0% found this document useful (0 votes)
33 views16 pages

Basic Computer Notes

The document provides an overview of computer studies, covering the definition, functions, classifications, and uses of computers. It details the evolution of computers through five generations, types based on function and size, and highlights advantages and disadvantages of computer usage. Additionally, it discusses computer hardware, software, storage devices, and networking types.

Uploaded by

kavilibenfarant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views16 pages

Basic Computer Notes

The document provides an overview of computer studies, covering the definition, functions, classifications, and uses of computers. It details the evolution of computers through five generations, types based on function and size, and highlights advantages and disadvantages of computer usage. Additionally, it discusses computer hardware, software, storage devices, and networking types.

Uploaded by

kavilibenfarant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Lucy Wanjiru 1

COMPUTER STUDIES BRIEF NOTES


Lucy Wanjiru 2

1. Introduction to Computers
A computer is an electronic machine that processes data and performs tasks based on user
instructions. It works through the interaction of hardware (physical components) and
software (programs and applications).

Main Functions of a Computer:

1. Input – Receiving data from input devices.


2. Processing – The CPU manipulates data according to software instructions.
3. Storage – Data is stored in memory (temporary or permanent).
4. Output – The processed data is displayed or presented using output devices.
5. Communication – The computer connects to networks to share information.

Types of Computers:
Computers can be classified based on time (generation), function (purpose), and size
(physical characteristics and processing power).

1. Classification by Time (Generations of Computers)


Computers have evolved through five generations, each marked by advancements in
technology:

First Generation (1940s–1956)

 Used vacuum tubes for processing and memory.


 Consumed a lot of power and generated heat.
 Example: ENIAC, UNIVAC

Second Generation (1956–1963)

 Used transistors, replacing vacuum tubes.


 Faster, more reliable, and consumed less power.
 Example: IBM 1401

Third Generation (1964–1971)

 Used integrated circuits (ICs), making computers smaller and more efficient.
 Supported multiple users with operating systems.
 Example: IBM System/360

Fourth Generation (1971–Present)

 Used microprocessors (entire CPU on a single chip).


 Introduction of personal computers (PCs).
Lucy Wanjiru 3

 Example: IBM PC, Apple Macintosh

Fifth Generation (Present & Future)

 Uses artificial intelligence (AI), quantum computing, and advanced processors.


 Examples: AI-driven systems like IBM Watson, quantum computers

2. Classification by Function (Purpose of Use)


General-Purpose Computers

 Designed for a wide range of tasks.


 Used in homes, offices, schools, etc.
 Example: Laptops, desktops

Special-Purpose Computers

 Designed for specific tasks.


 Used in medical diagnosis, weather forecasting, military applications, etc.
 Example: ATMs, MRI scanners, flight simulators

3. Classification by Size (Physical Size & Processing


Power)
Supercomputers

 The fastest and most powerful computers.


 Used for complex simulations and scientific research.
 Example: Summit, Fugaku

Mainframe Computers

 Large and powerful computers used by organizations for bulk data processing.
 Support multiple users simultaneously.
 Example: IBM Z Series

Minicomputers (Midrange Computers)

 Mid-sized, used by businesses for moderate processing tasks.


 More powerful than personal computers but less than mainframes.
 Example: PDP-11

Microcomputers (Personal Computers – PCs)


Lucy Wanjiru 4

 Most common type, used by individuals and small businesses.


 Includes desktops, laptops, tablets, and smartphones.
 Example: Dell Inspiron, MacBook

Embedded Computers

 Built into devices to perform dedicated tasks.


 Found in washing machines, smart TVs, and cars.
 Example: Microcontrollers in smart appliances

USES OF COMPUTERS

Computers are used in nearly every aspect of modern life. Here are some key uses across
different fields:

1. Education

 Online learning and virtual classrooms


 Research and access to digital libraries
 Computer-based training and simulations
 Educational software and interactive learning

2. Business & Finance

 Managing records, payroll, and transactions


 Online banking and financial analysis
 E-commerce and digital marketing
 Communication via emails and video conferencing

3. Healthcare

 Patient record management and hospital administration


 Medical diagnosis and imaging (e.g., MRI, CT scans)
 Telemedicine and online consultations
 Research in pharmaceuticals and drug development

4. Science & Engineering

 Data analysis and simulations


 Robotics and artificial intelligence research
 Space exploration and climate modeling
 3D modeling and design in architecture

5. Entertainment & Media

 Video streaming and gaming


 Music production and video editing
 Social media and digital content creation
 Virtual and augmented reality experiences
Lucy Wanjiru 5

6. Government & Security

 National security and surveillance systems


 Data storage and population records
 Traffic control and smart city management
 Election monitoring and governance

7. Communication

 Email, messaging apps, and social networking


 Video conferencing and VoIP calls
 Cloud storage and file sharing
 News distribution and blogging

8. Transportation

 GPS navigation and route planning


 Automated ticket booking systems
 Air traffic control and vehicle automation
 Logistics and supply chain management

Advantages and Disadvantages of Computers


✅ Advantages of Computers

1. Speed and Efficiency


o Perform complex calculations in seconds.
o Automate repetitive tasks, saving time.
2. Storage and Data Management
o Store vast amounts of information in a small space.
o Retrieve and process data quickly.
3. Accuracy and Reliability
o Reduce human errors in calculations and data processing.
o Provide consistent and precise results.
4. Connectivity and Communication
o Enable instant communication via email, video calls, and messaging.
o Facilitate remote work and global collaboration.
5. Education and Learning
o Provide access to online courses, research materials, and virtual classrooms.
o Enhance learning through multimedia tools.
6. Entertainment and Multimedia
o Support gaming, video streaming, music production, and digital art.
o Allow content creation and editing.
7. Automation and Productivity
o Power industrial automation, robotics, and smart devices.
o Increase efficiency in businesses, healthcare, and manufacturing.
8. Scientific Research and Innovation
o Aid in medical research, space exploration, and artificial intelligence.
o Model complex systems like weather forecasts and simulations.
Lucy Wanjiru 6

❌ Disadvantages of Computers

1. Cybersecurity Risks
o Prone to hacking, malware, and data breaches.
o Can lead to identity theft and financial fraud.
2. Health Issues
o Prolonged use can cause eye strain, back pain, and repetitive strain injuries.
o Excessive screen time can lead to addiction and mental stress.
3. Job Loss and Unemployment
o Automation and AI replace human jobs in some industries.
o Reduces demand for manual labor.
4. Cost of Maintenance and Upgrades
o High initial costs for hardware and software.
o Regular maintenance, repairs, and updates required.
5. Dependence on Technology
o Over-reliance can reduce critical thinking and problem-solving skills.
o System failures can disrupt operations in businesses and essential services.
6. Environmental Impact
o E-waste contributes to pollution.
o High energy consumption increases carbon footprint.
7. Privacy Concerns
o Online tracking and data collection raise concerns about personal privacy.
o Social media misuse can lead to misinformation and privacy breaches.
8. Social Isolation
o Excessive use can reduce face-to-face interactions.
o Increases risk of loneliness and social detachment.

2. Computer Hardware
A. Input Devices

Input devices are used to enter data into a computer. They can be classified into different
categories based on their function:

1. Keying Devices (Text Input)

 Keyboard – The most common text input device.


o Types: Standard (QWERTY), Ergonomic, Mechanical, Virtual.
 Braille Keyboard – Designed for visually impaired users.
 Keypad
 Touch screen keyboard
Lucy Wanjiru 7

2. Pointing Devices (Control and Selection)

 Mouse – Moves the cursor on the screen.


o Types: Optical, Wireless, Mechanical.
 Trackpad/Touchpad – Used in laptops as a mouse alternative.
 Trackball – A stationary device where the user moves a ball to control the cursor.
 Joystick/Game Controller – Used in gaming to control movements.
 Light pen

3. Scanning Devices (Image and Object Capture)

 Flatbed Scanner – Converts printed documents into digital format.


 Handheld Scanner – Portable device for barcode and document scanning.
 QR Code Scanner – Reads QR codes to retrieve encoded information.
 3D Scanner – Captures real-world objects and converts them into digital models.

4. Audio and Video Input Devices

 Microphone – Captures sound for communication and recording.


 Webcam – Captures video for video calls and recordings.

5. Biometric Input Devices

 Fingerprint Scanner – Used for security authentication.


 Facial Recognition Camera – Scans faces for identity verification.
 Iris Scanner – Scans the eye’s iris for identification.

6. Sensors and Special Input Devices

 Temperature Sensor – Measures temperature in smart devices.


 Motion Sensors – Detects movement, used in gaming and automation.
 Stylus Pen – Used for touchscreen input, common in tablets.

B. Output Devices

Output devices display or produce results from the computer.

Types of Output Devices:

1. Visual Output
o Monitor (LCD, LED, OLED) – Displays images and text.
o Projector – Displays images on a larger screen.
2. Printed Output
o Inkjet Printer – Uses ink to print high-quality images.
o Laser Printer – Uses laser technology for fast printing.
o 3D Printer – Creates three-dimensional objects.
o Plotters
3. Audio Output
Lucy Wanjiru 8

o Speakers – Produce sound output.


o Headphones – Personal audio device.

3. Computer Storage Devices


Storage devices hold data permanently or temporarily. They can be classified as primary
(internal memory) or secondary (external storage).

A. Primary Storage (Volatile Memory)

 RAM (Random Access Memory) – Temporary memory used by active programs.


 Cache Memory – Super-fast memory between RAM and the CPU.
 Registers – Small storage inside the CPU for quick data access.

B. Secondary Storage (Non-Volatile Memory)

1. Fixed Storage (Non-Removable)

Fixed storage devices are permanently installed inside a computer or system, meaning they
cannot be easily removed or transported. Examples include Hard Disk Drives (HDDs),
Solid-State Drives (SSDs), and internal flash storage in devices like smartphones and
gaming consoles.

o Hard Disk Drive (HDD) – Magnetic storage with spinning disks.


o Solid State Drive (SSD) – Faster, no moving parts, more durable than HDD.
o Internal Flash Storage

Advantages of Fixed Storage Devices

1. High Storage Capacity


o Can store large amounts of data compared to portable storage devices like
USB drives.
2. Fast Data Access
o Internal SSDs and HDDs provide faster read/write speeds than external
storage, enhancing system performance.
3. Secure and Less Prone to Loss
o Unlike removable storage, fixed storage is not easily misplaced or stolen.
4. Efficient for Continuous Use
o Designed for constant operation, making them ideal for business servers and
personal computers.
5. Integrated with System Software
o Essential for operating system storage, allowing smooth system booting and
application execution.
6. Reliable Power Supply
o Always powered when the computer is on, unlike external drives that may
require separate power sources.
Lucy Wanjiru 9

Disadvantages of Fixed Storage Devices

1. Limited Portability
o Cannot be easily moved or transferred between devices without disassembling
the system.
2. Difficult Upgrades and Repairs
o Replacing or upgrading internal storage requires technical skills and may void
warranties.
3. Risk of Data Loss in Case of Failure
o If the fixed drive fails, data recovery can be complex and expensive.
4. Vulnerable to System Damage
o If the computer is damaged (e.g., due to power surges or malware), the
internal storage may also be affected.
5. Consumes Internal Space and Power
o Large HDDs require adequate internal space and power, which can impact
energy efficiency.
6. Higher Cost for SSDs
o While SSDs offer better performance, they are more expensive per gigabyte
compared to external HDDs.

2. Removable Storage
Removable storage devices are external storage media that can be easily connected to and
detached from a computer or other digital devices. Examples include USB flash drives,
external hard drives, memory cards, CDs/DVDs, and Blu-ray discs.

o USB Flash Drive – Portable storage device.


o Memory Card (SD Card) – Used in smartphones and cameras.
o Optical Discs (CD/DVD/Blu-ray) – Store media and software.
o External hard drives

Advantages of Removable Storage Devices

1. Portability
o Easy to carry and transfer data between different devices.
2. Backup and Data Security
o Useful for creating backups to prevent data loss in case of internal storage
failure.
3. Easy Upgrades and Expansion
o Storage capacity can be increased without modifying the internal storage of a
device.
4. Compatibility with Multiple Devices
o Can be used across various devices like laptops, desktops, cameras, and
gaming consoles.
5. No Need for Internet Access
Lucy Wanjiru 10

oUnlike cloud storage, removable storage does not require an internet


connection to access files.
6. Data Recovery and Repair
o If a computer crashes, data stored on removable media remains safe and
accessible.

Disadvantages of Removable Storage Devices

1. Risk of Loss or Theft


o Small devices like USB drives and memory cards can be easily misplaced or
stolen.
2. Limited Storage Capacity
o Compared to fixed internal storage, most removable storage devices offer
lower capacity.
3. Slower Data Transfer Speeds
o External storage, especially traditional USB drives and optical discs, may be
slower than internal SSDs.
4. Potential for Corruption and Viruses
o Removable media can carry malware if plugged into infected computers.
5. Durability Issues
o Flash drives and external HDDs can be damaged by physical impact, water, or
extreme temperatures.
6. Additional Cost
o Purchasing multiple storage devices for backups or extra capacity can be
expensive.

3. Cloud Storage
o Stores data online via platforms like Google Drive, OneDrive, and Dropbox.

4. Computer Software
Software refers to programs and applications that run on a computer.

A. System Software

 Operating Systems (OS) – Windows, macOS, Linux, Android, iOS.


 Device Drivers – Help hardware communicate with the OS.
 Utility Software – Antivirus, file management, disk cleanup tools.

B. Application Software

 Productivity Tools – MS Word, Excel, PowerPoint.


 Web Browsers – Google Chrome, Mozilla Firefox.
Lucy Wanjiru 11

 Media Players – VLC Media Player, Windows Media Player.

5. Computer Networks
A computer network is a collection of interconnected computers that share resources.

Types of Computer Networks

Computer networks are classified based on their size, purpose, and geographical coverage.
Here are the main types:

1. Personal Area Network (PAN)

 Scope: Covers a very small area, usually a few meters.


 Devices: Smartphones, laptops, smartwatches, wireless headphones.
 Example: Bluetooth connections, USB tethering.

2. Local Area Network (LAN)

 Scope: Covers a small area like a home, school, or office.


 Devices: Computers, printers, routers, and switches.
 Example: Wi-Fi in offices, Ethernet in schools.

3. Metropolitan Area Network (MAN)

 Scope: Covers a city or a large campus.


 Devices: Fiber optic cables, high-speed routers, city-wide Wi-Fi.
 Example: Cable TV networks, city-wide broadband.

4. Wide Area Network (WAN)

 Scope: Covers a large geographical area, such as a country or continent.


 Devices: Satellites, fiber optic cables, internet backbone routers.
 Example: The Internet, multinational corporate networks.

5. Wireless Local Area Network (WLAN)


Lucy Wanjiru 12

 Scope: Similar to LAN but wireless.


 Devices: Wi-Fi routers, wireless access points.
 Example: Public Wi-Fi hotspots, home wireless networks.

6. Campus Area Network (CAN)

 Scope: Covers a university, business park, or military base.


 Devices: Routers, fiber optic cables, LANs interconnected.
 Example: University Wi-Fi network, corporate office network.

7. Storage Area Network (SAN)

 Scope: Designed for data storage and retrieval.


 Devices: Storage devices, servers, high-speed connections.
 Example: Cloud storage networks, enterprise backup systems.

8. Virtual Private Network (VPN)

 Scope: Secure network over the Internet.


 Devices: VPN software, encrypted tunnels.
 Example: Remote access for employees, bypassing geographic restrictions.

6. Computer Security and Cyber Safety


1. Introduction to Computer Security
Computer security refers to the protection of computer systems, networks, and data from
unauthorized access, attacks, damage, or theft. It ensures confidentiality, integrity, and
availability (CIA Triad) of information.

2. Cyber Threats and Their Types


Cyber threats are potential dangers that can compromise computer security. These threats
come in various forms:

A. Malware (Malicious Software)

Software designed to harm or exploit computers. Common types include:


Lucy Wanjiru 13

 Viruses – Attach to files and spread when executed.


 Worms – Spread without user action, often through networks.
 Trojan Horses – Appear as legitimate software but contain malicious code.
 Spyware – Secretly gathers user data.
 Ransomware – Encrypts files and demands payment for decryption.

B. Phishing Attacks

 Fraudulent emails or messages trick users into providing personal information (e.g.,
passwords, credit card details).

C. Denial of Service (DoS) & Distributed Denial of Service (DDoS) Attacks

 Overloading a system or network with excessive traffic, making it unavailable.

D. Man-in-the-Middle (MitM) Attacks

 Intercepting communication between two parties to steal or modify data.

E. Password Attacks

 Methods like brute force, dictionary attacks, and credential stuffing are used to
crack passwords.

F. Insider Threats

 Security risks posed by employees or trusted individuals misusing access privileges.

G. Zero-Day Exploits

 Attacks targeting software vulnerabilities that are unknown to the developer.

3. Security Measures and Best Practices


A. Authentication and Access Control

 Use strong passwords (mix of letters, numbers, and symbols).


 Implement multi-factor authentication (MFA) for additional security.
 Restrict access to sensitive data using role-based access control (RBAC).

B. Firewalls and Antivirus Software

 Firewalls filter incoming and outgoing network traffic.


 Antivirus software detects and removes malware.

C. Data Encryption
Lucy Wanjiru 14

 Protects sensitive information by converting it into unreadable formats using


encryption algorithms.
 Common encryption types: AES (Advanced Encryption Standard), RSA (Rivest-
Shamir-Adleman).

D. Regular Software Updates & Patch Management

 Keeping operating systems, applications, and security software up to date helps


prevent exploits.

E. Safe Browsing Practices

 Avoid clicking suspicious links or downloading unknown files.


 Use HTTPS websites for secure communication.

F. Network Security Measures

 Virtual Private Networks (VPNs) encrypt internet connections.


 Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
monitor and block threats.

G. Backup and Disaster Recovery

 Regularly backup critical data to protect against ransomware and hardware failure.
 Store backups in multiple locations, including cloud storage and external drives.

H. Security Awareness Training

 Educate users about phishing, password security, and recognizing cyber threats.

Basic Computer Operations Guide


Here’s how to perform common computer tasks such as creating, renaming, moving,
copying, pasting, and managing files on a Windows or Mac computer.

1. Creating a New File


A file can be a document, image, or program file.

On Windows:

1. Right-click on the desktop or inside a folder.


2. Select New → Choose the file type (e.g., Text Document, Folder, Word
Document).
3. Name the file and press Enter.
Lucy Wanjiru 15

2. Renaming a File or Folder


On Windows:

1. Right-click on the file/folder and select Rename.


2. Type the new name and press Enter.
3. Alternatively, select the file and press F2 to rename.

3. Creating a Word Document


On Windows:

1. Open Microsoft Word.


2. Click on Blank Document.
3. Type your content and click File → Save As to save the document.

4. Moving a File or Folder


On Windows & Mac (Drag and Drop Method):

1. Click and hold the file or folder.


2. Drag it to the desired location (e.g., another folder or external drive).
3. Release the mouse button to move it.

Using Cut and Paste:

1. Right-click on the file/folder and choose Cut (Windows) or Command + X (Mac).


2. Navigate to the new location.
3. Right-click and select Paste (Windows) or Command + V (Mac).

5. Copying and Pasting a File


On Windows:

1. Right-click the file and select Copy (or press Ctrl + C).
2. Go to the destination folder and right-click Paste (or press Ctrl + V).

6. Deleting a File
On Windows:

1. Right-click the file and select Delete (or press Del key).
Lucy Wanjiru 16

2. It moves to the Recycle Bin (permanent deletion requires Shift + Delete).

7. Undoing an Action
 Windows: Press Ctrl + Z.

You might also like