F3-Oda Notes Comp Scie
F3-Oda Notes Comp Scie
It is an electronic device that works under the control of stored programs to automatically
accept, store and process data into information. Therefore, a computer has the following
characteristics:
It is electronic:- can only work when there is electricity
It is a device: a machine
Is controlled by programs: Works according to instructions, written in computer
language, given by the user for it to perform a specific tasks.
Is automatic in operation: Can work with minimum or no human intervention.
Can accept data: data can be entered into the computer through various means and
the computer accepts it.
Can store data and programs: Data and programs entered into the computer can
be stored for future use.
Can process data into information
2. Information: It is data that has been converted into meaningful form. In general it is
processed data. Information can be understood and therefore can be used for decision making
purposes. Information is meaningful. To get relevant information, data entered into the
computer must be relevant, accurate and up-to-date. If data entered into the computer is
wrong (Garbage In) the results will also be wrong (Garbage Out), and is generally referred
to as Garbage-In Garbage-Out (GIGO). It is a rule stating that the quality of the output is
a function of the quality of the input; put garbage in and you get garbage out. Therefore the
accuracy of the results produced by the computer depends on how accurate the user enters
data, functions, formulae and codes program procedures.
Computer Generations
Refers to stages through which computers developed from the 1940s to date. These are as
follows:
1. First Generation Computers (1945 -1955): These are the earliest computers that
used valves in controlling machines, e.g. EDVAC, ACE and UNIVAC machines.
These were very large computers, fitting about the size of an average room. They
were programmed in a language understandable by the machine. Such computers
used a lot of electricity and were very expensive to purchase. Only very large
organisation could afford these computers. Such computers were huge, slow,
expensive and often undependable.
2. Second Generation Computers (1955 -1965): These are computers that used transistors
instead of valves. They were faster, had reduced size, were more reliable and less expensive.
Second generation computers were: faster,
more reliable, smaller, much cheaper to
build, gave off virtually no heat, conduct
electricity faster
Transistor
3. Third Generation Computers (1965 – 1980): These used integrated circuits e.g. the IBM
(International Business Machines) computers. The integrated circuit, also referred to as
semiconductor chip, packs a huge number of transistors onto a single wafer of silicon. These
computers have increased the power, lowered cost, carry out instructions in billionths of a
second, and smaller.
Microprocessor
5. Fifth Generation Computers (1990 to date and beyond): These use natural language
and can flexibly interact with the human being. Such systems are used in medical diagnosis,
mineral prospecting and in geological researches. Such computer systems are capable of
human intelligence and are commonly called expert systems.
TYPES OF COMPUTERS
The types of computers are: Micro-computers, mainframe computer, super computer
& mini-computer. They can also be digital or analogue computers.
1. Micro Computers: These are computers with a microprocessor inside them and occupy
a small physical space. They are cheap, small, and relatively slow and have limited
memory, often single user, easy to use and have low computing power.
Microcomputers include the following:
‘
a. Desktop Computers: These are computers with a separate CPU and monitor and fit
on a desk during usage. They are relatively cheap. They are easy to add expansion cards
on them. However, they take up large desk space. They are not portable
b. Personal Computers (PC): - These are microcomputers made for use at home for
general purpose, and includes desktop computers. They are cheap, more powerful and
has good storage capacity disks.
Advantages of desktop/PCs
- Low cost
- Spare parts tend to be standardised
- Faster processors, 2.0 GHz
- Large casing allows good dissipation of any heat build-up
Disadvantages
- Not portable
- Take large desk space
- All devices need to be wired together which might be too complex
c. Palmtops: These are portable microcomputers that can fit in the palm and pocket and
are used as diaries and for other small business applications.
They are Handheld Computers that are small enough to be
carried in a pocket and include Personal Digital Assistants
(PDAs) and Cell phones. These are mostly used as diaries,
word processing, faxing, internet browsing, calculator,
contacts, etc. PDAs and all palmtops are portable. However,
they are expensive and have limited expansion. They are
even slow to input data using them.
d. Laptops (Notebook computers): - These are portable computers that use an internal
battery for power and can be placed on laps during usage. The keyboard, pointing
device, monitor and processor are all designed as one unit. They have LCD (Liquid
Crystal Display) screens which are not as bright as most Monitors.
Laptops are small like a briefcase and are portable
and can be used in areas where there is no
electricity. They have light weight and are battery
powered. They consume less electricity. The
processor does produce too much heat. They also do
not have trailing wires as everything is in one unit.
They can take full advantage of WIFI.
e. Netbook Computer: These are smaller versions of laptops, they can almost fit in a
hand and do not have optical devices (CD/DVD drive) on them. Their benefits and
problems are similar to those of laptops. However, they are cheaper and they have a
weakness that they do not have optical devices.
f. Tablet Personal Computers: Type of notebook that accepts input from an
electronic pen
Tablet PCs (a) Slate model (b) Convertible model
For schools and school children, laptops have the following advantages:
- Users can save data in their own storage area wherever they are.
- Users can get any networked software wherever they are.
- School needs fewer printers.
- Users do not need to keep using the same machine.
- Users can access school intranet from anywhere.
- Users can access Internet from anywhere.
- Users do not need to carry CD ROMs.
- It is easier to communicate with.
- Can email work to teachers even from home.
- Staff can monitor students easily.
- Students and teachers can share files and notes easily.
3. Mainframe Computers: these are large and powerful computer systems. They are
mostly used in large organisations like banks and where bulk data processing is needed such
as census, industry/consumer statistics, and financial transaction processing. They have the
following features:
- they can have several CPUs,
- have very fast processor speed
- can support multiple operating systems ‘
- have huge storage capacity
- have huge internal memory
- can operate using time sharing or batch processing
- Allows several users and can accommodate multiple processors.
- They are very large and expensive.
4. Super Computers: These are very powerful computers that are used to perform detailed
calculations and for design purposes, for example, modelling of aircraft wings, testing
bombs, etc. They are the fastest and most expensive computers
Supercomputer
*NB:- The classification of computers as micro, mini, mainframes and super computers have
become blared due to recent technological advancements since a microcomputer can now
perform all functions that were believed to be for mainframes.
Classification of computers can also be made relating to the use of the computer, as follows:
(a) General Purpose Computers: - these are computers that can be used to perform a
number of functions like playing music, playing games, payroll processing and so on.
(b) Special Purpose Computers: - These are computers that are designed to perform one
task only, for example, to monitor patients in hospital.
(c) Analogue Computers: these handle data in continuously varying form.
(d) Digital Computers: Handle data in discrete values; that is in 0s and 1s.
(e) Embedded Computers: – Refers to use of microprocessors in non-computer equipment
like in cameras, washing machines, watches, etc. These are normally dedicated for a specific
task they are designed for. Embedded computers are also found in household items like
camera, microwave, washing machine, video recorder, fridge, sewing machine, air
conditioning, electronic toys, rice cooker dish washer, Televisions, alarms, clock, radio,
DVD players, etc.
Microprocessor controlled devices have the following advantages:
(a) To Manufacturer:
- Fewer breakdown and repairs. They are therefore easier to repair and service
- It is cheap as there are fewer parts to assemble
- Reliable
- Improve quality control
(b) To Customers
- Robust and therefore fewer repair bills
- Low power consumption
- Cheap to buy
- Faster processing
- More versatile
- Efficient since they can be dedicated to a specific task
Computer fraud: improper electronic transfer of funds from one account to another using
computers
Copyright: A document granting exclusive right to use, publish and sell software, musical
or artistic work.
End-user: A person or organisation who are the final beneficiaries of a program or a device
like a computer.
Input Hardware
These are devices used to enter/feed data into the computer, for example mouse and
keyboard. Below are some of the input hardware and their uses:
(i) Keyboard: It is a device used to enter data and instructions into the computer by typing.
It is a manual input device. It is similar to the traditional typewriter. It is used to enter
alphabetic letters (A-Z-both lower case and upper case), numbers (0-9, positive and negative)
and other special characters like the %, $, coma, and the space. Keyboard entry of data is
manual and its excessive use without breaks will cause Repetitive Strain Injury (RSI).
*NB: - A character is any symbol, digit or letter that can be entered into the computer, e.g.
$, %, 5, h, etc. These characters can be numeric (numbers 0-9, positive and negative),
alphabetic (letters A-Z, both lower and upper case), alphanumeric data (a combination of
both numeric and alphabetic characters) and special characters (space, $, >, etc.).
*NB: - Control Character: - Refers to
non-printable character code or number in
the character set that do not represent a
written symbol, e.g. carriage return, tab
key, etc. These are mostly used in
peripheral devices control and for
communication purposes, for example,
carriage return, tab or backspace; and
others typed by depressing a key and the
control key at the same time.
Standard keyboard
(c) Standard keyboard: this is the normal, also called QWERTY keyboard.
(d) Numeric keypads: mostly used to enter numbers only. Used on ATMs, to enter PIN
and amount to be withdrawn. Also found on cell and telephones, Chip and pin
devices, and on Electronic Point of Sale terminals (EPOS). They are faster in entering
numeric data as compared to standard keyboards, very easy to carry around if found
on cell phones. However, they have very small keys which can be difficult to use. It
is difficult to use them for entering text data.
(ii) Mouse: It is a pointing device used to enter data and instructions into the computer by
clicking. A mouse has either one, two or three buttons. A mouse can be cable or wireless.
The mouse is also used to:
- Select options from a menu
- Position the cursor when editing text/typing
- Select an object for drawing and for editing diagrams -
Select icons/text to be formatted, deleted or edited.
- Control movement of pointer on the screen
Advantages of mouse
- It is a fast method of entering data and for selecting items as compared to the
keyboard.
- It is faster to move cursor around the screen using a mouse than a keyboard.
- Usually supplied with the computer and so there are no additional costs.
- Very easy to use for most users.
- Take up very small area of the desk
- Very fast to switch between programs
(iii) Touchpad
These are pointing devices used on laptops, where one moves a finger to control the pointer
on the screen. Their uses are similar to those of mouse. They aid portability since they are
attached to the whole computer system. Can also be used where there are no flat surfaces
available. However, they are difficult to use, e.g. when doing drag and drop.
(iv) Scanner: an input device used to convert images from paper (hard copy) into electrical
signals for input into the computer.
The images can then be edited, printed or
saved. Mostly used to scan pictures,
photographs, etc. they can use OCR, convert
to Word or pdf format directly.
(v) Digital Camera: A device use to capture photographs, films, videos or a combination
of both for entry into the computer where they can be edited.
- no film is needed (saves costs for purchasing films and developing the film)
- Unwanted images can be deleted straight away
- Images are already digital and therefore can be transferred to a computer for editing
immediately,
- Easier and faster to upload photos to the computer
- Produce better quality images than the traditional camera
(ix) Tracker ball: It is an input device with a small ball that can be moved by passing the
palm of your hand over it. This will move an arrow on the screen and therefore can replace
a mouse.
It is used to draw designs and to select
options from menu. Used as an
alternative to a mouse. To operate it the
user rotates the ball which moves the
pointer on screen. They are particularly
easy to use for those with
Track ball limited movement in their hands and are often used in
Computer Aided
Design (CAD) for their increased
Precision over a mouse.
Advantages of trackball
- It is stationery and therefore do not need a flat surface to move on
- Less likely to get damaged than mouse
- Less tiring as less movement is needed
- Can be useful in laptops
- Rolling the ball is less effective than using mouse
- Can be difficult to control
- Not supplied as standard device, so extra cost is incurred
- Muscles can be strained due to repeated movement
*NB:-An analogue device is a device that recognizes data in continuously varying form, e.g.
microphone, wall watches (with minute, hour and second hand), fuel petrol gauge,
speedometer, etc.
A microphone is used in voice recognition systems. These are computerized systems that
allow users to communicate with the computer by talking (voice input). Such systems
Have the following advantages:
- The systems are over 90% accurate.
- They are appropriate for the handicapped, especially those without hands.
- They are very fast in entering data and in giving instructions to the computer.
- They are speaker independent.
- They can recognize natural language.
- Older systems are speaker dependent.
- They allow the user to speak slowly, using specific words that were programmed
for it to understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition software are
needed in voice recognition systems.
(xii) Light pen: A ballpoint shaped device used to enter data by writing on an ink pad. It is
also used to make alterations on the screen to the drawings, to write directly on the screen
and to select commands.
Light pen
(xiii) Kimball Tags: These are punched cards with a magnetic strip which contains details
of a product, mostly clothes in a shop.
(xiv) Graphics tablet: Devices used to provide interface for drawing on the screen and
links with the light pen. Can also be used with a stylus. Can be used for drawing
(xv) Webcam: A digital video camera designed to take digital photographs and transmit
them over the internet or to the computer. They do not have own memory. Laptops have their
own web cam.
Uses: viewing each other when chatting on internet. For video conferencing. For taking
personal images.
Advantages: can be left on and only activated when required. People can see each other
when chatting.
(xvi) Sensor: an input device that automatically records physical data by sensing the
environment it is supposed to record, e.g. humidity sensor.
(xvii) Magnetic Stripes: Magnetic stripes can be seen on train tickets or bank or credit
Cards.
(xviii) Smart Card Readers: Similar to magnetic strip readers except that they are used to
read data stored on a chip. Most bank cards and credit cards are now smart cards. Also used
on royalty cards, ID cards, electronic passports and transport passes.
Cards have their own processor and memory that can
hold up to 64KB of data. The data that is stored can
be updated and the processor can process simple
programs.
Smart card
- Smart cards are simple to produce
- Not easily damaged
- Store a fairly large amount of information
- Automatic input devices, reduce paperwork
However:
- Data can be changed by magnetic fields
- The strip can be damaged by scratching
- Limited storage capacity
- Not very secure as thieves can alter the data.
(xix) Barcode Reader: These are devices at Electronic Point of Sale terminals (EPOS)
that read barcodes on products for automatic data entry into the computer. Mostly used in
library systems, luggage handling systems at airports, warehouse stock control, etc.
Barcodes are numbered vertical lines and
spaces of varying size on products that
provide data for such a product to the
computer when read by barcode readers.
If the barcode reader fails to read the
barcodes, data is entered manually through
Barcodes the keyboard by entering the numbers below the
barcodes.
(xx)Video digitizer
A video digitizer takes an image from a video camera or television and digitizes it so it can
be read by, and stored on, a computer. Video sequences captured using video digitizers are
often used in multimedia presentations.
(xxi) Stylus: device used to write on sensitive pads or screen for data entry into the
computer. Often purchased with touch screens.
Document Readers
These are devices used for entering data automatically into the computer by reading
through documents. These include:
(i) Optical Mark Recognition (OMR): The Optical Mark Readers use light sensitive
devices to sense pencil marks on a piece of paper for automatic data entry into the computer.
Light is reflected from the document onto the Optical Mark Reader which records the output.
It then records low intensity/zero intensity at certain points. OMR is mostly used in marking
multiple choice exams at ZJC and ‘O’ Level, reading pupils’ registers, playing lotto, etc.
An Optical Mark Reader is the device that is used for automatic data entry in OMR systems.
- OMR is fast in entering data
- It is also accurate and reliable in entering data.
- Has better recognition than OCR
- Can be prepared where data originates, without machines
- Errors can be corrected easily
However:
- Mark readers are relatively slow
- Verification of data is difficult
- Document may be difficult to design
- Forms must be completed clearly for data to be recorded accurately
- Papers need to be clean
(ii) Optical Character Recognition (OCR): It is the use of light sensitive devices to
recognize alphabetic characters and numbers on a sheet of paper for automatic data entry into
the computer. Mostly used by insurance companies, in billing systems and processing of
Bank Giro-forms. An Optical Character Reader is the device that is used for automatic data
entry in OCR systems. It recognizes printed or even hang written test for input into the
computer
- Can convert large amount of text into digital form at once
- Less tiresome since it is an automatic data entry method
- Faster in entering text into the computer
- Accurate in data entry
However:
- A lot of data entry errors can be found
- May not work well with tables and diagrams
- Do not work well with handwritten text
Output Devices
These are devices used to display and produce data and information held inside the
computer, for example: screen, printer and graph plotters. These are described below:
(i) Printers: A printer is a device that is used to produce hard copies of data held in the
computer. Hardcopy is a document printed on paper, e.g. a printed school report, a printed
letter, etc. Output from the printer appears as displayed on the computer screen, thus What
You See Is What You Get (WYSIWYG).
Types of Printers
Printers can be classified into impact and non-impact printers.
(a) Impact Printers: these are printers whose write heads hit ink ribbon against paper during
printing, e.g. dot matrix printer, chain printer, daisy wheel printer, drum printer, etc. Thus, there
is contact between the paper and the write heads during the printing stage. Examples include
drum printers, dot matrix printers, daisy wheel printers and chain printers. Impact printers
have the following advantages:
They are very cheap to buy.
They are cheap to repair and to maintain.
They can use continuous paper.
They are economic in terms of ink usage.
(b) Non-Impact Printers: These are printers that do not produce contact between papers,
write heads and ink cartridge during printing. Non-impact printers include: inkjet printer,
laser printer, thermal printer, etc.
Laser printers
Most of the printers use light and are therefore called laser printers.
The advantages of laser printers are as
follows:
they print at very high speeds since
they are page printers.
They produce high quality text and
graphics.
they produce less noise than dot-
matrix printers (they are quiet in
LaserJet printers their operation).
Have paper trays both for input and
Output and therefore need no
Supervision once setup.
the toner is not water-soluble
The disadvantages of laser printers are as follows:
they are very expensive to buy,
they are large and therefore take up a lot of desk space,
they are quite complex and therefore repair bills can be very high,
Cannot be used with continuous stationery since they are page printers.
Toner is toxic/poisonous and therefore should be disposed of carefully after use.
Inkjet printers
Uses print head to propel droplets of ink on a sheet of paper.
Advantages:
(ii) Screen / Monitor: it is a television shaped device used to display contents on the
computer as soft copy. Soft copy refers to data viewed on the screen. The screen can also be
called the Visual Display Unit (VDU). The screen can differ in terms of resolution, that is
low resolution screens display less number of dots per inch on the computer and therefore
the display will be of poor quality. High resolution monitors are needed mostly in graphics
packages where colour and many dots per inch are needed.
Monitors are of three main types:
- LCD (Liquid Crystal Display)
Relatively thin and do not use a beam of electrons. They easily fit on walls and desks,
light weight, compact and can fit on laptops, little light is reflected, absence of flicker
on the screen. However, images can be viewed from fewer angles, can display limited
range of colours.
- CRT (Cathode Ray Tube)
These are the older and bulker versions. To display content, an electric gun fires a
beam of electrons from the rear of the CRT. They are cheap, images can be viewed
from a wider angles, and has a wider range of colour and brightness. However, they
are bulky and difficult to fit on a desk, they are heavy and difficult to mount on walls,
and too much reflection can affect eyes.
- Plasma Display Panels:
Flat panel display used for television displays
Advantage of Monitors
- Its output is immediate and visual
- High speed of display
- No noise
- No wastage of paper
- Can display text, graphics, etc
Disadvantages
- When the display changes, the previous output is lost.
Needs a separate device to produce hardcopy
(iii) Graph Plotter: This is a device used to produce high quality drawings in
various paper sizes and is used in Computer Aided Design (CAD). A plotter can be
used to produce high quality, accurate, A3 size or bigger drawings. They are usually
used for Computer Aided Design (CAD) and Computer Aided Manufacture (CAM)
applications, such as printing out plans for houses or car parts. They print sharper and
more precise drawings.
(iv) Data projector
An output device that uses lenses to project intense light on the wall. Can be multimedia
projector and offer wider/ bigger screen display on the wall. Ideally the surface should be a
whiteboard. Suitable for presentations to a wider audience. However, it is more expensive to
buy and has a fragile bulb.
(v) Speakers: produce sound from music files on the computer. They are used in
conjunction with multimedia files.
(vi) Braille Printer: prints Braille which is readable to the blind people.
(vii) Actuators: these are output/control devices which turns on or off some devices in
control systems. Some of the control devices include electric heater (supplier heat), electric
motor (provide movement/rotation), motorised pump, buzzers, lights, heaters, actuators, etc
Processing Device
A device used to convert and to manipulate data as per user requirement. The sole processing
device of a computer is the processor, which is inside the Central Processing Unit (CPU)
casing. Processing involves sorting of data, updating records, searching certain records,
adding a sequence of numbers, and others.
The processor has the following functions:
- It controls the transmission of data from input device to memory
- It processes the data and instructions held in main memory
- It controls the transmission of information from main memory to output device.
- Controls the sequence of instructions,
- Give commands to all parts of the computer,
- Fetches the next instruction to be executed
- Decodes instructions
- Executes decoded instructions
The speed of a processor determines the speed and function of a computer. Until the 1980s,
most computers had one processor, but recent ones have two or more processors (called co-
processors), those with two processors are called dual processors. Two or more processors
share loads and therefore perform operations faster. The speed of a computer is also
determined by the clock speed for each microprocessor. This speed is measured in
Megahertz (MHz). The general structure of the CPU or Processor is as illustrated below:
The processor comprises of: Arithmetic and Logic Unit (ALU) and the Control Unit (CU) and
Registers
(a) Arithmetic and Logic Unit (ALU)
- Carries out arithmetic operations like add,
subtract, divide, etc.
-Performs logic operations, like AND, OR,
.etc
(b) Control Unit (CU)
- It coordinates and controls all hardware
operations,
- It carries out the Fetch-Execute Cycle.
(c) Registers: High-speed storage area in the
CPU used to temporarily hold small units of
program instructions and data immediately
before, during and after execution by the
CPU.
NB: Memory (Main memory): Stores programs and data for programs currently running
on the computer. Main Memory is very close to the processors and therefore the two can
coordinate their activities very fast.
- ALU operations on data are first loaded into the accumulator register, a memory which
stores instructions, data being processed and results of an operation.
The function of the microprocessor is to fetch, decode and execute instructions. This is also
called the Fetch-Execute cycle.
Buses
A bus is a pathway through which data and signals are transferred from one device
to another in the computer system.
They are a set of parallel wires connecting two or more components of the computer.
Buses can be internal or external.
Buses can be generally referred to as system bus and this connect the CPU, memory
and I/O devices.
Each bus is a shared transmission medium, so that only one device can transmit
along a bus at any one time.
Multiple devices can be connected to the same bus
The main types of buses are:
- Data bus:
Used for carrying data from memory to the processor and between I/O ports.
Comprises of either 8, 16, 32 or 64 separate parallel lines
Provide a bi-directional path for data and instruction’s between computer
components. This means that the CPU can read data from memory and input ports
and also send data to memory and output ports.
The width of the bus determines the overall system performance. For example, if
the data bus is 8 bits wide, and each instruction is 16 bits long, then the processor
must access the main memory twice during each instruction cycle
- Address bus:
Used for transferring memory addresses from the processor when it is accessing main
memory
They are used to access memory during the read or write process
The width of the address bus determines the maximum possible memory capacity of
the computer.
This a uni-directional bus (one way). The address is send from CPU to memory and
I/O ports only.
- Control bus:
The purpose of the control bus is to transmit commands, timing and specific status
information between system components. Timing signals indicate the validity of data
and address information. Command signals specify operations to be performed. Specific
status signals indicate the state of a data transfer request, or the status of request by a
components to gain control of the system bus
This is a bi-directional bus used for carrying control signals (Signals can be transferred
in both directions).
They carry signals to enable outputs of addressed port and memory devices
Control signals regulate activities on the bus.
Control buses transmit command, timing and status information between computer
components.
Fan
A fan is used to cool the processor. It blows away hot air so that the processor
remains cool.
Storage Media
These are devices used to store data and programs for future use.
Storage Capacity
Refers to the amount (volume) of data a device can store. The following storage
measurements can be used:
Bit: Short for Binary Digit. The smallest unit of data a computer can store, either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of 4 bits.
Byte: a group of 8 bits representing a character, e.g. 01000011. For example, the letter C is
represented by the byte 01000011.
*NB:-Formatting (initialising) a disk: this is the process of creating new tracks and sectors
on the disk that will be used in storing data. When a disk is formatted, existing tracks and
sectors are destroyed, including the data stored on them, and new ones are created. After
formatting, the disk will be blank. Formatting is done using the FAT or the NTFS file
system. Storage media is grouped in primary storage and secondary storage:
RAM Chips
Magnetic Storage
These store data on magnetised field of iron oxide and include magnetic tapes, zip
drives, diskettes, hard drives, cassettes, etc.
Magnetic Tapes: They are similar to a normal cassette tape in shape. They store data in
serial and sequential order. They are mostly used to backup data. Their storage capacity can
be up to 20 GB. Data is also accessed in serial or sequential order. They can be used as off-
line storage media.
Magnetic tapes have the following
advantages:
Data can be arranged in an ordered sequence.
They are re-usable, that is can be overwritten
Several times.
Suitable for high hit rate processing systems
like payroll, billing systems, etc.
They last for a very long period of time, and
Thus can be used to keep historical records.
They are very cheap to buy.
They store very large volumes of data, of up to
20 GB.
They are small, robust, and portable and
provide low cost storage per GB .
Magnetic tape
Memory cards
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form of optical Disks
on which data, once it has been recorded, cannot be modified.
2. CD-W (CD-Writeable) an optical disk that can be written upon, but only once.
Often called WORM (Write Once Read Many) disks.
3. CD-RW (CD-Rewriteable) on optical disk that allows personal computer users to
replace their diskettes with high-capacity CDs that can be written upon and edited
over.
Advantages to schools of storing learning materials on a CD-ROM other
than using the Internet
No danger of accessing doubtful websites.
Does not take as long to find required information.
Do not have to have a modem.
Do not need for a telephone line.
Once CD ROM is bought there is no additional expenditure.
Do not have to remember user id/password.
Usually quicker to load material.
Information on CD is more reliable
Disadvantages to schools of storing learning materials on a CD-ROM
other than using the Internet
CD ROM can be lost easily.
CD ROM can be damaged easily. Internet is up to date while CD ROM is soon out
of date.
CD ROMs are expensive to replace and to update.
Less information can be stored on the CD-ROM as compared to the internet.
2. DVD (Digital Versatile Disc): Are spherical in shape that can store data on 2 sides. Stores
data on tracks in a random way. Data retrieval is in random order. Storage capacity is about
4.7 GB. Writing of data on DVD is done by a device called DVD writer/burner. There are
several formats on the market, such as:
DVD-ROMs - read only, the data is written to them before they are sold.
DVD-R- meaning DVD-Recordable, the user can write data to the DVD once or fill it over
time using multi-session.
DVD-RW- meaning DVD-ReWritable, the DVD can be written and re-written to. Unlike
multi-session discs, existing data can be overwritten.
Uses of DVDs:
Transferring large volumes of data from one computer to another.
Creating backup storage for programs and data.
Booting the computer when loading the operating system or restoring damaged
system files (system repair)
Advantages of DVDs:
Provide fast and direct access to data.
Has large storage capacity of about 4.7 GB or more.
Produces high quality sound and pictures.
It is a multi-media device.
Disadvantages of DVDs:
Can be affected by direct sunlight.
Less durable.
They can easily get scratched.
Caring for DVDs, VCDs and CDs:
Do not expose them to direct sunlight.
Do not touch the recording surface.
Use soft marker for labelling and not ball point.
Keep them free form dust conditions.
*NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the computer
to run programs that need more memory (RAM) than the computer has. For example,
programs could have access to 4 gigabytes of virtual memory on a computer's hard drive,
even if the computer has only 32 megabytes of RAM.
COMPUTER APPLICATION
This chapter deals with the areas where computers are used, what they used for, how they
are used, the advantages and disadvantages of their usage in such areas.
ii. Distance learning made easier through chartrooms, digital interactive television, CD-
ROM (storage of encyclopedia, learning materials (content)). Learning materials like the
encyclopedia can be stored on the CD ROM as it will have the following advantages as
compared to a printed (manual) encyclopedia:
Cannot write to it so cannot be changed.
Can use sound, text as well as video for students to understand better.
Search of data is quicker.
Can printout data conveniently.
It takes up less space.
Is more portable.
iv. Computers can be used to organise events in schools, for example, parents’ visits,
timetable, etc.
v. Used to store students data, exams, teachers records, etc.
vi. Used as teaching aids in all subjects. Enables interactive teaching
vii. For marking multiple choice examinations on scanner sheets
viii. For storage of student data pertaining to subjects, teachers and subjects taken.
ix. Used as a subject for student to learn, e.g. Computer Science, Information Technology,
etc.
x. Used for carrying out researches and experiments which may be dangerous for human
beings to do.
xi. Computers can also be used in Computer Aided Learning (CAL) and Computer Aided
Instruction (CAI).
CAI: a teaching system that operates on drill and practice principle, for instance, in teaching
computers, a student is presented with a word and its meaning. The student studies it and
will be asked its meaning at a later stage.
CAL: This whereby a lesson is rehearsed before the computer and then played back to the
class when the teacher is not physically present. The computer is thereby used to teach the
pupil. For example, the computer present a topic just like a teacher does in a lesson. Pupils
are asked questions. If they fail, the lesson is repeated; otherwise a new topic will be
presented. CAL has the following advantages:
This system allows pupils to study at their own pace, repeating sections they do not
understand.
Material is presented in a consistent way making learning easier.
Few teachers are required.
Computers are endlessly patient and can repeat sections that pupils did not
understand without hesitation.
xii. Used for typing and printing examination papers and keeping of student results.
Some schools have pupils who are either blind or partially sighted. Computers could be
used to help these pupils to learn in the following ways:
Use of sound (voice) output and speech synthesiser.
Use of speech (voice) input, recognition or microphones.
Type using large characters (large font size) on the screen.
Use of Braille keyboards, touch screens, touch pads.
Use of bright colours to improve visibility.
Use of scanners to input information and output speech.
Use of printers which give output in Braille
Xiii: Electronic Registration (e-registration) of
students xiv. E-marking of student examinations
ii. Used for cash disbursement at the Automated Teller Machine (ATM). An ATM is a
computerised, special purpose cash disbursement machine outside banking halls used even
when banks are closed. Services offered at the ATM include:
Balance enquiry,
mini-bank statement,
facility to change PIN code,
Cash withdrawal, etc.
PIN (Personal Identification Number) - a secret number used by individual account
holders to access bank account and get service at the ATM. The account holder needs a debit
card for him/her to access bank services at the ATM.
The Account holder inserts the debit card into the hole on the ATM, which in turn request
the user’s PIN. The user enters the PIN and then presses enter. The ATM validates the PIN,
and if it is correct, allows the user to select service required from the list of options available.
If the user enters the wrong PIN for three consecutive attempts, the ATM would not eject the
debit card, assuming that you are not the owner of the card and no service shall be given.
iii. Clearance of cheques: The main branch receives cheques from other branches and
processes them using the batch processing method. MICR is used to read data from the
cheques into the computer.
Electronic Funds Transfer at Point of Sale (EFTPOS): This is a method of transferring money
from one account to another electronically without handling of cash at the Point of Sale
terminal in shops. The Point of Sale terminals will be online the bank’s database, enabling
the shop to deduct cash from the customer’s account and transfer it to the shop’s account.
For this to occur the customer is supposed to produce the debit card, which is wiped on the
card reader which in turn requests the client to enter the PIN. Some cash back is available at
the POS.
Electronic banking (e-banking): the process of carrying out all bank transactions
electronically on the internet (internet banking) and by use of cell phones. This is almost
similar to tele-banking.
For Internet banking, credit cards are required for clients to get access to the bank accounts.
Data about credit cards is stored on the magnet strip and this includes: Date of issue, Bank
code, Branch code, Account number, Card number and Expiry date. Information entered by
a client to access banking services from home includes: Account Number, Account name
and password.
In home banking, users can stop a cheque, enquire their account balances, transfer money
between accounts, pay bills, order a cheque book, look at account transactions for a given
period, request a change of pin or password, amend or create standing orders/direct debits,
print statements and change personal details. It is impossible to withdraw cash or pay in cash.
In home banking, the following advantages are realised by customers:
Do not have to waste time travelling long distances to banks.
Do not have to spend money on travelling expenses travelling long distances to
banks.
No embarrassment of having to ask for loans face to face.
Can do bank transactions even when banks are closed.
Do not have to waste time waiting for a response to telephone banking.
Less personal touch is involved hence no socialisation with friends and neighbours.
More expensive phone bills are to be paid.
Lack of exercises as user just sits on the computer.
Hackers can access personal details and transfer money to their accounts.
You have to have a computer and an Internet access of which less people can
afford.
Users are unable to withdraw cash
When purchasing the goods, the supermarkets and any other shops check the following on
the credit card:
Check if the card is valid.
Check if credit limit is not exceeded.
Check if credit card is not reported as stolen.
Check if expiry date has not been exceeded.
The introduction of ATMs, EFT and electronic banking, including internet banking has the
following advantages and disadvantages.
Advantages to Bank workers
Their workload is reduced, for instance the burden of counting cash and service
many clients can be done the ATM.
Reduction in mistakes, for instance counting cash and updating wrong accounts as
the computers validate details during entry.
Reduction in working hours.
Increased salaries.
Better working conditions
Disadvantages to Bank Workers
Some lose their jobs due to computerisation.
Leads to de-skilling where some jobs are taken as redundant, for example clerical
jobs.
Some workers will be transferred
NB: Ergonomics: the design and functionality of the computer environment and includes
furniture setup and how it affect human beings, e.g. ventilation, security, space, noise, etc.
Disadvantages of Computer Aided Design
- Can lead to deskilling (skills which were highly valued are taken to be useless or of less
value by the introduction of computers and workers degraded to less important jobs)
- Involves very high training costs to use the packages
- Can move work overseas
- Can lead to unemployment as one CAD operator can do work of 5 manual draftsmen.
Features to see on a virtual tour website of a hotel being advertised on the internet
- hot spots on web page to allow user to move around the hotel
- plans and maps integrated to allow user to navigate the hotel
- ability to move from room to room to navigate whole hotel
Robotics
- A robot is a reprogrammable, multifunctional computer controlled device designed to
perform multiple tasks in industries, replacing human beings; e.g. for spray painting,
welding, fixing parts of a car, etc.
- Robotics refers to the science of developing and the use of computer controlled devices
to replace human beings in manufacturing.
- Robots can contain embedded processors or be linked to a computer system.
- They are pre-programmed to do a specific task or “taught” to remember instructions from
a human operator carrying out the task manually e.g. teaching a robot to spray a car with
paint.
- Robots rely on processors and sensors. The sensors gather information so that the robot
knows it is the right time to do the task (e.g. is a car in position to be sprayed, is there an
obstruction to prevent the robot doing its task, etc.)
- They are capable of doing some pseudo-intelligent tasks (e.g. different sized cars to be
painted)
- Robots are mostly used (suitable) in the following areas:
In very dangerous areas for human beings to work, e.g. firefighting, nuclear
power stations, underground mining, chemical, nuclear factories, deep in the ocean,
in space, etc.
In areas where heavy items are to be lifted, e.g. for loading containers in ships, in
production lines, etc.
In areas where the degree of accuracy is of utmost importance, e.g.
manufacturing of computer chips. Thus producing standardised goods.
Where work is repeatedly executed and boring, like traffic control at road
junctions
Features (Parts) of a Robot
Robots have the following features (parts/characteristics):
- Actuator (Manipulator): - A moving part which resembles a moving arm used for
lifting and fitting items.
- Transducer: They convert analogue signals to voltage signals.
- Sensors: capture information and data from the environment in analogue form
- Analogue-Digital Converter(ADC):Convert analogues signals to digital signals
- Microprocessor: Processes data collected from sensors
- Power supply: - Usually electricity through compressors or stepper motors.
- Controlling Computers: - Connected through an interface to give instructions to the
robot.
- Have some form of interface (connection points to power supply, human interface, etc.)
Robots can move from one position to another, e.g. when lifting cars into the warehouse
and when going for recharging their batteries.
They keep a record of the distance they have travelled and the angles they have turned
through so that they can return to original position
They can sense (using light sensor) and stop if unwanted object gets on their way.
They need information and programming for them to work. Information is provided by
sensors.
Artificial Intelligence
Artificial Intelligence (AI) is the science of developing computer systems that have the
ability to learn from experience and mimic human reasoning in specific areas, as in medical
diagnosis, mineral prospecting, etc. Expert systems are a branch of Artificial Intelligence.
Expert Systems
These are computer systems developed to mimic human reasoning and work at the level of
an expert in a particular field, e.g. in medical diagnosis. Expert systems are used in the
following fields:
oil or minerals prospecting, diagnosing a person’s illness, Diagnostics (e.g. finding
faults in a car engine, etc.), tax and financial calculations, complex “thinking” tasks
such as chess, weather forecasting, criminology/forensic science, career choices, etc
Components (Elements) of an Expert System
- Knowledge Base: a representation of facts (data) in a particular field (e.g. diseases,
symptoms, treatments, etc. as in medical diagnosis)
- Inference procedure (engine): contains reasoning methods used to arrive at a
conclusion using information in the knowledge base. It contains interrogation
technique/questions and answers.
- User interfaces: these enable people to form queries, provide information, and interact
with the system.
- Explanation facilities (system): enable the systems to explain or justify their
conclusions, and they also enable developers to check on the operation of the system
themselves.
- Rule Base: This is found in the Working Store. It contains inference rules and the
inference engine uses these to draw its conclusions.
The system uses a rule base and an inference engine together to simulate human reasoning
when analysing a problem and arriving at a conclusion. To simulate human processes it is
necessary to have a vast amount of information stored in the knowledge base and the
reasoning set out as a set of rules in the rule base.
Steps Followed When Producing/Creating an Expert System
- Gather information from experts in the field (e.g. doctors, geologists, etc).
- Design the knowledge base.
- Input data into knowledge base.
- Design the rule base.
- Design inference engine
- Design display of results
- Test system with known problems and solutions
- Design appropriate user interface
- Frequently carrying out researches and making updates.
- Quickly inputting new data into the knowledge base.
- Assigning its control to a number of highly experienced personnel who will monitor and
make updates as soon as possible.
Advantages of Expert Systems
- Provides consistent answers
- Fast identification of solutions to problems by quickly analysing data.
- They produce reliable and accurate results if well programed.
- There is no need for an expert to be present since they can act as a prompt to an expert.
- They can deal with complex situations much faster than humans.
- They could be used in hazardous areas (e.g. Oil prospecting).
- They do not forget as humans do.
- Many copies can be made at a low cost.
- Knowledge of several experts is combined.
- Save costs on wages and salaries for staff.
- Conclusions are based on logic, no emotions involved.
- Can explain its reasoning method
Disadvantages of Expert Systems
- They lack creativity/does not reason.
- They are unable to learn outside the system.
- They lack sensory experience.
- They take time and are difficult to develop.
- They need to be constantly updated to keep pace with recent developments in the field
they are applied.
- This may be difficult and time consuming to use.
- Data is entered by humans who may make mistakes in doing so. This can lead to
incorrect decisions being made
- lacks common sense in some of the decision making processes
- cannot adapt to changing environments unless the knowledge base is continually
updated
- Errors in knowledge base can lead to incorrect decisions.
- expensive system to develop and set up in the first place
- needs considerable training to ensure system used correctly by operators
- Leads to deskilling and unemployment.
- They are usually dedicated to one domain area (for just one task)
Output
- Possible mineral deposits that can be found in that area
- Geological maps
Data Logging
The automatic collection of data from source at set intervals, over a period of time, for
use at a later stage, using sensors. A device that automatically collects data from source
at set intervals for use at a later stage is called a data logger.
Monitoring System:
A computer program that keeps track and verifies the operations of a data-processing system
and warn the user if an anomaly occurs, e.g. patient monitoring in hospital, monitoring key
parameters in chemical and nuclear plants, monitoring for intruders in houses using burglar
alarms, etc. In monitoring, there is human intervention. In a monitoring system:
- computer system takes information from the sensors
- data from sensors is converted to digital form using the ADC
- processor compares the data from sensors with stored values (parameters)
- system informs the user of status either by read outs
- if values are within acceptable parameters, nothing is done and monitoring
continues
- If values are outside acceptable parameters, the system warns or alarms if values are
outside set parameters.
- can update files but no changes to the process are done during monitoring
- Sensors read data from the river (Oxygen level, acidity level, using the pH sensor)
- Data from sensors is converted to digital form
- Computer stores received data
- Oxygen and acidity levels from sensors are compared with historically stored (pre-
set values/parameters)
- Either data can be transferred to CD/DVD/Memory stick for later analysis OR
- Data is send to the monitoring station directly through mobile phone network or
through cables.
- Red colour is displayed on screen if values are outside acceptable level or an alarm
is sound.
These systems are designed to monitor critically ill patients or premature babies. Some
biosensors connected to the computer are attached to the patient for tracking and recording
vital signs such as heart beat, blood pressure and brain activity. The biosensors will transmit
readings to the central computer should the situation go beyond a critical warning level and:
- issue a warning on the computer display for nurses on standby
- sound a warning siren, alarm, beep or sound to alert medical staff
- flash a light to draw attention of medical staff
Patients in intensive care are monitored through sensors. The sensors measure and give
feedback pertaining to: blood pressure, temperature level, weight, pulse rate, etc.
The computer is pre-set with normal range of values. It compares these with feedback from
sensors.
Computers record patients’ medical data over some time for later analysis. Data recorded
includes:
- Taking measurements on patients, for instance: blood pressure, temperature level,
weight, pulse rate etc. This relieves nurses of some duties that will be boring, making
them faster and more reliable.
- There are however some hospital tasks that are more suitable for human beings to
perform than computers. These include dressing patients, bathing patients, etc.
NB: In chemical and nuclear plants, there is often a combination of monitoring and control
taking place. Information from sensors is often displayed on a control panel where operators
can see key values and alarm conditions (e.g. if a system monitors temperatures and 110 0C
is the normal temperature and 1200C is the alarm temperature, the control panel will show
normal, present and alarm values in the form of read outs – either the computer will
automatically take action if necessary or the operator will take action (override the system if
necessary)
Signals are changed from digital to analogue so as to control heaters and valves
- This continues as long as the computer is activated.
Control in Greenhouses
- The environment must be kept constant if plants are to grow successfully in
greenhouses.
- Temperature and humidity in the air needs to be controlled so that it is kept constant
- Sensors are used to record humidity and temperature levels in analogue form. The
analogue signals are sent to the computer
- The computer will have stored (pre-set) values of minimum acceptable level and
maximum acceptable level for both temperature and humidity
- If the sensor records humidity level below the minimum acceptable level, the computer
will send signal to the actuator to close the windows and switch on the pump for a certain
period of time, which will spray water as a fine mist inside the greenhouse.
- Too much humidity will cause the processor to send signals to the actuator to open
windows to assist ventilation and drying out air.
- In case of temperature, if the greenhouse becomes too hot, the windows are opened and
heater turned off. If it becomes too cold, windows are closed and heater switched on.
Inputs:
- Humidity/moisture (collected from humidity/moisture sensor),
- Temperature (all in analogue form; collected from temperature
sensor)
Processing:
- detecting temperature/humidity level
- Processors compares pre-set values in the computer with data collected from
sensors
- Processor instructs actuator to take action if values exceed or are less than
minimum/maximum pre-set values
Outputs:
- Windows open or closed (digital form)
- Heater on or off (digital)
- Pump for water supply on or off (digital)
In case of an emergency, the computerised traffic system may perform any one of the
following:
- Give uninterrupted path through the system of linked traffic lights.
- Give green link – wave for all traffic to pass.
- Turn all lights to red.
- Activate emergency generator.
- Sound an alarm.
Microprocessor-Controlled Streetlights
Input:
- Pre-set values of Sunset time and Sunrise time
- Light level (Light sensor sends measurement of light to microprocessor, ADC
converts this to digital)
Processing:
- Processor compares sunrise time, sunset time and current time.
- If sunrise time = current time or higher, the processor send signal to actuator so that
it switches off lights, else,
- If signal equals sun set time, the processor send signal to actuator so that it switches
on light.
- Also the amount of light is compared with pre-set value. If higher – nothing happens,
if lower or equal sends signal to send signal to actuator so that it switches on the
streetlights.
Output:
Lights switched on or off
Automated Systems
- These are control systems that are dedicated to one particular task and lack the ability to
collect and analyse data as in digital cameras.
- They do not allow for or act on user interaction, e.g. washing machines, cameras,
watches.
- Most control systems have embedded computers systems inside them.
Refrigerators
Inputs:
- temperature level (from temperature sensor/ or entered manually through the
number pad),
- Pressure (from pressure sensor/contact switch/push switch) ,
- push switch setting
- Analogue data from sensors is converted to digital by the ADC
- Processor controls temperature level by comparing with pre-set values.
- If temperature is higher than pre-set value, the processor sends signal to motor to
switch on compressor
- If not higher, the compressor is switched off by the actuator
Processing
- Processor controls the display panel.
- Processor sends signals to display panel and to the motor to switch lights on or off.
Outputs
- Switch on lights if door is opened and off when closed
- Light emitting diodes indicating current temperature of the inside of refrigerator.
- A warning buzzer (sound) if light is left open.
- Cold temperature
Air Conditioners
Inputs:
- Pre-set temperature level
- Temperature from temperature sensors
- Pressure from pressure sensors: monitors pressure of refrigerant
Processing
- Processor controls temperature.
- Processor sends signal to motor to change fan speed
- If temperature is below pre-set value, the processor gives motor signal so that it
switches off fans
- If temperature is above pre-set value, the processor gives motor signal so that it
switches on fans
- Processor controls timing and the display panel
- Cool temperatures in the room
- Fans switched off or on depending on the situation
Digital Camera:
Input:
- Light mode( night or day mode)
- Film speed
- Colour setting
Processing
- Processor sends signal to automatically adjust film speed,
- Processor positions the end of film,
- Processor sends signal to adjust distance from object,
- Processor sends signal to adjusts light.
- sensors are placed in weather balloons and/or weather stations
- information is also got from satellites
- pilots also send in information regarding weather conditions during long flights
- The data collected by the data loggers will be in analogue form and the ADC device
converts this to discrete values (digital) for the computer to accept.
- Processor sends signal to save image on the memory card
Output
- Sound to indicate that the film/picture has been taken
- Image/film captured and stored
- Light flashed to indicate film/picture is taken
-
How the simulation is done
- Data and information from the sensors/satellites is sent to computer for processing
- This data is compared to information stored on files which contain known weather
patterns from the past
- predictions are made based on these comparisons
- Calculations are made to produce expected minimum and maximum temperatures,
pressure, moisture content, rainfall patterns, etc
- The computer produces weather maps showing isobars, temperatures, etc.
- computer can show graphically how weather (e.g. cloud formations) will change with
time (i.e. predict weather patterns) – this is often presented as a computer generated
video showing how clouds build up, how temperature and pressure changes over, for
example, the next 7 days, wind speeds etc.
- It is also possible to do statistical analysis and predict the percentage probability
that certain weather conditions will occur.
Speed Cameras
These are used on roads to take photographs of cars which have exceeded the speed limit.
Some of these cameras use microprocessor controlled chips to store information.
The advantages of speed cameras with microprocessor controlled chips are
that:
- Data and images can be transferred automatically which will be faster.
- Image can be viewed straight away.
- Can store considerably more data and photos.
- Can store other information (apart from photo image) e.g. road conditions.
- Chips can be re-used.
- Maximum speed (speed limits)
- Road condition
Processing:
Tasks which would be carried out by the microprocessor as a speeding car
approaches a camera include:
- Sense and record speed of vehicle.
- Compare speed of vehicle with stored value(s) and decide whether photograph
should be taken.
- Check on value of light intensity.
- Adjust focal length, focus image, adjust shutter speed and set exposure.
Tasks which would be carried out by the microprocessor as the photograph is being
taken include:
- Log the time
- Log the date.
- Log the speed.
- Record the road conditions.
- Operate ―flash.
- Operate shutter.
- Instructs storage of the image.
- Check on value of light intensity.
- Adjust focal length and focus image.
Outputs
- Video/pictures of cars captured
- Alarms of over-speeding cars
Microwave Cookers
Function by switching a microwave unit on for a sufficient time to either defreeze frozen
food or cook it. It is used to cook food quickly by using waves (similar to radio waves) to
heat the food.
Inputs:
Modern cookers have sensors attached to a microprocessor for detecting as inputs:
Weight of food
Temperature of food
Some cookers will also have additional sensors for detecting:
Amount of steam produced during cooking
- Amount of alcohol
produced
Processing:
- The microprocessor continually monitors sensor readings and by referring to a
programmed in-built database of food types.
- The microprocessor determines time needed to cook or defreeze food.
- IF a temperature in the food indicates the food is cooked OR the time set on the
oven clock is reached THEN microwaves are not produced
Output:
Heat for cooking, Light indicating that food is cooked, power turned off if food is cooked.
Feedback: The process in which output of a system can affect its own output. It is whereby
part of the output of a system is returned to its input in order to regulate its further output.
Simulation
Simulation is the study of the behavior of a system using models in order to predict future
real life events, like population growth, flight simulator, etc. It involves feeding values into
a model to see how the model behaves.
In simulation, past and present data, as well as models are analyzed in order to predict the
future. Simulation is used in the following areas:
Training (e.g. pilots, drivers, medical doctors, etc.), running/testing chemical plants
and nuclear plants, trying out equipment to be used under sea or in outer space, crash
testing cars, financial simulations (e.g. stock market predictions based on various
scenarios), population growth (i.e. predict how the world’s population will increase
based on a number of different scenarios), queues (e.g. simulating queues at
supermarket checkouts), weather forecasting
Advantages of simulation
- saves cost (rather than doing the real thing)
- safer (scenarios tried out on the simulation first before used in reality)
- possible to try out various scenarios in advance
- Some environments make simulations the only way to carry out a task beforehand
(e.g. outer space, under sea, chemical processes, nuclear reactors, etc.)
- faster (no need to build and test real system, so it is possible to get results more
quickly)
Flight Simulator
- Flight simulators are used to train pilots how to fly aircraft.
- They can also be used to test new aircraft before they are actually flown for the first
time.
- Flight simulators are expensive to buy but are much cheaper than actual aircraft.
A landing simulation with ice on the runway, thick fog and only one of the four engines
working would really test the pilot’s ability
Flight simulators enable pilots to experience turbulence, snowstorms, thunderstorms, fog,
etc, without leaving the ground.
- GPS systems are used to determine the exact location of a car, airplane, ship or any form
of transport which travels from one place to another.
- In vehicles these systems are called Satellite Navigation Systems (sat nav).
- Satellites in outer space transmit signals to the Earth.
- Computers in vehicles (e.g. car, airplane or ship) receive and interpret these signals.
- Positioning depends on very accurate timing – atomic clocks are used because of their
accuracy to within a fraction of a second per day.
- Each satellite transmits data indicating its position and time.
- The computer in the vehicle calculates its location based on the information from at least
three satellites as shown below:
THE INTERNET
Internet stands for INTERnational NETwork and it is a global (world-wide) connection of
computer networks for information sharing. On the internet, one is able to access data stored
on a server in any part of the world as long as it is connected to the internet itself. The internet
can be accessed from anywhere. It is also available to anyone. No one controls the internet
as computers in different countries are connected yet the countries have different laws.
However, each country may regulate internet usage in its own territory.
Definition of Terms
Information Superhighway (ISH): A global network of computers for moving huge
amounts of information via satellite and cable connection. Information found on ISH
includes home shopping, entertainment, news, software downloads and help, online banking,
stock market dealing, jobs, (vacancies), university placements, etc.
Information Technology (IT): - The use of computers in information handling and
communication.
Information Age: A period beginning in the last quarter of the 20th century when
information became easily accessible through publications and through the manipulation of
information by computers and computer networks.
Global Village: the use of the internet to access information from any part of the world.
Information and Communication Technology (ICT): The use of computers and related
method as a tool for information communication, for instance through e-mails, cell phones,
etc.
Web page: an HTML document or page on the internet that contains information about an
organisation.
Website:-a collection of HTML documents at the same domain, often with a common name
and maintained and provide information of a single organisation and is found on the internet.
It is an HTML page/pages on the internet that contains information about an organisation
Hyperlink: - an area of a web page, usually text or image that contains a links to another
web page. It is usually underlined or has a different colour to show that it can link the user
to another site.
Home page: A web page that loads first (by default) when one logs on to the internet. It then
provides links to other sites on the internet. It is also a web page that appears first when you
log on to a website.
URL: Uniform Resource Locator: This is a unique address that identifies a website/page on
the internet, e.g. http://www.econet.co.zw. This only identifies one (unique) web page for
Econet Wireless which is found in Zimbabwe (.zw). Thus a URL is a unique address for each
web page. A typical URL looks like:
http://www.google.co.zw/computing/student.html.
- "http" (HyperText Transfer Protocol) and a domain name (such as.”co.uk"). Other
domain names are as follows:
.zw Zimbabwe
.za South Africa
.zm Zambia
.bw Botswana, etc
Website features
The following are the general features of a good website
- shopping basket
- offer security when using credit/debit cards
- search facility for artist, tile, item, etc
- drop down boxes to choose categories
- help facilities
- currency converters for international customers
- date/sales confirmation by automatic email
- saved customer details/customised pages
- ability to track status of orders
- ability to listen to/view/see video/see product, etc
- recognise customer as soon as they log on
- buttons to navigate to other web pages
When designing web pages it is necessary to supply the correct spacing for customer
information (and/or use drop down menus), buttons to navigate to other web pages, etc
(c) Network operating system: manages the network and offers security to internet users.
NB: internet account: a unique personal identifier given by the Internet Service Provider
(ISP). An ISP is an organisation that links users to the internet, for example, Mweb, Ecoweb,
Africaonline, Yahoo, Google Inc, etc.
- accidental - Accidental damage to data can be prevented by: keeping back-up files
damage to data or use the Grandfather-Father-Son (GFS) method;
- use of passwords and ids can also help by restricting access in the first
place
- protection against hardware faults could be through keeping back-ups
- hardware faults or use Grandfather-Father-Son;
- use of UPS (Uninterruptible Power Supply), in case of power loss
- Running parallel systems also help
- software faults - Software faults can be solved by keeping back-up files or
- incorrect - Can also be solved by using Grandfather-Father-Son would help
computer - Incorrect computer operation can be solved by: backing up files would
operation guard against problems caused by incorrect shutting down of the
system
NB: Note
- Viruses do not only infect computers, they can also affect mobile phones, MP3
players etc. – any device which can download files from a source such as the internet
is potentially at risk.
- Backing up may allow files that have become lost/corrupted (due to hacking or
viruses) to be reinstated; however, this would not recover the system nor would it
prevent hacking/viruses affecting a system in the first place.
- Problems like spam, pop-ups, cookies, etc. are more of a nuisance (they can also slow
down the operation of a computer). These can however be blocked (or made
Inactive) by using suitable software.
When using the Internet, security can be enhanced using encryption.
Credit and debit card transactions can also be protected by a special type of password control.
For example, if a user chooses the password COMPUTE34 to protect their credit card, when
they buy something over the internet the card issuer will ask the user an additional question
such as: “Please type in the 2 , 4 and 7 character of your password in the following boxes:
□□□“
The user will then type in O P E and the card purchase will be authorised. This additional
protection is used as well as encryption.
Some of the new systems allows user slots the card into the side of the keyboard and is
required to type in a PIN before the Internet can be accessed. This gives an additional level
of security since it is necessary to have the card, know the PIN associated with the card AND
also know the user’s log in id and password!!!
However, despite the increase in the use of e-mail, there has been a sharp increase in the
amount of paper used. This is because:
People print copies for meetings and then destroy them afterwards, but if needed
again, print out another copy.
Some people find it difficult reading large amounts of text on the screen.
People often e-mail colleagues rather than use the phone who then print out the
document.
2. Teleconferencing: A method of conducting discussion with several people in different
locations using the telephone.
3. Video conferencing: Conducting meetings with several people in different locations and
seeing each other on the screen of networked computers. Video images and audio are
seen/heard in real time on large monitors/through speakers. Delegates do not need to leave
their homes or work places or conference rooms. Video conferencing requires the following:
A computer with a codec (which converts and compresses analogue data into digital
data for sending down digital lines.)
Video cameras or Webcam to take video images
Microphone to speak through.
Loud Speakers for delegates’ voices to be heard.
Large and high resolution monitor.
Internet/WAN/modem to transmit data
An integrated Services Digital Network (ISDN) line with a high bandwidth to
transmit video data at fast speed.
Sound card.
Video card
Compression software to compress video and sound
which converts and compresses analogue data into digital data for sending down
digital lines
requirement for echo cancellation software (this allows talking in real time and
keeps communications synchronised)
Information on the database is provided by companies that advertise their products like
news, weather reports, and so on. View data systems have the following advantages:
they are interactive and
service is provided for free to the public.
However, its requirements are expensive.
5. Teletext: It is a broadcast service that comes as a television transmission. It is cheaper
than the internet service. However, it is non-interactive.
6. Facsimile (Fax): A method whereby output from a scanned document is send over
telephone line and reproduce on a fax machine on the receiving end. Fax method has the
following advantages:
It is very cheap to send messages.
It is very easy to use.
It is a very fast method of sending messages.
NB: The use of fax, e-mail, view data, teletext, teleconferencing and video conferencing in
an office brings about an electronic (paperless) office.
- An electronic office is an office in which the storage and processing of data as well as
communication are done electronically.
- An electronic office is efficient because:
Communication is easier and faster.
Less paperwork is involved.
Current and up-to-date information is provided.
Ensures a clean office environment.
7. File Transfer: allows users to transfer files from host computers on the internet to their
personal computers.
8. News groups: a global electronic bulletin board system in which users exchange
information on different topics.
9. Entertainment: the internet provides an option for users to download and listen to
music, newspapers, radio stations, etc.
10. Internet Shopping: (Internet buying, electronic commerce, online shopping): The
internet provides a facility for customers to purchase products from the internet without
visiting shops. Credit cards are used in internet buying.
Advantages of buying from the internet
(a) To the customers
- Programs are available to search for the cheapest products on offer.
- Customers have more time to choose.
- Shopping is done any time of the day, thus providing a 24 hour service.
- A wide choice of products is available.
- Shopping can be done by setting up a file.
- It is very convenient to use as customers do not leave their homes for shopping.
- It cut travelling costs to the shops.
- Customers do shopping without being jostled by crowds.
- There are less cases of impulse buying.
- Product reviews are obtainable before purchase.
- Goods and services usually cheaper on the internet.
- Customer need not to go to shop and therefore save travelling time.
- More convenient to pay bills, mortgage loans, gas, phone and electricity bills
since these are paid automatically.
- Customers no longer need to carry large sums of money thereby reducing cases
of robbery.
- Customers no longer need to queue on banks to get cash.
- Credit is normally given only to those who are working and have a steady source
of income.
- People will spend more than they can afford thereby getting into debt.
- Wrong information about individuals is kept as more information about people is
kept in computers for their credit rating.
- It is difficult for individuals to track how much they spent.
Intranet
- Intranet stands for INTernal Restricted Access NETwork.
- Intranet refers to a restricted private organisation’s network that uses the same
protocols as internet for the benefits of such an organisation.
- An intranet is a computer network based on internet technology that is designed
to meet the internal needs for sharing information within a single
organisation/company
- Intranet requires password entry.
- Intranet is protected by a firewall.
- Intranet only gives local information relevant to the company/organisation
- It is possible to block access to certain sites using the intranet, e.g Facebook.
- it is not always necessary to have external modems when using intranets
- information for use on intranets is stored on local servers
Many companies use intranets as well as the internet for the following reasons:
- it is safer since there is less chance of external hacking or viruses
- it is possible to prevent employees from accessing unwanted web sites
- companies can ensure that the information available is specific to their needs only
- it is easier to keep “sensitive” messages to remain within the company only
Internet Intranet
the INTERNET is INTERnational NETwork an INTRANET is INTernal Restricted Access
NETwork
Internet gives all information including that the intranet only gives local information
which is not relevant to the organisation relevant to the company/organisation
Always need external modems for internet it is not always necessary to have external
connections modems when using intranets
Information on internet saved in different information for use on intranets is stored on
computers local servers
the internet can be accessed from anywhere Intranet is accessed within the range of the
organisation’s network
the internet is available to anyone without whereas the intranet requires password entry
password restriction
Wireless Communication:
This is a method of networking (linking) computers and computer devices without the
use of cabling (wires), e.g. using Bluetooth, radio, satellite, infra-red, microwave, etc.
The devices that can be used in wireless technology include:
- Mobile phones /cell phone/remote key pad/remote control/ remote keyboard.
- Infra-red mouse.
- Multimedia mobile handsets and notebooks.
- GPRS (General Packet Radio Service) modems.
- Wireless LAN(or Wi-Fi –Wireless Fidelity: A local area network that uses high
frequency radio signals to transmit and receive data over distances of a few
hundred feet; uses Ethernet protocol).
- PDAs (personal digital assistants).
Most areas in the world now offer broadband rather than dial up for connecting to the
internet. The advantages of broadband over dial up include:
- the system is always “on”-no need to dial into ISP every time you want access
- the connection rate/data transfer rate is much higher (for example broadband operates
at 11 000 kbps compared to the dial up rate of 60 kbps)
- there is a flat monthly rate with broadband (dial up is charged per hour of usage)
- it is possible to use the telephone at the same as the internet with broadband/the line
isn’t tied up
- broadband permits other facilities such as “skype”
- Wireless technology (Wi-Fi) allows connection of a computer to the Internet without the
need for connecting cables. A router (containing a modem and external aerial) is
connected to a telephone line and it is then possible for any computer within range to
communicate with the router and allow Internet access – the link between computer and
router is completely wireless. The main advantage of doing this is clearly the portability
(i.e. can go anywhere within range since no wires are needed).
Disadvantages of Wireless Technology
- Wireless LAN speeds are slower than Net access at work due to narrow bandwidth.
- Anyone within the Wireless LAN nodes range with an appropriate device can use your
Wireless LAN and broad band link.
- Anyone who walks past your house or WLAN linked into a corporate system can
access sensitive information like credit card details.
- 3G phones are not compatible with 2G phones.
- Signals can be blocked, distorted or will be weak.
- Can lead to health problems from microwaves
- The range can be very limited, e.g. using Bluetooth.
- possible interference from nearby electronic devices
- security issues (i.e. tapping illegally into Wi-Fi networks) is very common
- access speed/transfer rate is often slower using wireless systems
It isn’t just computers that can be linked without wires, various peripheral devices can be
linked to a computer system without the need for a physical, wired connection. For example:
Printers, Keyboards, Mouse, Digital cameras, etc
Computers in Entertainment
Music
Computers are now used for playing and composing music. Computer hardware and software
advances have changed how music is generated and produced. Software used includes Fruit
Loops, Virtual DJ, etc.
Musical instruments can be connected to a MIDI (Musical Instrument Digital Interface).
MIDI is a type of serial interface built into a piece of electrical equipment so that it can
communicate with the computer. It also converts output signals from the instrument, e.g.
guitar, into digital form.
Some of the key reasons for the widespread development of music using computers are:
- the recording process for music is faster
- there is no need for tapes during the recording process
- It is easier to remove or add sounds to a track.
- Sampling of sounds is very easy
- actual musical notes can be generated from the music itself by software
- music samplers and mixers give an almost limitless ability to alter the original
tracks recorded in a studio
- don’t need to understand music notation to write a musical score
- electric instruments (such as guitars and organs) play back through electronic
machines
- synthesisers combine simple wave forms to produce more complex sounds
- electric organs can now mimic almost any instrument (including a full orchestra)
- automatic rhythm
- music notes automatically printed out in the correct format
- There are many other software and hardware developments; the above is just a
summary of the more common elements.
- A performance can be directly recorded onto the computer and stored in a MIDI
file, which can be edited later.
- Synthesisers are also used to generate notes and desired sounds from pre-recorded
electrical signals. These signals can be combined with signals from conventional
Instruments and recorded to produce songs.
Music can be compressed to produce MP3 (motion picture expert) format.
Music can be played using software like Microsoft Windows Media Player, JetAudio, Nero
Show Time, Real Player, etc.
Animation/Cartoons in Films and Video/Television
Computer Graphics
These are computer generated images designed by graphic artists for producing logos, news
inserts, cartoons, animations, etc. The artists use graphic software like Microsoft Paint. 3-D
images can also be produced using graphics packages.
Image processing: The images can be darkened, sharpened, changed colour, cropped, etc.
Animation
- Animation consists of displaying a rapid succession of 2-D or 3-D graphics arrangements
to create the illusion of movement. It is used for web presentations and advertisements
and for film.
- Computer animation is the art of creating moving images via computer hardware and
software.
- Sounds can be added to the animation to produce advertisements, cartoons and films.
- Computers with large hard disk and powerful processors are needed, as well as high
resolution monitors
- Special effects in many modern films (televisions) all use computer animation to
produce fantasy worlds.
The POS terminals can also be connected to the main server in banks like CABS, Barclays,
etc. This enables customers to purchase goods electronically without the burden of carrying
cash around. This is called Electronic Funds Transfer at Point of Sale (EFTPOS).
Customers can also be given cash back at the EFTPOS after purchasing goods using debit
cards.
After purchasing the goods, a receipt is produced. The receipt will have the following details:
- Date of purchase, time purchased, shop attendant, item (s) bought, quantity bought,
unit price, total price, amount tendered, change, cashier name, etc.
Advantages of Electronic POS terminal to supermarket workers
- no need to remember (memorise) price of goods
- their work load is reduced
- ensures accurate calculation of customer change
- ensures better working environment which means less stress
- fast means of entering data which is less manual
Advantages of Electronic POS terminal to customers
- customers are served quickly
- customers are assured that their change is correctly calculated
- customers can get cash back if the POS is linked to banks
- no need for customers to carry cash around once the system is linked to banks
thereby reduces theft of their cash
Advantages of Electronic POS terminal to supermarket managers
- It is automatic and more accurate to control stock.
- Automatic updating of stock file is ensured.
- Automatic reordering of stock items is involved.
- Less staff and wages needed.
- Sales statistics are always available.
- Faster throughput is ensured.
- Itemised receipts are produced quickly.
- The system records every transaction.
- The system records staff work rates.
- Less pilfering by staff as it is easier to identify pilfering.
- Fewer errors are produced. Faster calculations are made.
- There is no need to remember prices of goods.
- Manager is freed from the task of manually counting the stock items and placing
some orders.
NB. The system updates the master file when an item is sold. It first searches the master file.
Using the barcode number (or product code) it decrease the number in stock and increase the
quantity sold
*NB: POS –Point of Sale terminal: the point where customers pay for goods purchased in
shops, either by cash or otherwise.
Difference between Electronic Point Of Sale (EPOS) and Electronic Funds Transfer at
Point Of Sale (EFTPOS).
EPOS terminal only involves scanning of goods electronically by use of barcodes and by
keyboard entry. EFTPOS involves electronic scanning of goods at point of sale by use of
scanners and barcodes (and use of keyboard) and has an added feature of allowing customers
to transfer money from one account to another, usually to the account of the shop where the
goods are being bought. Customers can also get cash-back at the EFTPOS terminal in shops.
LOGIC GATES
- A logic gate is a device that produces signals of 1 or 0 when the input logic requirements
are met and are used in manipulating binary information.
- Logic gates are the building blocks of digital technology. A logic gate is a device (or
electrical circuit) that performs one or more logical operations on one or more input
signals. Its output represent Boolean (T or F) or binary values (1 or 0) as voltages.
- They can be used in applications like:
Building computer chips, Programming traffic signals, Chips for automatic
alarm systems, Chips for automated control systems, etc
- Electronic circuits operate using binary logic gates.
- Logic gates process signals which represent TRUE or FALSE, ON or OFF , 1 or 0
A truth table is a table which shows how a logic circuit's output responds to various
combinations of the inputs, using logic 1 for true and logic 0 for false.
A truth table is a table that describes the behavior of a logic gate.
It lists the value of the output for every possible combination of the inputs
Truth tables contains 1s and 0s and are an integral part of logic gates functionality.
Truth table and logic gates use the following:
- 1 (True, ON, Not False)
- 0 (False, OFF, Not True)
The number of rows in a truth table shows the number of combinations of the inputs of a
particular circuit. The number of rows for each gate is found using the following
formulae: rows = 2n , n being the number of inputs in the gate or circuit. For example, a
gate or circuit has the following rows corresponding to the number of input (excluding
column headings):
- 1 input = 21 = 2 rows
- 2 inputs = 22 = 4 rows
- 3 inputs = 23 = 8 rows
- …..
Graphical Representation of Gates and their Truth Tables
Each logic gate has its own unique graphical representation, which can be in general form
or in standard form.
(1) General form
Each logic gate has a circle and the name of the gate to differentiate it from the rest
as given below:
The name inside the gate gives us the type of the gate
(a) OR gate
This represents two inputs entering the gate and one output from the gate. The inputs
can be represented by any alphabetic characters, e.g. A and B, while the output can
be X, given as follows:
Logic Gate Diagram Truth table
The output (X) is only true if the INPUT A AND INPUT B are both true. If any
one of the inputs is 0, then the output becomes 0 also. Thus X = A AND B.
The NOT gate has only one input and one output. The input is negated. Thus if input
is 1, output is 0, and vice versa.
This is an AND gate with the output X inverted. The output is true if INPUT A AND INPUT
B are NOT both True. It translates to NOT (A and B)
Boolean Expressions
Boolean Expressions are equivalent expressions of the logic state of gates. For example, the
Boolean expression for:
a NOT gate with input A and output C: C = NOT A
NAND and NOR gates are known as universal gates because they are inexpensive to
manufacture and any Boolean function (AND, OR, NOT) can be constructed using only
NAND or only NOR gates. Even NAND and NOR gates can be used as each other’s
alternatives in a circuit.
Draw a logic network and truth table to show all the possible situations when the stop signal
could be received.
Answer
Step 1: Deduce and Write the logic statement
- The first statement can be re-written as: (L = 1 AND V = NOT 1) since Length > 100
metres corresponds to a binary value of 1 and Velocity <=10 m/s corresponds to a binary
value of 0 (i.e. NOT 1).
- The second statement can be written as (T = NOT 1 AND V = 1)
- Both these statements are joined together by OR which gives us the logic statement: if
(L = 1 AND V = NOT 1) OR (T = NOT 1 AND V = 1) then S = 1
- The above statement can be written as: S = 1 if (L = 1 AND V = NOT 1) OR (T = NOT
1 AND V = 1)
NB: One should first of all write the following logic statement before coming up with a
truth table or logic circuit as this has some marks awarded to it., i.e.
S = 1 if (L = 1 AND V = NOT 1) OR (T = NOT 1 AND V = 1)
Step 2: Logic Circuit
- Using the logic statement above, one can now draw the logic circuit as given below:
Questions
1. A computer will only operate if three switches P, S and T are correctly set. An output
signal (X = 1) will occur if R and S are both ON or if R is OFF and S and T are ON. Design
a logic network and draw the truth table for this network.
3. A chemical plant gives out a warning signal (W = 1) when the process goes wrong. A
logic network is used to provide input and to decide whether or not W = 1
4. A power station has a safety system based on three inputs to a logic network. A warning
signal (S = 1) is produced when certain conditions occur based on these 3 inputs:
Draw a logic network and truth table to show all the possible situations when the warning
signal could be received.
5. Draw a circuit diagram for δ = (xy' + x'y)z
6. Device a suitable Boolean expression and truth table for the circuit below:
8. a. Simplify the following logic equations by using the rules of Boolean algebra.
a. A • C + A • B • C
b. (A + B) • (B + Ā)
c. A • (Ā + C) + C
b. For each of the previous questions, create a circuit for the Boolean expression before
simplification.
COMPUTER NETWORKS
Definition of Terms
Network: A connection of computers for them to share data, files and resources like a
printer.
Advantages of Networking
- Expensive peripherals like printers and scanners can be shared between users.
- Messages can be sent easily and faster between users whether on WAN or LAN.
- Avoids duplication of information as users can access the same file on the network.
- Network software can be purchased cheaply than buying individual packages for each
computer.
- It is possible to access data or programs from any terminal or workstation.
- Data and programs can be stored centrally making it easier to maintain and backup.
- Users can be easily prevented from accessing files not intended for them.
- Allows sharing of files, software and data held in computers.
- Allows emails to be send between users.
Disadvantages of Networking
- Sophisticated equipment is needed, which may be expensive to buy.
- Security of data can be a problem due to hacking.
- Wiring can be expensive both to buy and to install; wiring can be sunk on the ground to
avoid trailing cables.
- If a server breaks down, the whole network becomes unusable.
- Networks need experienced network managers, who will be highly paid to keep the
network running.
Types of Networks
- Computer networks are grouped into Local Area Networks (LAN) and Wide Area
Networks (WAN).
- However we also have WLAN (Wireless Local Area Networks), MAN (Metropolitan
Area Networks) and PAN (Personal Area Networks); and these are described below.
1. Local Area Networks (LAN)
This is the connection of computers over a very small geographical area, like in a single
room, for user to share files, data, software and hardware like printers. Other LANs can link
different departments (e.g. Sales, Accounts, Warehousing, Dispatch, etc) within an
organisation’s complex. A LAN is usually owned by one organisation. However, if an
organisation uses internet service within its restricted private Local Area Network, such a
network is called an Intranet (private network).
NB: Intranet is a private organisation’s network that uses internet technologies for the
benefits of such an organisation.
Extranet: an extension of the intranet giving authorized outsiders controlled/limited access
to the intranet.
A PAN enables user to transfer files from a laptop to a PDA, camera or Personal Computer.
1. Ring Network:
- Computers are connected together to form a circle and uses a token when transferring
data.
- Data/information travels in one direction only.
- Information moves around the ring in sequence from its source to its destination.
- As data passes from one computer to another in the ring, each computer removes any
data relevant to itself and adds any data it wishes to send.
Advantages of Ring Network
- Data processing is faster as each computer processes its own processor.
- Has very high data transfer rates.
- Uses a token to avoid data collision or loss
- it is possible to create large networks using this topology
- If one computer breaks down, others will remain working as they have their own
processors and storage facilities.
- Performs better than star network when traffic is very heavy.
Disadvantages
- If one computer breaks down, the whole network is disrupted.
- a faulty connection between two stations can cause network failure
- Its requirements are expensive, that is buying several computers with processors and
storage facilities.
- It is difficult to link the computers together.
- Difficult to add another computer without disrupting the networking.
- Only the computer with the token is allowed to send data at a given time. One may not
send data when another node (computer) is still sending its own data.
- System is less secure as token together with data has to pass through other nodes that do
not concern it.
2. Star Network:
Computers form a star shape with host computer at the centre.
The Server (host computer) manages all other computers/terminals on the network.
If the terminals are not intelligent, they have to rely on the host computer for everything.
This network is as shown below:
3. Mesh Network
- A network in which each computer serves as a relay point for directly sending
information to any other computer on the network.
- No central device oversees a mesh network, and no set route is used to pass data back
and forth between computers.
- Thus, if any one computer is damaged or temporarily unavailable, information is
dynamically rerouted to other computers—a process known as self-healing
Definition of Terms
(a) Bus/Backbone: the dedicated and main cable that connects all workstations and other
computer devices like printers.
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing noise
and prevents data from getting lost.
Advantages of Bus network
- If one workstation breaks down, others will remain functional. -
If one workstation breaks down, the network remains working. -
All computers have processing and storage capabilities.
- It is cheap to install due to less cabling.
- Easy to add workstation without disrupting the network.
- Requires less cabling than a star network.
- Less expensive network than the other systems
Disadvantages of Bus Network
- Computers cannot send data at the same time nor while there is data being transferred in
the bus.
- Can cause collision of data during transmission. -
It is slow in transferring data.
- Its requirements are expensive, that is computers with their own processors and storage
facilities.
- The system will be down if the main cable (bus) is disrupted at any point.
- Less secure.
- Performance worsens as new stations added
Peer-to-Peer Networks
- A peer-to-peer network is the one which does not have a server.
- All computers have an equal status.
- Each workstation can use resources from any other workstation and communicate
directly with every other node on the network without using a server.
- Used when users do their own work and share data.
- Storage facilities are distributed throughout the network
- It can be difficult to remember which files are located in which computer
- Each computer has its own software
- Less expensive
- Less difficult to administer
- Appropriate for small businesses
- Security is not centralised
- Backup is a responsibility of individual computer user
- Cheap to use
- No need for special network operating system
Diagrams:
Network Protocols
A protocol is a set of rules that governs how communication between two devices will occur.
Such devices might be computers themselves, between modems.
A network communication protocol: a standard method for transmitting data from one
computer to another across a network. Some of the protocols that we are going to look at are:
i. TCP/IP (Transmission Control Protocol Internet
Protocol) TCP: It ensures that data is transmitted accurately
IP: It ensures that data is transmitted to its correct address (IP address). Every device
on the internet has its IP address. It also ensures that packets are rearranged to the
original message on arrival of their destination.
ii. HTTP (HyperText Transfer Protocol)
This is a protocol that defines the process of identifying, requesting and transferring
multimedia web pages over the internet. It is used for transferring data across the
internet, usually between servers and computers on the internet. It is based on the
client –server relationship. It uses TCP/IP to transmit data and messages
iii. FTP (File Transfer Protocol)
It is a protocol used to transfer data from one computer to another. It is often used to
download software from the internet, and it uses the TCP/IP protocol in doing this.
However, FTP has no security to data as the data is not encrypted prior to its
transmission.
iv. TELNET
This is a network protocol that allows a computer user to gain access to another
computer and use its software and data, usually on a LAN and on the Internet. It
allows users to access data stored on servers from their terminals. Telnet allows
computers to connect to each other and allows sharing of data and files. Telnet has
security problems especially on the internet.
v. VoIP (Voice Over Internet Protocol)
It is a method of using the internet to make ordinary voice telephone calls. Thus it is
a way of having phone conversations using the internet as a way of communication.
By VoIP, international and long distance calls are of the same price as local calls and
sometimes are for free. However, the system does not offer emergency calls. An
example of VoIP is Skype.
1. Problem identification/Recognition/Definition/Realisation:
This is where the problems of the current system are stated.
These might have been realised by system users or by managers. The system might be
producing wrong results.
This includes the general statement of the problems being experienced by the system.
People work differently if they feel that they are being observed, therefore
inaccurate information can be collected.
The researcher may not understand some of the activities being observed.
It is time consuming to collect the required information.
The researcher may interrupt some of the activities being done.
If workers perform tasks that violate standard procedures, they may not do this
when being watched!!
3. Feasibility Study:
It involves an evaluation of proposals to determine if it possible to construct a new system
or just modification of the existing one. Feasibility can be measured by making the following
considerations:
Economic feasibility: determining whether the benefits of the new system will out-weigh
the estimated cost involved in developing, purchasing, assembling requirements, installing
and maintenance of the new system. The cost-benefits analysis is carried out. Benefits can
be tangible and quantifiable, e.g. profits in terms of monetary values, fewer processing errors,
increased production, increased response time, etc. Other benefits are intangible, e.g.
improved customer goodwill, employee moral, job satisfaction, better service to the
community, etc.
Technical feasibility: determines if the organisation can obtain software, equipment and
personnel to develop, install and operate the system and even to maintain it.
Social feasibility: a measure of the system’s acceptance by the general public; if it will meet
the norms and values of the society.
Legal feasibility: This is determining if the system can conform to the laws and statutes of
the country. This is done by considering government legislation, e.g. Data processing system
must comply with the local Data Protection Acts
Operational feasibility: determines whether the current work practices and procedures are
adequate to support the system, e.g. effects on social lives of those affected by the system,
can it work well with existing hardware, etc
Operational feasibility assessment focuses on the degree to which the proposed system fits
in with the existing business environment and objectives with regard to development
schedule, delivery date, corporate culture, and existing business processes
After carrying out the feasibility study, a feasibility study report must be produced and it
contains the following information:
- A brief description of the business.
- Advantages and problems of the existing system.
- Objectives of the new system.
- Evaluation of the alternative solutions.
- Development timetable.
- Management summary.
- Terms of reference.
- Proposed solution.
4. Analysis stage:
This is the in-depth study of the system to determine how data flows within the system.
Analysis tools used includes:
- Decision trees
- Decision tables
It involves use of flowcharts, data flow diagrams, structure diagrams, decision trees, and
others, to describe the operations of the system in detail. The analysis stage determines
whether computerisation will take place or not. The analysis stage also specifies the hardware
and software requirements of the new/proposed system, the advantages and disadvantages of
the proposed solution, etc.
Analysis stage also involves identification of the following:
- Interviewing workers and management
- Alternative solutions: other solutions, not considering the chosen one
- Specification requirements: ( hardware requirements, software requirements),
personnel requirements, etc
- Carrying out the Cost-benefit analysis: weighing out costs of developing the new
system versus the benefits that will be realised.
- Determining how data flows within the system using DFDs
- Studying current systems inputs
- Studying current system outputs
- Decides on what the project/system needs to achieve
Dataflow Diagrams
These are diagrams that show how data moves between external sources, through processes
and data stores of a particular system. Dataflow diagrams use the following symbols:
5. Design Stage:
This stage is concerned with the design of the new computer based solution as specified by
the analysis stage. Design stage involves:
Input Design: includes designing of data entry forms, input methods (e.g. by filling forms,
use of barcodes, etc) and the user interface.
Output Design: Includes design of reports, data output formats, screen displays and other
printed documents like receipts, etc.
File design: Involves designing tables/files, records and validation rules. It also involves
determining how data is to be stored and accessed, the media to be used for storage and the
mode of file organisation. Fields in each files can be designed, their length and data type,
e.g.
File Name: Student File
Storage Location: Hard Disk
Mode of Access: Direct/Random
Program Design: Involves design of systems flowcharts, structure diagrams, dataflow
diagrams, algorithms, etc. Selection of appropriate hardware: Specify the input hardware,
output hardware, processing hardware and speed, storage media, RAM size, etc. Selection
of appropriate software: specifying the type of operating system, programming language
or database package and other application packages to be used.
Design of test plan and strategy, Design of the user manual, Design of the technical
documentation
In general, design stage involves the following:
design the data capture forms/input forms
design the screen layouts
design output forms and reports
produce systems flowcharts and/or pseudo code
select/design any validation rules that need to be used
design a testing strategy/plan
file structures/tables need to be designed/agreed
select/design the hardware requirements for the new system
select/design the software requirements
produce any algorithms or program flowcharts
select the most appropriate data verification method(s)
interface design(Command-line, GUI, form-based, menu-driven, etc
The computer environment is prepared, the programs to be written are done and they are
tested to determine if the run as expected.
Computer environment being prepared: electrical wires, network cables are installed,
furniture, air conditioning are in place. The computers are installed and tested.
It also involves the construction and assembling of the technical components that are needed
for the new system to operate. This includes preparation of the computer room environment,
coding of the computer program using a specific programming language, testing of the coded
program,
Testing strategies
- standard (normal) data testing: testing of data within the given range (should be
accepted)
- Abnormal data testing: testing of data outside the given range (should be
rejected). It gives an error message when entered into the computer system.
- extreme (boundary) data testing: testing of the minimum and maximum values in
the given range (should be accepted)
(a) User Documentation: It is a manual that guides system users on how to load, operate,
navigate and exit a program (system). User documentation contains the following:
System/program name.
Storage location.
System password.
Instruction on how to install the program.
Instruction on how to operate the system: e.g.
How to quit the program
how to load/run the software
how to save files
how to do print outs
how to sort data
how to do a search
how to add, delete or amend records
print layouts (output)
screen layouts (input)
the purpose of the system/program/software package
error handling/meaning of errors
troubleshooting guide/help lines/FAQs
how to log in/log out
(b) Technical Documentation: This is a manual for programmers which aid them in
modifying the system and in correcting program errors. The following are found in technical
documentation:
Algorithms of the program,
Program testing procedures and test data,
Sample of expected system results,
Program structure showing modules and their relationships,
System flowcharts,
Programming language used,
Program code,
program listings,
File structures.
Validation rules
Output formats
Bugs in the system
Hardware requirements
Software requirements
User Training:
Once a new system is put in place, existing employees are trained on how to operate the
new system, otherwise new employees are recruited. Users are trained on how to enter data,
search records, edit fields, produce reports, handling errors, etc. User training can be in the
following forms:
i. On the job training: Users are trained at their organisation by hired trainers. This has the
following advantages:
Learners practice with actual equipment and the environment of the job.
Learners can engage in productive practices while on training.
This is cheaper for the organisation.
Enough practice (experience) is gained on how to operate the system.
Production does not stop
Disadvantages of on the job training
Distractions occur in a noisy office.
Instructional methods are often poor.
The need to keep up output may lead to hasty teaching
Mistakes by learners can be disastrous for the system
ii. Classroom training: Users are send to other colleges and institutions which offer courses
on the subject matter. This could be expensive to organisations since employees take study
leave while being paid at the same time. Employees can also be trained on aspects that they
will not apply when they finish the course. The gap between what is learnt and what is needed
at the job may be too wide.
a. Parallel Run: This involves using of both the old and new system concurrently until the
new system proves to be efficient. It involves operating the new and old systems
simultaneously until management is confident that the new system will perform
satisfactorily. Other workers will be using the old system while others use the old system
but doing the same type of job.
Advantages of parallel run
Results for both systems are compared for accuracy and consistency.
If the new system develops problems, it will be easier to revert to the old one.
There is enough time given to determine if the new system produces expected results.
Employees have enough time to familiarise with the new system.
ii. Abrupt (Direct) changeover: Involves stopping using the old system on a certain day
and the new system takes over on the next morning. This is suitable for control systems like
in chemical plants and for traffic lights.
Advantages of Direct Changeover
Reduces cost as of running two systems at the same time.
Faster and more efficient to implement.
There is minimum duplication of tasks.
Enough resources can be allocated to make sure that the new system operates successfully.
Disadvantages of Direct Changeover
It will be difficult to revert to the old system if the new system fails.
iii. Phased / Partial conversion: This is whereby the old system is gradually removed while
the new system is gradually moved in at the same time. This can be done by computerising
only one department in an organisation this month, then the next department in two months’
time, and so on until the whole system is computerised.
Advantages of phased conversion
Avoids the risk of system failure.
Saves costs since the new system is applied in phases.
It could be easierto revert to the old system if the new system fails since only one department
will be affected.
Disadvantages of phased conversion
since the organisation will be running two systems but in
It could be very expensive
different departments.
iv. Pilot conversion: This is whereby a program is tested in one organisation (or
department), and is applied to the whole organisation if it passes the pilot stage. It serves as
a model for other departments. A pilot program can then be applied in phases, directly or
using the parallel run method.
9. Maintenance/review/evaluation Stage:
This stage is concerned with making upgrades and repairs to an already existing system.
Certain sections of the system will be modified with time.
Maintenance can be to Perfect the system, to Correct some errors or to make it adapt to
changing needs, e.g. change in government laws. Maintenance involves the following:
update hardware as new items come on the market or the company changes in any
way which requires new devices to be added/updated
update software if necessary if company structure changes or legislation is
introduced which affects how the company operates
Evaluation involves the following:
- compare final solution with the original requirement
- identify any limitations in the system
- identify any necessary improvements that need to be made
- evaluate the user’s responses to using the new system
- compare test results from new system with results from the old system
- compare performance of new system with performance of old system
Assessing the effectiveness of the new system:
- compare final solution with original requirements
- identify any limitations in the system
- identify any necessary improvements that need to be made
- evaluate user responses to using the new system
- compare test results from new system with results from old system
- compare performance of new system with performance of old system
- effectiveness of the hardware
- effectiveness of the software
Types of Errors
1. Transcription Errors: These are mistakes due to misreading or mistyping of data, e.g.,
confusing the number 5 with the letter S, 0 (zero) instead of the letter O, etc. This can also
be caused by bad handwriting.
2. Transposition Errors: These are mistakes caused by swapping 2 letters or digits, e.g.
typing ‘ot’ instead of ‘to’, 5721 instead of 7521. Transposition errors occur mostly when
typing at very high speeds.
3. Error of Omission: Some information might have been skipped from being entered.
-
Avoiding Data Entry Errors
The following procedures can be used to avoid / reduce data entry errors:
1. Verification: Involves checking whether what has been entered into the computer is
similar to what is on the input document. Also done data is copied from one medium to
another, e.g. from paper to disk. Verification is done manually by the user of the computer.
Verification is carried out to determine errors that cannot be detected by the computer.
NB:-Verification can also be used to determine if data has been correctly transferred from
one place to other (e.g. between devices or on a network).
Verification can be done in the following forms:
(a) Double entry:
In this method, data is entered twice (using two different people); the data is only
accepted if both versions are similar.
Double entry is often used to verify passwords by asking them to be typed in again
by the same person twice.
(b) Visual Checking
This is checking for errors by comparing entered data with the original document
(NOTE: this is not the same as proof reading!!). If the entered data is similar with
the source document, then it has been entered correctly.
2. Validation: A process done by the computer to detect if data entered is valid, correct,
complete, sensible and reasonable. For instance the height of a person entered as 12 metres
is incorrect, is not sensible, neither is it reasonable, and therefore the computer should reject
this. Validation is a process of checking if data satisfies certain criteria when input i.e. falls
within accepted boundaries. Validation is done by the computer.
(j) Check Digits: A check digit is an extra digit appended to the right -end of an original
number for error checking purposes and is calculated from the original block of data using
modulus 11.
*NB: - Check digits are used where data is entered automatically as in using barcode
readers and are important for checking for transposition errors (swapped digits)
We have 9 digits. Working from the right, the first digit is multiplied by 2, second number
by 3, third number by 4 and so on. We start at 2 because position 1 is for the check digit. The
results are added together, e.g.
(1x10) + (5x9) + (1x8) + (2x7) + (1x6) + (1x5) + (3x4) + (2x3) + (3x2) = 112
The total (112) is divided by 11 and the remainder is noted; e.g., 112 divided by 11 = 10
remainder 2.
The remainder is subtracted from 11 to give the check digit: 11 – 2 = 9
9 becomes the check digit. Therefore the number will be transmitted as
1512113239 *NB: -
(1) If the check digit found is 10, an X is used as the check digit.
(2) If, upon dividing the total by 11 and the remainder is 0, then 0 is the check digit. This is
obtained as, 11-0=11. Divide 11 by 11 and take the remainder, which is 1 remainder 0, thus
0 becomes the check digit.
(3) Check digits are used to detect where digits have been swapped
(1). Remove the given check digit, calculate your own check digit. If they are similar,
then the check digit is correct. If they are not similar, then the given check digit is wrong.
(2) Re-calculate without removing the given check digit using the example given
below:
Example:
Here, the check digit is on position 1. So the numbers and their positions is as follows:
Position 10 9 8 7 6 5 4 3 2 1
Digit 0 1 3 1 5 2 4 4 7 X
Multiply each digit with its position and add the results, thus giving:
(10x0)+(9x1)+(8x3)+(7x1)+(6x5)+(5x2)+(4x4)+(3x4)+(2x7)+(1x10) = 132
Divide 132 by modulus (11) and get the remainder. This gives us 12 remainder
0. Therefore the check digit is correct.
NB: If the remainder obtained is 0, then the check digit is correct, if not, then the check
digit is wrong.
Verification Validation
Check whether data entered in the Checks for correctness, completeness,
computer is similar to that on input Sensibleness of data.
Document.
Done well after data has been entered into Done during data entry.
The computer.
It is a manual process /done by the user. It is an automatic process/done by the
Computer.
Questions
1. Describe 4 methods of automatic data capture, giving an application of each method
2. A record contains the following fields:
- Title (Mr/Mrs/Miss) and Sex (Male or Female)
- Date of birth (written in the form dd/mm/yyyy)
- Pay Number (which is made up of 8 digits)
- Telephone Number
- Pay
Give a different validation check for each of the above fields and explain why it is
used.
3. (a) Which of the following numbers have the correct check digit?
(i) 0 – 5 5 5 – 2 1 6 2 2 – 5
(ii) 0 – 1 2 1 – 9 0 0 2 1 – X
(b) Calculate the check digit for the following number:
0 1 5 0 2 4 6 2 2 ………
(c) Discuss the types of errors that check digits can identify.
4. (a) Give 2 different ways of carrying out verification checks.
(b) Give 2 examples of situations where verification would be used.
SOFTWARE
Software refers to a set of instructions written in computer language that tell a computer to
perform a specific task, e.g. word processor, spreadsheet, etc. Without software, a computer
will be useless. Software is grouped into systems software and application software. The
diagram below illustrates branches/groups of software:
Systems Software: Refers to programs that control and manages the performance of all
computer systems. Systems software comprises of: (a) operating systems (b) Utility
programs (c) Translators (d) Device drivers.
1) Operating System: - refers to the programs that supervise, control and manage the
performance of the computer hardware and software in accordance with set objectives, for
example, Windows 7. Examples of operating systems include: Windows 95/98/2000/XP/
VISTA/ Windows 7/Windows 8, Microsoft Disk Operating System (MS-DOS), Unix, Linux,
OS/2, Ubuntu, etc.
The operating system is loaded onto the computer by the bootstrap loader. Programs stored
on ROM chip runs first and this checks if all hardware components are working normally. It
also checks the CPU and the Basic Input output System (BIOS) for errors. If there are no
errors, the BIOS will activate the disc drive. The operating system is then found and the
computer can boot. Booting refers to the process of loading the Operating system into
memory so that it takes control over hardware and software resources of the computer.
*NB: Response time – the time that elapses from the moment an instruction is given to the
computer and the time that instruction is carried out.
Turnaround time – the time taken from the moment a document is produced by a computer
and the moment it is used as an input document to that computer again.
Turnaround Document: a document produced by the computer and later used as an input
document to the same computer, e.g. electricity bill
NB. Most operating systems are written in low level language. This is for them to quickly
coordinate computer activities since they will not be converted as they are already in machine
language or less time is needed for conversion if the operating system is written in assembly
language. The following must be considered when buying an operating system:
- Hardware type and computer design e.g. windows operating system works well on
IBM compatible machines.
- Applications intended for the computer e.g. accounting, stock taking, etc.
- Method of communicating with the computer, that is, use of few or many
peripherals and terminals.
- Method of operating the computer e.g. multi-access, multi-programming, etc
Time sharing operating systems: This type of operating system allows many users to use
the same processor at a time, using the round robin method by use of time slices. In Round
Robin, each user is given a fraction of a second (time slice) to use the processor so that all
users seem not to be sharing the processor.
*NB: - Time slice: A brief period of time during which a particular task (or computer) is
given control of the microprocessor in a time-sharing multitasking environment. A
computer's processor is allocated to an application, usually measured in milliseconds. Time
slice is also called quantum.
Multitasking: It is the concurrent execution of two or more programs on the same computer
by use of time slices, doing the same job. For example, copying a graph from Microsoft
Excel to Microsoft Word. Thus the two programs will be running concurrently, doing a
related or same job.
3. Multi Access / Multi user operating systems: It is when many online users access one
processor at the same time to make use of multi-programming.
4. Multi-programming: This is whereby two or more programs (tasks) are being processed
(run) at the same time on one computer by use of time slices, for example playing music
while typing a document. Programs may take turns to make use of the processor, thus when
one is using the CPU, others will be using the peripherals. It uses interrupts to pass control
from one program to another.
5. Multiprocessing: A type of operating system that allows one computer to have two or
more processors but sharing the same memory, e.g. dual core computers.
6. Batch Processing System: - A system in which data is collected over a long period of
time, put in groups and processed at one go, without user interaction from start to finish, as
in payroll processing. Jobs can be entered at a remote terminal, that is, on a terminal far away
from the host computer. Thus batch processing promotes Remote Job Entry (RJE): which
is the entering of data into the computer through a terminal far away from the host computer.
- For instance, a central computer can process batches of cheques collected from different
branches, mostly during the night. If there are errors, the results will also be wrong. Batch
processing is very cheap to operate and easy to run. Users can also perform some other tasks
while batch processing takes place.
- In batch processing, there is minimum or no human intervention during data processing
period. It is used where large amounts of data is processed and where processing does not
need to be done immediately, e.g. in Payroll processing, water billing, electricity billing,
telephone billing, clearance of cheques, etc).
Payroll Processing
These calculate wages and print pay slips. It is the following inputs, processes and outputs:
Inputs: employee details (rate of pay, tax code, bank name, bank account number, etc),
number of hours worked, over time, etc.
Processing: Calculation of Gross Salary, Net Salary, deductions, updating master file, etc.
Outputs: printed pay slips, updated master file, transfer to bank account, etc.
Billing systems
Used to create bills and invoices to customers. It has the following inputs, processing and
outputs:
Inputs: customer details (names, address, account numbers, etc), charge, previous
readings, new readings, bank account details, etc
Processing: calculating the number of number of total units, total cost, and monthly
payments made, outstanding amount, etc.
Output: printed bill showing all details, updated customer file, etc.
Advantages of batch processing are as follows:
- It is less expensive to use.
- jobs can be processed when computer resources are less busy (e.g. during the
evening or at night);
- Processing does not need to be done with anyone present.
- Users do not need to be specialists in computers. It allows remote job entry.
b. Translators: - These are programs that convert source code to object code. Translators
are in three forms, which are interpreters, assemblers and compilers. These will be
covered in more detail under Programming Languages.
c. Utility Programs:
These are programs used to perform specific, useful and frequently needed task in a computer
system. They usually have one single task to perform on the computer system. Utilities
include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks, for
example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a specific
ordered sequence, for instance in ascending or descending order of a given key.
iii. Debuggers: These are utilities used for assisting in correcting errors in programs.
iv. Dump Utilities: These are programs that assist in copying data from main storage to
output devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the computer.
vi. Peripheral Transfer Utility: These are programs used to transfer data from one
peripheral device to another.
vii. System Status Utilities: These are programs that provide information on the state of
files, memory, users and peripherals.
viii. File Maintenance Utilities: These are programs used to reorganise programs and to
update them.
(d) Device Drivers: Programs that allows a device, e.g. printer to work on a
given operating system/computer.
Application Software
This refers to programs and their documentation, designed to perform a specific task for the
user in daily life, like payroll processing, word processing, etc.
Integrated Package (Application suite) - a collection of application programs purchased as
one package, for example Microsoft Office 2010. It is a collection of a word processor,
spreadsheet, database and presentation packages bought as one package, for example,
Microsoft Office 2010.
Advantages of Integrated Packages are:
- It is cheap to buy as compared to buying single application programs at a time.
- Programs have been tried and tested and therefore are free from errors.
- Programs are designed in a similar way, making it easier to learn others if you are
able to use one of them.
- Programs are easier to use and to learn, for example, when designing a database
using Microsoft Access.
- Regular updates are provided on the internet or on disks.
Disadvantages of integrated packages are as follows:
- The user is forced to buy the incorporated packages even if he/she needs only one
of them.
- They are not tailored for individual user requirements.
- Organisations purchasing them have little or no control over their use.
- The packaged programs can only be modified by the programmers (owners).
- Most of the need regular updating, which may be expensive.
- They have many features that the users might never use yet they buy them.
*NB: Editing: the process of correcting mistakes in a document, for example, spelling
mistakes.
Formatting: making a document look more attractive by bolding, underlining, inserting
borders, etc
2. Spreadsheet Packages: These are application programs used to manage and analyse
statistical, numeric and financial data, for example Microsoft Office Excel, Lotus 1-2-3,
SuperCalc, etc. The structure of a spreadsheet is as follows:
4. Database Packages (DBMS): Refers to programs used to create and maintain databases
for a specific application area.
They are used for maintaining and providing interface been users and the database and to
interface the database and other application programs.
Examples of database packages include Microsoft Office Access, Oracle, Dbase IV,
MySQL, etc
Properties/features of databases
Most database packages have the following features:
(a) Tables: These are equivalent to files and therefore are used to store data. The data
is stored in rows and columns. Each row in a table is called a record which is
made up of a number of fields (columns in the table). The data type in the fields
is usually either text, numeric or date/time. Most databases contain a number of
tables which are usually linked together in some way.
(b) Forms: Forms are commonly called data entry screens since they are the user
interface which allows data in the tables to be viewed, entered or edited. Forms
permit the control of how other users interact with the information in the
database e.g. only allow certain fields to be seen or only allow certain
operations to be carried out. This subsequently helps the protection of the
information and also ensures it is entered correctly
(c) Reports: Reports are produced as a result of questions such as “date>=01/01/1975”.
The data on report is extracted from queries or tables as per user requirement.
They display certain required data as needed by the user, e.g. after searching or
filtering of data. Reports can be printed out as hardcopy, or viewed on the screen
or exported (e.g. to a word processor, an email message, etc.).
(d) Queries: Queries are questions that request certain data from tables, e.g, Amount
<200. It can also be an instruction to search data which meets a certain criteria
from table and display it on the screen in form of another table created from the
original table. Most commonly allow information to be retrieved from tables.
They also allow filtering so only the records required are seen.
(e) Macros
A macro is a name or key that represents a series of commands or key strokes.
Many applications allow single word or single nominated key on a keyboard to
perform a whole series of actions. Macros can be either written as required and
then stored or stored in a library for future use. Macros can be very sophisticated
and save the operator a lot of time. For example, the name and address in a word
processor could be set up by pressing key F1 and the system brings information
from a related database
5. Graphics Packages: Refers to programs used to create and edit graphs, diagrams,
drawings, charts and plans for buildings, for example Microsoft Paint, Harvard Graphics,
Corel Draw, Real Draw, etc. Computer graphics are images designed for logos, commercial
and news inserts during television advertisements or transmission.
- Text is usually imported from a word processor or is typed into the document directly
using a frame. This allows you to create the layout first, link the frames together and
add the text into the frames later (e.g. in newsletters and magazines where layouts are
created before any of the actual text becomes available).
8. Authoring Packages (Author ware): Software that can be used to write interactive,
hypertext or multimedia computer programs without the technically demanding task of
computer programming. Also used in multimedia presentations. These programs can be used
for developing databases and material for Computer Aided Instruction (CAI).
Authoring tools require less technical knowledge to master and are usually used for
applications that present a mixture of text, graphics, and audio/music files. Authoring tools
usually allow the creation of the actual required application by linking together objects which
can be text, graphics, music file, etc. By defining the relationship between objects it is
possible to produce very useful and eye catching applications.
(9) Web Browsers: Software used to open web pages on the internet, examples are:
Mozilla Firefox, Microsoft Internet Explorer, Safari, Opera, etc.
(10) Search Engines: These are packages used for searching data for the user from the
internet, e.g. Google, yahoo, etc.
*NB: - Specialist Packages for Business: These are packages for use in a specific
business environment, for example, Pastel for accounting purposes.
*NB: - Install: - to add programs to the computer. Therefore to uninstall is to remove
programs from the computer.
Types of Systems
1. Real Time Processing System: - An online system in which individual, discrete
transactions are processed as they occur to influence the activity currently taking place, as in
airline reservation. Results of the process are produced immediately. The system response
quickly and give feedback of a request. Thus the system is interactive in nature. Such systems
include airline reservation systems, hotel reservations, stock control, etc.
Real Time Processing System can also be called Transaction Processing System (or Real
Time Transaction Processing Systems): this is a real-time (or pseudo-real-time)
transaction processing system whereby only individual items of data need immediate
processing, results and files are updated instantly e.g., airline reservation, balance enquiry at
an ATM, etc. Response to a query needs to be very fast and once a seat is booked it needs to
marked as “not available” immediately to avoid any risk of double booking.
Using this example of booking seats on a flight, the following sequence of events would take
place:
- customer/travel agent contacts the airline
- the customer/travel agents types in the day/time of flight and number of travelers
- the customer/travel agent types in the departure airport and the destination airport
- the airline database is searched and availability of seats checked
- if seats are available on the required day/time then a booking is made
- the database/file is updated immediately to indicate that these seats are no longer
available and prevents double booking from occurring
- if no seats are available a message is sent back to the customer/travel agent
- this uses real time (transaction) processing since the files are updated in real time;
interrogation of files will have access to totally updated information
Transaction processing’s requirements include:
- A large quantity of hardware support.
- Large and fast main storage, over 1 GB.
- Large and fast backing storage like hard drives of about 300 GB.
- Efficient communication equipment like fibre optics, satellites, etc. Efficient, secure
and reliable operating systems.
- However, transaction processing systems are very expensive to run.
3. On-Line System: A system that is directly linked to the host computer for real-time
communication and provides interaction between the user and the job, as in POS terminals
in supermarkets. In networked computers, the terminals must be directly linked to the host
computer. Examples include ATM systems in banks, airline reservation systems. Online
systems can just be for information retrieval. Information retrieval systems are there for users
to access certain information promptly as on the internet. In contrast, offline systems are
computer systems that work without being directly connected to the host computer.
5. Control System: - A system in which one or more computers are used to monitor the
operations of some non-computer equipment like in oil refineries. Control systems involve
monitoring and logging of physical quantities, provide an analysis of performance and allows
some user interaction. Feedback is an essential element as well as timing. Most control
systems are real-time systems, e.g. oil refining, chemical processing, traffic control, etc.
6. Automated Systems: - These are control systems that are dedicated to one particular task
and lack the ability to collect and analyse data as in digital cameras. They do not allow for
or act on user interaction, e.g. washing machines, cameras, watches. Most control systems
have embedded computers systems inside them.
9. Centralised systems: This is whereby processing is carried out at one central location for
an organisation with a number of branches. Users in other locations can view data and utilise
it but with limited capabilities. Centralised processing has the following advantages:
- Hardware within the organisation will be compatible and can be linked.
- The organisation gets better deals in terms of maintenance contracts. Employees do
not have to learn new systems when they move from one department (or branch) to
another.
- It is easier to coordinate staff training courses using the same software and
hardware for all departments (or branches).
- There is better control over use of unlicensed software.
- Data can be exchanged easily between similar types of hardware and software
Disadvantages of Centralisation:
- Requires high initial capital investment of sophisticated equipment, operating
systems, well developed communication systems and complex application packages.
- Requires highly qualified and experienced personnel to run it.
- A system failure will paralyse the entire system unless expensive backup system is
provided.
- Users feel not being fully involved and therefore are not motivated.
The choice of processing depends on:
- Cost of hardware: online systems are more expensive to install, including installation of
communication systems like telephones and satellites.
- Volume of data involved: batch processing is appropriate where very large data is
handled.
- Frequency of data change: banks need online systems for customer data changes more
frequently than in payroll processing systems.
FILE HANDLING
Types of files
1. Master File: It is a permanent file that is kept up-to-date by applying transactions that
occur during business operations. It contains permanent (static) and semi-permanent data.
Static data stored in database files can include Surname, First names, Date of birth, etc.
2. Transaction Files: These are temporary files that contain data that can change regularly,
e.g. on daily bases and it is used to update the master file. This includes sales per day, student
mark in a weekly test, etc. Transaction files are used to update master files.
3. Reference files: These are files that contain permanent data which is required for viewing
purposes only. The file can be displayed on the screen or printed without altering it in any
way. This includes data on tax bands, formulae, etc. No changes to files are done.
4. Data file: A set of related records (either written or electronic) kept together.
A. Fixed Length Records
These are records that allocate a specific amount of space for data, mostly a specific number
of characters.
Fixed length records have the following advantages:
Entering data is faster as records are shorter and less typing is required.
Easy to search data
Less data entry errors are encountered.
It is faster to carry out searches.
Faster to do validation checks and procedures.
They are easier for programmers to work with than variable length records.
They allow an accurate estimate of disk storage requirements. Thus disk storage
space can be easily managed as records occupy a specific number of characters.
They are very easy to update
Disadvantages
Can lead to wastage if disk storage space if used to store variable length data. For
example, not all surnames are of the same length.
Some spaces may lie idle as data entered will be shorter than the space allocated.
Some data to be entered may be too long for the space allocated and therefore will
be cut.
Not flexible to work with
B. Variable Length Records
These are records that allow data to occupy the amount of space that it needs. They allow
data with varying (different) number of characters or sizes. The number of fields may also
vary. They usually show where the field or record starts and ends
Variable length records have the following advantages:
They are more economical in terms of usage of disk storage space as they do not
allow spaces to lie idle.
Data entered will not be cut but appears as entered no matter how long it is.
may reduce time taken to read file/transfer data
enables as many fields as possible to be added to a file
However, variable length records have the following disadvantages:
End of field and end of record markers occupy disk storage space that might be
used to store data.
Difficult to update (add or delete) as the transaction and master files might have
different lengths.
more complex to use
more complex to manage
Hard to search data in the files
File Organisation
Refers to the way in which records in a file are stored, retrieved and updated. This affects the
number of records stored, access speed and updating speed. The most common methods of
file organisation are: Serial File Organisation, Sequential File organisation, indexed –
sequential file organisation and random (direct) file organisation.
1. Serial File Organisation: This is whereby data is recorded one after another as they
occur, without any definite order, as supported by magnetic tapes. Data is stored according
to arrival time. Data is read from the first record until the needed data is found. New records
are added to the end of the file. Serial file organisation is not appropriate for master files
since records are not sorted and therefore are difficult to access and to update. It is faster to
find records at the beginning of the file, but takes too long to find records towards the end of
the file. Serial files are suitable for temporary transaction files since records are not sorted.
Serial files promote Serial Access: whereby records are accessed by reading from the first
until needed record is found in an unordered file, e.g on magnetic tape.
2. Sequential File Organisation: This is whereby records are sorted into a key sequence,
that is, in ascending or descending order of a given key filed as on magnetic tapes. Sequential
files organisation is appropriate for files with a high hit rate like payroll
processing. They are suitable for master files since they are ordered. However, it takes too
long to access records towards the end of the file since the records are accessed by reading
from the first record until the required data is found. However, searching of records at the
beginning of files is very fast. Adding of new records is difficult as this is done by re-
entering the data and the new record is inserted at its right position. It is time consuming to
update such records. Suitable for master files since records are sorted. This is used where
all records need processing, e.g payroll.
Sequential Files promote sequential Access: Sequential Access is whereby records are
retrieved by reading from the first record until the needed record is found in an ordered list
of records, e.g. on magnetic tape. Sequential access occurs where records are ordered using
a key field.
3. Indexed-Sequential Files: This is whereby records are ordered in sequence based on the
value of the index or disk address as supported by hard disks. This is used for storing master
files records since the records are ordered. It is also suitable for real time processing
applications like stock control as it is fast in accessing records and in updating them. It
provides direct access to data as on hard disks, diskettes and compact disks.
4. Random (Direct/hash/relative) File Organisation: This is whereby records are stored
in no order but accessed according to their disk address or relative position, as supported
by hard disks and compact disks. The address of the record is calculated using the hashing
algorithm. It is appropriate where extremely fast access to data is required as in airline
reservation. Updating of records is in situ, very simple and very fast. Hard disk, compact
disks and diskettes promotes random file organisation.
Random File organisation promotes Random/Direct Access to records: Direct access is
hereby records are retrieved randomly by going straight to the needed record by using
address of data, as supported by hard disks, compact disks, memory sticks, etc.
File Processing
Refers to any form of activity that can be done using files. This includes: file referencing,
sorting, maintenance and updating.
1. File Referencing/Interrogation: This involves searching of record and displaying it on
the screen in order to gain certain information, leaving it unchanged. The record can also
be printed.
2. Sorting: Refers to a process of arranging (organising) records in a specific ordered
sequence, like in ascending or descending order of the key field.
3. Merging Files : This is the process of combining two or more records into one. Below
is an example of how records can be merged:
Record A (sorted) Record B (unsorted)
12 34 71 78 101 103 67 3 90 12
Record C (Merged and sorted for records A and Record B)
3 12 34 67 71 78 90 101 103
4. File maintenance: This is the process of reorganising the structure of records and
changing (adding or removing or editing) fields. This can be due to changes due to addition
or deletion of records.
5. File Updating: Updating is the process of either adding new record, deleting unwanted
records or modifying existing records. It involves making necessary changes to files and
records. Mostly master files are updated and they must be up-to-date (contain accurate and
most recent information).
For updating to occur, any one of the following must have occurred:
A new record has been entered.
Deletion of an unwanted record.
An amendment (change) to the existing data has been made, e.g. change in date of
birth only.
The most common methods of file updating are: Updating in situ and Updating by
copying.
a. Updating by copying
This happens in sequential file updating process. This is done through the following steps:
- A record is read from master file into memory.
- A record is read from transaction file into memory.
- Record keys from each file are compared.
- If record keys are the same, the master file is updated by moving fields form
transaction file to the master file.
In sequential file updating, it is recommended to keep at least three master file versions that
will be used for data recovery in case of a system failure or accidental loss of data. The first
master file is called the Grandfather file, the second master file is called the father file and
the third master file is the son file. This relationship is called the grandfather-father-son
version of files. The process of keeping three versions of master files (grandfather-
father-son) as a result of sequential file updating is called File Generations. Thus the
first master file (grandfather file) is called the first generation file, the second master file
(father file) is called the second generation file and the third master file (son file) is the third
generation file. The following diagram illustrates the sequential file updating process: