F1 Comp Updated Notes
F1 Comp Updated Notes
UPDATED NOTES
Page 1 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
Page 2 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
CHAPTER 1
INTRODUCTION TO COMPUTERS
This chapter introduces the student to what a computer is, classifies computers into different categories,
compares the different classes of computers and also introduces the keyboard as a basic input device.
a) Definition of a computer
b) Classification of computers
c) Physical size
d) The way they process data
e) By purpose
f) By use
g) Acquisition of Keyboard skills
h) Layout of keyboard
i) Summary
j) Questions
o DEFINITION OF A COMPUTER
Before we attempt to define a Computer, there are a number of associated terminologies that the learner
needs to know beforehand. These are: Data, Information, and Programs.
Data is the name given to facts. For example, in a school, the number of students in a class, the number
of teachers, names of students, the name of customers in a business.
Information is result from processed data. For example adding some numerical values like the
numbers 14 and 17 into the computer will give you the result of 31. The later is information you
required. Information can be defined as data computed into a more useful form than raw form.
Program is a series of instructions written in the language of the computer for them to obey and
perform specific tasks as outlined by the instructions.
A Computer can therefore be defined as “an electronic machine that takes in data (facts) in the
raw form, processes the data to give out in another form called information”.
When a computer is fed with data, it passes through four basic steps before the data can be displaced;
Page 3 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
Input Process – the user will type the data from say the keyboard (to be introduced later in the
chapter) and the computer will accept the dame and store within it.
Storage Process – the data that is fed into the computer at the same time is held, even during the
time of processing and after processing; it can further be stored for further reference. These data are
held in computer memory.
Processing – the computer will manipulate the data held within it to a more useful form – results
(information).
Output Process – the user is given the information he desired.
The four basic processes can be summarized in the following way by looking at the same terms of
information processing cycle.
Organizing data for processing – to get quality results (information) you must have quality data to
start with. Unreliable original data generates unreliable results. If you give a computer garbage, you
get garbage in return. Its called GIGO – Garbage In – Garbage Out.
Information Processing Cycle - Information Processing Cycle includes a series of steps for
transforming data into meaningful information for people.
A cycle is defined as a sequence of activities performed in an order that it produces expected and
meaningful results.
A Processing Cycle is repeated, it means, if the same resources are used in the same way, the same
outcome will result. The standard cycle followed to process data and deliver information comprises of
4 major functions:
Input Function - the input function gathers and collects stored data items and enter them into the
system for processing. Input can come from many sources, for example from files kept in the office,
banking institutions and accounts.
Storage Function – this function allows the user to store data being processed in the memory of the
computer as well as to store the information for future use.
Processing Function – the desired operation by the user is carried out on the data keyed in and
stored in the memory so as to turn it into meaningful information.
Output Function – the data stored is processed and then output into files, printed as hard copies or
displayed on the screen for the user.
Note: For any information processing system to run smoothly on a day-to-day basis, the processing
activities must be organized. A system has little work if it provides helpful information on one day and
useless information the next day. Output should be useful the first time and every time for the system.
Page 4 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
CLASSIFICATION OF COMPUTERS
There are four basic ways by which computers can be classified:
a) Physical size i.e how large the computer is.
b) By the way they process data
c) By purpose
d) By use
Physical Size
The following computer systems are categorized by how large they are:
a. Monster Computer
Sometimes it is referred to as Super computers or Maxi computers. These are computer of enormous
power and are very large in size. Its installation requires special floors to carry its weights and it also
needs special plumbing to carry a fluid known as fluorocarbon needed to cool it.
One unique feature of maxi computers is that when you purchase it, the purchase price will include the
services of 2 permanent engineers to maintain it forever. They are typically used for scientific research
and military applications, petroleum engineering, nuclear physics and meteorology.
Examples of monster computers include CYBER and CRAY computers. For example, the whole globe
needs only one monster computer to forecast weather at once.
b. Mainframe Computers
Mainframe computers are second in size to monster computers. These computers perform more data
processing work than any other type of computers. For this reason they form a large portion of
installation in most organization.
As does the monster computers, mainframe computers also have some special requirements, for the
reason, they are housed in special rooms brought about by the special power that they posses together
with environmental control requirements.
Mainframe computers can be used by more than one person at a time since they can support a large
network of other computers organizations that employ mainframe computers alongside other computers
are banks, government agencies, commercial and industrial agencies.
c. Minicomputer
Also called Medium sized computers. These computers compared to mainframe are smaller, slower
and less expensive.
A minicomputer has an advantage over the previous two in the sense that it does not have any special
power or environmental control requirements. For this reason, the medium sized computer can always
be located anywhere within the organization.
Minicomputers can do the work that the mainframe does but on a small scale.
Page 5 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
d. Microcomputers
Of the types of computers, microcomputers are the slowest. However, they counteract this disadvantage
because they are easy to use and the cost of purchase is also low.
A microcomputer gets its name from the fact that its main computing component, the microprocessor
(to be introduced later) is located in one integrated circuit (IC) or what we call a Chip. Microcomputers
fit nicely on desktops, for that reason they are sometimes known as Desktop Computers. They are also
referred to as Personal Computers since many individuals purchase them for personal use.
i) Analog Computers
These computers process data that vary continuously, for example variations in temperature, amount
of current flowing through an electrical conductor and so on. The flow of such data is in the form of
wave like movement i.e. not predictable. Such computers are used for a wide variety of industrial and
scientific applications that require the processing of data that are measured continuously.In conclusion,
we say that analog computers measure things.
By Purpose
Classification by purpose falls into 2 categories:
Special Purpose Computers
These are computers that are single task oriented. In other words, they are designed to solve only a
particular type of problem. Examples include embedded computers in our common digital watches.
Page 6 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
General Purpose Computers
These are computers that can perform a vast number of operations or solve problems of different
varieties. Most of the computers in use today are general purpose. However, it is wise to note that
general-purpose computers can always be adapted with special programs to do a job specified hence
becoming special purpose computer.
Embedded Computers
These are computers attached to other computers that help in operating them. E.g. computers embedded
in lifts, petrol pumps, digital watches and so on.
By Use
It is worthy noting that we categorize these computers according to what it is used for and when it is
used. Under this category, the list is endless. For this reason we will limit ourselves to only five main
types.
There are many ways to enter data into the computer. However, keyboard still remains the predominant
input device for the many users.
A computers keyboard is used much like a typewriter keyboard. A keyboard has alphabetic, numeric,
and special characters found on a typewriter. The only difference is that data keyed in, is recorded in
the computer systems’ data coding scheme and is stored in the memory. The traditional format of a
computer or terminal keyboard follows the organization prescribed by the typewriter keyboard. This is
known as QWENTY keyboard because of the sequence of the six letters on the upper left corner of the
alphabet position of the typewriter keyboard.
Page 7 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
Layout of Keyboard and Functions of Keys
A typical keyboard takes the form of a normal typewriter keyboard. A keyboard usually has standard
keys; that is letters of the alphabet plus special characters e.g. ?, ‘, @ e.t.c.
In addition to the standard keys, one finds a numeric keypad which is essential for applications that
require entry of large amounts of numerical information.
Function Keys are identified as F1 through F12, they can be programmed to ease the work of frequently
used operations. Cursor control keys of direction keys the ones with arrows, move the cursor on
the CRT (screen).
Other special keys include: Delete keys and backspace keys which deletes characters. Delete key
deletes a character that is in front of the cursor whereas backspace key delete characters before the
cursor. Insert key will insert characters from text. Others e.g home key will take you to the top of the
document and end key to the end of the document.
Computer keyboard employ one or more control keys. Control works just like the shift key on a
keyboard in that they cause other keys to perform functions different from their normal operations.
Example, if you hold shift key down and press the letter “e”, you get a different character “E”. Holding
down the control key while you press any of the other keys causes still another character to be sent to
memory.
Like the control keys, the escape key is used to cause other keys to perform special functions. Unlike
the control keys, however, it is not held down while pressing another key. Once sending a signal to the
computer system, for that purpose. If you press another key following Escape, it will cause the
computer to execute a function established by the program in use.
Page 8 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
Computers can be classified by: Size, The way they process data, By Purpose and by use.
Typical keyboard is the same as a typewriter keyboard, has: standard keys, Numeric Keypad,
Function keys, Cursor Control keys or Direction keys, Control Keys, Alternate keys, Escape keys
e.t.c.
QUESTIONS:
i.Define a Computer.
ii.Differentiate between Data and Information.
iii.What is a Computer Program.
iv.What are the 4 basic functions a Computer will perform on data.
v.Discuss in detail how computers can be classified.
vi.Discuss the layout of a typical keyboard and functions of the different keys
Page 9 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
CHAPTER 2
COMPUTER COMPONENTS
This chapter introduces the student to the computer hardware system. At the end of the chapter, the
student should be able to: differentiate between hardware and software, identify the elements of a
computer systems’ hardware, explain the functional organization of the elements of a computer system,
describe the central processing unit, describer the types of input and output devices, describe the types
of secondary storage devices and media and finally be able to distinguish between system software and
application software.
Page 10 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
o DIAGRAMMATIC REPRESENTATION OF DIVISIONS OF A COMPUTER
The following diagram shows the basic physical computer breakdown that will serve as a reference
throughout the chapter.
Fig. 2.1
KEY:
C.P.U - Central Processing Unit
A.L.U - Arithmetic Logic Unit
DOS - Disk Operating System
ROM - Read Only Memory
RAM - Random Access Memory
DBMS- Data Base Management System
Page 11 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
A hardware is a name that describes all the electronic, electrical and mechanical components of a
computer together with its peripheral devices.
A software is the name that describes all the programs that are used to run the computer or do a specific
task together with its documentation.
Explanation of the terms
Peripheral devices referred to above are: input devices e.g keyboard, mouse or output devices e.g
monitor, printer. These are devices that are used at the periphery or at the side or alongside the
computer.
Documentation refers to, in its simplest form, the manual that helps the user to know how the different
parts of the software work, how to install it, uninstall, trouble shoot or as a reference book. The
definition of software is not complete until documentation is included.
Page 12 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
CHAPTER 3
SAFE USE AND CARE OF COMPUTERS
This chapter lets the student to be aware of the computer, its safety rules and how to apply them. The
safety rules to be observed regard personnel, materials and equipment in the computer laboratory. The
student is also expected to state correctly safety precautions required in the lab and be able to identify
possible causes of loss of data and their precautions.
Computer lab forms a very important section of an organization or school and therefore strict rules in
terms of behaviour of personnel/students working/studying in the lab needs to be put in place and
adhered to.
One factor to be taken into consideration is the cost involved in setting up the lab including the cost of
equipment. This should not be taken for granted and computers and other peripherals damaged in the
short run could result in great losses to the organization.
Cleanliness is a factor that stands out in the lab. The personnel need to be clean while in the lab. Dust
in the hands, oil on fingers is not allowed among personnel/students. Foodstuffs to the lab is not allowed
as the broken pieces from such will ultimately find their way into the peripherals e.g keyboards, disk
drive and so on.
Depending on what material cover is on the floor, certain shoes tend to cause a lot of distraction by
making noise to the rest of the seated personnel. This slows down the work process as attention will
definitely be shifted. External disks into the lab are not recommended as this may result in virus
infection to the system in the lab from outside sources.
Page 13 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
Internal disks should not be allowed to leave the room. Some stringent procedures should be laid down
to check the personnel who ignore the rule. If this is not observed, it may lead to data from the
organization being exposed to rivals or would be “hackers” – those who gain access to the system
without authority.
Any mechanical or technical faults noted should always be reported to the technical personnel
immediately for attention. Non-technical personnel should never attempt to deal with such a fault!
It is important also that every personnel make routine backup copies of every work done in the lab as
this will save the organization from any data loss in the event of disaster.
Shutting down and booting of computers is very important. Strict procedures depending on the
operating system specification should be adhered to, otherwise damages to the disk in the long run and
fragmentation of files and storage in the storage location will happen. This will cause delays in reading
and writing to the same. All equipment should not be moved around the lab rather they should always
be used where they are installed!
Changing of peripherals from one machine to another is not an encouraged practice. Let a mouse meant
for machine A remain the machine; if it does not work, please ask a technical personnel to attend to it,
but do not interchange it with another!
HANDLING OF MATERIALS AND EQUIPMENT
Handling of some materials and equipments in the lab should be a privilege. In other words, some disks
and special machines like a server (in the case of a network) should not be for everyone, only those
authorized should be allowed for example to keep installation disks and so on.
Generally the computers and peripherals in the laboratory should always be handled with care since all
of them have soldered electronic parts within them that when poorly handled and perhaps dropped then
such parts will always either break or be dislocated. This will mean the equipment is damaged. It is
recommended that every movement to machines in the lab be done using a trolley. No equipment
should ever leave the lab unless with direct authority from the right person.
Computer cables should, if detached, be properly returned each to the right machine. Technical
operations in the lab should be left for only technical personnel. If every Tom, Dick and Harry in the
lab assume to repair every damaged equipment, then more will be worse off than they were.
Disks should be kept from natural hazards like excessive temperatures, water and dust places and a
way from magnets if data integrity is to be maintained.
FIRE AND ACCIDENTS
Fire and other accidents in the lab are possibilities. Such accidents would include electrocution of an
employee/student, slipping and falling on a slippery floor.
Fire is a big threat to data loss and equipment. Every lab should always offer training of how to handle
fir in thee event of such calamity and of course fir-fighting equipment like fire extinguishers for
example hand held CO2 and BCF extinguishers should always be available.
Page 14 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
Data should also always be kept in fireproof safes to avoid loss of data loss in such event. Insuring of
equipment and software in the organization with insurance firms will help since after such an accident,
the firm is paid.
CHEMICALS AND COMBUSTIBLE MATERIAL
Chemicals and combustible materials should always be located on special places. False floors and
ceilings should always be available for chemicals like fluorocarbon fluid used as a cooling agent for
mainframe. Such pipes and ducts should pass either up on false ceilings or below false floors.
Combustible materials like fire extinguishers should be located in places visible to everyone but with
strict instructions to be touched only in the event of a fire break out. Other materials that could be
harmful to the environment should be transmitted through properly located ducts.
VENTILATION IN THE COMPUTER LAB/WORKING AREA
Windows provide adequate ventilation in labs. Such windows must not be very wide as such will
always be vulnerable to entry by intruders. Any ventilation apart from the window should always be
higher up and very small in size. Every ventilation again, mostly windows, should have a well-dropped
curtain so as to keep private the operations in the lab.
Page 15 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
CHAPTER 4
OPERATING SYSTEMS
This chapter will introduce the student to what operating terms are, the functions and types. It will also
serve to explain how disk Operating System (DOS) organizes information. The student is expected to
use some DOS commands for file and disk management and be able to list external and internal DOS
commands at the end of the chapter.
a. Definition of the term Operating System.
b. Functions of Operating System.
c. Types of Operating Systems.
d. How DOS organizes information.
e. List of DOS commands.
f. File Management Commands.
g. Disk Management Commands.
h. Summary.
i. Questions.
i.Memory Management
An Operating System allocates memory to itself and to its resident system programs, sets aside areas
of application programs and user partitions, arranges the input and output buffers (areas on RAM where
input data and output data are temporarily stored) and reserves storage for specialized purposes.
Page 16 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
The Operating System will ensure that each time the user types in commands those inputs are accepted
into the memory, and if the latter is busy the it holds the same temporarily on buffers until the memory
is free and also does the same to output data awaiting to be displayed on the monitor or to be sent to
the printer if the same are busy.
iii.Resource Allocation
Operating System load programs into the computer memory and starts them running after receiving
instructions from the user, at the same time, operating systems must have ability to divide resources
available to different users, memory and of course the peripherals to different processors going on at
the same time so that none of the users gets “stuck” or “deadlocked” during the operation for lack of a
computer resource.
iv.Error Handling
Any Operating System must have the ability to handle errors in the computer system be it hardware or
software faults and be able to provide routines to correct these errors.
vi.Interrupt Handling
An interruption could be caused by software errors, mechanical faults of a machine or by the operator
by pressing the Break key for example which halts the system. The operating system should always be
able to handle such interrupts without causing any malfunctions as a result.
Page 17 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
data about customers, employees of the organization and names of students in a school and the like
depending on the organizations.
Therefore, the file as a group of program instructions is actually a computer program. When files are
stored on such storage media, then the term “file” refers to anything stored on the medium, be it a
program or data file.
Page 18 of 22
-75-
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
x.Directory Hierarchy
Files stored on a disk can always be organized into subdirectories. Directory hierarchy refers to a “tree”
like structure formed by directory – subdirectories – files. For example, we could have a directory
called KENYA with subdirectories of towns NAIROBI, MOMBASA, NAKURU and files of Estates
within each town, e.g. Hurlinghum, Nyali and Milimani. The figure below shows the directory
hierarchy.
KENYA
Fig. 4.4.2
To be able to specify which file to open, the user has to specify to the operating system the data path
or path to that file. For example, to open a filename Milimani, the following path must be specified:
Kenya\Nakuru\Milimani.
A path is often defined as a logical, sequential list of directories and subdirectories leading to a
filename. The names of directories and subdirectories are separated from each other by determinates
which could be a backslash(\) or a hyphen (-) or a slash (/) depending on the Ms-Dos version in use.
The directory names have extension DIR wheras the files have TXT. The directory named Kenya under
which the subdirectories Nakuru, Mombasa and Nairobi are stored is called root directory.
Page 19 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
COUNTRY\KENYA\NAKURU\MILIMANI
The operating system will ensure that disk on a volume label Country is located first if it is the one
mounted, before it searches for the actual file in the specific directories.
xii.Tab Control
Computers and their operating systems can perform a great number of different tasks, not just one job
as say a stand-alone word processor or a calculator. Therefore, the user of the system must be prepared
to tell the operating system what particular task to perform at the moment.
When the computer system is complete, usually the application program is what the user communicates
with the program when a particular task is desired. When the application program finishes, it is no
longer a part of the system.
The user therefore must communicate with the operating systems to tell it what to do next. He or she
does this through the use of what we call OS’s Tab Control Language or TCL. TCL consists of a
number of operating system commands also called system commands that control the operating system.
How does one know that the application program has finished its work and it is no longer loaded by
the operating system? The operating system will display that by displaying its prompt; it could be a
character or two that will signal the user it awaits further system commands.
The MS-DOS Operating System, uses the prompt C:\> or C>. The “C” in the prompt indicates the disk
drive in which the operating system will look for any files referred to by the next TCL instructions. The
disk drive attached to the system are usually identified by letters of the alphabet through a system with
four drives could have drive identifiers A: through D. Any reference to a drive must include the colon
in the drive identifier. The drive identifier displayed by the dos prompt is known as a logged drive, the
default drive or the active drive.
e. MS-DOS COMMANDS
Using system commands is quite easy. It is a matter of knowing the right commands key, key it in and
press enter key for the command to be accepted. System commands help us to manage our files and
directories for example; we can copy a file from one disk to another, delete files or change names. We
can also manage our disks for example to format a disk, label a disk or copy disks.
Page 20 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
The command has a command name COPY. The arguments are ANN 1 and ANN 2. This command
copies a file known as ANN 1. The new copy is named ANN 2.
N/B: ANN 1 and ANN 2 are arguments and are separated from each other by a blank space. They are
also separated from the command name by a blank space.
xiii.Running a Program
It is important to note that a Dos Command represents a program. A command name is just like a file
name of any other program. To be able to run a program using Dos, first the operating has to be loaded.
Loading the operating system is simply switching on the computer, it will open a program loaded in
ROM to check if the operating system is loaded in drive A or any other and load, other wise it will load
from the hard disk.
To run a program with filename extension COM, BAT, TXT, simply enter its filename without the
extension for example to a Basic Program simply enter BASIC. Its filename is BASIC.COM.
When you want to execute a program that is not stored on a disk in the logged drive, the first thing
would be to change the logged drive to the disk containing the program. For example, suppose you
wanted to run a program with the filename MILO.EXE which is on the disk in drive B:, and the logged
drive is A:, to specify the drive on which Dos should look for the program, proceed with the filename
with the drive identified with no blank in between the colon and the filename.
B:MILO
Page 21 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes
IMIS IT 1 Manual
Page 22 of 22
Prefer Calling Amobi Group of Examiners @ 0743 333 000 or 0706 851 439 for F1-F4 All Subjects Notes