introduction to ICT module
introduction to ICT module
Information Technology
Definition – It is an organized combination and use of hardware, software,
telecommunications, database management and other information processing
technologies used in a computer-based information system.
Computer
It is a device that has ability to accept data, internally store and execute a
program of instructions, perform mathematical, logical and manipulative
operations on the data and reports on the results.
Put simply, it is a machine that accepts data (input) and processes it into useful
information (output).
Computer System
It is an interrelated system of input, processing, output, storage and control
components
Thus a computer system consists input and output devices, primary and storage
devices, the central processing unit, the control unit within the CPU and other
peripherals
Processor
CONTROL UNIT
Interprets stored
instructions in
sequence. Issues
commands to all
elements of the
computer
ARITHMETI
C & LOGIC
UNIT
Performs
Arithmetic &
logic
functions
INPUT OUTPUT
Data and Information
instructions -the results of
processing
MAIN MEMORY
(MAIN
AUXILLARY)
Holds data,
instructions and
results of
processing
AUXILLARY STORAGE
(BACKING/SECONDARY STORAGE)
To supplement main memory
Command/Signal flow
These facilitate communication between the user and the computer. They facilitate
the insertion of data into the computer for processing.
(a) Keyboard
A keyboard is laid out like a typewriter
It allows data to be typed in by the pressing of the relevant keys
The pressed key or instruction is displayed or executed
This is the most commonly used input device
(Study Key-to-disk systems, Key-to-diskette systems –Refer to Clifton)
(b) Mouse
It is a hand held pointing device electronically connected to the
computer which is used to control the cursor or a pointer on the
screen through the rolling motion of a ball on a flat surface.
The cursor or pointer on the video screen moves in the same
direction as the movement of the mouse.
When the pointer is on the required menu item (icon) a button is
clicked to select that item.
(c) Light Pen
It is a pen-shaped device that uses photoelectric circuitry to enter
data into the computer through a special video screen
A user can write on the video display
The high sensitive pen enables the computer to calculate the
coordinates of the points on the screen touched by the light pen
The handwriting or graphic is digitalized, accepted as input and
displayed on the VDU
Input therefore is directly onto the screen
(d) Touch Screens
Use an inlaid screen to accept input through the act of physically
touching the screen
The computer senses the selected position and execute the
instruction accordingly
This device works more suitably with menu driven applications
OUTPUT DEVICES
There are two forms of output devices, those that produce hardcopy (permanent)
and those that produce softcopy.
Printers are hardcopy devices while the VDU is a softcopy device.
Hardcopies are needed when copies are to be taken away from the computer to be
sent to a user of the information thereon, or to be filed away or even as legal
documentation.
Types of Printers
The following is an illustration showing the types of printers and their sub types and
examples of these.
Computer Printers
Impact Non-Impact
These produce a complete line of text in a single printing operation. These are
suitable for bulk printing.
i. Drum Printers.
They employ columns of complete characters embossed around the
circumference of a rapidly rotating drum.
Every print position is capable of being occupied by any character
A print hammer situated at each print position forces the paper against the
drum through the ribbon (interposed between the paper and the ribbon)
when the appropriate character is in position.
These are expensive to buy and maintain
The print quality is poor (especially if there are mistiming of print hammers)
They do not allow for change of fonts.
They are also very noisy
These are also known as serial printers. These print one character at a time across.
The method of printing necessitates one (or two) print head(s).
There are two categories of character printers: impact and non-impact printers.
Impact printers – they form characters and graphics on the paper by pressing a
printing element (such as print wheel or cylinder) and an inked ribbon against paper
Non-impact printers - do not use force and are quieter than impact printers. They
use specially treated paper and can form characters by laser, thermal (heat) or
electrochemical processes. They produce higher quality of print than impact
printers. They, however, cannot produce multiple copies.
(i) Dot Matrix – it consists of a matrix tiny tubes containing needles in the print
head. Each character in formed from the square or rectangle array of dots.
The needles are fired onto the printer ribbon in a pattern corresponding to
the shape of the character required. Each character is printed by the
repeated horizontal movement of the print head. The quality of the print
depends on the dots in the matrix (most common are the 7 rows by 9 columns
matrices). These printers are cheap to purchase and maintain but do not
produce good print quality.
They can print an infinite number of fonts and can even mix different fonts in
the same line. They can produce high quality print, and can be used to print
logos, illustrations and graphics. They are very quiet during printing.
However, they are very expensive to purchase and maintain.
Some computers are capable of producing speech. The computer can actually speak
out from a stored digital representation of either words or other sounds. A person's
voice can be stored and reproduced later.
These method of output is of great use to the blind, or in poor light. Advanced forms
of speech output are being used to answer telephones, answer some inquiries from
an organization's callers etc.
COM is most suitable where large amounts of data are processed but are to be used
much later e.g. in a government registry department (birth registrations, important
national statistics for example population censuses.
Graph Plotters
These are used to plot graphs, maps and other forms of graphic onto a medium
usually larger than the size of a normal paper. They can print in different colours.
It is the unit of the computer system that includes the circuits that control the
interpretation and execution of instructions. It is the most important component of a
computer system.
Functions of the processor
To control the use of the memory to store data and instructions
To control the sequence of operations
To give instructions to all parts of the computer to carry out processing
The CPU can be subdivided into two major subunits; the control unit (CU) and the
arithmetic logic unit (ALU). The primary (main) memory is an extension of the CPU
and assists the CPU in its operations.
Operational features
The memory has uniquely addressable storage locations that are easily
accessible to the CU.
Random Access - it is possible to fetch data from the locations in main
storage in any order and time taken to access the location does not depend
on the position of the location.
Volatility - the main memory can be volatile or non-volatile depending on the
its physical characteristics
Details of single location - Each location consists of tiny devices that can take
two states (on/off). The two states of each device are used to represent
binary (0 - off, 1 - on). Each location in the main memory holds a unit of data
called a word. Some computers had locations holding 8 binary digits and
were therefore said to have an 8-bit word. Other computers have 16 bit
storage locations, while others tend to have 32 bit locations.
The Random Access Memory (RAM)
This forms the largest part of the Main Memory and is often used to measure the
power of a computer. It is used for temporary storage of data and programs during
processing. RAM contains user data and application programs being processed.
Data may be read from RAM and data can also be written onto and stored on RAM.
RAM contents are volatile i.e. stored data is lost and the contents disappear if the
power is interrupted or when computer is switched off.
Storage capacity on RAM
The number of storage locations in RAM dictates the storage capacity or size of the
computer. Storage on computer is quoted in kilobytes (Kb) or megabytes (Mb)
8 bits = 1 byte
1024 bytes = 1 kilobyte
1024 X 1024 bytes = 1 megabyte
1024 X 1024 X 1024 bytes = 1 gigabyte
Floppy Disk Drive - These work in conjunction with floppy or magnetic diskettes.
They have a narrow slot where the diskette is inserted. The slot has a push button or
lever which must be closed when the diskette has been inserted. The process of
closing engages a turn table which rotates the disk and so brings the read/write
head into contact with the disk.
Magnetic Tape
This is similar to the kind found for audio or video tapes
It is a film coated with iron oxide
Portions of the tape are magnetized to represent bits
It uses separate read write heads to transfer data from the tape to the main
memory and to record.
Vacuum columns in the unit absorb the force of sudden starts and stops to
prevent tape snatches.
They store data in a sequence so data has to be moved over sequentially in
order to read the required, this means access is slower.
Read/Write heads
Read/Write Heads
Disks
Comp-type Access Assembly
Access Arms
A USB flash drive may also be known as a flash drive or USB drive.
Based on the Universal Serial Bus mass storage standard, USB flash drives
are supported by all operating systems and BIOS. Compared to optical disk
drives and floppy disks, USB flash drives can store more data and also
transfer it at a faster rate.
Standard USB plug. This provides connects the flash drive to a device.
USB mass storage controller. This is a microcontroller for the USB. It
has a small amount of RAM and ROM.
NAND flash memory chip. The data is stored in the this component
Crystal oscillator. The data output is controlled by this component.
COMPUTER SYSTEMS
Microcomputers
They are also called Personal Computers (PCs) or Desktop Computers.
These are relatively small and inexpensive.
They consist of a single processor or a chip
The system is normally made up of the microprocessor, keyboard, VDU one
or two floppy disk drives, a printer and a hard disk drive.
It has a hard disk capacity of 20Mb to 520Mb
May use a colour or monochrome cathode ray tube (CRT)
Have capabilities for networking.
They are single user.
They occupy little space.
They are capable of multiprogramming.
They are compatible with a wide range of software.
PCs come in a variety of sizes: notebooks (handheld), laptops, desktops and
floor standing.
Hardware features
- Support magnetic tape storage
- They are multi-user more than 100 users at time for super minis
- Have multiple hard disks, both fixed and exchangeable
- Can be upgraded when necessary
- They do not require a special environment to work so can allow for
decentralisation.
- They are less expensive than the mainframe systems
Mainframe computers
These are large, powerful computers with a lot of processing capabilities.
They are suitable for medium-size to large corporations.
They can also be linked together to form a powerful and flexible system.
Hardware Features
- Similar to minicomputers but have several large processors and high
processing speeds of up to 200 million instructions per second (mips)
- They have massive amounts of storage power.
- They can use high speed line printers
- They have a large number of magnetic disks and tape units with large
capabilities
- They are multi-user and multi processing
- They have improved reliability
- Their performance may be enhanced by slotting a smaller system, like a
minicomputer between the terminal and the main processor - the front
end processor (FEP)
- Both processors run concurrently with the FEP passing on partially
processed data to the main frame for further processing.
- They, however, are expensive to buy and maintain, they need special and
very expensive software and they also require a special environment.
- They can be used for large corporations (such as large international
banks) and government departments
Supercomputer Systems
These are extremely powerful mainframe computer systems. They are specifically
designed for high-speed numeric calculations. These an process hundreds of
millions instructions per second (mips)
Word size - the number of bits dealt with at the same time, some processors are 8
bit, others even 32 bit. The larger the word size the more powerful a computer
system is. So some physically bigger systems may have smaller word sizes and
hence less power.
Speed of the microprocessor - it is the clock rate or rate of data transfer, it is the
rate at which data bits are moved around inside at bits per second (megahertz) this
is also called the baud rate. Systems with higher speeds tend to be more powerful
though they tend to be physically small.
6. Lap - top - it is a small computer with a flat screen that a user can place on
his lap. It is portable and has an in-built rechargeable battery that can
support it when there is no power from the mains. It can be carried in a
briefcase.
SOFTWARE
Software refers to computer programs that control the workings of the computer
hardware, along with the program documentation used to explain the programs to
the user.
Systems Software
Application Software
Development Software
SYSTEMS SOFTWARE
(d) File Management – The file management programs in the operating system
control the creation, deletion and access of data and programs. The
programs also keep track of the physical location of files on secondary
storage units. They maintain directories of information about the location
characteristics of files stored on a computer system’ s secondary storage
devices.
Windows
A widows based operating system is more advanced than the MS-DOS based
operating system.
It features graphical user interfaces (GUIs) – User can feed commands into the
computer through the selection of relevant icons, bars, buttons, boxes or other
forms of images (mostly resembling the intended device or operation).
True multitasking – the operating system allows for numerous tasks to be done
at the same time.
Networking – the operating system is multi-usable – many users can use it at the
same time. It is capable of holding a number of computer systems networked
together.
Multimedia Presentations- the operating system allows for the presentation of
information in a variety of media including text, graphic displays, voice and
other audio, photographs and video.
Virtual Memory – It allows for the use of storage devices as extension of the
main memory thus giving the appearance of a larger main memory than actually
exists.
Deleted file go to recycle bin
Makes use of easier input methods e.g. mouse, joystick
Windows operating systems has MS-DOS option
Examples of Windows Operating Systems packages, Windows NT (new
technology) (1993) and Windows 95.
In computer terms, a window is one section of a computer’s multiple section
display screen that can have a different display.
OS/2
UNIX
It was originally developed by AT&T but now being offered by many other
vendors.
It is a multitasking, multi-user and net-work managing operating system
Because of its portability, it can be used on mainframes, midrange computers
and microcomputers.
It is a popular choice for network servers.
Language translators
Utility programs
Control programs
Communication programs
Interpreter
Compiler
Utility programs
Control programs
These are designed to manage the general functions of the processor, memory and
terminal interface. The programs are arranged in a hierarchy at the top of which is
a kernel or executive program that controls the running of the other programs. In
microcomputers the supervisor is held in ROM while on larger computer systems it
is held on backing store. When the computer is switched on the supervisor is loaded
into main memory, the other programs are kept on disk and are transferred to main
memory when they are needed.
The job scheduler selects, initiates, terminates, queues and sequences the jobs
that demand the use of the processor and main memory.
The file manager has the responsibility of achieving the interleaving effect of
Multiprogramming.
The Input/Output manager has the responsibility of managing the interface with
terminals and backing store in response to the requirements of any applications
program being executed.
Communications Programs
This refers to a system for extending the capacity of main memory for running large
application or utility programs. The operating system separates programs into
sections some of which are put into backing store. The locations of these sections
(addresses) and the part of the program being executed are held in main memory;
the sections are called in and processed
When required and then returned to backing storage. The sections of the programs
are called pages and are said to page in from backing store and page out when
being replaced by other pages. The execution of virtual storage is therefore called
paging.
APPLICATION SOFTWARE
Applications are programs designed to help the user carry out specific tasks for
example to manipulate figures or write texts.
Word Processing
Spreadsheets
Databases
- A database is an organised store of information, for example an address book,
list of employees, list of students, customers or items of assets.
- A database package is used to store records.
- Data can be sorted, filtered for separate viewing.
- Calculations and comparisons between data items can be done.
- Popular database packages are: Microsoft Excel, lotus Approach, Paradox, dBase
IV, Data Ease.
Graphics
- These are applications designed solely for designing graphs and text
charts/posters.
- They are often used to produce slides for use on overhead projectors, or
presentations on computer-projectors.
- Various types of charts are also produced
- Examples of graphics packages are: Microsoft PowerPoint, Lotus Freelance,
Harvard Graphics, Corel Draw
Desktop Publishing
Suites
- Many applications are grouped together into suites which users can purchase as
one product containing, for example, Word-Processing, a Spreadsheet, Graphics
application, Desktop Publishing, Database application.
-Performance - it must have efficiency in both response time and run time.
In-house
Off-the shelf
From a contractor.
In-house Developed Software
This approach requires a development team from within the organisation. The team
is usually comprised of programmers and analysts. The team members should be
high calibre, highly trained and reliable
Advantages
Internal professionals understand operations better and therefore can produce
an accurate solution.
The Software usually meets user requirements.
Management are in total control of the development process
More flexibility - there is more flexibility in making modifications.
Disadvantages
Time and costs of developing the program may be greater than other options
In-house staff may lack the expertise needed for the project
Reliability of the resultant software is highly questionable.
In some cases the developers may attempt to gain fraudulently from the system
Off-the Shelf
This is software that can be purchased, leased, or rented from a software company
that develops programs and sells them to many computer users and organisations.
Applications such as financial accounting, business graphics and pay roll may be
bought.
Advantages
Cheaper - the software company is able to spread the software development cost
over a large number of customers, hence reducing the cost any one customer
must pay.
Less risky - the software is existing, hence you can analyse the features and
performance of the package.
The program is a well-tried and tested product with few errors.
Less time - Off-the -shelf software is often installed quickly and easily.
The package is well documented
The packages require little maintenance
There is continued support from the supplier through upgrades.
Disadvantages
The organisation might need to pay for the features that are not required and
never used.
Tie package may be for general needs and therefore not ideal for the user.
The user has no direct control over the package,
Advantages
Software houses employ professionals and this may benefit the organisation
Transfer of skills to the existing professionals in an organisation
Organization can get support from the contractor.
Disadvantages
All software programs (systems and application) are written in coding schemes
called programming languages. The primary function of a programming language
is to provide instructions to the computer system so that it can perform a processing
activity to achieve an Objective or solve a problem. Program code is the set of
instructions that signal the CPU to perform circuit-switching operations,
Programming languages
Low-level languages
High-level languages
Low-level languages
All languages beyond the first generation are called symbolic languages- they use
symbols easily understood by humans, allowing the programmer to focus
on structuring a problem solution rather than on the complexities of coding specific
computer programs.
The commands are written in simple mnemonics (abbreviated form) instead of the
binary coding . For example A for ADD MV for MOVE. It is therefore easier to work
with assembly coding than machine coding. However, the instructions have to be
translated into machine code by a program called an assembler. Although it is a
step above machine language in terms of sophistication, assembly language is still
considered a low-level language,
They are at a higher level than 3GLs. They demand few lines of code as
compared to 3GLs.
They are easy to learn and their statements are close to natural language. Being
easy they are used to develop simple systems.
It emphasises what output results are desired more than how programming
statements are to be written.
Many managers and executives with little or no training in computers and
programming are using fourth generation languages for programming.
Features of 4GLs
These are used to create programs for artificial intelligence and expert
systems.
They are sometimes called natural languages because they use English syntax.
They allow programmers to communicate with the computer using
normal sentences.
DATA COMMUNICATION
There are various modes and codes of data transmission signals from the sending to
the receiving device.
Analogue transmission
Analogue signals are continuous sine waves that send a continuous 5-volt signal on
a channel but the signal will vary continuously between +5 to -5 volts. The number
of cycles per second is the frequency of the signal and is expressed in units called
hertz (Hz). The human voice forms oscillating patterns of changes in air pressure.
The vibrations act on the telephone microphone and are converted to electrical
voltage patterns that reflect the characteristics of the speech pattern. Analogue
transmission is used to transmit voice or data in analogue signals. It is used in
telephone systems and radio transmission.
Voltage
Analogue Signal
+5
-5 Time
Digital Transmission
This is the sending of data with digital symbols of 0 and 1 representing the
switching on (1) and switching off (0) pulses of electricity. Most computer systems
use this to create bits that make up bytes. One cycle is made up of two pulses. The
number of pulses per second is called the baud rate.
Digital Signal
1 1 1
0 0 0
Time
These are ways through which organisations can communicate via the channel or
transmission media.
Simplex transmission
Transmission takes place only in one direction. These are not suitable for long
distance transmission because there is need for acknowledgement or error
messages. It is used in the computer - printer communication. This is also used in
radio and television transmission.
Sender Receiver
Half Duplex
Messages can be sent both ways but only one way at a time. The channel alternately
sends and receives data but these are not done at the same time. The same device is
used for both sending and receiving. This is used in two-way radio communication.
Sender Receiver
Full Duplex
This permits simultaneous transmission of messages in both directions. Sending and
receiving can be done at the same time using the same devices. This is the mode
used in modern telephone/cellular transmission.
Sender Receiver
Protocols - There is need for there to be a way of signalling the start and
end of the message by the use of data transmission protocols. The use of the
parity bits is one method, use of "roger", "over" are protocols in two-way
radio communication.
Switching Alternatives
Circuit Switching
When a call is made the communication channel is opened and kept open until the
communication session is complete.
Message Switching
Each message is sent to the receiver if a route is available. The messages are sent in
blocks one at a time. The message may be stored for later transmission if the route
is not available, sometimes this is called store-and-forward transmission. The
message is delivered when the route becomes available or upon demand from the
receiver.
Packet Switching
This involves sub-dividing the message into groups called packets. Each packet is
then sent to the destination separately via the fastest route. At the destination the
packets are put in sequential order and delivered to the receiver. Sometimes when
there is no route open, the packets are stored and then forwarded once the route is
open, so these are also store-and-forward systems. These fully put the network to
better utilisation.
a. Telephone Systems - telephone lines are used with online systems. The
lines can be divided into leased and dial service lines.
(i) Leased Lines - These are telephone lines that are dedicated to the
sole use by the user to support online systems within the
organisation. The telephone service provider (e.g Tel One) then
charges a flat monthly rate for the service. In calculating the rate
the length of the line may be considered.
(ii) Dial service - With this telephone line the user is charged each
time the line is used for online processing. When all the lines
connecting the system are busy a user has to wait and an
appropriate message is given by the system. The rate charged
depends on the distance, time of use (peak or off peak), time spent
during transmission. This is usually used for long distance
communication between systems e.g. the Internet
A leased line service provides for high-level online activities. It is much
cheaper to use and provides better quality transmission. The leased lines
are much more flexible than dial service lines. Users in the system have
greater access through the many lines provided by the common carrier.
However, leased lines are suitable for use in one organisation or in one
building/locality.
Destination
Source
Earth
This form of transmission can transmit large amounts of data over wider
areas. This is in much use in wide area television broadcasting. Although
transmission is of high quality, setting up the system is very expensive.
d. Radio Transmission - This form of transmission uses radio waves,
transportation and taxi companies for easier communication use it. The
police and army to communicate also use this.
e. Cellular Transmission - The local area under the transmission is divided
into cells. As the cellular transmission user moves from one cell to the other
the connection is passed from one cell to the other. The signals from
individual cells are integrated into one regular telephone system.
f. Physical Cables - Transmission uses physical cables which are connected to
the communication points. There are three types of these cables:
(i) Twisted-Pair Wire cable - this consists of a pair of twisted wires.
The wires are insulated and twisted to avoid the bleeding of
signals from or into the each other. There are shielded wires (with
a special conducting wire) and unshielded twisted-pair (UTP) that
has no insulation. It is the type used in home telephone
connections. The twisted pair wire cable is inexpensive. However,
it does not allow high rates of data transfer, and is prone to
interference and too bulky.
(ii) Coaxial cable - Consists of an inner conductor coated with insulation
called a dielectric (a layer of foil) that is covered by nonconductive
insulation called a jacket. This offers a cleaner and crisper
transmission than the twisted pair wire cable and has a higher
data transfer rate. However, it is more expensive.
Advantages of networking
a. Resources can be shared e.g. printers, computer files and programmes.
b. More even distribution of processing and other work by the computers and
users.
c. More economic and fuller use of computers.
d. Allow for the provision of local facilities without loss of central control.
e. Mutual support and a spirit of cooperation exist.
Disadvantages of networking.
a. There could be congestion at the shared resources.
b. Control of information and confidentiality may be lost.
c. The costs of the system may be considerable.
d. Viruses and other forms of corruption to programmes spread faster
WAN hardware
Hosts - This provides users with processing software and access. The host is usually
a mainframe computer with microcomputers connected to it.
Front end Processors (FEP) & Back End Processors (BEP) - These are
minicomputers that are placed in front of (FEP) or at the back (BEP) of the main
system CPU. These assist the main system CPU with accepting input perform the
operations on it before forwarding it to the mainframe CPU for further processing or
after the main system CPU to assist with the output activities. They generally
Modems - This is short for Modulate Demodulate. Telephone lines that are common
link media between computers use the analogue signal whereas computers use
digital signals. So there is need to convert the signals. From the sending computer,
the digital signal should be modulated to analogue signal for transmission over the
telephone link. At the receiving end the analogue signal has to be demodulated
(converted back) into the digital signal.
Terminals - These are the microcomputers connected to the system on which the
users can work to sent data or access information. Terminals may be dump or
intelligent. Dump terminals have limited memory and intelligence while intelligent
terminals have processing and memory capabilities that they can process data
themselves.
Multiplexor -it is a device that can subdivide one big channel so that many people
can use it at the same time. There are two types of multiplexors: time division and
frequency division.
Time Division Multiplexors (TDM) - It slices multiple incoming signals into
small time intervals that are then transmitted over a channel and then split
by another TDM at the receiving end.
Multiplexor Multiplexor
WAN Software
In order for the WAN hardware to operate there should appropriate software which
should include telecommunications access programmes that handle messages
between the host's memory and the remote devices, this programme could be in the
FEP. There is also the network control programme that has the work of running the
network off the host by checking if terminals have messages to send, do editing of
incoming messages.
WAN Topology
Modem Modem
Multiplexor Multiplexor
Host
Terminals
Network Workstations - these are usually microcomputers from where a user can
work to enter or receive data from the network. These could be dump terminals or
diskless workstations.
File Servers - These are computer systems attached to a network that control
access to and other wise manage hard disks to allow the workstations to share
disk space, programmes and data and to control the network.
Print Servers - these are computers that have the duty of managing the printer
resources, that is allocating print time, and carrying out other print routines.
Cabling - these connect the different computer systems and devices in the network.
Sometimes LANs use radio waves and thus are wireless.
The Network operating System - These are programmes that manage the
operations of the network allowing the user to install the network, the application
software, analyse and solve network problems, manage the sending, routing and
delivery of messages and do other routine and housekeeping duties for the network.
LAN Topologies
1. Star Topology - there is a central node - the file server (which could be a
minicomputer or microcomputer) to which all other computers in the system
are connected. All the processing and storage are done by the host (central
computer). There is no direct interterminal communication.
The network is suitable for use in offices and homes.
Advantages
a. It is easy to trouble shoot
b. It is economic and offers intensive use of the terminals
c. Requires a single intelligent computers, terminals could be dump
there by saving on the cost of the network.
d. Each terminal has direct and quicker access to the host
Disadvantages
Terminal
Host
All the computer are connected to a linear transmission medium called a bus
through the use of a tap. The tap is used to create a link up to the medium and to
the network.
Advantages
a. Costs of setting up and maintaining the network are low.
b. Each terminal can communicate directly with any other on the network.
Disadvantages
a. Risk of network malfunction
b. Are more troublesome than the star topology.
c. Trouble shooting is more difficult.
d. There is the risk of data collision.
3. Ring Topology
It is made up of a series of nodes connected to each other to form a closed loop.
Each loop can accept data transmitted to it from an immediate neighbour and
forward data not addressed to it to the next neighbour. Messages are transmitted in
Advantages
a. There is by-pass technology so that messages can be passed on from a failed
workstation - breakdown of a workstation does not affect the network much.
b. It is easy to install
c. There is less risk of packet collision
d. More accurate and reliable
Disadvantages
a. There is poor response time
b. There is risk of data interception so there should be data encyption.
c. Unwanted data may continue to circulate the network, thus reducing traffic
carrying capacity of the network.
4. Mesh Topology
This topology combines the ring and the star topologies. Bi-directional links are
established.
This offers better communication and reduces the risk of data collision because of
the existence of alternative routes. The network has quick response time and is very
accurate. However, the costs of the cabling are quite considerable.
The nodes are connected to form a hierarchy. Messages are passed along the
branches until they reach their destinations. These networks do not need a
centralised computer that controls communications. These are also very easy to
6. Mixed Topologies
THE INTERNET
Because the telephone system is not yet fully digitalized, there is need to convert
the predominantly digital computer signal to analogue and reconvert to digital. This
is done by the Modem (short for Modulator
demodulator) which sits between the computer and the telephone line. Modems may
be external or internal to the PC.
If you want to explore the Internet, a web browser is required. A web browser
contains programmes that assist in the surfing of the internet. The most used web
browser is Microsoft Internet Explorer.
Web site –
Web address –
Electronic Mail
It is commonly referred to as the e-mail. Every user of the e-mail has a unique
address. E-mail addresses have an @, for example, [email protected] .
One can send and receive messages the same way an ordinary letter is sent and
received. E-mail messages are sent from user to user on a computer network with
message being stored in the recipient’s mailbox or inbox. The next time the user
logs on, he is told that there is a new message, these messages can be read, printed
or replied.
E-mail allows for the sending of attachments. These are files that contain greater
detail and are based on a particular application package like Microsoft Word,
Microfoft Excel. One can even send a CV, an assignment or other document using e-
mail.
E-mail makes use of an existing internet connection and software. However, there is
a misconception in the minds of many students that e-mail and internet are one and
the same thing. Internet provides many facilities and the e-mail is only one of them.
Advantages of e-mail
1. Speed - Messages are received instantly
- Provides certainty of delivery of mail
- Reading, sending replies, redirecting massages is faster.
3. Time - Less time spent on the phone waiting to be put through, finding
people
unobtainable, holding the line because line is engaged and leaving
messages and having to call again.
4. Flexibility - Anyone with a PC at home can send and receive messages out of
office
hours.
- Messages can be sent and received at any computer that is linked
to the network.
Disadvantages of e-mail
Intranet
It is the network of computers usually within a company that uses e-mail and
browser software but is not part of the internet. Employees can use the Intranet to
access information related to the company such as training, social activities, job
opportunities and product information. It enables employees to share information.
E-commerce
DATA PROCESSING
Disadvantages
a. The whole system is disturbed when the computer is down.
b. Users of the system have little control over the data even their own.
2. Distributed processing
Data is processed at different points in the organisation. Branch or department may
have a microcomputer or minicomputer that processes the information. The
minicomputer in the branch then sends to a host computer after processing.
HOST COMPUTER
1 2 3 4 5 6
Advantages
a. Data lost at any point may be recovered from the host
b. Faster processing of data
c. Processing may occur even if the host computer is down
d. User have some control over their data
e. Problem can be solved at the different points
Disadvantages
a. The system needs expensive equipment and has high maintenance costs.
b. Management and control difficult
c. There is dada duplication at the different points
d. No uniformity of data
e. There is no overall control time
3. Batch processing
A central computer system normally processes all transactions against a central
data base and produces reports at intervals. In batch processing transactions are
accumulated over a period of time and processed periodically. A batch system
handles the inputing, processing, job queuing and transmission of the data from the
remote sites with little or no user intervention. Batch processing involves.
a. Data gathering from source documents at the remote site through the remote
job entry (RJE)
b. recording the transaction data onto some medium e.g. magnetic tape or disk.
c. Sorting the transactions into transaction files
d. Processing of the data
e. Updating the master file.
Advantages
a. It is economical when large amounts of data are being processed
b. Suitable where reports and information is needed periodically.
c. Reduced risk of error due to the time involved in validation and verification.
Disadvantages
a. Master files are often out of date
b. Immediate updated responses cannot be made.
4. On-line Processing
It is the input of transactions while the input device is connected directly to the
main CPU of the system. There is no necessity of a batch.
Advantages
a. Items can be input much easier and quicker.
b. Many errors are dealt with by the operator at entry
c. Time is saved because a batch does not have to be produced first.
d. User can recognise anomalies in the data being entered
Disadvantages
a. The system may be more expensive than batch processing.
b. Sometimes accuracy of data depends on the operator who might fail to detect
or prevent some errors.
c. Sometimes source document are not used e.g. in the case of telephone
orders.
Data is fed directly into the computer system from on-line terminals without the
storing, sorting (these are done on-line)
Advantages
Processing is instantaneous
Files and databases are always up to date
Disadvantages
The systems are expensive to and complex to develop and put up.
Data with errors may be processed with damaging effect.
Hardware costs are high, there is need for on-line terminals, more CPU
power, large on-line storage and back up facilities.
Advantages
a. Each user is given a chance
b. More than one person can use the computer at the same time.
Disadvantages
The user may not require a service at the time his slice is given - this results in too
much excess capacity at some periods.
Data Acquisition
(From source Documents)
Storage Processing
Stage 1
Data acquisition - this is the collection of data from source documents for input into
the computer system.
Stage 2
Input/Capture - This is the putting of the acquired data into the system e.g. through
typing, scanning, or other forms of input.
Validation - the quality of the data is checked before it is entered or processed and
errors detected and eliminated.
Verification - data is checked for mistakes in copying so that it is correct.
There may be gabbage in and gabbage out (GIGO) meaning that information
systems will produce erroneous output if provided with erroneous input data or
instructions. To avoid GIGO common validation is done:
a. Checking data reasonableness, e.g. pregnancy for a three year old would be
unreasonable.
b. Checking data consistency - e.g. it would be inconsistent to record a
pregnant male.
c. Checking range units e.g. it would be impossible to have 30hours worked by
one worker in a day.
d. Timeliness - that data is not out of date.
Stage 3
Processing - this is the key part of the cycle where data is converted into
information. This is where calculations and other logical and manipulative
operations on the data are done. Specific applications are used to process the data
e.g. word processing, spreadsheet, payroll packages etc
Stage 4
Storage - information is stored on various storage media including hard disks, floppy
disks, magnetic tapes etc.
Stage 5
Output - The processed information is eventually displayed for use by the user
through the various output systems - printers, VDUs, sound cards & speakers.
The data processing department interacts with all other departments from where it
gets data and for whom it processes and eventually provides the information to.
The main functions of a DP department are:
a. Design and install a custom built system of data capture and processing.
b. Provision of advice to the organisation on matters regarding the processing
of information e.g. the selection of the correct devices for input, process,
storage and output.
c. Provides advice on the installation of a package or information system
d. Manage the organisation's data processing resources.
A typical DP/IT department
DBA BA SA TA AP SP DPS SL
DPL
CO CO CO CO CO CO
2. System Analyst
The title and function of this person may vary from organisation to organisation or
as an organisation develops from stage to the other. As the computer is applied to
the different organisational problems, the duties of the analyst may change.
A business analyst would require less skill than the system designer or the technical
analyst. These personnel deal with more or less the same task but with differing
depth.
Main Duties
a. Examine the feasibility of potential computer applications and to consider all
the various approaches to computerisation that are available.
b. To perform the proper analysis of user systems and requirements.
c. Develop a cost benefit analysis in conjunction with the users.
d. Design system, which take into account not only the computer procedures
but the clerical and other procedures around the computer system.
e. To specify the check and controls to be incorporated into the system in
conjunction with the audit staff.
f. To specify the most appropriate processing techniques to be used e.g. micro,
mini or mainframe, batch or real time processing.
g. To ensure that there is proper communication and clear instructions at each
stage of the project e.g. programme specification, file set up, operating
instructions, print out volumes.
h. To ensure the system is properly set up and documented.
i. To ensure a proper environment for system testing and pilot running and
parallel running of the system as may be appropriate.
3. Programmer
After design the programmer comes in. He uses the program specifications
produced by the analyst/system designer to develop the programme. The
programme specifications may consist of file and records layouts, field
description, report and screen layouts.
A flow chart or diagram indicating the main logical steps in the proposed
program may be made.
The programmer converts specifications from the system analyst into a working
programme.
Duties
a. To reach an understanding of what each programme is expected to do and to
clarify any problems with the analyst or systems designer.
b. To design the structure of the programme in accordance with installations
standards.
c. To provide a working of an efficient programme using the installations
standards within the budgeted time and funds.
d. To test programmes thoroughly both as a unit and in relation to other
programmes.
e. To provide the required programme documentation.
4. Systems Programmer
He specializes in non-application programmes e.g. operating systems, data
communications
Duties
a. Liaising with computer supplier to keep abreast with operating system
changes.
b. Support systems analyst and programmer regards queries on the system
software performance and features.
c. Assisting the programmer to interpret and resolve problems which appear to
be caused by the system software rather than application software.
5. Application programmer
He writes programmes or adapts software packages to carry out specific task or
operations for the computer users e.g. a sales analysis programme for the marketing
department.
Duties
a. discuss the programme specification with the analyst.
b. To write the sources program module.
c. To test the programme and debug it.
d. To maintain programmes correcting errors, making improvements &
modifications to allow for changing business methods, circumstances or
equipment.
e. Encode the procedure detailed by the analyst in a language suitable for the
specified computer.
f. Liase with the analyst and other users on the logical correctness of the
programme.
6. Computer Operator
S/he operates the mainframe or mini computer. He is responsible for the efficient
running of the computer equipment, which if not ensured efficient running time of
the computer may be lost.
Duties
a. Collecting files and programs required for a computer run from the library.
b. Loading magnetic tapes and disks into drives.
c. Putting stationery into the printer.
d. Carrying out routine maintenance such as cleaning the tapes and read write
heads.
e. Ensure the equipment is running efficiently and reporting any faults to the
technicians.
f. Replacement of computer accessories e.g. toner catridges, ribbons, ink.
g. Switching the computer on/off.
h. Handles and operates the computer hardware.
i. Handles computer input and output.
j. Responds to messages on the operator's console prompted by the operating
system that monitors the user's requests and the status of the peripherals.
k. Watching the process of individual jobs and of the computer in general.
l. Keeping a log of what happens to supplement the log that the computer
produces.
8. Database Administrator
This is a person responsible for planning, designing and maintaining the
organisation's database. This person relates to the management, system
analysts, programmers and other stakeholders in the organisation. He needs to
have adequate managerial and technical abilities to suit the job. He therefore
must have a sound knowledge of the structure of the database and the DBMS.
Duties
a. Ensure that the database meets the needs of the organisation.
b. Ensure facilities for the recovery of data
c. Ensure the functioning of report generation systems form the DBMS
d. The DBA is also responsible for the documentation of the DBMS through the
designing and availing of the data dictionary and manuals for the users
giving such direction as the general use of the database, access to
information, deletion of records from the system and the general validation
and verification of data.
Duties of the personnel overlap and depending on the size of the organisation or the
IT department some duties are done by one person.
File Concepts
The purpose of a computer file is to hold data required for providing information. A
computer file is a collection of related records. Records consist of fields and the
fields are made up of characters. A character is the smallest element of a file. A
character may be a letter of the alphabet, a digit or of a special form (symbols).
Logical files show what data items are contained and what processing may be done
while physical files are viewed in terms of how data is stored on storage media.
Types of Files
1. Master Files – They hold permanent data for use in applications such as
stock control, credit control. Usually much of the data items in these files do
not change frequently or with each transaction e.g name, address or date of
birth.
2. Transaction files – These are also called movement files. They hold
temporary records of values. They are used to update the master file and are
overwritten after the updating of the master file.
3. Look up files – they are reference files from which such information as
prices list and mailing list can be obtained.
4. Archive files – these are files that are used to store information that has not
been in use in the recent past and would not be in use in the near future – so
are used to store historical data.
This is the way a records are stored on the storage device or medium. This is how
the files are arranged. The arrangement also affects the way these files will be
accessed.
1. Sequential Files – the files are stored and accessed in sequence i.e. one
after another. Access the file is dependent on the position of the file on the
storage medium. Accessing the files is by moving usually through spooling to
the relevant file. This is the structure of filing on magnetic tapes. It is most
suitable where all the records on the file are being considered e.g. in the
preparation of a payroll but would be inefficient where the selection of one
record is necessary e.g. access to one employee on the payroll.
2. The Direct File Structure – The files are randomly stored. Access and
storage of the records not depend on the physical position of the record on
the file. This is the form of file structure on magnetic disks, floppy disks, or
on optical disks. Each record is given a specific disk address by which it is
recognized and accessed. This is the structure used to store and access
records and files on the Automatic Teller Machine (ATMs) systems. Access to
records is much faster. However, there could be conflict resolution where
several records generate the same address – this problem has been dealt
with the use of conflict resolution mechanisms on the computer and filing
systems.
3. Indexed Sequential File Structure – This combines the features of
sequential and direct file structures. Records are stored sequentially on a
direct access medium like the hard disk and each record occupies an
addressable location identifiable by the unique disk address. An index is
developed to keep track of the records and their physical locations on the
storage medium. The records can be stored and accessed sequentially
starting from the beginning moving through the records one at a time or can
be stored and accessed directly e.g. the way the cell phone’s phone book is
structured.
On all the types and structures discussed above a user may add or remove a file
or record, modify contents of the file or record, view the contents of the data and
create reports as may be necessary. These operations on the data can be done
on-line i.e. files and records updated as the transactions are being entered from
a device connected onto the main CPU of the system.
DATABASE CONCEPTS
Data Independence - data can be defined and described separately from the
application programme. Where there is no data independence a change in any
record would then necessitate the changing of the programme to access the file.
Data Redundancy - The same data element appears in a number of files but
serving the same purpose and usually thus staying unused.
Disadvantages of Databases
a. Concurrence problems - where more than one user access and attempt to
update the same record at the same time - there is file edit locking to prevent
this.
b. Ownership problems - sometimes some individuals tend to own the data and
thus refuse access by other individuals or departments in the organisation.
c. Resources problem - with database extra resources are needed e.g. more
workstations and other devices.
d. Security problems - there is increased exposure to unauthorized entry into
the data this could be reduced by the use of regularly changed passwords
and by physically denying access to unauthorized users.
Application
Programme DBMS DB
Application
Components of a DBMS
Data Dictionary - this is a database management tool that has names and
descriptions of all data elements within a database.
Data repositories - these are an extension of the data dictionary which provide a
directory of component parts of the dB and other information resources in the
organisation.
Data languages - a definition language is needed to place the data in the data
dictionary through the use of commands such as sort, get, find etc.
Archiving and Recovery Systems - these systems are used to store backups of
the original record so that if the original database is damaged the information
can still be recovered.
Report Writers - these allow the user to obtain reports from the data quicker and
easier.
1. One to One relationship - this is where one record is related to one other
record e.g. single parent record to one child record
1 Represents 1
Record Record
This could be where one sales representative deals with one customer for example.
Recor
d
1 Represents N
Record Record
s
Recor
In E-R diagram d
M Represents N
Record Record
s
e.g. many sales representatives relating with on customer, many lecturers relating
to one student.
4. Many to many - with two or more parents relating to two or more children
M Represents N Records
Recor
A replicated dB is one that has been copied and is kept at different geographical
locations. This allows for easier recovery if one fails and reduces data transmission
costs, as there would be little long distance transmission thus is also faster. This,
however, it is expensive in terms of computer resources.
A partitioned dB is one that is split into segments and each segment distributed to
the relevant location. This reduces transmission costs and provides a faster
turnaround time in input, processing and output. There is reduced data
inconsistency and redundancy. However, there is need for more computer resources
that are costly.
An Online dB - this is a dB that is allows for the immediate updating of files from
remote terminals since input will be directly intyo the system e.g. stock market
information.
DATA SECURITY
This refers to measures to reduce unauthorized access to, use and destruction of an
organisation’s data and data resources.
Data is a valuable resource like any other asset of an organization. Data like money
can be stolen and exchanged for some value. Organisations have some pieces of
data that are confidential and these need to be secure. Every organization needs to
take security of hardware, software and data seriously because the consequences of
breaches of security can be extremely damaging to a business. This may lead to loss
of production, cashflow problems, loss of customers and reputation.
Threats to security come from outside (external) and inside (internal) the
organisation
Securing data entails making sure that the computers are in the right environment,
there are right software measures to reduce loss or theft of data.
There is need to look after the computer hardware well to avoid loss of data or the
computers themselves.
Security of Data
Accidental Loss
To reduce the risk of loss to accidental loss there is the use of back up of data –
there should be a saved copy of the original file that is kept on a different medium
and place.
\
Deliberate Damage
Viruses are transmitted from computer to computer. They copy themselves quickly.
Effects of viruses may be mild to severe. Some viruses are harmless and computers
may operate normally.
Characteristics of viruses
Computer and computer equipment have negative health effects on the users.
Research is still being carried out to determine the extent of the effects on the
health of users.
This refers to disorders that affect the hands, wrists, arms, shoulders or neck
of computer operators. It is inflammation of the joints and is caused by
making the same small movements over and over again. This can cause pain,
numbness, swelling and the inability to lift or grip objects. In some cases,
operators have become permanently disabled.
Using the VDU for long periods at a time may affect a user’s eyes and in
some instances cause headaches.
(c) Posture
The systems development life cycle is a project management technique that divides
complex projects into smaller, more easily managed segments or phases.
Segmenting projects allows managers to verify the successful completion of project
phases before allocating resources to subsequent phases.
INITIATION PHASE
Careful oversight is required to ensure projects support strategic business
objectives and resources are effectively implemented into an organization's
enterprise architecture. The initiation phase begins when an opportunity to add,
improve, or correct a system is identified and formally requested through the
presentation of a business case. The business case should, at a minimum, describe a
proposal’s purpose, identify expected benefits, and explain how the proposed system
supports one of the organization’s business strategies. The business case should
also identify alternative solutions and detail as many informational, functional, and
network requirements as possible.
The feasibility support documentation should be compiled and submitted for senior
management or board study. The feasibility study document should provide an
overview of the proposed project and identify expected costs and benefits in terms
of economic, technical, and operational feasibility. The document should also
PLANNING PHASE
The planning phase is the most critical step in completing development, acquisition,
and maintenance projects. Careful planning, particularly in the early stages of a
project, is necessary to coordinate activities and manage project risks effectively.
The depth and formality of project plans should be commensurate with the
characteristics and risks of a given project.
Project plans refine the information gathered during the initiation phase by further
identifying the specific activities and resources required to complete a project. A
critical part of a project manager’s job is to coordinate discussions between user,
audit, security, design, development, and network personnel to identify and
document as many functional, security, and network requirements as possible.
DESIGN PHASE
The design phase involves converting the informational, functional, and network
requirements identified during the initiation and planning phases into unified design
specifications that developers use to script programs during the development phase.
Program designs are constructed in various ways. Using a top-down approach,
designers first identify and link major program components and interfaces, then
expand design layouts as they identify and link smaller subsystems and connections.
Using a bottom-up approach, designers first identify and link minor program
components and interfaces, then expand design layouts as they identify and link
larger systems and connections.
Contemporary design techniques often use prototyping tools that build mock-up
designs of items such as application screens, database layouts, and system
architectures. End users, designers, developers, database managers, and network
administrators should review and refine the prototyped designs in an iterative
process until they agree on an acceptable design. Audit, security, and quality
assurance personnel should be involved in the review and approval process.
Input Controls
Automated input controls help ensure employees accurately input information,
systems properly record input, and systems either reject, or accept and record,
input errors for later review and correction.
Processing Controls
Automated processing controls help ensure systems accurately process and record
information and either reject, or process and record, errors for later review and
correction. Processing includes merging files, modifying data, updating master files,
and performing file maintenance.
Output Controls
Automated output controls help ensure systems securely maintain and properly
distribute processed information.
DEVELOPMENT PHASE
The development phase involves converting design specifications into executable
programs. Effective development standards include requirements that programmers
and other project participants discuss design specifications before programming
begins. The procedures help ensure programmers clearly understand program
designs and functional requirements.
Development Standards
Development standards should be in place to address the responsibilities of
application and system programmers. Application programmers are responsible for
developing and maintaining end-user applications. System programmers are
responsible for developing and maintaining internal and open-source operating
system programs that link application programs to system software and
subsequently to hardware. Managers should thoroughly understand development
and production environments to ensure they appropriately assign programmer
responsibilities.
Library Controls
Libraries are collections of stored documentation, programs, and data. Program
libraries include reusable program routines or modules stored in source or object
code formats. Program libraries allow programmers to access frequently used
routines and add them to programs without having to rewrite the code. Dynamic
Version Controls
Library controls facilitate software version controls. Version controls provide a
means to systematically retain chronological copies of revised programs and
program documentation.
Software Documentation
Organizations should maintain detailed documentation for each application and
application system in production. Thorough documentation enhances an
organization’s ability to understand functional, security, and control features and
improves its ability to use and maintain the software. The documentation should
contain detailed application descriptions, programming documentation, and
operating instructions. Standards should be in place that identify the type and
format of required documentation such as system narratives, flowcharts, and any
special system coding, internal controls, or file layouts not identified within
individual application documentation.
TESTING PHASE
The testing phase requires organizations to complete various tests to ensure the
accuracy of programmed code, the inclusion of expected functionality, and the
interoperability of applications and other network components. Thorough testing is
critical to ensuring systems meet organizational and end-user requirements.
Testing groups are comprised of technicians and end users who are responsible for
assembling and loading representative test data into a testing environment. The
groups typically perform tests in stages, either from a top-down or bottom-up
approach. A bottom-up approach tests smaller components first and progressively
adds and tests additional components and systems. A top-down approach first tests
major components and connections and progressively tests smaller components and
connections. The progression and definitions of completed tests vary between
organizations.
Testers often identify program defects or weaknesses during the testing process.
Procedures should be in place to ensure programmers correct defects quickly and
document all corrections or modifications. Correcting problems quickly increases
testing efficiencies by decreasing testers’ downtime. It also ensures a programmer
does not waste time trying to debug a portion of a program without defects that is
not working because another programmer has not debugged a defective linked
routine. Documenting corrections and modifications is necessary to maintain the
integrity of the overall program documentation.
Organizations should review and complete user, operator, and maintenance manuals
during the testing phase. Additionally, they should finalize conversion,
implementation, and training plans.
IMPLEMENTATION PHASE
The implementation phase involves installing approved applications into production
environments. Primary tasks include announcing the implementation schedule,
training end users, and installing the product. Additionally, organizations should
input and verify data, configure and test system and security parameters, and
conduct post-implementation reviews. Management should circulate implementation
schedules to all affected parties and should notify users of any implementation
responsibilities.
MAINTENANCE PHASE
The maintenance phase involves making changes to hardware, software, and
documentation to support its operational effectiveness. It includes making changes
to improve a system’s performance, correct problems, enhance security, or address
user requirements. To ensure modifications do not disrupt operations or degrade a
system’s performance or security, organizations should establish appropriate
change management standards and procedures.
DISPOSAL PHASE
The disposal phase involves the orderly removal of surplus or obsolete hardware,
software, or data. Primary tasks include the transfer, archiving, or destruction of
data records. Management should transfer data from production systems in a
planned and controlled manner that includes appropriate backup and testing
procedures. Organizations should maintain archived data in accordance with
applicable record retention requirements. It should also archive system
documentation in case it becomes necessary to reinstall a system into production.
Management should destroy data by overwriting old information or degaussing
(demagnetizing) disks and tapes. Refer to the IT Handbook’s “Information Security
Booklet” for more information on disposal of media.
1. The Internet
Definition
Facilities
Bulletin Boards – Magazines, newspapers * Web Television
Music * Software downloading
(shareware)
Discussion Groups * Shopping Malls
Libraries * Research
Tuition and Virtual Learning (e-learning) * Job Opportunities
E-commerce * E-mail
Weather reports * Date line
2. Telecommuting
This involves working from home while connected to the office through computer
networks. This means the workers do not need to travel to workplaces. This has the
3. Teleconferencing
This is also know as confra-vision. It is a facility through which people in distant
places can hold a conference like discussion while seeing each other on computer
screens. The biggest advantage of this form of technology is in the saving of
conference costs like venue hire, travel and subsistence. There is also the benefit of
body language that the people using this technology have.
5. Connectivity
Increased use of networks
Use of shared databases
9. Globalization
Role of IT in Globalisation