COMPUTER Form 1 Notes Final
COMPUTER Form 1 Notes Final
Kanyika
Characteristics
i. They used electronic devices called
integrated circuits (IC's)
ELECTRONIC COMPUTERS AND THEIR ii. An IC consists thousands of smaller
GENERATIONS transistors packed on a semiconductor called
The age of the modern can be traced back to silicon chip
1951. iii. They emitted less heat
These computers are generally classified into iv. They were smaller in size
five generations depending on the technology v. They were easier to program
used to develop them. vi. They were easy use
First generation computers (1940's to 1958) vii. They were easier to maintain
Characteristics
i. They were physically large
ii. They used thousands of electronic gadgets
called vacuum tubes or thermionic valves
Prepared by Sir A. Kanyika 2|Page
Form 1 Computer Studies comprehensive study notes
TOPIC 2: COMPUTERS AND THEIR USE vii. A computer does the work according to data
and command given. Thus, if there are errors,
Computers are used in almost all aspects of the computer processes and outputs
people's lives because they are more efficient and erroneous results.
accurate. viii. Reduced privacy, People can access
Advantages of using computers confidential data due to the dynamic growth
i. Computers can work for long hours without of information technologies.
getting worn out or tired. Computers work AREAS WHERE COMPUTERS ARE USED
automatically and are not subject to
exhaustion. 1. FINANCIAL SYSTEMS
ii. Modern computers have very high processing Financial systems enable organizations to manage
speeds that translate to efficiency in our work their finances. They include
places a. Accounting systems
iii. Computers are more accurate unless Accounting systems are popular in business
management. Accounting systems supported by
incorrectly programmed.
financial systems include
iv. Computers have huge storage on auxiliary (i) Customer order entry and billing
storage such as hard disk. This saves much It records incoming customer orders
of office space for filing. Authorities delivery of items or services
v. Computers are capable of processing large ordered
amounts of data from even several users. Produces invoices for customers who do not
vi. The advent of computers has opened up new pay in advance or cash basis.
(ii) Inventory management
job opportunities that never existed before.
Used to keep track of the items in stock and
vii. Computers process data far much faster than help the management to determine which
if the processing was done manually. items to reorder.
Disadvantages of using computers This helps the management to have enough
i. Sometimes computers can make systems stock at all times to meet needs of the
complicated there by requiring a lot of time to customers.
be spent on staff training (iii)Bookkeeping
ii. The computers can fail to work due to an A financial application (Quick books and
electrical failure, a hardware/software fault or Sage) summarizes financial transactions
viruses. indicating the amount the business makes
iii. Lead to loss of jobs since the work which and the worthiness of the business.
require several people is done by a single (ii)Inventory management
person operating a computer. It is used to keep track items in stock and
iv. Limited job opportunities as most help the management determine which item
organizations are using computers in their store order
work systems. This helps the management to have enough
v. Reduced privacy as some people may stock at all times to meet the needs of the
attempt to have illegal access to information. customers.
This is so due to dynamic growth of (iii)Bookkeeping
information technology.
vi. They promote dependency. People are Banks
increasingly becoming dependent on Automated Teller Machines (ATM's) enable
computers and information technologies such automation of cash deposits and withdrawal
that if a computer breaks down they become services.
helpless.
Communication
Integration of computers and
telecommunications facilities has made
message transmission and reception be very
fast and efficient.
The world is said to have become a global Analog computers
village because of the speed with which These are computers which process
information is transmitted around the world. continuous data.
Law enforcement agencies Continuous data is usually represented using
Information stored in computers such as a continuous wave form.
finger prints, images and other identification
details help law enforcers carry out criminal Analog computers are used in manufacturing process
investigation control like monitoring and regulating furnace
Education temperatures and pressures.
Used in teaching and learning processes They are also used in other applications like
through Computer Aided Learning (CAL) and weather station store cord and process
Computer Aided Instruction (CAI). physical quantities e.g. wind, clouds peed and
E.g. experiments in chemistry or physics can temperature
be demonstrated using special computer
program that depict the month screen through
simulation.
Domestic and entertainment
Used at home for recreational activities like
watching movies, playing music and
computer games.
CLASSIFICATION OF COMPUTERS
Computers can be classified into either
according to size or purpose.
Supercomputers
These are mainly used for scientific research
which requires enormous calculations.
Characteristics
i. They are fastest, largest, most expensive and Mini computers
most powerful computers. They are referred to as small-scale
ii. They are able to perform many complex mainframe computers.
operations in a fraction of seconds They are mainly used in scientific
iii. They are kept in a special room due to their laboratories, institutions, engineering plants
weight and places where processing automation is
iv. They generate a lot of heat due to their huge required.
processing power. Thus, they need special They are well adapted for functions like
cooling systems accounting, word processing, database
management and specific industry
applications
Characteristics
i. They are slightly smaller than mainframes.
ii. They support fewer peripheral devices.
iii. They are not as powerful and fast as the
mainframe computers.
Mainframe computers
These computers are used for processing
data and performing complex mathematical
calculations.
They are mostly found in government
agencies, big organizations and companies
Prepared by Sir A. Kanyika 6|Page
Form 1 Computer Studies comprehensive study notes
1. Bits: A binary digit which can either be 0 or 1 A character set converts a binary number / code
It is the smallest element of data in computer to its equivalent human readable form and vice
memory versa.
2. Byte: A group of bits (often 8) used to represent a It is a character set for example that maps a
single character in the computer memory. binary code to the letter A on the letter A on the
3. Nibble: Is a half byte, which is usually a grouping keyboard.
of 4 bits.
4. Word: Two or more bytes make a word. Two widely used character sets are;
A word can have 16 bits, 64 bit etc. 1. American Standard Code for Information
5. Kilobyte: is exactly 2¹⁰ bytes = 1024. Interchange (ASCII)
I kilobyte is 1024 (approximately 1000) It uses seven bits to encode text characters.
6. Megabyte: is exactly 2²⁰ bytes = 1024 × 1024 2. Extended Binary Code Decimal Interchange Code
(1 048 576) (EBCDIC)
1 megabyte is 1 000 000 bytes or 1000 kilobytes It uses eight bits to encode characters mainly in
7. Gigabyte: is exactly 2³⁰ bytes = 1024 × 1024 × IBM (International Business Machine).
1024 (1073 741 824)
1 gigabyte is 1 000 000 000 bytes or 1000 NB: ASCII and EBCDIC tables are widely
megabytes available on the internet.
8. Terabyte: Is exactly 2⁴⁰ bytes = 1024 × 1024 ×
1024 × 1024 (1 099 511 627 776) TOPIC 3: COMPUTER HARDWARE
1 terabyte is approximately equal to 1 000 000
000 000 bytes or 1000 gigabytes A computer is made of two main components
namely hardware and software.
CONVERTING BETWEEN DATA UNITS
TYPES OF COMPUTER COMPONENTS
1. 1 byte = 8 bits. = 1 byte A computer is made of two components;
2. 1 kilobyte = 1000 bytes. = 1 thousand bytes Hardware
3. 1 megabyte = 1000 kilobytes. = 1 million bytes Software
4. 1 gigabyte = 1000 megabytes. = 1 billion
bytes Hardware
5. 1 terabyte = 1000 gigabytes. = 1 trillion bytes Refers to physical or tangible components
that make up a computer system.
Character set It classified into four categories
Data is entered in the computer in form of –Input devices
characters
Each character, a number, alphabet or symbol –Central Processing Unit (CPU)
is recognized by the computer because of its –Output devices
unique sequence of 0’s and 1's. –Storage devices
A word can be made of one or more characters Software
When you press a character A, on the computer Refers to a set of instructions that direct a
keyboard, the keyboard sends a signal made computer on what to do
up of a binary numbers to the computer telling it Classified into two main categories
that a particular key has be pressed –System software
To avoid confusion about what every unique
–Application software
binary sequence means in the world of
computing, character sets are developed to give
universal meaning to the binary sequence.
COMPUTER HARDWARE
It looks at hardware elements that make up the
computer. The computer is setup by connecting
these various hardware devices to the system
unit.
A. INPUT DEVICES
They convert user input which is in human
readable form to machine language
They can be classified according to method
2. Pointing device
used to enter data ie
Pointing devices are used for controlling a pointer
–Keying devices
cursor on the screen.
–Pointing devices A part from the mouse, other pointing devices
–Scanning devices include; the trackball, joy stick and light pen.
–Other technologies for data capturing Mouse
1. Keying Devices A pointing device used to execute commands
They convert typed numbers, letters and Controls an arrow displayed on the screen.
other special characters into machine Moving the mouse moves the arrow/ pointer
readable form before processing on the screen.
Types of keying devices are; If the pointer is on the icon, click one of the
i. Traditional Keyboards two mouse buttons to execute the command.
They are the commonest type Types of computer mice are;
They are a full sized rigid keyboard Standard Mouse
ii. Flexible Keyboards Also called traditional mouse
They are more portable keyboard •Has;
They can be folded and packed in a bag –A ball underneath
iii. Ergonomic Keyboards –Two buttons
They are less common
They are designed to give comfort and –Optional scroll button between the left and right
alleviate wrist strain buttons
iv. Keypads
These are miniature keyboards
Are used on portable devices eg
–PDAs
–Laptops
–Mobile phones
–Palmtops Optical Mouse
Has no moving parts.
–Etc.
Works by using a tiny digital camera taking
v. Braille Keyboards
1,500 pictures every second of the surface
They are designed to be used by the blind
where it is resting
They consist of keys identified by raised dots.
Interpreting the pictures directs the mouse
movement and position on the screen
Cordless Mouse
Also called wireless
Is a battery powered mouse that uses radio or Light pen and Stylus
infrared waves A light pen detects the command or item
Has no physical connection to the system unit being illuminated by it.
A stylus is used on PDAs, etc that recognise
commands or hand written data.
Trackball
Works like mouse
But its ball is located at the top
Rotating the ball moves the pointer on the
screen 3. Scanning Devices
Some computer keyboards have integrated Scanning means capturing data and
trackballs; no need for a mouse converting it into digital format
SD can be grouped acc. to technology used
to capture data;
–Optical scanners
–Magnetic scanners
1. Optical Scanners
Capture data using optical or light technology
As a light beam passes over an object, a
software analyses the image
Examples are;
Joystick a. Optical Mark/ Bar Recognition Scanners (OMRs)
Looks like a lever Detect marks on a piece of paper using ink or
Used for playing computer games soft pencil by passing an infrared beam over
The user controls game actions by varying them.
the pressure, speed and direction of the Used to mark multiple choice questions
joystick OBRs
Command buttons and triggers issue Capture data codes as barcodes (lines of
commands or actions in the software varying thickness)
These are Universal Product Code (UPC)
They hold manufacturer’s details
2. Magnetic Scanners
Capture data written using magnetic ink or
coded onto a magnetic strip.
Common examples are;
–Magnetic Ink Character Recognition (MICR)
–Card Readers
MICR read characters written with magnetic
ink
–E.g. cheque reader
MICRs
an OMR reader
3. Digitizers
Also called graphic tablets
OBRs Can draw an image using a stylus
The image appears on a computer screen,
not a tablet
Used to trace highly detailed engineering &
architectural drawings and designs
Digitizers
Bar codes
b. Optical Character Recognition
•Used to read typewritten, computer printed or
handwritten characters 4. Digital Cameras
•Also changes images into a soft copy that can be Capture images as other cameras do but
manipulated using a word processor images are stored in digital form
•A flat-bed is a modern OCR scanner used to capture Pictures are stored on a memory card instead
pictures and real objects of a film
OCRs Images can be
–Edited
–Printed
–Uploaded to the internet
Digital Camera
Microphones
B. OUTPUT DEVICES
MICROPHONE Are peripheral devices a computer uses to
A microphone is used to enter data inform of give out information processed from data.
voice into the computer. Can be classified into;
This method is mostly suitable for the –Soft copy
physically challenged users,
–Hard copy
Soft Copy Output Devices
Limitations of voice input
Soft copy is intangible output that can be
It does not fully support speech related
heard or seen
aspects such as-
Examples of soft copy devices are
i. Accents
–Visual display units
ii. Inflections
iii. tones –Sound output devices
–Data projector
NB. To overcome this problem, the system can be –Light emitting diodes (LEDs)
trained. Visual Display Units
Also called a monitor or screen
Prepared by Sir A. Kanyika 12 | P a g e
Form 1 Computer Studies comprehensive study notes
In a color monitor, the pixel has three primary Has a resolution of up to 1024 x 768 pixels
colour elements ie It is popular with 17 and 19 inch monitors
–Red Super Extended Graphic Array (SXGA)
–Green Has a resolution of up to 1280 x 1024 pixels
It is popular with 19 and 21 inch monitors
–Blue Ultra Extended Graphic Array (UXGA)
Color Depth It is the latest and highest standard
Refers to the number of colors that can be
displayed by a pixel SOUND OUTPUT DEVICES
It is measured in bits Produce sound such as beeps, audio or
Resolution digital
Is the number of pixels per inch on the screen Some computers come with inbuilt speakers
It is usually given as dots per inch (dpt) orbits –So no need to connect external speakers
the higher the resolution, the more the pixels External speakers’ should be connected to a
per square inch sound card thru the jacks on the SU or on a
Images will be clearer multimedia monitor.
Refresh Rate
It is when images in the video RAM are used
to refresh the one on the CRT screen.
–Because CRTs cannot hold an image for a long time
If a screen has low Refresh Rate, images
flicker
This causes eye strain.
Display Size
Is measured in inches as the diagonal length
of the screen measured from top right to Data Projector
bottom left Displays output from a computer onto a plain
VIDEO GRAPHIC ADAPTERS white screen
A monitor must be connected to a video –e.g. a wall or whiteboard.
adapter plugged or integrated on the It is a creative way of presenting output to
motherboard to display information audience.
VAs determines the resolution and clarity of This is gradually replacing the traditional
the monitor. overhead projector
Examples of Vas include;
Color Graphic Adapter (CGA)
Is the oldest type of adapters
It displays images and text up to 16 colours
Enhanced Graphic Adapters (EGA)
Was an improvement of CGAs
It also displays in 16 colours
Video Graphic Array (VGA)
Displays text, graphics and videos using 256 Light Emitting Diodes (LED)
colours. Are indicators that display light when an
Super Video Graphic Array (SVGA) electric current is passed thru them
Displays text and graphics using more than –E.g. the red or green light on the SU
16 million colours Helps the user to know whether it is on or off
It has a minimum resolution of 800 x 600 Mostly, LED are used to give warnings.
pixels Hard Copy Output Devices
Hard copy refers to tangible output that can
Extended Graphic Array (XGA) be felt eg paper.
Prepared by Sir A. Kanyika 14 | P a g e
Form 1 Computer Studies comprehensive study notes
Writing to a floppy means converting signals A zip disk has a higher storage capacity and
into magnetic spots and storing them onto the is physically thicker.
available space on the diskette. A zip disk can hold as much as 250 MB of
A computer must have a floppy drive in order data.
to read or right contents into a floppy disk. Zip disks mostly come with separate portable
external zip drives.
Storage capacity
Floppy disks come in different sizes with
different storage
5.25 inch diskette- these were very large in
size but with lower storage capacities.
3.5 inch diskette- are smaller in size but can
hold as much as 2.88 MB
4. Jaz disks
Jaz disks resemble zip disks in every sense
only that they can hold as much as 2 GB.
Data is read or written using internal or
external jaz drives.
High capacity floppy
Simply known HiFD disks are high capacity
diskettes
The structure of a floppy disk platter 5. High capacity floppy
This a circular flexible disk coated with
magnetic material. Simply known HiFD disks are high capacity
This is seen when a protective casing of diskettes
floppy disk is removed. They can store up to 200 MB of data.
The surface of the disk is divided into tiny HiFD drive can also read magnetic 1.44 MB
invisible concentric circles called tracks that diskette.
store data. 6. Laser Servo 120 Super Disks
The tracks are further divided into units called
sectors Laser Servo 120 Super Disk technology (LS-
120) resembles the 3.5 inch diskette
But it uses optical technology
It has greater storage capacity. It can store up
to 240 MB of data
It has greater speed of data retrieval
LS-120 drive can read and write both the 3.5
inch floppy disk and the 120 MB super disk.
Care of magnetic storage media
To avoid accidental loss of data or
3. Zip disks information held on magnetic media, the
A zip disk is a high capacity magnetic diskette following rules must be observed:-
that resembles a floppy disk.
Prepared by Sir A. Kanyika 18 | P a g e
Form 1 Computer Studies comprehensive study notes
1. Do not expose magnetic media to strong magnetic To record data, the recording surface is made
fields. into pits and lands (bumps)
When a laser beam falls on the land, this is
This disorients the magnetic dipoles causing interpreted as 1, otherwise a zero is recorded.
erasure of recorded data.
ii. Compact disk-recordable (CD-R)
2. Do not expose a magnetic media to excessive heat.
It is coated with special dye which changes
Heat energy leads to magnetic strength in colour to represent data when burned using a
materials hence magnetically recorded data laser beam.
can easily get lost. Once data is burned on a CD-R, it becomes
4. Do not bend or sold a magnetic media or put heavy read only.
weights on them to avoid breaking or damaging it. NB: CD-ROMs and CD-Rs are referred to as Write
3. Do not drop magnetic media on the ground Once Read Many (WORM). That is, data is only
because the impact weakens magnetism recorded once but can be read as many times as
possible.
5. Do not touch the magnetic surfaces.
iii. Compact disk-rewritable (CD-RW)
6. Do not remove a media from the drive when it is
still being accessed by the computer. This type of compact disk allows the user to
record, erase and rewrite new information.
This may result to data loss.
b. Digital Versatile Disks (DVD)
Optical storage media
It is also known as digital video disk.
They are called optical storage media It resembles compact disks in every aspect
because data is written and read from them but the difference is that it has a higher
using a laser beam. storage capacity. It can store data up to 17
A laser beam is a very strong concentrated GB (which is equivalent to twenty five 700 MB
light. CDs).
Reasons for optical storage media It is suitable for recording motion pictures
such as videos because it offers better sound
They store very large volumes of data. and picture quality than the CDs.
Data stored in them is more stable and more
permanent than the magnetic media c. Optical cards
Examples of optical storage media Optical card resembles MICR card but data is
a. Compact Disks (CD) read and written optically on a stripe.
It is mostly used in banking and other
These hold large quantities of data and business organisation to record customer
information. details.
One disk can hold as much as 700 MB.
They are mostly used to store data and d. Optical tape
information that requires a lot of space. e.g. It is similar to a magnetic tape only that data
video clips, software, sounds, etc. is stored on it by using optical technology.
Forms of Compact Disks Solid state storage media
i. Compact disk-read only (CD-ROM) This is a non-volatile storage that employs
This contains data that can only be read but integrated circuits rather than mechanical,
cannot be written. magnetic or optical technology.
They are called solid state because they do It has more than one platter which stacked on
not have movable parts. top of each other to form a cylinder.
Examples of solid state storage media
Memory sticks
Flash disks
Hard Disk
As the disk rotates, read/write head moves in
Hard disk is referred to as fixed disk because and out over the surface to record or read
traditionally it is mounted inside the computer. data.
However, some disks are removable. Hard disks have gained widespread
The hard disk is also known as a hard drive. popularity.
It is made up of metallic disk platters together This is so because they provide efficient data
with a read/write head, housed in a protective transfer and large storage capacity.
metal case.
THE CENTRAL PROCESSING UNIT (CPU)
The Central Processing Unit is also called the
Processor
It is the most component of the computer.
Is regarded as the brain of a computer
because all processing activities are carried
out inside the processor.
In Microcomputers, the CPU is housed inside
the system unit.
It is mounted on a circuit board called
Motherboard or System Board
The read/write head floats above the surface Functional Elements of the CPU
of the rapidly rotating disk to read or write i. The CPU consists of three functional units
data. namely:-
Most computer hard disks are connected to ii. The Control Unit (CU)
the motherboard via a channel called a iii. The Arithmetic and Logic Unit (ALU)
controller. iv. The Main Memory
Examples of controllers are
Integrated Drive Electronic (IDE)
Enhanced IDE (EIDE)
AT attachment (ATA)
The structure of the disk platters
A hard disk drive consists of one or more
metallic platters, stacked on top of each other
but not touching one another.
The stack of platters is attached to a rotating
pole called a spindle.
–Special purpose computers and computerized fuel Called Random Access since it can be read
pumps instructions directly despite the sequence in which
Types of ROM contents were stored
Vary with permanence of instructions stored Used to hold instructions and data for running
There are four types; applications
–Mask Read Only Memory Info.. in RAM is always read, changed and
removed
–Programmable Read Only Memory
Keeps data/ info temporarily
–Erasable Programmable Read Only Memory –So store in a more permanent device before
switching off the computer
–Electrically Erasable Programmable Read Only
Characteristics of RAM
Memory
i. Data can be written (stored) and read
Mask Read Only Memory
(retrieved) in it
Abbreviated as MROM
ii. It is a volatile storage
Content cannot change once written on it by
manufacturer iii. Its contents are user defined i.e.
Programmable Read Only Memory –The user dictates what should be in the RAM
Abbreviated as PROM Types of RAM
It allows the user to alter the written contents There are only two;
only once. –Static RAM
Erasable Programmable Read Only Memory
–Dynamic RAM
Abbreviated as EPROM
Static RAM (SRAM)
It has a transparent quartz window through
Is a fast type of memory
which its contents can be erased.
It is mostly located inside microprocessor
–This is done by exposing the window to UV light
As such, it is used on special purposes
Once erased it can be reprogrammed for
memories e.g. Cache Memory (CM)
other uses.
Cache Memory enhances the processing
Electrically Erasable Programmable Read Only
speed by holding data and instructions
Memory
instantly needed by the processor.
Abbreviated as EEPROM
Dynamic RAM (DRAM)
Can be erased and reprogrammed using
Is relatively slower type of RAM compared to
electricity.
SRAM
–e.g. the memory that stores the basic input/ output
Dynamic refers to the tendency for the stored
system (BIOS)
charge leaks away, even with constant power
Characteristics of ROM
supply
i. Can only be read, not written unless it is a
Thus to maintain data storage, DRAM
special type
requires periodic recharging (refresh).
ii. It is non-volatile.
Rambus RAM
Contents are not lost when the computer is
This is the latest and fastest RAM in terms of
switched off
response time.
iii. Stores permanent or semi-permanent instructions
from the manufacturer called firmware. Special Purpose Memories
Can store semi-permanent instructions since These are included in a microprocessor/ input
some variations of ROM chips can be or output devices
programmed according to user’s Used to enhance performance
specification. They are;
Random Access Memory (RAM) –Cache Memory
Also known as working Storage
–Buffers Memory
–Register Memory
Prepared by Sir A. Kanyika 22 | P a g e
Form 1 Computer Studies comprehensive study notes
HUBS
A hub is a device that connects computers on a
network
It relays information from one computer to another on
the same network SETTING UP A COMPUTER
Fig. below shows computers connected on a network Before setting up the computer, you
using a hub. need to know the various parts and
cables used to connect it to the mains
power supply.
Power supply unit
Though computers are connected to AC For example if the cable uses 8 lines to transmit
power supply, internal components require data at the same time, it is said to be 8 bit parallel
DC power. cable.
Desktops PCs use power supply units The advantages of using such cables is that they
(fig.3.47) mounted on system unit casing. transmit data faster over a short distance.
You connect the power supply to the mains A parallel cable connects to a parallel interface
using a power cable. port commonly referred to as line printer {LPT}.
The work of the power supply unit is to Parallel cables are used to connect printers,
convert AC to DC. optical scanners and some removable storage
drives such as zip drive.
Audio interface
Audio interface or jacks are used to connect
speakers and microphone. By convention, the
sound input in pink.
Once you turn on the computer, you may hear the c) On the message box that appears, click
sound of the cooler fun running turn off. The computer will undergo the
After a few seconds, lines of text start scrolling up shutdown process
on the screen 4. For users of the earlier vision of windows,
This process is referred to as power on self-test proceed as follows:
(POST) a) On the start menu, click shutdown
POST checks the drives, basic input and output b) In the shutdown message window, select
devices such as the keyboards, monitors and the shutdown and then click OK.
mouse
If a problem is encountered , the process is
TOPIC 4: SAFE USE OF A COMPUTER
haulted and an error is displayed on the screen
POST is accomplished by a special firmware PROTECTION OF COMPUTERS AND USERS
program called the basic input/output system Computers are delicate devices that need to be
(BIOS) which is held in a ROM chip mounted on handled carefully.
the motherboard
After POST, the computer reads some The following broad areas need to be carefully
instructions such us the current date and time considered in order to protect both computers and
from a special memory known as users.
complementary metal oxide semiconductor 1. Security of computer hardware and software
(CMOS)
2. Powering the computer on/off
CMOS is powered by a dry cell that mostly
resembles that of a digital watch 3. Protecting users from hazards
If the cell is depleted, the computer requires the
4. Safe disposal of computer components
user to enter the current date and time.
Lastly , a special type of computer program used 5. Protection against malware, viruses and
to manage computers; called an operating system worms
is loaded to the computer memory MEASURES THAT PROTECT HARDWARE AND
SHUTTING DOWN A COMPUTER SOFTWARE
It is important that the user follows the correct a. Burglar proofing the room
procedures to shutting down a computer at all
Doors, windows and the roof should be fitted
times
with grills to deter forceful entry into a
If the procedure is not followed ,then loss of computer room.
data, damage of programs and computer
components may occur Install an intrusion detection alarm system
To shut down a computer, proceed as and employ security guards to increase the
follows: level of security alertness against theft of
1. Ensure that all the work has been properly computers and accessories.
stored. This process is called saving b. installing fire prevention and control
2. Close all programs that may be current equipment
running
3. If your computer is running on Microsoft The recommended extinguishers are the
gaseous type.
windows XP, or Vista or Windows 7
This is because liquids may cause rusting
a) Click the start button
and corrosion of computer components.
b) On the start menu, click turn off the
computer
Prepared by Sir A. Kanyika 28 | P a g e
Form 1 Computer Studies comprehensive study notes
Use standard furniture to avoid poor posture Overcrowding in the computer is not allowed
which may lead to strain injury and limb as it may cause suffocation or spread of
fatigue. communicable diseases.
The table should be of the right height relative f. Environmental hazards
to the seat to provide comfortable hand
positioning. Computers emit heat and other
electromagnetic waves into the environment
The seat should have an upright backrest and during their use.
should be high enough to allow eyes of the
user to be level with the top of the screen. There is need to comply with the
Environmental Protection Agency (EPA)
energy star policy to encourage minimal use
of power by electronic devices and adhere to
acceptable radiation levels.
c. Light control
Use Antiglare screens (light filters) and g. Safe disposal of computer components
adjustable screens to avoid eye strain and
fatigue caused by overbright CRT monitors. Disposal of old computers, monitors, laptop
batteries, printers, e.t.c. poses great risk to
Modern flat panel displays such as LCD do the environment.
not strain the eye.
Chemicals from chips and batteries if damped
can leak into underground water tables and
cause contamination. e.g. chemical cadmium.
It is important to follow the policy of safe
disposal of computer components.
Those that can be recycled should be
extracted and taken to recycling companies.
Others should be disposed in agreed sites
d. Ventilation
and following proper procedures to avoid
Proper ventilation is needed to avoid environmental pollution.
dizziness caused by lack of enough oxygen
CAUSES OF SOFTWARE AND DATA LOSS
and to allow computers to cool.
The walls of the computer room should not be Data loss or software loss is the unexpected
painted with overbright reflective oil paints. or accidental loss of data or software stored
in the storage media.
The screens should face away from the
window. There are many reasons for data loss and
these include:-
These help to avoid glare caused by bright
background. 1. Accidental deletion
e. Crowding
Prepared by Sir A. Kanyika 30 | P a g e
Form 1 Computer Studies comprehensive study notes
Data or software can be lost through faulty When application software suddenly crashes
procedures which may lead users to delete while working, it may result in severe
data accidentally. damage of to hard drive.
This an unintentional deletion which may go This causes the program to close suddenly
unnoticed for a long time. leading to loss of unsaved work or data.
Thus there is need to think carefully before 9. Computer viruses
deleting any data or program.
Computer virus can wreak havoc in
2. Malicious deletion computer systems causing massive loss of
data.
This is an intentionally deletion of data from
the system. They corrupt the software and data resulting
into unpredictable behaviour.
This data deleted from the hard disk may be
recovered from the recycle bin (rubbish bin) if 10. Poor storage of disks
it has not been emptied.
If disks are not stored properly and are
If the recycle bin is emptied, a data recovery exposed to direct sunlight, heat or moisture,
software can be used to recover the deleted they stop functioning properly leading to loss
files. of data.
3. Accidental media format 11. Vandalism
Users accidentally format their drives which Professional hackers can destroy or steal
results into instant loss of data or programs. information.
Though it is possible to recover data with the Competitors can also access important data
use of data recovery software. from company's account leading to
corruption, erasure or loss of vital information.
4. Accidental damage
MEASURES AGAINST LOSS OF DATA AND
If a drive or disk is mishandled or accidentally SOFTWARE
dropped, data and software contained in the
damaged media may be lost. i. Burglar proofing the laboratory to prevent
thieves from stealing computers or
5. Natural disaster
accessories.
Natural disasters such as fires, hurricanes, ii. Physical restrictions to computer laboratory-
earthquakes can destroy the computer nobody should be allowed into the laboratory
systems leading to loss of data and software. without the presence of the properly trained
6. Power failure and responsible personnel.
Intermittent power supply can lead to both iii. Having fire fighting equipment inside the
destruction of delicate parts of a computer laboratory and within easy reach.
such as hard disk and unsaved data. iv. Dust proofing computers by covering them
7. Hardware failure with a cloth after use.
Contents of hard disk may become v. vii. Keep all diskettes in disk fackettes, away
unreadable due to crashing of disk heads from heat, moisture and direct sunlight.
This virus replicates itself and moves from These types of viruses are programmed to
one computer to another through self-initiate/originate OR take a particular
communication links like: action on a particular date or when a certain
event takes place.
i. Bluetooth An example is a virus that can be set to
delete a data base table or crash software if a
ii. Email attachments
particular employee is fired.
iii. Local Area Network (LAN) Software companies use this features in their
trial version software where when a certain
3. BOOT SECTOR VIRUS
Prepared by Sir A. Kanyika 32 | P a g e
Form 1 Computer Studies comprehensive study notes
These programs are not available in shops The software may be also classified
and they not address the needs of the other according to End-User-License as open
users. source, proprietary, or freeware.
b) VENDOR OFF-THE-SHELF SOFTWARE a) OPEN SOURCE/NON-PROPRIETARY
Theses software are developed by software They refer to software whose source code
engineers, packaged and then made (programmed set of instruction) is freely
available for purchase through vendors, a made to the users.
distributor or directly from the developers. They encourage to use, modify and distribute
The developer may bundle more than one but the modified product e.g. Linux operating
closely related software into one package to system, Open office are made available
form a suit or integrated software e.g. lotus under General Public License (GPL).
suite, Microsoft office and Corel word perfect
as opposed to single purpose software e.g. b) PROPRIETARY SOFTWARE
QuickBooks, and sage pastel. These are software whose source code is
hidden from users.
The modification is only made by the
NOTE: the word package is sometimes used refer to manufacturers.
these types of software that are packaged and sold by This software’s may be licensed to the users
vendors. at a fee or applied freely e.g. Microsoft
windows operating system, adobe
ADVANTAGES OF STANDARD SOFTWARE OVER PageMaker, CorelDraw.
THE IN HOUSE DEVELOPED PROGRAMS
c) FREEWARE
1. They can be easily installed and run.
These are software products that are freely
2. They are cheaper than the in house
made available to the user.
developed software.
However beware of them because some may
3. They are readily available for almost any task. be malicious /dangerous software.
4. They have minor or no error since they are
TOPIC 6: OPERATING SYSTEM (OS)
thoroughly tested.
5. They can be easily be modified to meet a An operating system is the complex program
user’s needs. that is responsible for controlling processing
operations in a computer system.
DISADVANTAGES OF STARDARD SOFTWARE
1. They may have some features, not needed by IMPORTANCE OF THE OPERATING SYSTEM
the users, which may take extra storage. 1. It acts as an interface /mediator between the
2. They may require the user to change user and the computer hardware i.e. it sends the
processes and hardware for compatibility which may message via the operating system which has the
in turn be expensive. capacity to give instructions to the hardware to
perform a particular task.
3. They may lack some features required by the
user. 2. It handles input, output, storage and running
other user programs.
III. CLASSIFICATION ACCORDING TO THE
END-USER LICENCE (EUL) NB: without an operating system we can do nothing to
the computer
THE GRAPHICAL VIEW ON HOW THE This arrows the single CPU to execute what
OPERATING SYSTEM WORKS appears to be more than one application program
apparently at the same time.
Through processor scheduling, the operating
USER system allocates time slice to each ready task.
Runs application programs The CPU switches its attention programs as
directed by the operating system.
APPLICATION SOFTWARE The switching is so fast that it appears as if the
Send user request to OS task is being executed simultaneously.
CLASSIFICATION ACCORDING TO NUMBER OF
OPERATING SYSTEM USERS
Receives and executes the
request a) SINGLE USER OPERATING SYSTEM
This is designed for use by only one person; it
HARDWARE can not support more than one person and
Receives and does OS runs only one user application program at a
command time.
The example include; Palm OS, and Ms-Dos.
EXAMPLES OF OPERATING SYSTEM b) MULTI-USER OPERATING SYSTEM
Microsoft windows 2000, XP, Vista It is also called multi access operating
UNIX system.
Linux It arrows more than one user to interactively
Macintosh/Mac OS use the computer.
TYPES OF OPERATING SYSTEM For example, server operating system such a
windows 2003 server.
Operating system can be classified according to: They can at the same time be installed on a
computer that is accessed by all users in an
i. Number of task
organization.
ii. Number of users Other examples are UNIX, Novell, Windows
NT/2000 and Linux.
iii. Number of interface
CLASSIFICATION ACCORDING TO INTERFACE
CLASSIFICATION ACCORDING TO NUMBER OF
TASKS The term user interface refers to the
interaction between the user and a computer.
a) SINGLE PROGRAM OPERATING SYSTEM Operating systems can be classified into
This type allows processing of one application three categories according to user interface.
programs in the main memory at a time.
a) THE COMMAND–LINE USER INTERFACE
This means that the user can only run one
interactively program at a time. It lets the user type at a command prompt.
The user must exit from the program before The computer reads the typed command from the
loading and running another program. command line and executes it.
An example is Ms Dos from Microsoft For a command to be more users friendly the
Corporation. words used should be descriptive verbs e.g. print
and copy etc. and also unique abbreviation can
b) MULTITASKING OPERATING SYSTEM also be used e.g. DEL, REN, CHKDSK etc.
CAPS LOCK KEY: it lets the user to switch EDITING KEYS: are used to delete or insert
type in the upper and lower case (capital and characters in a document.
small letters) INSERT KEY: this helps the user to insert or
ENTER KEYS (RETURN KEY): pressing this replace a character at the cursor position.
key forces text cursor to move to the DELETE (Del) KEY: this key deletes
beginning on the next line. characters at the cursor position from left to
A cursor is a blinking underscore (_) or the right.
vertical beam (|) that shows where the next
character to be typed will appear SPECIAL PURPOSE KEY
It is also used to instruct the computer to These keys are used in combination with
execute a command that has been selected o other keys to give certain commands to a
the screen. computer.
TAB KEY: this key is used to move the next For example: CTRL+Esc is used to display
cursor at a set of intervals on the sane line for the start menu.
example 10mm, 20mm. So the special purpose keys are SHIFT,
THE SPACEBAR: this key creates a space CTRL, ALT, and Esc.
between words during typing.
THE BACKSPACE KEY: this key deletes NUMBERING KEYPADS KEYS
characters from right to left on the same line.
It consist of a set of numbers 0 to 9 and the
FUNCTION KEYS arithmetic signs like: + (addition), -(minus),
*(multiplication), and /(division).
These keys are usually located along the top They are located on the right hand side of the
of the keyboard. keyboard.
They are labelled F1, F2 up to F12. The keypad is meant to help the user to
They are used for task that occur frequently in rapidly enter the numeric data.
various programs. They can be only used when the num lock,
For example, pressing F1 key in most situated on the numeric keypad, is turned on.
programs starts the Help Menu. But when the num lock is turned off they can
CURSOR MOVEMENT AND EDITING KEYS only be used as cursor movement and editing
keys
They are used to move the cursor on the
screen. NB: it is important to note not all keyboards have the
ARROW KEYS: pressing the right or left numeric keypads.
arrow key moves the character to the right or For example: portable computers e.g.
left respectively. laptops may lack a separate numeric keypad
Pressing upward and downwards arrow key due to size limitations.
moves the cursor one line up or down
respectively
PAGE UP AND PAGE DOWN KEY: pressing
up the keys moves the cursor up one page in
case the documents has many pages.
Pressing the down key moves the cursor
down one page in case the documents has
many pages.
HOME AND END KEYS: pressing the home
key the cursor to the beginning of the current
line.
Pressing the end key moves the cursor to the Backspace: Deletes backwards
end of the current line. Enter: For starting a new line
Prepared by Sir A. Kanyika 41 | P a g e
Form 1 Computer Studies comprehensive study notes
Whenever one wants to click an icon or This means pressing & releasing the left
anything, s/he uses the left button unless mouse button.
expressively advised to use the right button A click often selects an object.
(right-click) Uses
DOUBLE CLICKING
A mouse is used for the following:
This means pressing and releasing the left
Selecting texts or graphics button twice in quick succession.
Drawing auto shapes Double clicking usually opens the file or starts
Pointing at menus a program.
Displaying menus
RIGHT CLICKING
MOUSE SKILLS
Pressing the right hand mouse button once.
Moving a mouse on a flat surface, make the This display a list of command called a
pointer on the screen to move the same shortcut menu or contest sensitive menu.
direction as the mouse itself. It is called contest sensitive menu because
To make a selection the pointer must be on the command on it apply to the right clicking
the object that is to be selected. item.
After selecting the user can manipulate the
object by pressing a mouse button. DRAG & DROP
GOOD MOUSE USE This is where the user drags an item from one
location on the screen to another.
When using a mouse follow these guidelines This is accomplished by following the
procedure below:-
i. Place a mouse on a flat smooth surface. i. Point to the item you want to drag.
ii. Gently hold the mouse with your right hand, ii. Press the left hand mouse button and
using the thumb and two fingers. hold it down.
iii. Slide a mouse until the pointer reaches
iii. The index finger should rest on the left button the desired position on the screen.
while the middle finger rest on the right button. iv. Finally release the mouse button and the
item will be dropped in the new location.
COLD BOOTING A COMPUTER If the user wants to leave the computer for a
while without switching it off.
Once you turn on the computer, it It is important to log off the computer to avoid
automatically goes through a process of self- a stranger using his or her session to perform
test and preparation for use. exploits, simply click the start button then
This process is called cold booting or boot up. select the log off button.
Once you turn on the computer, you may
hear sound of the cooler fan running.
After few seconds, lines of text starting SHUTTING DOWN THE COMPUTER
scrolling up on the screen.
This process is called power-on-self-test It is important that the user follows the correct
(POST) procedures of shutting down the computer at
POST checks on the existing drives, basic all times.
inputs and outputs devices such as keyboard, If the procedure is not followed, then loss of
monitor and the mouse. data, damage of programs and computer
If a problem encountered, the process is componets may occur.
halted and an error message is displayed on The following are the procedure when
the screen. shutting down the computer:
POST is accomplished by a special firmware i. Ensure that all the work has been properly
program called the basic input/output system stored. This process is called saving
(BIOS) which is held in ROM chip mounted ii. Close all programs that may be currently
on the mother board. running.
After POST, the computer reads more iii. If your computer is running on Microsoft windows
instructions such as the current time and date XP or vista;
from a special memory known as
complementary metal-oxide semiconductor a) Click the start button
(CMOS).
b) On the start menu, click turn off computer.
CMOS is powered by a dry cell that mostly
resemble that of a digital watch. c) On the message box that appears, turn off, then the
If the cell is down, the computer requires the computer will undergo the shutdown process
user to enter the current data and time.
Lastly, a special type of a computer program For users earlier versions proceed as follows;
used to manage computers called an a) On the start menu, click shut down
operating system is loaded to the computer
memory. b) In the shutdown message windows, select shut
down and then click OK.
LOGGING ON AND OFF THE COMPUTER
CREATING USER ACCOUNTS
When the operating system first loads, it
requires the user to authenticate himself or For users to log in with user name and
herself by providing the user name and the password, they must have user account
password. created for them by the system Administrator.
This security feature helps to deter It is only the Administrator who has the rights
unauthorised person from using the and privileges that enable him/her to perform
computer. such duties.
This process is called logging in the Therefore before attempting to create user
computer. accounts, make sure that your account has
After a successful log in, the operating the Administrator privileges or that you log in
system usually presents the user with the first as an Administrator
screen called the desktop.
iii. System stray: this is at the right part of iii. Run program from removable media
the task manager. without necessarily installing it on the
It has icons of task running in the background hard disk
but are not displayed on the screen. g) Log off
Example are, time and calendar, an antivirus To log off is to terminate the current user
program, volume control etc. session
To display such a task, simply double click its To go back or to switch to a new user, the
icon. user must log in
Logging in is a security measure that restrict
THE START MENU ITERMS unauthorized user from accessing computer
When you click the start button, a list of resources
choice appears called the start menu. To login, the user must enter the correct
The item on the menu may vary depending name and password or in some cases use
on the version of windows you are using other methods such as fingerprint
a) Programs menu authentication
Programs or all programs menu displays a list It prompts a user name and password for one
of programs installed in the computer to gain access
The menu has small solid arrows. h) Turn off/ shut down
When you point the arrow, a submenu called this menu lets the computer shut down,
a sidekick menu is displayed. restart, make computer go to standby or
b) My recent documents hibernation
My recent document lists the last fifteen Hibernation: saves everything in memory on
recently accessed files. disk and turns off the computer
You can open any listed files from a storage Standby: on the other hand, makes the
device by clicking its name provided that computer consume less power in idle mode
device is accessible but remain available for immediate use
c) Control panel
The control panel is the computer
maintenance and configuration “toolbox”
It provides tools used to maintain and make
changes to the computer setup.
It is important to not to tamper with this menu
because you may interfere the computer
functionality.
d) Search
For example a search in windows XP helps MANAGING FILES AND FOLDERS USING
the user to search for files or folders in case WINDOWS
the user forgets its name or location.
To manipulate files and folders (to
e) Help and support
control/manage the actions of files and
The help command on the start menu,
folders) you can either use my computer icon
displays detailed information on how to use
from the desktop or windows explorer from
the operating system and solve some
the start menu.
computer related problems in case the
Each in its own way lets you see how storage
computer fails to function properly
devices or locations, files and folders
f) Run
arranged
It enables the user to:
These tools also enable the user to
i. install program on the hard disk
manipulate files and folders
ii. Open file and folder from a storage
location WINDOWS EXPLORER
Prepared by Sir A. Kanyika 46 | P a g e
Form 1 Computer Studies comprehensive study notes
It lets the user to display the drives and CREATING A NEW FOLDER
folders in a hierarchy or tree structure
The computer tree is an upside down They will be time a user would want to create
structure with the highest level in this case a new folder
the desktop being the root For instance when working on a detailed
The explorer divides the windows into two project that has multiple files
panes It is advisable that all related files be kept
i. The left pane displays a tree of drives together in one folder
and folders To create a new folder proceed as follows:
ii. The right pane displays a list of files and i. Using my computer icon, display the
subfolders contained in a particular open explorer window
drives or folder ii. On the folder tree on the left pane, select
To display the explorer using the start menu the location in which you want to create a
i. Click start, point the program then new folder
accessories iii. On the file menu, point to new then click
ii. Click windows explorer. An explorer folder.
window is displayed A new folder with a temporary name new
To display the explorer using my computer folder appears in the explorer window
icon iv. Type a new name for the folder to replace
i. Right click on my computer icon the temporary name, then press enter
ii. Click explorer key or click the icon once.
This way is what has been throughout used in NB: To create a subfolder, follow the steps above but
form one book to take care of other versions you first select a folder as a location. To open a folder
of windows other than XP. proceed as follows:
USING MY COMPUTER Just left double click, and the folder will be
Double clicking on my computer icon, gives opened and access what is contained in it.
you a graphical view of of what is inside the CREATING A NEW FILE
computer and this include:
i. Drives Depending on the programs installed in your
ii. Control panel computer, you can create different types of
iii. Other resources files such as drawing, text document etc.
To display files and folders from a particular To create a new text document proceed as
drive, proceed as follows: follows:
i. Double click a drive icon i. Using my computer icon, display the
A windows appears displaying files and explorer window
folders stored in the root of the drive in ii. On the folder tree on the left pane, select
question the location in which you want to create
This root is considered to be the highest of your file.
the directory tree where all directories/folders iii. On the file menu, point new
start iv. Select a text document from a list
ii. Double click the folder to display its available application
contents An icon with a temporary name appears in
iii. Double click the drive to display its the explorer window
contents v. Type a new name for the new file to
iv. On this window, you can start replace the temporary name and press
manipulating your files and folders the enter key.
NB: In windows, file name can contain up to 255 This is the working area where you can
characters including spaces but with no special create your documents.
symbols such as \,/,:,*, ?,”,<,>,|,. e) Status bar
Thus is an interactive strip at the button of the
APPLICATION WINDOW application windows that acts as a
In order to enter data in the new file just communication link between the user and an
created above, you have it in its application operating system.
program. Such interactive activities include: saving,
This can be done by double clicking the file opening a file, printing, cursor position, etc.
icon
A rectangular area called an application
window appear on the screen such as SCROLL BUTTONS AND ARROWS
WordPad screen
Scrolling is the moving up, down, left or right
PARTS OF AN APPLICATION WINDOW of a document windows on the screen if it is
too large to fit.
Scroll buttons and arrows are horizontal and
vertical buttons at the borders of window used
to scroll through a long document.
SAVING CHANGES TO A FILE
After typing the content of a file in the work
area, click file and then click saves.
Otherwise, if the file will be saved with
different names or location then.
1. Click the file menu then save as.
a) Tittle bar
This is a bar across the top of the window that 2. From the resulting save as dialog box, select where
displays the name of the current application the document is to be saved then type its name.
program or task
On the right of the tittle bar are three buttons 3. Click the save button
namely: RENAMING FILES AND FOLDERS
Minimise buttons: it reduces a window by pressing Renaming refers to the changing the previous
button which is pressed on the task bar name to a new name.
The restore/maximise buttons: it stretches the To rename a file or a folder proceed as
window to cover the entire desktop or restore it to its follows:
original size. 1. Using my computer icon, display the explorer
The close button: is used to exit an application window
b) Menu bar 2. On the folder tree on the left pane, select the file or
Menu bar provide a list of command that can folder.
be used to manipulate the task. For example, 3. On the file menu, click rename
to save a document click file, and then save.
c) Tool bar 4. Type the new name, and then press enter key
This are button, arranged in a row, which are DELETING FILES AND FOLDERS
shortcut to commands.
d) Work area In windows, when you delete an item from the
hard disk, it is temporary held in a special
Prepared by Sir A. Kanyika 48 | P a g e
Form 1 Computer Studies comprehensive study notes
folder called the recycle bin where it can be 3. Click yes when promoted to confirm detection of
restored if necessary the files
The recycle bin is a default icon on the
desktop and therefore it cannot be removed NB: you can also delete selected items in the recycle
bin by clicking file then delete.
WARNING
COPYING AND MOVING FILES AND FOLDERS
1. One should not attempt to delete system and
Cut or copy commands are used to move or
application files from the hard disk
create a duplicate of an item respectively
2. Items from the removable storage are not
When you cut or copy an item, it is temporary
held in the recycle bin and are completely
held in the temporary storage location known
lost.
as the
To delete a file or a folder proceed as
To copy /cut a file or a folder, proceed as
follows:
follows:
1. Using my computer icon, display the explorer
1. Using my computer icon, display the explorer
window
window
2. On the folder tree on the left pane, select the item
2. Select the file or folder to be copied
that is to be deleted
3. On the edit menu click copy/cut
3. On the file menu, click delete
4. Select the drive or folder where you want your item
4. A message appears on the screen asking whether
to be copied/moved (cut)
you actually you want to delete the item.
5. From the edit menu, click paste.
5. Confirm by clicking yes
The information or item is pasted to a new
RESTORING DELETED FILES AND FOLDERS
location
To restore a file or a folder from the recycle
bin to its original location, proceed as SORTING FILES AND FOLDERS
follows: Sorting means arranging files and folders in a
particular order, either alphabetically or by
1. Double click the recycle bin icon
size or date of the last modification or
2. Select the deleted item (items) to be restored creation
Windows automatically sorts files and folders
3. Click files, then restore. into alphabetic order but the user can choose
EMPTYING THE RECYCLE BIN to arrange them otherwise.
To sort files and folders proceed as follows:
To completely discard files and folders you
deleted, you need to empty the recycle bin. 1. Open a folder or storage location
Deleted items take up the same amount of 2. Click view, then point arrange icon by
the space they occupied before you delete
them. MANIPULATING FILES AND FOLDERS USING THE
To free up that disk space occupied you SHORTCUTS
have;
To empty the recycle bin, proceed as When you right click an item, a shortcut menu
follows: is displayed, which provides commands &
commonly used to manipulate the item.
1. Double click the recycle bin on the desktop To copy, move, delete or rename an item
proceed as follows:
2. Choose recycle bin from the file menu
1. Right click the file or folder to display its shortcut 1. Click start, point to search then click for files or
menu folders
2. On the shortcut menu, click the appropriate 2. In the search dialog box, specify the search criteria.
command ie.
3. Click the search button.
i. To copy or move, right click the
destination location then paste The end ~!!!
ii. To delete, simply click delete
command
iii. To rename, type in a new file name to
replace
MANIPULATING FILES AND FOLDERS BY DRAG This is a complete computer studies pamphlet notes
AND DROP with practical elements, for form 1. It is based on the
current secondary education curriculum of Malawi
Another easier way/method of handling files with effective pedagogical features of teaching and
and folders is a drag and drop learning.
This is done as follows:
“All the best in your studies as you try to inculcate
1. To copy a file or a folder, hold down the CTRL key yourself with digital skills and knowledge”
while you drag the icon of the file to a new location
2. To move files from one location to another, on the
same drive but in different folder, simply press down I wish to extend my heartfelt and special thanks to all
the mouse buttons and drag the item to new location. those who encouraged in the development of this
3. To delete any file or folder, drag into the recycle bin pamphlet.
SERCHING FOR FILES AND FOLDERS +265(0) 996 023 675 (WhatsApp #)
in case you’re not sure where you stored or +265(0) 883 755 825
the name you gave the file or folder, use the Email: [email protected]
search menu