0% found this document useful (0 votes)
26 views50 pages

COMPUTER Form 1 Notes Final

The document provides an introduction to computers, defining key terms such as computers, data, and information, and discusses the historical development of computing devices. It outlines the characteristics and uses of different generations of computers, from first generation vacuum tubes to fifth generation computers with artificial intelligence. Additionally, it highlights the advantages and disadvantages of using computers across various fields including finance, education, and healthcare.

Uploaded by

MORIAS BAZILIO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views50 pages

COMPUTER Form 1 Notes Final

The document provides an introduction to computers, defining key terms such as computers, data, and information, and discusses the historical development of computing devices. It outlines the characteristics and uses of different generations of computers, from first generation vacuum tubes to fifth generation computers with artificial intelligence. Additionally, it highlights the advantages and disadvantages of using computers across various fields including finance, education, and healthcare.

Uploaded by

MORIAS BAZILIO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Prepared by sir A.

Kanyika

TOPIC 1: INTRODUCTION TO COMPUTERS  Refers to a set of components that collect,


process and deliver information in a given
DEFINITION OF KEY TERMS organization.
 These components include persons, procedures
Computer or hardware and software resources.
 A computer is an electronic device that processes Garbage in garbage out (GIGO)
data to information.  This simply means if erroneous data is entered in
 It is electronic because it utilizes electrical signals a computer and a command to process it is given,
to process data. the computer will output erroneous results.
 Thus a computer is not a machine that does
things on its own.
HISTORY OF COMPUTER DEVELOPMENT
 Historical development of computers is traced
back to the time human beings were struggling to
invent non-electronic tools that would simplify
arithmetic computations.
Non-electronic computing devices
 These are tools that were used to perform
arithmetic computations manually or
 The computer processes data following a set of mechanically.
instructions called programs. Examples
 Stones
Input--------------Process---------Output
 Sticks
(Data) (Information)  Abacus
 Bones
Data  etc.
 Refers to raw facts that do not have much Abacus
meaning to the user. It may include numbers,  This was a Chinese counting instrument which
letters and symbols dates back to 3000 BC.
Information  It has bead-like parts that move along rods.
 Each bead above the middle bar stands for five
 This refers to the processed data that is units while each bead below the middle stands for
meaningful to the user. one unit.
Information Technology (IT)
 Refers to the use of hardware, software, and their
technologies to collect, organize, process, secure,
store, exchange or disseminate information.

Communication Technology (CT)


 Refers to the use of devices and communication
channels to transmit information correctly,
efficiently and cost-effectively.
Information and Communication Technology (ICT)
 Refers to the integration of communication Napier bones
technologies and information technologies for the  Developed by John Napier, a Scottish
purpose of acquiring, processing, storing, mathematician in the 17thcentury.
standardizing and disseminating information for  Was used for performing multiplication and
public consumption. division
Information Systems (IS)
1| P a g e
Form 1 Computer Studies comprehensive study notes

iii. They also consumed a lot of power


iv. They emitted a lot of heat
v. They constantly broke down
Examples
i. Electronic Numeric Integrator and Calculator
(ENIAC)
ii. Electronic Discrete Variable Automatic
La Pascaline machine
Computer (EDVAC)
 Is a counting machine that was made by
Blaise Pascal in the 17th century
 Used for addition and subtraction

Second generation computers (1958-1964)


Characteristics
i. Operated using tiny solid-state electronic
devices called transistors. These were
The analytical engine smaller than vacuum tubes
 Designed by English mathematician, Charles ii. They produced less heat
Babbage. iii. They were much faster
 Due to technological limitations Babbage iv. They were smaller in size
never implemented it. v. They were more reliable
 The engine is recognised as the first real Examples
computer and Babbage as the father of  IBM 1401
computing  IBM 7070
 UNIVAC 1107
 ATLAS LEO Mark III
 Honeywell 200
Third generation computers (1964-1970)

Characteristics
i. They used electronic devices called
integrated circuits (IC's)
ELECTRONIC COMPUTERS AND THEIR ii. An IC consists thousands of smaller
GENERATIONS transistors packed on a semiconductor called
 The age of the modern can be traced back to silicon chip
1951. iii. They emitted less heat
 These computers are generally classified into iv. They were smaller in size
five generations depending on the technology v. They were easier to program
used to develop them. vi. They were easy use
First generation computers (1940's to 1958) vii. They were easier to maintain
Characteristics
i. They were physically large
ii. They used thousands of electronic gadgets
called vacuum tubes or thermionic valves
Prepared by Sir A. Kanyika 2|Page
Form 1 Computer Studies comprehensive study notes

USES OF FIRST COMPUTERS


Computer Features Uses
Generation
1st Built during the Developed
Generation 1st world war during the 1st
computers (WW1) using world war to
vacuum make certain
Fourth generation computers (1970 to present) calculations for
the
Characteristics
construction of
i. They have Large Scale Integrated and Very
Large Scale Integrated circuits which make a hydrogen
up a microprocessor bomb
ii. They emit very low heat 2nd Built using Used mainly
iii. They are small in size Generation transistors. for scientific,
iv. They are easier to use computers Had tape business
v. They are easier to maintain
storage, printer applications
Examples and operating and computer
 IBM 370 system and games.
 IBM 4300 stored programs
 Honeywell DPS-88
3rd Built using Used for
 Burroughs 7700
Generation integrated processing
computers circuits and more than one
semiconductors (multitasking)
4th Built using very Affordable and
Generation large integrated used for most
computers circuits applications.
characterised by Financial
microcomputers applications
Fifth generation computers
and networks
Characteristics
i. They have very high processing power and particularly the
speed internet
ii. Their size is increasingly becoming smaller became
iii. They have special programs that support common.
complex operations 5th Today's Used for a
iv. They have artificial intelligence
Generation computers large number
v. They can be connected to internet
vi. They have superior hardware and software computers characterised by of applications,
massive in particular
processing expert systems
power and use used in
of artificial decision
intelligence. making.

Prepared by Sir A. Kanyika 3|Page


Form 1 Computer Studies comprehensive study notes

TOPIC 2: COMPUTERS AND THEIR USE vii. A computer does the work according to data
and command given. Thus, if there are errors,
 Computers are used in almost all aspects of the computer processes and outputs
people's lives because they are more efficient and erroneous results.
accurate. viii. Reduced privacy, People can access
Advantages of using computers confidential data due to the dynamic growth
i. Computers can work for long hours without of information technologies.
getting worn out or tired. Computers work AREAS WHERE COMPUTERS ARE USED
automatically and are not subject to
exhaustion. 1. FINANCIAL SYSTEMS
ii. Modern computers have very high processing Financial systems enable organizations to manage
speeds that translate to efficiency in our work their finances. They include
places a. Accounting systems
iii. Computers are more accurate unless Accounting systems are popular in business
management. Accounting systems supported by
incorrectly programmed.
financial systems include
iv. Computers have huge storage on auxiliary (i) Customer order entry and billing
storage such as hard disk. This saves much  It records incoming customer orders
of office space for filing.  Authorities delivery of items or services
v. Computers are capable of processing large ordered
amounts of data from even several users.  Produces invoices for customers who do not
vi. The advent of computers has opened up new pay in advance or cash basis.
(ii) Inventory management
job opportunities that never existed before.
 Used to keep track of the items in stock and
vii. Computers process data far much faster than help the management to determine which
if the processing was done manually. items to reorder.
Disadvantages of using computers  This helps the management to have enough
i. Sometimes computers can make systems stock at all times to meet needs of the
complicated there by requiring a lot of time to customers.
be spent on staff training (iii)Bookkeeping
ii. The computers can fail to work due to an  A financial application (Quick books and
electrical failure, a hardware/software fault or Sage) summarizes financial transactions
viruses. indicating the amount the business makes
iii. Lead to loss of jobs since the work which and the worthiness of the business.
require several people is done by a single (ii)Inventory management
person operating a computer.  It is used to keep track items in stock and
iv. Limited job opportunities as most help the management determine which item
organizations are using computers in their store order
work systems.  This helps the management to have enough
v. Reduced privacy as some people may stock at all times to meet the needs of the
attempt to have illegal access to information. customers.
This is so due to dynamic growth of (iii)Bookkeeping
information technology.
vi. They promote dependency. People are Banks
increasingly becoming dependent on  Automated Teller Machines (ATM's) enable
computers and information technologies such automation of cash deposits and withdrawal
that if a computer breaks down they become services.
helpless.

Prepared by Sir A. Kanyika 4|Page


Form 1 Computer Studies comprehensive study notes

 Computers have also increased efficiency  Used in storing personal information,


due to better record keeping and document calculating, keeping home budgets and
processing. research.
Industries Library services
 Computers are used to monitor and control  Enables library personnel to easily access
industrial processes and keep updated records of books and other
 For example, use of robots which perform library materials.
tasks that are too unpleasant, dangerous or  Library users also use computers to search
complex and tedious to assign to human for titles instead of using the manual card
beings. catalogue.
Hospitals TYPES OF COMPUTERS
 Used to keep patient's records for easy  There are generally three types of computers
access to a patient's treatment and diagnosis based on the data they process.
history. Digital computers
 Computerized medical devices enable  These are computers which process discrete
physicians to get proper diagnosis of the data.
affected body parts with high accuracy.  Discrete data is usually represented using
 Computers also control if the support two-state square wave form.
machines in ICU  Most modern home appliance such as digital
Transport TVs, microwaves, wall clocks are digital in
 Used to monitor vehicle traffic in busy towns, nature.
aircraft navigation and in making
reservations.

Communication
 Integration of computers and
telecommunications facilities has made
message transmission and reception be very
fast and efficient.
 The world is said to have become a global Analog computers
village because of the speed with which  These are computers which process
information is transmitted around the world. continuous data.
Law enforcement agencies  Continuous data is usually represented using
 Information stored in computers such as a continuous wave form.
finger prints, images and other identification
details help law enforcers carry out criminal Analog computers are used in manufacturing process
investigation control like monitoring and regulating furnace
Education temperatures and pressures.
 Used in teaching and learning processes  They are also used in other applications like
through Computer Aided Learning (CAL) and weather station store cord and process
Computer Aided Instruction (CAI). physical quantities e.g. wind, clouds peed and
 E.g. experiments in chemistry or physics can temperature
be demonstrated using special computer
program that depict the month screen through
simulation.
Domestic and entertainment
 Used at home for recreational activities like
watching movies, playing music and
computer games.

Prepared by Sir A. Kanyika 5|Page


Form 1 Computer Studies comprehensive study notes

Hybrid computers which have large information processing


 These are computers designed to process needs .e.g. banks, hospitals and airports.
both analog and digital data.
Characteristics
Comparisons of digital and analog computers i. They are powerful and less expensive than
 Digital computers are simpler to develop than super computers
analog computers ii. They are big in size
 Digital computers are more reliable than iii. They have large storage capacity and can
analog computers support a variety of peripherals.
 Digitalcomputersaresmallerinsizethananalogc iv. They handle all kinds of problems (scientific
omputersofthesamefunctionality or commercial)
 Digital computers consume less power
compared to analog computers.

CLASSIFICATION OF COMPUTERS
 Computers can be classified into either
according to size or purpose.

A. Classification according to size

Supercomputers
 These are mainly used for scientific research
which requires enormous calculations.
Characteristics
i. They are fastest, largest, most expensive and Mini computers
most powerful computers.  They are referred to as small-scale
ii. They are able to perform many complex mainframe computers.
operations in a fraction of seconds  They are mainly used in scientific
iii. They are kept in a special room due to their laboratories, institutions, engineering plants
weight and places where processing automation is
iv. They generate a lot of heat due to their huge required.
processing power. Thus, they need special  They are well adapted for functions like
cooling systems accounting, word processing, database
management and specific industry
applications
Characteristics
i. They are slightly smaller than mainframes.
ii. They support fewer peripheral devices.
iii. They are not as powerful and fast as the
mainframe computers.

Mainframe computers
 These computers are used for processing
data and performing complex mathematical
calculations.
 They are mostly found in government
agencies, big organizations and companies
Prepared by Sir A. Kanyika 6|Page
Form 1 Computer Studies comprehensive study notes

Microcomputer  They are designed to serve a specific purpose or


 Called microcomputer because its CPU is to accomplish one particular task
called microprocessor which is very small  The computer can only perform the task it was
than that of minicomputer, mainframe and meant to do
supercomputer.  The set of instructions are limited during the time
 Commonly used in training and learning of manufacturing
institutions, small business enterprises,  Examples of such computers include: robots used
communication centres, etc. in manufacturing industries, basic phones for
Characteristics voice communication only and electronic
 It is the smallest and cheapest computer calculators that carry out calculations only.
 It is least powerful type of a computer.  Single special purpose computers are dedicated
to single task, they can perform the task quickly
and very efficiently

UNITS OF DATA PRESENTATION

 A human being communicates with a computer


with another using a special language that is
Types of microcomputers made up of speech, vision, touch signs and
 Desktop computer is designed to be placed even symbols, which is called human language.
on to pofan office desk.  This language is too complex for simple devices
 Note book or laptop which is portable. like computers to understand
 Palm note or Personal Digital Assistant  In order for humans to communicate with
(PDA) which is small enough to fit in the computers, human languages need to be
pocket. changed into a simpler language for computer
called machine language.
 Machine language is represented using two
numbers 0 and 1, (Binary numbers)
 The numbers means different things to the
computer, but all data processed by the
computer is presented in the form of 0's and
1's. .
 Since two numbers are used to represent the
B. Classification according to purpose data, we refer to this as the binary number
system.
 Computers can be classified according to the task  Due to the need to increase processing speed
they perform either general or special purpose and reduce the amount of the space taken by
computers. data on storage device other number systems
i. General purpose computers such as octal (made up of 0-7) and
 These have been designed to be able to perform Hexadecimal (made up of 0-15) are also used to
a variety of tasks when loaded with appropriate represent data in computers.
programs
 These are the most type of computer in use today Data storage units
 Their flexibility enables them to be applied in a  Computer data can be measured or stored in
wide range of applications like documents various units
process, performing calculations, accounting,  The basic unit of the data storage is the binary
data and information managed among others. digit (bit)
ii. Special purpose computers  The following are definitions for various sizes
are.

Prepared by Sir A. Kanyika 7|Page


Form 1 Computer Studies comprehensive study notes

1. Bits: A binary digit which can either be 0 or 1  A character set converts a binary number / code
 It is the smallest element of data in computer to its equivalent human readable form and vice
memory versa.
2. Byte: A group of bits (often 8) used to represent a  It is a character set for example that maps a
single character in the computer memory. binary code to the letter A on the letter A on the
3. Nibble: Is a half byte, which is usually a grouping keyboard.
of 4 bits.
4. Word: Two or more bytes make a word. Two widely used character sets are;
 A word can have 16 bits, 64 bit etc. 1. American Standard Code for Information
5. Kilobyte: is exactly 2¹⁰ bytes = 1024. Interchange (ASCII)
 I kilobyte is 1024 (approximately 1000)  It uses seven bits to encode text characters.
6. Megabyte: is exactly 2²⁰ bytes = 1024 × 1024 2. Extended Binary Code Decimal Interchange Code
(1 048 576) (EBCDIC)
 1 megabyte is 1 000 000 bytes or 1000 kilobytes  It uses eight bits to encode characters mainly in
7. Gigabyte: is exactly 2³⁰ bytes = 1024 × 1024 × IBM (International Business Machine).
1024 (1073 741 824)
 1 gigabyte is 1 000 000 000 bytes or 1000 NB: ASCII and EBCDIC tables are widely
megabytes available on the internet.
8. Terabyte: Is exactly 2⁴⁰ bytes = 1024 × 1024 ×
1024 × 1024 (1 099 511 627 776) TOPIC 3: COMPUTER HARDWARE
 1 terabyte is approximately equal to 1 000 000
000 000 bytes or 1000 gigabytes  A computer is made of two main components
namely hardware and software.
CONVERTING BETWEEN DATA UNITS
TYPES OF COMPUTER COMPONENTS
1. 1 byte = 8 bits. = 1 byte A computer is made of two components;
2. 1 kilobyte = 1000 bytes. = 1 thousand bytes  Hardware
3. 1 megabyte = 1000 kilobytes. = 1 million bytes  Software
4. 1 gigabyte = 1000 megabytes. = 1 billion
bytes Hardware
5. 1 terabyte = 1000 gigabytes. = 1 trillion bytes  Refers to physical or tangible components
that make up a computer system.
Character set  It classified into four categories
 Data is entered in the computer in form of –Input devices
characters
 Each character, a number, alphabet or symbol –Central Processing Unit (CPU)
is recognized by the computer because of its –Output devices
unique sequence of 0’s and 1's. –Storage devices
 A word can be made of one or more characters Software
 When you press a character A, on the computer  Refers to a set of instructions that direct a
keyboard, the keyboard sends a signal made computer on what to do
up of a binary numbers to the computer telling it  Classified into two main categories
that a particular key has be pressed –System software
 To avoid confusion about what every unique
–Application software
binary sequence means in the world of
computing, character sets are developed to give
universal meaning to the binary sequence.

Prepared by Sir A. Kanyika 8|Page


Form 1 Computer Studies comprehensive study notes

COMPUTER HARDWARE
 It looks at hardware elements that make up the
computer. The computer is setup by connecting
these various hardware devices to the system
unit.
A. INPUT DEVICES
 They convert user input which is in human
readable form to machine language
 They can be classified according to method
2. Pointing device
used to enter data ie
 Pointing devices are used for controlling a pointer
–Keying devices
cursor on the screen.
–Pointing devices  A part from the mouse, other pointing devices
–Scanning devices include; the trackball, joy stick and light pen.
–Other technologies for data capturing Mouse
1. Keying Devices  A pointing device used to execute commands
 They convert typed numbers, letters and  Controls an arrow displayed on the screen.
other special characters into machine  Moving the mouse moves the arrow/ pointer
readable form before processing on the screen.
 Types of keying devices are;  If the pointer is on the icon, click one of the
i. Traditional Keyboards two mouse buttons to execute the command.
 They are the commonest type  Types of computer mice are;
 They are a full sized rigid keyboard Standard Mouse
ii. Flexible Keyboards  Also called traditional mouse
 They are more portable keyboard •Has;
 They can be folded and packed in a bag –A ball underneath
iii. Ergonomic Keyboards –Two buttons
 They are less common
 They are designed to give comfort and –Optional scroll button between the left and right
alleviate wrist strain buttons
iv. Keypads
 These are miniature keyboards
 Are used on portable devices eg
–PDAs
–Laptops
–Mobile phones
–Palmtops Optical Mouse
 Has no moving parts.
–Etc.
 Works by using a tiny digital camera taking
v. Braille Keyboards
1,500 pictures every second of the surface
 They are designed to be used by the blind
where it is resting
 They consist of keys identified by raised dots.
 Interpreting the pictures directs the mouse
movement and position on the screen

Prepared by Sir A. Kanyika 9|Page


Form 1 Computer Studies comprehensive study notes

Cordless Mouse
 Also called wireless
 Is a battery powered mouse that uses radio or Light pen and Stylus
infrared waves  A light pen detects the command or item
 Has no physical connection to the system unit being illuminated by it.
 A stylus is used on PDAs, etc that recognise
commands or hand written data.

Trackball
 Works like mouse
 But its ball is located at the top
 Rotating the ball moves the pointer on the
screen 3. Scanning Devices
 Some computer keyboards have integrated  Scanning means capturing data and
trackballs; no need for a mouse converting it into digital format
 SD can be grouped acc. to technology used
to capture data;
–Optical scanners
–Magnetic scanners
1. Optical Scanners
 Capture data using optical or light technology
 As a light beam passes over an object, a
software analyses the image
 Examples are;
Joystick a. Optical Mark/ Bar Recognition Scanners (OMRs)
 Looks like a lever  Detect marks on a piece of paper using ink or
 Used for playing computer games soft pencil by passing an infrared beam over
 The user controls game actions by varying them.
the pressure, speed and direction of the  Used to mark multiple choice questions
joystick  OBRs
 Command buttons and triggers issue  Capture data codes as barcodes (lines of
commands or actions in the software varying thickness)
 These are Universal Product Code (UPC)
 They hold manufacturer’s details

Prepared by Sir A. Kanyika 10 | P a g e


Form 1 Computer Studies comprehensive study notes

2. Magnetic Scanners
 Capture data written using magnetic ink or
coded onto a magnetic strip.
 Common examples are;
–Magnetic Ink Character Recognition (MICR)
–Card Readers
 MICR read characters written with magnetic
ink
–E.g. cheque reader
MICRs

an OMR reader

3. Digitizers
 Also called graphic tablets
OBRs  Can draw an image using a stylus
 The image appears on a computer screen,
not a tablet
 Used to trace highly detailed engineering &
architectural drawings and designs
Digitizers

Bar codes
b. Optical Character Recognition
•Used to read typewritten, computer printed or
handwritten characters 4. Digital Cameras
•Also changes images into a soft copy that can be  Capture images as other cameras do but
manipulated using a word processor images are stored in digital form
•A flat-bed is a modern OCR scanner used to capture  Pictures are stored on a memory card instead
pictures and real objects of a film
OCRs  Images can be
–Edited
–Printed
–Uploaded to the internet
Digital Camera

Prepared by Sir A. Kanyika 11 | P a g e


Form 1 Computer Studies comprehensive study notes

Microphones

Other Input Technologies


 Touch Screen
 User can use a finger or stylus to write or c. Interactive Whiteboards
select an item  Also called smart boards
 The screen has infrared light crisscrossing  They are large displays connected to a
behind it computer
 Touching the screen, the finger interrupts light  The computer display is projected onto the
and the output is displayed on the screen board’s surface
 Touch screens are usually used  Users control the computer and write using a
–In retail stores pen or finger on the display
–In airports  The board is mounted to a wall or on a floor
–On smartphones stand
 Smart boards are used
–On PDAs
–In classrooms
A Touch Screen
–Corporate boards
–Seminars
Interactive Whiteboards

B. OUTPUT DEVICES
MICROPHONE  Are peripheral devices a computer uses to
 A microphone is used to enter data inform of give out information processed from data.
voice into the computer.  Can be classified into;
 This method is mostly suitable for the –Soft copy
physically challenged users,
–Hard copy
Soft Copy Output Devices
Limitations of voice input
 Soft copy is intangible output that can be
 It does not fully support speech related
heard or seen
aspects such as-
 Examples of soft copy devices are
i. Accents
–Visual display units
ii. Inflections
iii. tones –Sound output devices
–Data projector
NB. To overcome this problem, the system can be –Light emitting diodes (LEDs)
trained. Visual Display Units
 Also called a monitor or screen
Prepared by Sir A. Kanyika 12 | P a g e
Form 1 Computer Studies comprehensive study notes

 Called monitor coz it helps the user to monitor


what is going on in the computer
 Displays information as texts, pictures and
videos
 There r three common types;
–Cathode Ray Tube (CRT)
–Liquid Crystal Display (LCD)
–Gas Plasma Displays (GPD)
 LCD and GPD are also called flat-panel
displays i. Passive Matrix
a. Cathode Ray Tube Monitors  Here LCDs create images by scanning the
 Has a long glass tube with an electron gun on entire screen
one end and a screen on the other end.  Requires little power
 The screen is coated with tiny phosphorus  Have poor clarity
dots ii. Active Matrix
 The electron gun shoots electrons to  Makes displays using thin film transistor
illuminate the screen technology.
 The dots consists of three primary colours  Hence the name TFTs.
–Red  They consume more energy than passive
matrix
–Green  They offer better clarity
–Blue c. Gas Plasma Displays
 These make a pixel  They resemble LCDs
 But they use gas not liquid crystals
 They contain millions of pixels illuminated by
charged neon gas
 Images do not suffer from angle distortion like
in LCDs
 This technology is currently used to produce
–High Definition (HD) TVs
–Wall display screens

b. Liquid Crystal Displays Monitors


 Is made of special liquid crystals
 Unlike CRT, LCD
–Are less bulky
–Consume less power
–Have little effect on eyes
 As such, LCDs are gradually replacing CRT
monitors on desktop computers
 Images suffer from angle distortion though Monitor Display Terminologies
 Two technologies are used to make LCDs  As you work with the three monitors, the
following terms are common
Pixel
 Stands for picture elements
 They r tiny dots used to form images
displayed on the screen

Prepared by Sir A. Kanyika 13 | P a g e


Form 1 Computer Studies comprehensive study notes

 In a color monitor, the pixel has three primary  Has a resolution of up to 1024 x 768 pixels
colour elements ie  It is popular with 17 and 19 inch monitors
–Red Super Extended Graphic Array (SXGA)
–Green  Has a resolution of up to 1280 x 1024 pixels
 It is popular with 19 and 21 inch monitors
–Blue Ultra Extended Graphic Array (UXGA)
Color Depth  It is the latest and highest standard
 Refers to the number of colors that can be
displayed by a pixel SOUND OUTPUT DEVICES
 It is measured in bits  Produce sound such as beeps, audio or
Resolution digital
 Is the number of pixels per inch on the screen  Some computers come with inbuilt speakers
 It is usually given as dots per inch (dpt) orbits –So no need to connect external speakers
 the higher the resolution, the more the pixels  External speakers’ should be connected to a
per square inch sound card thru the jacks on the SU or on a
 Images will be clearer multimedia monitor.
Refresh Rate
 It is when images in the video RAM are used
to refresh the one on the CRT screen.
–Because CRTs cannot hold an image for a long time
 If a screen has low Refresh Rate, images
flicker
 This causes eye strain.
Display Size
 Is measured in inches as the diagonal length
of the screen measured from top right to Data Projector
bottom left  Displays output from a computer onto a plain
VIDEO GRAPHIC ADAPTERS white screen
 A monitor must be connected to a video –e.g. a wall or whiteboard.
adapter plugged or integrated on the  It is a creative way of presenting output to
motherboard to display information audience.
 VAs determines the resolution and clarity of  This is gradually replacing the traditional
the monitor. overhead projector
 Examples of Vas include;
Color Graphic Adapter (CGA)
 Is the oldest type of adapters
 It displays images and text up to 16 colours
Enhanced Graphic Adapters (EGA)
 Was an improvement of CGAs
 It also displays in 16 colours
Video Graphic Array (VGA)
 Displays text, graphics and videos using 256 Light Emitting Diodes (LED)
colours.  Are indicators that display light when an
Super Video Graphic Array (SVGA) electric current is passed thru them
 Displays text and graphics using more than  –E.g. the red or green light on the SU
16 million colours  Helps the user to know whether it is on or off
 It has a minimum resolution of 800 x 600  Mostly, LED are used to give warnings.
pixels Hard Copy Output Devices
 Hard copy refers to tangible output that can
Extended Graphic Array (XGA) be felt eg paper.
Prepared by Sir A. Kanyika 14 | P a g e
Form 1 Computer Studies comprehensive study notes

 Examples of such devices are Advantages of impact printers


–Printers i. They are cheaper to run
–Plotters ii. They print for long periods without
Printers breaking
 Primarily used to produce information on
paper Disadvantages of impact printers
 The quality of a hard copy depends on the i. They produce low quality printouts
printer's printing mechanism. ii. They are noisy when printing
Classification of printers iii. They are generally slow
 Printers are classified according to different
printing mechanisms. iv. They cannot print color text or graphics
 The two categories are:-
2. NON-IMPACT PRINTERS
1. Impact printers
 Non-impact printers print using ink, thermal or
2. Non-impact printers laser mechanisms
IMPACT PRINTERS Advantages of non-impact printers
 Impact printers print using striking i. They are faster than impact printers
mechanism. ii. They are quite than impact printers
 This means that they strike the paper in order Types of Non-impact printers
to form an imprint on it. There are fourty pes of non-impact printers.
Examples of impact printers These include:-
a. dot matrix a) Inkjet printers
b. Daisywheel b) Thermal printers
a. Dot matrix c) Laser printers
 This has a set of pins on the printer’s head d) Photo printer
Which strikes on an ink ribbon placed over the
Paper. a. inkjet printers
 These printers print by spraying tiny ink
droplets onto a paper to create an image.
 A colour inkjet printer may have black and
tricolour cartridge.
 This cartridge contains cyan, magenta and
yellow (CMY) compartments.
 The cartridge has nozzles that do the actual
spraying of ink on the paper.

b. Daisy wheel printers


 This has a removable flower-like wheel
consisting of spokes with embossed
characters.
 When printing, the wheel is rotated to align
the required character and then the character
is hit with a hammer
Advantages inkjet printers
i. They are cheaper to purchase
ii. They produce better quality printouts.
iii. They can print color text and graphics

Disadvantage of inkjet printers


Prepared by Sir A. Kanyika 15 | P a g e
Form 1 Computer Studies comprehensive study notes

i. They are more expensive to run due to


the high cost of replacing the cartridge.

ii. They are slow


b. Thermal printers
 These use thermal technology to heat ink
which is normally in wax or resin form to
melting point before fusing it onto the paper.
 They are mostly used in point of sale d. Photo printer
terminals to print receipts
 These are special purpose printers designed
to print photos.

Advantages of thermal printers


 They produce high quality printouts
Disadvantage of thermal printers Factors to consider when purchasing a printer
 They are more expensive as they use i. Print quality:
expensive thermal  Dot matrix printers are good for bulk printing
c. Laser printers of draft documents
 These operate by shining a laser beam to  Laser printers are good for printing official
create an image on a rotating drum. documents while
 As the beam hits the drum, it ionises some  Thermal printers are good for checkout
regions which attract ink toner particles. counter receipts.
 The toner is then fused onto the piece of ii. Initial cost:
paper through heating.
 Laser and thermal printers are still expensive
Advantages compared to inkjet printer
 They print very fast than inkjet and thermal iii. Running cost:
printers  The cost of maintaining an inkjet printer is
 They are cheaper to run higher than that of maintaining laser printers
 They produce high quality printouts. iv. Speed:
Disadvantages of Laser printer  The speed of a printer is measured in terms
i. They are expensive to purchase of the number of pages it can print per
ii. They are monochrome i.e. print one minute.
colour only (except the expensive ones v. Color printing:
which print colour)
 Most printers support black and colour
printing.
 Colour printers especially lasers are relatively
 More than expensive.
Useful information

Prepared by Sir A. Kanyika 16 | P a g e


Form 1 Computer Studies comprehensive study notes

 Ensure that all computer products and  Examples of removable storage


peripherals purchased have the following  Magnetic tapes
 energy star mark and  Floppy disks
 National Bureau of standard mark
 This ensures that the devices are of OPTICAL DISKS
 good quality and Solid state devices
 efficient in terms of energy consumption and
emissions 1. Magnetic tapes
 Environmentally friendly  Made using a thin ribbon of myler, coated
Plotters with a thin layer of magnetic material
 Is a large type of hard copy output device. composed of iron oxide.
 Plotters are mostly used for printing  The tape resembles the music cassette used
geographical, architectural and engineering in home tape recorders.
drawings.  The tape may be housed in a plastic
 Examples of drawings include cartridge.
 maps  Data is read from or written using a tape
 advertisement posters to be placed on drive.
billboards  Examples of magnetic tapes
 Machine parts. Etc.  Reel to reel tapes
 Cassette tapes
 Cartridge tapes

SECONDARY STORAGE DEVICES


 These are devices that provide alternative
long-term storage for programs, data and
information. Disadvantages of using magnetic tapes
 They are also referred to as auxiliary storage.  Are slow because of the linear storage of data
 Regarded as secondary because they aro not records on the tape. Thus there is need to
directly accessed by the CPU. access the proceeding records before getting
what is required.
Classification of secondary storage devices
 A space between successive data records
 They are classified according to called Inter-Record Gap (IRG) results in
wastage of storage space.
(a) Portability as removable and fixed
2. Floppy disks
(b) Technology used to store and retrieve data as
magnetic, optical, magneto-optical and solid state  A floppy disk/diskette is made up of a small
flexible disk coated with magnetisable iron
Removable storage oxide.
 Removable storage media are storage a. Reading/writing to a floppy diskette
devices that are not housed inside the
computer.  Reading from a diskette means converting
 Data is read and written into the media using magnetic spots of data from the diskette into
a drive. signals for retrieval
Prepared by Sir A. Kanyika 17 | P a g e
Form 1 Computer Studies comprehensive study notes

 Writing to a floppy means converting signals  A zip disk has a higher storage capacity and
into magnetic spots and storing them onto the is physically thicker.
available space on the diskette.  A zip disk can hold as much as 250 MB of
 A computer must have a floppy drive in order data.
to read or right contents into a floppy disk.  Zip disks mostly come with separate portable
external zip drives.
Storage capacity
 Floppy disks come in different sizes with
different storage
 5.25 inch diskette- these were very large in
size but with lower storage capacities.
 3.5 inch diskette- are smaller in size but can
hold as much as 2.88 MB

4. Jaz disks
 Jaz disks resemble zip disks in every sense
only that they can hold as much as 2 GB.
 Data is read or written using internal or
external jaz drives.
 High capacity floppy
 Simply known HiFD disks are high capacity
diskettes
 The structure of a floppy disk platter 5. High capacity floppy
 This a circular flexible disk coated with
magnetic material.  Simply known HiFD disks are high capacity
 This is seen when a protective casing of diskettes
floppy disk is removed.  They can store up to 200 MB of data.
 The surface of the disk is divided into tiny  HiFD drive can also read magnetic 1.44 MB
invisible concentric circles called tracks that diskette.
store data. 6. Laser Servo 120 Super Disks
 The tracks are further divided into units called
sectors  Laser Servo 120 Super Disk technology (LS-
120) resembles the 3.5 inch diskette
But it uses optical technology
 It has greater storage capacity. It can store up
to 240 MB of data
 It has greater speed of data retrieval
 LS-120 drive can read and write both the 3.5
inch floppy disk and the 120 MB super disk.
Care of magnetic storage media
 To avoid accidental loss of data or
3. Zip disks information held on magnetic media, the
 A zip disk is a high capacity magnetic diskette following rules must be observed:-
that resembles a floppy disk.
Prepared by Sir A. Kanyika 18 | P a g e
Form 1 Computer Studies comprehensive study notes

1. Do not expose magnetic media to strong magnetic  To record data, the recording surface is made
fields. into pits and lands (bumps)
 When a laser beam falls on the land, this is
 This disorients the magnetic dipoles causing interpreted as 1, otherwise a zero is recorded.
erasure of recorded data.
ii. Compact disk-recordable (CD-R)
2. Do not expose a magnetic media to excessive heat.
 It is coated with special dye which changes
 Heat energy leads to magnetic strength in colour to represent data when burned using a
materials hence magnetically recorded data laser beam.
can easily get lost.  Once data is burned on a CD-R, it becomes
4. Do not bend or sold a magnetic media or put heavy read only.
weights on them to avoid breaking or damaging it. NB: CD-ROMs and CD-Rs are referred to as Write
3. Do not drop magnetic media on the ground Once Read Many (WORM). That is, data is only
because the impact weakens magnetism recorded once but can be read as many times as
possible.
5. Do not touch the magnetic surfaces.
iii. Compact disk-rewritable (CD-RW)
6. Do not remove a media from the drive when it is
still being accessed by the computer.  This type of compact disk allows the user to
record, erase and rewrite new information.
 This may result to data loss.
b. Digital Versatile Disks (DVD)
Optical storage media
 It is also known as digital video disk.
 They are called optical storage media  It resembles compact disks in every aspect
because data is written and read from them but the difference is that it has a higher
using a laser beam. storage capacity. It can store data up to 17
 A laser beam is a very strong concentrated GB (which is equivalent to twenty five 700 MB
light. CDs).
Reasons for optical storage media  It is suitable for recording motion pictures
such as videos because it offers better sound
 They store very large volumes of data. and picture quality than the CDs.
 Data stored in them is more stable and more
permanent than the magnetic media c. Optical cards
 Examples of optical storage media  Optical card resembles MICR card but data is
a. Compact Disks (CD) read and written optically on a stripe.
 It is mostly used in banking and other
 These hold large quantities of data and business organisation to record customer
information. details.
 One disk can hold as much as 700 MB.
 They are mostly used to store data and d. Optical tape
information that requires a lot of space. e.g.  It is similar to a magnetic tape only that data
video clips, software, sounds, etc. is stored on it by using optical technology.
Forms of Compact Disks Solid state storage media
i. Compact disk-read only (CD-ROM)  This is a non-volatile storage that employs
 This contains data that can only be read but integrated circuits rather than mechanical,
cannot be written. magnetic or optical technology.

Prepared by Sir A. Kanyika 19 | P a g e


Form 1 Computer Studies comprehensive study notes

 They are called solid state because they do  It has more than one platter which stacked on
not have movable parts. top of each other to form a cylinder.
 Examples of solid state storage media
 Memory sticks
 Flash disks

Hard Disk
 As the disk rotates, read/write head moves in
 Hard disk is referred to as fixed disk because and out over the surface to record or read
traditionally it is mounted inside the computer. data.
 However, some disks are removable.  Hard disks have gained widespread
 The hard disk is also known as a hard drive. popularity.
 It is made up of metallic disk platters together  This is so because they provide efficient data
with a read/write head, housed in a protective transfer and large storage capacity.
metal case.
THE CENTRAL PROCESSING UNIT (CPU)
 The Central Processing Unit is also called the
Processor
 It is the most component of the computer.
 Is regarded as the brain of a computer
because all processing activities are carried
out inside the processor.
 In Microcomputers, the CPU is housed inside
the system unit.
 It is mounted on a circuit board called
Motherboard or System Board
 The read/write head floats above the surface Functional Elements of the CPU
of the rapidly rotating disk to read or write i. The CPU consists of three functional units
data. namely:-
 Most computer hard disks are connected to ii. The Control Unit (CU)
the motherboard via a channel called a iii. The Arithmetic and Logic Unit (ALU)
controller. iv. The Main Memory
 Examples of controllers are
 Integrated Drive Electronic (IDE)
 Enhanced IDE (EIDE)
 AT attachment (ATA)
The structure of the disk platters
 A hard disk drive consists of one or more
metallic platters, stacked on top of each other
but not touching one another.
 The stack of platters is attached to a rotating
pole called a spindle.

Prepared by Sir A. Kanyika 20 | P a g e


Form 1 Computer Studies comprehensive study notes

i. The Control Unit  Carries out all arithmetic and logical


 It coordinates all processing activities in the operations
CPU as well as the following operations:-  The basic Arithmetic operations are
–Input –Additions
–Storage –Subtraction
–Output –Multiplication
 It determines which operation or instruction is –Division
to be executed next.  Logical operations are done by comparing
 To coordinate these activities, the control unit two or more values
uses a system clock.  E.g. the ALU can compare if a piece of data is
 The system clock sends electric signals for as –Greater than
its means of communication.
 The number of pulses per second determines –Less than
the speed of microprocessor i.e. –Equal to
–The faster the clock pulses, the faster the CPU –Not equal to
hence the faster the computer can process data.
Major functions of the Control Unit –For ALU to process data, it has a special temporary
i. Reads the code for the next instruction storage location called registers.
from the cell (portion of the memory) Registers
indicated by the program counter.  Are temporary storage locations used by the
ii. A program counter is a special register ALU to do operations
that keeps track of which location in  They hold data just before processing
memory the next instruction is to be read  They also hold results after processing.
from.
iii. Interprets the numerical code (binary THE MAIN MEMORY
numbers) for the instruction into a set of  It is a Primary Storage that is directly
commands or signals for each of the accessible by the processor
other systems.  It is classified into;
iv. Increments the program counter so that it –Read Only Memory
points to the next instruction.
 Reads whatever data the instruction requires –Random Access Memory
from cells in memory or perhaps from an See Figure Below
input device.
 The location of this required data is typically
stored within the instruction code.
v. Provides the necessary data to an ALU or
register.
vi. If instruction requires an ALU or specialized
hardware to complete, it instructs the
hardware to perform the requested
The ROM
operation in situations in which instruction
 This is used to store programmed instructions
requires an ALU or specialized hardware to
and data permanently or semi-permanently
complete
 The data and instructions stored in ROM are
vii. Writes the results from the ALU back to a
those that remain unchanged for a long time
memory location or to a register or perhaps
e.g.
an output device.
–POST instructions
ii. The Arithmetic and Logical Unit

Prepared by Sir A. Kanyika 21 | P a g e


Form 1 Computer Studies comprehensive study notes

–Special purpose computers and computerized fuel  Called Random Access since it can be read
pumps instructions directly despite the sequence in which
Types of ROM contents were stored
 Vary with permanence of instructions stored  Used to hold instructions and data for running
 There are four types; applications
–Mask Read Only Memory  Info.. in RAM is always read, changed and
removed
–Programmable Read Only Memory
 Keeps data/ info temporarily
–Erasable Programmable Read Only Memory –So store in a more permanent device before
switching off the computer
–Electrically Erasable Programmable Read Only
Characteristics of RAM
Memory
i. Data can be written (stored) and read
Mask Read Only Memory
(retrieved) in it
 Abbreviated as MROM
ii. It is a volatile storage
 Content cannot change once written on it by
manufacturer iii. Its contents are user defined i.e.
Programmable Read Only Memory –The user dictates what should be in the RAM
 Abbreviated as PROM Types of RAM
 It allows the user to alter the written contents  There are only two;
only once. –Static RAM
Erasable Programmable Read Only Memory
–Dynamic RAM
 Abbreviated as EPROM
Static RAM (SRAM)
 It has a transparent quartz window through
 Is a fast type of memory
which its contents can be erased.
 It is mostly located inside microprocessor
–This is done by exposing the window to UV light
 As such, it is used on special purposes
 Once erased it can be reprogrammed for
memories e.g. Cache Memory (CM)
other uses.
 Cache Memory enhances the processing
Electrically Erasable Programmable Read Only
speed by holding data and instructions
Memory
instantly needed by the processor.
 Abbreviated as EEPROM
Dynamic RAM (DRAM)
 Can be erased and reprogrammed using
 Is relatively slower type of RAM compared to
electricity.
SRAM
–e.g. the memory that stores the basic input/ output
 Dynamic refers to the tendency for the stored
system (BIOS)
charge leaks away, even with constant power
Characteristics of ROM
supply
i. Can only be read, not written unless it is a
 Thus to maintain data storage, DRAM
special type
requires periodic recharging (refresh).
ii. It is non-volatile.
Rambus RAM
 Contents are not lost when the computer is
 This is the latest and fastest RAM in terms of
switched off
response time.
iii. Stores permanent or semi-permanent instructions
from the manufacturer called firmware. Special Purpose Memories
 Can store semi-permanent instructions since  These are included in a microprocessor/ input
some variations of ROM chips can be or output devices
programmed according to user’s  Used to enhance performance
specification.  They are;
Random Access Memory (RAM) –Cache Memory
 Also known as working Storage
–Buffers Memory
–Register Memory
Prepared by Sir A. Kanyika 22 | P a g e
Form 1 Computer Studies comprehensive study notes

Cache Memory  Memory and storage capacity is measured in


 Is fast type of RAM special units called bytes.
 There are three types.  A byte is equivalent to a single character.
a. Level 1  Characters can be numbers from 0-9, letters
b. Level 2 A to Z or special symbols.
c. Level 3  For example, a number like 2545 has four
bytes while words, My Home has seven bytes
since the space between them has 1 byte.
Level 1
 Bytes are formed from bits. 8 bits make 1
 It is also known as a primary cache
byte.
 It is located inside the microprocessor
Expressing memory capacities
Level 2
 Memory quantities can be expressed in:
 It also known as external cache
1. Kilobytes (KB)-this is approximately 1000 bytes, but
 It may be inside the microprocessor or
the actual size is 1024 bytes. This is because the
mounted on the motherboard
computer uses base system (0 and 1; 2
Level 3
 Is the latest type of cache 2. Megabytes (MB)
 It works with L2 to optimize system 3. Gigabytes (GB)
performance
Buffers 4. Terabytes

 These are special memories found in OVERALL FUNCTIONAL ORGANISATION OF THE


input/output devices. CPU
 Input is held in the input buffer while
processed output is held in output buffer.  Fig. 3.42 shows a summary of the overall
 E.g. computer printers have buffers where functional organisation of the CPU and how it
they can store massive documents sent by controls other computer components.
the CPU for printing.
 This makes CPU free that it can perform
other urgent tasks as the printer continues to
print in the background.
Registers
 These hold one piece of data at a time.
 They are found inside the CPU
Examples of registers
i. Accumulator-this temporarily holds the
results of the last processing step of the
ALU.
ii. Instruction register-this temporarily
holds an instruction just before it is
interpreted into a form that the CPU can
understand.
iii. Address register-temporarily holds the  The arithmetic’s and logic unit, the control units
next piece of data waiting to be and the main memory use electrical pathways or
processed.
links referred to as buses.
iv. Storage register-temporarily holds a
piece of data that is on its way to and  There are three types of buses namely:
from the CPU and the main memory.  Control bus: This is the
pathway for all timing and
Memory capacities
controlling functions sent by the
Prepared by Sir A. Kanyika 23 | P a g e
Form 1 Computer Studies comprehensive study notes

control unit to other parts of the MHz


system. Pentium 199 Intel 150, 166, 180, and 200
 Address bus: This is the Pro 5 MHz’s Used on
pathways used to locate the servers.
storage position in the memory AMD K5 199 AMD 75, 90, 100, and 116
where the next instruction data 5 MHz
to be processed is held. Pentium 199 Intel 166, 200, and 233 MHz
 Data bus: This is the pathways MMX 7 with MMX technology.
Pentium 199 Intel Plugged on to single-
where the actual data transfer
II 7 edge contact (SEC)
takes place.
AMD K6 199 AMD 166-266 MHz
TRENDS IN PROCESSOR TECHNOLOGY AND 7
SPEED. Cyric 199 Cyric 150, 166, or 187 MHz
 Overtime, manufactures of the microprocessors 6x86 7
such Intel, Advanced Micro Devices (AMD), Cyrix Pentium 199 Intel 450 MHz to 1.13 GHz
and the former Sun Microsystem have several III 9
AMD 199 AMD 500MHz to 2.33GHz
brands of microprocessors in the market.
Athron 9
 Each release seeks to address performance and
AMD 200 AMD 600 MHz – 1.8 GHz
cost. Duron 0
 One parameter used to measure performance is Pentium No Intel 1.4 GHz to 3.2 GHz
clock speed measured in Hertz (Hz). 4 v.
 A hertz is a unit of frequency which measures the 200
number of cycles per second in a signal. 0
 A processor clock speed can be in Kilohertz Intel 200 Intel >1.6GHz x 2
(KHz), Megahertz (MHz) and Gigahertz (GHz). Core 2 6
Duo
Table below shows a summary of AMD 200 AMD >2.0GHz x 2
microprocessors trends since 1978. Athron 5
Duo
Proces Ye Manufact Speed and remarks core
sor ar ure
Intel 199 Intel 5 MHz – 10 MHz COMMUNICATION DEVICES
8086 7  These are devices that enable the
Intel 197 Intel Similar to 8086 communication between two or more
8088 9 computers.
Intel 198 Intel 25 MHz  In this section, we will briefly discuss three of
80186 0 such devices namely: the Network
Intel 198 Intel 6-12.5MHz Interference Card (NIC), Modems and Hubs.
80286 2
Intel 198 Intel 16-33MHz Network Interface Card (NIC)
80386 5–  A network interface card (fig.3.43) is plugged
199 into an empty expansion slot on the
0 motherboard.
Intel 199 Intel Upgradeable
 It has ports through which cables from other
80486 0
computers and devices can be plugged.
Pentium 199 Intel 60,66,75,90,100,120,1
3 33,150, 166, and 200
Prepared by Sir A. Kanyika 24 | P a g e
Form 1 Computer Studies comprehensive study notes

 Data moves from the computer, through the


NIC and cables to other devices.
 Today most computers motherboards come
together with on board’s networks interface
cards

COMPONETS OF THE SYSTEM UNITS


 The system unit has many important
components that enable the computer to
MODEMS function correctly.
 A modem is a device that converts a  Some of the components are hidden from the
computer signal from digital form to analog view and can only be seen when the system
form and vice versa for purposes of units is opened. Fig. below identifies some of
transmission over analog media like the most important components of the system
telecommunication wires. unit.
 A modem can be external (fig. 3.44) or built
on the motherboard.
 Improvements in technology have resulted in
modems that are smaller in size but very
powerful.

HUBS
A hub is a device that connects computers on a
network
It relays information from one computer to another on
the same network SETTING UP A COMPUTER

Fig. below shows computers connected on a network  Before setting up the computer, you
using a hub. need to know the various parts and
cables used to connect it to the mains
power supply.
Power supply unit

Prepared by Sir A. Kanyika 25 | P a g e


Form 1 Computer Studies comprehensive study notes

 Though computers are connected to AC  For example if the cable uses 8 lines to transmit
power supply, internal components require data at the same time, it is said to be 8 bit parallel
DC power. cable.
 Desktops PCs use power supply units  The advantages of using such cables is that they
(fig.3.47) mounted on system unit casing. transmit data faster over a short distance.
 You connect the power supply to the mains  A parallel cable connects to a parallel interface
using a power cable. port commonly referred to as line printer {LPT}.
 The work of the power supply unit is to Parallel cables are used to connect printers,
convert AC to DC. optical scanners and some removable storage
drives such as zip drive.

Ports and interface cables


 Peripheral devices are connected to the Serial Interface
system unit through ports using either cables  Serial interface also known as COM or RS232
or wireless connectivity. ports, support transmission of data one bit at a
 Looking at the back of your computer, you are time, hence it is slower that the parallel port.
likely to see the ports such as the ones  Although they can support data transmission to
indicated on the figure below devices connected 15 meters away. Serial cable
are generally used to connect devices such as the
mouse.

UNVERSAL SERIAL BUS {USB} INTEFACE


 Universal serial bus is a new standard serial
interface that is set to replace the conventional
parallel and serial cables and ports.
 Currently, most peripheral devices from printers to
mobile phones are coming with USB as the
Parallel interface
default interface.
 Parallel cables transmit information  Although it transmits only 1-bit at a time, it
simultaneously using a set of many conductors provides very high–speed and quality data
(wires) transmission over distances of approximately 5
metres.
Prepared by Sir A. Kanyika 26 | P a g e
Form 1 Computer Studies comprehensive study notes

 Fig. 3.51 shows sample USB cable. There are


two types of USBs namely: low speed and a
relatively faster high speed USB [2.0]. USB port
can be used to connect as many as 127
peripheral devices to computer daisy chained to a
single port known as the root hub.

Audio interface
 Audio interface or jacks are used to connect
speakers and microphone. By convention, the
sound input in pink.

Small Computer System Interface {SCSI} Fire wire interface


 Small computer systems interface port and  Fire wire or IEEE 1394 has the same features as
interface cables transmit data in parallel but are the USB but transmit data faster than USB.
faster that the parallel cables. Another advantage  It is mostly used for streaming video from a digital
of the SCSI port is that one SCSI port allows us to video camera.
connect multiple devices.

Personal system 2 {PS/2} Interface


 Originally, most computers used the 5-pin DIN to
connect a keyboard to the system unit but the
smaller 6-pin mini-DIN also known as PS/2
interface has replaced this technology.
 Currently, most desktop computers come with two
PS/2 ports, one for the mouse and the other for
the keyboard.
 Fig. below shows a 5-pin and PS/ connectors
showing physical difference in size.

SWITCHING THE COMPUTER ON AND OFF


 Now that you learnt what a computer is and how
to safely use it, it now it me to start working with it.
Video graphics array {VGA} Interface Before you start, the computer instruction or
 A video graphic array {VGA} interface is used to laboratory technician should assist in making sure
connect a monitor or a data projector. that the keyboard, monitor and mouse are
 It is shaped like a letter D with 15 pins as shown properly connected to the system unit.
in fig. below
COLD BOOTING A COMPUTER
 Once you turn on the computer, it automatically
goes through the process of self-test and
preparation for use
 This process is called cold booting or bootup
Prepared by Sir A. Kanyika 27 | P a g e
Form 1 Computer Studies comprehensive study notes

 Once you turn on the computer, you may hear the c) On the message box that appears, click
sound of the cooler fun running turn off. The computer will undergo the
 After a few seconds, lines of text start scrolling up shutdown process
on the screen 4. For users of the earlier vision of windows,
 This process is referred to as power on self-test proceed as follows:
(POST) a) On the start menu, click shutdown
 POST checks the drives, basic input and output b) In the shutdown message window, select
devices such as the keyboards, monitors and the shutdown and then click OK.
mouse
 If a problem is encountered , the process is
TOPIC 4: SAFE USE OF A COMPUTER
haulted and an error is displayed on the screen
 POST is accomplished by a special firmware PROTECTION OF COMPUTERS AND USERS
program called the basic input/output system Computers are delicate devices that need to be
(BIOS) which is held in a ROM chip mounted on handled carefully.
the motherboard
 After POST, the computer reads some The following broad areas need to be carefully
instructions such us the current date and time considered in order to protect both computers and
from a special memory known as users.
complementary metal oxide semiconductor 1. Security of computer hardware and software
(CMOS)
2. Powering the computer on/off
 CMOS is powered by a dry cell that mostly
resembles that of a digital watch 3. Protecting users from hazards
 If the cell is depleted, the computer requires the
4. Safe disposal of computer components
user to enter the current date and time.
 Lastly , a special type of computer program used 5. Protection against malware, viruses and
to manage computers; called an operating system worms
is loaded to the computer memory MEASURES THAT PROTECT HARDWARE AND
SHUTTING DOWN A COMPUTER SOFTWARE
 It is important that the user follows the correct a. Burglar proofing the room
procedures to shutting down a computer at all
 Doors, windows and the roof should be fitted
times
with grills to deter forceful entry into a
 If the procedure is not followed ,then loss of computer room.
data, damage of programs and computer
components may occur  Install an intrusion detection alarm system
 To shut down a computer, proceed as and employ security guards to increase the
follows: level of security alertness against theft of
1. Ensure that all the work has been properly computers and accessories.
stored. This process is called saving b. installing fire prevention and control
2. Close all programs that may be current equipment
running
3. If your computer is running on Microsoft  The recommended extinguishers are the
gaseous type.
windows XP, or Vista or Windows 7
 This is because liquids may cause rusting
a) Click the start button
and corrosion of computer components.
b) On the start menu, click turn off the
computer
Prepared by Sir A. Kanyika 28 | P a g e
Form 1 Computer Studies comprehensive study notes

 Powder particles are not recommended


because they may increase friction and wear
of movable parts. They may also cause disks
to crash.
 Protect computer from too high or too low
temperatures: High temperatures affect the
proper functioning of computer chips. Thus
computers should not be placed next to heat
emitting machines
 Too low temperatures affect functioning of e. Dust and damp control
components hence do not place computers in
over cooled areas like deep freezers.  Dust can be controlled by fitting good window
curtains and air conditioning system that
c. The room should be well laid out filters dust particles from the air entering the
room.
 The room should have enough space for
movement.  Computers should also be covered with dust
 Computers should be placed on stable, wide covers when not in use.
desks to avoid accidentally knocking them
 Dampness or humidity in the lab can be
down.
controlled by using dehumidifiers.
 Cables should be laid out in trunks away from
user paths to avoid people stumbling on  High humidity leads to rusting of the computer
them. metallic parts
d. Powering the computer on/off f. Insulating power cables
 Always switch off computers using correct  Cables and power sockets should be well
procedure to avoid loss of data and insulated and be of the correct power rating to
destruction of software. avoid short circuits that can cause damage to
 Computers require stable power supply. computer components.
 Power from mains supply is intermittent and
may experience power surge or under voltage g. Avoid taking meals in the laboratory
(brownout)  Users should not eat or drink in the computer
 To protect the computer form being damaged laboratory.
due to power instabilities, avoid connecting it
directly to the main electricity supply.  Food particles may fall in moving computer
 Connect it to special device called parts like the keyboard and clog them.
Uninterruptible Power Supply (UPS)  Liquids may pour into electrical circuits and
 The UPS provides power in situations where cause short circuits.
power blackouts occur.
 This allows the user to save his/her work and MEASURES THAT PROTECT USERS FROM
switch off the computer procedural HAZARDS
a. Protection against electric shock
 All cables should be insulated to avoid the
danger of electric shock to users.
 Cables should be laid away from user paths
to avoid tripping on them.
b. Use of standard furniture

Prepared by Sir A. Kanyika 29 | P a g e


Form 1 Computer Studies comprehensive study notes

 Use standard furniture to avoid poor posture  Overcrowding in the computer is not allowed
which may lead to strain injury and limb as it may cause suffocation or spread of
fatigue. communicable diseases.
 The table should be of the right height relative f. Environmental hazards
to the seat to provide comfortable hand
positioning.  Computers emit heat and other
electromagnetic waves into the environment
 The seat should have an upright backrest and during their use.
should be high enough to allow eyes of the
user to be level with the top of the screen.  There is need to comply with the
Environmental Protection Agency (EPA)
energy star policy to encourage minimal use
of power by electronic devices and adhere to
acceptable radiation levels.

c. Light control
 Use Antiglare screens (light filters) and g. Safe disposal of computer components
adjustable screens to avoid eye strain and
fatigue caused by overbright CRT monitors.  Disposal of old computers, monitors, laptop
batteries, printers, e.t.c. poses great risk to
 Modern flat panel displays such as LCD do the environment.
not strain the eye.
 Chemicals from chips and batteries if damped
can leak into underground water tables and
cause contamination. e.g. chemical cadmium.
 It is important to follow the policy of safe
disposal of computer components.
 Those that can be recycled should be
extracted and taken to recycling companies.
 Others should be disposed in agreed sites
d. Ventilation
and following proper procedures to avoid
 Proper ventilation is needed to avoid environmental pollution.
dizziness caused by lack of enough oxygen
CAUSES OF SOFTWARE AND DATA LOSS
and to allow computers to cool.
 The walls of the computer room should not be  Data loss or software loss is the unexpected
painted with overbright reflective oil paints. or accidental loss of data or software stored
in the storage media.
 The screens should face away from the
window.  There are many reasons for data loss and
these include:-
 These help to avoid glare caused by bright
background. 1. Accidental deletion

e. Crowding
Prepared by Sir A. Kanyika 30 | P a g e
Form 1 Computer Studies comprehensive study notes

 Data or software can be lost through faulty  When application software suddenly crashes
procedures which may lead users to delete while working, it may result in severe
data accidentally. damage of to hard drive.
 This an unintentional deletion which may go  This causes the program to close suddenly
unnoticed for a long time. leading to loss of unsaved work or data.
 Thus there is need to think carefully before 9. Computer viruses
deleting any data or program.
 Computer virus can wreak havoc in
2. Malicious deletion computer systems causing massive loss of
data.
 This is an intentionally deletion of data from
the system.  They corrupt the software and data resulting
into unpredictable behaviour.
 This data deleted from the hard disk may be
recovered from the recycle bin (rubbish bin) if 10. Poor storage of disks
it has not been emptied.
 If disks are not stored properly and are
 If the recycle bin is emptied, a data recovery exposed to direct sunlight, heat or moisture,
software can be used to recover the deleted they stop functioning properly leading to loss
files. of data.
3. Accidental media format 11. Vandalism
 Users accidentally format their drives which  Professional hackers can destroy or steal
results into instant loss of data or programs. information.
 Though it is possible to recover data with the  Competitors can also access important data
use of data recovery software. from company's account leading to
corruption, erasure or loss of vital information.
4. Accidental damage
MEASURES AGAINST LOSS OF DATA AND
 If a drive or disk is mishandled or accidentally SOFTWARE
dropped, data and software contained in the
damaged media may be lost. i. Burglar proofing the laboratory to prevent
thieves from stealing computers or
5. Natural disaster
accessories.
 Natural disasters such as fires, hurricanes, ii. Physical restrictions to computer laboratory-
earthquakes can destroy the computer nobody should be allowed into the laboratory
systems leading to loss of data and software. without the presence of the properly trained
6. Power failure and responsible personnel.

 Intermittent power supply can lead to both iii. Having fire fighting equipment inside the
destruction of delicate parts of a computer laboratory and within easy reach.
such as hard disk and unsaved data. iv. Dust proofing computers by covering them
7. Hardware failure with a cloth after use.

 Contents of hard disk may become v. vii. Keep all diskettes in disk fackettes, away
unreadable due to crashing of disk heads from heat, moisture and direct sunlight.

8. Software failure vi. Viii. Connect the computers to UPS to


prevent data and software loss during power
surges.
Prepared by Sir A. Kanyika 31 | P a g e
Form 1 Computer Studies comprehensive study notes

COMPUTER VIRUSES  It attaches itself to the boot strap of the hard


disk where it also prevents the computer from
 A computer virus is a program that loads itself booting correctly.
without permission on the computer and  It is usually spread by removable storage
when executed replicates by making copies devices.
inserting itself into other files.
 It can be also be defined as a program that is 4. MEMORY RESIDENT VIRUS
able to copy itself when it is running without
Permission  They reside inside the computers Random
Access Memory(RAM)
HARMFUL ACT OF COMPUTER VIRUSES  They are first of all set up by the mother virus
on the hard disk but they sustain themselves
 Issuing unauthorised command in RAM even when the mother program
 Deleting data closes.
 Stealing information
5. ROOTKIT VIRUSES
NOTE: Computer virus makes a computer vulnerable
as they take advantage of the computer security and  These viruses try to open up a computer for
get unauthorised access of computing resources. access by external entities.
 They try to give unlimited access to the
TYPES OF COMPUTER VIRUSES unauthorised user(similar to a roof user on
 Computer viruses have many types. Linux or Unix system)
 They are generally categorised according to  Such viruses are sometimes installed by
how they function or how they get access to Trojans.
computing resources.
6. MACRO VIRUSES
1. TROJAN HORSE  These viruses attach themselves to another
 This virus appears to do useful desired applications macro programming code.
functions but does other harmful activities in  Macro code in the application usually enable
the background like: the user to automate most common tasks
performed in that application like:
i. Stealing data files.
i. Saving
ii. Sending files to unauthorised parties.
ii. Printing etc.
 The virus can be spread by:
 The virus infects the computer as the
i. Being downloaded by the user application is shared between users usually
ii. Being installed from removable storage by a word processing and the spreadsheet
device by oblivious users. document.

2. WORMS 7. LOGIC /TIME BOMBS VIRUSES

 This virus replicates itself and moves from  These types of viruses are programmed to
one computer to another through self-initiate/originate OR take a particular
communication links like: action on a particular date or when a certain
event takes place.
i. Bluetooth  An example is a virus that can be set to
delete a data base table or crash software if a
ii. Email attachments
particular employee is fired.
iii. Local Area Network (LAN)  Software companies use this features in their
trial version software where when a certain
3. BOOT SECTOR VIRUS
Prepared by Sir A. Kanyika 32 | P a g e
Form 1 Computer Studies comprehensive study notes

time period elapses, the software asks you for


the paid up license otherwise it stops
functioning. TOPIC 5: COMPUTER SOFTWARE
8. BACK /TRAP DOORS VIRUSES  Computer software/program refers to a set of
instructions that directs the computer on the
 These viruses are Trojans that open up a tasks to perform and how to perform them.
security vulnerability for unauthorised users to
access the computer without the knowledge EXAMPLES OF COMPUTER SOFTWARE
of the authorised user.  Microsoft windows
HOW ARE COMPUTER VIRUSES SPREAD  Linux
 Microsoft office
1. Sharing of the removable storage devices  Adobe Photoshop
like: disks, flash disk, and hard drives.  Adobe illustrator
 QuickBooks
2. Opening emails that are infected then the
virus infect the host computers. TYPES OF COMPUTER SOFTWARE
3. Installing weird/strange software on the  In general they are many types of computer
computer without validating its source. software.
4. Accepting software updates from invalidated  Currently we are supposed to know three
sources. ways on how they are classified: according to;

THE CONTROL MEASURE/HOW TO PREVENT i. Purpose


COMPUTER VIRUSES INFECTION ii. Acquisition
 They are many ways of reducing the risk of iii. End user license (EUL)
computer virus infection and controlling or
managing their negative effects if infected. I. CLASSIFICATION ACCORDING TO
PURPOSE
1. Avoid sharing removable storage
device/media. Where sharing has to take place, scan  Computer software may primarily be designed
the media for virus infection before reading files from to manage hardware resources or help the user
it. accomplish specific tasks.
 Therefore it may be classified as system or
2. Avoid opening unsolicited fore mails offers or application software
installing software from questionable sources.
a) SYSTEM SOFTWARE
3. Install good antivirus software.
 This performs a variety of fundamental
 Antivirus software reads the digital signature operations that avails /helps computer
of a virus recognises it and uses the resources to the users. These function include;
information to clean it from computer files.
 Most viruses are easy to clean once their i. Booting the computer and making sure that
signature has been recognised. all hardware elements are working properly.
 However, polymorphic and metamorphic
ii. Performing operations such as; retrieving,
viruses are a bit complicated because they
loading, executing and storing application programs.
keep on changing their code and digital
signatures every time they replicate to try and iii. Storing and retrieving files
evade or avoid detection.
iv. Performing a variety of system utility functions
NOTE: antivirus software needs to be regularly to (functions that output something).
keep in step with new viruses.
Prepared by Sir A. Kanyika 33 | P a g e
Form 1 Computer Studies comprehensive study notes

SUBDIVISION OF SYSTEM SOFTWARE  These languages are categorised into three


ways: assemblers, interpreters, and
1. Operating system software compilers.
 Is a set of complex programs that work together
b) APPLICATION SOFTWARE
to control execution of uses programs called
applications  They are also known as application
 It also acts as a go between or an interface packages
between applications, the user and the  This refers to programs that are designed to
computer hardware. help the user accomplish the tasks.
 It manages input, output, and storage  The following table gives examples and uses
operations in a computer like these operating of common application packages
systems; Microsoft windows (2000, XP, vista),
UNIX, Linux, and Macintosh (Mac OS). Software Users Examples
Word Typing Word lotus,
2. Firmware /stored logic software processors documents word pro,
like letters open office
 It is the combination of both software and
hardware recorded permanently on electronic writer.
chips. Spreadsheet Calculating Ms excel,
 Usually a firmware is a Read Only Memory budgets lotus 1-2-3
(ROM) chip mounted or plugged into the Desktop Designing Adobe
motherboard. publishing publications PageMaker,
 Firmware may hold an operating system, like Ms
utility programs and language processors. newspaper publisher,
and books adobe
3. Utility software InDesign
Computer Technical Auto CAD
 It is a special program that performs
aided design drawing
commonly usedservices that make certain
Data bases Keeping Ms Access,
aspects of computing to go on smoothly e.g.
records and my-SQL,
sorting, copying, file handling and disk
files Foxbase,
management
paradox
 There are two basic types of utility software:
Graphic Designing Corel Draw,
i. System level utility
software and photoshop
 It helps the user to work with operating
manipulating
system and its function
graphics
 For instance it tells the user when he or she
enters a wrong command and gives
suggestion how the error can be corrected. II. CLASSIFICATION ACCORDING TO
ii. Application level utility ACQUISITION
 It makes the application program run more
smoothly and efficiently. a) IN-HOUSE DEVELOPED SOFTWARE
 These are more commonly purchased  These are programs that are uniquely
separately or may be part of the operating designed and tailored to meet a particular
system user needs
NOTE: language processors also refers to language  For example, a bank may decide to manage
translators that translate a computer written using its banking operations using a unique or
programming languages into a form that can be special program developed by hired
understood by a computer called Machine language. programmers.

Prepared by Sir A. Kanyika 34 | P a g e


Form 1 Computer Studies comprehensive study notes

 These programs are not available in shops  The software may be also classified
and they not address the needs of the other according to End-User-License as open
users. source, proprietary, or freeware.
b) VENDOR OFF-THE-SHELF SOFTWARE a) OPEN SOURCE/NON-PROPRIETARY
 Theses software are developed by software  They refer to software whose source code
engineers, packaged and then made (programmed set of instruction) is freely
available for purchase through vendors, a made to the users.
distributor or directly from the developers.  They encourage to use, modify and distribute
 The developer may bundle more than one but the modified product e.g. Linux operating
closely related software into one package to system, Open office are made available
form a suit or integrated software e.g. lotus under General Public License (GPL).
suite, Microsoft office and Corel word perfect
as opposed to single purpose software e.g. b) PROPRIETARY SOFTWARE
QuickBooks, and sage pastel.  These are software whose source code is
hidden from users.
 The modification is only made by the
NOTE: the word package is sometimes used refer to manufacturers.
these types of software that are packaged and sold by  This software’s may be licensed to the users
vendors. at a fee or applied freely e.g. Microsoft
windows operating system, adobe
ADVANTAGES OF STANDARD SOFTWARE OVER PageMaker, CorelDraw.
THE IN HOUSE DEVELOPED PROGRAMS
c) FREEWARE
1. They can be easily installed and run.
 These are software products that are freely
2. They are cheaper than the in house
made available to the user.
developed software.
 However beware of them because some may
3. They are readily available for almost any task. be malicious /dangerous software.
4. They have minor or no error since they are
TOPIC 6: OPERATING SYSTEM (OS)
thoroughly tested.
5. They can be easily be modified to meet a  An operating system is the complex program
user’s needs. that is responsible for controlling processing
operations in a computer system.
DISADVANTAGES OF STARDARD SOFTWARE
1. They may have some features, not needed by IMPORTANCE OF THE OPERATING SYSTEM
the users, which may take extra storage. 1. It acts as an interface /mediator between the
2. They may require the user to change user and the computer hardware i.e. it sends the
processes and hardware for compatibility which may message via the operating system which has the
in turn be expensive. capacity to give instructions to the hardware to
perform a particular task.
3. They may lack some features required by the
user. 2. It handles input, output, storage and running
other user programs.
III. CLASSIFICATION ACCORDING TO THE
END-USER LICENCE (EUL) NB: without an operating system we can do nothing to
the computer

Prepared by Sir A. Kanyika 35 | P a g e


Form 1 Computer Studies comprehensive study notes

THE GRAPHICAL VIEW ON HOW THE  This arrows the single CPU to execute what
OPERATING SYSTEM WORKS appears to be more than one application program
apparently at the same time.
 Through processor scheduling, the operating
USER system allocates time slice to each ready task.
 Runs application programs  The CPU switches its attention programs as
directed by the operating system.
APPLICATION SOFTWARE  The switching is so fast that it appears as if the
 Send user request to OS task is being executed simultaneously.
CLASSIFICATION ACCORDING TO NUMBER OF
OPERATING SYSTEM USERS
 Receives and executes the
request a) SINGLE USER OPERATING SYSTEM
 This is designed for use by only one person; it
HARDWARE can not support more than one person and
 Receives and does OS runs only one user application program at a
command time.
 The example include; Palm OS, and Ms-Dos.
EXAMPLES OF OPERATING SYSTEM b) MULTI-USER OPERATING SYSTEM
 Microsoft windows 2000, XP, Vista  It is also called multi access operating
 UNIX system.
 Linux  It arrows more than one user to interactively
 Macintosh/Mac OS use the computer.
TYPES OF OPERATING SYSTEM  For example, server operating system such a
windows 2003 server.
 Operating system can be classified according to:  They can at the same time be installed on a
computer that is accessed by all users in an
i. Number of task
organization.
ii. Number of users  Other examples are UNIX, Novell, Windows
NT/2000 and Linux.
iii. Number of interface
CLASSIFICATION ACCORDING TO INTERFACE
CLASSIFICATION ACCORDING TO NUMBER OF
TASKS  The term user interface refers to the
interaction between the user and a computer.
a) SINGLE PROGRAM OPERATING SYSTEM  Operating systems can be classified into
 This type allows processing of one application three categories according to user interface.
programs in the main memory at a time.
a) THE COMMAND–LINE USER INTERFACE
 This means that the user can only run one
interactively program at a time.  It lets the user type at a command prompt.
 The user must exit from the program before  The computer reads the typed command from the
loading and running another program. command line and executes it.
 An example is Ms Dos from Microsoft  For a command to be more users friendly the
Corporation. words used should be descriptive verbs e.g. print
and copy etc. and also unique abbreviation can
b) MULTITASKING OPERATING SYSTEM also be used e.g. DEL, REN, CHKDSK etc.

Prepared by Sir A. Kanyika 36 | P a g e


Form 1 Computer Studies comprehensive study notes

 For example, if you are using Ms Dos operating


system, you can copy a file called fruits. Dat from
a hard disk C to floppy disk as follows:
COPY C:\ fruits. Dat A:\

FUNCTION OF AN OPERATING SYSTEM


 Basically an operating system consists of two
b) MENU DRIVEN INTERFACE main parts namely;
i. Shell
 It provides the user with a list of options to  It is the outer part of an operating system used to
choose from. interact with operating system.
 The interface is suitable for the beginners
who may have difficulties recalling ii. Kernel
commands.  It is the core of operating system regarded as the
 Some operating system presents the user operating system.
with simple menus while others have
sophisticated menus. I. JOB/PROCESSOR SCHEDULING
 It refers to allocating of each job, waiting for
execution, processor time at the given interval.
 Since a computer may have concurrent
processes ready for execution; so it is the
operating system that determines which task will
be processed first.
 The operating system schedules job according to
priorities.
 The higher the priority, the higher the likelihood of
c) THE GRAPHIC USER INTERFACE (GUI) being allocated CPU time.
 This is the latest effort to make the user II. RESOURCE ALLOCATION
interface more users friendly.
 Besides menu, GUI use of rectangular works  Each available resource in a computer is given an
called Windows and the Graphical objects identification number called an Interrupt Request
called icons and the most commands are (IRQ) number.
executed using pointing device.  The operating system uses IRQ number to
 These features are given an acronym WIMP identify the resources being requested.
which stands for Windows Icons Menus and  Poor allocation of resources would result to
Pointers. undesirable condition referred to as deadlock.
 Examples are: Microsoft Windows version  Deadlock is a situation where a particular job
2000, XP, and Vista; Apple Mac OS and holds a requested resource and fails to release it,
various distribution of Linux. yet it is requesting for a resource held by the
other job.
III. MEMORY MANAGEMENT

Prepared by Sir A. Kanyika 37 | P a g e


Form 1 Computer Studies comprehensive study notes

 Data and instructions entered into the VI. ERROR HANDLING


computer are temporarily held in the main
memory before and after processing.  The operating system has many ways of
 However, since RAM is a scarce resource, alerting the user of errors that may arise out
the operating system determines which tasks of illegal operations, hardware or software
remaining in the memory waiting for failure.
executions and which one will be kicked out  Most operating systems express what the
back to secondary storage. error is, and where possible make
 The operating system may organize the main suggestions on how to correct the errors.
memory into blocks of sizes called page  The OS does this by monitoring the status of
frames. the computer system and performing audit
 Processes are equally divided into pieces that checks on the users, hardware and software.
can fit into the frames called pages. VII. INTERRUPT HANDLING
 To manage memory, the operating system
swaps pages between the main memory and  An interrupt is a break from the normal
secondary storage. sequential processing of instruction in the
 Therefore, in terms of memory management, program.
the hard disk where pages are held is  A critical or very important request causes the
referred to as the virtual memory. current process to attend to it, before
returning the control back to the process that
IV. INPUT/OUTPUT MANAGEMENT was initially interrupted
 Like a skilled traffic officer, the operating system FACTORS TO CONSIDER WHEN CHOOSING AN
coordinates between various input/output and OPERATING SYSTEM
other peripheral devices such as auxiliary storage
devices, making sure that data is transmitted 1. The hardware configuration of the computer
securely. such as the memory capacity, processor speed, and
 For example when printing the CPU directs its hard disk capacity.
attention to the printing function. 2. The type of the computer in terms of the size,
 The OS searches for a printer, chooses the and make. For examples Apple computers would not
correct one, translates the name for CPU and run on the Microsoft operating system.
finally the CPU sends the documents to the
printer. 3. The application software intended for the
 This makes the CPU available for other activities. computer.
4. User friendliness of the operating system.
V. COMMUNICATION CONTRAL AND 5. The documentation available.
MANAGEMENT 6. The cost of the operating system.
 The operating system is responsible for managing 7. The reliability and security provided by the
various communication devices and provides an operating system.
environment within which communication 8. The number of processors and hardware it
protocols operate. can support.
 Protocol refers to the rules that govern 9. The number of users it can support.
communication between devices on a network. HOW OPERATING SYSTEMS ORGANISE
 Modern operating systems comes with network INFORMATION
management utilities that provides external  The modern operating system differs on how
communication by connecting to a communication they look and feel, but they handle
system using an interface cable or through information in the same way.
wireless interface such as Bluetooth and infrared.  Most operating system organizes information
in three tier hierarchy.

Prepared by Sir A. Kanyika 38 | P a g e


Form 1 Computer Studies comprehensive study notes

i. Drives .exe Application The file that


ii. Folders launches a
iii. Files particular
i. FILES application
e.g.
 It is a collection of related data given a unique
winword.exe,
namefor ease access, manipulation and
PM.70.exe
storage on backing storage.
.bat System File
WHAT IS CONTAINED IN THE FILE containing a
series of the
a. A unique name commands
b. An optional extension. loaded
during boot
 The name and extension are separated by a up
period (.) e.g. JUNE.DOC. .sys System System file
 In this case the file name is JUNE and the that perform
extension is DOC. fundamental
 The extension are used to identify the type of operations in
a file e.g. a computer
 Doc is a word processor file
 Txt is a plain text file
 Sys is a system file ii. FOLDERS/DIRECTORIES
TYPES OF FILE  In some operating system, a named storage
a. SYSTEM FILES location where related files can be stored.
 They contain the information which is critical  All folders or directories originate from a
for the operating of the computer. special directory called root directory
b. DATA FILES (presented by a back slash ,\)
 They contain the user specific data.  It may be also created inside another folder or
c. APPLICATION FILES directory called subfolder or subdirectory
 It holds the programs and are executable.
Extension File type Description iii. DRIVES
.doc Data A Microsoft  The operating system recognises storage
word media or devices as drives.
document  Drives may be given labels such as letters A
file to Z, to identify
.tif Data A graphic file
created
using Storage Drive Remarks
application location
e.g. adobe Floppy drive A and B If a computer has
Photoshop two floppy drives
.txt Data A plain text one is named A
file created and other B.
using Hard disk C to F If a computer has
notepad or four hard drives
Dos editor they are assigned
by letters between
C and F
Prepared by Sir A. Kanyika 39 | P a g e
Form 1 Computer Studies comprehensive study notes

Optional D, E, F, G If a computer has  The multimedia keyboards has extra support


drives one hard disk and multimedia such as multimedia application
three more launch, volume contral
CD/DVD drives
they will take up 2. CLASSIFICATION BY ARRANGEMENT OF KEYS
any letter between  On the first row of alphabetical keys,
D and G AZERTY, QWERTY, DVORAK, etc. are all
Other D, E, …, Z If a computer does keyboards that fall in this category
removable not have an  This time we shall concentrate on the
storage optional drive any QWERTY keyboard.
removable drive
attached to it can 3. LASER KEYBOARD
take any letter from  This is the one of the latest inversion.
D to Z  A device projects a keyboard on a flat surface
Network LOGICAL Network drives such as table.
drive takes D to Z  The user then types on the projected image
depending on the just as if they were doing it on physical
number of the keyboard
physical drives
installed or 4. FLEXIBLE/ ROLL UP KEYBOARD
attached
 It can be rolled up and fitted in the bags easily
for easier portability
TOPIC 7: USING COMPUTERS THE KEYBOARD LAYOUT
MASTERING THE KEYBOARD AND THE MOUSE
 Like the type writer, the first writing keys on
The Computer Keyboard the upper left of a typing computer keyboard
are; QWERTY.
 A keyboard is a board with a set of keys used  Its commonly referred to as Qwerty keyboard
for entering data into a computer and typing
commands that direct a computer what to do. CLASSIFICATION OF KEYS ON THE KEYBOARD
 A keyboard is an input device made up of
 They are categorised into five ways namely;
keys that enables a person to communicate
to the computer by pressing them. i. Alphanumeric /typing keys
 The keyboards converts human language into
machine language. ii. Functional keys
 A key is a button on a keyboard which iii. Cursor movement and editing keys
performs a specific task or a range of specific
tasks. iv. Special purpose keys
TYPES OF COMPUTER KEYBOARDS v. Numbering keys
 They are categorized into various criteria ALPHANUMERIC /TYPING KEYS
which include:
 They are labeled with the alphabet letters
1. CLASSIFICATION BY FUNCTION OF EXTRA
from A to Z.
KEYS
 Numbers are arranged in line,1, 2, …, 0 and
 The standard keyboard does not have extra special symbol s such as ;, :,], % etc.
multimedia keys.
 It also includes keys like caps lock, enter, tab,
space bar, and backspace.

Prepared by Sir A. Kanyika 40 | P a g e


Form 1 Computer Studies comprehensive study notes

 CAPS LOCK KEY: it lets the user to switch  EDITING KEYS: are used to delete or insert
type in the upper and lower case (capital and characters in a document.
small letters)  INSERT KEY: this helps the user to insert or
 ENTER KEYS (RETURN KEY): pressing this replace a character at the cursor position.
key forces text cursor to move to the  DELETE (Del) KEY: this key deletes
beginning on the next line. characters at the cursor position from left to
 A cursor is a blinking underscore (_) or the right.
vertical beam (|) that shows where the next
character to be typed will appear SPECIAL PURPOSE KEY
 It is also used to instruct the computer to  These keys are used in combination with
execute a command that has been selected o other keys to give certain commands to a
the screen. computer.
 TAB KEY: this key is used to move the next  For example: CTRL+Esc is used to display
cursor at a set of intervals on the sane line for the start menu.
example 10mm, 20mm.  So the special purpose keys are SHIFT,
 THE SPACEBAR: this key creates a space CTRL, ALT, and Esc.
between words during typing.
 THE BACKSPACE KEY: this key deletes NUMBERING KEYPADS KEYS
characters from right to left on the same line.
 It consist of a set of numbers 0 to 9 and the
FUNCTION KEYS arithmetic signs like: + (addition), -(minus),
*(multiplication), and /(division).
 These keys are usually located along the top  They are located on the right hand side of the
of the keyboard. keyboard.
 They are labelled F1, F2 up to F12.  The keypad is meant to help the user to
 They are used for task that occur frequently in rapidly enter the numeric data.
various programs.  They can be only used when the num lock,
 For example, pressing F1 key in most situated on the numeric keypad, is turned on.
programs starts the Help Menu.  But when the num lock is turned off they can
CURSOR MOVEMENT AND EDITING KEYS only be used as cursor movement and editing
keys
 They are used to move the cursor on the
screen. NB: it is important to note not all keyboards have the
 ARROW KEYS: pressing the right or left numeric keypads.
arrow key moves the character to the right or  For example: portable computers e.g.
left respectively. laptops may lack a separate numeric keypad
 Pressing upward and downwards arrow key due to size limitations.
moves the cursor one line up or down
respectively
 PAGE UP AND PAGE DOWN KEY: pressing
up the keys moves the cursor up one page in
case the documents has many pages.
 Pressing the down key moves the cursor
down one page in case the documents has
many pages.
 HOME AND END KEYS: pressing the home
key the cursor to the beginning of the current
line.
 Pressing the end key moves the cursor to the  Backspace: Deletes backwards
end of the current line.  Enter: For starting a new line
Prepared by Sir A. Kanyika 41 | P a g e
Form 1 Computer Studies comprehensive study notes

 Shift: For typing CAPITALS  Typing Master,


 Spacebar: For spaces between words  Touch tutor etc.
 Delete: Deletes forward
 Tab: For starting a paragraph GOOD KEYBOARDING POSTURE

TYPING  When learning typing using the typing tutor,


observe the following keyboard guidelines.
 Typing refers to the insertion of text in the
word processor or any other program or text 1. Sit upright with both feet firmly on the ground
box. maintaining an alert posture.
 It is done by simply pressing the respective 2. Place the material to be typed on your left in a
keys on the keyboard. position you can read without straining.
 Some keys, however, have two symbols on
them. 3. Rest both hands on the keyboard with fingers
 To type a symbol that is on the top of a resting on home row keys.
button:  These are keys on which fingers rest during
– Hold down Shift typing on readiness to place other keys.
 Place the left hand fingers on the (ASDF)and
– Press the button the right hand finger on the semicolon(;),L,K,J
DELETING TEXT with thumb on the space bar.
 The right &the left thumb should rest on the
 To delete a text that is on the left of the space bar.
cursor, use Backspace key
 To delete text that is to the right of the icon, Always return your fingers on home row position after
use Delete key striking other keys.

BLIND TYPING AND KEYBOARD POSTURE 4. Start typing slowly at first.


 Do not look at your fingers when typing.
 The point of blind typing is in having hands  If you don’t do so you will never learn how to
dangle in the middle of the keyboard while the type quickly and accurate.
fingers rest on certain keys (home keys).  The ultimate goal is to gain typing speed of
 To enter a letter there is need to reach the not less than 30 words per minute.
appropriate key with the closest finger.
 Thumbs are used to press the space bar.
 The other eight fingers rest in the centre of
the keyboard

GOOD TYPING POSTURE


 In order to increase your typing speed &
accurate, typing software offers the lessons
one needs to start from using one hand while MOUSE
typing to become a proficient user .  A mouse consists of one or more buttons.
 Some typing software come with different  Some mice include a scroll wheel.
games to make typing more interesting.  The mouse is the main tool for interactng with
 There are many typing software’s available the GUI.
commercially such as  A standard Personal Computer mouse has
 Mavens Beacon Teachers Typing, two buttons (left and right buttons)
 Typing Pal,

Prepared by Sir A. Kanyika 42 | P a g e


Form 1 Computer Studies comprehensive study notes

 Whenever one wants to click an icon or  This means pressing & releasing the left
anything, s/he uses the left button unless mouse button.
expressively advised to use the right button  A click often selects an object.
(right-click) Uses
DOUBLE CLICKING
A mouse is used for the following:
 This means pressing and releasing the left
 Selecting texts or graphics button twice in quick succession.
 Drawing auto shapes  Double clicking usually opens the file or starts
 Pointing at menus a program.
 Displaying menus
RIGHT CLICKING
MOUSE SKILLS
 Pressing the right hand mouse button once.
 Moving a mouse on a flat surface, make the  This display a list of command called a
pointer on the screen to move the same shortcut menu or contest sensitive menu.
direction as the mouse itself.  It is called contest sensitive menu because
 To make a selection the pointer must be on the command on it apply to the right clicking
the object that is to be selected. item.
 After selecting the user can manipulate the
object by pressing a mouse button. DRAG & DROP

GOOD MOUSE USE  This is where the user drags an item from one
location on the screen to another.
 When using a mouse follow these guidelines  This is accomplished by following the
procedure below:-
i. Place a mouse on a flat smooth surface. i. Point to the item you want to drag.
ii. Gently hold the mouse with your right hand, ii. Press the left hand mouse button and
using the thumb and two fingers. hold it down.
iii. Slide a mouse until the pointer reaches
iii. The index finger should rest on the left button the desired position on the screen.
while the middle finger rest on the right button. iv. Finally release the mouse button and the
item will be dropped in the new location.

PRACTICAL HANDS ON SKILLS


 Before starting operating on a computer
instructor or laboratory technician should
assist in making sure that the keyboard,
monitor and mouse are properly connected to
the system unit.
FOUR COMMON MOUSE OPERATIONS
IDENTFYING THE POWER BUTTON
1. Clicking
 The power button is usually located
2. Double clicking somewhere on the front of the system unit.
 Pressing it switches on the computer.
3. Dragging
4. Dropping
5. Right clicking
CLICKING

Prepared by Sir A. Kanyika 43 | P a g e


Form 1 Computer Studies comprehensive study notes

COLD BOOTING A COMPUTER  If the user wants to leave the computer for a
while without switching it off.
 Once you turn on the computer, it  It is important to log off the computer to avoid
automatically goes through a process of self- a stranger using his or her session to perform
test and preparation for use. exploits, simply click the start button then
 This process is called cold booting or boot up. select the log off button.
 Once you turn on the computer, you may
hear sound of the cooler fan running.
 After few seconds, lines of text starting SHUTTING DOWN THE COMPUTER
scrolling up on the screen.
 This process is called power-on-self-test  It is important that the user follows the correct
(POST) procedures of shutting down the computer at
 POST checks on the existing drives, basic all times.
inputs and outputs devices such as keyboard,  If the procedure is not followed, then loss of
monitor and the mouse. data, damage of programs and computer
 If a problem encountered, the process is componets may occur.
halted and an error message is displayed on The following are the procedure when
the screen. shutting down the computer:
 POST is accomplished by a special firmware i. Ensure that all the work has been properly
program called the basic input/output system stored. This process is called saving
(BIOS) which is held in ROM chip mounted ii. Close all programs that may be currently
on the mother board. running.
 After POST, the computer reads more iii. If your computer is running on Microsoft windows
instructions such as the current time and date XP or vista;
from a special memory known as
complementary metal-oxide semiconductor a) Click the start button
(CMOS).
b) On the start menu, click turn off computer.
 CMOS is powered by a dry cell that mostly
resemble that of a digital watch. c) On the message box that appears, turn off, then the
 If the cell is down, the computer requires the computer will undergo the shutdown process
user to enter the current data and time.
 Lastly, a special type of a computer program  For users earlier versions proceed as follows;
used to manage computers called an a) On the start menu, click shut down
operating system is loaded to the computer
memory. b) In the shutdown message windows, select shut
down and then click OK.
LOGGING ON AND OFF THE COMPUTER
CREATING USER ACCOUNTS
 When the operating system first loads, it
requires the user to authenticate himself or  For users to log in with user name and
herself by providing the user name and the password, they must have user account
password. created for them by the system Administrator.
 This security feature helps to deter  It is only the Administrator who has the rights
unauthorised person from using the and privileges that enable him/her to perform
computer. such duties.
 This process is called logging in the  Therefore before attempting to create user
computer. accounts, make sure that your account has
 After a successful log in, the operating the Administrator privileges or that you log in
system usually presents the user with the first as an Administrator
screen called the desktop.

Prepared by Sir A. Kanyika 44 | P a g e


Form 1 Computer Studies comprehensive study notes

a) Open the control panel window, by clicking the start


button then select the control panel command.
b) Double click the user accounts icon then select the
manage accounts command. This will display all
accounts on the computer.
c) Click, create new account command. Provide a
name for the account and specify the privileges then
click create account button.
MANAGING USER ACCOUNTS
 While in the user accounts windows, click the
icon of account that you wish to manage. BACKGROUND
 This opens the change an account window in
which you can create select commands to;  Background is a work space area on the
monitor on which icons and running tasks are
a) Change the account name placed.
b) Create the password for the account  Windows lets the user customise the desktop
background by applying favourite themes and
c) Delete the account wallpapers.
MICROSOFT WINDOWS ICONS
WINDOWS  Icons are mostly manipulated using pointing
 Microsoft windows is a graphic user interface device e.g. the mouse
operating system produced by Microsoft.  Some of the common icons on the desktop
 Windows was first introduced as an operating are my computer, recycle bin, internet
system in 1985 in response to growing explorer and my documents.
interest in user friendly GUI environment. TASKBAR
WINDOWS DESKTOP FEATURES  The taskbar enables the user to easily switch
 Once you turn on the computer, windows is between different programs and tasks that
loaded into the main memory and finally the are current running.
desktop showing that the computer is ready  Whenever the user starts a program or opens
for use appears. a file, its button appears on the taskbar and
 The three main features of the desktop are; stays there until the user exits the program
back ground, icons and taskbar.  The taskbar has at least three main parts
i. Start button: the left most button on the
taskbar that the user clicks to display the
menu button.
ii. Task manager: this is the band where
the buttons of current running tasks are
displayed.
 For example, the task manager showing three
tasks are currently running.
 You can switch between various tasks by
clicking their respective buttons on the task
manager.

Prepared by Sir A. Kanyika 45 | P a g e


Form 1 Computer Studies comprehensive study notes

iii. System stray: this is at the right part of iii. Run program from removable media
the task manager. without necessarily installing it on the
 It has icons of task running in the background hard disk
but are not displayed on the screen. g) Log off
 Example are, time and calendar, an antivirus  To log off is to terminate the current user
program, volume control etc. session
 To display such a task, simply double click its  To go back or to switch to a new user, the
icon. user must log in
 Logging in is a security measure that restrict
THE START MENU ITERMS unauthorized user from accessing computer
 When you click the start button, a list of resources
choice appears called the start menu.  To login, the user must enter the correct
 The item on the menu may vary depending name and password or in some cases use
on the version of windows you are using other methods such as fingerprint
a) Programs menu authentication
 Programs or all programs menu displays a list  It prompts a user name and password for one
of programs installed in the computer to gain access
 The menu has small solid arrows. h) Turn off/ shut down
 When you point the arrow, a submenu called  this menu lets the computer shut down,
a sidekick menu is displayed. restart, make computer go to standby or
b) My recent documents hibernation
 My recent document lists the last fifteen  Hibernation: saves everything in memory on
recently accessed files. disk and turns off the computer
 You can open any listed files from a storage  Standby: on the other hand, makes the
device by clicking its name provided that computer consume less power in idle mode
device is accessible but remain available for immediate use
c) Control panel
 The control panel is the computer
maintenance and configuration “toolbox”
 It provides tools used to maintain and make
changes to the computer setup.
 It is important to not to tamper with this menu
because you may interfere the computer
functionality.
d) Search
 For example a search in windows XP helps MANAGING FILES AND FOLDERS USING
the user to search for files or folders in case WINDOWS
the user forgets its name or location.
 To manipulate files and folders (to
e) Help and support
control/manage the actions of files and
 The help command on the start menu,
folders) you can either use my computer icon
displays detailed information on how to use
from the desktop or windows explorer from
the operating system and solve some
the start menu.
computer related problems in case the
 Each in its own way lets you see how storage
computer fails to function properly
devices or locations, files and folders
f) Run
arranged
 It enables the user to:
 These tools also enable the user to
i. install program on the hard disk
manipulate files and folders
ii. Open file and folder from a storage
location WINDOWS EXPLORER
Prepared by Sir A. Kanyika 46 | P a g e
Form 1 Computer Studies comprehensive study notes

 It lets the user to display the drives and CREATING A NEW FOLDER
folders in a hierarchy or tree structure
 The computer tree is an upside down  They will be time a user would want to create
structure with the highest level in this case a new folder
the desktop being the root  For instance when working on a detailed
 The explorer divides the windows into two project that has multiple files
panes  It is advisable that all related files be kept
i. The left pane displays a tree of drives together in one folder
and folders  To create a new folder proceed as follows:
ii. The right pane displays a list of files and i. Using my computer icon, display the
subfolders contained in a particular open explorer window
drives or folder ii. On the folder tree on the left pane, select
 To display the explorer using the start menu the location in which you want to create a
i. Click start, point the program then new folder
accessories iii. On the file menu, point to new then click
ii. Click windows explorer. An explorer folder.
window is displayed  A new folder with a temporary name new
 To display the explorer using my computer folder appears in the explorer window
icon iv. Type a new name for the folder to replace
i. Right click on my computer icon the temporary name, then press enter
ii. Click explorer key or click the icon once.
 This way is what has been throughout used in NB: To create a subfolder, follow the steps above but
form one book to take care of other versions you first select a folder as a location. To open a folder
of windows other than XP. proceed as follows:
USING MY COMPUTER  Just left double click, and the folder will be
 Double clicking on my computer icon, gives opened and access what is contained in it.
you a graphical view of of what is inside the CREATING A NEW FILE
computer and this include:
i. Drives  Depending on the programs installed in your
ii. Control panel computer, you can create different types of
iii. Other resources files such as drawing, text document etc.
 To display files and folders from a particular  To create a new text document proceed as
drive, proceed as follows: follows:
i. Double click a drive icon i. Using my computer icon, display the
 A windows appears displaying files and explorer window
folders stored in the root of the drive in ii. On the folder tree on the left pane, select
question the location in which you want to create
 This root is considered to be the highest of your file.
the directory tree where all directories/folders iii. On the file menu, point new
start iv. Select a text document from a list
ii. Double click the folder to display its available application
contents  An icon with a temporary name appears in
iii. Double click the drive to display its the explorer window
contents v. Type a new name for the new file to
iv. On this window, you can start replace the temporary name and press
manipulating your files and folders the enter key.

Prepared by Sir A. Kanyika 47 | P a g e


Form 1 Computer Studies comprehensive study notes

NB: In windows, file name can contain up to 255  This is the working area where you can
characters including spaces but with no special create your documents.
symbols such as \,/,:,*, ?,”,<,>,|,. e) Status bar
 Thus is an interactive strip at the button of the
APPLICATION WINDOW application windows that acts as a
 In order to enter data in the new file just communication link between the user and an
created above, you have it in its application operating system.
program.  Such interactive activities include: saving,
 This can be done by double clicking the file opening a file, printing, cursor position, etc.
icon
 A rectangular area called an application
window appear on the screen such as SCROLL BUTTONS AND ARROWS
WordPad screen
 Scrolling is the moving up, down, left or right
PARTS OF AN APPLICATION WINDOW of a document windows on the screen if it is
too large to fit.
 Scroll buttons and arrows are horizontal and
vertical buttons at the borders of window used
to scroll through a long document.
SAVING CHANGES TO A FILE
 After typing the content of a file in the work
area, click file and then click saves.
 Otherwise, if the file will be saved with
different names or location then.
1. Click the file menu then save as.
a) Tittle bar
 This is a bar across the top of the window that 2. From the resulting save as dialog box, select where
displays the name of the current application the document is to be saved then type its name.
program or task
 On the right of the tittle bar are three buttons 3. Click the save button
namely: RENAMING FILES AND FOLDERS
Minimise buttons: it reduces a window by pressing  Renaming refers to the changing the previous
button which is pressed on the task bar name to a new name.
The restore/maximise buttons: it stretches the  To rename a file or a folder proceed as
window to cover the entire desktop or restore it to its follows:
original size. 1. Using my computer icon, display the explorer
The close button: is used to exit an application window

b) Menu bar 2. On the folder tree on the left pane, select the file or
 Menu bar provide a list of command that can folder.
be used to manipulate the task. For example, 3. On the file menu, click rename
to save a document click file, and then save.
c) Tool bar 4. Type the new name, and then press enter key
 This are button, arranged in a row, which are DELETING FILES AND FOLDERS
shortcut to commands.
d) Work area  In windows, when you delete an item from the
hard disk, it is temporary held in a special
Prepared by Sir A. Kanyika 48 | P a g e
Form 1 Computer Studies comprehensive study notes

folder called the recycle bin where it can be 3. Click yes when promoted to confirm detection of
restored if necessary the files
 The recycle bin is a default icon on the
desktop and therefore it cannot be removed NB: you can also delete selected items in the recycle
bin by clicking file then delete.
WARNING
COPYING AND MOVING FILES AND FOLDERS
1. One should not attempt to delete system and
 Cut or copy commands are used to move or
application files from the hard disk
create a duplicate of an item respectively
2. Items from the removable storage are not
 When you cut or copy an item, it is temporary
held in the recycle bin and are completely
held in the temporary storage location known
lost.
as the
 To delete a file or a folder proceed as
 To copy /cut a file or a folder, proceed as
follows:
follows:
1. Using my computer icon, display the explorer
1. Using my computer icon, display the explorer
window
window
2. On the folder tree on the left pane, select the item
2. Select the file or folder to be copied
that is to be deleted
3. On the edit menu click copy/cut
3. On the file menu, click delete
4. Select the drive or folder where you want your item
4. A message appears on the screen asking whether
to be copied/moved (cut)
you actually you want to delete the item.
5. From the edit menu, click paste.
5. Confirm by clicking yes
 The information or item is pasted to a new
RESTORING DELETED FILES AND FOLDERS
location
 To restore a file or a folder from the recycle
bin to its original location, proceed as SORTING FILES AND FOLDERS
follows:  Sorting means arranging files and folders in a
particular order, either alphabetically or by
1. Double click the recycle bin icon
size or date of the last modification or
2. Select the deleted item (items) to be restored creation
 Windows automatically sorts files and folders
3. Click files, then restore. into alphabetic order but the user can choose
EMPTYING THE RECYCLE BIN to arrange them otherwise.
 To sort files and folders proceed as follows:
 To completely discard files and folders you
deleted, you need to empty the recycle bin. 1. Open a folder or storage location
 Deleted items take up the same amount of 2. Click view, then point arrange icon by
the space they occupied before you delete
them. MANIPULATING FILES AND FOLDERS USING THE
 To free up that disk space occupied you SHORTCUTS
have;
 To empty the recycle bin, proceed as  When you right click an item, a shortcut menu
follows: is displayed, which provides commands &
commonly used to manipulate the item.
1. Double click the recycle bin on the desktop  To copy, move, delete or rename an item
proceed as follows:
2. Choose recycle bin from the file menu

Prepared by Sir A. Kanyika 49 | P a g e


Form 1 Computer Studies comprehensive study notes

1. Right click the file or folder to display its shortcut 1. Click start, point to search then click for files or
menu folders
2. On the shortcut menu, click the appropriate 2. In the search dialog box, specify the search criteria.
command ie.
3. Click the search button.
i. To copy or move, right click the
destination location then paste The end ~!!!
ii. To delete, simply click delete
command
iii. To rename, type in a new file name to
replace
MANIPULATING FILES AND FOLDERS BY DRAG This is a complete computer studies pamphlet notes
AND DROP with practical elements, for form 1. It is based on the
current secondary education curriculum of Malawi
 Another easier way/method of handling files with effective pedagogical features of teaching and
and folders is a drag and drop learning.
 This is done as follows:
“All the best in your studies as you try to inculcate
1. To copy a file or a folder, hold down the CTRL key yourself with digital skills and knowledge”
while you drag the icon of the file to a new location
2. To move files from one location to another, on the
same drive but in different folder, simply press down I wish to extend my heartfelt and special thanks to all
the mouse buttons and drag the item to new location. those who encouraged in the development of this
3. To delete any file or folder, drag into the recycle bin pamphlet.

4. To copy a file or a folder from one disk to another, Thanks!


simply drag the item ton the destination drive icon eg.
From drive C to floppy disk
5. To move an item, hold down the shift key while you
drag
SELECTING MULTIPLE FILES
 If you want to manipulate files and folders at a
go, you can select them by clicking each item
while you hold down control (CTRL) or SHIFT
key.
 If you want to select all files in an open folder,
click edit, then select all
 This will highlight all files in the folders. To
manipulate selected items, use menu bar or
shortcut. FOR MORE INFORMATION CONTACT ON:

SERCHING FOR FILES AND FOLDERS +265(0) 996 023 675 (WhatsApp #)

 in case you’re not sure where you stored or +265(0) 883 755 825
the name you gave the file or folder, use the Email: [email protected]
search menu

Prepared by Sir A. Kanyika 50 | P a g e

You might also like