fixed disks are also used as file servers for computers on a network or on internet.
They are connected to a computer via a USB port. -data is stored randomly onto the surface.
-mostly used for backing up data and software.
-they are used to transfer files from one computer to another
-can be used to store personal information.
79 | P a g e
CDs Store data as a series of (optical pattern called) bumps using laser beam technology. They are
read only memory devices.
-can store up to 700MB
-differs with DVD in that their surfaces are lighter in appearance and have a smaller capacity
-Again a CD drive cannot read a DVD while a DVD drive can read both the CD and DVD.
-data is stored randomly onto the surface.
USES OF CDs
-used to hold music and software for distribution., used to hold animation files, used to store
computer data and programs, used to boot up a computer., used for back up, Most common on PCs,
most software is sold on CD rather than DVD, used for archive data
80 | P a g e
-also called DVD ROM
-DVDs differ with CDs in that their surfaces are dark in appearance and have a bigger capacity
-some store up-to 4.7 GB of data and others 8.5GB other up-to 100GB
-data is stored randomly onto the surface.
4. Blu-ray (BD-R)
-a blue laser is used to read or write Blu-ray disks as opposed to the red laser used in most
conventional CDs and DVDs. The Blu-ray use a shorter wavelength in reading and writing
information and this makes them faster to use.
-a new technology with a high capacity than other DVD types (from 25GB, 50GB, 100GB)
-used to store high definition videos and films
-it is possible to playback a Blu-ray video disk and record it simultaneously onto another media.
-data access is faster than on other DVD types.
-However they are expensive -They allow data encryption at disk-write time and this is helpful as it
avoids piracy.
USES OF DVDs
-Used to store videos and films for sale or distribution.
-Used for back up
-Most common used on PCs and DVD players
81 | P a g e
-used to archive data
-used for storing TV programs that do not need any update
-Blu-ray disks are used to store high definition (HD) videos
-Blu-ray disks are used for long play films- 2 hours of HDTV and 13 hours on standard definition
TV.
-blue ray are also used in home video consoles.
-blue ray are used as back up for hard disks.
-DVD RAMS - Used in satellite receivers and Camcorders.
82 | P a g e
Smart Media cards Multimedia cards.
83 | P a g e
They have several names i.e.
1. Pen drives
2. Memory sticks
They consist of PCB (printed circuit boards) enclosed in a plastic case.
-can store 1GB, 2GB, 4GB, 8GB, 16GB, 32GB, 64GB, 128GB, 256GB etc.
-they store data directly/randomly on their storage spaces.
84 | P a g e
-most have long life span except for floppy disks and CDs
-it is easier to store and update data on disks.
-large storage capacity for most disks and tapes and flash memory
85 | P a g e
COMPUTER SOFTWARE
Software refers to all the various programs that are run on a computer system. These
programs are installed in a computer to make the computer or other related devices usable,
otherwise a computer is not usable without software. Software is logical in nature while hardware is
physical.
Shareware : software usually intended for sale after a customer has had a trial period.
Freeware : free software, but with copyright restrictions, usually given for testing for a specific
testing period.
Open source: (software where the source code is furnished and users agree not to limit the
distribution of improvements.
Malware: This stands for malicious software. Most common forms of malware are Trojan
horses, worms and viruses.
Software is divided commonly into two main categories: namely system software and
Application software.
A.) System software: programs that control the basic functions of a computer and comes usually
preinstalled with the machine. System software refers to programs that controls and
coordinates all operations (internal and external) of computer system. Most System software
operations are invisible to the user.
System software controls and coordinates the procedures and functions of computer hardware and
ensures that there is good communication between hardware, software and the user. Systems
86 | P a g e
software carries out middleman tasks to ensure communication between other software and
hardware to allow harmonious coexistence with the user. System software is the first layer of
software to be loaded into memory every time a computer is powered up.
Systems software categories
Operating system: Harnesses communication between hardware, system programs, and other
applications.
Utility: perform diagnostic, maintenance and routine computer tasks and ensures optimum
functionality of devices and applications.
Translator: Translates Assembly language and high-level languages to low-level machine
codes.
Device driver: Enables device communication with the OS and other programs.
Firmware: Enables device control and identification.
Operating
system:
Utility:
Translator:
Device driver
87 | P a g e
Popular OSs for computers are: Windows 3.1, XP, 10, Windows 8, Mac OS X, and Ubuntu,
Windows 10, etc.
Popular network/server OS are: Ubuntu Server, Windows Server, Red Hat Enterprise, and
Linux
Popular internet/web OS are: Chrome OS, Club Linux, and Remix OS
Popular mobile OS are: iPhone OS, Android OS, and Windows Phone OS
2. Utilities
Utilities are system software programs designed to perform diagnostic and maintenance tasks for
the computer. It is a type of system software which sits between system and application software.
They come in handy to ensure the computer functions optimally.
Most are third-party tools but they may come bundled with the operating system.
Examples and features of utility software include:
Antivirus and security software for the security of files and applications, e.g., Malware bytes,
Microsoft Security Essentials, and AVG.
Disk partition services such as Windows Disk Management, Ease Partition Master, and
Partition Magic.
Disk defragmentation to organize scattered files on the drive. Examples include Disk
Defragmenter, Perfect Disk, Disk Keeper, Comodo Free Firewall, and Little Snitch.
File Compression to optimize disk space such as WinRAR, Winzip, and 7-Zip.
Data backup for security reasons, e.g., Cobian, Clonezilla, and Comodo.
Hardware diagnostic services like Hard Disk Sentinel, Memtest, and Performance Monitor.
Data recovery to help get back lost data. Examples include iCare Data Recovery, Recuva, and
EaseUs Data Recovery Wizard.
Firewall for protection against external threats, e.g., Windows Firewall.
Etc.
3. Language Translators
These are intermediate programs are used by software programmers to translate high-level language
source code to machine language code. Popular translator languages are assemblers, compilers and
interpreters. They're usually designed by computer manufacturers.
(a) An assembler is a low level language translator that takes basic
computer instructions written in assembly language i.e. language written pneumonic codes,
and convert the codes into a pattern of Bits (BInary digiTS) called machine language.
Machine language is a language of zeros and ones. This is the language that all computers
understand.
(b) Interpreters and compilers all translate high level language into machine readable
form however they differ in the way they translate.
Besides simplifying the work of software developers, translators help in various design tasks.
They;
Identify syntax errors during translation, thus allowing changes to be made to the code.
Provide diagnostic reports whenever the code rules are not followed.
Allocate data storage for the program.
List both source code and program details.
4. Device Drivers
A device driver is a piece of software that controls a particular type of device (peripheral) which
may be attached to your computer, such as a keyboard or a mouse. Each peripheral device that we
88 | P a g e
connect to the computer must have its unique driver software installed. Driver software ensures
communication of a specific device with the operating system. By default certain for devices
already in the market come with the operating system and some have to be added at a later time
when the a new device is added to the computer.
Examples of devices which require drivers:
Mouse
Keyboard
Soundcard
Display card
Network card
Printer
If a device is newer than the operating system, the user may have to download drivers from
manufacturer websites or alternative sources.
5. Firmware
Firmware or microcode is software that is loaded into a special area on a microprocessor or read-
only memory (ROM) this software is permanent or may be changed after a long period of using the
computer. Firmware is embedded in ROM, or EPROM memory chip for the OS to identify it. It
directly manages and controls all activities of any single hardware. Examples are:
The BIOS program (Basic Input/output System) is a program that runs during POST (Power on
Self-Test) and it checks the computer to make sure all basic configured devices are connected and
are in place and ready to be usable. It is the first software to run when a computer is switched on. It
first checks to make sure components like the processor, RAM, keyboard, mouse and disk drives
are functional. If all the crucial and configured components are fine, it will run the boot loader.
The boot program (boot loader) this program loads the operating system into the computer's
main memory or random access memory (RAM).
The major difference between firmware and device drivers is that firmware will always reside
within ROM or the processor while drivers are installed into the operating system. All are
used to identify computer devices.
B.) Application software: these are programs or apps that help users to perform specialized tasks,
functions or activities on a computer, such as accounting, communicating, data processing, word
processing etc. They are used to solve user problems or tasks.
It is a term used for software created for a specific purpose. Application software is a
program or collection of programs used by end users.
Application software are used to directly manipulate text (alphabetic letters and symbols),
images or graphics (pictures, drawings and diagrams), numbers (digits 0-9.) audio and
video data.
89 | P a g e
TYPES OF APPLICATION SOFTWARE
A.) Application Software Suite (also known as integrated package, Off -The-Shelf Software
or General Purpose software) or commercial off-the-shelf (COTS) software. Software suite is a
collection of separate application programs bundled and sold as a group. The individual
programs in the package usually have related functions, features and user interfaces, and may be
able to interact with each other, e.g. open each other's files. Business applications often come in
suites.
E.g. Microsoft Office
LibreOffice
iWork
Software suites come in four different types namely productivity, specialized, utility and
personal.
B.) Custom software (also known as bespoke software, tailor-made software, special purpose or
on-the-shelf software) is software that is specially developed to meet unique specific organization
business needs. It is not developed for the mass market. Since custom software is developed for a
single customer it can accommodate that customer's particular needs, preferences and
expectations.
E xa m pl e s of suc h cust om m ade pro gram s are
C o nt ent Ma na ge ment S yst e m ( CMS )
C ust o mer R el at i ons hi p Ma na ge ment ( C RM)
B usi nes s Pr o cess Aut o ma t i o n S yst e m
A ut o mat e d In vo i ci n g
C o mp an y -F a ci n g / C ust o mer -F aci n g Web Po r t al s
E co mme r ce sof t war e s ol ut i ons
B u g t r ac ki n g sof t wa r e
1. Simplicity
Bespoke software is designed specifically around your business so you don’t have to worry
about unwanted features or unfamiliar terminology that is not appropriate to your business.
This reduces learning time and is obviously more efficient to use.
2. Branding and Identity
With unique tools, such as forms and auto messages in your brand voice, you will stand out
from the crowd. Sometimes even a simple detail can be a key differentiator between you and
the competition.
3. Efficient Workflow
it is both faster and easier to use.
4. Complete Development Ownership
There is no pressure to upgrade. This also means you won’t have problems such as new
versions not being backwards compatible with old data or the screen layout changing and
incurring a new learning curve. It’s your software, and your decision.
5. Potential Marketability
a bespoke solution for you could become an off-the-shelf solution for other businesses. You
can sell it and make money.
6. Locally specific
most countries will have unique geographic parameters, such as currency, time-zones and
obviously languages. They may also have different considerations for tax, VAT, and import
duties. These can be fully customized to your geographical areas.
90 | P a g e
7. Integration
Bespoke software can generally be customized to integrate smoothly with any other key
software used within the business – and introducing new applications doesn’t mean the
previous integrations will stop working.
Word Processing software - Use this kind of tool to create and edit documents such as type letters,
type novels, type notes, etc. Examples are MS Word, WordPerfect, MS Works, AppleWorks, and
Lotus Word Pro.
Desktop Publishing software - Use this software to make signs, banners, greeting cards,
illustrative worksheets, newsletters, etc. examples are Adobe PageMaker, MS Word, MS Publisher,
AppleWorks, MS Works, Quark Express.
Spreadsheet software - Use this kind of tool to compute number-intensive problems such as
budgeting, forecasting, etc. A spreadsheet will plot nice graphs very easily. Examples are MS
Excel, Quattro Pro, Lotus 1-2-3, MS Works, and AppleWorks.
Database software - Use this software to store data such as address, membership and other text
information. A database can be used to easily sort and organize records. Examples are, Filmmaker
Pro, AppleWorks, MS Works, Corel Paradox, Microsoft Access, Lotus Approach, Boland,
and Dbase IV
Presentation software - Use this software to create multimedia stacks of cards/screens that can
effectively present a lesson or a sales pitch. The user often clicks on buttons to advance to the next
screen in a sequence. Examples are MS PowerPoint, AppleWorks (slideshows), Hyper Studio,
Flash, Director, HyperCard, Digital Chisel, SuperCard, and Corel Envoy.
Internet Browsers - This software allows one to surf the Web. Often they can read email and
create Web pages too. Examples are Netscape Navigator (or Netscape Communicator), MS Internet
Explorer, AOL Browser, Google Chrome, UC browser etc.
Email programs - These programs send and receive email. Examples are Netscape Messenger
(part of Netscape Communicator), MS Outlook Express, MS Outlook, Eudora, AOL browser.
Graphics Programs (pixel-based) - This software allows one to touch up photographs and create
graphics from scratch. Examples are Adobe Photoshop, Paint Shop Pro, AppleWorks, MS Works,
MS Paint (comes free on Windows PC's), Painter etc.
91 | P a g e
Graphics Programs (vector-based) - This software creates graphics that are similar to
illustrations or cartoon drawings. Adobe Illustrator, Corel Draw, AppleWorks, MS Works.
Communications software - This software allows two computers with modems to communicate
through audio, video, and/or chat-based means. Examples are MS NetMeeting, AOL Instant
Messenger, IRC, ICQ, and CU-SeeMe.
Educational software has the content or features adapted for use in by educators or students. For
example, it may deliver evaluations (tests), track progress through material, or include collaborative
capabilities. More Examples are Driving test software, Interactive geometry software, Language
learning software, Notetaking (Comparison of notetaking software), Software for enabling
simulated dissection of human and animal bodies (used in medical and veterinary college
courses)[4], Spelling tutor software, Typing tutors, Reading Instruction, Medical and healthcare
educational software
Entertainment Software: can refer to video games, screen savers, programs to display motion
pictures or play recorded music, and other forms of entertainment which can be experienced
through use of a computing device. Can also be part of multimedia software?
92 | P a g e
E-WASTE MANAGEMENT
Before we can talk about managing e-waste we need to understand what e-waste is.
What is e-waste?
E-waste is electronic products that are unwanted, not working, and nearing or at the end of their “useful
life. E-waste is any electrical or electronic equipment that’s been discarded. This includes working and
broken items that are thrown in the garbage or donated to a charity reseller like Goodwill. Often, if the
item goes unsold in the store, it will be thrown away. E-waste is particularly dangerous due to toxic
chemicals that naturally leach from the metals inside when buried.
Electronic Utilities
Massage Chairs
Heating Pads
Remote Controls
Television Remotes
Electrical Cords
Lamps
Smart Lights
Night Lights
Treadmills
FitBits
Smart Watches
Heart Monitors
Diabetic Testing Equipment
Copiers/Printers
IT Server Racks
IT Servers
Cords and Cables
WiFi Dongles
Dialysis Machines
Imaging Equipment
Phone & PBX systems
Audio & Video Equipment
Network Hardware (i.e. servers, switches, hubs, etc.)
Power Strips & Power Supplies
Uninterrupted Power Supplies (UPS Systems)
Power Distribution Systems (PDU’s)
Autoclave
Defibrillator
Today, though, a growing amount of e-waste is not considered to be products that have stopped working
or become obsolete. Technological advances are coming at us at such a dizzying speed that a lot of
electronic devices that still work fine are the ones considered obsolete.
Impact of e-waste
China, the U.S. and India contribute around 20 million metric tons of e-waste combined annually, both
imported and exported. Part of the problem is poor care in disposal: It's estimated that only 17% of all e-
waste is properly collected and recycled.
94 | P a g e
In fact, improper and unnecessary disposal of e-waste has a growing and quantifiable negative effect on
the biosphere, human health, and national and personal security. Proper handling of e-waste is important,
but its practice is controversial and can be highly dangerous to humans handling the e-waste.
Biosphere health
Many complex electronic devices contain up to 60 precious metals and elements. Separating and
controlling these metals is extremely difficult and often hazardous to the biosphere. Melting down or
incinerating electronic devices contributes to the increased presence of lead in landfills globally. Further,
the emission of toxic fumes and gases is a leading factor in environmental degradation, climate change,
pollution and contaminated water supply.
Human health
Items such as smartphones and computers contain several hazardous elements. Exposure to these toxic
materials harms humans and can adversely affect the nervous system, heart, and brain, kidneys, liver and
reproductive system.
Many of these electronic appliances and devices contain high levels of lead, mercury and cadmium -- all
known carcinogens. Waste management workers handle these hazardous materials. Exposure to them has
been linked to lung disease, thyroid issues, birth defects, behavioural changes, and cancer in children and
young adults.
Liquid-crystal display and plasma screens, each containing toxins and carcinogens necessary for their
displays, are among the worst offenders. As a result of improper disposal and overburdened landfills, the
risk of exposure has spread to more and smaller communities and their residents.
Security
In addition, the improper disposal and recycling of smartphones and similar devices has created an
imposing threat to national and personal security. Smartphones and computers contain sensitive data
subject to leaks and data breaches. Many of these devices contain highly classified and sensitive
information, yet their easy-to-use nature makes hacking into them simpler.
Completely erasing sensitive data prior to discarding old devices is crucial in mitigating security threats.
What is E-Waste Management?
E-waste management refers to properly disposing and managing electronic waste, including old or
discarded electronic gadgets such as phones, computers, and televisions. The process involves the
collection, transportation, recycling, refurbishing, and disposal of electronic waste in an environmentally-
friendly manner.
The goal of e-waste management is to reduce the negative impact of electronic waste on the environment
and human health by minimizing pollution, conserving natural resources and energy, and promoting
sustainability. Proper e-waste management also ensures the recovery of valuable materials from electronic
waste, such as copper, silver, and gold, to create new products.
95 | P a g e
There are several approaches to e-waste management. Ensuring that any approach taken is sustainable,
cost-effective, and minimizes the environmental impact is essential. Here are some examples of
approaches to e-waste management:
Reduction of e-waste production by encouraging people to buy fewer electronics and to use their
devices for longer periods before replacing them
Reuse and refurbishment of old electronics to extend the life of the devices and reduce the need
for new products to be made from raw materials
Recycling of e-waste to break down old electronics into their component parts so they can be
reused in new products or disposed of safely without harming the environment
Proper disposal of e-waste through designated drop-off centers or adherence to local regulations
for environmental protection
Donating used electronics to non-profit organizations that provide low-cost or free technology to
underserved communities
Implementing extended producer responsibility (EPR) programs that require manufacturers to
take back and recycle their products, incentivizing them to design devices that are easier to
recycle or repair
Adopting circular economy principles that promote the reuse and recycling of materials to
prevent them from becoming waste
The Challenges of Managing E-Waste
The world is becoming increasingly digital, and with that comes an increase in the amount of electronic
waste (e-waste). Managing e-waste poses several challenges, some of which include the following:
Hazardous Materials
Electronic devices can contain hazardous materials such as mercury, lead, brominated flame retardants,
and cadmium. These materials can harm human health and the environment if not appropriately handled
during disposal and recycling.
96 | P a g e
Addressing these challenges requires a coordinated effort from governments, businesses, and individuals
to prioritize the proper disposal and recycling of electronic devices while minimizing their environmental
and health impacts.
Mobile Learning in education is transforming learning for digital natives. Mobile learning in
education is an extremely friendly way to adopt modern teaching methodologies. Not only does it support
visual learning (via audio, video, and images), but it also makes learning dynamic and fast-paced, thereby
keeping students more engaged in a classroom as it conveys course material in a much more effective
fashion.
SMS
SMS, which stands for Short Message Service, is a text-based communication service. It is used to send
messages to mobile devices. SMS can be used on all mobile devices, and it’s not encrypted.
97 | P a g e
MMS
MMS stands for Multimedia Messaging Service. MMS is a text message that contains multimedia
content, such as pictures and videos. These messages can be sent between phones (or from a phone to a
computer) and are most commonly used on cellular networks.
The most common media types include pictures, sounds, and images such as GIFs or memes (see:
Texting Trends). You can also send videos in your MMS messages!
4G
4G is the fourth generation of cellular technology and has been around since 2010. The first generation
was 1G, which used analog signals to transmit voice calls and text messages. 2G saw the introduction of
digital networks and data transmissions, enabling faster speeds than its predecessor. 3G brought higher
data rates through wider bandwidths and support for more devices at once; 4G took these improvements
further by increasing maximum speeds even more (to 100 Mbps) while also reducing latency times.
5G
5G is the fifth generation of mobile telephony, succeeding 4G LTE. It is a wireless communication
standard in the form of an international standard that was completed by 3GPP in December 2017 and will
be officially published in June 2019.
The goal of 5G is to provide high-speed and low-latency data connections without congestion, which
means that it can handle thousands of users simultaneously with minimal delay or dropouts.
GSM
GSM stands for the Global System for Mobile Communications. It’s a type of mobile network that uses a
technology called Global System for Mobile Communications (GSM). The GSM network is used by more
than 80% of mobile phone users to make calls, send text messages and browse the internet.
A GSM network comprises two main parts: the MSC (Mobile Switching Centre) and BTS (Base
Transceiver Station).
CDMA
CDMA stands for Code Division Multiple Access, or CDMA. CDMA is a wireless technology standard
that allows multiple users to simultaneously use the same frequency band. This is unlike other
technologies, such as TDMA and GSM, in which each user is assigned a specific frequency band. Only
one user can communicate at any given time on that specific frequency.
WIFI
Wi-Fi is a family of technologies that allows electronic devices to exchange data or connect to the
Internet wirelessly using radio waves. Wi-Fi is an IEEE 802.11 standard that defines the use of radio
frequencies (RF) in the 2.4 gigahertz (GHz) band and 5 GHz band for telecommunication applications
such as wireless local area network (WLAN), Wireless Wide Area Networks (WWAN), and Local area
network (LAN).
Build and maintain classroom community by creating safe spaces that allow for peer interaction
as well as anonymity.
Increase student interest and motivation by providing multiple means and opportunities for
participation.
Illustrate concepts or topics more clearly.
Develop students' emotional, cognitive, and technology-based skills for their future careers.
Increase engagement by having students use their mobile devices to generate, collect, and
analyses data.
Identify and adapt to gaps in student learning.
98 | P a g e
Facilitate a more efficient feedback cycle for student learning.
Get through basic concepts more quickly, allowing students more time to engage deeply with
complex concepts.
On-the-go learning
Better collaboration
Multi-device support: Another significant benefit of mobile learning in education is that of
multi-device support. Unlike other e-learning methods, the mobile learning environment supports
the availability of the same course on various devices, including computers, smartphones, laptops,
and tablets.
Higher retention and better completion rates: The bite-sized and concise content presented in
m-learning platforms offers immense flexibility to learners to complete and begin courses as per
their own convenience. This leads to better completion rates, high retention of the content, and an
extremely impactful mobile learning user experience.
Engaging design formats to learn from: M-Learning features a range of interesting design
formats such as interactive videos, animated videos, and so on that are extremely popular among
learners. This kind of personalization in learning adds to the sense of engagement and also helps
learners stay on track with their training.
Driving performance: The rapid growth of the mobile internet has also made educational
institutes use m-Learning as an innovative solution to meet their students’ learning needs and
improve their performance.
Defined learning path: The popularity of m-Learning platforms is also attributed to the
continuous and personalized learning path they offer. Learners enjoy the convenience of course
organizers and phone-based reminders integrated with the m-Learning platforms they use.
Further, they can get ongoing notifications and updates on new courses and recommendations,
which they can check anywhere and anytime.
Convenient and Flexible: One of the biggest advantages of mobile learning is its convenience
and flexibility. With mobile learning, learners can access educational materials and engage in
learning activities at any time, from any location. This makes it possible to fit learning into a busy
schedule, no matter how hectic it may be. Mobile learning also enables learners to study at their
own pace, allowing them to take as much or as little time as they need to absorb the information.
Improved Engagement: Mobile learning can also lead to improved engagement, as it provides a
more interactive and personalized learning experience. With features like gamification,
simulations, and interactive multimedia, mobile learning can help keep learners engaged and
motivated. This can result in better retention of information and a more enjoyable learning
experience.
Increased Accessibility: Mobile learning can also increase accessibility to education, particularly
for learners who may not have access to traditional classroom settings. For example, mobile
learning can be used to provide education in remote or underserved communities, or to
individuals who may have difficulty accessing traditional classroom settings.
Cost-Effectiveness: Mobile learning can also be more cost-effective than traditional classroom-
based learning. By reducing the need for physical classrooms, instructors, and materials, mobile
learning can save schools and businesses a significant amount of money. Additionally, the cost of
mobile devices is continuing to decrease, making mobile learning an increasingly affordable
option.
Lack of tailored learning approaches: Adapting to the individual needs and preferences of each
learner is a goal that is impractical in many traditional classroom environments.
Lack of analytics and data to benchmark performance: One of the challenges faced by most
education systems is the lack of enough data and analytics to compare student performances.
Whereas mobile learning allows educators to track and benchmark student performance across
multiple parameters such as student history or subject to provide a more holistic and richer way of
assessing student performance.
Less qualified teachers: Less qualified or under-trained educators fail to contribute meaningfully
due to the lack of effective teaching strategies and lesson plans, which is one of their core
responsibilities. Mobile learning in education mitigates this challenge by providing access to a
range of dedicated resources to help trainers and educators share best practices.
Internet Communication
Internet communication enables you to communicate with people over the web. The communication
process takes place in any form, such as messages, voice, video calls, etc. The biggest reason people are
shifting towards this technology for communication is cost savings.
You will find several applications over the web that allow app-to-app, click-to-call, and app-to-phone call
services without imposing any calling charge for web interaction facility.
WhatsApp, Skype, Google meet, and messenger are some of the most popular applications that allow
users easier access to communication services.
Telephones calls: The telephone remains a fundamental communication technology. It enables voice
conversations over long distances and has evolved into mobile phones, which are now ubiquitous.
Instant Messaging
Instant messaging is a highly used online chat technology that allows users to communicate with others in
real time via an internet-based chat room.
The messaging tool eliminates the need to place a call for accessing information and helps you to have a
much easier communication interface for instant information sharing. Yahoo Messenger, Google
Messenger, MSN, and Messenger are a few popular instant messaging tools that help users to
communicate irrespective of their geographical locations.
100 | P a g e
Internet phone systems are widely being used by users and businesses that need to communicate globally.
They are cost-effective and allow you to call globally without imposing high charges.
Email
As per a recent survey, you will be amazed to know that the number of active email users will touch 4.3
billion by 2023. It is one of the most effective modes of communication and an advanced way of
exchanging media files.
Users can create their email ID through web portals like Microsoft Outlook, Gmail, and Yahoo. You only
need an active email ID if you want to communicate through the same.
Blogs
A blog is an online journal or informational website that offers regularly updated content about a
topic. It presents information in reverse chronological order and is written in an informal or
conversational style. Most blogs are run by one person, the blogger, and are hosted on a website or
blogging platform. Blog posts can contain lots of multimedia content, from text to images, videos and
social media clippings.
Examples of online blogs include:
Marketing and social media blogs, such as Brilliant Business Moms, which publishes tips for mom
entrepreneurs who want to build a business and balance family life.
Personal finance blogs, such as Bravely Go.
Tech blogs, such as Renewed Macs.
Photography blogs, such as Path.
Health blogs, such as The Squeeze Magazine.
Vlogs: Video blogs (vlogs) have gained prominence. Vloggers create video content on various topics,
from travel experiences to cooking tutorials.
Collaborative tools
Collaboration tools are system software or non-technological devices that help people to
collaborate. They support a group of two or more individuals to accomplish a common goal or
objective. They ease the process of communication, collaboration, and project management.
Here are some examples of collaboration tools that facilitate communication and teamwork:
101 | P a g e
1. Slack: A popular messaging platform for real-time communication within teams. It allows
channels, direct messages, and file sharing.
2. Microsoft Teams: Integrated with Office 365, Teams offers chat, video conferencing, document
collaboration, and project management features.
3. Trello: A visual project management tool that uses boards, lists, and cards to organize tasks and
track progress.
4. Asana: A task and project management tool that helps teams coordinate work, assign tasks, and
set deadlines.
5. Google Workspace (formerly G Suite): Includes tools like Google Drive, Google Docs, Sheets,
and Slides for collaborative document creation and sharing.
6. Zoom: A video conferencing platform for virtual meetings, webinars, and screen sharing.
7. Jira: Primarily used for software development, Jira helps teams manage tasks, bugs, and agile
workflows.
8. Basecamp: A project management and team collaboration tool with features like to-do lists, file
storage, and messaging.
9. GitHub: A platform for version control and collaborative software development using Git.
10. Notion: Combines note-taking, task management, and wiki-style documentation in one platform.
Video conferencing
Video conferencing is a technology that allows users in different locations to hold real-time face-to-face
meetings, often at little to no cost. It is a live video-based meeting between two or more people that uses
the Internet to facilitate live, face-to-face interactions and collaboration through audio, video, screen
sharing, and chat
Podcasts: Podcasts are audio programs available for streaming or download. They cover diverse subjects,
from storytelling to educational content.
Online Chat: Instant messaging services and chat applications allow real-time text communication.
Examples include WhatsApp, Slack, and Telegram.
102 | P a g e
Application of computers for ICT documentation
ICT documentation is an internal library of information for use by ICT teams or users to help them go
about their day-to-day roles. ICT documentation is all about orderliness, organization, maintaining
standards, presentation and effectiveness etc.
A fully featured ICT documentation system will provide convenient real-time access to a highly
searchable and centralized knowledge base, serving as a single source of truth for all the information the
an organization ICT systems.
The ultimate goal of ICT documentation is to help employees avoid wasting valuable time tracking
down the information they need to perform a specific task. It shares much in common with technical
documentation, which comprises externally-facing manuals and user guides that explain how to use a
product or service.
Faster Learning
103 | P a g e
With proper documentation, companies can shrink the learning curve for new employees. Newcomers can
quickly become a productive part of the team and will even be able to perform complex tasks without the
time-consuming involvement of more senior members of the IT team.
Better Visibility
Good documentation improves visibility into ICT assets and processes. This boosts understanding of
computer systems, providing useful insights for undertakings such as:
new development projects
infrastructure provisioning
standardization of technology
regulatory compliance
Reduced Risk
IT documentation provides important reference material that can help prevent rogue configurations and
many other operational and coding mistakes. It can also aid security teams by storing information about
vulnerability remediation workflows and details on how to identify, contain, or recover from a
cyberattack. And, if it supports restricted access capabilities, it can also serve as a secure place for storing
certain types of credentials.
Different types of documentation serve different roles. The following are the main categories of IT
documentation, each of which is based on the fundamental purpose it serves.
Infrastructure Documentation
Infrastructure documentation refers to information about the physical and virtual components of an IT
environment. This includes servers, storage, networks, and other hardware, as well as virtual machines,
software, applications, and data. It provides a comprehensive view of the IT landscape, helping IT staff to
understand how different components interact with each other.
For instance, a network diagram, a part of infrastructure documentation, illustrates how various devices
are connected in a network. This aids in troubleshooting network issues and planning network upgrades.
Similarly, server documentation details the specifications, configurations, and status of servers, guiding
the team in server management and maintenance.
Operational Workflows
Operational workflows documentation depicts the processes and procedures followed in the day-to-day
operations of an organization’s IT department. This includes routine tasks, such as system maintenance
and data backup, as well as complex operations like software deployment and network configuration.
This form of documentation is essential for maintaining consistency in IT operations. It ensures that tasks
are performed in a standardized manner, minimizing errors and improving efficiency. It also serves as a
training manual for new employees, helping them understand and follow the established procedures.
In addition, documenting operational workflows facilitates process optimization. It allows for the
identification and elimination of bottlenecks, improving productivity and service quality.
Project-Based Documentation
Project-based documentation is mainly associated with specific IT projects. It provides details about the
project’s goals, timelines, resources, stakeholders, and progress. This documentation is crucial for
planning, executing, and controlling ICT projects effectively.
To illustrate, a project plan, a critical component of project-based documentation, outlines the project’s
objectives, tasks, dependencies, and deadlines. This facilitates clear communication among team
members and stakeholders, ensuring everyone is on the same page. Furthermore, risk registers and change
logs help in identifying potential risks and managing changes during the project lifecycle.
Technical Documentation
Technical documentation provides in-depth information about the architecture, design, and operation of
IT systems and applications. This includes system specifications, architectural diagrams, data models,
APIs, and code documentation. This documentation is primarily intended for ICT professionals who
design, develop, and maintain these systems.
For example, data model documentation describes the structure, relationships, and constraints of data
elements, guiding database administrators in managing databases. Similarly, API documentation provides
details about the functions, parameters, and return types of APIs, assisting developers in integrating
systems and building applications.
User Documentation
User documentation is designed to assist end-users in using ICT systems and applications effectively.
This includes user manuals, tutorials, quick start guides, and online help. This type of documentation is
essential for ensuring that users can accomplish their tasks with minimal assistance from IT support.
A well-written user manual, for instance, provides clear instructions on how to use an application,
reducing the learning curve for users. Similarly, an online help system provides instant answers to user
queries, improving user satisfaction and productivity.
105 | P a g e
The Role of ICT in Records Management
If you have ever worked in a large business, you will know that the sheer volume of paperwork is
enormous.
Thankfully, the days of filing cabinets are fast coming to an end. Even email inboxes are incapable of
coping with the data we generate daily. But what if there was a way to make things even more efficient?
Information and Communications Technology (ICT) and document management solutions are essential in
this process. Here we will explain how digitization can help better transform your records management
processes.
Records are an important part of every business as they enable us to keep track of your company's
activities and operations. When it comes to managing records, there are several vital considerations you
need to bear in mind.
Business Needs
There are also business reasons why certain documents must be retained longer than others, for
example, legal and fiscal records. Specific regulations relating to records depend on an
organization’s location, business type, or industry. As an industry leader, Daisy's software solutions
cater to all business needs, including electronic document management, AI & APA and more.
106 | P a g e
Necessary Documentation Is Vital for Day-to-Day Operations
We cannot overstate the importance of documentation. It is vital for day-to-day operations, not only
for regulatory and legal purposes but for many others. For instance, without it, employees may
make critical errors at work or clients could be over or undercharged, resulting in your company
losing business or worse. Furthermore, you might need to refer to one of your employee's contracts
to resolve a disagreement. Documentation also plays a vital role in business continuity planning
(BCP), risk management, disaster recovery, and many other business resilience strategies.
Accessing this information quickly and efficiently is hugely beneficial, negates the need for sifting
through paper, and saves time.
Digitization
Digitization is the process of scanning physical documents into digital files. This process can take place
via several different methods.
Scanning involves using a scanner to capture an image of every page in a paper file. Most scanners have
an automatic document feeder, which moves the document through and scans it at high speed.
First, OCR (Optical Character Recognition) captures text from images. Then it is converted into text files
that can be edited more easily than scanned documents (although there will still be some issues with
handwriting recognition).
Efficiency Matters
Using ICT effectively enables staff members to access information when they need it quickly. They don't
have to waste time manually searching through documents to find what they need. Instead, they can
retrieve the documents or records they need by using keywords to search for the most-viewed documents.
This way, employees save time by completing tasks faster and avoid errors resulting from incorrect
information, thus saving money.
They can also access information from home, which has become vital since the work-from-home
revolution has begun.
Exercise
4 What records should a school, as a learning institution, keep?
107 | P a g e
5 What records should a teacher keep for his or her learners?
Identify the business question you’d like to answer. What problem is the company trying to solve?
What do you need to measure, and how will you measure it?
Collect the raw data sets you’ll need to help you answer the identified question. Data collection might
come from internal sources, like a company’s client relationship management (CRM) software, or
from secondary sources, like government records or social media application programming interfaces
(APIs).
108 | P a g e
Clean the data to prepare it for analysis. This often involves purging duplicate and anomalous data,
reconciling inconsistencies, standardizing data structure and format, and dealing with white spaces
and other syntax errors.
Analyse the data. By manipulating the data using various data analysis techniques and tools, you can
begin to find trends, correlations, outliers, and variations that tell a story. During this stage, you might
use data mining to discover patterns within databases or data visualization software to help transform
data into an easy-to-understand graphical format.
Interpret the results of your analysis to see how well the data answered your original question.
What recommendations can you make based on the data? What are the limitations to your
conclusions?
Diagnostic analysis
If the descriptive analysis determines the “what,” diagnostic analysis determines the “why.” Let’s say a
descriptive analysis shows an unusual influx of patients in a hospital. Drilling into the data further might
reveal that many of these patients shared symptoms of a particular virus. This diagnostic analysis can help
you determine that an infectious agent—the “why”—led to the influx of patients.
Diagnostic analysis answers the question, “why did it happen?”
Predictive analysis
So far, we’ve looked at types of analysis that examine and draw conclusions about the past. Predictive
analytics uses data to form projections about the future. Using predictive analysis, you might notice that a
given product has had its best sales during the months of September and October each year, leading you to
predict a similar high point during the upcoming year.
Predictive analysis answers the question, “what might happen in the future?”
Prescriptive analysis
Prescriptive analysis takes all the insights gathered from the first three types of analysis and uses them to
form recommendations for how a company should act. Using our previous example, this type of analysis
might suggest a market plan to build on the success of the high sales months and harness new growth
opportunities in the slower months.
Some of the software used for data analysis include SPSS, STATA, and SYSAT, Microsoft Excel, Word
processing, etc.
109 | P a g e
ICTs in the classroom
1. PLANNING USES
a) Preparing Schemes of work using Word processing
b) Preparing Daily lesson Plan using Word processing
c) Preparing learners notes and teaching notes for lessons
d) Preparing Instruction Media such as Work cards, reading cards, cut outs for charts etc.
e) Preparing exercises, tests and examinations
f) Preparing department minutes
g) The teacher can research before teaching using the computer and internet research tools
available on the web.
h) Etc.
2. LESSON DELIVERY
(a) Learners can read/ study prepared notes from the desktops/laptops in the classroom
(b) Learners can watch videos or listen to audio lessons from the computer
(c) Learners can watch a PowerPoint presentation projector onto the walls by the teacher
(d) Computers can be used as CCTV for learner monitoring during learning
(e) Learners can write exercises, tests or examinations on the computer without needing to
use pen and paper
(f) Learners can print their work for submission of hardcopies to the teachers for marking
(g) The teacher can do online distance learning using various platforms (video conferring,
social media, bulletin boards, forums, chats etc.) with students.
(h) Learners can do discussions and presentations with the aid of an interactive whiteboard,
smart whiteboard, or the normal un-interactive whiteboard.
(i) The teacher can record learners during learning for them to replay later at home or
some other time…this helps students discover what they can do and also revise at own
time.
(j) Discussion in the same classroom can take place using smartphones
(k) Learners can be tasked to do a brief research on the internet in the same lesson
(l) Dictionaries, spelling check, paraphrasing, antiplagiarism, references, data analysis, and
data presentation etc. tools can be used by students to perfect their written work and
researches.
(m) Those with various disabilities can get the computer as an aid, such as electronic
braille, voice synthesizers, sound/audio output, and demonstration or experiment
110 | P a g e
videos. The deaf, dump and physically challenged learners will appreciate such
developments.
(n) Learners can learn practical work such as table creation, drawing, image processing,
music mixing, video processing and several electronic art works- this is a pragmatic
learning approach
(o) Learners can do edutainment in various subject areas such as attempting quiz, playing
educative games, music videos, listening to various teaching staff online or offline in
the classroom etc.
(p) The computer can be used for drill and practice
(q) In geography various devices with sensor can help take real time atmospheric
measurements such as humidity, cloud cover, temperature
(r) The computer sensors can be used to offer danger warning signs to the teacher and the
learners such as storm, rain, fire, etc.
(s) Digital camera can be used to capture images in a lesson that may be required for future
use or records.
3. RECORD KEEPING
(a) Learners progress records can be prepared using Spreadsheet software/ Even Word-
processing software
(b) Learners remedial and extension work templates/records can be done using Word-
processing software
(c) Learners social records can be created using database software
(d) Record of textbooks and other inventory martials can be created using various software
by the teacher
Hardware
(a) Speakers
(b) Microphones
(c) (Min PA system)
(d) Multimedia projector
(e) The laptop/desktop
(f) TV screens
(g) External hard drives
(h) Memory sticks and CDs
(i) Mobile phones
(j) Printers
(k) Telephone
(l) Uninterruptible power supply
(m) Danger detecting sensors
(n) Internet connection
(o) Air conditioners
(p) Electronic braille
(q) Voice synthesizers
(r) Video recorder
(s) Digital camera
(t) CCTV
(u) etc.
Software
(a) Email
(b) Data sharing apps (Bluetooth, ShareIt, etc.)
111 | P a g e
(c) Application packages ( Microsoft office)
(d) Antivirus software
(e) Graphics software
(f) Internet software
iii. It encourages critical thinking. The diverse sources of information that technologies
provide bring new points of view to students. In this way, information and
communication technologies encourage debate and the acceptance of other people’s
opinions. In addition, the exchange of thoughts allows students to learn about
different cultures.
iv. It facilitates communication between teachers and students. The whole educational
community has quick access to the same resources. In this way, digital tools allow
direct and immediate interaction, without the need to be physically present. This was
especially important during the confinement experienced during the 2020 health
crisis.
vii. It incorporates new learning methods. Another of the advantages of ICT in education
is that teaching professionals can incorporate new teaching methodologies, thus
improving academic results and encouraging dynamism in the classroom. Moreover,
their use implies the development of the digital skills needed to avoid the digital
divide.
112 | P a g e
Disadvantages of ICT in education
i. Distractions and lack of attention. Digitalization means opening up unlimited access to
multiple resources and sources of information, such as web pages, social networks or
chats, and therefore, they take attention away from the subject matter.
ii. Excessive impact. Excessive and inappropriate use can lead students to a compulsive
relationship with technology, which can lead to an inability to control consumption
and, consequently, have adverse effects on the student’s health, social, family and
academic life.
iii. It reduces the development of other skills. Practices such as writing, public speaking
and reasoning may be nullified by the widespread adoption of digitization in
academic institutions. This has been demonstrated in a recent study conducted by the
University of California. The report details that the social skills of the new
generations are based on the digital environment, therefore, direct personal
communication can be affected.
iv. Consumption of false information. Much of the information available on the internet is
false or incomplete. This fact has a direct influence on the media literacy of students,
especially in the early educational stage, since half of them do not know how to
detect false news.
v. Theft of personal data. A lack of knowledge about the dangers of cybercrime can
unintentionally expose pupils’ data, especially if they are minors, for example, by
sharing photos with strangers.
vi. It reduces human contact. With the incorporation of new technologies, the learning
process becomes more distant and the physical relationship with teachers and
classmates decreases. As a consequence, by reducing human contact, isolation can
appear and become an obstacle to students’ personal development.
vii. It amplifies bullying. A complex subject to deal with and one of the biggest risks is
bullying. The lack of physical contact can lead to a loss of assertiveness and misuse
of online tools and platforms, which can lead to digital bullying situations.
113 | P a g e
Computer Aided Design
Computer-aided design (CAD) is a way to digitally create 2D drawings and 3D models of real-world
products before they’re produced by manufacturing companies. With 3D CAD, you can share, review,
simulate, and modify designs easily, opening doors to innovative and differentiated products that get to
the market fast.
The most common types of CAD:
2D CAD
Two-dimensional, or 2D CAD, involves creating flat, two-dimensional drawings composed of lines,
circles, and curves. 2D computer-aided design is generally used for architectural blueprints or
engineering layouts, such as building plan drawings etc.
3D CAD
Three-dimensional CAD, or 3D CAD, is more advanced and involves the creation of solid objects in
a three-dimensional space. 3D CAD allows engineers and architects to view and manipulate their
designs from different angles, giving them a better understanding of how the final product will look
and function.
Freeform CAD
Freeform CAD tools allow for the design of complex and unconventional shapes that may not be
possible with traditional 2D or 3D CAD tools. This type of computer-aided design is frequently
used in the fashion and entertainment industries for tasks such as designing clothing or creating CGI
114 | P a g e
FreeCAD: FreeCAD is an open-source parametric modeller that excels in all vital CAD
applications, including product design, mechanical engineering, and architecture.
Developers used Python to build the top layers of FreeCAD, which is already equipped
with program customization features. You can use the 2D forms you create with FreeCAD
as a starting point to design other items. It’s a multiplatform (Windows 11, Mac, and
Linux), highly customizable, and extendable piece of software.
Engineering Projects
Engineers use CAD for creating designs and technical drawings of machinery, systems, and
infrastructure. For example, CAD is employed in designing automotive parts, bridges, tunnels, and
even in aerospace technology for designing aircraft and space vehicles.
115 | P a g e
of their curriculum. In High schools and colleges CAD software’s are mainly used by students in
technical and practical areas such as
Computer science
Agriculture
Technical graphics
Fashions and fabrics etc.
Automotive Industry
In the automotive industry, CAD is used to design every component of a vehicle, from the
bodywork to the engine parts. This allows manufacturers to test and modify designs before a
physical prototype is created, thus saving time and money.
Fashion Industry
The fashion industry also reaps the benefits of CAD by creating digital prototypes of clothing
designs. These virtual models can be altered and tested for various materials and cuts before any
physical components are produced.
What are the Benefits of CAD over Traditional Sketching and Manual Drafting?
The advent of CAD has redefined traditional sketching and manual drafting, bringing a plethora of
advantages. Here are a few:
Accuracy and Precision: CAD tools offer a level of detail and precision that is hard to
match with manual drafting. They allow the user to zoom in and modify the design to the
smallest detail, leading to a higher quality final draft.
Efficiency and Productivity: With CAD, design changes and updates can be executed
swiftly, without having to start from scratch as in manual drafting. This increases
productivity by saving time and resources.
3D Visualization: Unlike manual drafting, CAD provides the ability to create and
manipulate 3D models. These 3D models offer a better understanding of the design,
including a realistic visualization of the final product.
Error Reduction: CAD software comes with features that automatically check for
inconsistencies, design flaws, or errors in the model, significantly reducing the chance of
mistakes.
Ease of Sharing and Collaboration: CAD files can be easily shared and accessed across
different platforms, making it easier for teams to collaborate. Digital files also simplify the
process of maintaining, tracking, and updating design documents.
116 | P a g e
lifecycle, turning conceptual design into detailed, technical drawings and 3D models. It ensures that
designs are precise, amendable, and ready for production or construction.
On the other hand, CAM, which stands for Computer-Aided Manufacturing, is the use of software
and computer-controlled machinery to automate manufacturing processes. It is typically used after
the design phase. CAM software takes the design data from CAD software and uses it to control the
machinery that creates the final product. It facilitates the manufacturing process by providing
detailed instructions to CNC machines about how to make the product.
117 | P a g e
Computer Assisted Learning/Computer assisted Instruction
Computer Assisted Instruction (CAI) is defined as the use of computers and software applications to
teach concepts or skills. Computer-assisted learning is the process of using computers and software
applications to help students learn. Both Computer assisted instruction and Computer assisted learning
commonly refer to the use of computers and software applications for teaching-learning activities.
It includes the use of other electronics such as CD or MP3 players (or record players in the 1960s), DVD
players, tablets, smartphones and televisions, desktops, internet searches, etc. for teaching and learning
purposes. These tools can be used to better illustrate a point the teacher is trying to make, or to heighten
engagement among students.
The following terms all refer to variation of computer assisted learning or instruction.
Computer Aided Learning (CAL)
Computer Aided Instruction (CAI)
Computer Based Education (CBE) – This includes teaching and learning
Computer Based Instruction (CBI)
Computer Enriched Instruction (CEI)
Computer Managed Instruction (CMI) New Terminology
Web Based Training - (This is solely internet based)
Web Based Learning - (This is solely internet based)
Web Based Instruction-(This is solely internet based)
APPLICATION OF CAL/CAI
Visual Learning
Many students are visual learners, and benefit greatly from seeing an image or an example of the terms
being discussed in class. Computers are a great help with this, because teachers have the entire internet at
their disposal. You can easily search the web for pictures to help your students see what you mean and
have an image to associate with the word you’re describing. You can also use videos from DVDs,
YouTube or your own personal projects to help illustrate a point. Seeing something really happening or
really being used in a video makes it much more real to the learner, so they remember it much longer.
118 | P a g e
Listening practice is a vital part of learning. CAL helps with this by enabling you to play music or record
conversations, so your students can listen to what is being said. They can then emulate the speakers and
try to say concepts as they have heard them.
Tests
Computers are a great way to give students exams. You can either create your own test or have them sit at
the classroom computers to take it, or you can find pre-written tests and other exam materials on the
internet and use those in your lessons. Taking tests on the computer can help students feel less rushed and
can make them feel as if they have more privacy than they would if they were in a crowded classroom.
Computers can mark the test and provide feedback to learners.
Games
Games are perhaps one of the best ways to use CAL in the classroom. Students (especially young ones)
love playing computer games or doing puzzles or crosswords etc. in an edutainment environment.
Internet searches
Another way where students do searches of information such as definition of terms etc. on the internet.
Online Courses
CAL can include online courses. These courses can be taken on one’s own time at home, possibly as a
part of a full college course load, or they can be taken as a supplement to a subject they are already taking
in person.
• Tutorials
Tutorial software provides information about diverse topics, essentially taking on the role of the
instructor. In many cases, the technology quizzes and evaluates the student’s comprehension of the
subject matter using an interactive process and delivering feedback.
QUESTION:
1. Explain how you can employ each of the above stated CAL applications to teach the topic of your
choice in your subject area.
2. Explain how disabled students can use CA/CAI in schools. I.e. (deaf, dump, visually impaired
and hand-capped.)
Advantages of CAL/CAI
Are infinitely patient
Never get tired
Never get frustrated or angry
Allow students to work privately
Never forget to correct or praise
Are fun and entertaining Individualize learning
Are self-paced
Do not embarrass students who make mistakes
Make it possible to experiment with different options
119 | P a g e
Give immediate feedback
Are more objective than teachers
Free teachers for more meaningful contact with students
Are impartial to race or ethnicity
Are great motivators
Give a sense of control over learning
Are excellent for drill and practice
Call for using sight, hearing, and touch
Teach in small increments
Help students improve their language usage
Build proficiency in computer use, which will be valuable later in life
Eliminate the drudgery of doing certain learning activities by hand (e.g., drawing graphs)
Work rapidly--closer to the rate of human thought.
It can utilize the capabilities of multimedia.
It can enhance decision making abilities, etc.
Disadvantages of CAL/CAI
-It Can Be Expensive
Cost is perhaps the biggest barrier to using CAL in the classroom. Computers, electronic devices
and software are expensive. As such, having a computer for each student is just not a realistic
goal for some classrooms.
E-LEARNING
E learning is any form of learning in which digital communication, electronic devices or the internet is
used to support the learning process.
It is the use of technology to enable people to learn anytime and anywhere i.e. learning through the use of
electronic media(such as TVs, Computers, radios, CD ROMs, audio and video, online lectures, e-mail,
screen sharing, chats, fax, news groups, quick reference guides, etc. ) It is important to remember that it
does not necessarily require either a computer or an internet connection but only the use of electronics.
121 | P a g e
Successfully completing online or computer-based courses builds self-knowledge and self-
confidence and encourages students to take responsibility for their learning
Learners can test out of or skim over materials already mastered and concentrate efforts in
mastering areas containing new information and/or skills
Faster delivery. Organizing training sessions can be time-consuming and expensive—especially
if your employees are scattered around the country or the world. With e-learning, employees can
get the training they need when they need
Learners may have the option to select learning materials that meets their level of knowledge and
interest
Learners can study wherever they have access to a computer and Internet
Self-paced learning modules allow learners to work at their own pace
Flexibility to join discussions in the bulletin board threaded discussion areas at any hour, or visit
with classmates and instructors remotely in chat rooms
Different learning styles are addressed and facilitation of learning occurs through varied activities
Development of computer and Internet skills that are transferable to other facets of learner's lives
Successfully completing online or computer-based courses builds self-knowledge and self-
confidence and encourages students to take responsibility for their learning
122 | P a g e
The Internet
Internet (International Network)
The Internet is a complicated information storage system where files are located in thousands of
sites across the world. The files contain a variety of information ranging from text, graphics, and
software, video and audio recordings.
ISP may also be referred to as IAP (Internet Access Providers). They sale internet services to uses.
This is where we make payment to, to get airtime for using the internet. Once registered with an
ISP, users are given an Internet address that makes it possible for his or computer to be identified
on the internet.
Internet Address
123 | P a g e
In order to access content on the internet, a uniform resource locator, or URL, is required, which is also
known as a web address.
Protocol: The protocol defines how your browser handles the data and what type of connection is
established. EXAMPLES ARE (HTTP) (HTTPS (FTP)
Domain Name: The domain name part of the web address is the unique identifier for the website on the
internet. It is usually made up of the name of the website in order to make it easy for visitors to
remember. In the web address "http://www.fbi.gov/about-us" for example, the domain name is the
"fbi.gov" part.
Domain Extension: The domain extension follows the domain name and is used to denote what type of
website it is. For example, a government website ends in the extension ".gov" while an education website
might end in ".edu." The ".com" extension used to denote a commercial website
Path : The path is the section of the web address after the domain extension that indicates to your browser
which folder or file to open. In the web address "http://www.fbi.gov/about-us/cjis/background-
checks/address-verification/addresscard.pdf" for example, the path is the "/about-us/cjis/background-
check/
Originally only for the federal government, .gov is now used for any level of
government. These sites are used to publish tax forms, census information,
.gov Government legislation, and other government news or information.
124 | P a g e
(a) e-mail facility – one can create an e-mail address on the Internet and send or receive e-
mail messages
(b) browsing and downloading information to one’s computer
(c) file transfer from one computer to another using the FTP(File Transfer Protocol)
(d) Internet shopping and banking
(e) newsgroups and chartrooms which allows one to access a wide range of information
and postings from various registered users
(f) previewing movies and playing audio recordings(music)
(g) business and academic research
(h) electronic libraries which allows one to access an electronic copy of a book provided
you a registered member
(i) viewing some TV channels and radio stations
(j) bulletin board services where one can post a question which will be answered by
anyone
(k) e-commerce (buying and selling over the internet)
(l) teleconferencing(a methods of holding discussions with several people in different
location over the internet)
Once you have the above, you then contact an ISP who will issue the following:
125 | P a g e
have an e-mail address and a computer connected to a telephone line with either an in-built
MODEM or external MODEM.
The above simply means, tindo has an e-mail account with an academic institution called
mutareteachers based in Zimbabwe.
NOTE:
Ac: refers to academic institution such as college, university or school
Org: refers to organization
Co/com : refers to company or co-operation or commercial organization
[email protected]
[email protected]
[email protected],
[email protected]
E-Commerce
E-commerce is buying and selling goods and service online. It is doing business on the
Internet. Below are example of e-commerce
Online shopping
Buying and selling goods on the Internet. Buyers browse and purchase products with mouse
clicks.
Electronic Payments
When you are buying goods online and paying online. It reduces the inefficiency associated
with writing and mailing cheques. It also does away with many of the safety issues that arise
due to payment made in currency notes.
Online auctions
Online auctions are an efficient mechanism for price discovery. Many buyers find the auction
shopping mechanism much interesting than regular storefront shopping.
Internet banking
Performing bank transaction using the internet, such as money transfers.
Online ticketing
Air tickets, movie tickets, train tickets, play tickets, tickets to sporting events, and just about
any kind of tickets can be booked online. Online ticketing does away with the need to queue
up at ticket counters.
126 | P a g e
Advantages of Ecommerce
Faster buying/selling procedure, as well as easy to find products.
Buying/selling 24/7.
More reach to customers, there is no theoretical geographic limitations.
Low operational costs and better quality of services.
No need of physical company set-ups.
Easy to start and manage a business.
Customers can easily select products from different providers without moving around
physically.
Using E-commerce site will decrease the cost related with client’s base,
consumer loyalties and higher deals it produces.
The Problems related with running a retail location will lessen on the grounds
due to reason that exchange is done through a site and not through a guiding
store, likewise, the cost of lighting, leasing, staffing and restocking a store will
totally take out.
Your business can reach every corner of the geographical location, it empowers
the business to reach in worldwide markets with national and global requests.
What’s more, your business action is no longer limited with any geological
limitations.
With this, and even private company can get to the worldwide markets for
offering and purchasing of products and ventures.
The client or consumer can buy and pay the amount and transactions is carried
out 24 hours a day and on holidays and weekends.
It gives the consumer an option to compare the prices and at the same time also
benefited the customers for cheaper products at fine quality.
No need to stand in big queues or on hold waiting for your turn.
Various amazing deals and coupons are available to provide an extra discount.
Managing the stocks, and inventory is an easy process also the records of
payments and payouts can be done easily.
Disadvantages of Ecommerce
Any one, good or bad, can easily start a business. And there are many bad sites which
eat up customers’ money.
There is no guarantee of product quality.
Mechanical failures can cause unpredictable effects on the total processes.
As there is minimum chance of direct customer to company interactions, customer
loyalty is always on a check.
There are many hackers who look for opportunities, and thus an ecommerce site,
service, payment gateways, all are always prone to attack.
Delivery time of the product is more.
Unavailability of touching off and feeling of the product.
In case of items of clothing you have to buy without trying.
Sometimes wrong or damaged product is delivered then the problem of returning
and getting money back is a still difficult process.
You have to wait for the delivery person because he can come at any time doesn't
matter you are busy or what you have to collect your item or should wait for
some extra days.
Sometimes you find an image of the product very attractive but the product you
received does not match with the image you actually viewed on the website.
127 | P a g e
Internet access is still not cheaper and is inconvenient to use for many potential
customers like one living in remote villages.
Every people is not digitally literate so that he/she is not capable of buying the
product.
THE INTERNET
International network of computers.
The internet is defined as a global network of linked computers, servers, phones, and smart appliances that
communicate with each other using the transmission control protocol (TCP) standard to enable the fast
exchange of information and files, along with other types of services.
128 | P a g e
There is an element of the Internet called the Dark Web, which is not accessible from standard browsers.
To keep safe our data, we can use Tor and I2P, which helps in keeping our data anonymous that helps in
protecting user security, and helps in reducing cybercrime.
129 | P a g e
THE INTRANET
An intranet works on a private network of computers. Only authorized people and systems can access it.
It is contained within an enterprise that is used to securely share company information and computing
resources among employees. An intranet can also be used for working in groups and teleconferences.
Intranets encourage communication within an organization. They let employees easily access important
information, links, applications, forms and databases of company records. A database that includes all the
usernames of employees who have access rights to the network is often used to maintain intranet security.
EXTRANET
An extranet is an intranet that grants access to those outside of an organization to certain information and
applications. Third parties such as business partners, suppliers, vendors, key customers, other
130 | P a g e
organisations, vendors etc. are given access to certain parts of the organization's intranet. It is a private
network similar to an intranet, but typically open to external parties (authorised partners), the main
purpose of an extranet is to allow users to exchange data and
An Extranet (also known as company portal) allow companies to integrate operations with external
stakeholders where they can access information, view schedules, communicate with the business, submit
orders etc.
Extranets allow for real-time collaboration on documents, clearer communication channels, and a
centralised space for all collaborative operations.
Consider a retail business that sources products from multiple suppliers globally. An extranet can offer a
dedicated space where suppliers upload their inventory in real-time, product specs are shared, and
collaborative edits on product designs are made seamlessly. Instead of lengthy email chains that could
lead to oversight, all communications are centralised, and everyone remains updated.
Take a real estate company, for instance. They could use an extranet portal where clients can log in to
view property documentation, check the progress of their property transactions, or even schedule
viewings. Such a system reduces miscommunication, builds trust, and provides customers with a sense of
involvement and clarity in the process.
3. Increased Efficiency
One of the significant advantages of extranet is its power to streamline processes. Instead of toggling
between various platforms or waiting on responses from external partners, an extranet centralises
interactions and necessary data. This reduces the time spent on administrative tasks, allowing teams to
focus on what they do best.
A large consultancy firm working on a nationwide project can use an extranet to consolidate research data
from various regions. Instead of multiple regional teams sending in reports in varying formats, they could
update a unified template on the extranet. This would ensure that when the head office collates data, it's
uniform, comprehensive, and ready for analysis.
4. Reduced Costs
While setting up an extranet might require an initial investment, the long-term savings are notable. Think
about the reduced overheads: fewer physical meetings mean less travel. Digitised and streamlined
processes mean less paperwork and quicker turnarounds. Over time, these savings can be substantial.
131 | P a g e
Securing Your Extranet / Portal
In a world where cyber threats are ever-evolving, securing your extranet should be top priority.
Remember, while intranets focus on internal operations, extranets are exposed to external entities, which
can sometimes introduce vulnerabilities.
With multiple users accessing the extranet, often from diverse geographical locations, user management is
crucial. Here's what to consider:
Defined User Roles: Clearly define user roles. Not every partner or external entity needs access
to all information. Assign permissions based on roles to ensure data integrity.
Onboarding & Training: As you onboard new users, provide them with adequate training. This
not only acquaints them with the platform but also informs them of best practices and security
protocols.
Monitoring & Reporting: Keep a keen eye on user activity. Advanced CMS platforms will offer
detailed logging and reporting features. If any suspicious activity arises, being able to trace
actions back to specific users can be invaluable.
Disadvantages:
Potential security risks if not adequately managed and the need for ongoing maintenance and
monitoring.
Extranets can be complex to plan and set up because every organization’s needs are different.
However, your choice in provider can make all the difference. Choosing a well-structured
extranet CMS and an experienced provider can result in a straightforward process and a
successful result.
Extranets can be costly, but again your choice of provider can make all the difference between a
cost-prohibitive or cost-effective extranet solution. With Elcom, for example, you could even
choose to incorporate your intranet, e-learning and website CMS into the same system to
minimize costs.
132 | P a g e
ExamplesofExtranet/PortalApplications
1. Supplier Portals
Overview: Supplier Portals are a dedicated platform that allows businesses to manage and communicate
with their vendors and suppliers. It can oversee every aspect, from procurement to payments.
Example: A large retail chain utilising a supplier portal to coordinate with hundreds of suppliers. They
can place orders, track shipments, process invoices, and handle disputes, all within a unified space.
Benefits:
Streamlined operations reducing order-to-delivery times.
Real-time monitoring leading to better inventory management.
Improved vendor relationships through transparent and efficient communication.
Example: A construction project involving employees, architects, contractors, suppliers, and regulatory
bodies. Each party can access relevant documents, provide input, and track project progress.
Benefits:
Consolidation of resources, reducing back-and-forth and potential errors.
Enhanced transparency among all stakeholders.
Faster decision-making due to real-time updates and communication.
3. Customer Portals
Overview: These portals are designed to provide customers with a personalised space where they can
access resources, raise queries, or even make purchases. There are also membership portals for
customers who have signed up to membership programs.
Example: A software-as-a-service (SaaS) company offering a portal where clients can access training
materials, log support tickets, download software updates, and interact with community forums.
Benefits:
Strengthened customer relationships through personalized experiences.
Reduced customer support overheads as users can access self-help resources.
Increased customer retention through the provision of value-added services.
4. Training Portals
Overview: Organisations, especially in sectors like healthcare or finance, often use extranets to provide
training modules and certification processes for external stakeholders.
Example: A pharmaceutical company offering an extranet platform where medical professionals can
access training on new drugs, attend webinars, and even obtain certifications after successful assessments.
Benefits:
Ensuring that external professionals are up-to-date with the latest products or services.
Establishing a standardized training mechanism.
Building brand loyalty and credibility among professionals.
133 | P a g e
5. Partner Portals
Overview: Businesses can provide an up-to-date company information and communications exclusively
for their distributors and partners, allowing them to check availability, specifications, and pricing.
Example: An electronics manufacturer giving its global distributors access to their latest product range,
promotional materials, and even exclusive distributor discounts.
Benefits:
Empowering partners with the information they need to sell effectively.
Ensuring consistent product information dissemination.
Enhancing sales strategies based on real-time product updates and availability.
To provide a clearer understanding, let's take a look at a concise comparison of these three platforms:
Characteristics Extranet / Portal Intranet Internet
Access Restricted to specific external and Restricted to organization Open to all users
internal users members worldwide
Purpose Collaboration with trusted Internal communications Global sharing and
external parties and operations communication
Security High (specific access controls) High (restricted to Varies (from highly
employees) secure to public)
Examples of Vendor management, supply chain Employee portals, HR Websites, global
Usage communications, partner resources, internal comms platforms, public
collaboration forums
Costs and Moderate (specific setup required) Moderate-High Low-Moderate
Infrastructure (customized setup) (depending on scale)
SMS
SMS, which stands for Short Message Service, is a text-based communication service. It is used to send
messages to mobile devices. SMS can be used on all mobile devices, and it’s not encrypted.
Task
1. There are three terms whose meanings are often confused. These are:
Internet
Intranet
Extranet
Find the meaning of each and how they differ from each other.
134 | P a g e