Computer Studies Comprehensive Study Notes
Computer Studies Comprehensive Study Notes
BOOKLET ONE:
FORM 1
©2020, Edition
Compiled by Anock Kanyika (Computer studies, student teacher)
@ Luwinga Secondary School
Form 1 computer studies notes
Napier bones
Information ➢ Developed by John Napier, a Scottish mathematician in the
➢ This refers to the processed data that is meaningful to the user. 17thcentury.
➢ Was used for performing multiplication and division
Information Technology (IT)
➢ Refers to the use of hardware, software, and their technologies
to collect, organise, process, secure, store, exchange or
disseminate information.
1
Form 1 computer studies notes
✓ The engine is recognised as the first real computer and Third generation computers (1964-1970)
Babbage as the father of computing
Characteristics
i. They used electronic devices called integrated circuits (IC's)
ii. An IC consists thousands of smaller transistors packed on a
semiconductor called silicon chip
iii. They emitted less heat
iv. They were smaller in size
v. They were easier to program
vi. They were easy use
vii. They were easier to maintain
Characteristics
i. They were physically large Fourth generation computers (1970 to present)
ii. They used thousands of electronic gadgets called vacuum
tubes or thermionic valves Characteristics
iii. They also consumed a lot of power i. They have Large Scale Integrated and Very Large Scale
iv. They emitted a lot of heat Integrated circuits which make up a microprocessor
v. They constantly broke down ii. They emit very low heat
iii. They are small in size
Examples iv. They are easier to use
v. They are easier to maintain
i. Electronic Numeric Integrator and Calculator (ENIAC)
ii. Electronic Discrete Variable Automatic Computer (EDVAC)
Examples
➢ IBM 370
➢ IBM 4300
➢ Honeywell DPS-88
➢ Burroughs 7700
Characteristics
i. Operated using tiny solid-state electronic devices called
transistors. These were smaller than vacuum tubes
Fifth generation computers
ii. They produced less heat
iii. They were much faster
Characteristics
iv. They were smaller in size
i. They have very high processing power and speed
v. They were more reliable
ii. Their size is increasingly becoming smaller
iii. They have special programs that support complex operations
Examples iv. They have artificial intelligence
➢ IBM 1401 v. They can be connected to internet
➢ IBM 7070 vi. They have superior hardware and software
➢ UNIVAC 1107
➢ ATLAS LEO Mark III
➢ Honeywell 200
2
Form 1 computer studies notes
3
Form 1 computer studies notes
Microcomputer
➢ Called microcomputer because its CPU is called
Mainframe computers microprocessor which is very small than that of
➢ These computers are used for processing data and performing minicomputer, mainframe and supercomputer.
complex mathematical calculations. ➢ Commonly used in training and learning institutions, small
➢ They are mostly found in government agencies, big business enterprises, communication centres, etc.
organisations and companies which have large information
processing needs .e.g. banks, hospitals and airports. Characteristics
➢ It is the smallest and cheapest computer
Characteristics ➢ It is least powerful type of a computer.
i. They are powerful and less expensive than super computers
ii. They are big in size
iii. They have large storage capacity and can support a variety of
peripherals.
iv. They handle all kinds of problems (scientific or commercial)
Types of microcomputers
➢ Desktop computer is designed to be placed on to pofan office
desk.
➢ Note book or laptop which is portable.
➢ Palm note or Personal Digital Assistant (PDA) which is small
enough to fit in the pocket.
Mini computers
➢ They are referred to as small-scale mainframe computers.
➢ They are mainly used in scientific laboratories, institutions,
engineering plants and places where processing automation is
required.
➢ They are well adapted for functions like accounting, word
processing, database management and specific industry
applications.
Characteristics
Advantages of using computers
i. They are slightly smaller than mainframes.
i. Computers can work for long hours without getting worn
ii. They support fewer peripheral devices.
out or tired. Computers work automatically and are not
iii. They are not as powerful and fast as the mainframe
subject to exhaustion.
computers.
4
Form 1 computer studies notes
ii. Modern computers have very high processing speeds that (iii)Bookkeeping
translate to efficiency in our work places
Banks
iii. Computers are more accurate unless incorrectly programmed.
➢ Automated Teller Machines (ATM's) enable automation of
iv. Computers have huge storage on auxiliary storage such as
cash deposits and withdrawal services.
hard disk. This saves much of office space for filing.
➢ Computers have also increased efficiency due to better record
v. Computers are capable of processing large amounts of data
keeping and document processing.
from even several users.
vi. The advent of computers has opened up new job
Industries
opportunities that never existed before.
➢ Computers are used to monitor and control industrial
vii. Computers process data far much faster than if the processing
processes
was done manually.
➢ For example, use of robots which perform tasks that are too
Disadvantages of using computers
unpleasant, dangerous or complex and tedious to assign to
i. Sometimes computers can make systems complicated there by
human beings.
requiring a lot of time to be spent on staff training
ii. The computers can fail to work due to an electrical failure, a
Hospitals
hardware/software fault or viruses.
➢ Used to keep patient's records for easy access to a patient's
iii. Lead to loss of jobs since the work which require several
treatment and diagnosis history.
people is done by a single person operating a computer.
➢ Computerised medical devices enable physicians to get
iv. Limited job opportunities as most organisations are using
proper diagnosis of the affected body parts with high
computers in their work systems.
accuracy.
v. Reduced privacy as some people may attempt to have illegal
➢ Computers also control if the support machines in ICU
access to information. This is so due to dynamic growth of
Transport
information technology.
➢ Used to monitor vehicle traffic in busy towns, aircraft
vi. They promote dependency. People are increasingly becoming
navigation and in making reservations.
dependent on computers and information technologies such
that if a computer breaks down they become helpless.
Communication
vii. A computer does the work according to data and command
➢ Integration of computers and telecommunications facilities
given. Thus, if there are errors, the computer processes and
has made message transmission and reception be very fast
outputs erroneous results.
and efficient.
viii. Reduced privacy, People can access confidential data due to
➢ The world is said to have become a global village because of
the dynamic growth of information technologies.
the speed with which information is transmitted around the
world.
AREAS WHERE COMPUTERS ARE USED Law enforcement agencies
➢ Information stored in computers such as finger prints, images
1. FINANCIAL SYSTEMS and other identification details help law enforcers carry out
Financial systems enable organizations to manage their finances. criminal investigation
They include Education
a. Accounting systems ➢ Used in teaching and learning processes through Computer
Accountingsystemsarepopularinbusinessmanagement.Accountingsyste Aided Learning (CAL) and Computer Aided Instruction (CAI).
mssupportedbyfinancialsystemsinclude ➢ E.g. experiments in chemistry or physics can be demonstrated
(i) Customer order entry and billing using special computer program that depict the month screen
➢ It records incoming customer orders through simulation.
➢ Authorities delivery of items or services ordered
➢ Produces invoices for customers who do not pay in advance Domestic and entertainment
or cash basis. ➢ Used at home for recreational activities like watching movies,
(ii) Inventory management playing music and computer games.
➢ Used to keep track of the items in stock and help the ➢ Used in storing personal information, calculating, keeping
management to determine which items to reorder. home budgets and research.
➢ This helps the management to have enough stock at all times
to meet needs of the customers. Library services
➢ Enables library personnel to easily access and keep updated
(iii)Bookkeeping records of books and other library materials.
➢ A financial application (Quick books and Sage) summerises ➢ Library users also use computers to search for titles instead of
financial transactions indicating the amount the business using the manual card catalogue.
makes and the worthiness of the business.
(ii)Inventory management COMPUTER COMPONENTS
➢ It is used to keep track item sin stock and help the
management determine which item store order A computer is made of two main components namely hardware and
➢ This helps the management to have enough stock at all times software.
to meet the needs of the customers. Types of Computer Components
A computer is made of two components;
5
Form 1 computer studies notes
➢ Hardware
➢ Software
Hardware
➢ Refers to physical or tangible components that make up a
computer system.
➢ It classified into four categories
–Input devices
–Central Processing Unit (CPU)
–Output devices
–Storage devices
Software
➢ Refers to a set of instructions that direct a computer on what
to do
➢ Classified into two main categories Mouse
–System software ➢ A pointing device used to execute commands
–Application software ➢ Controls an arrow displayed on the screen.
➢ Moving the mouse moves the arrow/ pointer on the screen.
➢ If the pointer is on the icon, click one of the two mouse
Topic 3: COMPUTER HARDWARE buttons to execute the command.
➢ It looks at hardware elements that make up the computer. ➢ Types of computer mice are;
Standard Mouse
a. Input Devices
➢ Also called traditional mouse
➢ They convert user input which is in human readable form to
machine language •Has;
➢ They can be classified according to method used to enter data –A ball underneath
ie –Two buttons
–Keying devices –Optional scroll button between the left and right buttons
–Pointing devices
–Scanning devices
–Other technologies for data capturing
1. Keying Devices
➢ They convert typed numbers, letters and other special
characters into machine readable form before processing
➢ Types of keying devices are;
i. Traditional Keyboards
➢ They are the commonest type
➢ They are a full sized rigid keyboard
ii. Flexible Keyboards Optical Mouse
➢ They are more portable keyboard ➢ Has no moving parts.
➢ They can be folded and packed in a bag ➢ Works by using a tiny digital camera taking 1,500 pictures
iii. Ergonomic Keyboards every second of the surface where it is resting
➢ They are less common ➢ Interpreting the pictures directs the mouse movement and
➢ They are designed to give comfort and alleviate wrist strain position on the screen
iv. Keypads
➢ These are miniature keyboards
➢ Are used on portable devices eg
–PDAs
–Laptops
–Mobile phones
–Palmtops
–Etc.
v. Braille Keyboards
➢ They are designed to be used by the blind
➢ They consist of keys identified by raised dots. Cordless Mouse
➢ Also called wireless
➢ Is a battery powered mouse that uses radio or infrared waves
➢ Has no physical connection to the system unit
6
Form 1 computer studies notes
Trackball
➢ Works like mouse
➢ But its ball is located at the top
➢ Rotating the ball moves the pointer on the screen
➢ Some computer keyboards have integrated trackballs; no
need for a mouse
Scanning Devices
➢ Scanning means capturing data and converting it into digital
format
➢ SD can be grouped acc. to technology used to capture data;
–Optical scanners
–Magnetic scanners
1. Optical Scanners
➢ Capture data using optical or light technology
➢ As a light beam passes over an object, a software analyses the
Joystick image
➢ Looks like a lever ➢ Examples are;
➢ Used for playing computer games a. Optical Mark/ Bar Recognition Scanners (OMRs)
➢ The user controls game actions by varying the pressure, speed ➢ Detect marks on a piece of paper using ink or soft pencil by
and direction of the joystick passing an infrared beam over them.
➢ Command buttons and triggers issue commands or actions in ➢ Used to mark multiple choice questions
the software ➢ OBRs
➢ Capture data codes as barcodes (lines of varying thickness)
➢ These are Universal Product Code (UPC)
▪ They hold manufacturer’s details
OBRs
7
Form 1 computer studies notes
3. Digitizers
➢ Also called graphic tablets
➢ Can draw an image using a stylus
➢ The image appears on a computer screen, not a tablet
➢ Used to trace highly detailed engineering & architectural
drawings and designs
Digitizers
OBRs
4. Digital Cameras
➢ Capture images as other cameras do but images are stored in
digital form
➢ Pictures are stored on a memory card instead of a film
➢ Images can be
–Edited
–Printed
2. Magnetic Scanners
➢ Capture data written using magnetic ink or coded onto a
magnetic strip.
➢ Common examples are;
–Magnetic Ink Character Recognition (MICR) Other Input Technologies
➢ Touch Screen
–Card Readers
➢ User can use a finger or stylus to write or select an item
➢ MICR read characters written with magnetic ink
➢ The screen has infrared light crisscrossing behind it
–E.g. cheque reader
➢ Touching the screen, the finger interrupts light and the output
MICRs
is displayed on the screen
➢ Touch screens are usually used
–In retail stores
–In airports
–On smartphones
–On PDAs
A Touch Screen
8
Form 1 computer studies notes
OUTPUT DEVICES
MICROPHONE
➢ Are peripheral devices a computer uses to give out
➢ A microphone is used to enter data inform of voice into the
information processed from data.
computer.
➢ Can be classified into;
➢ This method is mostly suitable for the physically challenged
–Soft copy
users,
–Hard copy
Limitations of voice input Soft Copy Output Devices
➢ It does not fully support speech related aspects such as- ➢ Soft copy is intangible output that can be heard or seen
i. Accents ➢ Examples of soft copy devices are
ii. Inflections –Visual display units
iii. tones –Sound output devices
–Data projector
NB. To overcome this problem, the system can be trained.
–Light emitting diodes (LEDs)
Microphones Visual Display Units
➢ Also called a monitor or screen
➢ Called monitor coz it helps the user to monitor what is going
on in the computer
➢ Displays information as texts, pictures and videos
➢ There r three common types;
–Cathode Ray Tube (CRT)
–Liquid Crystal Display (LCD)
–Gas Plasma Displays (GPD)
➢ LCD and GPD are also called flat-panel displays
a. Cathode Ray Tube Monitors
➢ Has a long glass tube with an electron gun on one end and a
screen on the other end.
➢ The screen is coated with tiny phosphorus dots
➢ The electron gun shoots electrons to illuminate the screen
➢ The dots consists of three primary colours
–Red
c. Interactive Whiteboards
–Green
➢ Also called smart boards
➢ They are large displays connected to a computer –Blue
➢ The computer display is projected onto the board’s surface ➢ These make a pixel
➢ Users control the computer and write using a pen or finger
on the display
➢ The board is mounted to a wall or on a floor stand
➢ Smart boards are used
–In classrooms
–Corporate boards
–Seminars
Interactive Whiteboards
b. Liquid Crystal Displays Monitors
➢ Is made of special liquid crystals
➢ Unlike CRT, LCD
–Are less bulky
–Consume less power
9
Form 1 computer studies notes
10
Form 1 computer studies notes
11
Form 1 computer studies notes
i. Print quality:
➢ Dot matrix printers are good for bulk printing of draft
documents
➢ Laser printers are good for printing official documents while
➢ Thermal printers are good for checkout counter receipts.
Etc.
12
Form 1 computer studies notes
Secondary storage devices ➢ Writing to a floppy means converting signals into magnetic
spots and storing them onto the available space on the
➢ These are devices that provide alternative long-term storage
diskette.
for programs, data and information.
➢ A computer must have a floppy drive in order to read or
➢ They are also referred to as auxiliary storage.
right contents into a floppy disk.
➢ Regarded as secondary because they aro not directly accessed
by the CPU. Storage capacity
Classification of secondary storage devices ➢ Floppy disks come in different sizes with different storage
➢ 5.25 inch diskette- these were very large in size but with
➢ They are classified according to
lower storage capacities.
(a) Portability as removable and fixed ➢ 3.5 inch diskette- are smaller in size but can hold as much as
2.88 MB
(b) Technology used to store and retrieve data as magnetic, optical,
magneto-optical and solid state
Removable storage
Optical disks
3. Zip disks
2. Floppy disks
13
Form 1 computer studies notes
➢ Jaz disks resemble zip disks in every sense only that they can ➢ They are mostly used to store data and information that
hold as much as 2 GB. requires a lot of space. e.g. video clips, software, sounds, etc.
➢ Data is read or written using internal or external jaz drives.
➢ High capacity floppy
➢ Simply known HiFD disks are high capacity diskettes Forms of Compact Disks
➢ Laser Servo 120 Super Disk technology (LS-120) resembles the ii. Compact disk-recordable (CD-R)
3.5 inch diskette
➢ It is coated with special dye which changes colour to
But it uses optical technology represent data when burned using a laser beam.
➢ Once data is burned on a CD-R, it becomes read only.
➢ It has greater storage capacity. It can store up to 240 MB of
data NB: CD-ROMs and CD-Rs are referred to as Write Once Read Many
➢ It has greater speed of data retrieval (WORM). That is, data is only recorded once but can be read as
➢ LS-120 drive can read and write both the 3.5-inch floppy disk many times as possible.
and the 120 MB super disk.
iii. Compact disk-rewritable (CD-RW)
Care of magnetic storage media
➢ This type of compact disk allows the user to record, erase and
❖ To avoid accidental loss of data or information held on rewrite new information.
magnetic media, the following rules must be observed: -
b. Digital Versatile Disks (DVD)
1. Do not expose magnetic media to strong magnetic fields.
➢ It is also known as digital video disk.
➢ This disorients the magnetic dipoles causing erasure of ➢ It resembles compact disks in every aspect but the difference
recorded data. is that it has a higher storage capacity. It can store data up to
17 GB (which is equivalent to twenty five 700 MB CDs).
2. Do not expose a magnetic media to excessive heat.
➢ It is suitable for recording motion pictures such as videos
➢ Heat energy leads to magnetic strength in materials hence because it offers better sound and picture quality than the
magnetically recorded data can easily get lost. CDs.
4. Do not bend or sold a magnetic media or put heavy weights on c. Optical cards
them to avoid breaking or damaging it.
➢ Optical card resembles MICR card but data is read and
3. Do not drop magnetic media on the ground because the impact written optically on a stripe.
weakens magnetism ➢ It is mostly used in banking and other business organisation to
record customer details.
5. Do not touch the magnetic surfaces.
➢ This may result to data loss. ➢ It is similar to a magnetic tape only that data is stored on it
by using optical technology.
Optical storage media
Solid state storage media
➢ They are called optical storage media because data is written
and read from them using a laser beam. ➢ This is a non-volatile storage that employs integrated circuits
➢ A laser beam is a very strong concentrated light. rather than mechanical, magnetic or optical technology.
➢ They are called solid state because they do not have movable
Reasons for optical storage media
parts.
➢ They store very large volumes of data. ❖ Examples of solid state storage media
➢ Data stored in them is more stable and more permanent than ➢ Memory sticks
the magnetic media ➢ Flash disks
➢ Examples of optical storage media
14
Form 1 computer studies notes
15
Form 1 computer studies notes
➢ Reads whatever data the instruction requires from cells in Types of ROM
memory or perhaps from an input device. ➢ Vary with permanence of instructions stored
➢ The location of this required data is typically stored within ➢ There are four types;
the instruction code. –Mask Read Only Memory
v. Provides the necessary data to an ALU or register.
–Programmable Read Only Memory
vi. If instruction requires an ALU or specialised hardware to
complete, it instructs the hardware to perform the –Erasable Programmable Read Only Memory
requested operation in situations in which instruction –Electrically Erasable Programmable Read Only Memory
requires an ALU or specialised hardware to complete Mask Read Only Memory
vii. Writes the results from the ALU back to a memory location ➢ Abbreviated as MROM
or to a register or perhaps an output device. ➢ Content cannot change once written on it by manufacturer
ii. The Arithmetic and Logical Unit Programmable Read Only Memory
➢ Carries out all arithmetic and logical operations ➢ Abbreviated as PROM
➢ The basic Arithmetic operations are ➢ It allows the user to alter the written contents only once.
–Additions Erasable Programmable Read Only Memory
–Subtraction ➢ Abbreviated as EPROM
➢ It has a transparent quartz window through which its
–Multiplication
contents can be erased.
–Division –This is done by exposing the window to UV light
➢ Logical operations are done by comparing two or more ➢ Once erased it can be reprogrammed for other uses.
values Electrically Erasable Programmable Read Only Memory
➢ E.g. the ALU can compare if a piece of data is ➢ Abbreviated as EEPROM
–Greater than ➢ Can be erased and reprogrammed using electricity.
–Less than –e.g. the memory that stores the basic input/ output system (BIOS)
Characteristics of ROM
–Equal to
i. Can only be read, not written unless it is a special type
–Not equal to ii. It is non-volatile.
–For ALU to process data, it has a special temporary storage ➢ Contents are not lost when the computer is switched off
locations called registers. iii. Stores permanent or semi-permanent instructions from the
Registers manufacturer called firmware.
➢ Are temporary storage locations used by the ALU to do ➢ Can store semi-permanent instructions since some variations
operations of ROM chips can be programmed according to user’s
➢ They hold data just before processing specification.
➢ They also hold results after processing. Random Access Memory (RAM)
The Main Memory ➢ Also known as working Storage
➢ It is a Primary Storage that is directly accessible by the ➢ Called Random Access since it can be read directly despite the
processor sequence in which contents were stored
➢ It is classified into; ➢ Used to hold instructions and data for running applications
–Read Only Memory ➢ Info.. in RAM is always read, changed and removed
➢ Keeps data/ info temporarily
–Random Access Memory
–So store in a more permanent device before switching off the
See Figure Below
computer
Characteristics of RAM
i. Data can be written (stored) and read (retrieved) in it
ii. It is a volatile storage
iii. Its contents are user defined ie
–The user dictates what should be in the RAM
Types of RAM
➢ There are only two;
–Static RAM
–Dynamic RAM
Static RAM (SRAM)
The ROM ➢ Is a fast type of memory
➢ This is used to store programmed instructions and data ➢ It is mostly located inside microprocessor
permanently or semi-permanently ➢ As such, it is used on special purposes memories e.g. Cache
➢ The data and instructions stored in ROM are those that Memory (CM)
remain unchanged for a long time e.g. ➢ Cache Memory enhances the processing speed by holding
–POST instructions data and instructions instantly needed by the processor.
Dynamic RAM (DRAM)
–Special purpose computers and computerised fuel pumps
➢ Is relatively slower type of RAM compared to SRAM
instructions
16
Form 1 computer studies notes
➢ Dynamic refers to the tendency for the stored charge leaks ➢ For example, a number like 2545 has four bytes while words,
away, even with constant power supply My Home has seven bytes since the space between them has
➢ Thus to maintain data storage, DRAM requires periodic 1 byte.
recharging (refresh). ➢ Bytes are formed from bits. 8 bits make 1 byte.
Rambus RAM Expressing memory capacities
➢ This is the latest and fastest RAM in terms of response time. ➢ Memory quantities can be expressed in:
1. Kilobytes (KB)-this is approximately 1000 bytes, but the actual size
Special Purpose Memories
is 1024 bytes. This is because the computer uses base system (0 and
➢ These are included in a microprocessor/ input or output
1; 2
devices
➢ Used to enhance performance 2. Megabytes (MB)
➢ They are; 3. Gigabytes (GB)
–Cache Memory 4. Terabytes
–Buffers Memory
–Register Memory OVERALL FUNCTIONAL ORGANISATION OF THE CPU
Cache Memory ➢ Fig. 3.42 shows a summary of the overall functional
➢ Is fast type of RAM organisation of the CPU and how it controls other computer
➢ There are three types. components.
–Level 1
–Level 2
–Level 3
Level 1
➢ It is also known as a primary cache
➢ It is located inside the microprocessor
Level 2
➢ It also known as external cache
➢ It may be inside the microprocessor or mounted on the
motherboard
Level 3
➢ Is the latest type of cache
➢ It works with L2 to optimize system performance
Buffers
➢ These are special memories found in input/output devices.
➢ Input is held in the input buffer while processed output is ➢ The arithmetic’s and logic unit, the control units and the main
held in output buffer. memory use electrical pathways or links referred to as buses.
➢ E.g. computer printers have buffers where they can store ❖ There are three types of buses namely:
massive documents sent by the CPU for printing. ▪ Control bus: This is the pathway for all timing and
➢ This makes CPU free that it can perform other urgent tasks as controlling functions sent by the control unit to
the printer continues to print in the background. other parts of the system.
Registers ▪ Address bus: This is the pathways used to locate
➢ These hold one piece of data at a time. the storage position in the memory where the next
➢ They are found inside the CPU instruction data to be processed is held.
▪ Data bus: This is the pathways where the actual
Examples of registers data transfer takes place.
i. Accumulator-this temporarily holds the results of the last
processing step of the ALU. TRENDS IN PROCESSOR TECHNOLOGY AND SPEED.
ii. Instruction register-this temporarily holds an instruction
just before it is interpreted into a form that the CPU can ➢ Overtime, manufactures of the microprocessors such Intel,
understand. Advanced Micro Devices (AMD), Cyrix and the former Sun
iii. Address register-temporarily holds the next piece of data Microsystem have several brands of microprocessors in the
waiting to be processed. market.
iv. Storage register-temporarily holds a piece of data that is ➢ Each release seeks to address performance and cost.
on its way to and from the CPU and the main memory. ➢ One parameter used to measure performance is clock speed
measured in Hertz (Hz).
Memory capacities
➢ A hertz is a unit of frequency which measures the number of
➢ Memory and storage capacity is measured in special units
cycles per second in a signal.
called bytes.
➢ A byte is equivalent to a single character.
➢ Characters can be numbers from 0-9, letters A to Z or special
symbols.
17
Form 1 computer studies notes
➢ A processor clock speed can be in Kilohertz (KHz), Megahertz Processor Year Manufacture Speed and remarks
(MHz) and Gigahertz (GHz).
Intel 8086 1997 Intel 5 MHz – 10 MHz
Table 3.1 shows a summary of microprocessors trends since Intel 8088 1979 Intel Similar to 8086
1978. Intel 80186 1980 Intel 25 MHz
Intel 80286 1982 Intel 6-12.5MHz
Intel 80386 1985 – 1990 Intel 16-33MHz
COMMUNICATION DEVICES Intel 80486 1990 Intel Upgradeable
➢ These are devices that enable the communication between Pentium 1993 Intel 60,66,75,90,100,120,133,150,
two or more computers. 166, and 200 MHz
➢ In this section, we will briefly discuss three of such devices Pentium Pro 1995 Intel 150, 166, 180, and 200 MHz’s
Used on servers.
namely: the Network Interference Card (NIC), Modems and
AMD K5 1995 AMD 75, 90, 100, and 116 MHz
Hubs.
Pentium 1997 Intel 166, 200, and 233 MHz with
MMX MMX technology.
Network Interface Card (NIC) Pentium II 1997 Intel Plugged on to single-edge
➢ A network interface card (fig.3.43) is plugged into an empty contact (SEC)
expansion slot on the motherboard. AMD K6 1997 AMD 166-266 MHz
➢ It has ports through which cables from other computers and Cyric 6x86 1997 Cyric 150, 166, or 187 MHz
devices can be plugged. Pentium III 1999 Intel 450 MHz to 1.13 GHz
➢ Data moves from the computer, through the NIC and cables AMD Athron 1999 AMD 500MHz to 2.33GHz
to other devices. AMD Duron 2000 AMD 600 MHz – 1.8 GHz
➢ Today most computers motherboards come together with on Pentium 4 Nov. 2000 Intel 1.4 GHz to 3.2 GHz
board’s networks interface cards Intel Core 2 2006 Intel >1.6GHz x 2
Duo
AMD Athron 2005 AMD >2.0GHz x 2
Duo core
MODEMS
COMPONETS OF THE SYSTEM UNITS
➢ A modem is a device that converts a computer signal from
digital form to analog form and vice versa for purposes of ➢ The system unit has many important components that enable
transmission over analog media like telecommunication the computer to function correctly.
wires. ➢ Some of the components are hidden from the view and can
➢ A modem can be external (fig. 3.44) or built on the only be seen when the system units is opened. Fig. 3.46
motherboard. below identifies some of the most important components of
➢ Improvements in technology have resulted in modems that the system unit.
are smaller in size but very powerful.
HUBS
A hub is a device that connects computers on a network
18
Form 1 computer studies notes
❖ Before setting up the computer, you need to know the ➢ Parallel cables transmit information simultaneously using a set of
various parts and cables used to connect it to the mains many conductors (wires)
power supply. ➢ For example if the cable uses 8 lines to transmit data at the same
Power supply unit time, it is said to be 8 bit parallel cable.
➢ Though computers are connected to AC power supply, ➢ The advantages of using such cables is that they transmit data faster
internal components require DC power. over a short distance.
➢ Desktops PCs use power supply units (fig.3.47) mounted on ➢ A parallel cable connects to a parallel interface port commonly
system unit casing. referred to as line printer {LPT}. Parallel cables are used to connect
➢ You connect the power supply to the mains using a power printers, optical scanners amd some removable storage drives such
cable. as zip drive.
➢ The work of the power supply unit is to convert AC to DC.
Serial Interface
➢ Serial interface also known as COM or RS232 ports, support
Ports and interface cables
transmission of data one bit at a time, hence it is slower that the
➢ Peripheral devices are connected to the system unit through
parallel port.
ports using either cables or wireless connectivity.
➢ Although they can support data transmission to devices connected
➢ Looking at the back of your computer, you are likely to see
15 metres away. Serial cable are generally used to connect devices
the ports such as the ones indicated on the figure below
such as the mouse.
19
Form 1 computer studies notes
20
Form 1 computer studies notes
2. Close all programs that may be current running ➢ Always switch off computers using correct procedure to avoid
3. If your computer is running on Microsoft windows XP, loss of data and destruction of software.
or Vista or Windows 7 ➢ Computers require stable power supply.
a) Click the start button ➢ Power from mains supply is intermittent and may experience
b) On the start menu, click turn off the computer power surge or under voltage (brownout)
c) On the message box that appears, click turn off. ➢ To protect the computer form being damaged due to power
The computer will undergo the shutdown instabilities, avoid connecting it directly to the main electricity
process supply.
4. For users of the earlier vision of windows, proceed as ➢ Connect it to special device called Uninterruptible Power
follows: Supply (UPS)
a) On the start menu, click shutdown ➢ The UPS provides power in situations where power blackouts
b) In the shutdown message window, select occur.
shutdown and then click OK. ➢ This allows the user to save his/her work and switch off the
computer procedural
Topic 4: SAFE USE OF A COMPUTER
Protection of computers and users
Computers are delicate devices that need to be handled carefully.
5. Protection against malware, viruses and worms e. Dust and damp control
1. Measures that protect hardware and software ➢ Dust can be controlled by fitting good window curtains and
a. Burglar proofing the room air conditioning system that filters dust particles from the air
entering the room.
✓ Doors, windows and the roof should be fitted with grills to
deter forceful entry into a computer room. ➢ Computers should also be covered with dust covers when not
in use.
✓ Install an intrusion detection alarm system and employ
security guards to increase the level of security alertness ➢ Dampness or humidity in the lab can be controlled by using
against theft of computers and accessories. dehumidifiers.
b. installing fire prevention and control equipment ➢ High humidity leads to rusting of the computer metallic parts
➢ The recommended extinguishers are the gaseous type. f. Insulating power cables
➢ This is because liquids may cause rusting and corrosion of ➢ Cables and power sockets should be well insulated and be of
computer components. the correct power rating to avoid short circuits that can cause
➢ Powder particles are not recommended because they may damage to computer components.
increase friction and wear of movable parts. They may also
cause disks to crash. g. Avoid taking meals in the laboratory
➢ Protect computer from too high or too low temperatures: ➢ Users should not eat or drink in the computer laboratory.
High temperatures affect the proper functioning of computer
chips. Thus computers should not be placed next to heat ➢ Food particles may fall in moving computer parts like the
emitting machines keyboard and clog them.
➢ Too low temperatures affect functioning of components ➢ Liquids may pour into electrical circuits and cause short
hence do not place computers in over cooled areas like deep circuits.
freezers.
2. Measures that protect users from hazards
c. The room should be well laid out
a. Protection against electric shock
➢ The room should have enough space for movement.
➢ All cables should be insulated to avoid the danger of electric
➢ Computers should be placed on stable, wide desks to avoid
shock to users.
accidentally knocking them down.
➢ Cables should be laid out in trunks away from user paths to ➢ Cables should be laid away from user paths to avoid tripping
avoid people stumbling on them. on them.
21
Form 1 computer studies notes
➢ There are many reasons for data loss and these include:-
1. Accidental deletion
➢ Data or software can be lost through faulty procedures which
may lead users to delete data accidentally.
22
Form 1 computer studies notes
➢ Natural disasters such as fires, hurricanes, earthquakes can HARMFUL ACT OF COMPUTER VIRUSES
destroy the computer systems leading to loss of data and
➢ Issuing unauthorised command
software.
➢ Deleting data
6. Power failure ➢ Stealing information
➢ Intermittent power supply can lead to both destruction of NOTE: Computer virus makes a computer vulnerable as they take
delicate parts of a computer such as hard disk and unsaved advantage of the computer security and get unauthorised access of
data. computing resources.
7. Hardware failure TYPES OF COMPUTER VIRUSES
➢ Contents of hard disk may become unreadable due to ➢ Computer viruses have many types.
crashing of disk heads ➢ They are generally categorised according to how they
function or how they get access to computing resources.
8. Software failure
➢ When application software suddenly crashes while working, 1. TROJAN HORSE
it may result in severe damage of to hard drive. ➢ This virus appears to do useful desired functions but does
other harmful activities in the background like:
➢ This causes the program to close suddenly leading to loss of
unsaved work or data. i. Stealing data files.
9. Computer viruses ii. Sending files to unauthorised parties.
➢ Computer virus can wreak havoc in computer systems ➢ The virus can be spread by:
causing massive loss of data.
i. Being downloaded by the user
➢ They corrupt the software and data resulting into
unpredictable behaviour. ii. Being installed from removable storage device by oblivious
users.
10. Poor storage of disks
2. WORMS
➢ If disks are not stored properly and are exposed to direct
sunlight, heat or moisture, they stop functioning properly ➢ This virus replicates itself and moves from one computer to
leading to loss of data. another through communication links like:
➢ Competitors can also access important data from company's iii. Local Area Network (LAN)
account leading to corruption, erasure or loss of vital 3. BOOT SECTOR VIRUS
information.
➢ It attaches itself to the boot strap of the hard disk where it
MEASURES AGAINST LOSS OF DATA AND SOFTWARE also prevents the computer from booting correctly.
i. Burglar proofing the laboratory to prevent thieves from ➢ It is usually spread by removable storage devices.
stealing computers or accessories. 4. MEMORY RESIDENT VIRUS
ii. Physical restrictions to computer laboratory- nobody should ➢ They reside inside the computers Random Access
be allowed into the laboratory without the presence of the Memory(RAM)
properly trained and responsible personnel. ➢ They are first of all set up by the mother virus on the hard
iii. Having fire fighting equipment inside the laboratory and disk but they sustain themselves in RAM even when the
within easy reach. mother program closes.
iv. Dust proofing computers by covering them with a cloth after 5. ROOTKIT VIRUSES
use.
➢ These viruses try to open up a computer for access by
v. vii. Keep all diskettes in disk fackettes, away from heat, external entities.
moisture and direct sunlight. ➢ They try to give unlimited access to the unauthorised
user(similar to a roof user on Linux or Unix system)
vi. Viii. Connect the computers to UPS to prevent data and
➢ Such viruses are sometimes installed by Trojans.
software loss during power surges.
6. MACRO VIRUSES
COMPUTER VIRUSES
➢ These viruses attach themselves to another applications macro
➢ A computer virus is a program that loads itself without
programming code.
permission on the computer and when executed replicates by
➢ Macro code in the application usually enable the user to
making copies inserting itself into other files.
automate most common tasks performed in that application
➢ It can be also be defined as a program that is able to copy
like:
itself when it is running without Permission
i. Saving
23
Form 1 computer studies notes
➢ The virus infects the computer as the application is shared ➢ Microsoft windows
between users usually by a word processing and the ➢ Linux
spreadsheet document. ➢ Microsoft office
➢ Adobe Photoshop
7. LOGIC /TIME BOMBS VIRUSES
➢ Adobe illustrator
➢ These types of viruses are programmed to self- ➢ QuickBooks
initiate/originate OR take a particular action on a particular
TYPES OF COMPUTER SOFTWARE
date or when a certain event takes place.
➢ An example is a virus that can be set to delete a data base ➢ In general they are many types of computer software.
table or crash software if a particular employee is fired. ➢ Currently we are supposed to know three ways on how they
➢ Software companies use this features in their trial version are classified: according to;
software where when a certain time period elapses, the
i. Purpose
software asks you for the paid up license otherwise it stops
functioning. ii. Acquisition
➢ These viruses are Trojans that open up a security vulnerability I. CLASSIFICATION ACCORDING TO PURPOSE
for unauthorised users to access the computer without the
➢ Computer software may primarily be designed to manage
knowledge of the authorised user.
hardware resources or help the user accomplish specific tasks.
HOW ARE COMPUTER VIRUSES SPREAD ➢ Therefore it may be classified as system or application
software
1. Sharing of the removable storage devices like: disks, flash
disk, and hard drives. a) SYSTEM SOFTWARE
2. Opening emails that are infected then the virus infect the host ➢ This performs a variety of fundamental operations that avails
computers. /helps computer resources to the users. These function
include;
3. Installing weird/strange software on the computer without
validating its source. i. Booting the computer and making sure that all hardware
elements are working properly.
4. Accepting software updates from invalidated sources.
ii. Performing operations such as; retrieving, loading, executing
THE CONTRAL MEASURE/HOW TO PREVENT COMPUTER
and storing application programs.
VIRUSES INFECTION
iii. Storing and retrieving files
➢ They are many ways of reducing the risk of computer virus
infection and controlling or managing their negative effects if iv. Performing a variety of system utility functions (functions that
infected. output something).
24
Form 1 computer studies notes
i. System level utility ➢ The developer may bundle more than one but closely related
➢ It helps the user to work with operating system and its software into one package to form a suit or integrated
function software e.g. lotus suite, Microsoft office and Corel word
➢ For instance it tells the user when he or she enters a wrong perfect as opposed to single purpose software e.g.
command and gives suggestion how the error can be QuickBooks, and sage pastel.
corrected.
ii. Application level utility
➢ It makes the application program run more smoothly and NOTE: the word package is sometimes used refer to these types of
efficiently. software that are packaged and sold by vendors.
➢ These are more commonly purchased separately or may be
part of the operating system
ADVANTAGES OF STANDARD SOFTWARE OVER THE IN HOUSE
NOTE: language processors also refers to language translators that
DEVELOPED PROGRAMS
translate a computer written using programming languages into a
form that can be understood by a computer called Machine 1. They can be easily installed and run.
language.
2. They are cheaper than the in house developed software.
➢ These languages are categorised into three ways: assemblers,
3. They are readily available for almost any task.
interpreters, and compilers.
4. They have minor or no error since they are thoroughly
b) APPLICATION SOFTWARE tested.
➢ They are also known as application packages 5. They can be easily be modified to meet a user’s needs.
➢ This refers to programs that are designed to help the user
accomplish the tasks.
➢ The following table gives examples and uses of common DISADVANTAGES OF STARDARD SOFTWARE
application packages
1. They may have some features, not needed by the users,
Software Users Examples which may take extra storage.
Word processors Typing documents Word lotus, word
like letters pro, open office 2. They may require the user to change processes and hardware
writer. for compatibility which may in turn be expensive.
Spreadsheet Calculating Ms excel, lotus 1- 3. They may lack some features required by the user.
budgets 2-3
Desktop Designing Adobe
publishing publications like PageMaker, Ms III. CLASSIFICATION ACCORDING TO THE END-USER
newspaper and publisher, adobe LICENCE (EUL)
books InDesign
➢ The software may be also classified according to End-User-
Computer aided Technical drawing Auto CAD
License as open source, proprietary, or freeware.
design
Data bases Keeping records Ms Access, my- a) OPEN SOURCE/NON-PROPRIETARY
and files SQL, Foxbase,
➢ They refer to software whose source code (programmed set
paradox
of instruction) is freely made to the users.
Graphic software Designing and Corel Draw,
➢ They encourage to use, modify and distribute the modified
manipulating photoshop
product e.g. Linux operating system, Open office are made
graphics
available under General Public License (GPL).
b) PROPRIETARY SOFTWARE
II. CLASSIFICATION ACCORDING TO ACQUISITION
➢ These are software whose source code is hidden from users.
a) IN-HOUSE DEVELOPED SOFTWARE
➢ The modification is only made by the manufacturers.
➢ These are programs that are uniquely designed and tailored ➢ This software’s may be licensed to the users at a fee or
to meet a particular user needs applied freely e.g. Microsoft windows operating system,
➢ For example, a bank may decide to manage its banking adobe PageMaker, CorelDraw.
operations using a unique or special program developed by
c) FREEWARE
hired programmers.
➢ These programs are not available in shops and they not ➢ These are software products that are freely made available to
address the needs of the other users. the user.
➢ However, beware of them because some may be malicious
b) VENDOR OFF-THE-SHELF SOFTWARE
/dangerous software.
➢ Theses software are developed by software engineers,
packaged and then made available for purchase through
vendors, a distributor or directly from the developers.
25
Form 1 computer studies notes
26
Form 1 computer studies notes
➢ Some operating system presents the user with simple menus ➢ Each available resource in a computer is given an
while others have sophisticated menus. identification number called an Interrupt Request (IRQ)
number.
➢ The operating system uses IRQ number to identify the
resources being requested.
➢ Poor allocation of resources would result to undesirable
condition referred to as deadlock.
➢ Deadlock is a situation where a particular job holds a
requested resource and fails to release it, yet it is requesting
for a resource held by the other job.
➢ Basically an operating system consist of two main parts V. COMMUNICATION CONTRAL AND MANAGEMENT
namely; ➢ The operating system is responsible for managing various
i. Shell communication devices and provides an environment within
➢ It is the outer part of an operating system used to interact which communication protocols operate.
with operating system. ➢ Protocol refers to the rules that govern communication
ii. Kernel between devices on a network.
➢ Modern operating systems comes with network management
➢ It is the core of operating system regarded as the operating utilities that provides external communication by connecting
system. to a communication system using an interface cable or
I. JOB/PROCESSOR SCHEDULING through wireless interface such as Bluetooth and infrared.
➢ It refers to allocating of each job, waiting for execution, VI. ERROR HANDLING
processor time at the given interval. ➢ The operating system has many ways of alerting the user of
➢ Since a computer may have concurrent processes ready for errors that may arise out of illegal operations, hardware or
execution; so it is the operating system that determines which software failure.
task will be processed first. ➢ Most operating systems express what the error is, and where
➢ The operating system schedules job according to priorities. possible make suggestions on how to correct the errors.
➢ The higher the priority, the higher the likelihood of being ➢ The OS does this by monitoring the status of the computer
allocated CPU time. system and performing audit checks on the users, hardware
II. RESOURCE ALLOCATION and software.
27
Form 1 computer studies notes
➢ An interrupt is a break from the normal sequential processing Extension File type Description
of instruction in the program. .doc Data A Microsoft word
➢ A critical or very important request causes the current process document file
to attend to it, before returning the control back to the .tif Data A graphic file
process that was initially interrupted created using
application e.g.
FACTORS TO CONSIDER WHEN CHOOSING AN OPERATING
adobe Photoshop
SYSTEM
.txt Data A plain text file
1. The hardware configuration of the computer such as the created using
memory capacity, processor speed, and hard disk capacity. notepad or Dos
editor
2. The type of the computer in terms of the size, and make. For
.exe Application The file that
examples Apple computers would not run on the Microsoft
launches a
operating system.
particular
3. The application software intended for the computer. application e.g.
4. User friendliness of the operating system. winword.exe,
PM.70.exe
5. The documentation available. .bat System File containing a
6. The cost of the operating system. series of the
commands loaded
7. The reliability and security provided by the operating system. during boot up
8. The number of processors and hardware it can support. .sys System System file that
perform
9. The number of users it can support. fundamental
HOW OPERATING SYSTEMS ORGANISE INFORMATION operations in a
computer
➢ The modern operating system differs on how they look and
feel, but they handle information in the same way.
➢ Most operating system organizes information in three tier ii. FOLDERS/DIRECTORIES
hierarchy. ➢ In some operating system, a named storage location where
related files can be stored.
i. Drives ➢ All folders or directories originate from a special directory
ii. Folders called root directory (presented by a back slash ,\)
➢ It may be also created inside another folder or directory
iii. Files called subfolder or subdirectory
i. FILES
iii. DRIVES
➢ It is a collection of related data given a unique namefor ease
➢ The operating system recognises storage media or devices as
access, manipulation and storage on backing storage.
drives.
WHAT IS CONTAINED IN THE FILE ➢ Drives may be given labels such as letters A to Z, to identify
28
Form 1 computer studies notes
29
Form 1 computer studies notes
NB: it is important to note not all keyboards have the numeric ➢ Touch tutor
keypads. ➢ etc.
➢ For example: portable computers e.g. laptops may lack a GOOD KEYBOARDING POSTURE
separate numeric keypad due to size limitations. ➢ When learning typing using the typing tutor, observe the
following keyboard guidelines.
30
Form 1 computer studies notes
➢ To make a selection the pointer must be on the object that is iv. Finally release the mouse button and the item will be
to be selected. dropped in the new location.
➢ After selecting the user can manipulate the object by pressing
a mouse button. PRACTICAL HANDS ON SKILLS
GOOD MOUSE USE ➢ Before starting operating on a computer instructor or
➢ When using a mouse follow these guidelines laboratory technician should assist in making sure that the
keyboard, monitor and mouse are properly connected to the
i. Place a mouse on a flat smooth surface. system unit.
ii. Gently hold the mouse with your right hand, using the thumb IDENTFYING THE POWER BUTTON
and two fingers.
➢ The power button is usually located somewhere on the front
iii. The index finger should rest on the left button while the of the system unit.
middle finger rest on the right button. ➢ Pressing it switches on the computer.
➢ This means pressing and releasing the left button twice in LOGGING ON AND OFF THE COMPUTER
quick succession.
➢ When the operating system first loads, it requires the user to
➢ Double clicking usually opens the file or starts a program.
authenticate himself or herself by providing the user name
RIGHT CLICKING and the password.
➢ This security feature helps to deter unauthorised person from
➢ Pressing the right hand mouse button once.
using the computer.
➢ This display a list of command called a shortcut menu or
➢ This process is called logging in the computer.
contest sensitive menu.
➢ After a successful log in, the operating system usually presents
➢ It is called contest sensitive menu because the command on it
the user with the first screen called the desktop.
apply to the right clicking item.
➢ If the user wants to leave the computer for a while without
DRAG & DROP switching it off.
➢ It is important to log off the computer to avoid a stranger
➢ This is where the user drags an item from one location on the
using his or her session to perform exploits, simply click the
screen to another.
start button then select the log off button.
➢ This is accomplished by following the procedure below:-
i. Point to the item you want to drag. SHUTTING DOWN THE COMPUTER
ii. Press the left hand mouse button and hold it down.
➢ It is important that the user follows the correct procedures of
iii. Slide a mouse until the pointer reaches the desired
shutting down the computer at all times.
position on the screen.
➢ If the procedure is not followed, then loss of data, damage of
programs and computer componets may occur.
31
Form 1 computer studies notes
The following are the procedure when shutting down the ➢ Windows was first introduced as an operating system in 1985
computer: in response to growing interest in user friendly GUI
i. Ensure that all the work has been properly stored. This environment.
process is called saving
WINDOWS DESKTOP FEATURES
ii. Close all programs that may be currently running.
➢ Once you turn on the computer, windows is loaded into the
iii. If your computer is running on Microsoft windows XP or vista;
main memory and finally the desktop showing that the
a) Click the start button computer is ready for use appears.
➢ The three main features of the desktop are; back ground,
b) On the start menu, click turn off computer.
icons and taskbar.
c) On the message box that appears, turn off, then the computer
will undergo the shutdown process
BACKGROUND
32
Form 1 computer studies notes
THE START MENU ITERMS ➢ Each in its own way lets you see how storage devices or
locations, files and folders arranged
➢ When you click the start button, a list of choice appears
➢ These tools also enable the user to manipulate files and
called the start menu.
folders
➢ The item on the menu may vary depending on the version of
windows you are using WINDOWS EXPLORER
a) Programs menu
➢ It lets the user to display the drives and folders in a hierarchy
➢ Programs or all programs menu displays a list of programs
or tree structure
installed in the computer
➢ The computer tree is an upside down structure with the
➢ The menu has small solid arrows.
highest level in this case the desktop being the root
➢ When you point the arrow, a submenu called a sidekick
➢ The explorer divides the windows into two panes
menu is displayed.
i. The left pane displays a tree of drives and folders
b) My recent documents
ii. The right pane displays a list of files and subfolders
➢ My recent document lists the last fifteen recently accessed
contained in a particular open drives or folder
files.
➢ To display the explorer using the start menu
➢ You can open any listed files from a storage device by clicking
i. Click start, point the program then accessories
its name provided that device is accessible
ii. Click windows explorer. An explorer window is displayed
c) Control panel
➢ To display the explorer using my computer icon
➢ The control panel is the computer maintenance and
i. Right click on my computer icon
configuration “toolbox”
ii. Click explorer
➢ It provides tools used to maintain and make changes to the
➢ This way is what has been throughout used in form one book
computer setup.
to take care of other versions of windows other than XP.
➢ It is important to not to tamper with this menu because you
may interfere the computer functionality. USING MY COMPUTER
d) Search
➢ Double clicking on my computer icon, gives you a graphical
➢ For example, a search in windows XP helps the user to search
view of of what is inside the computer and this include:
for files or folders in case the user forgets its name or
i. Drives
location.
ii. Control panel
e) Help and support
iii. Other resources
➢ The help command on the start menu, displays detailed
➢ To display files and folders from a particular drive, proceed
information on how to use the operating system and solve
as follows:
some computer related problems in case the computer fails to
i. Double click a drive icon
function properly
➢ A windows appears displaying files and folders stored in the
f) Run
root of the drive in question
➢ It enables the user to:
➢ This root is considered to be the highest of the directory tree
i. install program on the hard disk
where all directories/folders start
ii. Open file and folder from a storage location
ii. Double click the folder to display its contents
iii. Run program from removable media without necessarily
iii. Double click the drive to display its contents
installing it on the hard disk
iv. On this window, you can start manipulating your files and
g) Log off
folders
➢ To log off is to terminate the current user session
➢ To go back or to switch to a new user, the user must log in CREATING A NEW FOLDER
➢ Logging in is a security measure that restrict unauthorized user
➢ They will be time a user would want to create a new folder
from accessing computer resources
➢ For instance when working on a detailed project that has
➢ To login, the user must enter the correct name and password
multiple files
or in some cases use other methods such as fingerprint
➢ It is advisable that all related files be kept together in one
authentication
folder
➢ It prompts a user name and password for one to gain access
➢ To create a new folder proceed as follows:
h) Turn off/ shut down
i. Using my computer icon, display the explorer window
➢ this menu lets the computer shut down, restart, make
ii. On the folder tree on the left pane, select the location in
computer go to standby or hibernation
which you want to create a new folder
➢ Hibernation: saves everything in memory on disk and turns
iii. On the file menu, point to new then click folder.
off the computer
➢ A new folder with a temporary name new folder appears in
➢ Standby: on the other hand, makes the computer consume
the explorer window
less power in idle mode but remain available for immediate
iv. Type a new name for the folder to replace the temporary
use
name, then press enter key or click the icon once.
MANAGING FILES AND FOLDERS USING WINDOWS
NB: To create a subfolder, follow the steps above but you first select
➢ To manipulate files and folders (to control/manage the a folder as a location. To open a folder proceed as follows:
actions of files and folders) you can either use my computer
➢ Just left double click, and the folder will be opened and
icon from the desktop or windows explorer from the start
access what is contained in it.
menu.
33
Form 1 computer studies notes
CREATING A NEW FILE ➢ Scroll buttons and arrows are horizontal and vertical buttons
at the borders of window used to scroll through a long
➢ Depending on the programs installed in your computer, you
document.
can create different types of files such as drawing, text
document etc. SAVING CHANGES TO A FILE
➢ To create a new text document proceed as follows:
➢ After typing the content of a file in the work area, click file
i. Using my computer icon, display the explorer window
and then click saves.
ii. On the folder tree on the left pane, select the location in
➢ Otherwise, if the file will be saved with different names or
which you want to create your file.
location then.
iii. On the file menu, point new
iv. Select a text document from a list available application 1. Click the file menu then save as.
➢ An icon with a temporary name appears in the explorer
2. From the resulting save as dialog box, select where the document
window
is to be saved then type its name.
v. Type a new name for the new file to replace the
temporary name and press the enter key. 3. Click the save button
NB: In windows, file name can contain up to 255 characters RENAMING FILES AND FOLDERS
including spaces but with no special symbols such as \,/,:,*,
➢ Renaming refers to the changing the previous name to a new
?,”,<,>,|,.
name.
APPLICATION WINDOW ➢ To rename a file or a folder proceed as follows:
➢ In order to enter data in the new file just created above, you 1. Using my computer icon, display the explorer window
have it in its application program.
2. On the folder tree on the left pane, select the file or folder.
➢ This can be done by double clicking the file icon
➢ A rectangular area called an application window appear on 3. On the file menu, click rename
the screen such as WordPad screen
4. Type the new name, and then press enter key
PARTS OF AN APPLICATION WINDOW
DELETING FILES AND FOLDERS
a) Tittle bar
➢ In windows, when you delete an item from the hard disk, it
➢ This is a bar across the top of the window that displays the
is temporary held in a special folder called the recycle bin
name of the current application program or task
where it can be restored if necessary
➢ On the right of the tittle bar are three buttons namely:
➢ The recycle bin is a default icon on the desktop and therefore
Minimise buttons: it reduces a window by pressing button which is it cannot be removed
pressed on the task bar
WARNING
The restore/maximise buttons: it stretches the window to cover the
1. One should not attempt to delete system and application files
entire desktop or restore it to its original size.
from the hard disk
The close button: is used to exit an application 2. Items from the removable storage are not held in the recycle
bin and are completely lost.
b) Menu bar
➢ To delete a file or a folder proceed as follows:
➢ Menu bar provide a list of command that can be used to
manipulate the task. For example, to save a document click 1. Using my computer icon, display the explorer window
file, and then save.
2. On the folder tree on the left pane, select the item that is to be
c) Tool bar
deleted
➢ This are button, arranged in a row, which are shortcut to
commands. 3. On the file menu, click delete
d) Work area
4. A message appears on the screen asking whether you actually you
➢ This is the working area where you can create your
want to delete the item.
documents.
e) Status bar 5. Confirm by clicking yes
➢ Thus is an interactive strip at the button of the application
RESTORING DELETED FILES AND FOLDERS
windows that acts as a communication link between the user
and an operating system. ➢ To restore a file or a folder from the recycle bin to its
➢ Such interactive activities include: saving, opening a file, original location, proceed as follows:
printing, cursor position, etc.
1. Double click the recycle bin icon
34
Form 1 computer studies notes
➢ Deleted items take up the same amount of the space they 4. Select the drive or folder where you want your item to be
occupied before you delete them. copied/moved (cut)
➢ To free up that disk space occupied you have;
5. From the edit menu, click paste.
➢ To empty the recycle bin, proceed as follows:
➢ The information or item is pasted to a new location
1. Double click the recycle bin on the desktop
SORTING FILES AND FOLDERS
2. Choose recycle bin from the file menu
➢ Sorting means arranging files and folders in a particular order,
3. Click yes when promoted to confirm detection of the files
either alphabetically or by size or date of the last
NB: you can also delete selected items in the recycle bin by clicking modification or creation
file then delete. ➢ Windows automatically sorts files and folders into alphabetic
order but the user can choose to arrange them otherwise.
COPYING AND MOVING FILES AND FOLDERS
➢ To sort files and folders proceed as follows:
➢ Cut or copy commands are used to move or create a
1. Open a folder or storage location
duplicate of an item respectively
➢ When you cut or copy an item, it is temporary held in the 2. Click view, then point arrange icon by
temporary storage location known as the
MANIPULATING FILES AND FOLDERS USING THE SHORTCUTS
➢ To copy /cut a file or a folder, proceed as follows:
➢ When you right click an item, a shortcut menu is displayed,
1. Using my computer icon, display the explorer window
which provides commands & commonly used to manipulate
2. Select the file or folder to be copied the item.
➢ To copy, move, delete or rename an item proceed as ➢ in case you’re not sure where you stored or the name you
follows: gave the file or folder, use the search menu
1. Right click the file or folder to display its shortcut menu 1. Click start, point to search then click for files or folders
2. On the shortcut menu, click the appropriate command ie. 2. In the search dialog box, specify the search criteria.
i. To copy or move, right click the destination location 3. Click the search button.
then paste
ii. To delete, simply click delete command
iii. To rename, type in a new file name to replace
1. To copy a file or a folder, hold down the CTRL key while you
drag the icon of the file to a new location
35