Hexco-Computer Skills Notes
Hexco-Computer Skills Notes
SKILLS
CENTRE: DENMAK TRAINING SERVICES
MODULE CODE: 321/22/M05
ZNQF LEVEL: 4
DURATION: 150 HRS
i
Sources of Application Software ...................................................................................................... 18
Software Policy and Its Implications ............................................................................................... 20
Software Copyright and Software Licenses .................................................................................... 20
Application Packages ........................................................................................................................ 20
Navigating and Performing Basic Operations ................................................................................ 21
Installing Application Packages ....................................................................................................... 21
Definition of Computer Network ..................................................................................................... 22
Advantages and Disadvantages of Networking .............................................................................. 22
Types of Networks............................................................................................................................. 23
Types of Network Topologies ........................................................................................................... 23
Network Operating System (NOS) .................................................................................................. 26
Transmission Media.......................................................................................................................... 27
Structure of a coaxial cable .................................................................................................................. 28
Description of the Internet ............................................................................................................... 30
ii
UNIT 1
1.1 INTRODUCTION TO COMPUTERS
This unit covers
Definition of computer
Functions of computer
Difference between RAM and ROM
Evolution of computers from first generation to date
Description of the following types of computers:
Mini computers
Mainframe computers
Macro computers
Super computers
Description of the impact of computers in our everyday life
Definition of Computer
A computer is an electronic device that processes data, performing calculations and operations
according to a set of instructions called programs. It can store, retrieve, and manipulate data,
making it useful for a variety of tasks.
Functions of Computer
1
Basic Functions of a computer
2
Evolution of Computers from First Generation to Date
1. First Generation (1940-1956): Vacuum tubes; large, expensive machines (e.g., ENIAC).
2. Second Generation (1956-1963): Transistors replaced vacuum tubes; smaller, faster,
more reliable.
3. Third Generation (1964-1971): Integrated circuits (ICs) introduced; further
miniaturization and efficiency.
4. Fourth Generation (1971-Present): Microprocessors; personal computers became
common; advancements in software.
5. Fifth Generation (Present and Beyond): Based on artificial intelligence; quantum
computing and advanced parallel processing.
3
Description of Types of Computers
1. Personal Computers (PCs): Designed for individual use; includes desktops and laptops.
4
3. Mini-Computers: Mini computers, often referred to as "minicomputers," were a
significant development in the evolution of computing technology. They emerged in the
1960s and 1970s as a middle ground between mainframe computers and microcomputers.
Characteristics
Size: Smaller than mainframes but larger than personal computers. Typically, they
could fit into a single room.
Performance: Capable of handling multiple tasks and supporting several users
simultaneously, though less powerful than mainframes.
Architecture: Often featured a more decentralized architecture, enabling them to be
used in various applications without requiring massive resources.
4. Macro-Computers: The term "macro computer" is not widely recognized in the same
way as mainframe or mini computers. However, it can sometimes refer to powerful
computing systems that exceed the capabilities of traditional microcomputers but are
5
generally less powerful than mainframes. Here’s a breakdown of how macro computers
might be understood in the context of computing:
Characteristics
Size: Larger than typical personal computers but smaller than mainframes.
Performance: Designed to handle more complex tasks than standard
microcomputers, often offering better processing power and memory.
Architecture: May employ multi-core processors and advanced architectures to
optimize performance for specific applications.
6
UNIT 2
1.2 COMPUTER EQUIPMENT AND COMPUTER SYSTEM
ARCHITECTURE
This unit covers
Definition of computer systems architecture
Stating of the main functions of each of the under-listed internal components of a
computer system unit:
Motherboard (ROM, RAM, Processor, Chipsets, Expansion slots)
Power supply unit (AT & ATX)
Hard drive
CD/DVD-ROM drive
Distinguishing between internal and external data storage media used with computers.
Care and handling of computer equipment and components
State the necessary conditions for an ideal computer room environment
Computer systems architecture refers to the conceptual model that defines the structure,
behavior, and interaction of the various components within a computer system. It encompasses
both hardware and software components, detailing how they work together to perform tasks.
This architecture includes the design of the processor, memory hierarchy, data storage,
input/output systems, and communication protocols.
Motherboard
ROM (Read-Only Memory): Stores firmware, including the BIOS, which is essential
for booting the computer and performing hardware initialization.
RAM (Random Access Memory): Temporary storage that holds data and instructions
currently in use by the CPU, allowing for quick access and processing.
Processor (CPU): The central processing unit executes instructions from programs,
performs calculations, and manages data flow within the computer.
Chipsets: Control data flow between the CPU, RAM, and other peripherals. They
determine system performance and capabilities.
Expansion Slots: Allow additional cards (e.g., graphics cards, sound cards) to be added
to the motherboard, enhancing the computer's functionality.
7
Power Supply Unit (PSU)
AT (Advanced Technology): An older standard for power supplies, typically not used in
modern computers.
ATX (Advanced Technology eXtended): A more current standard that provides better
power management, supports newer hardware, and allows for various form factors.
Hard Drive
A permanent storage device that stores the operating system, applications, and user data.
It retains data even when the computer is powered off.
8
CD/DVD-ROM Drive
An optical drive that reads data from CDs and DVDs. It is used for software installation,
media playback, and data storage.
Internal Storage Media: These are built into the computer system, such as hard drives
(HDDs), solid-state drives (SSDs), and optical drives. They provide long-term data
storage and are typically faster than external options.
External Storage Media: These are separate devices that can be connected to the
computer via USB or other ports. Examples include external hard drives, USB flash
drives, and memory cards. They offer portability and additional storage capacity.
9
Care and Handling of Computer Equipment and Components
Keep Equipment Clean: Regularly dust and clean components to prevent overheating
and performance issues.
Avoid Liquid Exposure: Keep liquids away from computer equipment to prevent
damage.
Handle Components Carefully: Use anti-static wrist straps when touching internal
components to prevent static discharge damage.
Proper Ventilation: Ensure that systems are placed in well-ventilated areas to avoid
overheating.
Follow Manufacturer Guidelines: Adhere to instructions for installation and
maintenance provided by manufacturers.
10
UNIT 3
1.3 COMPUTER SECURITY
This unit covers
Definition of the following
Computer security
Data integrity
Description of the measures to ensure data security
Description of major threats to Information Systems/ Computers
Definition of computer crime/ fraud and describe the different types of computer
crime/ fraud
Describe the measures to compact computer crime
Describe a Disaster Recovery Plan (DRP)
Define computer virus and give examples
Describe the types of computer viruses
Describe how computers are infected by computer viruses
State and describe the types of anti-virus packages
Computer Security
Definition: Computer security refers to the protection of computer systems and information from
harm, theft, and unauthorized access. It encompasses tools and policies designed to safeguard
data integrity, confidentiality, and availability.
Data Integrity
Definition: Data integrity is the accuracy, consistency, and reliability of data over its lifecycle. It
ensures that data remains unaltered during storage, transfer, and processing, and is accurate and
trustworthy.
11
1. Malware: Malicious software, including viruses, worms, and Trojans, designed to harm
systems.
2. Phishing: Fraudulent attempts to obtain sensitive information by impersonating
trustworthy entities.
3. Denial of Service Attacks (DoS): Overloading systems to make them unavailable to
users.
4. Insider Threats: Employees or contractors misusing access to harm the organization.
5. Social Engineering: Manipulating individuals into divulging confidential information.
Computer Crime/Fraud
Definition: Computer crime or fraud refers to illegal activities conducted through computers or
networks, targeting systems or data.
Computer Virus
Definition: A computer virus is a type of malicious software that replicates itself by attaching to
other programs or files. It can cause harm to systems, corrupt files, and spread to other devices.
Examples:
ILOVEYOU Virus: A worm that spread via email, causing damage globally.
Melissa Virus: Targeted Microsoft Word documents and spread through email
attachments.
12
Types of Computer Viruses
1. File Infector Viruses: Attach to executable files and activate when the program runs.
2. Macro Viruses: Infect applications like Microsoft Word or Excel through macros.
3. Polymorphic Viruses: Change their code to avoid detection by antivirus software.
4. Boot Sector Viruses: Infect the master boot record to load before the operating system.
5. Web Scripting Viruses: Spread via web pages and exploit browser vulnerabilities.
Standalone Antivirus Software: This traditional type of antivirus tool focuses solely on
detecting and removing malware from your device.
Internet Security Suites: These packages offer additional features such as firewalls,
parental controls, and spam filters.
Cloud-based Antivirus Solutions: These solutions use cloud technology to detect and
remove malware.
Endpoint Protection Platforms: These packages are designed for businesses and offer
advanced security features such as data encryption and device management.
Mobile Antivirus Applications: These packages are designed specifically for mobile
devices.
13
UNIT 4
1.4 COMPUTER SOFTWARE
This unit covers
Definition of software
Explanation of the following types of software:
System software
Application software
Definition and explanation of operating system
State and explain the main differences between DOS and Windows operating system
Description of the following user interfaces:
Command Line Interface
Graphical User Interface
Perform basic DOS operations
Navigate a Windows User Interface
Describe the following:
Multiprogramming
Distributed systems
Real time systems
Online systems
Batch processing systems
Install an operating system
Definition of Software
Software refers to a set of instructions, data, or programs that enable a computer to perform
specific tasks. It is the non-tangible component of a computer system, contrasting with hardware,
which is the physical part.
Types of Software
System Software
Definition: System software is designed to manage the hardware components of a computer and
provide a platform for running application software.
Examples:
14
Utility Programs: Perform maintenance tasks, such as disk management and antivirus
scanning.
Application Software
Definition: Application software is designed to perform specific tasks or applications for users.
It relies on system software to function.
Examples:
Operating System (OS): An operating system is system software that acts as an intermediary
between users and computer hardware. It manages hardware resources, provides services for
application software, and enables user interaction.
Functions:
User Interfaces
Description: A Command Line Interface allows users to interact with a computer by typing
commands into a console or terminal. It requires knowledge of specific commands and syntax.
15
Advantages:
Disadvantages:
Description: A Graphical User Interface uses visual elements like windows, icons, and menus to
enable user interaction. Users can navigate using a mouse or touch gestures.
Advantages:
Disadvantages:
1. Listing Files: DIR – Displays a list of files and directories in the current directory.
2. Changing Directory: CD [directory_name] – Changes the current directory to the
specified one.
3. Creating a Directory: MD [directory_name] – Creates a new directory.
4. Deleting a File: DEL [file_name] – Deletes the specified file.
5. Copying Files: COPY [source] [destination] – Copies files from one location to
another.
Multiprogramming
16
Description: Multiprogramming is a method that allows multiple programs to run concurrently
on a single processor by managing them in memory, increasing CPU utilization.
Distributed Systems
Real-Time Systems
Description: Real-time systems are designed to process data and provide results within a
guaranteed time frame. They are used in applications where timing is critical, such as in
embedded systems.
Online Systems
Description: Online systems provide immediate access to data and services over the internet.
They are typically interactive and support real-time transactions, like online banking.
Steps:
1. Prepare Installation Media: Create a bootable USB drive or DVD with the OS
installation files.
2. Backup Data: Ensure all important data is backed up before installation.
3. Boot from Installation Media: Restart the computer and boot from the USB or DVD.
4. Follow Installation Prompts: Choose installation options, partitions, and settings as
prompted.
5. Install Drivers and Updates: After installation, install necessary drivers and system
updates for optimal performance.
17
UNIT 5
1.5 APPLICATION PACKAGES SOFTWARE
This unit covers
Definition and explanation of functions of an application software
Description of the following sources of application software giving advantages and
disadvantages
Customized/ in house software
Off the shelf software
Open-source software
Shareware
Freeware
Description of software policy and its implications
Description of software copyright and software licenses
State and describe the following application packages giving examples:
Word processing software
Spreadsheet software
Database software
Presentation software
Navigate and perform basic operations of the above listed application packages
Install application packages
Functions:
1. Productivity: Enhances efficiency in tasks like document creation, data analysis, and
presentations.
2. Communication: Facilitates communication through email, messaging, and
collaboration tools.
3. Data Management: Helps organize, analyze, and manage data effectively through
databases and spreadsheets.
4. Design and Creativity: Provides tools for graphic design, video editing, and other
creative tasks.
5. Entertainment: Offers games and multimedia experiences for leisure.
Off-the-Shelf Software
Open-Source Software
Description: Software with source code that can be freely used, modified, and distributed
by anyone.
Advantages:
o No licensing fees and potential for customization.
o Active community support and regular updates.
Disadvantages:
o Requires technical expertise to modify.
o Support may not be as reliable as commercial software.
Shareware
Freeware
19
Description: Software that is available for use at no cost, but may have restrictions on
modification and redistribution.
Advantages:
o Free to use with no costs involved.
o Often sufficient for basic needs.
Disadvantages:
o Limited features compared to paid versions.
o No guarantee of support or updates.
Software Policy: A software policy outlines the rules and guidelines for the use, management,
and licensing of software within an organization. It helps ensure compliance with legal
requirements and promotes responsible software usage.
Implications:
Legal Compliance: Reduces the risk of software piracy and copyright infringement.
Resource Management: Encourages efficient use of software resources.
Security: Protects the organization from vulnerabilities associated with unlicensed or
outdated software.
Software Copyright: Copyright protects the original works of authorship, including software. It
grants the creator exclusive rights to reproduce, distribute, and modify the software.
Software Licenses: A software license is a legal agreement between the software creator and the
user, specifying how the software can be used.
Types of Licenses:
1. Proprietary License: Restricts the user from modifying or distributing the software.
2. Open Source License: Allows users to modify and share the software under certain
conditions.
3. Freeware License: Allows free use but often restricts modification and redistribution.
Application Packages
Description: Software that allows users to create, edit, format, and print documents.
Examples: Microsoft Word, Google Docs.
Spreadsheet Software
20
Description: Software used for organizing, analyzing, and storing data in tabular form.
Examples: Microsoft Excel, Google Sheets.
Database Software
Presentation Software
Basic Operations: Create, save, open, format text, insert images, and print documents.
Spreadsheet Software
Basic Operations: Create spreadsheets, enter data, use formulas, create charts, and save
files.
Database Software
Basic Operations: Create tables, enter records, run queries, and generate reports.
Presentation Software
Basic Operations: Create slides, add text and images, apply transitions, and present
slides.
Steps:
1. Download or Insert Media: Obtain the installation files from a website or physical
media.
2. Run Installer: Double-click the installation file or insert the installation media.
3. Follow Installation Prompts: Select installation options, such as destination folder and
additional features.
4. Activate Software: Enter product keys or log in if required.
5. Complete Installation: Finish the installation and launch the application.
21
UNIT 6
1.6 COMPUTER NETWORKING
This unit covers
Definition of computer network
State the advantages and disadvantages of networking
Describe the following networks:
LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area network)
Describe the following types of network topologies:
Bus
Star
Ring
Mesh
Hybrid
Describe Network Operating System (NOS) and state its features
Describe the following transmission media
Guided/ wired
Twisted pair
Coaxial cable
Fibre optic
Unguided/ Wireless media
WIFI
Bluetooth
Infrared
Microwave
Describe the Internet and state advantages and disadvantages of the internet
Advantages
22
1. Resource Sharing: Allows multiple users to share hardware (printers, servers) and
software (applications, files).
2. Communication: Facilitates communication through email, messaging, and video
conferencing.
3. Centralized Data Management: Enables centralized data storage and management,
improving data integrity and security.
4. Cost Efficiency: Reduces costs by sharing resources and minimizing hardware needs.
5. Scalability: Networks can be easily expanded by adding new devices or users.
Disadvantages
Types of Networks
Description: A LAN connects computers and devices within a limited geographical area,
such as a home, school, or office building.
Characteristics: High data transfer rates, low latency, and typically uses Ethernet or Wi-
Fi.
Description: A MAN covers a larger geographical area than a LAN but is smaller than a
WAN, typically spanning a city or a large campus.
Characteristics: Higher data transfer rates than WANs, used to connect multiple LANs
within a metropolitan area.
Description: A WAN connects computers and devices over a large geographical area,
such as cities, states, or countries.
Characteristics: Lower data transfer rates compared to LANs, using leased
telecommunication lines or satellite links.
Bus Topology
23
Description: All devices are connected to a single central cable (the bus).
Advantages: Easy to install and requires less cable.
Disadvantages: A failure in the bus can bring down the entire network.
Star Topology
24
Description: All devices are connected to a central hub or switch.
Advantages: Easy to add or remove devices; a failure in one device does not affect
others.
Disadvantages: If the central hub fails, the entire network goes down.
Ring Topology
Description: Each device is connected to two other devices, forming a circular pathway
for data.
Advantages: Data travels in one direction, reducing the chances of packet collisions.
Disadvantages: A failure in any device or connection can disrupt the entire network.
Mesh Topology
25
Description: Every device is connected to multiple other devices, providing multiple
pathways for data.
Advantages: High redundancy and reliability; if one connection fails, data can take
another path.
Disadvantages: Expensive and complex to install and maintain.
Hybrid Topology
26
Definition: A Network Operating System is software that manages network resources and allows
multiple devices to communicate and share data.
Features:
Transmission Media
Guided/Wired Media
1. Twisted Pair:
27
o Advantages: Inexpensive and easy to install.
o Disadvantages: Limited distance and susceptible to electromagnetic interference.
2. Coaxial Cable:
o Description: Composed of a central wire surrounded by insulation and a metal
shield.
o Uses: Television distribution and broadband internet.
o Advantages: Better shielding against interference than twisted pair.
o Disadvantages: More expensive and bulkier than twisted pair.
28
3. Fibre Optic:
o Description: Uses glass or plastic fibers to transmit data as light signals.
o Uses: High-speed internet and long-distance telecommunications.
o Advantages: High bandwidth, long-distance transmission, and immunity to
electromagnetic interference.
o Disadvantages: More expensive and fragile than other types of cables.
29
Unguided/Wireless Media
1. WIFI:
o Description: Wireless technology that allows devices to connect to a network
using radio waves.
o Uses: Home and office networks.
o Advantages: Convenient and allows mobility.
o Disadvantages: Limited range and security vulnerabilities.
2. Bluetooth:
o Description: A short-range wireless technology for connecting devices.
o Uses: Connecting peripherals, such as headphones and keyboards.
o Advantages: Low power consumption and easy pairing.
o Disadvantages: Limited range (typically up to 100 meters).
3. Infrared:
o Description: Uses infrared radiation to transmit data.
o Uses: Remote controls and short-range data transmission between devices.
o Advantages: Simple and cost-effective for short distances.
o Disadvantages: Requires line of sight and limited range.
4. Microwave:
o Description: Uses microwave signals for long-distance communication.
o Uses: Satellite communications and point-to-point links.
o Advantages: High data rates and can cover long distances.
o Disadvantages: Affected by weather conditions and requires a clear line of sight.
Advantages:
Disadvantages:
30
31