Ict Handbook
Ict Handbook
HANDBOOK
Compiled by
Elijah K Mutua
ICT has become the enabler of our lives. All daily
operations rely on computers and computer related
Copyright@2022
technology. It is therefore very necessary that we make
ICT understandable to all, even the very young.
ICT summary by E.K.M
Introduction
This book is based on the current edexcel specification, we have tried to break complex terms
and descriptions to ease the learners experience while reading this book.
One can read this book for their own general computer know how. You will find book
enjoyable with its colorful illustrations, real pictures and humorous examples which are very
funny but educative. ICT is our life so let us enjoy it. The book has two main sections A and B.
Computational thinking includes a suite of cognitive tools that can be applied to solve
problems with or without the use of a computer, through the use of four stages.
Decomposition
Some problems seem too overwhelming to solve. Decomposition is the process of breaking
down a problem into manageable pieces so that each piece can be solved.
Pattern recognition
After breaking down the problem, it is useful to analyse the resulting ‘chunks’ to see if there
are any similarities between them.
Algorithm design
Once a simplified model has been established, it is easier to create an algorithm (a sequence
of instructions that carries out a task) to describe how to develop the solution.
1
ICT summary by E.K.M
Algorithm
An algorithm is a set of guidelines that describes how to perform a task. Think of an algorithm
as step-by-step instructions that create a predictable pattern in a set of numbers or in lines of
code. Algorithm is used to solve tasks by breaking into small manageable bits.
This step can be numbered to show how they progress from the first to the last step. These steps
may be as easy as baking a cake or as complex as designing a rocket. It does not matter the
number of steps.
Decomposition
It involves breaking down a complex problem or system into smaller parts that are more
manageable and easier to understand. The smaller parts can then be examined and solved,
or designed individually, as they are simpler to work with.
Abstraction
In the process of abstraction, a programmer hides all but the relevant data about an object
in order to reduce confusion and increase success of the program. hiding background details
or any unnecessary application of the data so that users only see the required information.
2
ICT summary by E.K.M
Program
A computer program is a sequence of instructions written using a Computer Programming
Language to perform a specified task by the computer.
➢ First go straight, after half kilometer, take left from the red light and then drive around
one kilometer and you will find KFC at the right.
➢ Here, you have used English Language to give several steps to be taken to reach KFC.
If they are followed in the following sequence, then the person will reach KFC – see! It’s
easy.
Just like with human languages, a student needs to know a programming language to be
able to instruct a computer with it. Some computer programming language include:
1. C
2. C++
3. Python
4. PHP
5. Scratch
6. Ruby
You do not need to know all programming languages you will do just fine with one or two.
Relax!
As previously mentioned, programming is the process of creating an algorithm that can be followed
by a human or a machine. Later in this guide, consideration is given to the way in which visual and
3
ICT summary by E.K.M
textual languages can be used to code programming constructs to create an algorithm that can be
carried out by a computer.
Sequence: This refers to the fact that instructions are carried out in an order. Students can be shown
how things can go wrong if the sequence of instructions is incorrect. Common examples used are
boiling a kettle or a method for making a cake. Imagine if the water was put into the kettle after it was
switched on, or if the eggs went into the mixture after it had been baked for 40 minutes!
The flowchart
Selection:
This allows programs to take one of two paths based on the outcome of a Boolean decision, if the result
of an operation is either True or False. This allows us to control the flow of the sequence of instructions
so that it does different things based on predetermined conditions.
Flowchart
4
ICT summary by E.K.M
Iteration:
This is used when we want to repeat instructions in a loop. This can be done either a set number of
times in what is called a ‘count-controlled’ loop, or while a condition is met – a ‘condition-controlled
loop’.
Flowchart
Variables:
These are temporary containers for single values that can be accessed and changed by the
program. A variable might store a high score, or the name of a team. Variables can be assigned a
name by which they can later be identified.
Outputs are what is provided to the user by the program (for example, a value or an LED being
turned on).
Operators:
Operators carry out operations on values or statements.
5
ICT summary by E.K.M
Comparison operators
Comparison operators compare values to return ‘True’ or ‘False’ as part of selection statements used
to control program flow.
Arithmetic operators:
Arithmetic operators carry out calculations on values.
Remember the = symbol assigns a value to a variable and the == symbol compares two values.
Data types
Data type specifies the type of data that a variable can store such as integer, floating,
character, etc. There are the following data types in C language.
• Students can apply the basic programming constructs without having to be concerned with the
more complex syntax requirements of textual languages.
• Visual languages often use ‘blocks’ that snap together and only connect to each other if it is
possible for them to do so, providing further scaffolding for beginners.
• Blocks can be picked from a palette.
• Entering a simple expression (e.g. arithmetic) takes longer than typing it out.
• Only some visual editors allow you to swap between textual and blocks-based editing.
• Blocks take up a lot of screen space, so larger programs become difficult to read and write, as a
particular part of the code may not be visible on the available part of the screen.
6
ICT summary by E.K.M
A computer is an electronic device that accepts data and processes it to produce meaningful
results (output) useful for decision making.
It can also be defined as an electronic device that performs logical and arithmetical
information and can store data for future reference.
7
ICT summary by E.K.M
Software branches
System software controls key operation of a computer e.g. Windows 10 etc
Application software is designed to perform specific tasks e.g. Word processors for typing text
in the computer screens.
Advantages of computers
Disadvantages of computers
i. Can be affected by viruses(very important resources under siege)
a virus is a program that corrupts the normal operations of a computer
ii. Costly to buy and maintain – requires trained personnel
iii. Entirely dependent on instructions and software
iv. It has led to loss of employment
v. It has made man to be dependable on it, lowering our intelligence
vi. It is a health hazard with prolonged exposure
vii. Requires constant updating of new programs etc.
8
ICT summary by E.K.M
Areas of Application
1. In business to keep business sales/ employee records, transaction control, payroll
preparation.
2. In medicine to store hospital records and medical records e.g. patient details. There are
machines in the theatres like heart monitors, pacers they are computerized.
3. In communication to share information in a network, by messaging via Email and internet.
4. In internal and external security to store criminal records, fingerprints CCTV, password-
protected documents and infestation information and biometric data collection.
5. In education through E-learning and practical education
6. In research institutes to acquire and analyze data
7. In engineering to enhance quality and quantity of products.
8. In entertainment to produce music and games
9. In the office for record maintenance word processing, recording data, performing inter-
organizational communications
10. In transport for bookings, data records.
11. In homes for entertainment.
Computers and other digital devices
PCs:
A desktop PC usually has these basic components: a monitor, a keyboard, a system unit and
a mouse.
Laptops:
A laptop computer is slightly larger and much heavier than
an A4 file.
Notebook:
A notebook computer is a small laptop computer
that is about as big as an oversized book. A
notebook computer is likely to be half the size of a
laptop and is lighter and easier to carry.
9
ICT summary by E.K.M
Netbook:
A netbook computer is a very small laptop that is
optimized for Internet and email access. It is
intended to be light and easy to carry and has a
long battery life.
Hand-held:
A handheld computer or Personal Digital Assistant
(PDA) or palmtop can fit in one hand or in your
pocket, but it is too small for general work. A PDA
usually has a touch sensitive screen. Although PDAs
can be temporarily attached to a Keyboard, you
cannot comfortably type a long document into a
PDA.
Smartphone:
A smart phone is a mobile phone with the
functions of a PDA. Hand-held computing devices
can perform a range of activities such as personal
record-keeping and satellite navigation.
Main frame:
10
ICT summary by E.K.M
Super computers:
These are the fastest type of computers.
Supercomputers are very expensive and are
employed for specialized applications that
require immense amounts of mathematical
calculations. For example, weather forecasting
requires a supercomputer. Other uses of
supercomputers include animated graphics, fluid
dynamic calculations, nuclear energy research,
and petroleum exploration.
Embedded computers:
An embedded computer is designed for and built
into a specific application where it will perform a
limited range of dedicated functions. The size and
functionality of an embedded computer
depends on the application. They may be very
small devices built into a single microchip and
may control.
Games consoles:
A games console is a PC that is designed specifically for playing games.
11
ICT summary by E.K.M
• websites
• multimedia presentations
• music scores
• cartoons
• flyers / posters
B. interactive communication applications
• blogs
• wikis
• social networking websites
C. data handling applications
• surveys
• address lists
• tuck shop records
• clubs and society records
• school reports
• school libraries
D. measurement applications
• scientific experiments
• electronic timing
• environmental monitoring
E. control applications
• turtle graphics
• control of lights, buzzers and motors
• automatic washing machines
• automatic cookers
• central heating controllers
• burglar alarms
• video recorders / players
• microwave ovens
• computer controlled greenhouse
F. modelling applications
• 3D modelling
• simulation (e.g. flight or driving)
• spreadsheets for personal finance
• spreadsheets for tuck shop finances
INPUT DEVICES
1. Keyboard
12
ICT summary by E.K.M
The most widely used input device is a keyboard. This is a set of keys used to operate a PC.
Numeric keyboards only have keys to input numbers and few special characters. A QWERTY
keyboard may have a numeric keyboard built into the right hand side.
Advantages:
• Keyboards are almost always available as an input device. They are widely used at
work.
• Many people know how to use a QWERTY keyboard, so help is usually available.
Disadvantages:
• To use a keyboard efficiently, you need to know the layout and be able to touch-type.
2. Mouse
The mouse is the most widely used pointing device. Some have the ball
underneath that moves when you move the mouse, resulting in a similar
movement of the pointer on the screen. A optical mouse detects
movement using light instead of a ball.
3. Tracker ball
A tracker ball is like an upside-down mouse. The ball is on the top of the
device and you move it with your thumb.
4. Joystick
A joystick is a lever that gives you similar control to a mouse but its
behavior is slightly different. Joystick can be used separately or can be
built into a gamepad, where there are often two simple joysticks, one for
each thumb.
13
ICT summary by E.K.M
5. Graphics tablet
Graphics tablet or a graphics pad is a flat rectangular pad
between 6 and 20 inches wide. It works with a stylus which
you move along the surface of the pad to produce drawings
in the computer. A graphics tablet is used mainly for
computer-aided design and drawing.
6. Scanner
A scanner reads printed data into the computer. A number
of different devices are referred to as scanners:
A hand-held scanner reads the image while being dragged
over it.
In the case of a flatbed scanner, the image is laid flat on the
scanner’s surface, and is captured in a similar manner to that
of a photocopier.
A sheet-fed scanner feeds the image in through rollers. The scanner reads the image as the
paper goes through. The image must be printed on flexible sheet of paper.
Advantages:
• Scanners quickly convert printed images on paper to electronic form.
Disadvantages:
• The accuracy of the data input is unlikely to be verified.
7. Digital camera
Digital cameras store pictures on a memory card in a
format suitable for saying and displaying on a computer.
Pictures can be transferred from the camera to the
computer where they can be edited and enhanced in
graphics software or viewed on screen.
Television sets can also have memory card readers built in or connected so that several people
can view the pictures together on a large screen.
The picture made by digital camera is formed by a quantity of very small dots of different
colors, merging to form a picture. The picture quality is related to the density of the dots making
the picture, the accurate placement of the dots and correctness of the colors being
displayed.
14
ICT summary by E.K.M
Thus, an eight mega-pixel camera uses eight million dots to form a picture and so would
produce better output than a two mega pixel camera.
A digital video camera or camcorder has similar functions to a digital camera but records
moving images with sound. Camcorders can save recordings on memory card but may also
use DVD, MiniDV tape or a built-in hard disk.
8. Webcam
A webcam is a type of digital video camera where the
image captured is viewed using a computer. The
computer connects to the webcam over the Web and
the image is displayed on the computer screen.
15
ICT summary by E.K.M
9. Microphone
Microphone is a device used to record sound, to give voice
commands and for voice communication over the Internet. And
is used to control through different ways the world works and the
children don’t understand
OMR technology is used to interpret pencil marks on a piece of paper. An OMR reader can
recognize the position of a mark or set of marks on paper, because the mark is darker than an
unmarked area.
The computer then records the mark’s position and can analyze it to determine the meaning
of the data. Marks made on this kind of form must be very clear or they may not be properly
recognized.
Advantages:
• There is no requirement to type in the information written on the paper form. Because of
this, input is faster and less expensive.
• The person who fills in the form is responsible for the accuracy of the information on it.
Disadvantages:
• OMR forms must be printed very accurately because the position of the mark on the
paper affects the accuracy of the input. Because of this, printing costs more.
• Verification checks on the input are unlikely to be carried out, so mistakes inputting the
data are less likely to be detected.
16
ICT summary by E.K.M
OCR is the identification of printed or written text characters by a computer. Printed text is
scanned and input to the computer, which attempts to recognize the characters in it. These
are then stored as text that can be word-processed.
OCR can also be used to read handwriting. OCR software is often included when you
purchase a scanner, so that any office with a scanner has OCR capabilities. A similar process
of character recognition is used to interpret handwriting on the screen of a PDA or tablet
computer.
PDAs and tablet computers have touch-screen of a PDA or tablet computer. PDAs and tablet
computers have touch-sensitive screens that accept handwriting as input and have character
recognition software that can convert it to text characters that can be word processed.
Advantages:
• Text printed on paper can be converted to electronic form and edited. This is especially
useful for creating electronic versions of books printed before computers were
available.
Disadvantages:
• Character recognition is not always accurate and the electronic text has to be checked
carefully.
A bar code scanner or bar code reader reads a pattern of bars representing the code number
of the item on which it is printed. The bar code scanner usually passes a small laser beam over
the pattern and reads in the pattern of reflected light. Bar code scanners may be hand-held,
but some are built into the surface of a supermarket checkout counter.
17
ICT summary by E.K.M
Biometric scanners can be built into mobile phones, desktop and laptop computers, and smart
cards. They can be used to control entry to buildings and can even replace keys in cars.
Advantages:
• There is no need to remember to carry personal identification.
• The person has to be present. This makes identification theft and fraud much less likely.
Disadvantages:
• Identification using biometric scanners is not yet sufficiently accurate. Permitted users
will not be recognized at times, and blocked users will sometimes be permitted.
15. Magnetic stripe reader
A magnetic stripe card reader reads information from a magnetic strip on the surface of a
plastic card when it is swiped through the reader. Magnetic stripe cards are also used as bank
or credit cards. In addition to being able to read the magnetic stripe, some devices can also
write information to it.
The stripe can store a permanent value, such as an account number, or a value that could
change, such as the amount of cash you are allowed to withdraw from a cash point.
Advantages:
• They are often used as a form of identification that is small and light and can be carried
all the times.
• The data recorded on the magnetic stripe is in electronic form and can be input directly
into a computer.
18
ICT summary by E.K.M
Disadvantages:
• The data recorded on the magnetic stripe can be affected by electromagnetic
radiation, such as that from televisions and computers.
•
• The data recorded on the magnetic stripe can be copied or deleted. This is an
opportunity for determined criminals to commit identity theft and fraud.
16. Chip and pin
A smart card or Chip and PIN is similar to a magnetic stripe card but has a microprocessor chip
embedded in it. The chip can do some processing, as well as storing information. Special
devices can communicate with the chip to read and write information on the card.
Security features can be programmed into the chip. Bank and credit cards used to be
magnetic stripe cards but are now more usually smart cards. These cards can be used to
withdraw cash at a cash point.
Cash points are specialized computer terminals with a small screen numeric keyboard and
smart card reader. The customer puts their card in the reader and is prompted to enter their
four-digit PIN. If the pin entered on the keyboard matches the PIN read from the cards the
customer can proceed: if not, the card is either confiscated or returned to the customer.
Advantages:
• Often used as form of identification that is small and light and can be carried at all times.
• The data recorded on the chip is in electronic form and can be input directly into a
computer.
• The data recorded on the chip is more secure than data recorded on a magnetic stripe.
• The data recorded on the chip can be updated during transactions.
Disadvantages:
• The data recorded on the chip can be affected by electromagnetic radiation.
• The data recorded on the chip can be copied or edited by very determined criminals
used for fraud.
17. Sensors
Sensors are used to input data about the environment into a computer. There are many types
of sensors. They are available in many different shapes and sizes and they have a wide variety
19
ICT summary by E.K.M
of uses. For example, sensors can be used to record light intensity, temperature and pressure.
Sensors usually produce a low-voltage which must be converted to a digital signal for the
computer using an analogue-to-digital converter (ADC).
Advantages:
• Sensors can be placed in dangerous locations where people would be hurt.
• Sensors can continuously and reliably record data whereas to organize this using people
could be much more unreliable and expensive.
• Sensors can record data that people do not sense or do not sense accurately, such as
humidity.
• The data recorded by sensors can automatically record in a form that can be processed
by a computer.
• Data can be collected by a central computer from sensors in remote locations. People
do not need to travel and this saves time and allows data to be collected more
frequently.
Disadvantages:
• Sensors cannot interpret the data.
• Sensors detect a very restricted range of the different types of data.
PROCESSORS
CPU
A processor or microprocessor is built into a microchip that has memory and other components
built into it. The microchip itself is often referred to as the ‘processor’. If there is more than one
processor built into the microchip, then the microchip is referred to as the ‘processor’ and
processors built into it are referred to as cores.
Graphics card
20
ICT summary by E.K.M
The graphics card which is also known as video card or display card is housed within the system
unit, and controls the signals going to the monitor screen. Higher quality cards can produce
very clear graphics very quickly. Some computer games demand advanced display cards
and high-quality monitor screens.
Sound card
A sound card controls all input and output of audio. Audio input through a microphone and
output through speakers are usually analogue and the sound card handles their conversion
into digital signals processed by the computer. It also handles digital audio input, e.g: from
multimedia applications.
OUTPUT DEVICES:
1. Monitor
Monitors are also known as visual display unit (VDUs). They come in different styles and quality
levels. Screen color quality, resolution and clarity are just some of the features that affect how
desirable a particular monitor is to you.
Picture elements: Although the picture on a computer monitor may look sharp and clear, it is
made up of many illuminated dots known as picture elements or pixels. The dots are usually so
tiny that you would not normally notice them individually – you just see the whole picture. If
you could actually see the picture elements, the picture would look jagged.
2. Printer
Types of printer:
1. An impact printer usually strikes through an inked ribbon, making marks on the paper. A
non-impact printer uses a non-striking method to form the image on the paper.
2. Inkjet printers use tiny dots of ink sprayed onto the paper, forming the shapes of
characters and pictures. Inkjet printers are quiet and produce good quality output. They
usually produce color prints, and are very popular for home and small-office use.
3. Laser printers use laser light to make patterns of ink on a drum. This drum then transfers
the ink to the paper, and finally a heating process fuses the ink to the paper. Laser
technology gives excellent quality and prints quickly. Laser printers are widely used but
are more expensive than inkjet printers, and often only print in black and white.
4. Thermal printers use heated wires to mark dots on the surface of a heat-sensitive paper.
5. Thermal dye transfer printers use special-colored dyes heated into a gas. This process
gives the best quality of color printing, but is very expensive and requires special paper.
6. Thermal wax transfer printers use molten wax, forming tiny dots of different colors on the
paper. These colored wax dots blend to produce tones.
Buffers and spooling: Printers are much slower than the computers and networks that send
information to them to be printed. So that the computer does not have to wait for the printer
to finish printing, most printers have a buffer built into them.
A document sent to the printer will be quickly saved in the buffer so that the computer can do
other tasks while the printer is printing the document.
22
ICT summary by E.K.M
A buffer will only hold a few short documents, and on large networks many users may be
sharing the same printer. To avoid users having to wait, documents are first put into a queue
on a server and then sent for printing in turn. This queuing process is known as spooling.
Print Quality: All these types of printers use very small dots to produce pictures. The smaller the
dot, the better the quality of the picture. An important measure of print quality is the number
of dots per inch (dpi). The higher the dpi, the better the picture. In addition, for the best-quality
output the dots must be accurately placed.
3. There may be several sheets together, either impregnated with carbon or with carbon
sheets between them, so that multiple copies produced at ones
4. In pre-printed stationery, certain information – for instance, the name of a company –
has already been printed on the paper. T
5. his is usually the case with utility bills, which are printed with a high - volume single-
colored printed on forms that already have colored logos and other symbols printed on
them.
Advantages of printers:
1. Printed output can be viewed without the need for a computer.
2. Many people and organizations still use paper-based communications and similar
legacy methods.
Disadvantages of printers:
1. Printing is slow and expensive compared with electronic communications and storage.
2. Paper is bulky and deteriorates in storage.
3. Printed materials are more difficult to access and distribute. For example, printed
photographs can be viewed by a limited number of people compared with digital
photographs displayed on a TV screen, and it is more difficult and expensive to send
copies to others.
Multi-function printers: Printers are now being built in combination with scanners, and
sometimes with fax machines. Combining a printer with a scanner produces the effective
functionality of a photocopying machine, as well as providing the separate functions of
scanning and printing.
23
ICT summary by E.K.M
1. If part of the device develops a fault, all the functions may be unavailable.
2. Only one person at a time can use a multi-function device.
3. Plotter
A plotter draws lines on paper using differently colored pens. In a flatbed plotter, the paper is
held still while the pen moves. Other plotters have the pen moving from left to right, while the
paper goes forwards and backwards.
Yet others use wires to draw charged patterns on special paper, then fuse toner onto the
electrically charged patterns.
An upright plotter can handle long sheets of paper, because of the way the paper flows, and
can produce long continuous lines. Plotters are frequently used in computer-aided design.
Advantage of plotters:
Much larger and longer sheets are printed.
Disadvantage of plotters:
Printing is very slow
Plotters are usually more expensive than printers.
24
ICT summary by E.K.M
4. Data projector
A multimedia projector or data projector projects an image that would normally be displayed
on a computer screen onto a larger, separate screen. This allows the image on the screen to
be shared with an audience in a large room.
Multimedia projectors are almost always used when giving computer-based presentation.
Multimedia projectors are also used with home entertainment systems, enabling people to
watch TV and DVDs and to play computer games.
Interactive whiteboards are large touch sensitive panels used as screens for multimedia
projectors. They are operated as touch screens.
Some use capacitive or resistive technology but others use an optical curtain. Breaks in this
curtain are detected and so the computer knows which part of the interactive whiteboard
has been touched.
5. Speakers
Speakers are output unit of sound. This is sued to play music, to make telephone calls using
VoIP, to listen to voicemail, to play video and DVDs for entertainment or education and to
listen TV and radio.
Speakers are also needed for speech synthesis, where a computer reproduces human
speech. The voice need not be recording and could be computer – generated. For instance,
you can have text-reading program that takes a word-processed document in electronic form
and reads it aloud.
25
ICT summary by E.K.M
Advantages of speakers:
They allow computer systems to be used for a wide range of multimedia applications.
Interaction with a computer using voice recognition and speech synthesis is more natural and
intuitive than programming.’
Disadvantages of speakers:
Applications that use speakers can be difficult to operate for people who have impaired
hearing.
Voice recognition systems can be difficult to set up and use.
6. Control devices
In control applications, computers make events happen using control devices or actuators.
Examples of actuators are valves, heaters, coolers and motors. These can be powered by a
range of different sources of energy, including electricity and compressed air.
Actuators also include devices such as buzzers and alarms, which can warn us about various
events: a burglar has entered through the window etc.
26
ICT summary by E.K.M
If a user selects an ICT system for entertainment, he/she has to consider the following things:
BACKING STORAGE
Main Memory
Memory
Memory is a device used to store programs temporarily or permanently.
Main Memory
Any data or instructions that are to be processed by the CPU must be placed into main
memory (sometimes known as primary storage).
27
ICT summary by E.K.M
RAM
Random access memory can be written to, read from and edited. The data in it can be
accessed in any order. Ram is volatile memory, which means that it is cleared when the
computer is switched off.
ROM
Read only memory can also be accessed in random order, but the data in it cannot be
changed. ROM is intended for permanent data, necessary for the operation of the computer
system.
ROM is non-volatile, which means that it retains what is stored in it when the computer is turned
off.
Types of ROM:
1. Programmable read-only memory (PROM) has no data locked onto it when first
manufactured. But later, a company using PROM chips to make a computer can put in
its own information. The data would then be locked in place, so the memory can no
longer be changed.
2. Erasable programmable read-only memory gets its original data in the same way PROM
does. But, if necessary, the data can be erased using a special light shining on a window
on the chip or by electric charge.
28
ICT summary by E.K.M
RAM vs ROM
RAM ROM
Holds program being run and data being Stores data and programs permanently.
processed.
Volatile: it is cleared when the computer is Non-volatile: it retains what is stored when
switched off. the computer is turned off.
RAM microchips are supplied as a module ROM microchips are installed in the
plugged into the motherboard. motherboard.
Storage Devices
1. Hard disks
A hard disk drive (HDD) is a data storage device used for storing and retrieving digital
information using rapidly rotating disks (platters) coated with magnetic material.
On each individual disk, the data is stored in concentric tracks. For every track of data, there
are corresponding tracks above and below it.
The corresponding tracks form a cylinder. The number of cylinders is equal in number to the
tracks on each surface of the disk. For each surface there is a read/write head, set on the tip
of a small arm.
These heads move in step with each other, traversing in and out over the spinning disk. The
total storage space on a hard disk is given by the following formula:
number of readable sides x number of cylinders x sector per track x bytes per sector
RAID (Redundant Array of Inexpensive Drives): this storage device essentially carries multiple
copies of data, on different hard disk drives. If one falls, the data can still be recovered from
the others.
29
ICT summary by E.K.M
External Hard Disks: External hard disks are built in a separate case and are robust, small and
lightweight. They can be easily and safely carried around and can usually be connected to
any computer with a USB socket.
2. Optical discs
Compact disks (CDs): A typical CD stores around 700 MB of data on one side of the disc.
Access time is slower than a hard disk. A CD is a piece of plastic, about 4/100 of an inch or 1.2
mm thick. During manufacture, a pattern is etched onto the lower polycarbonate plastic layer.
This pattern is a single, continuous, extremely long spiral track of data. This lower layer is
covered with a thin, reflective aluminum layer. Then a thin acrylic layer is sprayed over the
aluminum to protect it. The CD’s label is then printed onto the acrylic. CD drive has a laser
beam in the read/write head, which can read the information on the disc.
Digital Versatile discs (DVDs): A digital versatile disc looks much the same as a CD. A single-
sided layer DVD can hold up to 4.7GB on one side. In contrast, a dual-layer DVD can carry
two layers of data on each of its two sides: this means it can hold up to 18 GB of video, audio
or other information.
1. CD-R and DVD-R allow data to be written to them on one occasion only: after this, the
data on them can only be read. This enable you to create your own music CDs and
record TV program on DVD, CD-R and DVD-R are useful for backing up the hard disk on
a computer, because once the data has been written it cannot be deleted or
changed.
2. CD-RW and DVD-RW can be written to repeatedly up to around 1000 times and can be
used for continuously backing up data or archiving. Data recorded on them can be
deleted or replaced by more up-to-date data.
30
ICT summary by E.K.M
3. DVD-RAM may be sealed inside a cartridge and can be rewritten more than 100000
times. Data written to DVD-RAM is expected to last at least 30 years. DVD-RAM drives
are used in video recorders, camcorders and computers.
4. HD DVD is an optical disk format for storing digital information, similar to DVD but with
sufficient capacity for high-definition video and movies. Its development was supported
by a group of manufacturers led by Toshiba. HD DVD was created to succeed DVD but
found competition in Blu-ray, which is a rival format. In 2008, HD DVD marketing and
development ceased.
3. Flash memory
Flash memory is a type of EPROM. The memory can be reset quickly and easily so that it can
be written to, read from and edited. It retains what has been stored without a power source.
A common use of Flash memory is for the basic input/ output system (BIOS) of your computer.
On every PC available, the BIOS makes sure the computer starts up as it should and that all
the parts of the computer work together.
31
ICT summary by E.K.M
SD Card
Memory cards are removable and are used in video games consoles, digital cameras, mobile
phones, PDAs and other portable devices. PCs often have card slots. Memory cards can store
up to 64 GB of data. There are many types of memory card, including Compact Flash (CF),
Secure Digital (SD), mini and micro-SD, xD Cards, Smart media and Multimedia cards.
Flash pen devices or memory sticks plug into the USB port on a computer. They are lightweight
and fit easily into your pocket s they are a convenient way of moving data from one computer
to another.
They have a storage capacity of up to 32GB. They are used by teachers and lecturers to store
presentations and other files, because they can be easily moved from one classroom to
another. They are robust and not easily damaged, and are a relatively inexpensive medium.
32
ICT summary by E.K.M
A magnetic tape is wrapped onto a reel and provides a large amount of surface area. This
abundance of surface means that a great quantity of information can be stored on a tape.
But tape storage offers only serial access.
So, if you want to access data at the middle of the tape you must start at the beginning, and
forward through the tape to reach the part you want. For this reason, accessing the data on
a tape can be very slow, and so magnetic tape is mostly used for backing up data not for
quick regular access.
NETWORKING
A computer network is simply a connection/communication between two or more computers
and other digital devices to enable sharing of information and other important resources e.g
printers’ scanner even online software.
Wired data transmission: This data communication uses restricted pathway like cables. The
common cables used here include:
1. Coaxial cable
2. Fiber Optic cable
3. Unshielded twisted pair cable.
4. Open pair cable
Wireless data transmission: This data communication uses Radio waves, microwaves infrared
and Bluetooth to communicate between digital devices within limited distances.
Common device that relies heavily on this technology include smartphones, Bluetooth
speakers, wireless printers, scanners and other devices.
33
ICT summary by E.K.M
Types of Networks
Local area networks (LANs):
A LAN consists of a collection of computers that can share peripherals, share information and
communicate with each other over a network. These are likely to be in the same room,
building, department, school or workplace.
Each computer that forms part of the network can function both as an independent personal
computer running its own software and as a workstation on the network accessing information
from the network server.
Advantages of LAN:
1. Software and data files can be shared by many users.
2. Users can work together on a single shared document.
3. Users can communicate using instant messaging.
4. Users can stream media.
5. Users can access the network from any computer or other device that can be attached
to the network.
6. It is usually cheaper to buy one copy of a software application and pay the license fee
for several computers, than to buy individual licenses for each computer.
7. Users can share hardware devices.
8. Users can share an Internet connection.
9. User’s access rights can be controlled centrally.
10. Computers attached to the network can be maintained either centrally or from any
network station.
Disadvantages of LAN:
1. Set-up of server and network cabling costs high.
2. Data can get corrupt easily.
3. There is a risk from viruses as they can spread easily between the computers.
34
ICT summary by E.K.M
Types of LAN:
1. On a client/server network, one or more computers are designated as the servers. Client
computers are those computers available for you to use. Clients communicate with
each other and externally through the server. The server will have a faster processor,
more RAM and a lot more backing storage space than the client computers. A large
LAN may have several servers to perform different tasks.
2. For instance, a file server may look after the organization of the files on the network,
while a print server coordinates printing on the network.
3. Each server will also have software that manages the services it provides: email and
Internet access, shared peripherals and the security of the system. Any computer that
gives a user access to any type of network, including a connection to a mainframe
computer, can be called a terminal.
4. A peer-to-peer network allows every computer to communicate directly with very other
computer in the network. A user can access data from any computer on the network.
They are used mainly in small business and departments.
Cabled LAN: In a cabled LAN, all the computers and other peripheral devices on the network
are attached o cables that are used to transmit data between them. A computer must be
connected to a cabled LAN using a network interface (NIC). The network cable is plugged
into the NIC.
Wireless LAN (WLAN): A wireless LAN differs from a cabled LAN in that computers can use
wireless link to connect to the network instead of being attached using a cable. The wireless
connection is made possible by three sets of components: wireless access points; wireless
network interface cards (NICs) and routers.
A wireless access point contains a radio receiver, encryption and communications software
so that it can broadcast and receive wireless communications.
It translates computer signals into wireless signals, so that it can broadcast to and receive
signals from wireless network interface cards (NICs) on the network. NICs equipped for wireless
communications have a fixed or detachable radio antenna instead of usual coaxial cable.
35
ICT summary by E.K.M
Routers enable several computers to communicate through a wireless access point at the
same time.
Hardware:
36
ICT summary by E.K.M
i.Modem: Modem is a device that connects one computer to another using a telephone line
so that data can be sent.
ii.Router: Routers enable several computers to communicate through a wireless access point at
the same time.
iii.Gateway: Gateway is a router that connect two computer networks with different protocols.
Software:
Email client: An email client is used to send email.
Web Browser:
A web browser is software that lets you access the
information available on the Web. Popular browsers
include Microsoft Internet Explorer and Mozilla
Firefox. All web browsers operate in a very similar
manner and have similar features.
Type of Connection:
i.Broadband: Broadband is usually available over telephone land lines or cable. This refers to
data transmission using ADSL and cable. ADSL is a means of transmitting digital signals using
telephone lines.
Coaxial cables, fibre optic cables, microwave links and communication satellites are
commonly used to provide broadband.
Microwave signals are very high-frequency radio signals that can be transmitted through
space. A communications satellite accepts signals beamed to it from a point on Earth and
then reflects the signals to another point.
Communication satellites can transmit data that includes text, voice, pictures and video.
37
ICT summary by E.K.M
ii.Dial-up: Dial up is when your computer dials up a phone number to connect you to your ISP
using telephone line. This is a legacy method used by individual home users to access the
Internet. Dial up connections are very slow but inexpensive if you do not access the Internet
very often.
iii.Wi-Fi: A Wi-Fi sends data wirelessly i.e. using radio waves instead of cables.
iv.VPN: A VPN is private network that runs within public networks. Conceptually it is similar to an
extranet but network traffic will be encrypted and Internet protocols such as TCP/IP might not
be used. It can be thought of as a separate ‘pipe’ inside the Internet. Network traffic inside
the pipe is inaccessible to those outside the pipe.
38
ICT summary by E.K.M
17. Describe and define particular topics in collaboration with other web users, using a wiki.
An online encyclopedia could be a wiki, and you would find articles about history,
science and many other topics that have been written by many different contributors.
18. Use social networking sites to communicate with a closed circle of friends who can see
the information about yourself that you upload.
Intranet
An intranet is a local version of the Internet within a company or organization. It offers many
of the same features as the global Internet, but in a localized environment such as a factory
site or an office.
Many companies make large volumes of information – such as notice boards, staff directories,
training manuals, company reports, job adverts and newsletters – available to their employees
on an intranet.
Authorized users within a company can use the company’s intranet to find information easily
and quickly. An intranet uses the same browsers,
TCP/IP and other software as used for the Internet. If a company has an intranet and allows
limited, secure access to it by people working off site, for example at home, the intranet is
referred to as an extranet.
SYSTEM SOFTWARE
39
ICT summary by E.K.M
APPLICATIONS SOFTWARE
Office productivity tools:
Office productivity software helps you work more efficiently when doing tasks in the office. This
includes:
1. Word processing
2. Desktop publishing
3. Spreadsheet
4. Presentation
5. Database
Web authoring:
Web authoring software is used to create a website. A website is a structured collection of
web pages that is accessible via the Internet.
Web pages usually include text and graphics and are written using HTML or software that
generates HTML.
Web authoring software like Adobe Dreamweaver gives you more control over the webpage
and may include facilities to manage your website.
40
ICT summary by E.K.M
Negative effects:
Areas of Increased Unemployment
Some jobs have been lost as a result of computers being used to do the same work that people
used to do.
Some examples of areas have suffered job losses:
Manufacturing
Many factories now have fully automated production lines. Instead of using people to build
things, computer-controlled robots are used.
Robots can run day and night, never needing a break, and don’t need to be paid! (Although
the robots cost a lot to purchase, in the long-term the factory saves money.)
Secretarial Work
Offices used to employee many secretaries to produce the documents required for the
business to run.
Now people have personal computers, they tend to type and print their own documents.
Accounting Clerks
Companies once had large departments full of people whose job it was to do calculations
(e.g., profit, loss, billing, etc.)
A personal computer running a spreadsheet can now do the same work.
41
ICT summary by E.K.M
Newspaper Printing
It used to take a team of highly skilled printers to typeset (layout) a newspaper page and to
then print thousands of newspapers.
The same task can now be performed far more quickly using computers with DTP software and
computer-controlled printing presses.
Legal issues relating to use/misuse of ICT and the constraints placed on individuals
Computer crime
Computer crime – that is, crime is only possible because of the widespread use of ICT systems
and networks – has increased in variety and extent.
Software piracy
Software piracy is the unauthorized copying using or selling of software without an appropriate
license. It includes copying CDs with software or music on them, and downloading software
or music without paying for it. These activities are effectively software theft.
Copyright violation
Using the Web you can download music, pictures, animated graphics, videos and books, as
well as software. The copyright to some of this material is restricted to its owners. T
hey may sell you the right to copy it, but if you copy it without permission this is effectively theft.
The profitability of the music industry has been badly affected by music being freely copied
and downloaded over the Web.
Hacking
Hacking means gaining unauthorized access to an ICT system, and an individual who does
this is referred to as a hacker. Many hackers break into ICT systems just for the challenge or as
a prank. This might seem harmless, but it can cause considerable damage and is illegal in
many countries.
The reasons why criminally minded hackers gain unauthorized access to ICT systems include:
1. To steal data – this may have a security classification or could be commercially sensitive.
2. To alter data or destroy data, by deletion or by installing a virus to destroy or corrupt it.
This may be done in order to disrupt legitimate commercial or governmental activities.
3. To steal money by transferring it from one account to another using EFT.
Identity theft
When you are connected to the Web, spyware may be installed on your computer without
your knowledge. This could send information about your computer to others who may have
malicious intent.
42
ICT summary by E.K.M
Phishing
A phishing attack is when you receive an unsolicited email inviting you to a response that
involves you entering your username, password and other personal details.
Fortunately, for the IGCSE ICT course, the directive can be reduced to 8 principles. Briefly, these
are:
1. A person must be told when their data is collected.
2. Data must only be used for the purpose given when it was collected.
3. Data must not be disclosed without the consent of the person concerned.
4. Data must be kept secure.
5. A person whose data is being collected must be told who is collecting it.
6. A person must be allowed to access their data and make corrections if it is not accurate
7. Data must not be transferred to another country that has weaker data protection laws
8. There must be a method by which people can check that data holders are complying
with the principles.
43
ICT summary by E.K.M
The health risks associated with intense and prolonged computer use are:
1. Repetitive strain injury (RSI) to the hands and arms. RSI is a painful condition that occurs
because of damage to tendons, nerves, muscles and soft body tissue, and can be
caused by the repetitive use of keyboard and a mouse. It can be avoided and its effect
reduced by taking regular breaks using a specially adapted ergonomic keyboard and
a wrist support.
2. Eye problems such as soreness, lack of focus and eye dryness can arise from staring at
a monitor all day. Potential problems can be avoided by taking regular breaks, having
regular eye examinations by an optician and using antistatic and other screen filters.
Monitors should be positioned to avoid light reflecting on the screen, and an interior
lighting should be shaded and directed to avoid reflections. Using a larger screen can
also help.
3. Backache and similar problems. These can arise through sitting in an inappropriate
posture for long periods of time. The solution is to use a purpose-designed operator’s
chair with adjustable height and backrest, and a footrest, and to take regular breaks.
4. Fatigue and headaches.
5. Trip hazards. These are associated with trailing cables and should be reduced by putting
cabling in trucking or where it is not likely to interfere with the user’s movement.
6. Electric shock. This can be minimized by the use of an RCD on the main power supply to
the computer. This is designed to turn off the power if the user receives an electric shock.
6. Make detailed contingency plans and disaster recovery arrangements so that ICT
systems continue operating with a minimum of disruption and recovery is swift. For
example, make arrangements with an organization with similar ICT facilities that is
located at a distance so that their ICT facilities can be used should your own be
destroyed.
Software safeguards
Software safeguards can protect data from theft or damage by hackers and other
unauthorized persons accessing the software to steal or damage it. For example:
1. Use of ICT systems and networks in restricted to those who have valid usernames and
passwords.
2. Access permissions that allow access to the data to the minimum number of people
who need it. Others are blocked from accessing the data.
3. File-level passwords that restrict access to individual files to those who have appropriate
access permissions and passwords.
4. Use a virus scanner to prevent viruses entering your system. The intention of some viruses
is to damage software recorded on the ICT system or steal it by copying it and emailing
it to unauthorized persons.
5. Use a firewall. This is a program or hardware device or combination of both that filters
the information coming through the Internet connection into a computer or network, to
prevent unauthorized users from gaining access. Some firewalls also block cookies, pop-
up adverts and spam. Popular firewall software packages are Black ICE Defender, Zone
Alarm, and Freedom.
6. Data encryption is used so that if data is access by unauthorized persons, it cannot be
understood. Encrypted data is scrambled during storage and transmission so that it
cannot be understood by someone without the encryption key to unscramble it.
Wireless networks can be encrypted using WEP (Wired Equivalent Privacy) and WPA (Wi-Fi
Protected Access)
• Establish transaction logs to automatically track alterations to ICT systems. Including the
identity of those who access data and all the changes made.
45
ICT summary by E.K.M
Typical features of a modern word processor include multiple font sets, spell checking,
grammar checking, a built-in thesaurus, automatic text correction, web integration, HTML
conversion, pre-formatted publication projects such as newsletters and to-do lists, and much
more. Examples include Microsoft word.
It is often referred to by its acronym, DBMS. The functions of a DBMS include concurrency,
security, backup and recovery, integrity and data descriptions. Example is like Microsoft
access.
46
ICT summary by E.K.M
The most popular features of Microsoft PowerPoint are as follows: Animations, designs, being
able to add images and videos, and also editing those images and videos. With PowerPoint,
you can use all the features available to make presentations that really stand out.
A file is the common storage unit in a computer, and all programs and data are "written" into
a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it
is filled.
Files typically have the following characteristics: A file always has a name. A file always takes
up storage space. A file is always saved in a certain format: a body of text is saved in one of
the many text file formats, a photo in one of the many image file formats, etc.
Thank you for taking time to read this book. I hope you now have a different understanding
of your computer subject. I suggest that you test your memory by getting some Pearson
computer past papers of your level. Try to answer these questions without having to open your
book again and again. See I told you, it is easy, you can do it!
47