Intronduction To Computer
Intronduction To Computer
COMPUTER: is an electronic device or set of device that works under control of installed
programs. It accepts raw data from outside; it processes the data so as to give out information.
DATA: is any raw fact or figures that may not make sense to the user
INFORMATION: is the processed or refined product that can be understood by the user
QUALITIES OF THE COMPUTER
Automatic: this means that after the computer has been commanded to perform its task it
requires minimal human intervention.
Data processor: computer has been designed to receive raw facts and figures that may not be
meaningful to the user and then analyses it into information which the user can understand
Electronic: computers can be equated to household appliances such as the TV, radio, cameras,
etc by the fact that they have capacitors, transistors, chips, circuit boards etc
Accuracy: since they are programmed devices, the writing of the instruction will repeatedly
recur
Efficiency: compared to any other machine, computer will utilize time and effort to achieve high
results
Secrecy: with the use of password
Versatile: Computers are multipurpose, they are compatible to accommodate and operate
devices of different technologies e.g: watching T.V
Advantages of computer
Eases filing system in the office
Speed
Enhances communication
Enhances business
Enhances education through e learning and e teaching
Enhances industrial production through computer aided manufacturer(CAM)
Enhances entertainment
Create self-employment
Disadvantages of computers
Expensive
Cuts down on employment especially when computers are introduced where manual
work existed
B) Digital computer
These computers handle digital data. Digital in that is it discrete. These means the data can be
represented as distinct values I.e. 1 or 0
C) Hybrid computer
These kind of computers would handle both analog and digital data.
2. PURPOSE
Under purpose computer there shall be two of them; general purpose and special purpose
computers.
A) General purpose computer
Designed t, perform no of tasks, these computers are installed with programs which will enable
them to handle a variety of duties. For instance, document processing calculation, accounting etc.
b) Special purpose computer
They are designed to perform only one special task. For instance, robots in CAMs belongs to this
kind of a computer.
3. Physical size
a) Super computer
They are the biggest in size computers. They are fastest in term of speed, the most powerful
terms of the tasks they can perform at particular nanosecond and therefore the most expensive
only a few nation around the world can afford it. They would be used in complex computer
engineering and also serve other small computers in complex network.
b) Main frame computers
They are also very larger, powerful and expensive but lower than super. They are stationary in
the control room. They perform complex mathematical calculations. They a large storage
capacity and can support a number of peripheral thus require no of people to operate one. They
ideal in banks, airport, government, agencies and large organization
c) Mini computers
These are down scaled versions of the mainframe computers. Have less speed, fewer peripherals,
less powerful etc. they can be found in research institution, engineering planes, scientific
laboratories etc.
d) Micro computers
These consists of relatively small, cheap and not so complicated a computer. They are also
transferable. They pose small silicon chip that analysis data. They are generally used in day to
day duties in homes, hospitals, schools etc. they are sub grouped into;
i. Personal computer (PC)
PC is operated by one person for most of it peripheral are single e. g mouse, CPU, keyboard etc.
they are usually placed on top of desk when operating thus dubbed desk top computer
ii. Laptop/notebook
These are small convenient and easily portable computer. They are placed on the lap when
operating. Laptops are multicolored and bigger than notebook. Most of these computers are
1|Page Compiled and edited ENK
extremely expensive due to their convenience, portability and manufacturing technology. They
are ideal for use by managers, journalists, researchers etc.
iii. Palmtop computers/PDAs
These are tiny pockets computers usually placed on the palm when operating. In most cases they
are incorporated into mobile phones. They are ideal for business executive.
HARDWARE
Physical or tangible components of the computer are referred to as hardware. When the computer
is shut off, the hardware would remain visible. Hardware are sub grouped into four components
namely;
CPU (processor)
Input devices
Output devices
Storage devices
SYSTEM UNIT
System unit is a metallic or plastic casing that houses or protects most of the major parts that
control and define the computer. All these smaller parts are attached to the main board called
mother board or system board. Even all the peripheral are attached to the mother wood at the
rare of the system unit. Mother board has multiple circuits that enhances transportation of data
and expansion slots that allow connection of additional parts. Some of parts found on system unit
are the CPU (processor), hard disk, drives, memory chip, cards, buses etc.
THE MOUSE
Mouse is an input device that enters instruction or retrieves commands out of the computer.
Mouse is an operating system that assist keyboard in operating computer. Mouse has two
buttons;
3|Page Compiled and edited ENK
Left mouse button LMB
Right mouse button RMB
The LMB is the active button for it is after issue commands in to the computer. Is the inactive
button for it is not after use when the RMB is used, it is the retrieve commands out of the
computer.
5. Click away
It is pointing and clicking the active mouse button outside a selection or a displayed menu in
order to deselect or to do away with it.
6. Point / select
This is to move mouse pointer on an item then click the LMB
7. Drag/drop
This is to point, press and hold down the LMB on an item to move it from a position to another
8. Highlight
This is to point and drag over a text so as to select the textual data for particular aspect.
9. Position cursor/ insertion point
It point between the characters so as to type a character
10. Resize objects
This is to point border handles of an objects and drug so as to increasing and decreasing its size
11. Move/position object
This is to point and drug the object from one position to another
THE KEYBOARD
It is another input device used to enter textual data through typing in to the computer. It can also
be used to enter commands and instruction in the computer by pressing the keys. The keys of the
keyboard may be sub-grouped into the following categories:
1. ALPHA NUMERIC KEYS
These consist of;
The alphabets I. e (A-Z)
The numerals I. e (0-9)
4|Page Compiled and edited ENK
The punctuation marks I. e (,.; :”)
The symbols I. e (# @ %)
The mathematical operator I. e (+-=/)
2. NUMERIC KEYPAD
This is positioned at the extreme right of the keyboard. It consists of the numerals the
mathematical operators and a few special keys. It is deal when dealing with calculations. It is
activated or deactivated by pressing the Num lock key.
3. FUNCTIONS KEYS
They include F1 through F12 and are positioned at the top most part of the keyboard. Their
purpose is to shortcut commands or they can be assigned some special duties. Sometimes they
are used together with keys to attain the duty e. g
F1 can retrieve help notes
F7 can be used to check spelling and grammar
F12 can be used to save
Alt +F4 can be used to close a program
4. ARROW KEYS
They are also referred to navigation keys. They are four of them; ARROW LEFT, ARROW
RIGHT, ARROW UP, ARROW DOWN.
Arrow keys facilitate horizontal and vertical movement to navigate through the cells; and can be
used with other keys to achieve the duty
5. SPECIAL KEYS
These are meant to perform special duties either singly or used together with other keys e. g
a) Enter key
These are two enter keys. Duties are:
Executes commands
Acquires the next line when typing
Explores a folder I. e (ctrl + shift + enter)
Crate space between the lines
B. Caps lock
Interchanges between uppercase and lowercase and vice versa
c. Space bar
It is the biggest key on the keyboard. It creates a single character space between words.
d. Delete key
Delete/ erases characters and spaces at the right of the cursor I. e forwards
Also erases selected items and text
e. Tab key
Creates set intervals between characters, word, text etc.
Navigates through the cell forwards
Navigates through the dialog box
f. Shift key
Normally used with other keys e. g
Highlight text (shift + arrow key)
Acquires upper character in a double character key. This is a key on the keyboard where two
letters or values are place
Momentarily acquires the upper case or lowercase when typing
g. CTRL (control) key
It is always used together with other keys to achieve duties.it has the biggest combination of keys
in Ms. Window e. g
5|Page Compiled and edited ENK
Ctrl +A highlight all
Ctrl +C copies
Ctrl +S saves
Ctrl +P prints
Ctrl +V pastes
h. Alt (alternative) key
Also used with other keys e. g
Alt +F display file menu
Alt +w displays window menu
Alt +F4 closes a running program
i. Esc (escape) key
Clears a display menu or dialog box displays start menu with ctrl I. e ctrl + esc
j. Print key
k. Home key
Takes cursor to the beginning of the line
Take cursor to the beginning of document I. e ctrl + home
l. End key
Takes the cursor to the end of the line
Takes cursor to the end of the document I. e ctrl +end
n. Page up
Scroll/ moves the page up
o. Page down
Scrolls/ moves the page down
SOFTWARE
Software are the intangible component of the computer. They cannot be seen but only their
results. Software are programs. Program are sets if instruction in electronic language, written to
instruct the computer hardware on what to do and how to do it.
Types of software
System software
Application software
SYSTEM SOFTWARE
These are programs concerned with the effective performance of the computer hardware. They
aid org ware handle/ operate the computer. They act on the user’s requirement as he/ she
commands them. Some control various programs in order to achieve a certain duty.
System software can be grouped into;
1. Operating system software
Operating system (OS) is a complex amalgamation of programs which controls the execution of
the user applications. It enables the user access hardware and software resources of the computer.
They control, and coordinate most of the computer operation. OS could be single tasking or
multi- tasking, single user or multi - user, and command base interface, menu driven interface or
graphical user interface.
Functions of OS
Job scheduling
Resource control and allocation
Input/ output handling
Memory management
Error handling
Job sequencing
Interrupt handling
Example of OS
Microsoft windows
7|Page Compiled and edited ENK
Windows has version such as
Ms. Windows NT
Ms. Windows me
Ms. Windows 2000
Ms. Windows’s xp
Ms. Windows’s vista
Ms Windows 7
Ms Windows 8
Ms Windows 10 etc.
Microsoft dos (disk operating system)
UNIX
Linux
Macintosh (mac OS)
2. Language translators
This system software electronically translates one language to another through a machine.
Language is computerized
3. Utility/ service system software
These special system file that render services commonly applied tasks within the computer.
These task include copying, sorting, file handling, disk management etc.
4. Communication system software
Enhances communication or interaction between people through machines e. g phone dealers,
network connection, internet etc.
APPLICATION SOFTWARE
These are program that enable the user to perform and achieve results from any perturbing
problem I. e they are applied by user to achieve a certain duty/ task.
Classes of application software
User application
Application packages
User application
They program designed for the computer user according to his/her specifications; there for
referred to as tailor-made. They are written by ordinary programmers for their client.
Application packages
These are ready made programs. They are complex for the keenly manufactured to accomplish
several tasks. They are directly bought form the shop installed into the computer.
Sub-classes of application packages
Word processor
These are designed to edit textual data. There is a lot of typing and formatting in this sub class.
Example include MS word, word perfect, word star, word pro etc.
Spreadsheets
These are designed to create and manipulate numerical data. Here formulas and functions are
utilized to enable calculation. Example MS excel, lotus 1-2-3, VisiCalc, VP planner etc.
Database
These are used to create, organize, store and manage huge amount of data. Example include MS
access, dbase I-IV, paradox, fox pro etc.
Presentation
These help to prepare notes and graphic in an artistic manner by a presenter intended to a certain
audience. Example include MS power point freelance graphics etc.
Graphics and design
MALWARE
Short for malicious software, is any software used to disrupt computer operation, gather
sensitive information, or gain access to private computer systems. Malware is defined by its
malicious intent, acting against the requirements of the computer user, and does not include
software that causes unintentional harm due to some deficiency. The term badware is sometimes
used, and applied to both true (malicious) malware and unintentionally harmful software
Viruses consist of harmful programs designed to infect legitimate software programs. Once a
person installs and runs the infected program, the virus activates and spreads itself to other
programs installed on the computer before taking further action such as deleting critical files
within the operating system. Similarly,
Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation. A virus might corrupt or delete data on your
computer, use your e-mail program to spread itself to other computers, or even erase everything
on your hard disk.
Computer viruses are often spread by attachments in e-mail messages or instant messaging
messages. That is why it is essential that you never open e-mail attachments unless you know
who it's from and you are expecting it.
Worms are stand-alone programs that are able to transmit themselves across a network directly.
Unlike a computer virus, worms do not need to attach themselves to an existing program.
However both types of malware can cause severe damage by exploiting shared files and
databases.
Other malwares
Trojan Horse. Similar to Greek mythology, Trojans present themselves as harmless, useful
gifts, in order to persuade victims to install them on your computer. Thus, Trojans typically
appear as regular software. The catch is that the Trojan comes bundled with other software that
often includes a backdoor allowing unauthorized access to your computer. Trojans do not
attempt to inject themselves into other files or applications like computer viruses instead, they
use tactics such as drive-by downloads or installing via online games in order to reach their
targets.
Adware and spyware. Though not technically fitting into the virus category, at times these
programs may invade your privacy, contain malicious code and at the very least become a
nuisance. Adware is a form of financially supported malware that usually presents itself as
unwanted advertisements to the user. The Internet is filled with these types of programs that can
hijack your PC for profit, most are hidden inside so-called “free” downloads and pop-up ads that
forcibly install software on systems with active vulnerabilities.
9|Page Compiled and edited ENK
Similarly, spyware is a type of malware that surreptitiously gathers information and transmits it
to interested parties. Information gathered includes the websites visited, browser and system
information and IP address. Spyware does not have any infection mechanisms and is usually
dropped by Trojans. Once dropped, it installs itself on the victim’s computer and will begin
collecting information silently as to avoid detection.
A zombie works in a similar way to spyware. The difference is that a zombie does not usually
collect information from the computer. Instead, it just sits there waiting for commands from a
command-and-control server controlled by the attacker. Attackers infect tens of thousands of
computers, turning them into zombies and then issuing commands so that all of them
instantaneously send network requests to a target host, overwhelming it with traffic also known
as a DDoS attack or distributed denial of service.
MICROSOFT WORD
11 | P a g e Compiled and edited ENK
Microsoft word is an application package under the class word processor or text editors. It is a
windows run program, ideal for production of documents such as newsletters, curriculum vitae,
letters, research papers, mail merging etc.
Examples of word processor
Word pad, word star, open office .org writer
Versions of ms word
Ms word 2003,2007,2010,2013
FEATURES OF MS WORD
The Quick Access Toolbar
In the top left hand corner of the window is the Quick Access toolbar. The Quick Access toolbar
provides you with access to commands you frequently use. By default Save, Undo, and Redo
appear on the Quick Access toolbar.
The Title Bar
Next to the Quick Access toolbar is the Title bar. The Title bar displays the title of the document
on which you are currently working. Word names the first new document you open Document1.
As you open additional new documents, Word
names them sequentially. When you save your document, you assign the document a new name.
The Ribbon
You use commands to tell Microsoft Word what to do. In Microsoft Word 2007, you use the
Ribbon to issue commands. The Ribbon is located near the top of the screen, below the Quick
Access toolbar. At the top of the Ribbon are several tabs;
clicking a tab displays several related command groups. Within each group are related command
buttons. You click buttons to issue commands or to access menus and dialog boxes. You may
also find a dialog box launcher in the bottom right
corner of a group. Clicking the dialog box launcher gives you access to additional commands via
a dialog box.
Tabs
Buttons
Groups
Dialogue Launcher
The Ruler
The ruler is found below the Ribbon.
You can use the ruler to change the format of your document quickly. If your ruler is not visible,
follow the steps listed here:
1. Click the View tab to choose it.
2. Click the check box next to Ruler in the Show/Hide group. The ruler appears below the
Ribbon.
The Text Area
Just below the ruler is a large area called the text area. You type your document in the text area.
The Vertical and Horizontal and Vertical Scroll Bars
The vertical and horizontal scroll bars enable you to move up, down, and across your window
simply by dragging the icon located on the scroll bar. The vertical scroll bar is located along the
right side of the screen. The horizontal scroll bar is located just above the status bar. To move up
and down your document, click and drag the vertical
scroll bar up and down.
The Status Bar
The Status bar appears at the very bottom of your window and provides such information as the
current page and the number of words in your document. You can change what displays on the
Status bar by right-clicking on the Status bar and selecting the options you want from the
COPYING OF DATA
Copying is duplicating of data whereby the original copy remains e. g
Steps to copy data
Method 1
Highlight the text
Click home tab
Click copy on the clipboard group
Position the cursor in the desired place
Click home tab
Click paste the clipboard group
Method 2
Highlight the data to carry the copy
Right click on the highlighted data
Click copy
Right click on the position to copy
Click paste
Method 3
Press ctrl+ A –to highlight
Press ctrl+ C –to copy the data
Press ctrl+ V –to paste
Cutting of data
Cutting is just like the process of copying data except that instead of copying we choose cut and
on the keyboard instead of C we press X. cut will also duplicate data just like copying but the
original data will not remain.
PASTING OF DATA
This is gluing or sticking what has already been copied or cut. Pasting must be applied so as
complete the copy or cut command.
UNDO COMMAND
The reverses any recently applied command. It may limit the reversing of some commands
depending on how previously they have been applied.
Steps to undo
Method 1
Click undo icon on the quick access toolbar
Method 2
Press ctrl+ Z keys
REDO COMMAND
Redo reverses the undo command
Steps to redo
Method 1
Click redo icon on the quick access tool bar
Method 2
Press ctrl+ Y keys
PRINT PREVIEW
This is a window whereby a document can be viewed to check any error associated with printing.
These errors arise from the margins, paragraph, layout etc.
Steps to print preview
Method 1
Open the document to preview
Click office button
Point print
15 | P a g e Compiled and edited ENK
Click print preview
Observe to check any errors
Click close when satisfied or go back for adjustment
Method 2
Open the document
Click the print preview icon on quick access tool bar
Observe to check any