Information Communication and Technology: Introduction To Computer
Information Communication and Technology: Introduction To Computer
1. Input hardware
2. Processing hardware
3. Storage hardware Processing Devices
4. Output hardware This is a device used to process data to information.
5. Communications hardware
Example of processing device
1. CPU (central processing unit) also is known as
Types of Hardware.
brain of the computer or processor.
Input Hardware
Information & communication devices
These are devices that feed information in the
These are devices used to display the internet
computer
programs
Examples of input devices
Example of communication device
1. Keyboard
1. Modems
2. Mouse
3. Digital cameras Storage Devices
4. Scanner These are devices used to store information for future
5. Microphone references
6. Joystick
7. Trackball Examples of storage devices
8. Light pen 2. Flash disk
Output Devices 3. Hard disk
These are devices that give out the information from 4. Memory card
the computer 5. RAM
6. Floppy disk
Examples of output devices 7. CD/DVD Rom (Read Only Memory).
1. Printer
b) COMPUTER SOFTWARE
2. Monitor
These are sets of instructions or programs used to
3. Speaker
operate a computer and execute a specific task.
4. Projector
5. plotter
Software is a generic term used to refer to application, 3. Desktop Publisher
scripts and program that run on a device.
Examples
IMPORTANCE OF COMPUTERS Human Dependency - It cannot work completely on
Can used in learning institutions and research centers its own without human intervention.
Computer can be used to store data in different
organizations
Can be used to listen to music and different BASIC COMPUTER CONNECTIONS
entertainments. Cables- Are used to transmit power or data
Computers are being used to monitor and control between devices.
industrial processes A power cable and data cable are the primary types
They can be used in communication between different of computer cables. The cable that creates
people. communication between devices is known as Data
Computers are used to monitor vehicles traffics in busy cable.
towns, in aircraft navigation and making reservations. Port – A port refers to the part of a computing
device available for connection to peripheral such
as input and output devices.
Limitations of Computer A port serves as an interface between the computer
No Intelligent Quotient - Computer cannot act on and other computers or peripheral devices.
situations that are not fed or programmed in them. Devices- Are units of physical hardware or
They have zero intelligent Quotient. It depends equipment that provide one or more computing
merely on the user input to give an output. They functions within a computer system.
produce wrong output if a wrong input is provided It can provide input to the computer, accept output
instead of correcting it. or both.
Has no feelings – It cannot help a person in a task.
Sometimes some tasks require suggestions and
ideas, this can only if a person feels positive, COMPUTER CASE
negative or some feeling toward the task.
Lack of Decision Making – Computer cannot decide It is the physical appearance of the computer (How
on its own. computer looks like).
It is always fed with an algorithm to perform
different processes for each situation. Types of computer case-:
Lack of common sense – Computer might be an i. Tower case
automated machine, but require human assistance. ii. Desk top case
It works only when it is provided with some input.
Cannot Implement – Computer can store a lot of
information but it cannot implement.
Tower case-Is tall & bigger in size COMPUTER SAFETY AND ETHICS
the monitor is usually placed next Computer Safety- the protection of computer
to it. systems and information from harm, theft and
Desktop case-It is small in size unauthorized use.
and the monitor is placed on it. It is called Cyber Security
Front Panel of a Computer Case Computer Ethics- Is a set of commonly agreed
There are ports & slots at the front and the back panel principles that govern the use of computers.
of the computer case-: It is essentially a set of philosophical guidelines or
moral standards that aim to influence behavior and
Power button prevent harm.
USB ports (universal Serial Bus).
CD/DVD rom drive (read only memory).
Audio in /Audio out ports. (Specks). Safety precautions and practices
Safety precautions and practices can be divided into
Back Panel of Computer Case measures that are meant to protect computer and
those that protect the users.
Power supply port (link the power outlet & the
computer using power code table.
1) Measures that protect computers
USB ports (Connect USB cable) mouse.
Burglar proofing- Includes fitting grills on doors,
VGA port (Video Graphic Adaptor)-Connect
windows and the roof, to deter forceful entry into a
computer and monitor.
computer room. Installation of an intrusion detection
Internet port (To link Internet).
alarm system and employing security guards also
Audio in /audio out ports (Head set,
increases the level of security alertness against theft
microphone and speakers).
of computers and accessories.
Serial port (Digital cameras).
Installing fire prevention and control equipment- Such
Parallel port (connect printers).
as smoke detectors, non-liquid based and non-powder
Ps/2ports (used to connect keyboards and
based fire extinguishers. This is because liquids may
mice).
cause rusting and corrosion of computer components.
The room should be well laid out- with enough space
for movements. Computers should be placed on stable
wide desks to avoid accidentally knocking them down.
Cables should be laid out in trunks away from users’
paths to avoid people stumbling on them.
Providing stable power supply- Computers require a Overcrowding in the computer room is not allowed.
stable source of power. To protect the computer from This may cause suffocation.
being damaged to due to power instability, avoid
connecting directly to the main electricity supply. Computer Ethics
Instead connect it to special device called Is the set of commonly agreed principles that
Uninterruptible Power Supply (UPS). govern the use of computer, like ethics more
Dust and dump control- Can be controlled by fitting generally, computer ethics is essentially a set of
good window and curtains and air conditioning system philosophical guidelines or moral standards that
that filters dust particles from the air entering the aim to influence behavior and prevent harm.
room.
Cables and power sockets should be well insulated
The users should not eat or drink in the computer Examples of computer ethics
laboratory 1. Do not use the computer to harm other people`s
Food particles may fall on the keyboard and clog data.
them. 2. Do not use a computer to cause interference in
Liquids may pour into electrical circuits and cause other people`s work.
short circuits. 3. Do not spy on another person`s personal data
4. Do not use technology to steal personal information.
Measures that protect the user 5. Do not spread misinformation using computer
All cables should be insulated to avoid the danger of technology
electric shock to users. 6. Do not use software unless you pay for that
Cables should be laid away from user paths to avoid software.
tripping on them 7. Do not use someone else`s computer resources
Providing standard furniture to avoid poor posture unless he authorized to use them.
which may lead to strain injury and limb fatigue. 8. It is wrong to claim ownership of work that is the
Providing anti-glare screen output of someone else`s intellect.
The room should be properly ventilated to avoid 9. Before developing software, think about the social
dizziness caused by lack of enough oxygen and to impact of that software.
allow computer to cool. 10. While computers are for communication, always
The walls of the computer room should not be communicate respectful with fellow members.
painted with over bright reflective oil paints and the
screens should face away from the window to avoid Carrying out computer assembly and disassembly
glare caused by bright backgrounds. 1. Disassemble- means parting the different
components of a computer from the system unit. To
perform disassembly, the task goes like unplugging, 8. This will cause the module to pop up for easy
unscrewing and then lifting the adapters, drivers removal. Do not touch the gold connectors on the
and other components. chip if you are reusing the module.
9. Remove power supply unit- Remove the power
supply unit by unplugging the remaining connectors,
Steps in computer disassembly then unscrewing the unit from the frame.
10. Remove motherboard adapter or expansion cards-
2. Unplug your computer and peripheral items- Turn Remove any adapter or expansion cards from the
off the computer, unplug the power and cord and motherboard. Although these cards usually slide
unplug any peripheral items attached to the
into preconfigured slots, there can be screws. Do
computer, such as the keyboard, mouse, monitor,
headphones and any external drives. not touch the gold connectors on cards if you are
3. Remove the side covers- Remove at least one of the reinstalling the cards.
side covers, usually the right side as you face the 11. Remove the motherboard- Disconnect all the cables
front of the computer. You might find it easier to from the motherboard, then unscrew it from the
access all the parts if you remove both side covers; frame by loosening and screw a little bit before
there are sometimes thumb screws on the covers to
going around again to loosen each screw properly.
make access easier.
This prevents any potential warping of the
4. Disconnect connectors- Disconnect all the
connectors, then remove any card readers and motherboard by gradually releasing the tension on
internal DVD players. These are usually screwed it.
into place. 12. All the components should now be out of computer
5. Remove standalone fans- Remove any standalone case. If you are reusing the case, this is a good time
fans. This is a good time to remove any dust, lint and to get rid of all dust and lint that might have
pet hair from the fans if you planning on reusing
collected.
them.
6. Remove the storage drive- Disconnect the cable and Identify Components
remove the storage drive. Generally storage drives
are held in place by multiple screws. If you have a As you disassemble the computer, there are some
hard drive, be gentle when moving the drive as hard components that you should identify e.g.
bumps can damage the internal parts.
Mouse
7. Remove memory (RAM) modules- Remove the
Keyboard
memory (RAM) modules by pushing the clips on
External hard drive
both ends of the module down.
Power supply unit
Fans 7. Install the internal cards- Install the internal card to
Hard disk drive its socket and attach the cables or power cable to it.
RAM The selection of the right socket or slot is required
Motherboard as per the type of socket.
8. Cover the tower- Cover the tower by placing it and
Computer Reassembly pressing towards front side and screw it.
- Assembling of the computer system is exactly the 9. Connect the External Devices and power- Connect
opposite of disassembling operations. the external devices with CPU at its appropriate
- Before starting assembling the computer system, socket.
make sure you have the screws and a screw driver
for those.
File management This means that the user can only run one
interactive program at a time
Memory management
The user must exit from the program before loading
Process management and running another program
Examples
Input and Output devices handling
MS-DOS- Microsoft Disk Operating System
Controlling peripheral devices such as disk
drivers and printers 2. Multitasking Operating System
It allows a single CPU to execute what appears to
be more than one application programs apparently
at the same time.
The operating system allocates a time slice to each Operating system can be classified into three
ready task. categories according to user interface
The CPU switches its attention between programs 1. Command –Line based operating system
as directed by the operating system.
Command-line based operating system lets the
This switching mechanism is fast that it appears as user type command at a command prompt.
if the tasks are being executed simultaneously.
The computer reads the typed command from the
Classification according to number of users command line and execute it.
Designed for use by only one person It provides the user with a list of options to choose
It cannot support more than one person and runs The interface is suitable for beginners who may
only one user application program at a time have difficulties recalling commands.
2. Multi-user operating system Some operating system present the user with
simple menus while others have sophisticated
It allows more than one user to interactively use a menus.
computer
3. Graphical User Interface
Examples
It is the latest effort to make the user-interface
Linux more user friendly.
Unix Besides GUI make use of rectangular work areas
Ubuntu called windows, graphical objects called icons,
menus and most commands are executed using a
Windows pointing device.
Classification according to Interface These features are given an acronym WIMP which
means
The term user interface refers to the interaction
between the user and the computer. W- Windows
I- Icons
M- Menu 3. Then switch the power button on the monitor
4. Follow the commands from the computer.
P- Pointing devices
b) Warm booting
Examples of Graphical User Interface This is term used to mean restarting or resetting
your computer.
Windows It is done by either using the reset button on the
MacOS system unit or by use of combination of Ctrl + Alt +
Linux Delete keys from the keyboard.
Procedure
Creating, renaming, moving and deleting folders 1. Select the file or folder you want to rename.
2. Click the right mouse button and select rename
Folder- Is a named storage location where
from the shortcut menu.
related files can stored.
3. Type the new name of the file or folder and press
It is called a directory in some operating system
the enter key.
Moving a Folder Suggestions will appear, helping you get to what you
are looking for faster.
Procedure
USING COPY, CUT AND PASTE
1. Click to highlight the folder or file to move
2. Click the home tab. From here, you can move a Copy – this is duplicating of information from the original
folder or file, or make a copy of it. source and locate it to another destination without moving
3. Click to choose location, if the desired folder isn`t the original information.
listed
Cut – is moving of information from the original source to
4. Choose the destination folder, then click move.
another destination.
1. Open file explorer from the taskbar or right-click 1. First you need to select the folder that you want to
on the start menu. cut or move
2. Choose file explorer and then select a location 2. Right click on this very same folder
from the left pane to search or hardware. 3. On the menu items select Cut and then navigate to
the location where you want to place the folder.
For example, select THIS PC to look in all devices and
4. Right click again and then click on paste on the
drives on your computer, or select DOCUMENTS to look
menu items.
only for files stored there.
Search Tools
To get search results from your pc and web
On the taskbar, tap or click search.
Type what you are looking for in the search box
MULTITASKING downloaded for free from the internet and it can be used
on a trial basis.
One of the great features that have made owning a
computer a must for most households is the ability to To compress or zip files or folder
perform different tasks at the same time or what is
1. Click on the file or folder you want to zip or
commonly known as multitasking.
compress
A computer user can type a document while listening to 2. Right click on the file or folder you want to zip
music and at the same time checking e-mail. (provided WinRar is installed)
3. scroll down the menu to add “ File ”where file
This is one of the things that make computers so popular,
stands for the file or folders name.
people are not confined to performing one tasks at a time
but they can do multiple things at the same time, that is To extract the files that are zipped
part of the reason why many businesses invest a lot of
1. Click on the file and right click the menu below will
money in computer courses to train their employees to be
appear
computer literate as a computer literate employee tends
2. Click on extract here to extract the files, the files
to be more productive.
will be extracted to the file or document you
selected.
COMMON UTILITIES
Functions of each utility program
These are general purpose programs that enhance/
boost the performance of a computer. 1) File Viewer: This is a utility that displays the content
They are designed to configure, analyze, optimize, and of a file.
maintain a computer in a normal working state. Some
2) File /data compression utility. Used to squeeze
utility programs are included with the operating system large files so that they can require less storage
space
(for example, disk repairing programs) while others are
purchased separately by the user. 3) Sorting utility: This is used to take in data and
arrange it as specified by the user.
Examples of utility programs
6) Compression utility: reduces the size of files to free
disk space