Information and Communication Technology
Information and Communication Technology
Introduction to ICT
[email protected] Page 1
INTRODUCTION TO ICT
ICT stands for Information and Communication Technology can be defined as a set of
technological tools and resources used to communicate, create, disseminate, store
and manage information.
Or ICT are tools and techniques used to capture, store, manipulate, communicate and
use information.
Business / Finance
- Banking system where there is use of Electronic Fund Transfer (EFT) to clear bills,
loans, consignment by transfer from one bank account to another electronically.
- Enables advertisement through internet, televisions, radios etc.
- Payroll and financial modeling softwares have been developed.
- ICT has ensured that customers and suppliers share and access real time data
- Performing internet banking (On line banking) or access other financial services
through the internet.
- Online shopping (delivering of goods online)
- IT tools like computers have enabled business men to design new product labels
for their businesses and enterprises.
- Computers and other related devices have enabled businesses to store their
records for future use and references.
- Many people and companies use computers to help manage their finances,
some use finance software to balance, check books, pay bills, track personal
income and expenses, manage investments and evaluate financial plans.
- IT tools can be used to design, brand and packaging of commodities etc
Online Banking
- Online banking is when the user can access their account via the internet.
- With online banking users access account balances, pay bills, pay tuition etc
- E-transaction using mobile money services
[email protected] Page 2
Education
- Sometimes the delivery of education occurs at a place while the learning occurs
at other locations (distance learning).e.g. Students can take classes on web. More
than 70% of colleges in developed countries offer some type of distance learning
classes. A few even offer entire degrees online.
- Students use software to assist with learning or complete assignment.
- Through ICT there has been enhanced class room teaching through use of
presentations as well as projectors to deliver the information in a more convincing
way.
- Schools and Institutions use computers to typeset examinations and print them.
- Online registration and admissions: Most institutes and schools have opened up
websites which offer online registration and admissions without visiting the institute
physically.
- Research. Teachers and students use the internet to carry out research on various
topics.
- Online discussion (video-conferencing).etc
E- Commerce.
- E – Commerce is the general term used for companies trading online. It is a shorter
way of saying electronic trading.
The “E” is for Electronic and commerce means trading.
HEALTH
[email protected] Page 3
- They have chart rooms so you can talk to others diagnosed with similar conditions.
- Websites even allow you to order prescriptions online. An exciting development in
health care is telemedicine, which is a form of long distance health care.
- Through telemedicine, Health care professionals in separate locations have live
conferences on computers e.g. doctors at another location to discuss a bone X-
ray live images of each doctor along with the X-ray are displayed on each
doctor‟s computer.
Security
- Use of CCTV cameras to monitor supermarkets for shop lifters / thieves and to
monitor crucial buildings like banks, parliament e. t. c.
- Use of traffic camera to track traffic offenders.
- Use of biometric devices like finger print scan, iris scan to keep records of right
employees. iv. Mobile phones have tracking records used to track down rebels
and suspected criminal.
- Walkie talkies that are used in communication by armies and police.
- Surveillance cameras that help in capturing criminals.
- Computers are used by police and other security agents in storing databases for
criminals.
Home application
- Computers help in calculating home grocery bills.
- Computers can be used as Television sets those that have TV cards.
- Computers can act as radios at home since music can be heard from computers
by either inserting in a CD or MP3.
- You can access internet on a computer at home
- IT machines can be used for house chores like laundry, cooking, preserving foods
and drinks etc
Communication
- Making voice calls
- Exchanging text messages e.g. on whatsapp, Facebook, twitter, instgram
Art, leisure and entertainment
- One of the most compelling ways in which technology has affected our lives is in
the way we are entertained or we choose to entertain ourselves
- More and more families enjoy television, computers and electronic games in their
homes. Father may be watching television; mother may be teleshopping over the
Internet while the children are in their bedrooms playing arcade games.
- The internet can be used to book tickets for concert or visit to the cinema.
- Portable devices like phones are used for playback music and video files.
- Digital transmission is used to broadcast TV and radio programs. TV programs are
provided free to air or on a pay to view basis through satellite and cable services.
- Music download from the internet, the internet is used as a channel for the
distribution of music through music download website.
- Playing of games is an important leisure activity for many computer users.
[email protected] Page 4
Others areas include agriculture, transport, tourism, hotels, industry, etc.
Positive
- ICT has enabled efficient and instant communication through the use of TV,
radios and telephones with comprehensive news.
- Fast and easy way of getting friends through social networks like Face book,
twitter etc
- Use of mobile money to pay bills, fees, and convey money to our family
members without incurring costs
- Online Education where by people gets academic qualifications online.
- People can communicate any time and at any place with the introduction of
phones
- Information rich and easy access through the internet
- Establishment of ICT networks has led to more infrastructure development
e.g. more software applications have been introduced to the market.
- Investment in mechanical ICTs, contributes to labour productivity growth.
Workers are trained to use the machines thus increasing on the productivity
level.
- The effective use of ICT has helped firms gain market share at the cost of less
productive firms, which could raise overall productivity.
- The use of ICT has helped firms to be innovative, e.g. by helping them to
expand their product range, customize the services offered, or respond
better to clients.
- Computers have automated most aspects of banking, and bill paying and
automotive productions. Before computers each bill had to be typed in and
the person actually had to pull up a customer record from filing cabinets
and mark it paid which was very slow and expensive. Etc.
Negative
[email protected] Page 5
- Difficulty in accessing information since not all people have no access to
computers thus making it difficult to access information.
- High level of unemployment as a result of introduction of ICTs in most companies.
ICT replace human beings.
- Many ICTs electronic equipment sold in the market, are fake and do not last
long which is a loss to the buyer.
- With many ICT technologies on the market, it has become difficult to choose from
options.
- Most ICTs are not environmental friendly.
- Increased rate of forgeries and impersonation which has resulted into loss of
property and lives.
- Most ICT devices are source of health related problems like headache,
backache, eye strain etc
- ICT has become addictive which has resulted laziness and poor production in the
production sector
- Social isolation due to ICT as individual feels better off with his/her computer than
interacting with a fellow person. etc
2.1 Definition:
Computer is an electronic device that accepts data input, process, store and output
information.
[email protected] Page 6
- Mouse - for pointing or moving the pointer/cursor
- Monitor/screen (VDU-Visual Display unit) - for displaying information
- System unit - for data processing and housing the internal parts of the computer
Speed: In a computer, operations and processing are carried out at a very high speed. The
computer performs millions and billions of instructions per second. Its speed is measured in
Millions of instructions per second (MIPS)
Accuracy: Computers have the ability of processing data without making errors. They are error
free and rarely make mistakes. Computer errors are usually made by the users or operators
thereby a term GIGO (Garbage in Garbage Out) which means that when you feed data with
errors into the computer you receive output with errors from the computer. Or WYSIWYG (what
you see is what you get)
Storage: Computers can store large amounts of data before and after processing both
permanently or temporarily
Versatile: Computers are said to be versatile because they are used to perform a variety of
tasks such as creating documents, billing customers, storing records, performing calculations,
entertainment, etc. at a time.
Diligence: Computers are diligent machines because they can perform the same task over
and over again without getting tired and bored.
Automatic: This means that computers have the ability to work without human supervision.
Computers do not need any supervision in order to perform programmed routines. In other
words, they are automatic.
Artificial intelligence: This means that they can respond to commands or requests given to
them and provide solutions. I.e. it follows instructions of the user.
TYPES OF DATA
Direct data or Primary data: Originates from the source i.e. first hand data.
[email protected] Page 7
Indirect or secondary data: Data which comes in a more round a bout way. It is already
researched data e.g. textbook data, magazine data, newspapers, etc.
The process of turning data (meaningless) into information (meaningful) is called Data
processing.
It involves a series of input, process, storage, and output activities. These series of
activities are often called the information processing cycle.
[email protected] Page 8
Stages of Data Processing
The five basic stages of information processing are
1. Data Collection - capturing data from their sources and recording it
onto some media (e.g., paper).
2. Data Preparation - copying, grouping, or arranging data in a more
convenient way for input.
3. Input of Data -- entering the data or sending the stored data into the
processing system.
4. Data Processing - calculating or manipulating the input data and
even storing the results for future use.
5. Output of Information - giving out the processed results in a readable
form (e.g., a report).
There are many ways of processing information but the three basic ways
include:
Initial investment costs are not high. The tools used are cheap to
acquire.
Manual data processing methods are easy to apply since there are
no complications in carrying out tasks.
Skilled labour is not in high demand
[email protected] Page 9
There are no health risks associated with manual data processing
such as eyestrains and backaches.
The equipment used in manual data processing is portable that is
easy to move with.
Many people are employed to perform various tasks.
[email protected] Page 10
Computers can process large amounts of data and generate error-free
results, provided that the data is entered correctly.
Computers can store enormous amounts of data for future use.
The high reliability of components inside modern computers enables
computers to produce consistent results.
Efficiency and productivity can be raised.
Running cost becomes lower in the long term.
Tasks can be completed with little human intervention (i.e., automatic).
Overall, security can be raised due to less human intervention.
The management can observe new information and new trends more
quickly.
Customer services can be improved due to more efficient
management and operations.
Computers with communicating capability can share data and
information with other computers.
INFORMATION
This refers to processed data i.e. data that is already converted into a
more useful/meaningful form. Information should be the basis for decision
and policy making.
[email protected] Page 11
LEVELS OF INFORMATION
- Strategic information
- Tactical information
- Operation information
Types of information
Past information
Present information.
Future information
Strategic information
Tactical information
Operational information
[email protected] Page 12
The Second Generation (1959 – 1964)
The Third Generation (1964 – 1972)
The Fourth Generation (1972 – )
The Fifth Generation
[email protected] Page 13
They used integrated circuits (ICs) as their processors
They were speedy in processing data up to5 millions instruction per
seconds (MIPS)
Their storage memory was bigger up to (2MB of RAM and could be
expanded
They had the ability to perform several operations simultaneously
(Multi-tasking)
Computers became cheaper, and better in performance,
Small in size,
Low power consumption
They were programmed in simple languages (BASIC-Beginners all-
purpose symbolic instruction code)
They stored information on Magnetic devices called Metal Oxide
Semi-conductors (MOS)
There was introduction of Operating System s
Used keyboard and monitors (interface)
There was the introduction large scale integration (LSI) and Very
This was design by compressing more tiny circuit &transistors into
even smaller space.
There was the development and use of micro-processors and micro-
computers or PCs.
The price of computer reduced greatly.
They became increasingly smaller than the computers in other
generations
They consumed little power, some like laptops can operate on
rechargeable batteries
There was a development of graphical user interfaces LAN & WAN
which led to the development of internet
They are very fast in their operation
Software programs have been significantly improved and high level
languages are almost exclusively used.
They can connect to a color screen with improved graphics and thus
the development of GUI
[email protected] Page 14
Most of these computers have small in-built speakers for sound
They could link together to form network and thus development of
internet
They also sought the development of graphical user interface (GUI)
They used microprocessor which was integrated circuit with previous
generations.
Introduction of Portable Computers such as Laptops
Introduction of Networking Technology and Operating Systems.
Classification by size/capacity.
Classification by process/function.
Classification by purpose.
Classification by Processor Power
[email protected] Page 15
CLASSIFICATION BY SIZE
Under this classification, computers are classified depending on the
physical size and the amount of data/information that can be
held/stored. Some computers are very large while others are very small.
The categories under this classification include:
They are large in size and have the largest storage capacity.
They are expensive
They are powerful
They are faster when processing information 66 times faster than
the microcomputers
They are kept in air conditioned rooms
They are used in large scientific research centres and weather
forecasting centres
They use many applications compared to other computers.
Are used to carry out complex tasks like weather forecasting
Mainframe computers
[email protected] Page 16
These are large general purpose computers with a high
processing speed
They have an extended memory or storage space.
They have extensive input and output capabilities (capacities).
They can accommodate many users at a time (500-1000 users)
Supports many peripherals
Require air conditioned rooms
Requires experts to operate it
Supports very many software programs
Expensive
Consume a lot of power
Mini Computers:
A minicomputer is a medium sized computer larger than a
microcomputer and is used in situations where a microcomputer is not
powerful enough. It can handle hundreds of users connected at the same
time. Mini computers are sometimes referred to as mid-range servers.
Characteristics of minicomputers
Micro Computers
[email protected] Page 17
Microcomputers are the smallest computer systems basically found in
homes, offices, schools and small businesses. They are single-user
computers. They are also referred to as Personal Computers (PC).
Characteristics of microcomputers
Examples of Microcomputers
[email protected] Page 18
Personal Digital Assistants (PDA): PDAs are hand held devices designed for
individuals who move around and have built in communications
capabilities that allow the PDAs to use voice, fax, Internet, contact
address books, appointments, etc. E.g. smart phones, I pad, palmtops etc.
CLASSIFICATION BY FUNCTION/PROCESS
Under this classification, computers are classified according to how they
process and present data or how the computer is designed to operate
(function)
Digital computers
Analog computers
Hybrid computers
Digital computers
Digital computers are ones that process and present data in form of
discrete values. Discrete values include numbers like 1, 2, 3 … they don‟t
present decimals or fractions. Examples of digital computers include
pocket calculators, digital watches, laptops, desktops, smart phones, I
pads, anything/ device that is digital etc.
Analog computers
Analog computers are one that process and present data in form of
continuous measurable quantities/units. They usually measure the
quantities of nature like pressure, temperature, volume and weight.
[email protected] Page 19
Examples of Analog computers include thermometers, voltmeters,
speedometer, barometers, temperature guns etc.
Hybrid computers
These are computers which process and present data in form of discrete
values as well as continuous measurable quantities. They possess the
characteristics of Digital and Analog computers. All modern
microcomputers are hybrid.
CLASSIFICATION BY PURPOSE
Computers here are classified according to the work they are designed to
do.
80286 or 286
80386 or 386
80486 or 486
Pentium I (80586)
Pentium II or Pentium Pro
Pentium III
Pentium IV
Dual Core Processor
Intel
icore
The above processors are arranged according to the time of make and
strength. Every new processor made would gradually replace the existing
one until it would become extinct.
COMPUTER SYSTEM
Data
Human ware/user
[email protected] Page 21
Hardware
Software
DATA
HUMAN WARE/USER
COMPUTER HARDWARE
Examples;
Peripheral devices can fit into one of the four categories, that is, Input
devices, processing devices, Storage devices, Output devices, and
communication devices.
Input devices
Processing device (System unit)
Output devices
Storage devices
Communication devices
What is Input?
Input also refers to the data entered into the computer through the
keyboard, mouse, microphone and other devices.
[email protected] Page 23
Examples of input devices include
Keyboard,
mouse,
joystick,
scanner,
Digital cameras,
Touch screens.
Microphone etc
Track ball, etc
An example of data and the device that can be used is shown below:
Data Type Device type
Graphics --------------------------------------- Scanner
images/photos/pictures --------------------- Digital camera
sounds (Audio) ---------------------------------- Microphone
Video (Moving pictures) --------------------- Digital camera
Text -------------------------------------------------- Keyboard
Keyboard
[email protected] Page 24
Disadvantages of using a key board for data entry
Mouse
It is a hand held input device that moves the pointer on the screen or
selects objects such as icons. A mouse is also a most widely used pointing
device on personal computers.
The control unit (or brain) controls the entire operation of the processor
system during the execution of a program.
It controls the flow of data between the main memory and the
periphery devices.
The control unit determines the instruction to be executed.
It fetches the data from the main memory and puts it in the proper
order for the processor.
It also sends the processed results back to the main memory.
Extracts instructions from memory decodes and executes them
calling on ALU when necessary.
Fetches and sends commands to system devices and peripherals.
Additions.
Multiplication.
Division.
[email protected] Page 26
Subtraction
Performs all comparisons like equal to, Not equal to, Greater than,
Less than etc
REGISTER
It controls the flow of data between the main memory and the
periphery devices.
The control unit determines the instruction to be executed.
It fetches the data from the main memory and puts it in the proper
order for the processor.
It also sends the processed results back to the main memory.
Extracts instructions from memory decodes and executes them
calling on ALU when necessary.
Fetches and sends commands to system devices and peripherals.
COMPUTER STORAGE
[email protected] Page 27
i) Primary storage: This is storage that takes place in the computer‟s
memory, which is temporary. It is directly linked to the central
processing unit of a computer.
ii) Secondary storage: This is storage that takes place outside the
computer‟s memory, which is permanent.
PRIMARY STORAGE
It‟s called Random Access Memory because it allows the user to freely
read and write to it. RAM contents are held temporarily. This is because its
[email protected] Page 28
contents are lost once the computer or power is turned off. That‟s why we
say its volatile memory. It is therefore advisable to keep on saving your
work when using a computer.
TYPES OF RAM
Static RAM is very fast compared to DRAM and holds its contents as
long as there is power.
DRAM however; can hold its contents for only a short period of time
even when power is off.
The contents of DRAM can be maintained by refreshing the memory
chip several times per second.
SRAM is more expensive. It‟s used to make special types of memories
like buffers and cache memory.
SDRAM (Synchronous Dynamic Random Access Memory). This is a type
of memory that is synchronised with a system bus. It is the one of the
most types of PC RAM used today.
DDR-RAM (Double Date Rate Random Access Memory. This is a newer
type of memory. It is similar to regular SDRAM, except data can be
transferred on both positive and negative clock edges.
Conventional Memory. This is a kind of memory which is used by all Ms-
DOS (Microsoft Disk Operating System) based applications.
Upper Memory Area (UMA). This is part of RAM which is used by
computer hardware such as the monitor, keyboard. Unused parts of
UMA are called Upper Memory Blocks.
High Memory Area (HMA). This is type of memory that can be used by
MS DOS based applications to conserve conventional memory.
Extended Memory (XMS). This is the memory that requires an extended
memory manager like High Memory Manager.
Expanded Memory (EMS). This is an additional to conventional memory
used by some MS Dos based applications
CHARACTERISTICS OF RAM
[email protected] Page 29
RAM is a temporary storage.
Its contents are user defined i.e. the user opens the programs and
data to be held on RAM.
RAM size can be changed.
Can be increased.
The contents of RAM can be read and written to.
RAM is volatile. This means that it can easily lose its contents
RAM is used in large quantities by the computer
ROM chips store the start-up instructions when the computer is turned on.
Therefore it can be read as many times as possible but not written to or
erased from, hence the term Read-Only.
TYPES OF ROM
[email protected] Page 30
PROM-Programmable Read Only Memory: This is the type of memory that
can be only programmed once after it has been manufactured. Once
programmed, the instructions stored on it can never be altered
(changed). It is common with compact disk recordable (CD-R)
EPROM-Erasable Programmable Read Only Memory: This is a kind of
memory whose contents can only be erased once and then
programmed once exposed to ultra -violent (UV) light and then
reprogrammed for another use. Its common with compact disk re-writable
(CD-RW)
CHARACTERISTICS OF ROM
[email protected] Page 31
frequently accessed data. Cache memory make the computer
to be more powerful
- Virtual memory: This is the type of memory than supplements RAM
Measurement Equivalence
[email protected] Page 32
1 Terabyte 1024 gigabytes or 220 megabytes or
230kilobytes
Memory Card
Hard disks/fixed disks
Floppy disk/diskette
The compact disks (CD-ROM) or CD
Flash disks
Tapes
Zip drives
Punched cards.
CD-ROM drive: The CD-ROM drive is used with computer is to read the
information from the CD-ROM.
[email protected] Page 33
CD-Writer: A CD-writer or recorder (or simply CD-R drive) is used to write
data on
Don‟t fold it
Don‟t place a storage device near a magnetic field such as near
the radio, speakers etc
Do not expose it to direct sunlight for a long period.
Remove a diskette from its drive before turning off the computer.
Do not drop diskettes on the hard surface e.g. the floor.
Do not remove or insert it from its drive when the drive active light
is on.
Do not force it into the drive.
Keep them away from intensive heat.
Store them in boxes or case when not being used.
Don‟t expose the diskette to direct sunshine or heat.
Store the diskette in a cool dry dust-free environment.
Don‟t spill liquid onto the device.
Don‟t use any diskette which has had liquids spilled on it.
Use a soft pencil or felt-tip pen when writing on diskette labels, as
the pressure of a ballpoint may leave indentations on the
magnetic surface.
Don‟t touch the magnetic surface (the black plastic like plate) of
the disk, as your finger prints may hinder the drive in reading from
and writing to the disk
These are devices which bring out information from the computer to the
user. Or, devices which display information
Output is the result obtained from the computer after a processing task.
E.g. Text, Graphics, Images, Video (motion pictures), Sound (audio)
[email protected] Page 34
Examples of output devices: monitors, speaker, plotter, projector, printer
etc.
- Display devices
- Printing Devices
Display Devices:
THE MONITOR
A monitor also called a visual display unit (VDU) has a display surface
called a screen. It displays information from the computer in form of text,
video or pictures.
Types of monitors
Cathode Ray Tube Monitors (CRT): These monitors use a Cathode tube to
display text and graphics on the surface of the screen. The cathode tube
has electronic guns at the back of the tube that generates an electronic
beam towards the surface of the screen.
Advantages of CRTs
[email protected] Page 35
Advantages of LCDs
Printing Devices: these are output devices that produce hard copies
THE PRINTERS
Printers are output devices that produce a hard copy of text and
graphical images on a piece of paper as output. (Print information on a
paper any other physical medium)
CATEGORIES OF PRINTERS
Printers fall into two categories. These are based on whether the image is
produced by physical contact with the print media or not. The two
categories are:
Impact printers
Non-impact printers.
IMPACT PRINTERS
These are printers whose print heads physically come into contact with
the print medium/paper. This is the reason why they make noise and force
during printing.
[email protected] Page 36
Examples of Impact printers include:-
Character printers
Line printers
Dot matrix printers.
Daisy wheel printers
- Noisy
- Slow
- Use force
- Poor quality output (not clear)
- Use ribbon
- cheap
Disadvantages
They are noisy during operation. Because of the contact between print
heads and the print medium
They have a lower print resolution compared to other types of printers
The head usually overheats during long hours of printing which slows
down the process of production.
They are slower in printing compared to non–impact printers
Produce poor quality output
NON-IMPACT PRINTERS
These are printers whose print heads do not come into contact with the
[email protected] Page 37
print media/paper when printing.
Inkjet Printers
Desk Jet printers.
Bubble jet (Thermal inkjet) printers.
Thermal printers.
Laser printers.
- Quiet
- Faster
- Use a scanning technology
- Expensive
- Produce good quality output (clear)
- Use tonner
- Coloured output
They are nearly noiseless since they do not have any moving parts to
generate the noise. The paper is placed into the printer and
characters are formed as they get heated.
They consume very little power (almost a sixth) of other printers.
They are reliable because they do not experience inconveniences
with paper jams or blocked nozzles
They produce clear and crisp images with very high resolution.
Disadvantages
They cannot print on any paper because the heat generated will
not cause any discoloration without burning the entire paper.
The paper used has a limited shelf life. It can be affected by age,
sunlight, humidity and other chemical vapors which may cause it to
discolor completely there by causing the words to disappear.
The paper has to be specially prepared before they can be used in
printing, which creates delays.
Their print heads cannot be serviced or repaired, which makes them
[email protected] Page 38
expensive to maintain. The whole print head must be replaced
The printing speed is also so slow because the heads have to be
allowed time to cool before the next printing cycle.
They have a shorter life span than other printers. Their print heads
are expected to print a maximum of 10 million characters
accurately whereas other print heads like dot matrix printers go over
50 million characters in their life span.
COMMUNICATION DEVICES
a) Modems:
A modem is a communications device that converts analog signals
to digital signals and vice versa. The word modem is derived from a
combination of the words modulation and demodulation.
Another modem at the receiving end converts the analog signals back
into digital signals (i.e., demodulation) that can be understood by the
receiving computer.
[email protected] Page 39
A network interface card (NIC), or LAN adapter, is an expansion card
that enables a computer or device to connect to a network.
c) Hub:
A hub, also called a concentrator or Multi-station Access Unit (MAU) is a
device that provides a central connecting point for cables that run to
the server and each of the devices in a network. It allows devices such
as computers, printers and storage devices to be connected to the
server.
d) Gateway:
A gateway is a combination of hardware and software that allows
users on one network to access resources on a different type of
network. Gateways connect networks that use different protocols.
e) Bridges:
A bridge is a device that connects two LANs using the same protocol,
such as the Ethernet. Sometimes, it is more efficient and economical to
use a bridge to connect two separate LANs, instead of creating one
large LAN that combines the two separate LANs.
f) Routers
A router is an intelligent communications device that sends (routes)
communications traffic to the appropriate network using the fastest
available path. A router is used to connect several networks.
g) Switch
COMPUTER SOFTWARE
[email protected] Page 40
There are two categories of software; System software and Application
software.
SYSTEM SOFTWARE
OPERATING SYSTEM
b) Memory Management:
The purpose of memory management is to optimize the use of RAM.
The operating system has to allocate, or assign items to areas of
memory, called buffers, while they are being processed.
c) Administering Security:
Most multi-user operating systems require each user to log on. Both
successful and unsuccessful log on attempts are often recorded in a
[email protected] Page 41
file so the system administrator can review who is using or
attempting to use the computer
Memory management
[email protected] Page 42
Booting the computer
Providing the user interface
Processor management
File management
Managing the storage media
Administering security
Monitoring system performance
Device configuration
Scheduling computer jobs like printing
Error handling
Manage application programs
Manage computer hardware
This is where a user types a keyword or press special keys on the keyboard
to enter data and instruction in form of commands. The set of commands
a user uses to interact with the computer is called the command
language.
This is an operating system which allows the user to use menus and visual
images, icons, buttons and other graphical objects on the computer
desktop to feed commands, data or instructions to the computer.
[email protected] Page 43
It is a user interface which allows the user to give instructions/commands
and data (communicate with the computer) with help of visual menu on
the computer desktop (WIMP)
Disadvantages
Operating systems are grouped according to the way or where they are
used. The main categories include.
These are operating systems which are commonly used on PCs and
normally standalone PCs (not on network). They include:-
[email protected] Page 44
Windows Operating System: Windows Operating Systems are types
of Graphical User Interfaces (GUI). It is based on graphics instead of
text. It is characterized by the use of Mouse and drop-down menus.
Examples of Windows OS
- Windows 3.x
- Windows 95
- Windows 98
- Windows NT
- Windows 2000
- Windows ME
- Windows XP
- Windows 7,8,10
- Novell Netware
- Windows NT 4.0.
- Windows 3.11 (Windows for Workgroups)
- UNIX
- LINUX (Ubuntu)
PDA Operating System
These are operating systems, which are specifically designed for hand
held or very small computers. They are commonly pen driven or touch
sensitive. These PDAs usually come when they are already loaded with the
operating system. Examples include:
- Windows CE
- Palm Operating system
- EPO
- Pocket PC 2002
- Android
Other operating systems include those that are designed specifically for
[email protected] Page 45
specific computers by the manufacturers. Examples include:-
There are several other ways of categorizing operating systems and these
include:-
[email protected] Page 46
at the same time. The operating system through processor scheduling
allocates time and switches from one task to another so quickly that it
appears as if they are being executed simultaneously. Examples include
almost all windows operating systems including Windows NT/2000, UNIX,
Novell, Linux,
Multi-threading: Is when each process runs one or more thread when this
happens, it appears to the user as if the application is performing several
tasks at once. For example; Window 95, which performs a spell check as
you type.
[email protected] Page 47
- The computers specification for example memory capacity, processor
speed, hard disk capacity etc.
- The type of computer in terms of size and make. This would tell you to
buy either a PDA or Desktop Operating system
- The application software intended for the computer. This because
some applications cannot be supported by particular operating
systems
- User friendliness of the operating system
- The cost of the operating system
- Reliability and security provided by the operating system
- The number of processors and hardware it can support
- The number of users it can support
UTILITY PROGRAMS
PROGRAMMING LANGUAGES
These are called low level languages because they are closely related to
the computer processor. Thus these languages are easily understood by
the computer than the programmers.
[email protected] Page 49
Advantages of a machine language
- Programmers have to write programs using 0‟s and 1‟s which are
difficult to learn read and debug
- The whole is time consuming to coordinate and error prove
- It is not user friendly at all and it is designed for specific
microprocessors.
Assembly Language
Disadvantages
[email protected] Page 50
- The high level languages are user friendly and problem oriented rather
than machines based and have a wide vocabulary of valid words,
symbols and sentences.
- They make programming much easier since they shield programmers
from knowing all the codes.
Language processors
These are mainly used with high level languages to work backwards to the
processor e.g. they translate high level languages into low level
languages that the processor can understand.
APPLICATION SOFTWARE
Application software refers to programs that perform specific tasks for
users using a variety of application programs. These are programs which
are designed to help the user accomplish his specific tasks.
These are programs designed to solve a variety of tasks. These are pre-
written programs purchased off-the-shelf by the user. They solve problems
that are common in nature.
[email protected] Page 52
magazines etc.
Computer Aided Design (CAD) e.g. AutoCAD. This is used in technical
drawing
Graphic Software (Adobe Photoshop, Corel Draw ).Designing and
manipulating graphics
Communication software e.g. Browsers, internet explorer and e-mail
software, MS Outlook, MS exchange. Used in sending mails and
searching for data on the www
[email protected] Page 53
- The organization is purchasing a standard solution. A standard
solution may not be well suited to the organization‟s particular
needs.
- There is a high risk during implementation if the software fails to
work.
- Competitors may well use the same the same package,
removing any chance of using IS/IT for competitive advantage
User requirements: Does the package fit the user‟s requirements? I.e. The
user must be convinced of a product.
Up-to-date: How will the package be kept up to date (e.g. what if a fault
is discovered in the program by software manufacturer? In an accounting
package, what if the rate of VAT alters? Etc
The cost of the package: The firm should go for the package
corresponding to the funds available. It is however important to consider
the costs vs. benefits.
[email protected] Page 56
DATA COMMUNICATION, NETWORKS AND INTERNET
DATA COMMUNICATION
- Physical Transmission media. This use a wire, cable and other physical
materials to send communication signals.
- Wireless Transmission media. These send communications signals
through the air/space using radio, microwave and infrared signals
[email protected] Page 58
COMPUTER NETWORK
TYPES OF NETWORKS
A protocol is a set of rules and formats for sending and receiving data. Or
This is a large scale network that connects gazetted areas like a town or
city and, multiple corporate LANs together. MANs usually are not owned a
single organization.
[email protected] Page 59
A wide area network is two or more LANs connected together generally
across a wide geographical area. This covers a very large geographical
area like a continent or the whole world. It consists of many LANs.
This is the type of network model where every computer on the network
can work as a client and server computer. There is no central server and
specific client. Each user in this network can access resources from every
other computer especially those resources that are made available. Most
LANs always apply this model.
[email protected] Page 60
Characteristics of Peer to Peer network model
Client server: this is the network model whereby the network is made up of
client computers and server Clients or, users access resources that are
made available by the server. The central computer can be a file server,
network server, application server or just a server. Files and programs used
by more than one user often are stored on the server. A client server
[email protected] Page 61
network is one in which individual computers share the processing and
storage workload with the central server.
Disadvantages
[email protected] Page 62
Factors affecting transmission rate of a network
- Transfer Rate. This is the speed of transmitting data and in bits per
second (bps) kilobits per second (kbps) or megabits per second.
- Bandwidth is the amount of data sent by a network at a time.
- Network topology, since data flows in both directions in some
networks if data collides and has to be sent again, this causes the
network to slow down.
- Capacity of the hardware, hubs, switches and network interface
cards have their own maximum speed.
- The server-the amount of RAM and the speed of the hard disk
determines the speed of a network
- Location of software and files – storing software on the workstation
hard disk reduce network traffic ad speed up performance.
Switches: unlike the, a switch does not broadcast the data to all the
computers, it only sends data packets to the destined computer
[email protected] Page 63
Network software: The software can help us recognize some network
devices and some can help us locate information from the network
NETWORK TOPOLOGY
This refers to the physical and logical layout of the cables/computers and
devices on communication network.
- Bus topology
- Ring topology
- Star topology
- Mesh topology
- Wireless topology
Bus/linear topology
A type of network that consists of a single central cable that connects all
computers and other devices together called a backbone or Bus.
[email protected] Page 64
Disadvantages
Star Topology,
This is topology in which the central device e.g. hub is placed in the
centre of the network and all nodes are connected to the hub to
communicate through it.
[email protected] Page 65
Ring Topology
This is a network topology that connects nodes in circular chain, with each
node connected to the next. The last node connects to the first,
completing the ring.
[email protected] Page 66
Advantages of a mesh topology
Wireless Topology
Hybrid Networks:
These are a combination of Star, Ring and Bus networks. They include:
[email protected] Page 67
Advantages of computer Networks
- Peripherals devices can be shared e.g. printers
- Software programs can be shared easily
- Easy sharing of data.
- Facilitates communications because people can communicate
efficiently
- User access may be restricted. (data security)
- Provides data storage
- Provides Data backup. etc
[email protected] Page 68
This is a device which converts digital signals into analog signals and vice
versa and transmits signals over a telephone line. It is also called modular
demodulator.
A Router
This is a device which connects different networks together on switch with
different under a network.
3. Browser
This is a software application that allows you to view a world wide website
(WWW) OR This, is the software that allows you to view the information on
the web. E.g. Mozilla Firefox, Google crome, internet explorer etc
[email protected] Page 69
Types of internet connections
Band width: This is the amount of data that can be transmitted over a
network in a certain amount of time OR, It is the speed of accessibility and
sending of messages/ information over the internet.
A packet; this refers to any group of bits that includes data and
information
File Transfer Protocol (FTP): A method of moving files between two Internet
sites
[email protected] Page 70
INTERNET TERMINOLOGIES (TERMS USED)
Digital subscriber line (DSL): This is the type of technology where you do
not need to connect to ISP every time you want to use the internet.
World Wide Web (WWW)/Net: The World Wide Web (WWW) or simply the
web refers to the collection of information that is accessible on the
internet. Or, collection of web pages.
Web page: This is the document on the web that contains in formation in
form of HTML. It is the formatted text document that a web browser can
display.
Website: is one or more web pages that resides on a single website/ server
Web Browser: This is a software program that enables you to view and
interact with various resources on the web. Examples of widely used
browsers are; Microsoft internet explorer, Mozilla fire fox, Google chrome,
Netscape navigator, Safari, Opera, Konqueror, Lynx etc
Hypertext Transfer Protocol (HTTP): A set of rules for exchanging files (text,
graphic images, sound, and video) on the web.
Hyperlink: A text or image that causes the browser to load another page.
[email protected] Page 71
Hypertext: A text that contains links to other documents.
Surfing the net: means to go from one page to another on the Internet, browsing
for topics of interest e.g. face booking, watsapping etc.
Gopher: A technology that is used to make files available over the Internet.
E-mail or Electronic mail: is the transmission of messages via a computer
network.
It is the transmission of messages and files via a computer network. Or, the
exchange of electronic letters, data, and graphics on the Internet
It is unique name that consists of a user name and domain name that
identifies the user. e.g. [email protected]
[email protected] Page 72
- BCC: (Blind Carbon Copy) – Used to send a copy of an email
without the notice of the other recipients.
- Subject: An introduction to the message
- Attachments: a section to attach your file
- Draft : a section for unsent messages
- Sent: a section that stores all sent messages
-
Reduces paper costs and irritation.
-
Provides immediate delivery feedback.
-
They offer provision for attachments.
-
Secured by passwords.
-
E-mails can be conveniently sent to multiple recipients.
-
By providing a list of senders and subjects one can prioritize on
which messages to read first.
- Sending is cheaper.
- There is a possibility of multimedia mails where they can be
received as voice mails and read aloud.
- Can easily go across many time zones (continents).
- Emails can be sent across boarders
Disadvantages of electronic mails (e-mails)
WEBSITE
Uses/advantages of websites
[email protected] Page 73
- Using a website for communication is faster and cheaper than using
postal offices or radios
- Can help you to get some money due people who may bring their
adverts to be uploaded for public
- Provides room for goods display, buying and selling of our goods online
- Improves on sales or business promotion
- Can help you sensitize your clients about the use of some goods they
buy from your business and also keep on updating your customers
- It can help you win your competitor in one way or the other
- Can assist you when carrying out market research
- Improves your corporate image.
ADVANTAGES/USES OF THE INTERNET
[email protected] Page 74
It helps in travel arrangements. Internet allows you to book holidays,
hotels and flights from your home and you can check on the latest
travel news and confirm trains and ferry times before you set out.
COMPUTER VIRUSES
CLASSIFICATIONS/TYPES OF VIRUSES
File infector viruses: File infector viruses infect program files. These viruses
normally infect executable code, such as .com and .exe files.
Boot sector viruses: Boot sector viruses infect the system area of a disk--
that is, the boot record on hard disks. It affects the booting files and
causes failure in booting.
[email protected] Page 75
Master boot record viruses: normally save a legitimate copy of the master
boot record in a different location from boot sector viruses.
File viruses: These attach themselves to computer files. They usually delete
files or cause erratic behaviors in the file system.
Trojan horse: Trojan Horses are impostors i.e. files that claim to be
something desirable but, in fact, are malicious.
Failed virus: These are viruses that have failed to meet their goals.
Packagers: They hide the existence of a virus from virus guards by masking
some code around the actual harmful file.
Test viruses: Simply text files written to test some virus guards software. They
are not harmful but just designed for Test purposes.
SOURCES OF VIRUSES
SYMPTOMS OF VIRUSES
- Programs taking longer than usual to load.
- Unusual error messages occurring more frequently
- Less memory available than usual (reduced storage space)
- Programs and files disappearing mysteriously.
- Computer indicating that the storage devices are full.
- Annoying messages
- Computer files to start
- Machine becomes slow
- Loss of files
- Hard disc crash
- Creation of strange files
- Kaspersky
- AVG
- Norton
- MacAfee
- Avila
- Avast
- Smadav , etc
BUGS
[email protected] Page 78
PREVENTION OF BUGS
Bugs are a consequence of the human factors in the programming tasks
and sometimes poor handling.
The software industry has put much effort into finding methods for
preventing bugs in programming which include:-
[email protected] Page 79
use. E.g. supermarket checkout data. There are three activities involved in
an information system to produce the information that organizations need
to make decisions, control operations, analyze problems, visualize
complex subjects and create new products or services. These activities
are input, processing, and output.
- Input: the capture or collection of raw data from within the
organization or from its external environment for processing in an
organization.
- Processing: the conversion, manipulation and analysis of raw input
into a form that is more meaningful to humans.
- Output: The distribution of processed information to the people who
will use it or to the activities for which it will be used.
Information is data that has been shaped into a form that is meaningful
and useful to human beings.
The characteristics of good information are;
- Relevance
- Timeliness
- Accuracy
- Cost-Effectiveness
- Reliability (from the right source)
- Usability
- Exhaustiveness
- Aggregation Level.
[email protected] Page 80
Windows, and utility software anti-virus, Application software is used for
specific information processing needs.
Networks: allow computers to share data and services. Range from two
computers joined together to the biggest network (internet).
Database: is a collection of related files or tables containing data.
Procedures: are the set of instructions about how to combine hardware,
software, databases, and networks in order to process information and
generate the desired output.
People (users): those individuals who use the hardware
Expert Systems: The expert systems can make suggestions and act like
an expert in a field of an organization. An expert system has an
extensive knowledge base.
[email protected] Page 82
Enterprise Resource Planning (ERP): Enterprise Resource Planning (ERP)
system is business process management software that allows an
organization to use a system of integrated programs capable of
managing a company‟s vital business operations for an entire multi-site,
global organization.
[email protected] Page 83
- Denial-of-Service Attack: A Denial-of-Service attack (DoS) is a
cyber-attack on the availability of services and resources on the
victim's computer. The attacker dispatches floods of data packets
to the victim's computer. This floods the victim's computer and
engages all the resources, hence making them inaccessible.
- Identity theft: Identity theft is the stealing of another person‟s
personal data for the financial purpose to frame him/her for a crime.
- Social Engineering: the perpetrator uses social skills to trick or
manipulate legitimate employees into providing confidential
information.
- Cyber terrorism: Attack via the internet using a target‟s computer
systems to cause physical, real-world harm and interrupting the flow
of information.
- Phishing involves getting a user to enter personal information via a
fake website.
- Pharming involves modifying DNS entries, which causes users to be
directed to the wrong website when they visit a certain Web
address.
Manual databases
Electronic databases.
[email protected] Page 85
Advantages of electronic databases over manual
- Difficult to develop
- Expensive to manage.
- Require highly-trained expertise for maximum management.
- Data security may not be ensured in case of data sharing.
- Data can be pirated or corrupted by unscrupulous data
managers.
Functions of Electronic Databases
[email protected] Page 86
Enables easy data sorting
Eases data update and modification of existing records
Enables easy making data summary
- Sort data
- Create reports
- Create forms
- Organize queries
- Make tables etc.
[email protected] Page 87
- Centralization of security
- Reduction of costs
- Convenience
- Efficiency
- Accuracy
- Data backup
- Confidentiality
- Data consistence
- Easy administration
- Difficult to develop
- Expensive to manage.
- Require highly-trained expertise for maximum management.
- Data security may not be ensured in case of data sharing.
- Data can be pirated or corrupted by unscrupulous data
managers.
Database Components/Features
Most DBMS software contain four major features that a typical database
must consist of: Tables (files), Queries, Reports, Forums.
Forms: These (forms) enable one to enter and display (view) records from
the database tables easily.
Queries: These are tools used to manipulate data in the data tables.
Queries are used to carryout several tasks on the data in database tables.
Primary key:
[email protected] Page 88
[email protected] Page 89