Computer Module 1_2
Computer Module 1_2
IT Systems are usually very flexible and can be made to perform a wide range
of different tasks. IT networks allow us to distribute and share information very
quickly.
• Information Society
We live in an “Information Society” where the effective use of information is
regarded as the defining element of the 20th – 21st centuries.
MEMORY:ROM+RAM+CACHE
Page
1
Figure 1.1 Hardware parts of a computer system and their
interactions/cooperation
A computer System
A system is a group of related components and operations that interact to
perform tasks to achieve a common goal.
Parts of a computer System
• Input: Raw data entered electronically and is converted into a form that can
be processed by a computer.
• Processing: Data is manipulated to transform it into information
• Output: Information, which has been processed from data and is usable by
people.
• Storage: Data, information and programs are stored in a computer a form
that a computer can process.
There are many types of computers that are used for a variety of different needs.
Mainframe
Minicomputers
Personal Computer
A network computer is a low-cost version of the PC. NC’s are designed to connect
to and be managed by a central computer (i.e. a mainframe or minicomputer).
Every time the Network Computer is switched on (booted), it retrieves the latest
version of the software it needs from the central computer. Network Computers
tend to have slightly less processing power and storage capacity than PCs and
are substantially less expensive. However, a Network Computer cannot be used
if it is not connected to the central computer. NCs tend to be used in call centers,
help desk, and data processing departments where users do not require the
flexibilities of a PC – but instead need to access central software and information.
One main advantage is that when software requires an upgrade, only the central
computer is updated instead of having to update each individual machine.
Page
3
Portable Computers can be carried around easily and use a Liquid Crystal
Display (LED) and a special re-chargeable battery.
Tablets are mobile computers which, instead of using a keyboard or mouse, use
a touchscreen (which can be activated by a fingertip) or a screen which allows
the use of a stylus or digital pen. They are often used by delivery people or
warehouse stock-takers who would find even a laptop too heavy for their work.
Tablet can also be used to store files, access emails and to surf internet.
A. Input Devices
They are used to feed commands and data into the computer. Some examples of
input devices are:
Keyboard: This is used to enter data into a computer. With keyboard, you can
enter commands, select menu options and enter data/values into applications.
Joystick: A handheld stick that can be moved around in any direction. Used
mainly for playing games.
Touchpad: often used on laptops. With a touchpad, you can move the cursor on
the screen by touching the pad and moving your finger around. The two buttons,
on the touchpad, simulate the use of the buttons of the mouse.
Trackball: Instead of using a mouse, you can also use a trackball. The trackball
generally provides the same functionality as a mouse; however, you do not have
to move the unit, to move the mouse pointer. Instead you can use your thumb
on a roller-ball to move the cursor on the screen.
Graphics Pad: This is a square piece of material that is used to draw pictures.
Voice Input Device: It convert a human speech into digital code by comparing
the electrical patterns stored in a computer
Known as a CPU, CPU is the brain of the computer. CPU is housed inside the
system unit. It interprets and caries out instructions to manipulate the data into
information. It has internal clock that is oscillating at a defined speed, providing
a heartbeat for the processor’s work. The speed of a clock is measured MHz
(million cycles per second), GHz (billion instructions per second) or more
depending on a design of that CPU.
Components of a CPU
• Control Unit: tells the rest of the computer system how to carry out a
program’s instructions, that is, it supervises the entire operations of the
processor. It retrieves instructions from the main memory, breaks each
instructions into series of steps that can be carried out. It controls the
transfer of data between main memory and input/output devices.
Page
5
• Arithmetic Logic Unit: it performs the calculations and logical operations
within the computer.
• Registers: It is the storage location inside the processor; it keeps track of
the overall status of the program that is running, the location of the next
instruction, the location of the current instruction, operands of the
instructions and results.
Because CPU runs more quickly than other components of the computer,
immediate access memory (cache) is usually incorporated as a buffer to maintain
a constant flow of the data to and from the CPU. CPU requires a fan to keep it
cool while the computer is on as CPU’s often generates quite a lot of heat.
There are two main uses of RAM in a computer system: main memory and
cache.
Main Memory (or system memory):Main memory is the largest amount of RAM
installed on the motherboard of the PC. It is use to run software applications and
temporarily store data that is entered by the user. Every piece of software needs
a certain amount of main memory to operate efficiently.
Page
6
Storage devices are designed to retain data and instructions in a relatively
permanent form. After data is entered in a computer, it must be saved as a file
to preserve its contents after the computer is switched of.
Hard disk: Usually fixed inside the computer and stores large volumes of data,
which can be accessed and retrieved quickly.
Floppy disk drive: A floppy disk drive is a hard disk, but with removable disk
called floppies, floppy disks or diskettes. Floppies can be used to transfer small
files from one PC to another (up to 1.4 MB).
ZIP/ JAZ drives are another type of floppy drives that use special disks instead
of floppy disks. Zip disk can hold about 100 times as much as floppy disk. JAZ
disks can hold much more data.
Cables : allow computers to communicate directly with one another, data does
not go via telephone lines.
Systems software is the software that runs the computer-this is usually called
the operating system. Systems software is the term used to describe programs
that enables the computer to function, improve its performance and access the
functionality of the hardware .Microsoft windows is the operating system a lot of
Page
7
people use. However, there are other form of system software such as
Unix,Linex,0S2,BcOS,OS-X(MacOS) and so on.
The operating system makes the computer function following some of the
FUNCTIONS of the operating system
2. Control the hard drives: This includes formatting and defragmenting disks as
well as saving files to and retrieving files from disk.
5. Control external ports. Ports are external connections that enable peripheral
to be connected to the computer. Common types of ports are serial , parallel,
USB.
GUI is designed to simplify the work of the user. The interface consists of
programs and commands represented as presented as little pictures or graphic
symbols called icons.
Applications software includes programs that really do work for the users.
Following are examples of applications software.
Word Processing used for, creating, formatting and checking texts documents.
Examples include Microsoft word, lotus, OpenOffice.org writer, WordPro and
Corel WordPerfect.
Communication: Allows you to send and receive faxes and emails and to also
browse the Internet. Examples of email programs include Microsoft Outlook,
Microsoft Outlook Express, Evolution and Lotus Notes. Examples of Internet
browsers include Microsoft Internet Explorer, Mozilla Firefox and Netscape
Navigator.
• Software Development
The design of IT systems can be a complex process that requires careful planning
and management. Computer professionals develop computer systems. Systems
analysts and programmers are the main people working on systems
development. System analyst is an information specialist who performs system
analysis, design and implementation. Programmers code the actual application
using programming languages (special software for creating applications)
according to the design specifications developed by system analysts. The process
of systems development is a cycle of preliminary investigation, analysis, design,
programming (development), testing, implementation and maintenance. Figure
1.2 shows each stage within the software development (system
development) life cycle.
Page
9
• This is usually the longest
Requirements • The analysis produce a feasibility
stage of the lifecycle. The Preliminary Analysis
Investigation report that defines the requirements
newly developed system is
of the new system and recommends
installed and put into use.
whether or not they can be met.
Data from the old system
• Conduct preliminary System Alternatives may also be suggested
may be converted to use in Operation investigation, propose and
and such as a reduced system to match the
Software
the new system. Feedback Mentenance alternative solutions
desing costs and needs of the project.
is obtained from users to and describe the cost
• Beta versions
Sometimes software is released to public before it has been fully tested.
These pre-release versions of the software are known as Beta Versions.
• Software Bugs
Software programs are often so large and complex, most of the time the
people testing them can’t find all the errors and problems. After a program
has been out for a while, users notice that there are little things wrong
with the software here and there-these things are called bugs. When the
number of bugs found in software increase, a patch, or service pack is
often released. This is a little add-on program that fixes most of the bugs
that people have found.
1.4. NETWORKS
Page
10
There are several benefits to using a network:
• If you have two PCs but only one printer, the PCs can both connect up to
the printer and share it.
• As well as sharing recourses such as printer, PCs on a network can also
share files and data.
• To help people work together better, users can send messages to each
other through their connected computers – this is called electronic mail
or email
1.4.1 Telecommunications
Page
12
fax scans words or pictures on the paper, and sends it down the telephone
line. A fax at the other end receives the information, and prints out an
exact copy of the original.
1.4.2 Internet
• The World Wide Web (www) is the part of the internet consisting of all
the sites (website) that can be accessed using a web browser. In order
for a browser to access a website, the website must contain files that
have a particular format constructed using Hyper Text Markup
Language (HTML).
• Email-refers to the way in which messages can be sent over internet.
• File Transfer Protocol (FTP)-method by which files are transferred
from one computer to another over the internet.
Sometimes the phrases The Internet and World Wide Web are used
interchangeably. However, to strictly correct, the Internet refers to all
computers and cables that make up the network and the World Wide Web
refers to the pages of information that are stored on those computers. The
Internet also sometimes referred to as The Information Superhighway.
To access the Internet (from home), you need a modem (using particular
telecommunication service) and you need to subscribe to a certain Internet
Service Provider (ISP). This is a company that specializes with setting up
Internet connections and provides a username and password. Once you have
connected to the Internet, you can send and receive emails and browse the
World Wide Web using your web browser.
Search Engines
Page
13
There are millions of web pages on the Internet. To browse for information, you
can use a search engine to quickly find what you’re look for. Some examples of
search engines are www.google.com, www.yahoo.com, www.ananzi.co.za,
www.bing.com and so on.
E-commerce
Email can be sent over the Internet to anyone in the world as long as they have
access to the Internet and email software. Email is much quicker than
traditional postal system. An email address identifies the mailbox used by a
user. Email is also useful for sending attachments. An attachment can be any
file, e.g. a Word document, an Excel spreadsheet, a digital photograph etc.
Computers are in common use today as they can be used to process large
amounts of data in short amount of time. Many areas of modern society take
advantage of the power of computing.
Computers at Home
Many people have a PC at home, either for work or entertainment. Some of the
common uses for a home PC are:
Computers in Business
Page
14
• Offices: Companies can use computers to store their records, keep track
of their customers, or even help to run the business
• Shops: Shops and supermarkets use IT on their checkout counters to scan
in the barcode on the item you purchase. This type of that is commonly
used is EPOS (Electronic Point Of Sale).
• Libraries: Libraries usually put barcodes on books to scan when a book is
borrowed or returned. This allows libraries to keep an up-to-date database
of all their stock and monitor which books are out on loan or overdue
Computers in Education
Computers in Industry
Computers in Healthcare
When thinking about the term ‘Information Technology’, often people think of
them physical devices associated with IT. However, information or data is most
the most valuable part of a computer system, because it is the least easily
replaced aspect of IT if lost.
Information security means that computers along with the data stored in them,
need to be protected from natural disaster, acts of sabotage, theft, viruses and
unlawful access.
Page
16
network, the system checks their rights and displays commands, data or
drives accordingly.
• Data Encryption: Data should be encrypted; encryption scrambles the
data and makes it unintelligible without the use of a key. The key is used
to decipher the data.
• Firewalls: A firewall is a first line of defense against hackers. It is a
computer program that is installed on a computer that connects a network
to the internet. The firewall analyses the data that pass in and out of the
network. It is programmed to follow certain rules which enable it to decide
whether or not to allow that data.
Types of Viruses
Page
17
Viruses can spread in the number of ways; five of the common ways are as
follows:
Anti-virus software scans files for pieces of code, called signatures, which it
recognizes as part of a virus. Updating anti-virus software mostly involves
updating the signature file, which it could be done on frequent basis. This has
to be done especially when you receive files from outside sources. No anti-virus
software is perfect; it is only as good as techniques it uses for detecting viruses
and the currency of the signature file. There is always a chance that a virus will
go undetected.
When a virus is detected, the software will attempt to remove the virus. This is
called cleaning or disinfecting. It sometimes happens that the system can detect
the virus but not get rid of it. In this case, you will be usually be given the option
of deleting or quarantining the infected file. When the file is quarantined, it is
made unusable and so unable to spread the virus.
Page
18
Copyright is the legally protected right to publish and distribute any literacy,
musical, artistic or software material, etc. Copyright laws grant the creator the
exclusive right to reproduce, distribute, perform and display the work publicly.
Someone else who wishes to use must obtain written permission.
• RSI: stands for Repetitive strain injury. If you are typing and/or using the
mouse a lot, you can strain the muscles in your hand, arm, and back.
Page
19
Take a short break in every hour whilst using a computer so that your
muscles have time to relax a little. Do not go longer than an hour without
a break.
• Eyes: your eyes can get strained if you have been working on a computer
for a long time without taking a break. Look away from the screen
whenever you can and focus on objects further away. You should also have
adjustable controls on your screen so you can adjust the brightness
contrast etc. Position your computer screen so that any windows that allow
in natural daylight are to the side of you not behind or in front. If you see
a window’s reflection when you look at your screen, use a window blind or
shade to reduce its brightness.
• Temperature: Computers can also generate a small amount of heat and
often make surrounding air feel dry. Ensure that you have an adequate
provision of fresh air via air conditioning or access to window. Fresh air
will also help alleviate tiredness when using a computer for many hours a
day.
• Ergonomics and posture: Ergonomics is the science of designing and
arranging objects, systems and environments so that they are comfortable,
safe and efficient for people to use. Your PC screen should be at a level
where you can see it without leaning forward or backward. You should be
able to adjust your screen tilt, swivel it in any direction. You should have
an adjustable chair that supports your back properly. Check that your
chair provides adequate lower back support. You may consider the use of
a footrest to improve your posture at a desk. The height of your desk
should be suitable for you to sit comfortable at whilst you work using a
computer. Your keyboard should be at level where your arms are parallel
to the floor. Make sure you have enough space on your desk to have your
mouse and keyboard in comfortable position.
• Cables and power adapters: Ensure that the power supply to the
computer and associated devices (such as printer, speakers etc.) is not
overloaded. An overloaded power-supply can cause overheating of power
adapters and may constitute a fire risk. Avoid cable connections that may
cause a health and safety hazard. Ensure that your computer, cables and
power supply units are positioned safety and away from an area where
people may walk.
• Food and drink: with regards to the safe use of IT equipment do not eat
and drink directly at your computer. When liquid is spilt onto a component
of a computer, such as a keyboard, the keys can short cut and the
computer may produce errors signals. Not only does this produce
unwanted input to your system but it can further damage the equipment
if left unattended. Try to avoid eating at your computer as food can become
Page
20
trapped in the keyboard, causing errors during use (some keys may seem
to ‘stick` when typing ).
• General issues: Don’t leave the PC in a place where it will get very hot or
very cold. If you work in a shared environment, remember to log out of
your computer when you are not using it or if you are away from your
computer for a long period of time. When you have finished using your
computer shut it down completely. Try to keep dust away from your
computer as can build-up inside. Keep the area around your computer
tidy.
• Windows is a basis for software creation and can run applications at the
same time allowing users to share information between open
applications.
• More than one application can be running simultaneously (multitasking).
You can switch between multiple applications and copy information from
one application to another.
• Within a single application, more than one file can be used concurrently.
Information can be copied without re-typing it.
• Windows operating system (OS) has user-friendly and powerful interface
for all applications.
• Many accessories can be included within Windows OS.
Working Environment
Operation Action
Click Quickly press and release left button of the mouse
Double-click Click the left mouse button quickly
Page
2
Drag Press and hold down the left mouse button and move
Drag and First drag an object to a particular position then release your
drop left mouse button to drop it (to place that object) at that
position.
Scroll Move a mouse wheel up or down in order to view hidden
information within an open window of a open file or
application. The mouse wheel is normally located between left
and right mouse buttons.
In order to create any document, the keyboard is the most useful computer
hardware component to use. Keyboard is used to enter alphabetical, numeric
or symbolic data into a computer that is called typing. Keyboard is also used
to control a computer machine using special keys.
The keyboard keys are organized or divided into several groups based on
function as follows:
Page
3
SHIFT Press SHIFT in combination with a letter to type in uppercase
(or lowercase) letters. Press SHIFT in combination with a letter
to type the symbol shown on the upper part of that key.
CAPS LOCK Press CAPS LOCK key once to type all letters as uppercase.
Press CAPS LOCK key again to turn off this function. Your
keyboard may have a light indicating whether CAPS LOCK is
on.
TAB key Press the Tab key to move the mouse several spaces forward
when typing. You can also press the Tab key to move to the
next text box in a form.
ENTER key Press ENTER to move the cursor to the beginning of the next
line. ENTER can be used to enter a command.
SPACEBAR Press the SPACEBAR to move the cursor to one space forward.
BACKSPACE Press BACKSPACE to delete character before the cursor, or
selected text.
Delete key Use a delete key to clear characters to the right hand side of
the cursor or selected text. Delete key can also be used to
delete selected files or folders.
• The Title Bar: It is a bar on top of the window which displays the name
of that window.
• Menu bar (Ribbon tabs): Located under the title bar and contains
various menu or tab options.
• Drop-down list: enables you to see other options that you can choose
from.
Page
5
• Option Button: Only one option can be selected at a time.
• Text box enables you to type text
• Check boxes: contain a tick √ , when selected and it enables you to
select more than one option from a group of options.
• Spin Control: enables you to increase or decrease a value.
• Command Buttons: direct a dialog box to perform a specific action.
• Tabs: Some dialog boxes contain tabs at the top and when selected
display different tab pages.
• List Boxes: Contain scroll bars that indicate that not all options are
visible.
• Letters A to Z
• Figures 0 to 9
• Other signs such as $,#,&,@,-,(),%,’,_,~,^,!
• Spaces may be included
• \,/,:,*,?,”,<,>,|
• The following examples are not allowed:
o Computer*Assignment1.doc
o Math(s).5.pdf (only one point is allowed before the extension)
o Research/Studies3.xlsx
Page
6
Examples of File Extensions
Page
7
Local Disk Drive
Folder
File
In order to locate and open any file, Windows needs to know a path that leads to
the location of that file, that path can be called a directory. For example
C:\computing\BEBOLD IBIKA BUSINESS SOCIETY.docx is an absolute
directory showing us that BEBOLD IBIKA BUSINESS SOCIETY.docx file is
located under a folder named computing which is situated under a local disk C-
drive, C: is called a root. In Windows, local disk C is normally the main drive
where the operating system is located, other drives can be denoted by other
letters such D, H,G etc.
Creating a Folder
Folders can be created on various locations in a computer system such as on
Desktop, within another folder, on a USB Flash drive, directly on a local disc
drive etc.
The Cut command is used to move the information to a new location while the
copy command is used to create identical copy of the information keeping the
copied information the original location unmoved.
Page
9
Deleting File or Folder
The information must be deleted only if is unnecessary or for confidentiality
purposes. Before you delete information it is recommended to firstly confirm if it
is no longer necessary and will not be needed in the future. If the information
would be needed in future, firstly back it up in order to keep it safe in a different
location where it could be retrieved back.
Permanently deleted files are cannot be restored easily (you may use special
software called Forensic System to recover them).
Formatting a Disk
After using a removable external storage drive such as USB flash drive, External
Hard Drive or Memory Card before unplugging it from the computer it is
recommended to eject in order to let Windows OS peacefully release that storage.
Pulling a disk may corrupt internal software in a disk called File System. This
software links the external storage device into the computer system. Corrupted
file system would result to a malfunction state in that disk whereby a user may
see a Format Disk popup dialog box. Formatting command in a disk results to
permanently erase all files and folders from that disk.
Formatting a disk can be done on purpose in some cases to ensure that the disk
is clean from viruses or in a manner to avoid sensitive company data from being
disclosed to wrong people.