Lesson 1 - ICT-Hardware - Software - Docx-Combined
Lesson 1 - ICT-Hardware - Software - Docx-Combined
ICT in Education
Disadvantages of Computers
1. Cybersecurity Risks – Susceptible to hacking, viruses, and data breaches.
2. Health Issues – Prolonged use can cause eye strain, back pain, and stress.
3. Unemployment – Automation can replace human jobs in some sectors.
4. High Costs – Advanced computers and software can be expensive.
5. Dependency – Over-reliance on computers can reduce critical thinking skills.
6. Privacy Concerns – Personal data can be misused or stolen.
7. Distraction – Social media and gaming can lead to decreased productivity.
o Hard Disk Drive (HDD) / Solid-State Drive (SSD) – Used for long-term
data storage.
o USB Flash Drive & Memory Card – Portable storage devices.
o CD/DVD/Blu-ray Discs – Optical storage media.
4. Output Devices
5. Peripheral Devices
2 Types of Software
1. Application Software
2. System Software
1. Application Software
A computer program that provides users with tools to accomplish a specific task.
2. System Software
it is designed to run a computer’s hardware and application software, and make the
computer system available for use. It serves as the interface between hardware,
application software, and the user.
Main types:
● Operating Systems (OS)
● Device Drive
● Utility Software
1. Operating System - A software that controls and coordinates the computer
hardware devices and runs other software and applications on a computer. It is the main
part of system software and a computer will not function without it.
Main functions of OS: booting the computer, managing system resources (CPU,
memory, storage devices, printer, etc.), managing files, handling input and output,
executing and providing services for application software, etc.
Examples: Microsoft Windows, Apple iOS, Android OS, macOS, Linux, etc.
Main purpose of device driver : it acts as a translator between the hardware device and
operating systems or applications that use it.
It instructs computer on how to communicate with the device by translating the
operating system’s instructions into a language that a device can understand in order to
perform the necessary task.
Examples: printer driver, display driver, USB driver, sound card driver, motherboard
driver, ROM driver, etc.
3.Utility Software - a type of system software that helps set up, analyze, configure,
strengthen, maintain a computer and performs a very specific task.
How it spreads
● Boot sector viruses can infect a computer when a user starts it
with an infected floppy disk.
● The virus can also infect other floppy disks when accessed on an
infected computer.
● Boot sector viruses can infect every disk accessed on an infected
system.
How to prevent
● Avoid downloading from unsecure sites and sources.
● Check if a site you're visiting is legitimate or not.
How to remove
● Boot sector viruses can usually be removed.
● If the virus cannot be removed due to encryption or excessive
damage to existing code, the hard drive may need reformatting to
eliminate the infection.
2. File Infector Virus – is a type of malware that infects executable files,
such as those with .exe or .com extensions. It can spread quickly across
networks and systems.
4. Polymorphic Virus – is a type of malware that can change its form to
avoid detection by security tools.
How it works
● Encrypts its code using a new key each time it changes form
● Modifies its physical file makeup
● Retains the same basic routines after each infection
Why it's dangerous
● Polymorphic viruses are one of the most dangerous forms of
malware
● Traditional cybersecurity defenses, like antivirus software, are
often unable to withstand a polymorphic virus attack
Additional information
● Polymorphic viruses are complex file infectors
● They are advanced cyber threats that constantly evolve their code
● They pose significant challenges to organizations
5. Worms – is a type of malware that can spread automatically through a
network. Worms can harm networks by overloading servers, stealing data,
and corrupting files.
● Code Red - A worm that targeted Microsoft IIS web servers and
defaced websites with the text "Hacked by Chinese"
6. Trojan Horse (Trojan) – is a type of malware that tricks users into
downloading and running malicious software.
Ransomware risks
● Ransomware can cause costly disruptions and loss of data
● It can be difficult to trace and prosecute the perpetrators because
they often use cryptocurrencies
● Even if the ransom is paid, there's no guarantee the victim will get
their files back
Given below are such signs which may help you identify computer
viruses:
● Proper hand tools help complete tasks faster and with more accuracy.
● Example: A magnetic screwdriver makes installing tiny screws easier.
✔ Prevents Damage to Hardware
● Dust and debris can accumulate on cooling fans, heat sinks, and vents,
restricting airflow and causing the computer to overheat. Overheating
can lead to performance issues and potential hardware failure.
✔ Improves Performance
● Dust can cause static electricity buildup, which can damage sensitive
electronic components like the motherboard, RAM, and processor.
Cleaning reduces the risk of static discharge that could harm the
system.
● When cooling fans are clogged with dust, they have to work harder,
making them louder. Cleaning the fans and vents helps keep the
system quieter during operation.
● Dirt and dust can interfere with connections on circuit boards and
cause short circuits, leading to unexpected crashes and hardware
malfunctions.
● Components like hard drives and cooling fans have moving parts that
can be affected by dust accumulation, causing them to wear out faster.
Keeping them clean helps ensure smooth operation.
● Clean components allow better air circulation inside the computer case,
keeping temperatures at optimal levels and preventing thermal
throttling.
● A buildup of dust and bacteria can create bad odors and contribute to
allergies or respiratory issues, especially in shared workspaces.
3. Diagnostic Tools
Diagnostic tools help identify and troubleshoot computer hardware
issues.
● Multimeter-Measures voltage, current, and resistance in circuits. Set
the correct range before testing to prevent damage to the multimeter.
● Power Supply Tester-Checks if the PSU is supplying the correct
voltage. Ensure the power supply is unplugged before connecting the
tester.
● POST Card (Power On Self-Test Card) - Diagnoses motherboard
and boot-up issues. Insert the card properly into the PCI slot before
powering on the system.
● Thermal Scanner- Detects overheating in computer components.
Point the scanner at components without direct contact for accurate
readings.
● Diagnostic tools help detect potential issues before they cause major
failures.
● Preventive maintenance extends the lifespan of computer components.
4 Software Tools
Software tools assist in diagnosing and optimizing computer
performance.
● Antivirus Software-Detects and removes malware affecting system
performance. Keep antivirus updated to ensure maximum protection.
● Disk Cleanup and Defragmentation Tools- Organizes and removes
unnecessary files to improve system speed. Schedule regular
cleanups to maintain performance.
● Hardware Monitoring Software-Monitors temperature, fan speed,
and system voltage levels. Check readings regularly to detect
potential hardware failures.
Importance of Software Tools and Their Proper Use
Software tools play a vital role in computer maintenance,
troubleshooting, productivity, and security. Using them properly ensures
system efficiency, data integrity, and overall performance. Here’s why they are
important:
✔ Enhances System Performance
● Diagnostic and repair tools detect and fix software and hardware
issues.
● Backup and recovery tools help prevent data loss due to system
crashes or accidental deletion.
5. ESD (Electrostatic Discharge) Tools
ESD tools prevent static electricity from damaging sensitive computer
components.
● ESD Wrist Strap - Worn on the wrist and connected to a grounded
surface. Prevents static buildup on the technician’s body.
● ESD Mat - Provides a grounded surface for working with computer
components. Place all components on the mat to prevent electrostatic
damage.
● ESD Bags (Anti-Static Bags) - Used for storing and transporting
electronic components. Prevents static buildup that can damage
sensitive parts.
● ESD Gloves - Used when handling delicate electronics to prevent
static transfer from hands.
Importance of ESD (Electrostatic Discharge) Tools
Electrostatic Discharge (ESD) tools are essential in computer hardware
servicing to protect sensitive electronic components from damage caused by
static electricity. Proper use of these tools ensures safe handling, extends
component lifespan, and prevents costly repairs.
● Static electricity can easily damage delicate computer parts like RAM,
motherboards, processors, and graphics cards.
● ESD tools help discharge static safely before handling these
components.
● ESD wrist straps and mats safely dissipate static, reducing the risk of
accidental electric shock when handling components.
✅
✅
Inspect tools before use to ensure they are in good condition.
Handle tools with care to avoid damaging delicate computer parts.
3. Physical Hazards
4. Fire Hazards
5. Chemical Hazards
● Do not touch the victim directly if they are in contact with electricity.
● Turn off the power source immediately, if safe to do so.
● Use a non-conductive object (like a wooden stick) to separate the
person from the electrical source.
● Check for breathing and heartbeat. If the person is unresponsive,
perform CPR if trained.
● Seek medical help immediately.
● For minor burns (from soldering irons or hot components), run cool
water over the affected area for at least 10 minutes.
● For severe burns, do not apply ice or ointments. Cover the burn with a
clean, dry cloth and seek medical help.
● If clothing catches fire, remember STOP, DROP, and ROLL to put it
out.
● If chemicals or dust enter the eyes, flush with clean water for at least
15 minutes.
● Avoid rubbing the eyes, as this may worsen irritation.
● Seek medical attention if the irritation persists.
1. Fully shut down and unplug the computer before you make any
attempts to disassemble the system unit.
2. Take off any metal objects on your arms or fingers such as bracelets,
rings or watches.
3. Make sure your hands are completely dry to avoid damaging any
mechanical parts as well as to avoid electrocution.
4. Hazards/risk in the workplace and their corresponding indicators are
identifies to minimize or eliminate risk to co workers, workplace and
environment.
5. Never plug an ATX power supply into AC power while adding and
connecting cards of motherboard.
6. Use an anti-static wrist strap or anti-static mat to remove any electro
static discharge.
7. Be careful when holding the motherboard, Its underside actually quite
pointy and able to hurt you.
8. Be careful no to drop any small parts (particularly screws) into
unreachable areas such as into the computer fan or disk drive.
9. Never spray cleaning liquids directly unto any part of your computer.
10. Personal protective equipment are correctly used.
11. The table should be clean and non-metallic short circuits.
12. Always wear rubber shoes or safety shoes when working on computer.
13. Do not force components into computer ports.
14. Store your removed components and peripherals on Anti-Static bag.
15. Never assume anything without checking it out for yourself.
● OHS practices help reduce risks of electrical shocks, burns, and cuts.
● Ensures proper handling of tools, wires, and computer components.
● Encourages the use of personal protective equipment (PPE), such
as anti-static wrist straps, gloves, and safety goggles.
Operating System
●CPU is not used efficiently. When the current process is doing IO, CPU is free
and could be utilized by other processes waiting.
● The other jobs will have to wait for an unknown time if any job fails.
● In batch operating system, average response time increases as all processes
are processed one by one.
Disadvantages of Time-Sharing OS
● Reliability problem.
● One must have to take care of the security and integrity of user programs and
data.
● Data communication problem.
● High Overhead: Time-sharing systems have a higher overhead than other
operating systems due to the need for scheduling, context switching, and
other overheads that come with supporting multiple users.
● Complexity: Time-sharing systems are complex and require advanced
software to manage multiple users simultaneously. This complexity increases
the chance of bugs and errors.
● Security Risks: With multiple users sharing resources, the risk of security
breaches increases. Time-sharing systems require careful management of
user access, authentication, and authorization to ensure the security of data
and software.
● IBM VM/CMS : IBM VM/CMS is a time-sharing operating system that was first
introduced in 1972. It is still in use today, providing a virtual machine
environment that allows multiple users to run their own instances of operating
systems and applications.
● TSO (Time Sharing Option) : TSO is a time-sharing operating system that
was first introduced in the 1960s by IBM for the IBM System/360 mainframe
computer. It allowed multiple users to access the same computer
simultaneously, running their own applications.
● Windows Terminal Services : Windows Terminal Services is a time-sharing
operating system that allows multiple users to access a Windows server
remotely. Users can run their own applications and access shared resources,
such as printers and network storage, in real-time.
Time-Sharing OS
Distributed OS
● Failure of one will not affect the other network communication, as all systems
are independent of each other.
● Electronic mail increases the data exchange speed.
● Since resources are being shared, computation is highly fast and durable.
● Load on host computer reduces.
● These systems are easily scalable as many systems can be easily added to
the network.
● Delay in data processing reduces.
Disadvantages of Distributed Operating System
● Hard Real-Time Systems: Hard Real-Time OSs are meant for applications
where time constraints are very strict and even the shortest possible delay is
not acceptable. These systems are built for saving life like automatic
parachutes or airbags which are required to be readily available in case of an
accident. Virtual memory is rarely found in these systems.
● Soft Real-Time Systems: These OSs are for applications where
time-constraint is less strict.
Advantages of RTOS
Disadvantages of RTOS
● Limited Tasks: Very few tasks run at the same time and their concentration is
very less on a few applications to avoid errors.
● Use heavy system resources: Sometimes the system resources are not so
good and they are expensive as well.
● Complex Algorithms: The algorithms are very complex and difficult for the
designer to write on.
● Device driver and interrupt signals: It needs specific device drivers and
interrupts signal to respond earliest to interrupts.
● Thread Priority: It is not good to set thread priority as these systems are very
less prone to switching tasks.
The evolution of operating systems (OS) has gone through several phases, from simple
batch processing to advanced AI-driven systems. Below is a historical overview of how
OS technology has developed over time.
● Early computers like the ENIAC and UNIVAC did not have an OS.
● Programmers manually input machine code using punch cards and switches.
● There was no user interface; computers executed only one program at a time.
● The rise of smartphones led to mobile OS like Android (2008) and iOS (2007).
● Cloud-based OS, such as Google Chrome OS, introduced the concept of web-based
computing.
● AI-driven OS improvements include predictive analytics, voice assistants, and
automation.
2. macOS
3. Linux
4. Android
5. iOS