0% found this document useful (0 votes)
10 views36 pages

Computer Studies Comprehensive Study Notes

The document provides comprehensive notes for Form 1 Computer Studies, covering topics such as the history of computer development, types of computers, their classifications, and uses in various fields. It explains key concepts like data, information, and the evolution of computers through different generations, detailing their characteristics and applications. Additionally, it discusses the advantages and disadvantages of using computers, as well as the components that make up a computer system.

Uploaded by

MORIAS BAZILIO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views36 pages

Computer Studies Comprehensive Study Notes

The document provides comprehensive notes for Form 1 Computer Studies, covering topics such as the history of computer development, types of computers, their classifications, and uses in various fields. It explains key concepts like data, information, and the evolution of computers through different generations, detailing their characteristics and applications. Additionally, it discusses the advantages and disadvantages of using computers, as well as the components that make up a computer system.

Uploaded by

MORIAS BAZILIO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Form 1 computer studies notes

BOOKLET ONE:
FORM 1

COMPUTER STUDIES “comprehensive notes”

‘Understanding computer skills’

©2020, Edition
Compiled by Anock Kanyika (Computer studies, student teacher)
@ Luwinga Secondary School
Form 1 computer studies notes

HISTORY OF COMPUTER DEVELOPMENT


Topic 1: INTRODUCTION TO COMPUTERS
➢ Historical development of computers is traced back to the time
human beings were struggling to invent non electronic tools that
Definition of key terms would simplify arithmetic computations.
Computer Non-electronic computing devices
➢ These are tools that were used to perform arithmetic
➢ A computer is an electronic device that processes data to computations manually or mechanically.
information. Examples
➢ It is electronic because it utilises electrical signals to process ✓ Stones
data. ✓ Sticks
✓ Abacus
✓ Bones
✓ etc.
Abacus
➢ This was a Chinese counting instrument which dates back to
3000 BC.
➢ It has bead-like parts that move along rods.
➢ Each bead above the middle bar stands for five units while each
bead below the middle stands for one unit.

➢ The computer processes data following a set of instructions


called programs.
Input--------------Process---------Output
(Data) (Information)
Data
➢ Refers to raw facts that do not have much meaning to the user.
It may include numbers, letters and symbols

Napier bones
Information ➢ Developed by John Napier, a Scottish mathematician in the
➢ This refers to the processed data that is meaningful to the user. 17thcentury.
➢ Was used for performing multiplication and division
Information Technology (IT)
➢ Refers to the use of hardware, software, and their technologies
to collect, organise, process, secure, store, exchange or
disseminate information.

Communication Technology (CT)


➢ Refers to the use of devices and communication channels to
transmit information correctly, efficiently and cost-effectively.
La Pascaline machine
✓ Is a counting machine that was made by Blaise Pascal in the
Information and Communication Technology (ICT)
17th century
➢ Refers to the integration of communication technologies and
✓ Used for addition and subtraction
information technologies for the purpose of acquiring,
processing, storing, standardising and disseminating information
for public consumption.

Information Systems (IS)


➢ Refers to a set of components that collect, process and deliver
information in a given organisation.
➢ These components include persons, procedures or hardware and
software resources.
Garbage in garbage out (GIGO)
➢ This simply means if erroneous data is entered in a computer and
a command to process it is given, the computer will output
erroneous results. The analytical engine
➢ Thus a computer is not a machine that does things on its own. ✓ Designed by English mathematician, Charles Babbage.
✓ Due to technological limitations Babbage never implemented
it.

1
Form 1 computer studies notes

✓ The engine is recognised as the first real computer and Third generation computers (1964-1970)
Babbage as the father of computing
Characteristics
i. They used electronic devices called integrated circuits (IC's)
ii. An IC consists thousands of smaller transistors packed on a
semiconductor called silicon chip
iii. They emitted less heat
iv. They were smaller in size
v. They were easier to program
vi. They were easy use
vii. They were easier to maintain

ELECTRONIC COMPUTERS AND THEIR GENERATIONS


✓ The age of the modern can be traced back to 1951.
✓ These computers are generally classified into five generations
depending on the technology used to develop them.

First generation computers (1940's to 1958)

Characteristics
i. They were physically large Fourth generation computers (1970 to present)
ii. They used thousands of electronic gadgets called vacuum
tubes or thermionic valves Characteristics
iii. They also consumed a lot of power i. They have Large Scale Integrated and Very Large Scale
iv. They emitted a lot of heat Integrated circuits which make up a microprocessor
v. They constantly broke down ii. They emit very low heat
iii. They are small in size
Examples iv. They are easier to use
v. They are easier to maintain
i. Electronic Numeric Integrator and Calculator (ENIAC)
ii. Electronic Discrete Variable Automatic Computer (EDVAC)
Examples
➢ IBM 370
➢ IBM 4300
➢ Honeywell DPS-88
➢ Burroughs 7700

Second generation computers (1958-1964)

Characteristics
i. Operated using tiny solid-state electronic devices called
transistors. These were smaller than vacuum tubes
Fifth generation computers
ii. They produced less heat
iii. They were much faster
Characteristics
iv. They were smaller in size
i. They have very high processing power and speed
v. They were more reliable
ii. Their size is increasingly becoming smaller
iii. They have special programs that support complex operations
Examples iv. They have artificial intelligence
➢ IBM 1401 v. They can be connected to internet
➢ IBM 7070 vi. They have superior hardware and software
➢ UNIVAC 1107
➢ ATLAS LEO Mark III
➢ Honeywell 200

2
Form 1 computer studies notes

USES OF FIRST COMPUTERS

Computer Features Uses


Generation
1st Built during the Developed during the 1st
Generation 1st world war world war to make
computers (WW1) using certain calculations for
vacuum the construction of a
hydrogen bomb
2nd Built using Used mainly for Analog computers
Generation transistors. scientific, business ➢ These are computers which process continuous data.
computers Had tape applications and ➢ Continuous data is usually represented using a continuous
storage, printer computer games. wave form.
and operating
Analog computers are used in manufacturing process control like
system and
monitoring and regulating furnace temperatures and pressures.
stored
programs ➢ They are also used in other applications like weather station
3 rd
Built using Used for processing store cord and process physical quantities e.g. wind, clouds
Generation integrated more than one peed and temperature
computers circuits and (multitasking)
semiconductors
Computer Features Uses
Generation

4th Built using veryAffordable and used for


Generation large integratedmost applications.
computers circuits Financial applications
characterised byand networks Hybrid computers
microcomputers particularly the internet ➢ These are computers designed to process both analog and
became common. digital data.
5th Today's Used for a large number
Generation computers of applications, in Comparisons of digital and analog computers
computers characterised by particular expert systems ➢ Digital computers are simpler to develop than analog
massive used in decision making. computers
processing ➢ Digital computers are more reliable than analog computers
power and use ➢ Digital computers are smaller in size than analog computers
of artificial of the same functionality
intelligence. ➢ Digital computers consume less power compared to analog
computers.
Topic 2: COMPUTERs AND THEIR USE
CLASSIFICATION OF COMPUTERS
➢ Computers can be classified into either according to size or
➢ Computers are used in almost all aspects of people's lives purpose.
because they are more efficient and accurate.
Classification according to size
TYPESOF COMPUTERS Supercomputers
➢ There are generally three types of computers based on the ➢ These are mainly used for scientific research which requires
data they process. enormous calculations.
Digital computers
➢ These are computers which process discrete data. Characteristics
➢ Discrete data is usually represented using two-state square i. They are fastest, largest, most expensive and most powerful
wave form. computers.
➢ Most modern home appliance such as digital TVs, ii. They are able to perform many complex operations in a
microwaves, wall clocks are digital in nature. fraction of seconds
iii. They are kept in a special room due to their weight
iv. They generate a lot of heat due to their huge processing
power.

Thus, they need special cooling systems

3
Form 1 computer studies notes

Microcomputer
➢ Called microcomputer because its CPU is called
Mainframe computers microprocessor which is very small than that of
➢ These computers are used for processing data and performing minicomputer, mainframe and supercomputer.
complex mathematical calculations. ➢ Commonly used in training and learning institutions, small
➢ They are mostly found in government agencies, big business enterprises, communication centres, etc.
organisations and companies which have large information
processing needs .e.g. banks, hospitals and airports. Characteristics
➢ It is the smallest and cheapest computer
Characteristics ➢ It is least powerful type of a computer.
i. They are powerful and less expensive than super computers
ii. They are big in size
iii. They have large storage capacity and can support a variety of
peripherals.
iv. They handle all kinds of problems (scientific or commercial)

Types of microcomputers
➢ Desktop computer is designed to be placed on to pofan office
desk.
➢ Note book or laptop which is portable.
➢ Palm note or Personal Digital Assistant (PDA) which is small
enough to fit in the pocket.

Mini computers
➢ They are referred to as small-scale mainframe computers.
➢ They are mainly used in scientific laboratories, institutions,
engineering plants and places where processing automation is
required.
➢ They are well adapted for functions like accounting, word
processing, database management and specific industry
applications.

Characteristics
Advantages of using computers
i. They are slightly smaller than mainframes.
i. Computers can work for long hours without getting worn
ii. They support fewer peripheral devices.
out or tired. Computers work automatically and are not
iii. They are not as powerful and fast as the mainframe
subject to exhaustion.
computers.

4
Form 1 computer studies notes

ii. Modern computers have very high processing speeds that (iii)Bookkeeping
translate to efficiency in our work places
Banks
iii. Computers are more accurate unless incorrectly programmed.
➢ Automated Teller Machines (ATM's) enable automation of
iv. Computers have huge storage on auxiliary storage such as
cash deposits and withdrawal services.
hard disk. This saves much of office space for filing.
➢ Computers have also increased efficiency due to better record
v. Computers are capable of processing large amounts of data
keeping and document processing.
from even several users.
vi. The advent of computers has opened up new job
Industries
opportunities that never existed before.
➢ Computers are used to monitor and control industrial
vii. Computers process data far much faster than if the processing
processes
was done manually.
➢ For example, use of robots which perform tasks that are too
Disadvantages of using computers
unpleasant, dangerous or complex and tedious to assign to
i. Sometimes computers can make systems complicated there by
human beings.
requiring a lot of time to be spent on staff training
ii. The computers can fail to work due to an electrical failure, a
Hospitals
hardware/software fault or viruses.
➢ Used to keep patient's records for easy access to a patient's
iii. Lead to loss of jobs since the work which require several
treatment and diagnosis history.
people is done by a single person operating a computer.
➢ Computerised medical devices enable physicians to get
iv. Limited job opportunities as most organisations are using
proper diagnosis of the affected body parts with high
computers in their work systems.
accuracy.
v. Reduced privacy as some people may attempt to have illegal
➢ Computers also control if the support machines in ICU
access to information. This is so due to dynamic growth of
Transport
information technology.
➢ Used to monitor vehicle traffic in busy towns, aircraft
vi. They promote dependency. People are increasingly becoming
navigation and in making reservations.
dependent on computers and information technologies such
that if a computer breaks down they become helpless.
Communication
vii. A computer does the work according to data and command
➢ Integration of computers and telecommunications facilities
given. Thus, if there are errors, the computer processes and
has made message transmission and reception be very fast
outputs erroneous results.
and efficient.
viii. Reduced privacy, People can access confidential data due to
➢ The world is said to have become a global village because of
the dynamic growth of information technologies.
the speed with which information is transmitted around the
world.
AREAS WHERE COMPUTERS ARE USED Law enforcement agencies
➢ Information stored in computers such as finger prints, images
1. FINANCIAL SYSTEMS and other identification details help law enforcers carry out
Financial systems enable organizations to manage their finances. criminal investigation
They include Education
a. Accounting systems ➢ Used in teaching and learning processes through Computer
Accountingsystemsarepopularinbusinessmanagement.Accountingsyste Aided Learning (CAL) and Computer Aided Instruction (CAI).
mssupportedbyfinancialsystemsinclude ➢ E.g. experiments in chemistry or physics can be demonstrated
(i) Customer order entry and billing using special computer program that depict the month screen
➢ It records incoming customer orders through simulation.
➢ Authorities delivery of items or services ordered
➢ Produces invoices for customers who do not pay in advance Domestic and entertainment
or cash basis. ➢ Used at home for recreational activities like watching movies,
(ii) Inventory management playing music and computer games.
➢ Used to keep track of the items in stock and help the ➢ Used in storing personal information, calculating, keeping
management to determine which items to reorder. home budgets and research.
➢ This helps the management to have enough stock at all times
to meet needs of the customers. Library services
➢ Enables library personnel to easily access and keep updated
(iii)Bookkeeping records of books and other library materials.
➢ A financial application (Quick books and Sage) summerises ➢ Library users also use computers to search for titles instead of
financial transactions indicating the amount the business using the manual card catalogue.
makes and the worthiness of the business.
(ii)Inventory management COMPUTER COMPONENTS
➢ It is used to keep track item sin stock and help the
management determine which item store order A computer is made of two main components namely hardware and
➢ This helps the management to have enough stock at all times software.
to meet the needs of the customers. Types of Computer Components
A computer is made of two components;

5
Form 1 computer studies notes

➢ Hardware
➢ Software
Hardware
➢ Refers to physical or tangible components that make up a
computer system.
➢ It classified into four categories
–Input devices
–Central Processing Unit (CPU)
–Output devices
–Storage devices
Software
➢ Refers to a set of instructions that direct a computer on what
to do
➢ Classified into two main categories Mouse
–System software ➢ A pointing device used to execute commands
–Application software ➢ Controls an arrow displayed on the screen.
➢ Moving the mouse moves the arrow/ pointer on the screen.
➢ If the pointer is on the icon, click one of the two mouse
Topic 3: COMPUTER HARDWARE buttons to execute the command.
➢ It looks at hardware elements that make up the computer. ➢ Types of computer mice are;
Standard Mouse
a. Input Devices
➢ Also called traditional mouse
➢ They convert user input which is in human readable form to
machine language •Has;
➢ They can be classified according to method used to enter data –A ball underneath
ie –Two buttons
–Keying devices –Optional scroll button between the left and right buttons
–Pointing devices
–Scanning devices
–Other technologies for data capturing
1. Keying Devices
➢ They convert typed numbers, letters and other special
characters into machine readable form before processing
➢ Types of keying devices are;
i. Traditional Keyboards
➢ They are the commonest type
➢ They are a full sized rigid keyboard
ii. Flexible Keyboards Optical Mouse
➢ They are more portable keyboard ➢ Has no moving parts.
➢ They can be folded and packed in a bag ➢ Works by using a tiny digital camera taking 1,500 pictures
iii. Ergonomic Keyboards every second of the surface where it is resting
➢ They are less common ➢ Interpreting the pictures directs the mouse movement and
➢ They are designed to give comfort and alleviate wrist strain position on the screen
iv. Keypads
➢ These are miniature keyboards
➢ Are used on portable devices eg
–PDAs
–Laptops
–Mobile phones
–Palmtops
–Etc.
v. Braille Keyboards
➢ They are designed to be used by the blind
➢ They consist of keys identified by raised dots. Cordless Mouse
➢ Also called wireless
➢ Is a battery powered mouse that uses radio or infrared waves
➢ Has no physical connection to the system unit

6
Form 1 computer studies notes

➢ A light pen detects the command or item being illuminated


by it.
➢ A stylus is used on PDAs, etc that recognise commands or
hand written data.

Trackball
➢ Works like mouse
➢ But its ball is located at the top
➢ Rotating the ball moves the pointer on the screen
➢ Some computer keyboards have integrated trackballs; no
need for a mouse

Scanning Devices
➢ Scanning means capturing data and converting it into digital
format
➢ SD can be grouped acc. to technology used to capture data;
–Optical scanners
–Magnetic scanners
1. Optical Scanners
➢ Capture data using optical or light technology
➢ As a light beam passes over an object, a software analyses the
Joystick image
➢ Looks like a lever ➢ Examples are;
➢ Used for playing computer games a. Optical Mark/ Bar Recognition Scanners (OMRs)
➢ The user controls game actions by varying the pressure, speed ➢ Detect marks on a piece of paper using ink or soft pencil by
and direction of the joystick passing an infrared beam over them.
➢ Command buttons and triggers issue commands or actions in ➢ Used to mark multiple choice questions
the software ➢ OBRs
➢ Capture data codes as barcodes (lines of varying thickness)
➢ These are Universal Product Code (UPC)
▪ They hold manufacturer’s details

OBRs

Light pen and Stylus

7
Form 1 computer studies notes

3. Digitizers
➢ Also called graphic tablets
➢ Can draw an image using a stylus
➢ The image appears on a computer screen, not a tablet
➢ Used to trace highly detailed engineering & architectural
drawings and designs
Digitizers

OBRs

4. Digital Cameras
➢ Capture images as other cameras do but images are stored in
digital form
➢ Pictures are stored on a memory card instead of a film
➢ Images can be
–Edited
–Printed

b. Optical Character Recognition –Uploaded to the internet


•Used to read typewritten, computer printed or handwritten Digital Camera
characters
•Also changes images into a soft copy that can be manipulated using
a word processor
•A flat-bed is a modern OCR scanner used to capture pictures and
real objects
OCRs

2. Magnetic Scanners
➢ Capture data written using magnetic ink or coded onto a
magnetic strip.
➢ Common examples are;
–Magnetic Ink Character Recognition (MICR) Other Input Technologies
➢ Touch Screen
–Card Readers
➢ User can use a finger or stylus to write or select an item
➢ MICR read characters written with magnetic ink
➢ The screen has infrared light crisscrossing behind it
–E.g. cheque reader
➢ Touching the screen, the finger interrupts light and the output
MICRs
is displayed on the screen
➢ Touch screens are usually used
–In retail stores
–In airports
–On smartphones
–On PDAs
A Touch Screen

8
Form 1 computer studies notes

OUTPUT DEVICES
MICROPHONE
➢ Are peripheral devices a computer uses to give out
➢ A microphone is used to enter data inform of voice into the
information processed from data.
computer.
➢ Can be classified into;
➢ This method is mostly suitable for the physically challenged
–Soft copy
users,
–Hard copy
Limitations of voice input Soft Copy Output Devices
➢ It does not fully support speech related aspects such as- ➢ Soft copy is intangible output that can be heard or seen
i. Accents ➢ Examples of soft copy devices are
ii. Inflections –Visual display units
iii. tones –Sound output devices
–Data projector
NB. To overcome this problem, the system can be trained.
–Light emitting diodes (LEDs)
Microphones Visual Display Units
➢ Also called a monitor or screen
➢ Called monitor coz it helps the user to monitor what is going
on in the computer
➢ Displays information as texts, pictures and videos
➢ There r three common types;
–Cathode Ray Tube (CRT)
–Liquid Crystal Display (LCD)
–Gas Plasma Displays (GPD)
➢ LCD and GPD are also called flat-panel displays
a. Cathode Ray Tube Monitors
➢ Has a long glass tube with an electron gun on one end and a
screen on the other end.
➢ The screen is coated with tiny phosphorus dots
➢ The electron gun shoots electrons to illuminate the screen
➢ The dots consists of three primary colours
–Red
c. Interactive Whiteboards
–Green
➢ Also called smart boards
➢ They are large displays connected to a computer –Blue
➢ The computer display is projected onto the board’s surface ➢ These make a pixel
➢ Users control the computer and write using a pen or finger
on the display
➢ The board is mounted to a wall or on a floor stand
➢ Smart boards are used
–In classrooms
–Corporate boards
–Seminars
Interactive Whiteboards
b. Liquid Crystal Displays Monitors
➢ Is made of special liquid crystals
➢ Unlike CRT, LCD
–Are less bulky
–Consume less power

9
Form 1 computer studies notes

–Have little effect on eyes –Blue


➢ As such, LCDs are gradually replacing CRT monitors on Color Depth
desktop computers ➢ Refers to the number of colors that can be displayed by a
➢ Images suffer from angle distortion though pixel
➢ Two technologies are used to make LCDs ➢ It is measured in bits
Resolution
➢ Is the number of pixels per inch on the screen
➢ It is usually given as dots per inch (dpt) orbits
➢ the higher the resolution, the more the pixels per square inch
➢ Images will be clearer
Refresh Rate
➢ It is when images in the video RAM are used to refresh the
one on the CRT screen.
–Because CRTs cannot hold an image for a long time
➢ If a screen has low Refresh Rate, images flicker
➢ This causes eye strain.
Display Size
➢ Is measured in inches as the diagonal length of the screen
measured from top right to bottom left
VIDEO GRAPHIC ADAPTERS
i. Passive Matrix ➢ A monitor must be connected to a video adapter plugged or
➢ Here LCDs create images by scanning the entire screen integrated on the motherboard to display information
➢ Requires little power ➢ VAs determines the resolution and clarity of the monitor.
➢ Have poor clarity ➢ Examples of Vas include;
ii. Active Matrix Color Graphic Adapter (CGA)
➢ Makes displays using thin film transistor technology. ➢ Is the oldest type of adapters
➢ Hence the name TFTs. ➢ It displays images and text up to 16 colours
➢ They consume more energy than passive matrix Enhanced Graphic Adapters (EGA)
➢ They offer better clarity ➢ Was an improvement of CGAs
c. Gas Plasma Displays ➢ It also displays in 16 colours
➢ They resemble LCDs Video Graphic Array (VGA)
➢ But they use gas not liquid crystals ➢ Displays text, graphics and videos using 256 colours.
➢ They contain millions of pixels illuminated by charged neon Super Video Graphic Array (SVGA)
gas ➢ Displays text and graphics using more than 16 millions colours
➢ Images do not suffer from angle distortion like in LCDs ➢ It has a minimum resolution of 800 x 600 pixels
➢ This technology is currently used to produce Extended Graphic Array (XGA)
–High Definition (HD) TVs ➢ Has a resolution of up to 1024 x 768 pixels
–Wall display screens ➢ It is popular with 17 and 19 inch monitors
Super Extended Graphic Array (SXGA)
➢ Has a resolution of up to 1280 x 1024 pixels
➢ It is popular with 19 and 21 inch monitors
Ultra Extended Graphic Array (UXGA)
➢ It is the latest and highest standard
SOUND OUTPUT DEVICES
➢ Produce sound such as beeps, audio or digital
➢ Some computers come with inbuilt speakers
–So no need to connect external speakers
➢ External speakers’ should be connected to a sound card thru
the jacks on the SU or on a multimedia monitor.

Monitor Display Terminologies


➢ As you work with the three monitors, the following terms are
common
Pixel
➢ Stands for picture elements
➢ They r tiny dots used to form images displayed on the screen
➢ In a color monitor, the pixel has three primary colour
elements ie
–Red
–Green

10
Form 1 computer studies notes

Data Projector b. Daisy wheel printers


➢ Displays output from a computer onto a plain white screen ➢ This has a removable flower-like wheel consisting of spokes
–e.g. a wall or whiteboard. with embossed characters.
➢ It is a creative way of presenting output to audience. ➢ When printing, the wheel is rotated to align the required
➢ This is gradually replacing the traditional overhead projector character and then the character is hit with a hammer

Light Emitting Diodes (LED)


➢ Are indicators that display light when an electric current is Advantages of impact printers
passed thru them i. They are cheaper to run
➢ –E.g. the red or green light on the SU ii. They print for long periods without breaking
➢ Helps the user to know whether it is on or off
➢ Mostly, LED are used to give warnings. Disadvantages of impact printers
Hard Copy Output Devices i. They produce low quality printouts
➢ Hard copy refers to tangible output that can be felt eg paper. ii. They are noisy when printing
➢ Examples of such devices are iii. They are generally slow
–Printers
iv. They cannot print color text or graphics
–Plotters
2. Non-impact printers
Printers
➢ Non-impact printers print using ink, thermal or laser
➢ Primarily used to produce information on paper
mechanisms
➢ The quality of a hard copy depends on the printer's printing
mechanism.
Advantages of non-impact printers
Classification of printers
i. They are faster than impact printers
➢ Printers are classified according to different printing
ii. They are quite than impact printers
mechanisms.
Types of Non-impact printers
➢ The two categories are:-
There are fourty pes of non-impact printers.
1. Impact printers These include: -
2. Non-impact printers a) Inkjet printers
IMPACT PRINTERS
➢ Impact printers print using striking mechanism. b) Thermal printers
➢ This means that they strike the paper in order to form an
imprint on it. c) Laser printers

Examples of impact printers d) Photo printer


a. dot matrix a. inkjet printers
➢ These printers print by spraying tiny ink droplets onto a
b. Daisywheel paper to create an image.
a. Dot matrix ➢ A colour inkjet printer may have black and tricolour
➢ This has a set of pins on the printer’s head cartridge.
Which strikes on an ink ribbon placed over the ➢ This cartridge contains cyan, magenta and yellow (CMY)
Paper. compartments.
➢ The cartridge has nozzles that do the actual spraying of ink
on the paper.

11
Form 1 computer studies notes

Advantages inkjet printers d. Photo printer


i. They are cheaper to purchase
➢ These are special purpose printers designed to print photos.
ii. They produce better quality printouts.
iii. They can print color text and graphics

Disadvantage of inkjet printers


i. They are more expensive to run due to the high coast of
replacing the cartridge.

ii. They are slow


b. Thermal printers
➢ These use thermal technology to heat ink which is normally
in wax or resin form to melting point before fusing it onto
the paper.
➢ They are mostly used in point of sale terminals to print
Factors to consider to consider when purchasing
receipts

i. Print quality:
➢ Dot matrix printers are good for bulk printing of draft
documents
➢ Laser printers are good for printing official documents while
➢ Thermal printers are good for checkout counter receipts.

ii. Initial cost:


➢ Laser and thermal printers are still expensive compared to
inkjet printer
iii. Running cost:
Advantages of thermal printers ➢ The cost of maintaining an inkjet printer is higher than that of
➢ They produce high quality printouts maintaining laser printers
iv. Speed:
Disadvantage of thermal printers
➢ The speed of a printer is measured in terms of the number of
➢ They are more expensive as they use expensive thermal
pages it can print per minute.
c. Laser printers
v. Color printing:
➢ These operate by shining a laser beam to create an image on
a rotating drum. ➢ Most printers support black and colour printing.
➢ As the beam hits the drum, it ionises some regions which
➢ Colour printers especially lasers are relatively
attract ink toner particles.
➢ The toner is then fused onto the piece of paper through ➢ More than expensive.
heating. Useful information
➢ Ensure that all computer products and peripherals purchased
Advantages have the following
➢ They print very fast than inkjet and thermal printers ➢ energy star mark and
➢ They are cheaper to run ➢ National Beaural of standard mark
➢ They produce high quality printouts. ➢ This ensures that the devices are of
➢ good quality and
Disadvantages of Laser printer ➢ efficient in terms of energy consumption and emissions
i. They are expensive to purchase ➢ Environmentally friendly
ii. They are monochrome i.e. print one colour only (except
the expensive ones which print colour)
Plotters

➢ Is a large type of hard copy output device.


➢ Plotters are mostly used for printing geographical,
architectural and engineering drawings.
❖ Examples of drawings include
➢ maps
➢ advertisement posters to be placed on billboards
➢ machine parts

Etc.

12
Form 1 computer studies notes

Secondary storage devices ➢ Writing to a floppy means converting signals into magnetic
spots and storing them onto the available space on the
➢ These are devices that provide alternative long-term storage
diskette.
for programs, data and information.
➢ A computer must have a floppy drive in order to read or
➢ They are also referred to as auxiliary storage.
right contents into a floppy disk.
➢ Regarded as secondary because they aro not directly accessed
by the CPU. Storage capacity

Classification of secondary storage devices ➢ Floppy disks come in different sizes with different storage
➢ 5.25 inch diskette- these were very large in size but with
➢ They are classified according to
lower storage capacities.
(a) Portability as removable and fixed ➢ 3.5 inch diskette- are smaller in size but can hold as much as
2.88 MB
(b) Technology used to store and retrieve data as magnetic, optical,
magneto-optical and solid state

Removable storage

➢ Removable storage media are storage devices that are not


housed inside the computer.
➢ Data is read and written into the media using a drive.
❖ Examples of removable storage
➢ Magnetic tapes
➢ Floppy disks

Optical disks

Solid state devices ➢ The structure of a floppy disk platter


➢ This a circular flexible disk coated with magnetic material.
1. Magnetic tapes
➢ This is seen when a protective casing of floppy disk is
➢ Made using a thin ribbon of myler, coated with a thin layer removed.
of magnetic material composed of iron oxide. ➢ The surface of the disk is divided into tiny invisible concentric
➢ The tape resembles the music cassette used in home tape circles called tracks that store data.
recorders. ➢ The tracks are further divided into units called sectors
➢ The tape may be housed in a plastic cartridge.
➢ Data is read from or written using a tape drive.
❖ Examples of magnetic tapes
➢ Reel to reel tapes
➢ Cassette tapes
➢ Cartridge tapes

3. Zip disks

➢ A zip disk is a high capacity magnetic diskette that resembles a


floppy disk.
➢ A zip disk has a higher storage capacity and is physically
Disadvantages of using magnetic tapes thicker.
➢ Are slow because of the linear storage of data records on the ➢ A zip disk can hold as much as 250 MB of data.
tape. Thus there is need to access the proceeding records ➢ Zip disks mostly come with separate portable external zip
before getting what is required. drives.
➢ A space between successive data records called Inter-Record
Gap (IRG) results in wastage of storage space.

2. Floppy disks

➢ A floppy disk/diskette is made up of a small flexible disk


coated with magnetisable iron oxide.

a. Reading/writing to a floppy diskette

➢ Reading from a diskette means converting magnetic spots of


data from the diskette into signals for retrieval
4. Jaz disks

13
Form 1 computer studies notes

➢ Jaz disks resemble zip disks in every sense only that they can ➢ They are mostly used to store data and information that
hold as much as 2 GB. requires a lot of space. e.g. video clips, software, sounds, etc.
➢ Data is read or written using internal or external jaz drives.
➢ High capacity floppy
➢ Simply known HiFD disks are high capacity diskettes Forms of Compact Disks

5. High capacity floppy i. Compact disk-read only (CD-ROM)


➢ Simply known HiFD disks are high capacity diskettes ➢ This contains data that can only be read but cannot be
➢ They can store up to 200 MB of data. written.
➢ HiFD drive can also read magnetic 1.44 MB diskette. ➢ To record data, the recording surface is made into pits and
lands (bumps)
➢ When a laser beam falls on the land, this is interpreted as 1,
6. Laser Servo 120 Super Disks otherwise a zero is recorded.

➢ Laser Servo 120 Super Disk technology (LS-120) resembles the ii. Compact disk-recordable (CD-R)
3.5 inch diskette
➢ It is coated with special dye which changes colour to
But it uses optical technology represent data when burned using a laser beam.
➢ Once data is burned on a CD-R, it becomes read only.
➢ It has greater storage capacity. It can store up to 240 MB of
data NB: CD-ROMs and CD-Rs are referred to as Write Once Read Many
➢ It has greater speed of data retrieval (WORM). That is, data is only recorded once but can be read as
➢ LS-120 drive can read and write both the 3.5-inch floppy disk many times as possible.
and the 120 MB super disk.
iii. Compact disk-rewritable (CD-RW)
Care of magnetic storage media
➢ This type of compact disk allows the user to record, erase and
❖ To avoid accidental loss of data or information held on rewrite new information.
magnetic media, the following rules must be observed: -
b. Digital Versatile Disks (DVD)
1. Do not expose magnetic media to strong magnetic fields.
➢ It is also known as digital video disk.
➢ This disorients the magnetic dipoles causing erasure of ➢ It resembles compact disks in every aspect but the difference
recorded data. is that it has a higher storage capacity. It can store data up to
17 GB (which is equivalent to twenty five 700 MB CDs).
2. Do not expose a magnetic media to excessive heat.
➢ It is suitable for recording motion pictures such as videos
➢ Heat energy leads to magnetic strength in materials hence because it offers better sound and picture quality than the
magnetically recorded data can easily get lost. CDs.

4. Do not bend or sold a magnetic media or put heavy weights on c. Optical cards
them to avoid breaking or damaging it.
➢ Optical card resembles MICR card but data is read and
3. Do not drop magnetic media on the ground because the impact written optically on a stripe.
weakens magnetism ➢ It is mostly used in banking and other business organisation to
record customer details.
5. Do not touch the magnetic surfaces.

6. Do not remove a media from the drive when it is still being


accessed by the computer. d. Optical tape

➢ This may result to data loss. ➢ It is similar to a magnetic tape only that data is stored on it
by using optical technology.
Optical storage media
Solid state storage media
➢ They are called optical storage media because data is written
and read from them using a laser beam. ➢ This is a non-volatile storage that employs integrated circuits
➢ A laser beam is a very strong concentrated light. rather than mechanical, magnetic or optical technology.
➢ They are called solid state because they do not have movable
Reasons for optical storage media
parts.
➢ They store very large volumes of data. ❖ Examples of solid state storage media
➢ Data stored in them is more stable and more permanent than ➢ Memory sticks
the magnetic media ➢ Flash disks
➢ Examples of optical storage media

a. Compact Disks (CD)

➢ These hold large quantities of data and information.


➢ One disk can hold as much as 700 MB.

14
Form 1 computer studies notes

➢ This is so because they provide efficient data transfer and


large storage capacity.

THE CENTRAL PROCESSING UNIT (CPU)

➢ The Central Processing Unit is also called the Processor


➢ It is the most component of the computer.
➢ Is regarded as the brain of a computer because all processing
activities are carried out inside the processor.
➢ In Microcomputers, the CPU is housed inside the system unit.
Hard Disk ➢ It is mounted on a circuit board called Motherboard or
➢ Hard disk is referred to as fixed disk because traditionally it is
System Board
mounted inside the computer. Functional Elements of the CPU
i. The CPU consists of three functional units namely:-
➢ However, some disks are removable.
➢ The hard disk is also known as a hard drive. ii. The Control Unit (CU)
➢ It is made up of metallic disk platters together with a iii. The Arithmetic and Logic Unit (ALU)
read/write head, housed in a protective metal case.
iv. The Main Memory

➢ The read/write head floats above the surface of the rapidly


rotating disk to read or write data.
i. The Control Unit
➢ Most computer hard disks are connected to the motherboard
➢ It coordinates all processing activities in the CPU as well as
via a channel called a controller.
the following operations:-
➢ Examples of controllers are
–Input
➢ Integrated Drive Electronic (IDE)
➢ Enhanced IDE (EIDE) –Storage
➢ AT attachment (ATA) –Output
➢ It determines which operation or instruction is to be executed
The structure of the disk platters
next.
➢ A hard disk drive consists of one or more metallic platters, ➢ To coordinate these activities, the control unit uses a system
stacked on top of each other but not touching one another. clock.
➢ The stack of platters is attached to a rotating pole called a ➢ The system clock sends electric signals for as its means of
spindle. communication.
➢ It has more than one platter which stacked on top of each ➢ The number of pulses per second determines the speed of
other to form a cylinder. microprocessor i.e.
–The faster the clock pulses, the faster the CPU hence the faster the
computer can process data.
Major functions of the Control Unit
i. Reads the code for the next instruction from the cell
(portion of the memory) indicated by the program
counter.
ii. A program counter is a special register that keeps track of
which location in memory the next instruction is to be
read from.
iii. Interprets the numerical code (binary numbers) for the
instruction into a set of commands or signals for each of
the other systems.
➢ As the disk rotates, read/write head moves in and out over iv. Increments the program counter so that it points to the
the surface to record or read data. next instruction.
➢ Hard disks have gained widespread popularity.

15
Form 1 computer studies notes

➢ Reads whatever data the instruction requires from cells in Types of ROM
memory or perhaps from an input device. ➢ Vary with permanence of instructions stored
➢ The location of this required data is typically stored within ➢ There are four types;
the instruction code. –Mask Read Only Memory
v. Provides the necessary data to an ALU or register.
–Programmable Read Only Memory
vi. If instruction requires an ALU or specialised hardware to
complete, it instructs the hardware to perform the –Erasable Programmable Read Only Memory
requested operation in situations in which instruction –Electrically Erasable Programmable Read Only Memory
requires an ALU or specialised hardware to complete Mask Read Only Memory
vii. Writes the results from the ALU back to a memory location ➢ Abbreviated as MROM
or to a register or perhaps an output device. ➢ Content cannot change once written on it by manufacturer
ii. The Arithmetic and Logical Unit Programmable Read Only Memory
➢ Carries out all arithmetic and logical operations ➢ Abbreviated as PROM
➢ The basic Arithmetic operations are ➢ It allows the user to alter the written contents only once.
–Additions Erasable Programmable Read Only Memory
–Subtraction ➢ Abbreviated as EPROM
➢ It has a transparent quartz window through which its
–Multiplication
contents can be erased.
–Division –This is done by exposing the window to UV light
➢ Logical operations are done by comparing two or more ➢ Once erased it can be reprogrammed for other uses.
values Electrically Erasable Programmable Read Only Memory
➢ E.g. the ALU can compare if a piece of data is ➢ Abbreviated as EEPROM
–Greater than ➢ Can be erased and reprogrammed using electricity.
–Less than –e.g. the memory that stores the basic input/ output system (BIOS)
Characteristics of ROM
–Equal to
i. Can only be read, not written unless it is a special type
–Not equal to ii. It is non-volatile.
–For ALU to process data, it has a special temporary storage ➢ Contents are not lost when the computer is switched off
locations called registers. iii. Stores permanent or semi-permanent instructions from the
Registers manufacturer called firmware.
➢ Are temporary storage locations used by the ALU to do ➢ Can store semi-permanent instructions since some variations
operations of ROM chips can be programmed according to user’s
➢ They hold data just before processing specification.
➢ They also hold results after processing. Random Access Memory (RAM)
The Main Memory ➢ Also known as working Storage
➢ It is a Primary Storage that is directly accessible by the ➢ Called Random Access since it can be read directly despite the
processor sequence in which contents were stored
➢ It is classified into; ➢ Used to hold instructions and data for running applications
–Read Only Memory ➢ Info.. in RAM is always read, changed and removed
➢ Keeps data/ info temporarily
–Random Access Memory
–So store in a more permanent device before switching off the
See Figure Below
computer
Characteristics of RAM
i. Data can be written (stored) and read (retrieved) in it
ii. It is a volatile storage
iii. Its contents are user defined ie
–The user dictates what should be in the RAM
Types of RAM
➢ There are only two;
–Static RAM
–Dynamic RAM
Static RAM (SRAM)
The ROM ➢ Is a fast type of memory
➢ This is used to store programmed instructions and data ➢ It is mostly located inside microprocessor
permanently or semi-permanently ➢ As such, it is used on special purposes memories e.g. Cache
➢ The data and instructions stored in ROM are those that Memory (CM)
remain unchanged for a long time e.g. ➢ Cache Memory enhances the processing speed by holding
–POST instructions data and instructions instantly needed by the processor.
Dynamic RAM (DRAM)
–Special purpose computers and computerised fuel pumps
➢ Is relatively slower type of RAM compared to SRAM
instructions

16
Form 1 computer studies notes

➢ Dynamic refers to the tendency for the stored charge leaks ➢ For example, a number like 2545 has four bytes while words,
away, even with constant power supply My Home has seven bytes since the space between them has
➢ Thus to maintain data storage, DRAM requires periodic 1 byte.
recharging (refresh). ➢ Bytes are formed from bits. 8 bits make 1 byte.
Rambus RAM Expressing memory capacities
➢ This is the latest and fastest RAM in terms of response time. ➢ Memory quantities can be expressed in:
1. Kilobytes (KB)-this is approximately 1000 bytes, but the actual size
Special Purpose Memories
is 1024 bytes. This is because the computer uses base system (0 and
➢ These are included in a microprocessor/ input or output
1; 2
devices
➢ Used to enhance performance 2. Megabytes (MB)
➢ They are; 3. Gigabytes (GB)
–Cache Memory 4. Terabytes
–Buffers Memory
–Register Memory OVERALL FUNCTIONAL ORGANISATION OF THE CPU
Cache Memory ➢ Fig. 3.42 shows a summary of the overall functional
➢ Is fast type of RAM organisation of the CPU and how it controls other computer
➢ There are three types. components.
–Level 1
–Level 2
–Level 3
Level 1
➢ It is also known as a primary cache
➢ It is located inside the microprocessor
Level 2
➢ It also known as external cache
➢ It may be inside the microprocessor or mounted on the
motherboard
Level 3
➢ Is the latest type of cache
➢ It works with L2 to optimize system performance

Buffers
➢ These are special memories found in input/output devices.
➢ Input is held in the input buffer while processed output is ➢ The arithmetic’s and logic unit, the control units and the main
held in output buffer. memory use electrical pathways or links referred to as buses.
➢ E.g. computer printers have buffers where they can store ❖ There are three types of buses namely:
massive documents sent by the CPU for printing. ▪ Control bus: This is the pathway for all timing and
➢ This makes CPU free that it can perform other urgent tasks as controlling functions sent by the control unit to
the printer continues to print in the background. other parts of the system.
Registers ▪ Address bus: This is the pathways used to locate
➢ These hold one piece of data at a time. the storage position in the memory where the next
➢ They are found inside the CPU instruction data to be processed is held.
▪ Data bus: This is the pathways where the actual
Examples of registers data transfer takes place.
i. Accumulator-this temporarily holds the results of the last
processing step of the ALU. TRENDS IN PROCESSOR TECHNOLOGY AND SPEED.
ii. Instruction register-this temporarily holds an instruction
just before it is interpreted into a form that the CPU can ➢ Overtime, manufactures of the microprocessors such Intel,
understand. Advanced Micro Devices (AMD), Cyrix and the former Sun
iii. Address register-temporarily holds the next piece of data Microsystem have several brands of microprocessors in the
waiting to be processed. market.
iv. Storage register-temporarily holds a piece of data that is ➢ Each release seeks to address performance and cost.
on its way to and from the CPU and the main memory. ➢ One parameter used to measure performance is clock speed
measured in Hertz (Hz).
Memory capacities
➢ A hertz is a unit of frequency which measures the number of
➢ Memory and storage capacity is measured in special units
cycles per second in a signal.
called bytes.
➢ A byte is equivalent to a single character.
➢ Characters can be numbers from 0-9, letters A to Z or special
symbols.

17
Form 1 computer studies notes

➢ A processor clock speed can be in Kilohertz (KHz), Megahertz Processor Year Manufacture Speed and remarks
(MHz) and Gigahertz (GHz).
Intel 8086 1997 Intel 5 MHz – 10 MHz
Table 3.1 shows a summary of microprocessors trends since Intel 8088 1979 Intel Similar to 8086
1978. Intel 80186 1980 Intel 25 MHz
Intel 80286 1982 Intel 6-12.5MHz
Intel 80386 1985 – 1990 Intel 16-33MHz
COMMUNICATION DEVICES Intel 80486 1990 Intel Upgradeable
➢ These are devices that enable the communication between Pentium 1993 Intel 60,66,75,90,100,120,133,150,
two or more computers. 166, and 200 MHz
➢ In this section, we will briefly discuss three of such devices Pentium Pro 1995 Intel 150, 166, 180, and 200 MHz’s
Used on servers.
namely: the Network Interference Card (NIC), Modems and
AMD K5 1995 AMD 75, 90, 100, and 116 MHz
Hubs.
Pentium 1997 Intel 166, 200, and 233 MHz with
MMX MMX technology.
Network Interface Card (NIC) Pentium II 1997 Intel Plugged on to single-edge
➢ A network interface card (fig.3.43) is plugged into an empty contact (SEC)
expansion slot on the motherboard. AMD K6 1997 AMD 166-266 MHz
➢ It has ports through which cables from other computers and Cyric 6x86 1997 Cyric 150, 166, or 187 MHz
devices can be plugged. Pentium III 1999 Intel 450 MHz to 1.13 GHz
➢ Data moves from the computer, through the NIC and cables AMD Athron 1999 AMD 500MHz to 2.33GHz
to other devices. AMD Duron 2000 AMD 600 MHz – 1.8 GHz
➢ Today most computers motherboards come together with on Pentium 4 Nov. 2000 Intel 1.4 GHz to 3.2 GHz
board’s networks interface cards Intel Core 2 2006 Intel >1.6GHz x 2
Duo
AMD Athron 2005 AMD >2.0GHz x 2
Duo core

MODEMS
COMPONETS OF THE SYSTEM UNITS
➢ A modem is a device that converts a computer signal from
digital form to analog form and vice versa for purposes of ➢ The system unit has many important components that enable
transmission over analog media like telecommunication the computer to function correctly.
wires. ➢ Some of the components are hidden from the view and can
➢ A modem can be external (fig. 3.44) or built on the only be seen when the system units is opened. Fig. 3.46
motherboard. below identifies some of the most important components of
➢ Improvements in technology have resulted in modems that the system unit.
are smaller in size but very powerful.

HUBS
A hub is a device that connects computers on a network

It relays information from one computer to another on the same


network

Fig.3.45 shows computers connected on a network using a hub.

18
Form 1 computer studies notes

SETTING UP A COMPUTER Parallel interface

❖ Before setting up the computer, you need to know the ➢ Parallel cables transmit information simultaneously using a set of
various parts and cables used to connect it to the mains many conductors (wires)
power supply. ➢ For example if the cable uses 8 lines to transmit data at the same
Power supply unit time, it is said to be 8 bit parallel cable.
➢ Though computers are connected to AC power supply, ➢ The advantages of using such cables is that they transmit data faster
internal components require DC power. over a short distance.
➢ Desktops PCs use power supply units (fig.3.47) mounted on ➢ A parallel cable connects to a parallel interface port commonly
system unit casing. referred to as line printer {LPT}. Parallel cables are used to connect
➢ You connect the power supply to the mains using a power printers, optical scanners amd some removable storage drives such
cable. as zip drive.
➢ The work of the power supply unit is to convert AC to DC.

Serial Interface
➢ Serial interface also known as COM or RS232 ports, support
Ports and interface cables
transmission of data one bit at a time, hence it is slower that the
➢ Peripheral devices are connected to the system unit through
parallel port.
ports using either cables or wireless connectivity.
➢ Although they can support data transmission to devices connected
➢ Looking at the back of your computer, you are likely to see
15 metres away. Serial cable are generally used to connect devices
the ports such as the ones indicated on the figure below
such as the mouse.

19
Form 1 computer studies notes

UNVERSAL SERIAL BUS {USB} INTEFACE Fire wire interface


➢ Fire wire or IEEE 1394 has the same features as the USB but
➢ Universal serial bus is a new standard serial interface that is set to transmit data faster than USB.
replace the conventional parallel and serial cables and ports. ➢ It is mostly used for streaming video from a digital video camera.
➢ Currently, most peripheral devices from printers to mobile phones
are coming with USB as the default interface.
➢ Although it transmits only 1-bit at a time, it provides very high–
speed and quality data transmission over distances of
approximately 5 metres.
➢ Fig. 3.51 shows sample USB cable. There are two types of USBs
namely: low speed and a relatively faster high-speed USB [2.0].
USB port can be used to connect as many as 127 peripheral devices
to computer daisy chained to a single port known as the root hub.

Switching the computer on and off


Small Computer System Interface {SCSI}
➢ Now that you learnt what a computer is and how to safely use it,
➢ Small computer systems interface port and interface cables
it now it me to start working with it. Before you start, the
transmit data in parallel but are faster that the parallel cables.
computer instruction or laboratory technician should assist in
Another advantage of the SCSI port is that one SCSI port allows us
making sure that the keyboard, monitor and mouse are properly
to connect multiple devices.
connected to the system unit.

Personal system 2 {PS/2} Interface


COLD BOOTING A COMPUTER
➢ Originally, most computers used the 5-pin DIN to connect a
➢ Once you turn on the computer, it automatically goes through the
keyboard to the system unit but the smaller 6-pin mini-DIN also
process of self-test and preparation for use
known as PS/2 interface has replaced this technology.
➢ This process is called cold booting or bootup
➢ Currently, most desktop computers come with two PS/2 ports,
➢ Once you turn on the computer, you may hear the sound of the
one for the mouse and the other for the keyboard.
cooler fun running
➢ Fig. 3.52 shows a 5-pin and PS/ connectors showing physical
➢ After a few seconds, lines of text start scrolling up on the screen
difference in size.
➢ This process is referred to as power on self-test (POST)
➢ POST checks the drives, basic input and output devices such as the
keyboards, monitors and the mouse
➢ If a problem is encountered, the process is haulted and an error is
displayed on the screen
➢ POST is accomplished by a special firmware program called the
basic input/output system (BIOS) which is held in a ROM chip
mounted on the motherboard
➢ After POST, the computer reads some instructions such us the
current date and time from a special memory known as
Video graphics array {VGA} Interface complementary metal oxide semiconductor (CMOS)
➢ A video graphic array {VGA} interface is used to connect a monitor ➢ CMOS is powered by a dry cell that mostly resembles that of a
or a data projector. digital watch
➢ It is shaped like a letter D with 15 pins as shown in fig. 3.53. ➢ If the cell is depleted, the computer requires the user to enter the
current date and time.
➢ Lastly, a special type of computer program used to manage
computers; called an operating system is loaded to the computer
memory
SHUTTING DOWN A COMPUTER

➢ It is important that the user follows the correct procedures to


shutting down a computer at all times
➢ If the procedure is not followed, then loss of data, damage of
Audio interface programs and computer components may occur
➢ Audio interface or jacks are used to connect speakers and ➢ To shut down a computer, proceed as follows:
microphone. By convention, the sound input in pink. 1. Ensure that all the work has been properly stored. This
process is called saving

20
Form 1 computer studies notes

2. Close all programs that may be current running ➢ Always switch off computers using correct procedure to avoid
3. If your computer is running on Microsoft windows XP, loss of data and destruction of software.
or Vista or Windows 7 ➢ Computers require stable power supply.
a) Click the start button ➢ Power from mains supply is intermittent and may experience
b) On the start menu, click turn off the computer power surge or under voltage (brownout)
c) On the message box that appears, click turn off. ➢ To protect the computer form being damaged due to power
The computer will undergo the shutdown instabilities, avoid connecting it directly to the main electricity
process supply.
4. For users of the earlier vision of windows, proceed as ➢ Connect it to special device called Uninterruptible Power
follows: Supply (UPS)
a) On the start menu, click shutdown ➢ The UPS provides power in situations where power blackouts
b) In the shutdown message window, select occur.
shutdown and then click OK. ➢ This allows the user to save his/her work and switch off the
computer procedural
Topic 4: SAFE USE OF A COMPUTER
Protection of computers and users
Computers are delicate devices that need to be handled carefully.

The following broad areas need to be carefully considered in order


to protect both computers and users.

1. Security of computer hardware and software

2. Powering the computer on/off

3. Protecting users from hazards

4. Safe disposal of computer components

5. Protection against malware, viruses and worms e. Dust and damp control
1. Measures that protect hardware and software ➢ Dust can be controlled by fitting good window curtains and
a. Burglar proofing the room air conditioning system that filters dust particles from the air
entering the room.
✓ Doors, windows and the roof should be fitted with grills to
deter forceful entry into a computer room. ➢ Computers should also be covered with dust covers when not
in use.
✓ Install an intrusion detection alarm system and employ
security guards to increase the level of security alertness ➢ Dampness or humidity in the lab can be controlled by using
against theft of computers and accessories. dehumidifiers.

b. installing fire prevention and control equipment ➢ High humidity leads to rusting of the computer metallic parts

➢ The recommended extinguishers are the gaseous type. f. Insulating power cables
➢ This is because liquids may cause rusting and corrosion of ➢ Cables and power sockets should be well insulated and be of
computer components. the correct power rating to avoid short circuits that can cause
➢ Powder particles are not recommended because they may damage to computer components.
increase friction and wear of movable parts. They may also
cause disks to crash. g. Avoid taking meals in the laboratory
➢ Protect computer from too high or too low temperatures: ➢ Users should not eat or drink in the computer laboratory.
High temperatures affect the proper functioning of computer
chips. Thus computers should not be placed next to heat ➢ Food particles may fall in moving computer parts like the
emitting machines keyboard and clog them.
➢ Too low temperatures affect functioning of components ➢ Liquids may pour into electrical circuits and cause short
hence do not place computers in over cooled areas like deep circuits.
freezers.
2. Measures that protect users from hazards
c. The room should be well laid out
a. Protection against electric shock
➢ The room should have enough space for movement.
➢ All cables should be insulated to avoid the danger of electric
➢ Computers should be placed on stable, wide desks to avoid
shock to users.
accidentally knocking them down.
➢ Cables should be laid out in trunks away from user paths to ➢ Cables should be laid away from user paths to avoid tripping
avoid people stumbling on them. on them.

d. Powering the computer on/off b. Use of standard furniture

21
Form 1 computer studies notes

➢ Use standard furniture to avoid poor posture which may to


strain injury and limb fatigue.

➢ The table should be of the right height relative to the seat to


provide comfortable hand positioning.

➢ The seat should have an upright backrest and should be high


enough to allow eyes of the user to be level with the top of
the screen.

g. Safe disposal of computer components


➢ Disposal of old computers, monitors, laptop batteries,
printers, e.t.c. poses great risk to the environment.

➢ Chemicals from chips and batteries if damped can leak into


underground water tables and cause contamination. e.g.
chemical cadmium.

➢ It is important to follow the policy of safe disposal of


computer components.

➢ Those that can be recycled should be extracted and taken to


c. Light control
recycling companies.
➢ Use Antiglare screens (light filters) and adjustable screens to
➢ Others should be disposed in agreed sites and following
avoid eye strain and fatigue caused by overbright CRT
proper procedures to avoid environmental pollution.
monitors.
CAUSES OF SOFTWARE AND DATA LOSS
➢ Modern flat panel displays such as LCD do not strain the eye.
➢ Data loss or software loss is the unexpected or accidental loss
of data or software stored in the storage media.

➢ There are many reasons for data loss and these include:-

1. Accidental deletion
➢ Data or software can be lost through faulty procedures which
may lead users to delete data accidentally.

➢ This an unintentional deletion which may go unnoticed for a


long time.

➢ Thus there is need to think carefully before deleting any data


d. Ventilation or program.
➢ Proper ventilation is needed to avoid dizziness caused by lack 2. Malicious deletion
of enough oxygen and to allow computers to cool.
➢ This is an intentionally deletion of data from the system.
➢ The walls of the computer room should not be painted with
overbright reflective oil paints. ➢ This data deleted from the hard disk may be recovered from
the recycle bin (rubbish bin) if it has not been emptied.
➢ The screens should face away from the window.
➢ If the recycle bin is emptied, a data recovery software can be
➢ These help to avoid glare caused by bright background. used to recover the deleted files.
e. Crowding 3. Accidental media format
➢ Overcrowding in the computer is not allowed as it may cause ➢ Users accidentally format their drives which results into
suffocation or spread of communicable diseases. instant loss of data or programs.
f. Environmental hazards ➢ Though it is possible to recover data with the use of data
➢ Computers emit heat and other electromagnetic waves into recovery software.
the environment during their use. 4. Accidental damage
➢ There is need to comply with the Environmental Protection ➢ If a drive or disk is mishandled or accidentally dropped, data
Agency (EPA) energy star policy to encourage minimal use of and software contained in the damaged media may be lost.
power by electronic devices and adhere to acceptable
radiation levels. 5. Natural disaster

22
Form 1 computer studies notes

➢ Natural disasters such as fires, hurricanes, earthquakes can HARMFUL ACT OF COMPUTER VIRUSES
destroy the computer systems leading to loss of data and
➢ Issuing unauthorised command
software.
➢ Deleting data
6. Power failure ➢ Stealing information

➢ Intermittent power supply can lead to both destruction of NOTE: Computer virus makes a computer vulnerable as they take
delicate parts of a computer such as hard disk and unsaved advantage of the computer security and get unauthorised access of
data. computing resources.
7. Hardware failure TYPES OF COMPUTER VIRUSES
➢ Contents of hard disk may become unreadable due to ➢ Computer viruses have many types.
crashing of disk heads ➢ They are generally categorised according to how they
function or how they get access to computing resources.
8. Software failure
➢ When application software suddenly crashes while working, 1. TROJAN HORSE
it may result in severe damage of to hard drive. ➢ This virus appears to do useful desired functions but does
other harmful activities in the background like:
➢ This causes the program to close suddenly leading to loss of
unsaved work or data. i. Stealing data files.
9. Computer viruses ii. Sending files to unauthorised parties.
➢ Computer virus can wreak havoc in computer systems ➢ The virus can be spread by:
causing massive loss of data.
i. Being downloaded by the user
➢ They corrupt the software and data resulting into
unpredictable behaviour. ii. Being installed from removable storage device by oblivious
users.
10. Poor storage of disks
2. WORMS
➢ If disks are not stored properly and are exposed to direct
sunlight, heat or moisture, they stop functioning properly ➢ This virus replicates itself and moves from one computer to
leading to loss of data. another through communication links like:

11. Vandalism i. Bluetooth

➢ Professional hackers can destroy or steal information. ii. Email attachments

➢ Competitors can also access important data from company's iii. Local Area Network (LAN)
account leading to corruption, erasure or loss of vital 3. BOOT SECTOR VIRUS
information.
➢ It attaches itself to the boot strap of the hard disk where it
MEASURES AGAINST LOSS OF DATA AND SOFTWARE also prevents the computer from booting correctly.
i. Burglar proofing the laboratory to prevent thieves from ➢ It is usually spread by removable storage devices.
stealing computers or accessories. 4. MEMORY RESIDENT VIRUS
ii. Physical restrictions to computer laboratory- nobody should ➢ They reside inside the computers Random Access
be allowed into the laboratory without the presence of the Memory(RAM)
properly trained and responsible personnel. ➢ They are first of all set up by the mother virus on the hard
iii. Having fire fighting equipment inside the laboratory and disk but they sustain themselves in RAM even when the
within easy reach. mother program closes.

iv. Dust proofing computers by covering them with a cloth after 5. ROOTKIT VIRUSES
use.
➢ These viruses try to open up a computer for access by
v. vii. Keep all diskettes in disk fackettes, away from heat, external entities.
moisture and direct sunlight. ➢ They try to give unlimited access to the unauthorised
user(similar to a roof user on Linux or Unix system)
vi. Viii. Connect the computers to UPS to prevent data and
➢ Such viruses are sometimes installed by Trojans.
software loss during power surges.
6. MACRO VIRUSES
COMPUTER VIRUSES
➢ These viruses attach themselves to another applications macro
➢ A computer virus is a program that loads itself without
programming code.
permission on the computer and when executed replicates by
➢ Macro code in the application usually enable the user to
making copies inserting itself into other files.
automate most common tasks performed in that application
➢ It can be also be defined as a program that is able to copy
like:
itself when it is running without Permission
i. Saving

23
Form 1 computer studies notes

ii. Printing etc. EXAMPLES OF COMPUTER SOFTWARE

➢ The virus infects the computer as the application is shared ➢ Microsoft windows
between users usually by a word processing and the ➢ Linux
spreadsheet document. ➢ Microsoft office
➢ Adobe Photoshop
7. LOGIC /TIME BOMBS VIRUSES
➢ Adobe illustrator
➢ These types of viruses are programmed to self- ➢ QuickBooks
initiate/originate OR take a particular action on a particular
TYPES OF COMPUTER SOFTWARE
date or when a certain event takes place.
➢ An example is a virus that can be set to delete a data base ➢ In general they are many types of computer software.
table or crash software if a particular employee is fired. ➢ Currently we are supposed to know three ways on how they
➢ Software companies use this features in their trial version are classified: according to;
software where when a certain time period elapses, the
i. Purpose
software asks you for the paid up license otherwise it stops
functioning. ii. Acquisition

8. BACK /TRAP DOORS VIRUSES iii. End user license (EUL)

➢ These viruses are Trojans that open up a security vulnerability I. CLASSIFICATION ACCORDING TO PURPOSE
for unauthorised users to access the computer without the
➢ Computer software may primarily be designed to manage
knowledge of the authorised user.
hardware resources or help the user accomplish specific tasks.
HOW ARE COMPUTER VIRUSES SPREAD ➢ Therefore it may be classified as system or application
software
1. Sharing of the removable storage devices like: disks, flash
disk, and hard drives. a) SYSTEM SOFTWARE

2. Opening emails that are infected then the virus infect the host ➢ This performs a variety of fundamental operations that avails
computers. /helps computer resources to the users. These function
include;
3. Installing weird/strange software on the computer without
validating its source. i. Booting the computer and making sure that all hardware
elements are working properly.
4. Accepting software updates from invalidated sources.
ii. Performing operations such as; retrieving, loading, executing
THE CONTRAL MEASURE/HOW TO PREVENT COMPUTER
and storing application programs.
VIRUSES INFECTION
iii. Storing and retrieving files
➢ They are many ways of reducing the risk of computer virus
infection and controlling or managing their negative effects if iv. Performing a variety of system utility functions (functions that
infected. output something).

1. Avoid sharing removable storage device/media. Where SUBDIVISION OF SYSTEM SOFTWARE


sharing has to take place, scan the media for virus infection before
1. Operating system software
reading files from it.
➢ Is a set of complex programs that work together to control
2. Avoid opening unsolicited fore mails offers or installing
execution of uses programs called applications
software from questionable sources.
➢ It also acts as a go between or an interface between
3. Install good antivirus software. applications, the user and the computer hardware.
➢ It manages input, output, and storage operations in a
➢ Antivirus software reads the digital signature of a
computer like these operating systems; Microsoft windows
virusrecognises it and uses the information to clean it from
(2000, XP, vista), UNIX, Linux, and Macintosh (Mac OS).
computer files.
➢ Most viruses are easy to clean once their signature has been 2. Firmware /stored logic software
recognised.
➢ It is the combination of both software and hardware
➢ However, polymorphic and metamorphic viruses are a bit
recorded permanently on electronic chips.
complicated because they keep on changing their code and
➢ Usually a firmware is a Read Only Memory (ROM) chip
digital signatures every time they replicate to try and evade
mounted or plugged into the motherboard.
or avoid detection.
➢ Firmware may hold an operating system, utility programs
NOTE: antivirus software needs to be regularly to keep in step with and language processors.
new viruses.
3. Utility software
Topic 5: COMPUTER SOFTWARE ➢ It is a special program that performs commonly usedservices
that make certain aspects of computing to go on smoothly
➢ Computer software/program refers to a set of instructions
e.g. sorting, copying, file handling and disk management
that directs the computer on the tasks to perform and how to
➢ There are two basic types of utility software:
perform them.

24
Form 1 computer studies notes

i. System level utility ➢ The developer may bundle more than one but closely related
➢ It helps the user to work with operating system and its software into one package to form a suit or integrated
function software e.g. lotus suite, Microsoft office and Corel word
➢ For instance it tells the user when he or she enters a wrong perfect as opposed to single purpose software e.g.
command and gives suggestion how the error can be QuickBooks, and sage pastel.
corrected.
ii. Application level utility
➢ It makes the application program run more smoothly and NOTE: the word package is sometimes used refer to these types of
efficiently. software that are packaged and sold by vendors.
➢ These are more commonly purchased separately or may be
part of the operating system
ADVANTAGES OF STANDARD SOFTWARE OVER THE IN HOUSE
NOTE: language processors also refers to language translators that
DEVELOPED PROGRAMS
translate a computer written using programming languages into a
form that can be understood by a computer called Machine 1. They can be easily installed and run.
language.
2. They are cheaper than the in house developed software.
➢ These languages are categorised into three ways: assemblers,
3. They are readily available for almost any task.
interpreters, and compilers.
4. They have minor or no error since they are thoroughly
b) APPLICATION SOFTWARE tested.
➢ They are also known as application packages 5. They can be easily be modified to meet a user’s needs.
➢ This refers to programs that are designed to help the user
accomplish the tasks.
➢ The following table gives examples and uses of common DISADVANTAGES OF STARDARD SOFTWARE
application packages
1. They may have some features, not needed by the users,
Software Users Examples which may take extra storage.
Word processors Typing documents Word lotus, word
like letters pro, open office 2. They may require the user to change processes and hardware
writer. for compatibility which may in turn be expensive.
Spreadsheet Calculating Ms excel, lotus 1- 3. They may lack some features required by the user.
budgets 2-3
Desktop Designing Adobe
publishing publications like PageMaker, Ms III. CLASSIFICATION ACCORDING TO THE END-USER
newspaper and publisher, adobe LICENCE (EUL)
books InDesign
➢ The software may be also classified according to End-User-
Computer aided Technical drawing Auto CAD
License as open source, proprietary, or freeware.
design
Data bases Keeping records Ms Access, my- a) OPEN SOURCE/NON-PROPRIETARY
and files SQL, Foxbase,
➢ They refer to software whose source code (programmed set
paradox
of instruction) is freely made to the users.
Graphic software Designing and Corel Draw,
➢ They encourage to use, modify and distribute the modified
manipulating photoshop
product e.g. Linux operating system, Open office are made
graphics
available under General Public License (GPL).

b) PROPRIETARY SOFTWARE
II. CLASSIFICATION ACCORDING TO ACQUISITION
➢ These are software whose source code is hidden from users.
a) IN-HOUSE DEVELOPED SOFTWARE
➢ The modification is only made by the manufacturers.
➢ These are programs that are uniquely designed and tailored ➢ This software’s may be licensed to the users at a fee or
to meet a particular user needs applied freely e.g. Microsoft windows operating system,
➢ For example, a bank may decide to manage its banking adobe PageMaker, CorelDraw.
operations using a unique or special program developed by
c) FREEWARE
hired programmers.
➢ These programs are not available in shops and they not ➢ These are software products that are freely made available to
address the needs of the other users. the user.
➢ However, beware of them because some may be malicious
b) VENDOR OFF-THE-SHELF SOFTWARE
/dangerous software.
➢ Theses software are developed by software engineers,
packaged and then made available for purchase through
vendors, a distributor or directly from the developers.

25
Form 1 computer studies notes

➢ Through processor scheduling, the operating system allocates


Topic 6: OPERATING SYSTEM (OS)
time slice to each ready task.
➢ An operating system is the complex program that is ➢ The CPU switches its attention programs as directed by the
responsible for controlling processing operations in a operating system.
computer system. ➢ The switching is so fast that it appears as if the task is being
executed simultaneously.
IMPORTANCE OF THE OPERATING SYSTEM
CLASSIFICATION ACCORDING TO NUMBER OF USERS
1. It acts as an interface /mediator between the user and the
computer hardware i.e. it sends the message via the operating a) SINGLE USER OPERATING SYSTEM
system which has the capacity to give instructions to the hardware
➢ This is designed for use by only one person; it can not
to perform a particular task.
support more than one person and runs only one user
2. It handles input, output, storage and running other user application program at a time.
programs. ➢ The example include; Palm OS, and Ms-Dos.
NB: without an operating system we can do nothing to the b) MULTI-USER OPERATING SYSTEM
computer
➢ It is also called multi access operating system.
THE GRAPHICAL VIEW ON HOW THE OPERATING SYSTEM ➢ It arrows more than one user to interactively use the
WORKS computer.
➢ For example, server operating system such a windows 2003
server.
USER
➢ They can at the same time be installed on a computer that is
• Runs application programs
accessed by all users in an organization.
➢ Other examples are UNIX, Novell, Windows NT/2000 and
APPLICATION SOFTWARE
Linux.
• Send user request to OS
CLASSIFICATION ACCORDING TO INTERFACE
OPERATING SYSTEM
➢ The term user interface refers to the interaction between the
• Receives and executes the request
user and a computer.
➢ Operating systems can be classified into three categories
HARDWARE according to user interface.
• Receives and does OS command
a) THE COMMAND–LINE USER INTERFACE

EXAMPLES OF OPERATING SYSTEM ➢ It lets the user type at a command prompt.


➢ The computer reads the typed command from the command
➢ Microsoft windows 2000, XP, Vista line and executes it.
➢ UNIX ➢ For a command to be more users friendly the words used
➢ Linux should be descriptive verbs e.g. print and copy etc. and also
➢ Macintosh/Mac OS unique abbreviation can also be used e.g. DEL, REN, CHKDSK
TYPES OF OPERATING SYSTEM etc.
➢ For example, if you are using Ms Dos operating system, you
➢ Operating system can be classified according to: can copy a file called fruits. Dat from a hard disk C to floppy
i. Number of task disk as follows:

ii. Number of users COPY C:\ fruits. Dat A:\

iii. Number of interface

CLASSIFICATION ACCORDING TO NUMBER OF TASKS

a) SINGLE PROGRAM OPERATING SYSTEM


➢ This type allows processing of one application programs in
the main memory at a time.
➢ This means that the user can only run one interactively
program at a time.
➢ The user must exit from the program before loading and
running another program.
➢ An example is Ms Dos from Microsoft Corporation.

b) MULTITASKING OPERATING SYSTEM


b) MENU DRIVEN INTERFACE
➢ This arrows the single CPU to execute what appears to be
more than one application program apparently at the same ➢ It provides the user with a list of options to choose from.
time. ➢ The interface is suitable for the beginners who may have
difficulties recalling commands.

26
Form 1 computer studies notes

➢ Some operating system presents the user with simple menus ➢ Each available resource in a computer is given an
while others have sophisticated menus. identification number called an Interrupt Request (IRQ)
number.
➢ The operating system uses IRQ number to identify the
resources being requested.
➢ Poor allocation of resources would result to undesirable
condition referred to as deadlock.
➢ Deadlock is a situation where a particular job holds a
requested resource and fails to release it, yet it is requesting
for a resource held by the other job.

III. MEMORY MANAGEMENT


➢ Data and instructions entered into the computer are
temporarily held in the main memory before and after
c) THE GRAPHIC USER INTERFACE (GUI)
processing.
➢ This is the latest effort to make the user interface more users ➢ However, since RAM is a scarce resource, the operating
friendly. system determines which tasks remaining in the memory
➢ Besides menu, GUI use of rectangular works called Windows waiting for executions and which one will be kicked out back
and the Graphical objects called icons and the most to secondary storage.
commands are executed using pointing device. ➢ The operating system may organize the main memory into
➢ These features are given an acronym WIMP which stands for blocks of sizes called page frames.
Windows Icons Menus and Pointers. ➢ Processes are equally divided into pieces that can fit into the
➢ Examples are: Microsoft Windows version 2000, XP, and frames called pages.
Vista; Apple Mac OS and various distribution of Linux. ➢ To manage memory, the operating system swaps pages
between the main memory and secondary storage.
➢ Therefore, in terms of memory management, the hard disk
where pages are held is referred to as the virtual memory.

IV. INPUT/OUTPUT MANAGEMENT

➢ Like a skilled traffic officer, the operating system coordinates


between various input/output and other peripheral devices
such as auxiliary storage devices, making sure that data is
transmitted securely.
➢ For example when printing the CPU directs its attention to
the printing function.
➢ The OS searches for a printer, chooses the correct one,
translates the name for CPU and finally the CPU sends the
documents to the printer.
FUNCTION OF AN OPERATING SYSTEM ➢ This makes the CPU available for other activities.

➢ Basically an operating system consist of two main parts V. COMMUNICATION CONTRAL AND MANAGEMENT
namely; ➢ The operating system is responsible for managing various
i. Shell communication devices and provides an environment within
➢ It is the outer part of an operating system used to interact which communication protocols operate.
with operating system. ➢ Protocol refers to the rules that govern communication
ii. Kernel between devices on a network.
➢ Modern operating systems comes with network management
➢ It is the core of operating system regarded as the operating utilities that provides external communication by connecting
system. to a communication system using an interface cable or
I. JOB/PROCESSOR SCHEDULING through wireless interface such as Bluetooth and infrared.

➢ It refers to allocating of each job, waiting for execution, VI. ERROR HANDLING
processor time at the given interval. ➢ The operating system has many ways of alerting the user of
➢ Since a computer may have concurrent processes ready for errors that may arise out of illegal operations, hardware or
execution; so it is the operating system that determines which software failure.
task will be processed first. ➢ Most operating systems express what the error is, and where
➢ The operating system schedules job according to priorities. possible make suggestions on how to correct the errors.
➢ The higher the priority, the higher the likelihood of being ➢ The OS does this by monitoring the status of the computer
allocated CPU time. system and performing audit checks on the users, hardware
II. RESOURCE ALLOCATION and software.

VII. INTERRUPT HANDLING

27
Form 1 computer studies notes

➢ An interrupt is a break from the normal sequential processing Extension File type Description
of instruction in the program. .doc Data A Microsoft word
➢ A critical or very important request causes the current process document file
to attend to it, before returning the control back to the .tif Data A graphic file
process that was initially interrupted created using
application e.g.
FACTORS TO CONSIDER WHEN CHOOSING AN OPERATING
adobe Photoshop
SYSTEM
.txt Data A plain text file
1. The hardware configuration of the computer such as the created using
memory capacity, processor speed, and hard disk capacity. notepad or Dos
editor
2. The type of the computer in terms of the size, and make. For
.exe Application The file that
examples Apple computers would not run on the Microsoft
launches a
operating system.
particular
3. The application software intended for the computer. application e.g.
4. User friendliness of the operating system. winword.exe,
PM.70.exe
5. The documentation available. .bat System File containing a
6. The cost of the operating system. series of the
commands loaded
7. The reliability and security provided by the operating system. during boot up
8. The number of processors and hardware it can support. .sys System System file that
perform
9. The number of users it can support. fundamental
HOW OPERATING SYSTEMS ORGANISE INFORMATION operations in a
computer
➢ The modern operating system differs on how they look and
feel, but they handle information in the same way.
➢ Most operating system organizes information in three tier ii. FOLDERS/DIRECTORIES
hierarchy. ➢ In some operating system, a named storage location where
related files can be stored.
i. Drives ➢ All folders or directories originate from a special directory
ii. Folders called root directory (presented by a back slash ,\)
➢ It may be also created inside another folder or directory
iii. Files called subfolder or subdirectory
i. FILES
iii. DRIVES
➢ It is a collection of related data given a unique namefor ease
➢ The operating system recognises storage media or devices as
access, manipulation and storage on backing storage.
drives.
WHAT IS CONTAINED IN THE FILE ➢ Drives may be given labels such as letters A to Z, to identify

a. A unique name Storage location Drive Remarks


Floppy drive A and B If a computer has two floppy
b. An optional extension.
drives one is named A and
➢ The name and extension are separated by a period (.) e.g. other B.
JUNE.DOC. Hard disk C to F If a computer has four hard
➢ In this case the file name is JUNE and the extension is DOC. drives they are assigned by
➢ The extension are used to identify the type of a file e.g. letters between C and F
➢ Doc is a word processor file Optional drives D, E, F, G If a computer has one hard
➢ Txt is a plain text file disk and three more CD/DVD
➢ Sys is a system file drives they will take up any
letter between D and G
TYPES OF FILE
Other removable D, E, …, Z If a computer does not have
a. SYSTEM FILES storage an optional drive any
removable drive attached to
➢ They contain the information which is critical for the
it can take any letter from D
operating of the computer.
to Z
b. DATA FILES Network drive LOGICAL Network drives takes D to Z
depending on the number of
➢ They contain the user specific data.
the physical drives installed
c. APPLICATION FILES or attached
➢ It holds the programs and are executable.

28
Form 1 computer studies notes

➢ ENTER KEYS (RETURN KEY): pressing this key forces text


Topic 7: using computers
cursor to move to the beginning on the next line.
MASTERING THE KEYBOARD AND THE MOUSE ➢ A cursor is a blinking underscore (_) or the vertical beam (|)
that shows where the next character to be typed will appear
The Keyboard
➢ It is also used to instruct the computer to execute a command
➢ A keyboard is a board with a set of keys used for entering that has been selected o the screen.
data into a computer and typing commands that direct a ➢ TAB KEY: this key is used to move the next cursor at a set of
computer what to do. intervals on the sane line for example 10mm, 20mm.
➢ A keyboard is an input device made up of keys that enables a ➢ THE SPACEBAR: this key creates a space between words
person to communicate to the computer by pressing them. during typing.
➢ The keyboards converts human language into machine ➢ THE BACKSPACE KEY: this key deletes characters from right
language. to left on the same line.
➢ A key is a button on a keyboard which performs a specific
FUNCTION KEYS
task or a range of specific tasks.
➢ These keys are usually located a long the top of the
TYPES OF COMPUTER KEYBOARDS
keyboard.
➢ They are categorized into various criteria which include: ➢ They are labeled F1, F2 up to F12.
1. CLASSIFICATION BY FUNCTION OF EXTRA KEYS ➢ They are used for task that occur frequently in various
➢ The standard keyboard does not have extra multimedia keys. programs.
➢ The multimedia keyboards has extra support multimedia such ➢ For example, pressing F1 key in most programs starts the
as multimedia application launch, volume contral Help Menu.

2. CLASSIFICATION BY ARRANGEMENT OF KEYS CURSOR MOVEMENT AND EDITING KEYS


➢ On the first row of alphabetical keys, AZERTY, QWERTY, ➢ They are used to move the cursor on the screen.
DVORAK, etc. are all keyboards that fall in this category ➢ ARROW KEYS: pressing the right or left arrow key moves the
➢ This time we shall concentrate on the QWERTY keyboard. character to the right or left respectively.
➢ Pressing upward and downwards arrow key moves the cursor
3. LASER KEYBOARD
one line up or down respectively
➢ This is the one of the latest inversion. ➢ PAGE UP AND PAGE DOWN KEY: pressing up the keys
➢ A device projects a keyboard on a flat surface such as table. moves the cursor up one page in case the documents has
➢ The user then types on the projected image just as if they many pages.
were doing it on physical keyboard ➢ Pressing the down key moves the cursor down one page in
case the documents has many pages.
4. FLEXIBLE/ ROLL UP KEYBOARD
➢ HOME AND END KEYS: pressing the home key the cursor to
➢ It can be rolled up and fitted in the bags easily for easier the beginning of the current line.
portability ➢ Pressing the end key moves the cursor to the end of the
current line.
THE KEYBOARD LAYOUT
➢ EDITING KEYS: are used to delete or insert characters in a
➢ Like the type writer, the first writing keys on the upper left of document.
a typing computer keyboard are; QWERTY. ➢ INSERT KEY: this helps the user to insert or replace a
➢ Its commonly referred to as Qwerty keyboard character at the cursor position.
➢ DELETE (Del) KEY: this key deletes characters at the cursor
CLASSIFICATION OF KEYS ON THE KEYBOARD
position from left to right.
➢ They are categorised into five ways namely;
SPECIAL PURPOSE KEY
i. Alphanumeric /typing keys
➢ These keys are used in combination with other keys to give
ii. Functional keys certain commands to a computer.
➢ For example: CTRL+Esc is used to display the start menu.
iii. Cursor movement and editing keys
➢ So the special purpose keys are SHIFT, CTRL, ALT, and Esc.
iv. Special purpose keys
NUMBERING KEYPADS KEYS
v. Numbering keys
➢ It consists of a set of numbers 0 to 9 and the arithmetic signs
ALPHANUMERIC /TYPING KEYS like: + (addition), -(minus), *(multiplication), and /(division).
➢ They are located on the right-hand side of the keyboard.
➢ They are labelled with the alphabet letters from A to Z.
➢ The keypad is meant to help the user to rapidly enter the
➢ Numbers are arranged in line,1, 2, …, 0 and special symbol s
numeric data.
such as ;, :,], % etc.
➢ They can be only used when the num lock, situated on the
➢ It also includes keys like caps lock, enter, tab, space bar, and
numeric keypad , is turned on.
backspace.
➢ But when the num lock is turned off they can only be used as
➢ CAPS LOCK KEY: it lets the user to switch type in the upper
cursor movement and editing keys
and lower case (capital and small letters)

29
Form 1 computer studies notes

NB: it is important to note not all keyboards have the numeric ➢ Touch tutor
keypads. ➢ etc.

➢ For example: portable computers e.g. laptops may lack a GOOD KEYBOARDING POSTURE
separate numeric keypad due to size limitations. ➢ When learning typing using the typing tutor, observe the
following keyboard guidelines.

1. Sit upright with both feet firmly on the ground maintaining


an alert posture.

2. Place the material to be typed on your left in a position you


can read without straining.

3. Rest both hands on the keyboard with fingers resting on


home row keys.

➢ These are keys on which fingers rest during typing on


readiness to place other keys.
➢ Backspace: Deletes backwards
➢ Place the left hand fingers on the (ASDF)and the right hand
➢ Enter: For starting a new line
finger on the semicolon(;),L,K,J with thumb on the space bar.
➢ Shift: For typing CAPITALS
➢ The right &the left thumb should rest on the space bar.
➢ Spacebar: For spaces between words
➢ Delete: Deletes forward Always return your fingers on home row position after striking other
➢ Tab: For starting a paragraph keys.

TYPING 4. Start typing slowly at first.


➢ Do not look at your fingers when typing.
➢ Typing refers to the insertion of text in the word processor or
➢ If you don’t do so you will never learn how to type quickly
any other program or text box.
and accurate.
➢ It is done by simply pressing the respective keys on the
➢ The ultimate goal is to gain typing speed of not less than 30
keyboard.
words per minute.
➢ Some keys, however, have two symbols on them.
➢ To type a symbol that is on the top of a button:

– Hold down Shift

– Press the button or


DELETING TEXT

➢ To delete a text that is on the left of the cursor, use


Backspace key
➢ To delete text that is to the right of the icon, use Delete key

BLIND TYPING AND KEYBOARD POSTURE

➢ The point of blind typing is in having hands dangle in the


middle of the keyboard while the fingers rest on certain keys MOUSE
(home keys).
➢ To enter a letter there is need to reach the appropriate key ➢ A mouse consists of one or more buttons.
with the closest finger. ➢ Some mice include a scroll wheel.
➢ Thumbs are used to press the space bar. ➢ The mouse is the main tool for interactng with the GUI.
➢ The other eight fingers rest in the centre of the keyboard ➢ A standard Personal Computer mouse has two buttons (left
and right buttons)
➢ Whenever one wants to click an icon or anything, s/he uses
the left button unless expressively advised to use the right
button (right-click) Uses
GOOD TYPING POSTURE
A mouse is used for the following:
➢ In order to increase your typing speed & accurate, typing
software offers the lessons one needs to start from using one ➢ Selecting texts or graphics
hand while typing to become a proficient user . ➢ Drawing auto shapes
➢ Some typing software come with different games to make ➢ Pointing at menus
typing more interesting. ➢ Displaying menus
➢ There are many typing softwares available commercially such MOUSE SKILLS
as
➢ Mavens Beacon Teachers Typing, ➢ Moving a mouse on a flat surface, make the pointer on the
➢ Typing Pal, screen to move the same direction as the mouse itself.
➢ Typing Master,

30
Form 1 computer studies notes

➢ To make a selection the pointer must be on the object that is iv. Finally release the mouse button and the item will be
to be selected. dropped in the new location.
➢ After selecting the user can manipulate the object by pressing
a mouse button. PRACTICAL HANDS ON SKILLS
GOOD MOUSE USE ➢ Before starting operating on a computer instructor or
➢ When using a mouse follow these guidelines laboratory technician should assist in making sure that the
keyboard, monitor and mouse are properly connected to the
i. Place a mouse on a flat smooth surface. system unit.
ii. Gently hold the mouse with your right hand, using the thumb IDENTFYING THE POWER BUTTON
and two fingers.
➢ The power button is usually located somewhere on the front
iii. The index finger should rest on the left button while the of the system unit.
middle finger rest on the right button. ➢ Pressing it switches on the computer.

COLD BOOTING A COMPUTER

➢ Once you turn on the computer, it automatically goes


through a process of self-test and preparation for use.
➢ This process is called cold booting or boot up.
➢ Once you turn on the computer, you may hear sound of the
cooler fan running.
➢ After few seconds, lines of text starting scrolling up on the
screen.
➢ This process is called power-on-self-test (POST)
➢ POST checks on the existing drives, basic inputs and outputs
devices such as keyboard, monitor and the mouse.
➢ If a problem encountered, the process is halted and an error
FOUR COMMON MOUSE OPERATIONS message is displayed on the screen.
➢ POST is accomplished by a special firmware program called
1. Clicking
the basic input/output system (BIOS) which is held in ROM
2. Double clicking chip mounted on the mother board.
➢ After POST, the computer reads more instructions such as the
3. Dragging
current time and date from a special memory known as
4. Dropping complementary mental-oxide semiconductor (CMOS).
➢ CMOS is powered by a dry cell that mostly resemble that of a
5. Right clicking
digital watch.
CLICKING ➢ If the cell is down, the computer requires the user to enter
the current data and time.
➢ This means pressing & releasing the left mouse button.
➢ Lastly, a special type of a computer program used to manage
➢ A click often selects an object.
computers called an operating system is loaded to the
DOUBLE CLICKING computer memory.

➢ This means pressing and releasing the left button twice in LOGGING ON AND OFF THE COMPUTER
quick succession.
➢ When the operating system first loads, it requires the user to
➢ Double clicking usually opens the file or starts a program.
authenticate himself or herself by providing the user name
RIGHT CLICKING and the password.
➢ This security feature helps to deter unauthorised person from
➢ Pressing the right hand mouse button once.
using the computer.
➢ This display a list of command called a shortcut menu or
➢ This process is called logging in the computer.
contest sensitive menu.
➢ After a successful log in, the operating system usually presents
➢ It is called contest sensitive menu because the command on it
the user with the first screen called the desktop.
apply to the right clicking item.
➢ If the user wants to leave the computer for a while without
DRAG & DROP switching it off.
➢ It is important to log off the computer to avoid a stranger
➢ This is where the user drags an item from one location on the
using his or her session to perform exploits, simply click the
screen to another.
start button then select the log off button.
➢ This is accomplished by following the procedure below:-
i. Point to the item you want to drag. SHUTTING DOWN THE COMPUTER
ii. Press the left hand mouse button and hold it down.
➢ It is important that the user follows the correct procedures of
iii. Slide a mouse until the pointer reaches the desired
shutting down the computer at all times.
position on the screen.
➢ If the procedure is not followed, then loss of data, damage of
programs and computer componets may occur.

31
Form 1 computer studies notes

The following are the procedure when shutting down the ➢ Windows was first introduced as an operating system in 1985
computer: in response to growing interest in user friendly GUI
i. Ensure that all the work has been properly stored. This environment.
process is called saving
WINDOWS DESKTOP FEATURES
ii. Close all programs that may be currently running.
➢ Once you turn on the computer, windows is loaded into the
iii. If your computer is running on Microsoft windows XP or vista;
main memory and finally the desktop showing that the
a) Click the start button computer is ready for use appears.
➢ The three main features of the desktop are; back ground,
b) On the start menu, click turn off computer.
icons and taskbar.
c) On the message box that appears, turn off, then the computer
will undergo the shutdown process

➢ For users earlier versions proceed as follows;

a) On the start menu, click shut down

b) In the shutdown message windows, select shut down and then


click OK.

BACKGROUND

➢ Background is a work space area on the monitor on which


CREATING USER ACCOUNTS icons and running tasks are placed.
➢ Windows lets the user customise the desktop background by
➢ For users to log in with user name and password, they must
applying favourite themes and wallpapers.
have user account created for them by the system
Administrator. ICONS
➢ It is only the Administrator who has the rights and privileges
➢ Icons are mostly manipulated using pointing device e.g. the
that enable him/her to perform such duties.
mouse
➢ Therefore, before attempting to create user accounts, make
➢ Some of the common icons on the desktop are my computer,
sure that your account has the Administrator privileges or
recycle bin, internet explorer and my documents.
that you log in as an Administrator
TASKBAR
a) Open the control panel window, by clicking the start button then
select the control panel command. ➢ The taskbar enables the user to easily switch between
different programs and tasks that are current running.
b) Double click the user accounts icon then select the manage
➢ Whenever the user starts a program or opens a file, its button
accounts command. This will display all accounts on the computer.
appears on the taskbar and stays there until the user exits the
c) Click, create new account command. Provide a name for the program
account and specify the privileges then click create account button. ➢ The taskbar has at least three main parts
i. Start button: the left most button on the taskbar that the
MANAGING USER ACCOUNTS
user clicks to display the menu button.
➢ While in the user accounts windows, click the icon of account ii. Task manager: this is the band where the buttons of
that you wish to manage. current running tasks are displayed.
➢ This opens the change an account window in which you can ➢ For example, the task manager showing three tasks are
create select commands to; currently running.
➢ You can switch between various tasks by clicking their
a) Change the account name
respective buttons on the task manager.
b) Create the password for the account iii. System stray: this is at the right part of the task manager.
➢ It has icons of task running in the background but are not
c) Delete the account
displayed on the screen.
MICROSOFT WINDOWS ➢ Example are, time and calendar, an antivirus program,
volume control etc.
WINDOWS
➢ To display such a task, simply double click its icon.
➢ Microsoft windows is a graphic user interface operating
system produced by Microsoft.

32
Form 1 computer studies notes

THE START MENU ITERMS ➢ Each in its own way lets you see how storage devices or
locations, files and folders arranged
➢ When you click the start button, a list of choice appears
➢ These tools also enable the user to manipulate files and
called the start menu.
folders
➢ The item on the menu may vary depending on the version of
windows you are using WINDOWS EXPLORER
a) Programs menu
➢ It lets the user to display the drives and folders in a hierarchy
➢ Programs or all programs menu displays a list of programs
or tree structure
installed in the computer
➢ The computer tree is an upside down structure with the
➢ The menu has small solid arrows.
highest level in this case the desktop being the root
➢ When you point the arrow, a submenu called a sidekick
➢ The explorer divides the windows into two panes
menu is displayed.
i. The left pane displays a tree of drives and folders
b) My recent documents
ii. The right pane displays a list of files and subfolders
➢ My recent document lists the last fifteen recently accessed
contained in a particular open drives or folder
files.
➢ To display the explorer using the start menu
➢ You can open any listed files from a storage device by clicking
i. Click start, point the program then accessories
its name provided that device is accessible
ii. Click windows explorer. An explorer window is displayed
c) Control panel
➢ To display the explorer using my computer icon
➢ The control panel is the computer maintenance and
i. Right click on my computer icon
configuration “toolbox”
ii. Click explorer
➢ It provides tools used to maintain and make changes to the
➢ This way is what has been throughout used in form one book
computer setup.
to take care of other versions of windows other than XP.
➢ It is important to not to tamper with this menu because you
may interfere the computer functionality. USING MY COMPUTER
d) Search
➢ Double clicking on my computer icon, gives you a graphical
➢ For example, a search in windows XP helps the user to search
view of of what is inside the computer and this include:
for files or folders in case the user forgets its name or
i. Drives
location.
ii. Control panel
e) Help and support
iii. Other resources
➢ The help command on the start menu, displays detailed
➢ To display files and folders from a particular drive, proceed
information on how to use the operating system and solve
as follows:
some computer related problems in case the computer fails to
i. Double click a drive icon
function properly
➢ A windows appears displaying files and folders stored in the
f) Run
root of the drive in question
➢ It enables the user to:
➢ This root is considered to be the highest of the directory tree
i. install program on the hard disk
where all directories/folders start
ii. Open file and folder from a storage location
ii. Double click the folder to display its contents
iii. Run program from removable media without necessarily
iii. Double click the drive to display its contents
installing it on the hard disk
iv. On this window, you can start manipulating your files and
g) Log off
folders
➢ To log off is to terminate the current user session
➢ To go back or to switch to a new user, the user must log in CREATING A NEW FOLDER
➢ Logging in is a security measure that restrict unauthorized user
➢ They will be time a user would want to create a new folder
from accessing computer resources
➢ For instance when working on a detailed project that has
➢ To login, the user must enter the correct name and password
multiple files
or in some cases use other methods such as fingerprint
➢ It is advisable that all related files be kept together in one
authentication
folder
➢ It prompts a user name and password for one to gain access
➢ To create a new folder proceed as follows:
h) Turn off/ shut down
i. Using my computer icon, display the explorer window
➢ this menu lets the computer shut down, restart, make
ii. On the folder tree on the left pane, select the location in
computer go to standby or hibernation
which you want to create a new folder
➢ Hibernation: saves everything in memory on disk and turns
iii. On the file menu, point to new then click folder.
off the computer
➢ A new folder with a temporary name new folder appears in
➢ Standby: on the other hand, makes the computer consume
the explorer window
less power in idle mode but remain available for immediate
iv. Type a new name for the folder to replace the temporary
use
name, then press enter key or click the icon once.
MANAGING FILES AND FOLDERS USING WINDOWS
NB: To create a subfolder, follow the steps above but you first select
➢ To manipulate files and folders (to control/manage the a folder as a location. To open a folder proceed as follows:
actions of files and folders) you can either use my computer
➢ Just left double click, and the folder will be opened and
icon from the desktop or windows explorer from the start
access what is contained in it.
menu.

33
Form 1 computer studies notes

CREATING A NEW FILE ➢ Scroll buttons and arrows are horizontal and vertical buttons
at the borders of window used to scroll through a long
➢ Depending on the programs installed in your computer, you
document.
can create different types of files such as drawing, text
document etc. SAVING CHANGES TO A FILE
➢ To create a new text document proceed as follows:
➢ After typing the content of a file in the work area, click file
i. Using my computer icon, display the explorer window
and then click saves.
ii. On the folder tree on the left pane, select the location in
➢ Otherwise, if the file will be saved with different names or
which you want to create your file.
location then.
iii. On the file menu, point new
iv. Select a text document from a list available application 1. Click the file menu then save as.
➢ An icon with a temporary name appears in the explorer
2. From the resulting save as dialog box, select where the document
window
is to be saved then type its name.
v. Type a new name for the new file to replace the
temporary name and press the enter key. 3. Click the save button

NB: In windows, file name can contain up to 255 characters RENAMING FILES AND FOLDERS
including spaces but with no special symbols such as \,/,:,*,
➢ Renaming refers to the changing the previous name to a new
?,”,<,>,|,.
name.
APPLICATION WINDOW ➢ To rename a file or a folder proceed as follows:

➢ In order to enter data in the new file just created above, you 1. Using my computer icon, display the explorer window
have it in its application program.
2. On the folder tree on the left pane, select the file or folder.
➢ This can be done by double clicking the file icon
➢ A rectangular area called an application window appear on 3. On the file menu, click rename
the screen such as WordPad screen
4. Type the new name, and then press enter key
PARTS OF AN APPLICATION WINDOW
DELETING FILES AND FOLDERS
a) Tittle bar
➢ In windows, when you delete an item from the hard disk, it
➢ This is a bar across the top of the window that displays the
is temporary held in a special folder called the recycle bin
name of the current application program or task
where it can be restored if necessary
➢ On the right of the tittle bar are three buttons namely:
➢ The recycle bin is a default icon on the desktop and therefore
Minimise buttons: it reduces a window by pressing button which is it cannot be removed
pressed on the task bar
WARNING
The restore/maximise buttons: it stretches the window to cover the
1. One should not attempt to delete system and application files
entire desktop or restore it to its original size.
from the hard disk
The close button: is used to exit an application 2. Items from the removable storage are not held in the recycle
bin and are completely lost.
b) Menu bar
➢ To delete a file or a folder proceed as follows:
➢ Menu bar provide a list of command that can be used to
manipulate the task. For example, to save a document click 1. Using my computer icon, display the explorer window
file, and then save.
2. On the folder tree on the left pane, select the item that is to be
c) Tool bar
deleted
➢ This are button, arranged in a row, which are shortcut to
commands. 3. On the file menu, click delete
d) Work area
4. A message appears on the screen asking whether you actually you
➢ This is the working area where you can create your
want to delete the item.
documents.
e) Status bar 5. Confirm by clicking yes
➢ Thus is an interactive strip at the button of the application
RESTORING DELETED FILES AND FOLDERS
windows that acts as a communication link between the user
and an operating system. ➢ To restore a file or a folder from the recycle bin to its
➢ Such interactive activities include: saving, opening a file, original location, proceed as follows:
printing, cursor position, etc.
1. Double click the recycle bin icon

2. Select the deleted item (items) to be restored


SCROLL BUTTONS AND ARROWS
3. Click files, then restore.
➢ Scrolling is the moving up, down, left or right of a document
EMPTYING THE RECYCLE BIN
windows on the screen if it is too large to fit.
➢ To completely discard files and folders you deleted, you
need to empty the recycle bin.

34
Form 1 computer studies notes

➢ Deleted items take up the same amount of the space they 4. Select the drive or folder where you want your item to be
occupied before you delete them. copied/moved (cut)
➢ To free up that disk space occupied you have;
5. From the edit menu, click paste.
➢ To empty the recycle bin, proceed as follows:
➢ The information or item is pasted to a new location
1. Double click the recycle bin on the desktop
SORTING FILES AND FOLDERS
2. Choose recycle bin from the file menu
➢ Sorting means arranging files and folders in a particular order,
3. Click yes when promoted to confirm detection of the files
either alphabetically or by size or date of the last
NB: you can also delete selected items in the recycle bin by clicking modification or creation
file then delete. ➢ Windows automatically sorts files and folders into alphabetic
order but the user can choose to arrange them otherwise.
COPYING AND MOVING FILES AND FOLDERS
➢ To sort files and folders proceed as follows:
➢ Cut or copy commands are used to move or create a
1. Open a folder or storage location
duplicate of an item respectively
➢ When you cut or copy an item, it is temporary held in the 2. Click view, then point arrange icon by
temporary storage location known as the
MANIPULATING FILES AND FOLDERS USING THE SHORTCUTS
➢ To copy /cut a file or a folder, proceed as follows:
➢ When you right click an item, a shortcut menu is displayed,
1. Using my computer icon, display the explorer window
which provides commands & commonly used to manipulate
2. Select the file or folder to be copied the item.

3. On the edit menu click copy/cut

➢ To copy, move, delete or rename an item proceed as ➢ in case you’re not sure where you stored or the name you
follows: gave the file or folder, use the search menu

1. Right click the file or folder to display its shortcut menu 1. Click start, point to search then click for files or folders

2. On the shortcut menu, click the appropriate command ie. 2. In the search dialog box, specify the search criteria.

i. To copy or move, right click the destination location 3. Click the search button.
then paste
ii. To delete, simply click delete command
iii. To rename, type in a new file name to replace

MANIPULATING FILES AND FOLDERS BY DRAG AND DROP

➢ Another easier way/method of handling files and folders is a


drag and drop
➢ This is done as follows:

1. To copy a file or a folder, hold down the CTRL key while you
drag the icon of the file to a new location

2. To move files from one location to another, on the same drive


but in different folder, simply press down the mouse buttons and
drag the item to new location.
The end
3. To delete any file or folder, drag into the recycle bin This is a complete computer studies pamphlet notes with practical
elements, for form 1. It is based on the current secondary education
4. To copy a file or a folder from one disk to another, simply drag
curriculum of Malawi with effective pedagogical features of teaching
the item ton the destination drive icon eg. From drive C to floppy and learning.
disk
I wish to extend my heartfelt and special thanks to all those who
5. To move an item, hold down the shift key while you drag encouraged in the development of this pamphlet.
SELECTING MULTIPLE FILES Thanks!
➢ If you want to manipulate files and folders at a go, you can
select them by clicking each item while you hold down
control (CTRL) or SHIFT key.
➢ If you want to select all files in an open folder, click edit, then FOR MORE INFORMATION CONTACT ON:
select all +265(0) 996 023 675 (WhatsApp #)
➢ This will highlight all files in the folders. To manipulate
selected items, use menu bar or shortcut. +265(0) 883 755 825

SERCHING FOR FILES AND FOLDERS Email: [email protected]

35

You might also like