0% found this document useful (0 votes)
23 views24 pages

Information Communication and Technology: Introduction To Computer

The document provides an overview of information communication technology (ICT) and computer technology, defining key terms such as data, information, processing, and communication. It details the components of a computer, including the CPU, memory management unit, and peripheral devices, as well as the types of software and classifications of computers based on size and functionality. Additionally, it discusses the importance, limitations, and safety measures related to computers.

Uploaded by

nyirobwoy0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views24 pages

Information Communication and Technology: Introduction To Computer

The document provides an overview of information communication technology (ICT) and computer technology, defining key terms such as data, information, processing, and communication. It details the components of a computer, including the CPU, memory management unit, and peripheral devices, as well as the types of software and classifications of computers based on size and functionality. Additionally, it discusses the importance, limitations, and safety measures related to computers.

Uploaded by

nyirobwoy0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

INFORMATION COMMUNICATION AND INTRODUCTION TO COMPUTER

TECHNOLOGY  A computer is an electronic device that is capable of


Basic ICT Terminologies receiving, processing, and storing data.
 It is an electronic device used to input, store and
I. ICT-is the infrastructure and components that retrieve information. It works under given
enable modern computing. instructions from the operator (person controlling
II. Data-Unprocessed information that is meaningless it).
to the user.  It is designed to perform calculations, logical
operations, and other tasks by manipulating binary
Examples of data digits (bits).
 Numeric values/numbers (0-9)
 Alphabetic letters (a-z) PARTS OF THE COMPUTER
 Symbols (@ # $ % ^ & e t c )
A computer is composed of the system unit/system/CPU
III. Information-The processed data that has meaning to
case and peripheral devices. Peripheral devices are
the user.
devices that are connected to the system unit. Examples
IV. Processing-Transformation of input data to
of peripheral devices include:
information.
V. Communication-the exchange of information 1. Monitor
between two or more things, such as people, 2. Key board
devices, governments, organizations, or businesses. 3. Mouse
VI. Input: To key in or to type into the computer 4. Speakers
VII. Store: To make data permanent in the computer
memory THE CPU
VIII. Retrieve: Accessing the stored data again
IX. Output: It is a print out or soft copy of the The CPU is the primary component that processes the
information fed into the computer. signals and makes computing possible. It is also called the
X. Data: Unprocessed information that is meaningless processor. It acts as the brain of the computer because all
to the user the processing activities take place in the processor. It
XI. Information: The processed data that has meaning to fetches instructions from memory, performs the required
the user tasks, and sends output back to memory. It handles all
computing tasks required for running the operating
system and applications.
The main components of a CPU are: processes it based on the instructions from the control
1. Control unit unit, and produces the result.
2. Registers
3. Arithmetic logic unit MEMORY MANAGEMENT UNIT
4. Memory management unit A computer’s memory stores data before, during and
after processing as well as the application program in
CONTROL UNIT
use at the time. These data are stored in cells of the
The control unit manages instruction processing and
memory.
coordinates data flow within the CPU and between other
computer components. It has an instruction decoder Each memory cell contains one byte of data (a byte = 8
component that interprets the instructions fetched from characters: a character is say a letter of the alphabet,
memory and converts them into micro-operations that the or a number). Therefore, one cell will contain eight
CPU can run. The control unit directs other CPU characters called a byte.
components to perform required operations. The size of the computer memory is measured in
terms of “Kilobytes” or “Megabytes” or “Gigabytes”.
Since “Kilo” stands for 1,000 and “Mega” for 1,000,000,
REGISTERS
computer memory is measured by the thousands or
Registers are small, high-speed memory storage locations
millions of bytes that can be stored in memory at one
within the CPU. They hold data that the CPU is currently
time.
working on and facilitate quick access to data. CPUs have
In computer usage, the prefix “Kilo” actually stands for
several types of registers, like these:
1024 bytes and “Mega” for 1,048,576 bytes.
1. General-purpose registers that hold operational data
Computer memory is sometimes known as Primary
2. Instruction registers that hold the current instruction
memory Storage, Main Memory and RAM (Random
being processed
Access Memory).
3. A program counter that holds the memory address
of the next instruction to be fetched Registers
provide faster access times than other memory PRIMARY MEMORY
levels like RAM or cache memory. ALU
Primary storage or RAM is the computer’s working
bench. All data to be processed must first be recorded
THE ARITHMETIC LOGIC UNIT (ALU)
in it and all output of results draws data from it.
The arithmetic logic unit (ALU) performs basic arithmetic
Primary storage has 2 crucial characteristics. The
operations (addition, subtraction, multiplication, and
first is that data can only be stored temporarily, and
division) and logical operations (AND, OR, and NOT) on
two, it cannot store a great deal of data.
data. It receives data from registers within the CPU,
1) Keyboard- Enables user to enter data and
instructions in a computer.
SECONDARY STORAGE 2) Mouse- Pointing device that enables the user to
These characteristics of primary storage give rise to execute commands.
the requirements to store large quantities of data in 3) Monitor- It is simply screen. It is used for displaying
machine readable form that can be fed into RAM in information. It is called monitor because it enables
small segments for processing. Units that do this are the user to monitor see what is going on in the
called secondary storage devices also referred to as computer.
Auxiliary Storage or Backing Storage. 4) Printer- Used to print the given output
The two most prevalent of these are disks and 5) Microphone- Used as input devices
magnetic tapes. These media offer the ability to store 6) Hard disk – Used to store information
data off line, meaning that data can be processed from 7) Scanner – used to scan documents
time to time by the computer system and are not stored
permanently as part of the hardware configuration.
When needed, they are mounted on data reading and
writing device, called drops, as required by their THE COMPUTER SYSTEM
application programs.
(i) The processor receives data from main A computer system is a group of interconnected
storage, performs operations on them, then the parts working together to complete a given task.
result is given back to the same.
(ii) Data then goes to the main memory comes
COMPONENTS OF A COMPUTER SYSTEM
from input devices or secondary devices, and
data from the main memory goes to backing a) COMPUTER HARDWARE
storage or output devices.
(iii) The ALU and CU combine to form the processor Hardware
as discussed. These are physical and tangible components of a
computer both internal and external.
FUNCTIONS OF COMPUTER PERIPHERALS Used t o i n p u t data, process, store and output
Peripheral devices are connected to the computer system Information
unit using special cables called Interface Cables that
transmit data and information to and from devices.
The cables are attached to the system unit through
connectors called Ports.
Categories of Computer Hardware 6. Head set

1. Input hardware
2. Processing hardware
3. Storage hardware Processing Devices
4. Output hardware This is a device used to process data to information.
5. Communications hardware
Example of processing device
1. CPU (central processing unit) also is known as
Types of Hardware.
brain of the computer or processor.
Input Hardware
Information & communication devices
These are devices that feed information in the
These are devices used to display the internet
computer
programs
Examples of input devices
Example of communication device
1. Keyboard
1. Modems
2. Mouse
3. Digital cameras Storage Devices
4. Scanner These are devices used to store information for future
5. Microphone references
6. Joystick
7. Trackball Examples of storage devices
8. Light pen 2. Flash disk
Output Devices 3. Hard disk
These are devices that give out the information from 4. Memory card
the computer 5. RAM
6. Floppy disk
Examples of output devices 7. CD/DVD Rom (Read Only Memory).
1. Printer
b) COMPUTER SOFTWARE
2. Monitor
These are sets of instructions or programs used to
3. Speaker
operate a computer and execute a specific task.
4. Projector
5. plotter
Software is a generic term used to refer to application, 3. Desktop Publisher
scripts and program that run on a device.

TYPES OF SOFTWARE CLASSIFICATION OF COMPUTERS


There are 2 types of computer software: Computers are classified according to:

a) System Software I. Physical Size


b) Application Software II. Generations
III. Functionality
a) System Software
 Perform a variety of fundamental operations that
avails computer resources to the user. I, Physical Size
 It is necessary for functioning of the computer:
1. Booting the computer Based on physical size computers can be classified into
2. Performing operations such as retrieving, four main groups namely:
loading, executing and storing application a) Supercomputers
programs. b) Mainframe computers
3. Storing and retrieving files c) Minicomputers
4. Performing a variety of system utility d) Microcomputers
functions.
Examples of system software include: a) Supercomputers
 They are the fastest, largest, most expensive, and
1. Operating system e.g. Unix, Ubuntu, window etc powerful computers available.
2. Utility programs e.g. antivirus, screensavers etc  They perform many complex operations in a fraction of
3. Programming languages e.g. ADA,FOTLAN etc a second.
 They generate a lot of heat.
b) Application Software  They are used in scientific research and military
Are programs that are designed to help the user application, petroleum engineering, nuclear physics
accomplish specific tasks. and meteorology
Examples of Application Software
1. Word processors
2. Spreadsheets
b) Mainframe computers Desktop Palmtops
 Less powerful and expensive than supercomputers Laptops Notebooks
 Supercomputers may be described as giant computers,
mainframe are said to be big in size.
 Used for processing data, performing complex
mathematical calculation Characteristics of Modern Computers
 Have large storage capacity and support a variety of 1. High Speed: Computer can perform millions of
peripherals. instructions in a single second.
 They handle all kinds of problems whether scientific or 2. High level of Accuracy: Computers have the ability
commercial to perform a given task without mistakes. If right
 Mostly found in government agencies e.g. banks, data is entered into the computer, right results are
hospitals, airports given out. They work on a principle of GIGO.
3. Diligence: computers can work on the same task for
a long period of time without getting tired, getting
c) Minicomputers bored or losing concentration.
 Represents/resembles the mainframe computers but 4. Versatility: computers have the capability to perform
they are sightly smaller. completely different type of work at the same time
 Referred to as small-scale mainframe computers. (multitasking, multi programmable).
 Less powerful and slower than mainframe computers 5. Memory: The Computer has an in-built memory
 Cheaper than mainframes where it stores large amount of data during
 Used mainly in scientific laboratories, research processing
institutions, engineering plants and places where 6. Automation and programmability: Computers
automation is required. receive and work on instruction on their own. They
work on minimal human intervention.
7. Large storage Capacity: Computers are capable
d) Microcomputers holding large amounts of data for long time without
 They are the cheapest computers losing it through their storage media like; HDD, CDs,
 Smallest flash disks, DVDs, etc.
 Less powerful 8. Artificial intelligence (AI): Computers have the
 Used in training and Learning institutions, small ability to mimic human thought. Programmed
business enterprise, communication centers among Computers can receive and respond to requests,
others and give the appropriate response.

Examples
IMPORTANCE OF COMPUTERS  Human Dependency - It cannot work completely on
 Can used in learning institutions and research centers its own without human intervention.
 Computer can be used to store data in different
organizations
 Can be used to listen to music and different BASIC COMPUTER CONNECTIONS
entertainments.  Cables- Are used to transmit power or data
 Computers are being used to monitor and control between devices.
industrial processes A power cable and data cable are the primary types
 They can be used in communication between different of computer cables. The cable that creates
people. communication between devices is known as Data
 Computers are used to monitor vehicles traffics in busy cable.
towns, in aircraft navigation and making reservations.  Port – A port refers to the part of a computing
device available for connection to peripheral such
as input and output devices.
Limitations of Computer A port serves as an interface between the computer
 No Intelligent Quotient - Computer cannot act on and other computers or peripheral devices.
situations that are not fed or programmed in them.  Devices- Are units of physical hardware or
They have zero intelligent Quotient. It depends equipment that provide one or more computing
merely on the user input to give an output. They functions within a computer system.
produce wrong output if a wrong input is provided It can provide input to the computer, accept output
instead of correcting it. or both.
 Has no feelings – It cannot help a person in a task.
Sometimes some tasks require suggestions and
ideas, this can only if a person feels positive, COMPUTER CASE
negative or some feeling toward the task.
 Lack of Decision Making – Computer cannot decide It is the physical appearance of the computer (How
on its own. computer looks like).
It is always fed with an algorithm to perform
different processes for each situation. Types of computer case-:
 Lack of common sense – Computer might be an i. Tower case
automated machine, but require human assistance. ii. Desk top case
It works only when it is provided with some input.
 Cannot Implement – Computer can store a lot of
information but it cannot implement.
 Tower case-Is tall & bigger in size COMPUTER SAFETY AND ETHICS
the monitor is usually placed next  Computer Safety- the protection of computer
to it. systems and information from harm, theft and
 Desktop case-It is small in size unauthorized use.
and the monitor is placed on it.  It is called Cyber Security
Front Panel of a Computer Case  Computer Ethics- Is a set of commonly agreed
There are ports & slots at the front and the back panel principles that govern the use of computers.
of the computer case-:  It is essentially a set of philosophical guidelines or
moral standards that aim to influence behavior and
 Power button prevent harm.
 USB ports (universal Serial Bus).
 CD/DVD rom drive (read only memory).
 Audio in /Audio out ports. (Specks). Safety precautions and practices
 Safety precautions and practices can be divided into
Back Panel of Computer Case measures that are meant to protect computer and
those that protect the users.
 Power supply port (link the power outlet & the
computer using power code table.
1) Measures that protect computers
 USB ports (Connect USB cable) mouse.
 Burglar proofing- Includes fitting grills on doors,
 VGA port (Video Graphic Adaptor)-Connect
windows and the roof, to deter forceful entry into a
computer and monitor.
computer room. Installation of an intrusion detection
 Internet port (To link Internet).
alarm system and employing security guards also
 Audio in /audio out ports (Head set,
increases the level of security alertness against theft
microphone and speakers).
of computers and accessories.
 Serial port (Digital cameras).
 Installing fire prevention and control equipment- Such
 Parallel port (connect printers).
as smoke detectors, non-liquid based and non-powder
 Ps/2ports (used to connect keyboards and
based fire extinguishers. This is because liquids may
mice).
cause rusting and corrosion of computer components.
 The room should be well laid out- with enough space
for movements. Computers should be placed on stable
wide desks to avoid accidentally knocking them down.
 Cables should be laid out in trunks away from users’
paths to avoid people stumbling on them.
 Providing stable power supply- Computers require a  Overcrowding in the computer room is not allowed.
stable source of power. To protect the computer from This may cause suffocation.
being damaged to due to power instability, avoid
connecting directly to the main electricity supply. Computer Ethics
Instead connect it to special device called  Is the set of commonly agreed principles that
Uninterruptible Power Supply (UPS). govern the use of computer, like ethics more
 Dust and dump control- Can be controlled by fitting generally, computer ethics is essentially a set of
good window and curtains and air conditioning system philosophical guidelines or moral standards that
that filters dust particles from the air entering the aim to influence behavior and prevent harm.
room.
 Cables and power sockets should be well insulated
 The users should not eat or drink in the computer Examples of computer ethics
laboratory 1. Do not use the computer to harm other people`s
 Food particles may fall on the keyboard and clog data.
them. 2. Do not use a computer to cause interference in
 Liquids may pour into electrical circuits and cause other people`s work.
short circuits. 3. Do not spy on another person`s personal data
4. Do not use technology to steal personal information.
Measures that protect the user 5. Do not spread misinformation using computer
 All cables should be insulated to avoid the danger of technology
electric shock to users. 6. Do not use software unless you pay for that
 Cables should be laid away from user paths to avoid software.
tripping on them 7. Do not use someone else`s computer resources
 Providing standard furniture to avoid poor posture unless he authorized to use them.
which may lead to strain injury and limb fatigue. 8. It is wrong to claim ownership of work that is the
 Providing anti-glare screen output of someone else`s intellect.
 The room should be properly ventilated to avoid 9. Before developing software, think about the social
dizziness caused by lack of enough oxygen and to impact of that software.
allow computer to cool. 10. While computers are for communication, always
 The walls of the computer room should not be communicate respectful with fellow members.
painted with over bright reflective oil paints and the
screens should face away from the window to avoid Carrying out computer assembly and disassembly
glare caused by bright backgrounds. 1. Disassemble- means parting the different
components of a computer from the system unit. To
perform disassembly, the task goes like unplugging, 8. This will cause the module to pop up for easy
unscrewing and then lifting the adapters, drivers removal. Do not touch the gold connectors on the
and other components. chip if you are reusing the module.
9. Remove power supply unit- Remove the power
supply unit by unplugging the remaining connectors,
Steps in computer disassembly then unscrewing the unit from the frame.
10. Remove motherboard adapter or expansion cards-
2. Unplug your computer and peripheral items- Turn Remove any adapter or expansion cards from the
off the computer, unplug the power and cord and motherboard. Although these cards usually slide
unplug any peripheral items attached to the
into preconfigured slots, there can be screws. Do
computer, such as the keyboard, mouse, monitor,
headphones and any external drives. not touch the gold connectors on cards if you are
3. Remove the side covers- Remove at least one of the reinstalling the cards.
side covers, usually the right side as you face the 11. Remove the motherboard- Disconnect all the cables
front of the computer. You might find it easier to from the motherboard, then unscrew it from the
access all the parts if you remove both side covers; frame by loosening and screw a little bit before
there are sometimes thumb screws on the covers to
going around again to loosen each screw properly.
make access easier.
This prevents any potential warping of the
4. Disconnect connectors- Disconnect all the
connectors, then remove any card readers and motherboard by gradually releasing the tension on
internal DVD players. These are usually screwed it.
into place. 12. All the components should now be out of computer
5. Remove standalone fans- Remove any standalone case. If you are reusing the case, this is a good time
fans. This is a good time to remove any dust, lint and to get rid of all dust and lint that might have
pet hair from the fans if you planning on reusing
collected.
them.
6. Remove the storage drive- Disconnect the cable and Identify Components
remove the storage drive. Generally storage drives
are held in place by multiple screws. If you have a As you disassemble the computer, there are some
hard drive, be gentle when moving the drive as hard components that you should identify e.g.
bumps can damage the internal parts.
 Mouse
7. Remove memory (RAM) modules- Remove the
 Keyboard
memory (RAM) modules by pushing the clips on
 External hard drive
both ends of the module down.
 Power supply unit
 Fans 7. Install the internal cards- Install the internal card to
 Hard disk drive its socket and attach the cables or power cable to it.
 RAM The selection of the right socket or slot is required
 Motherboard as per the type of socket.
8. Cover the tower- Cover the tower by placing it and
Computer Reassembly pressing towards front side and screw it.
- Assembling of the computer system is exactly the 9. Connect the External Devices and power- Connect
opposite of disassembling operations. the external devices with CPU at its appropriate
- Before starting assembling the computer system, socket.
make sure you have the screws and a screw driver
for those.

1. Mount the processor- The first step for assembling


the computer system starts with mounting the AREAS WHERE COMPUTERS ARE USED
processor on the processor socket of the
motherboard. Computers are used in a wide range of areas, including
2. Fix the motherboard in the tower case- Now the but not limited to:
motherboard is to be fixed vertically in the tower 1) Business and finance: Computers are used for tasks
case; the screws are to be fixed from behind of the such as accounting, inventory management,
motherboard. customer relationship management, and financial
3. Connect the power supply unit- Now line up the analysis. They help businesses streamline their
power supply at the top backend of the cabinet and operations, improve efficiency, and make informed
screw it. decisions.
4. Install the Drivers- Install the CD/DVD drives at the 2) Education: Computers are used in schools and
top front end of the cabinet and screw it. universities for teaching and learning. Access to
5. Connect cable- Now select the appropriate data educational resources, such as online courses,
cable and connect one end of the cable to its drive digital textbooks, and educational software, and help
socket and another end at its appropriate connector students with research, presentations, and other
on the motherboard. academic tasks.
6. Mount Memory modules- It is time now to mount the 3) Healthcare: Computers are used in healthcare for
memory modules on the motherboard by aligning tasks such as patient record management, medical
the RAM to its socket on the motherboard and press imaging analysis, drug discovery, and clinical
it downward. research. They help healthcare professionals
improve patient care, diagnose diseases, and
develop new treatments.
4) Science and research: Computers are used in
scientific research for tasks such as data analysis,
simulations, and modeling. They help scientists
perform complex calculations, visualize data, and
collaborate with other researchers.
5) Engineering: Computers are used in various
engineering disciplines, such as mechanical
engineering, electrical engineering, and civil
engineering, for tasks such as computer-aided
design (CAD), finite element analysis, and
simulation.
6) Entertainment: Computers are used for gaming,
video editing, music production, and other forms of
entertainment. They provide access to a wide range
of games, movies, and music, as well as the ability
to create and share content.
7) Communication: Computers are used in
communication for tasks such as email, instant
messaging, video conferencing, and social media.
They help people connect with others, share
information, and collaborate on projects.
8) Military: Computers are used in the military for
tasks such as data analysis, simulations, and
command and control systems. They help military
personnel make informed decisions, coordinate
operations, and analyze intelligence.
9) Agriculture: Computers are used in agriculture for
tasks such as crop monitoring, weather forecasting,
and precision farming. They help farmers optimize
crop yields, reduce waste, and improve
sustainability.
THE OPERATING SYSTEM  If the computer that you are using now did not have
an operating system you would not be able to select
programs or create folders as there would be no
 Operating System- It is a set of programs that control way for you to instruct the computer in what you
and coordinate the use of the computer system by want it to do.
other programs.
 Is the main program that controls the execution of user Types of Operating System
applications and enables the user to access hardware Operating systems can be classified according to:
and software resources of a computer.
 Operating system helps the computer to coordinate • Number of tasks
resources and provide an interface between the user • Number of Users
and the computer.
 It’s a set of instructions or commands that generally • User interface
instructs or governs the computer on how to perform Classification according to number of tasks
specific tasks or instruction.
1. Single program operating system
The tasks include:
 It allows processing of one application program in
 Booting of the computer the main memory at a time.

 File management  This means that the user can only run one
interactive program at a time
 Memory management
 The user must exit from the program before loading
 Process management and running another program
Examples
 Input and Output devices handling
MS-DOS- Microsoft Disk Operating System
 Controlling peripheral devices such as disk
drivers and printers 2. Multitasking Operating System
 It allows a single CPU to execute what appears to
be more than one application programs apparently
at the same time.
 The operating system allocates a time slice to each  Operating system can be classified into three
ready task. categories according to user interface
 The CPU switches its attention between programs 1. Command –Line based operating system
as directed by the operating system.
 Command-line based operating system lets the
 This switching mechanism is fast that it appears as user type command at a command prompt.
if the tasks are being executed simultaneously.
 The computer reads the typed command from the
Classification according to number of users command line and execute it.

1. Single-user operating system 2. Menu driven Interface

 Designed for use by only one person  It provides the user with a list of options to choose

 It cannot support more than one person and runs  The interface is suitable for beginners who may
only one user application program at a time have difficulties recalling commands.

2. Multi-user operating system  Some operating system present the user with
simple menus while others have sophisticated
 It allows more than one user to interactively use a menus.
computer
3. Graphical User Interface
Examples
 It is the latest effort to make the user-interface
 Linux more user friendly.
 Unix  Besides GUI make use of rectangular work areas
 Ubuntu called windows, graphical objects called icons,
menus and most commands are executed using a
 Windows pointing device.
Classification according to Interface  These features are given an acronym WIMP which
means
 The term user interface refers to the interaction
between the user and the computer. W- Windows

I- Icons
M- Menu 3. Then switch the power button on the monitor
4. Follow the commands from the computer.
P- Pointing devices
b) Warm booting
Examples of Graphical User Interface  This is term used to mean restarting or resetting
your computer.
 Windows  It is done by either using the reset button on the
 MacOS system unit or by use of combination of Ctrl + Alt +
 Linux Delete keys from the keyboard.

CONDITIONS WHICH NECESSITATE A WARM BOOT


BOOTING OF THE COMPUTER 1. When the computer locks or freezes
The act of switching on a computer is termed as “Booting”. 2. When a computer slows down
3. After installing a new software program.
Booting is the process by which a computer loads system 4. After uninstalling software program
files into the main memory. 5. After installing a new hardware device like a printer.
6. After changing CMOS or BIOS setup
The act of switching on a computer is termed as “Booting”.
We boot a computer that is fully connected i.e. all
Shutting down/Switching off a Computer
components are intact.
 Is closing all software programs in preparation to
There are the two types of booting: turn off a computer`s power. The operating system
is the last program to be closed as part of a
computer`s shutdown process.
a) Cold Booting
 Once you turn on the computer, it automatically
Procedure
goes through a process of self-test and preparation
1. Start by closing down any open
for use. This process is called Cold booting or boot
window/program
up
2. The click the start button.
Procedure
3. Click shutdown /Turn off.
1. Switch on the main switch (wall switch)
2. Switch the power button on the system unit
USING THE MOUSE

A mouse is a peripheral that is known as a pointing device.


It lets you point to objects on the screen, click them and
Right mouse button
move them.
This is to:
The two main types of mice these are:
1. Retrieve commands.(rename ,copy,
Optical mouse-uses an electronic eye to detect
cut, paste, delete etc)
movements and easier to clean. 2. Create shortcuts.
Mechanical mouse – uses a rolling ball to detect
movements and is more difficult to clean however it is The wheel in the middle between the two buttons is used
less expensive so many computers come with a to move up or down a page, it comes in handy when
mechanical mouse. moving up or down in a document with countless pages
and sections.
To move around your screen you drag and pull the mouse
in the direction that you want it to move you will notice
that the mouse pointer will follow in whichever direction
OPERATING SYSTEM DESKTOP
you move the mouse, the mouse pointer is the white arrow
on your screen that moves when you move the mouse. Desktop- A computer display area that represents the
kinds of objects found on top of a physical desk. An area
The mouse has two buttons and a wheel at the center;
or window on a computer screen which icons are
right button and left button.
arranged in a manner analogous to objects on top of a
Left mouse button desk.

This is used to:


Operating Desktop Properties
1. Move items
 Icons- These are pictorial representation of commands.
2. Select.
Double clicking on an icon on the windows desktop
3. Highlight (by holding down the left
mouse button and drag). starts the represented program.
 Menu- A set of options or commands presented to the iii. Screen saver- helps to hide the work of the user if
user of a computer application to help them find he or she is busy doing other things.
information or execute a function. Menus are common  Right click at an empty space.
 Click properties.
in GUIs provided in OSs such as windows and Mac OS
 Click screen saver, appearance or setting the
 Buttons- Is a graphical control element that provides following as required
the user a simple way to trigger an event, like
searching for a query at a search engine, or to interact
with the dialog boxes like confirming an action. Setting date & time
 Taskbar- Is the narrow strip of icons, usually located at  Double click on the time icon.
the bottom of the screen, that shows which windows  Set the required date and time
are currently open and that allows you to control Or
functions such as the start button and the clock.  Click start
 Control panel and then click date and time.
Set the date and time as required.
CUSTOMIZING THE DESKTOP

To customize the desktop: FILE MANAGEMENT


 Right click an empty area of your desktop and • File management refers to the fundamental
methods for naming, storing and handling files.
choose personalize from the context menu
 You can see few themes at the top of this page • A file is a collection of related data stored under
 You can choose from the themes shown to the same name called the filename.
customize your desktop.
• Any document is stored as a file by the computer.
• Each file name has two parts namely; The file
Setting the Screen resolution, Appearance and Screen name and the file extension
Saver

i. Screen resolution –helps to set the size of


characters either increase or decrease.
ii. Appearance- helps in changing the color of the
document .
USING KEYBOARD  Tabs keys- For indenting a paragraph
 Shift keys –Shift from upper case character
KEYBOARD to lower case and vice versa.
It is a piece of hardware that resembles a typewriter. It is  Control key-ctrl (helping key).
one of the primary ways we communicate with the  Alternate key-Alt (helping key).
computer and enter data.  Space bar –On pressing it the cursor moves
one space to the right.
Types of keyboards  Back space- For deleting (erasing).
Characters to the left of the cursor.
 Standard keyboard.  Delete- For erasing characters to the right of
 Wired keyboard. the cursor.
 Wireless keyboard.  End- For moving the cursor to the end of the
current line.
 Home key- For moving the cursor to the
Types of keyboard keys
beginning of the current line.
1. Functional keys- used for shortcuts (F1-F12)  Page up- For moving up the page.
F1- is used to activate help notes in windows  Page down-For moving down the page.
 Enter key- Used as an okay key when
DOS environments.
opening a document or creating a new
2. Additional keys-Print screen, scroll lock, pause, line/paragraph.
insert home, page up, delete, End and page down.  Escape key- (Esc)-ending the function.
3. Arrow keys-Facilitate horizontal and vertical  Number lock- Resembles a calculator.
movement.  Start key- To bring the start menu.
4. Typing keyboard keys -Contains alphabets,  F1-Help key
numerals and a number of punctuation marks.  F7-For checking spelling mistake.
5. Numerical key pad-Is positioned on the extreme  F5-Used for finding and replacing in word
right. document /to play slides show in
 (+)-Additional sign presentation.
 (ENTER)-Equal sign  F3 - searching
 (*)-Used in multiplication
 (/)-Used for division
 (-)-Used for subtraction FILE EXTENSIONS
6. Special keys A file extension is the end part of a file name that is
 Caps lock- For capital letters. separated by a dot, containing characters based on
the program used to create the file  File- A collection of related data given a unique
name, for ease of access, manipulation and
A file extension helps the computer user to;
storage
1) Identify the file type. Creating a folder
1) Easily locate files. Procedure
2) Identify what program to associate the file with 1. Minimize all the windows currently opened
and how to properly open it using the correct 2. Position your mouse pointer on an empty area
program.
in the desktop and click on the right mouse
COMMON FILE EXTENSIONS & THEIR ASSOCIATED button.
PROGRAMS 3. Point at new. A submenu appears.
Associated program File extension 4. Click o folder option. The folder icon appears
Microsoft word .doc or .docx on the desktop. By default the folder is given
Microsoft Excel .xls or .xlsx the name `new folder`. To change the name,
Photo .jpeg select it and type in a new name e.g. Data and
Microsoft PowerPoint .ppt or .pptx tap the enter key.
Associated program File extension
Microsoft Access .dbm or .dbmx Folders can also have other folders in them.
Image .bpm
System files .sys
Microsoft, Windows file Movie .AVI
Renaming Files and Folders
Web page files .html
The contents of a file can change as well as the name.

Procedure
Creating, renaming, moving and deleting folders 1. Select the file or folder you want to rename.
2. Click the right mouse button and select rename
 Folder- Is a named storage location where
from the shortcut menu.
related files can stored.
3. Type the new name of the file or folder and press
It is called a directory in some operating system
the enter key.
Moving a Folder  Suggestions will appear, helping you get to what you
are looking for faster.
Procedure
USING COPY, CUT AND PASTE
1. Click to highlight the folder or file to move
2. Click the home tab. From here, you can move a Copy – this is duplicating of information from the original
folder or file, or make a copy of it. source and locate it to another destination without moving
3. Click to choose location, if the desired folder isn`t the original information.
listed
Cut – is moving of information from the original source to
4. Choose the destination folder, then click move.
another destination.

Paste – is clipping of copied or cut information.


Delete Files/Folders
If the location to which you want to move the folder is not
You can rid of files you no longer need by sending the
visible you can use the cut and paste features, these
files or objects to recycle bin.
deletes the folder from one location and pastes it in
Locating Files/Folders in a computer storage another.

1. Open file explorer from the taskbar or right-click 1. First you need to select the folder that you want to
on the start menu. cut or move
2. Choose file explorer and then select a location 2. Right click on this very same folder
from the left pane to search or hardware. 3. On the menu items select Cut and then navigate to
the location where you want to place the folder.
For example, select THIS PC to look in all devices and
4. Right click again and then click on paste on the
drives on your computer, or select DOCUMENTS to look
menu items.
only for files stored there.

Search Tools
 To get search results from your pc and web
 On the taskbar, tap or click search.
 Type what you are looking for in the search box
MULTITASKING downloaded for free from the internet and it can be used
on a trial basis.
One of the great features that have made owning a
computer a must for most households is the ability to To compress or zip files or folder
perform different tasks at the same time or what is
1. Click on the file or folder you want to zip or
commonly known as multitasking.
compress
A computer user can type a document while listening to 2. Right click on the file or folder you want to zip
music and at the same time checking e-mail. (provided WinRar is installed)
3. scroll down the menu to add “ File ”where file
This is one of the things that make computers so popular,
stands for the file or folders name.
people are not confined to performing one tasks at a time
but they can do multiple things at the same time, that is To extract the files that are zipped
part of the reason why many businesses invest a lot of
1. Click on the file and right click the menu below will
money in computer courses to train their employees to be
appear
computer literate as a computer literate employee tends
2. Click on extract here to extract the files, the files
to be more productive.
will be extracted to the file or document you
selected.

FILE COMPRESSION TOOLS


THE PRINT SCREEN FEATURE
Occasionally you have a situation were you need to
compress files for transmission over a network or to The print screen feature allow you to capture images of
decrease the size of the files. This is called file your work area, this is useful especially if you need to give
compression, with compression one usually takes a file or people instruction on how to use certain applications.
folder that is large and you use a specialized programme
To create a print screen is very easy press CTRL+PRT SC,
to compress the file to make it take up less space on the
and then you can paste the image in a programme such as
media on which it is stored.
paint or word screen
There are many file compression programs out there, for
the purpose of this course we are going to make use of
the WinRAR programme. This programme can be
FORMATTING a) Sorting utility i) Un installer
Formatting enables a user to prepare a drive for use or it b) Back up utility j) Disk defragmenter
enables a user to remove all information on a disk. Almost
any drive can be formatted, to format a drive you perform c) Antivirus utility j) Disk repair utility
the following actions d) Data compression k) Disk partitioning software
utility
1. Open My Computer
l) Disk compression utilities
2. Right click on the drive that you want to format and e) Screen savers
click on format on the drop down menu; once you m) File managers
click on the format menu you will get the dialog box f) Scandisk utility
Diagnostic utility.
below. g) File viewer

COMMON UTILITIES
Functions of each utility program
These are general purpose programs that enhance/
boost the performance of a computer. 1) File Viewer: This is a utility that displays the content
They are designed to configure, analyze, optimize, and of a file.
maintain a computer in a normal working state. Some
2) File /data compression utility. Used to squeeze
utility programs are included with the operating system large files so that they can require less storage
space
(for example, disk repairing programs) while others are
purchased separately by the user. 3) Sorting utility: This is used to take in data and
arrange it as specified by the user.
Examples of utility programs
6) Compression utility: reduces the size of files to free
disk space

7) Antivirus utility: This prevents, detects and removes


viruses.
8) Uninstaller utility: This removes programs.
9) Folder management utility: This is used for 15) Scandisk:
creating, viewing, deleting and rearranging files
Scans the computer disk to see if there is any potential
and folders
problem such as bad disk areas, and possibly repair
9) Disk Defragmenter: finds fragmented files on them.
the hard disk and organizes them in a
contagious manner. 16) Cryptographic utilities: Used to encrypt and decrypt
files.
10) Diagnostic utility Compiles technical
computer information & helps outline any 17) Screen saver utility: Causes the computer
identified problems monitor to automatically display a moving image
11) System profilers (graphic) after a period when no input device is in
use. Originally, Screen saver utility was
Provide detailed information about the software
introduced to prevent phosphor burn-in (ghosting
installed and hardware attached to the computer.
effect) of computer monitors.
12) Backup utility: Makes a duplicate copy of every
file on the hard disk which can be store on the PRINT MANAGEMENT
CD or floppy
In order to print a document, a printer must be attached
13) Antivirus utility: This Prevents, detects and removes
to the computer. Before one prints a file, it should be
viruses
previewed.
Examples of anti-virus utility Print preview means to look at the document before

1. Avira it is printed out so as to identify missing content To


2. Kaspersky
print preview a file,
3. AVG
4. Smadav • Click on file (click on the office button in the top
most left corner of the window)
14) Network utilities: Analyses the computer’s
network connectivity, configure network • Point at print
settings, check data transfer and log events.
• Click print preview
• To print
• Click file (office button)
• Click print to open the print dialogue box
• Select the printer to be used on the box labeled
name e.g. hp laser jet professional 1606dn

• Click properties to specify the paper type e.g. A4


• Specify the number of copies to be printed
• Specify the number of copies to be printed
• Select the range of pages to print by clicking
on either all to print the entire document or
current to print the displayed page or
selection to print a selected area.

• Click ok to print a document. Shortcut: Ctrl + P

You might also like