Computer Notes
Computer Notes
INTRODUCTION
The introduction of Computer Studies Syllabus into the secondary school curriculum is a big
advancement in the education system. Computer literacy has become, is becoming and will become
more indispensable to a literate modern secondary school graduate and will not only introduce him
her into the employment world but also into a world of creativity and research with the use of the
internet and other related technologies.
AIM
The subject aims at equipping the learner with computer information and communication technology
in order to enhance ones productivity and development of creative skills for problem solving and
efficiency.
To demonstrate general knowledge and skills in the use of computers and the use of computer
and related technologies
To use the knowledge acquired in computer studies to enhance learning in other subjects
To understand important issues of technology-based society and exhibit ethical behavior in the
use of computer and other technologies
To use a variety of computer technologies to access, analyze, interpret, synthesize, apply and
communicate information
TOPIC I
INTRODUCTION TO COMPUTERS
1. SPEED: Computers are very fast in their operation in that their speed is measured in millions of
instructions per second. An average computer today is able to process 15 million instructions per
second. The speed of a computer can be expressed in Millions of Instructions per Second (MIPS).
3. ACCURACY: Computers are accurate. This means that they hardly make any mistake.
Computers are capable of detecting and correcting any mistakes made. They have self-check
systems which can report any error iwhere data is stored before it is processed or where
information is stored before being output to particular devices. This storage space is called the
Memory.
4. DILIGENCE: Computers are diligent. This means that computers have ability to perform the
same task over and over again for a long time without getting tired or bored. Unlike humans,
computers do not complain.
5. ARTIFICIAL INTELLIGENCE: Computers have artificial intelligence. This means that they
can respond to commands or requests given to them and provide solutions. The computer’s
intelligence is said to be artificial because it is enabled by the computer programs installed in
them.
A computer program is a set of instructions written in a computer language.
6. AUTOMATION: This means that computers have the ability to work without human
supervision. Compumters do not need any supervision in order to perform programmed routines.
In other words, they are automatic.
7. VERSATILITY: This means that a computer has the ability to perform more than one task at the
same time. For example, a computer should be able to play music while one is typing.
The ability of the computer to perform more than one task is called Versatility or Multi-tasking
TERMINOLOGIES AND CONCEPTS
Data is unorganized facts e.g. a list of students in school, irrespective of their class, sex or age.
Information is organized facts or data that has been turned into more meaningful form e.g. a list of
students in school according to their classes, sex and age.
1.3 USES AND FUNCTIONS OF COMPUTERS
USES OF COMPUTERS
Computers are widely used in our everyday life to accomplish large number of useful applications or
various tasks.
Some of the areas that computers are widely used include:-
Business.
Military.
Education.
Research.
Science and Engineering.
Entertainment and Leisure (Recreation)
1. BUSINESS APPLICATIONS.
Phones, cars, Elevators and vending machines work by use of computers.
They help in business data processing. This is seen in receipt creation, analyzing
business performance and sales summary at the end of each day/ month, years etc.
Computers reduce inventory costs (cost of keeping records)
Sophisticated financial analyses to determine production costs, forecast labor needs and
eliminate production bottlenecks.
7. COMPUTERS IN EDUCATION.
With computer aided instructions (CAI) teachers can use computers and other IT equipment to
present teaching materials in a more interesting way and computers help students to learn.
CAL (Computer Assisted Learning) students use comp software to answer and learn at their
own pace
CAA (Computer Assisted Assessment) This reduces time and labour to mark the students
scripts.
Distance Learning (Comp or Web based learning) Enables one to study from home which
saves on the travel costs, accommodation, and feeding
It has also enabled sharing of educational material amongst the scholars. This has been
possible with the use of the internet
They have enabled educational research because information on every topic can be got from
the internet
Electronic Library to search for books, borrowing and returning…use of bar codes
School Management systems for keeping records for students and staff, producing report
cards and other reports
They have been used to supplement on textbooks by availing information to the scholars
through projects like Cyber Schools and through the internet.
Edutainment – type of software that provides education with entertainment
8. COMPUTERS IN GOVERNMENT AND THE MILITARY.
They are used to monitor government accounts in different areas.
They are used to design conventional and modern weapons like drones and warships
They can carry to day to day government business like word processing, communication and
mail delivery.
Buy analyzing satellite information some governments have been able to seek and destroy
their enemies using warships and planes
FUNCTIONS OF COMPUTERS
Input: This refers to capturing/obtaining the original data; original documents are called Source
documents.
Processing: Depending on what's to be done, the input data can be classified, sorted, summarized,
calculated and stored for future use
Output: The results of these activities are communicated to those who will be using the information.
For example, Payroll production (Data processing/data production)
Processing: The procedure of transforming data into desired output (Data processing)
Information Processing: Process of transferring data into which can be used to make better
decisions (pay cheques, pay slips)
Data processing systems include all people, procedures, devices used to produce desirable output.
Information-process-system is useful information that can be used in decision makin
ADVANTAGES OF USING COMPUTERS
Qn1: Discuss the importance of using computers in society today
Qn2: “Computers have brought so many advantages tour society” Discuss
Qn3: “The usage of computers has led to many disadvantages in our society” Discuss
1. They have improved communication facilities and communication in society. This is seen in
the usage of electronic mails, telephone exchange, social networks like facebook, voice calls
through skype; where people can send and deliver messages instantly.
2. They have enabled the sharing of data and information between people in different areas. This
has facilitated easy exchange of data and ideas and thus increased the speed for executing
operations.
3. Computers have increased data accuracy, reliability and data integrity. This is because
computers do not make mistakes because they have self-check systems which can detect
errors which detect and correct errors
4. Employment opportunities have increased because of computers. Machine operators,
computer technicians, data analysts, computer engineers, software engineers, programmers,
network administrators, lab attendants and computer tutors and trainers have been recruited
and this had improved the society’s standards of living and thus improved the economy in
general because these people pay taxes to the country.
5. It has improved data management and reduced inventory costs (costs of storage) whereby a lot
of data can be stored on computer in a very organized way and a lot of space has been saved
as we shifted from the paper files, which consumed a lot of space to electronic files
6. Computers have facilitated the availability of stronger and more reliable defense systems. This
has been through the easy accessibility of information through satellites, internet and
designing of sophisticated weapons, usage of CCTV cameras, finger print scanners and smoke
detectors.
7. It has made trade across continents easy and simpler. With computers E-commerce and online
shopping have made business easy because business can be done without leaving ones
doorstep. This reduces on the costs of travel, accommodation, food and thus reducing the cost
of doing business. This has also been termed as PC – trading
8. Computers have increased and improved the rate of accessing data and information in our
society. This has been done through the use of the internet where any info in any part of the
world can be accessed as it happens.
9. Computers are very fast, which means that a lot of work is done in little time thereby
increasing productivity and profitability
10. Due to the computers accuracy and reliability, production of high quality products by factories
has been enabled. This is because most of the factories’ systems are automated
11. Tasks can now be completed faster because computers work at an amazing speed. They can
complete millions of instructions per second because the computers are known to be very fast
in their operation. This has led to the extinction of the typewriter
Negative
1. Moral degradation/decadence/decay. This is due to the influx of ill or immoral materials like
pictures, and videos which can be accessed by everyone including the young children from the
internet. This has increased the chances of rape, defilement, homosexuality etc
2. Computers have increased cases of loss of sight and other eye defects due to the radiations
(emissions) from the computer screens. This is especially with long use of computers.
3. Consume a lot of power which has increased power bills in homes schools and other places.
4. Computers have caused a lot of unemployment in society today as a result of some tasks being
done by the computer or automated. Some jobs such as messengers, typists, postmen, have
reduced in importance because they can be easily done by the computer
5. Computers have increased the cost of living in our society. This is because computers require
servicing and maintenance; they increase power bills, internet charges, which may be very
expensive for some people and thus stiffening the economy.
6. Computers are liable to virus attacks especially if the computers are on the internet. These
viruses which are usually spread from one infected system or network usually cause heavy
data loss to organizations.
7. Computers have increased the rate of forgery in society today. People use computers to forge
receipts, invoices, reports and other documents to obtain money by false pretence which has
led to many losses to some organizations.
8. Personal security has been jeopardized. With the internet, personal information like bank
account numbers, PIN, and other personal info can be easily found by hackers who may use
them in wrong deals.
9. Computers have increased diseases and pollution of the environment. Computers consist of
dangerous metal elements like lead, which can be dangerous to the environment once they are
not properly disposed of
10. Computers have increased laziness and overdependence in society. Most work is done by the
computer today and some people can’t do anything when the computer breaks down. For
example in factories, offices, banks, business comes to a standstill when the computer system
breaks down.
11. Computers use power which may not be available in all areas. This has left some areas, regions
lagging behind others in this information and technological age.
1.6 CATEGORIES OF COMPUTERS
CLASSIFICATION OF COMPUTERS
Modern computers fall into various categories. These categories are classified in the following ways:-
Classification by size/capacity.
Classification by process/function.
Classification by purpose.
Classification by Processor Power
1. CLASSIFICATION BY SIZE.
Under this classification, computers are categorized depending on the physical size. Some computers
are very large while others are very small. The categories under this classification include:
Desktop: Designed to be stationed in one place probably on top of a desk; they are the standard PC’s.
The development of other micro computers evolved around these.
Tower Computers: These have their system units standing erect like a tower. It is designed to be
placed anywhere.
Laptop: These are designed for mobile computing. They are designed to be placed on ones lap that’s
why they are called laptops. They have batteries which enable them to continue working in the
absence of electricity.
Palmtops: These are hand held devices. They can fit in the palm of a hand, hence the name.
PDA (Personal Digital Assistant). These are hand held devices. Although they may not emulate all
the features of a desktop (PC), they have most features which can be used in computing. They are
designed for persons ever on move.
Can fit in a shirt pocket and at any time, one can check e-mail; take a few notes, etc.
2. CLASSIFICATION BY FUNCTION/PROCESS
Under this classification, computers are classified according to how they process and present data or
how the computer is designed to operate (function)
Digital computers
Analog computers
Hybrid computers
(iii) Hybrid
These combine both the characteristics of Digital and Analog computers. These may include the
Micro computers that are widely used today.
3. CLASSIFICATION BY PURPOSE
Computers here are classified according to the work they are designed to do.
These are categorized into two.
Special purpose machine.
General purpose computer.
(i) Special Purpose Computers
They are designed to handle only a specific task(s). Their form of operation is restricted in nature, e.g.
digital watches and pocket calculators.
Special purpose computers can be employed in devices like missiles.
(ii) General Purpose Computers
Designed to solve a wide range of problems, they perform a variety of tasks by means of specially
written programs. These can perform calculations, keep date and time, process documents, store
databases, etc.
Processor power has been rapidly increasing due to the changes in technology. Computers are getting
faster and faster each year.
Earlier, computers had a processing power of 0.4 MIPS but today 15MIPS is the minimum.
It is common for people to classify computer according to the type of processor power they posses.
ii) THE MOUSE The left mouse button or the primary button
This is a hand held device that lets one point at is the most commonly used button. It is found
on the left hand side of the mouse. It carries incorporated in between the two
out all the functions of the mouse apart from buttons. This makes scrolling
right clicking. the long web pages over the
internet easy to do.
The Right Mouse button or the secondary Track Ball Mouse (common on
button is found on the right hand side of the laptop computers).
mouse. It is used for right clicking A rolling ball and buttons
embedded with in the keyboard.
The wheel is found in the middle of the left Just a small head protruding
and right mouse buttons. It is used to scroll through the keys on the
long pages up or down. keyboard is the one which is
used to move the mouse pointer
NB. The action of pressing the left mouse bypassing a finger over it.
button once is called clicking and not left Touch pad mouse (Laptops).
clicking as it may be the case with the Right This has a rectangular pad with
mouse button 2 push buttons. The movement
of a figure on the pad causes the
mouse pointer to the position
accordingly.
The Optical mouse
MICE TYPES This employs the principle of
The Desktop Mouse. laser beam of light to transmit
This is commonly used with signals to the CPU
desktop PC and it has two push The cordless Mouse
buttons on top and a ball on the This is a recent invention in the
underside. This mouse employs mouse technology. It does not
the principle of moving a ball have a cord (wire) attached to
which in turn moves rollers the system unit. The computer
adjacent to it. These then senses the mouse when it is
transmit the electrical codes that within reach because of the
relocate the pointer or cursor on program installed in it.
the different co-ordinates of the iii) THE DIGITIZER
screen. A digitizer looks like a mouse except that; it
With the rise of the internet and has a glass with a crosshair in the middle. The
a rolling wheel has been cross hair acts as a guide during the input if
data. It is used in conjunction with a digitizing vii) TOUCH SCREENS
tablet. It is mainly used in cartography (map These are screens that can sense when a
making) and architectural drawings to particular part of a screen is touched or pressed
accurately trace outlines on a map. and hence respond accordingly. These are
iv) OPTICAL SCANNER commonly used with security systems which
Optical scanners look like photocopiers but for can lead the fingure prints of an individual.
them, the images are not output on paper but Most PDAs use touch screens as their basic
are transmitted as an image to the computer. input device.
The image can be a photograph, an art work or Some sophisticated mobile phones use touch
just a text. Pen pocket readers use these screen digits instead of the press and button
scanners principle to read lines of text which is digits.
displayed on the peris screen or downloaded to viii) LIGHT PENS
the PC. Most pocket readers can translate the Light pens commonly used in high technical
scanned text into another language other than designs have a beam of light that is radiated
the original. This makes them a very good into different parts of a specialized screen to
companion for travelers in foreign land. input data. These beams of light are very
small and sharp, therefore very precise. Light
v) JOYSTICK AND GAME PADS pens are commonly used in hitech designs like
A joystick looks so much like the normal gear in the designing of integrated circuits (IC).
lever in a car. They also have the same ix) DIGITAL CAMERA
principle like a mouse except for them they are These take photographs like the normal camera
a bit freer. They enjoy a combination of does. The major difference is that they do not
features of a mouse plus cursor control keys. create an image on a film and in the ordinary
This enables them rotate through a much wider camera but instead, the image is stored and
angle. Joysticks are commonly used in later downloaded into a PC for further editing
modern computer games. or printing
2. OUTPUT DEVICES.
vi) VOICE RECOGNITION EQUIPMENT These are devices used to bring out the
(VRQS) computer held information to the users’
The VRQS include all types of microphones disposal. They accept/transfer information
which are used to capture sound. Most from the central processing unit and produce it
multimedia computers have at least one in a suitable form for the user.
microphone. Musicians use multimedia These devices include:-
computer computers to edit, record Monitors/VDU,
(computerize) their musical tracks. Printers,
plotters,
speakers
3–D spectacles
Projectors
Facsimile machine
The common hardcopy output devices are printers and plotters while softcopy output devices are the
monitors / VDU, Projectors, 3-D spectacles and loudspeakers.
The type of output device to be used depends on the type of data or information to be output i.e
whether one needs to produce hardcopy, softcopy or any of the above forms of output.
1. THE MONITOR
This is the output device which brings out a copy of the computer held in the screen.
The output in the screen is referred to as the softcopy (Non- tangible copy).
By Color
Monitors can also be categorized according to the color they display. Some monitors display one
color while others can display many colors.
Monitors which display one color are referred to as Monochrome Monitors while those which display
many colors are called Polychrome monitors.
A monochrome monitor works just like a black and white TV screen and a polychrome monitor
works like a color monitor TV
There are also,
Flat panel monitors for laptops and other small computers.
Touch screen monitors- allows one to touch with ones finger on the desired icon or menu on
the screen to perform the action one wants.
The monitor works by converting information generated by the computer into visual information.
There are two main types of display devices or monitors
- A video screen with a cathode ray tube (CRT) or
- A video screen with a Liquid Crystal Display (LCD)
* A CRT- based screen, or monitor looks like a TV set; information from the CPU is displayed using a
beam of electrons that scans a phosphorescent surface that emits light and creates images.
Advantages of CRTs
Can produce fast and good color output
They have a very wide viewing angle
They are cheaper than LCDs
Disadvantages of CRTs
Emit higher EMR (Electromagnetic radiation) than LCD monitors
Consume more energy than LCD Monitors
Consume a lot of space in a room
* An LCD based screen displays visual information on a flatter and smaller screen than a CRT-based
video monitor. LCDs are frequently used in laptop computers and flat screen monitors. They use a
liquid crystal rather than a cathode ray tube to create images on the screen
Advantages of LCDs
They are lighter and therefore easy to transport
Occupy little space on the desk or table
Use less power
Have little radiation and thus have less effect on the eyes
Disadvantages of LCDs
They are more expensive than CRTs
They have a very narrow viewing angle
They have a relatively poor output compared to CRTs
Slow response at time
2. SPEAKERS
These produce sound outputs with today’s multimedia programs (e.g. windows, media player),
speakers have become such an important necessity. Their quality is mainly measured in Watts of
power output. Most speakers use a cone diaphragm to produce sound.
3. 3–D SPECTACLES
These are common in modern computer games especially on flights.
The user wears the glasses like ordinary glasses/sun/except that instead of seeing through the glasses,
one will be treated to a high quality three dimensional (3D) picture. It is similar to being in a cinema
hall.
4. PROJECTORS
These are softcopy output devices. They are used to display information for bigger audiences on
bigger screens or special wall. However, projectors require great light control for maximum results.
5. PLOTTERS
These can be compared to line printers. Because they have a pen like print head that can accurately
draw straight, thin and meandering lines. This makes them suitable for architectural drawings and
map making. Modern plotters can produce color images with the help of various color print heads
controlled electronically.
These are used in printing the best graphics or sophisticated drawings. They can produce very
accurate copies. They are very useful to engineers, architects and others who need detailed drawings
in their work.
These printers can also be categorized by the type of paper they use:-
Single sheet printer (d) – a.k.a feed one sheet of paper is fed and printed out at a time.
Continuous – Form or fan hold printing:- use long paper connected with perforated lines.
6. PRINTERS
A printer is an output device that brings out computer held information on paper or any physical
medium.
This text or graphics printed on paper is called HARDCOPY (tangible copies). A printer is capable of
printing characters, symbols and sometimes graphics on paper.
Printers are categorized according to whether the image produced is by the physical contact of the
print mechanism with the paper or not. Thus, there are 2 categories of printers, namely;
Impact printers
Non-impact printers.
1. IMPACT PRINTERS
This type of printers produces a hardcopy output when their print heads are physically touching the
print medium. This is the reason why they make noise during printing.
Print media include paper, transparencies, cloths, some plastics, wood e.t.c.
In the drop-on-demand technique, liquid ink is pushed out of the printer nozzles drop by drop. In the
intermittent technique, the ink is pushed out of the nozzles in a continuous stream.
Nozzles are tiny holes in the print head through which ink passes. The ink is pushed out by the ink
pumps which are found on every nozzle.
Examples include:
Hp DeskJet 690
Epson stylus 640
Bubble Jet printers
BubbleJet printers, also known as Thermal inkjet printers.
Thermal printers use a bubble to force out a droplet of ink. This is done by the ink pumps heating ink
in a column until when a bubble is formed. The bubble grows larger and larger until it bursts forcing
out a droplet of ink through the print head nozzle on to the print media.
Since the droplet is hot it dries faster on paper than on the DeskJet.
Although these pumps work much faster, they are restricted to a rate of only 1000 dots per second
because the mechanism needs time to cool otherwise the temperature would dry out the ink.
Example of bubble jet printers are Canon BJC200.
Thermal printers
Thermal printers’ print heads do not need to strike the paper directly or through a ribbon in order to
create character on a paper.
With thermal technology, the printer’s print head contains dot heaters (heating elements) which cause
dots to appear on special paper (temperature sensitive paper) when heated.
During the printing process, the printer head transfers electrical energy every dot heater which heats
up rapidly. The heated up dot heater then causes specific points on special paper to discolor
accordingly.
Thermal printing papers normally discolor to a black or blue color in accordance to its make.
Thermal printers have a few disadvantages associated with them, these include;
They cannot print on any paper because the heat generated will not cause any discoloration
without burning the entire paper.
These papers are also limited to a particular shelf life, the longer they stay unused or used the
more they will be affected by age, sunlight, humidity and chemical vapors which may cause it
to discolor completely thereby causing the words to disappear.
The paper(s) has to be specially prepared before they can be used in printing. This caused an
inconvenience in commercial production because they can only be stored only for a few years
before they go bad.
Their print heads cannot be serviced or repaired even if a single dot heater fails. The whole
print head has to be replaced thus making them expensive to maintain.
The print speed is also so slow because the heads have to be allowed time to cool before the
next printing cycle.
Thermal print heads have a shorter life span than other print heads they are expected to print a
maximum of 10 million characters accurately where as other print heads like dot matrix
printers go over 50 million characters in their life span.
Laser printers
These are high quality printers with a greater NLQ (Near Letter Quality). They have a high speed in
printing.
They are also low noise printers during printing unlike dot matrix. Excellent graphics are obtainable
with these types of printers.
A laser beam of light is used to transfer the image stored in the printer’s memory on to a special
drum. The drum attracts the toner (the ink used to print the words) and the paper is pressed against
the drum so that the image is transferred to the paper. The image is then heated before it comes out of
the printing paper.
Laser printers are the best modern printers today.
Examples,
- Hp LaserJet 1100 (series)
- Hp Laser Jet 5M (color) printer
- Hp Laser Jet 1020
These are devices which are used to store computer held information. Storage hardware provides
permanent storage of information and programs for retrieval by the computer. Storing information in
computer studies is referred to as saving.
NB Storage devices/hardware/ secondary storage devices or Auxiliary storage devices are very
essential because the memory (RAM) which is mainly used during processing as the storage space
loses its contents when power is switched off.
Secondary Storage devises store data in a seemingly permanent form whereas primary storage
devices store data in a temporary form.
1. HARD DISK
This is a round pan cake shaped, permanently sealed metallic magnetic storage device with in the
processor. It is tightly sealed to keep out contaminants like dust and smoke.
The hard disk is also known as the fixed disk because it is not portable; it is always fixed within the
system unit. It’s fixed in a mechanism called the HARD DRIVE inside the computer.
It is fixed into the computer for storing data and computer software programs.
It stores a vast/huge amount of information than other storage devices like the floppy diskette. Its
capacity is higher than that of floppy diskette.
The hard disk space is measured in Megabytes or Gigabytes. Typical size; 540MB, 10GB, 20GB,
40GB etc
The 3.5” Inch diskettes are now the most common ones. It has a storage capacity of 1.44MB.
Each size works only with a drive made for its size.
Floppy diskettes are inserted in a mechanism called the Floppy drive, which spins it at a high speed.
There is a head in the drive which reads, writes and stores new information on the floppy disk. This
head is also known as the Read/Write head
NOTE: A drive- is a slot or opening on the computer system unit where a storage disk is inserted.
DISADVANTAGES
They are vulnerable to harsh conditions of storage like temperature changes, moisture,
bending and breaking, which might cause the data life being unreliable. This is mainly
because diskettes are external media and are made of plastic.
It can lose data so quickly once the magnetic media is exposed to a magnetic field.
They store less data compared to any other mentioned storage device. Maximum of 1.44MB
of data is stored.
They are expensive in the long run since their destruction rate is high resulting into buying all
the time.
They can be attacked by virus which causes data loss
Compact disks are a recent development in the computer industry. It is capable of storing vast amount
of information. Most of the computer software stored is supplied on a CD.
CD-ROM can store as much information as hard disks but have a slower rate of information retrieval.
They are called compact disks because they are small with a diameter of 12cm and thick ness of a few
millimeters.
CD-ROM stands for Compact Disk – Read Only Memory. Read only memory means that the
information on a compact disk is stored in a permanent accessible form. On CD-ROMs, nothing new
can be recorded.
A CD-ROM can store programs, text, pictures, animation, movies and sound.
DISADVANTAGES
Their destruction rate is high since a single scratch may lead to its destruction.
They are prone to scratches which render the entire CD worthless or useless
Some CDs are read only, which means that the data can’t be deleted or customized whenever
one needs to.
Their average access time is slower compared to other storage devices like the CD
Some CDs may not be read by all computers. Even some computers don’t have CD drives
To record data on a CD one needs to have a data writing software and this may not be
available all the time
TYPES OF CDs
CD-R (Compact Disk Recordable)
CD-RW (Compact Disk Re-writable)
CD-ROM (Compact Disk – Read Only Memory)
CD – Rs are used only for one recording after which it becomes a CD – ROM.
CD – RWs can be written on and or re-written more than once. Once the data is written on it, it
remains on until the user decides to alter it.
CD-ROMs can not allow the user to write there anything. They usually contain the manufacturer’s
instructions o
n the usage of a particular hardware piece and the user is not allowed to make any changes.
Read Only Memory means that the user only reads what is on the CD and can not make any changes
to it.
Their advantages and disadvantages are the same as the CD-ROMs discussed above.
4. THE FLASH DISK
A flash disk is in the same way like the hard disk only that it is an external storage disk while the hard
disk is internal and at times referred to as the default storage device.
6. PUNCHED CARDS
These were among the first forms of storage devices in computers. They are/were flat cards which
consisted of rows of numbers and letters neatly arranged in columns.
To store data, the card was inserted in a computer drive and the computer punched a series of holes in
the rows of characters to represent data stored. In the read process, a computer read out words in the
order of holes previously punched
DISADVANTAGES
Because they were made of paper, they could easily be destroyed by moisture, cockroaches,
rats and tear.
The storage capacity was very small. They were small rectangular paper/cards about 5x10cm.
This means that only a few sentences would be stored on (24 characters).
Because of limited capacity, one would need very many of them to store just a few records in
the data base. This renders them bulky.
Their data life was rather limited because paper depreciates with time.
NB: Of all the secondary storage devices, only the floppy diskette, the hard disk, flash and CD-
ROMs, the others are no longer in use due to drastic changes in technology.
This is the most common type of memory. It’s called RAM because its contents can be read directly
regardless of the sequence in which it was stored.
Its contents are held temporarily, its contents are lost once the computer is turned off. This is why we
should always save our work on a secondary storage before switching off.
CHARACTERISTICS OF RAM
Data can be read (retrieved) and written (stored) in it.
RAM is temporary (volatile) storage because its contents disappear when the computer is
switched off.
Its contents are user defined i.e. they can decide what can be contained in RAM.
RAM can be changed or removed.
It’s a primary storage device.
It’s volatile. If you have data in this memory and there is a power failure, all your work will be
lost (wiped off) to avoid this, you should always save your work on a permanent memory.
Such as diskettes, CDs, etc (secondary storage).
Occupies the major portion (70%) of the main memory.
NB:
Its size is very significant in determining how good the computer is.
It’s measured in bytes.
The bigger the RAM, the better the computer.
TYPES OF RAM
There are two types:-
Static RAM (SRAM) and
Dynamic RAM (DRAM)
Static RAM is very fast compared to DRAM and holds its contents as long as there is power.
DRAM however; can hold its contents for only a short period of time even when power is on.
The contents of DRAM can be maintained by refreshing the memory chip several times per
second.
SRAM is more expensive. It’s used to make special types of memories.
It’s used to store programmed instructions and data permanently or semi permanently.
Data and instructions stored in ROM are those required to remain unchanged for long periods of time
e.g. booting instructions.
TYPES OF ROM
There are four types of ROM. This depends on the permanence of the instructions or data written
there.
Mask Rom: Once data has been written there, it can never be changed.
Programmable ROM: (PROM) - This allows the user to alter it only once after the content has
been written on it.
Erasable Programmable ROM (EPROM) - This has a transparent quartz window through which its
contents can be erased by exposing it to ultra violent (UV) light and then reprogrammed for another
use.
Electrically Erasable Programmable Rom (EEPROM) This can be erased and reprogrammed using
electricity. An example is the basic input and output system (BIOS).
CHARACTERISTICS OF ROM
One can only read its contents but you can not write on it unless it’s a special type of ROM.
It’s non-volatile i.e. its contents can not be lost when the computer is switched off.
Stores permanent or semi-permanent instructions from manufacturers called FIRMWARE. It
can store semi-permanent instructions because some variations of ROM chips can be
programmed according to the user’s specifications.
This is part of the main memory which keeps only in-built set of instructions and information called
FIRMWARE. The firmware is entered into the computer at the manufacturing period.ROM keeps this
information permanently whether power is off or on.
The computer can read the instructions in Rom but it can’t write to it or the instructions hence the
name Read Only Memory. The user can not keep his/her information in ROM. Rom occupies a
smaller portion of the main memory.
Memory allows fast access to permanently stored data but prevents addition modification of the data.
It’s a memory chip that permanently stores instructions and data.
Is used for storing the program in the control unit of the computer. Used for program designs for
repeated use with out modification.
RAM ROM
It is Volatile It is non-volatile
It can be read and written to Its contents can only be read
It offers temporary storage Offers permanent storage
Its size can be increased Its size may not be increased
These memories are very vital because they increase the overall performance of data and instructions
moving in and out of the CPU.
These memories include buffers, registers and catch memory.
BUFFERS
This is a temporary holding place that may be part of the CPU or built in an input or output device.
Because the CPU is very fast compared to the input or output devices; buffers provide temporary
storage so that the CPU is set free to carry out other activities instead of waiting for all data to be
entered or information to be output. For example, since a printer can not work at a speed of a CPU,
the printer buffers temporary holds the output to be printed hence freeing the CPU to perform other
functions.
Buffers can hold more than one piece of data at a time.
REGISTERS
Unlike buffers, registers hold one piece of data at a time and are inside the CPU.
CACHE MEMORY
Most modern processors incorporate small high-speed type of SRAM called Cache Memory. The
purpose of cache memory is to allow the processor to access data and instructions even faster than it
would have taken to fetch it from the relatively slow DRAM.
4. PROCESSING HARDWARE
The Central Processing Unit (CPU) carries out all the data processing in the computer. It’s usually
referred to as the brain of the computer.
The CPU is sometimes referred to as the processor or central processor or the micro-processor
In terms of computing power, the CPU is the most important computing element of a computer system.
Logical operation is the ability to compare two quantities or numbers to determine which is greater or
equal or less than the other. It also involves testing the existence of a condition encountered during the
processing of an application. Understanding the instructions accordingly
THE REGISTERS
A special high speed storage area with in the CPU, All the data must be represented in a register before it
can be processed. E.g. if 2 numbers are to be multiplied, both numbers must be in registers and the
result is also placed in the register.
The register can contain the address of a memory location where data is stored rather than the actual data
itself. The number of registers a CPU has and the size of each determine the power and speed of CPU.
E.g. 32-bit CPU is one with in which each register is 32 bit wide. Therefore each CPU instruction can
manipulate 32 bits of data.
COMPUTER SOFTWARE The term software can related to the word soft,
What is meant by computer software? which implies that computer software is soft and
It a set of detailed step-by-step instructions, flexible and changeable in nature.
which enable the computer hardware to perform
its assigned tasks COMPUTER SOFTWARE
It is a complete range of computer programs that CLASSIFICATION
enable the computer system to perform a Computer software is sub divided into two main
specific function. groups:
Computer software is sometimes referred to as 1. System
the machine’s intelligence. This is because it is software.
the software, which directs the hardware when 2. Application
performing its functions. software.
Language Processors
Fifth Generation Language (5GLs) These are used to translate high level languages
These are normally used in intelligence based into machine code language so that they can be
systems such as robots. Unlike 4GLs, which understood by the computer. They work
manipulate numbers or data, these manipulate backwards to the processor.
various facts and rules to reach at a conclusion.
Therefore they can ‘think’, just like humans. Examples of Language processors include;
This is why they are extensively used in Compilers
Artificial intelligence projects like in Mars Assemblers
Exploration. Interpreters
Linkers
Compilers
These translate a program written in high level language into machine code or into an assembly code
program. The entire program is translated into machine code at compiling time.
Assemblers
These translate assembly instructions into binary code or machine code, a format that is understood by
the processor. They normally begin from where compilers stop.
Interpreters
An interpreter translated a source program line by line while the program is running. This is done each
time the program is executed and this makes the program runs.
Linkers
These programs combine compiled programs and determine where the program will be located in
memory. When the linker has transformed an object code, an executable file is generated. This normally
results in files with extensions .exe
It co-ordinates the operation of the hardware components and application software programs of a
computer.
It is software through which the user communicates or interacts with the computer. This means that it
controls the user’s access to the computer facilities like the scanners and printers and the network.
The Operating system is loaded onto the computer’s memory (RAM) first. It checks and ensures that all
parts of the computer are functioning properly as the computer is booting.
The Operating system acts as a platform on which other programs can be placed. If the operating system
is not yet loaded other computer application programs cannot be loaded or used on that computer.
Every application program must be written to run on top of a particular operating system.
Hardware
FUNCTIONS OF AN OPERATING SYSTEM
The operating system carries out all the activities in the computer but below is a summary of the clearest
functions carried out by an operating system.
The Operating System creates an environment in which the user can run other programs. The general
functions of an Operating system are:-
1. Job Scheduling
This includes scheduling and monitoring jobs for continuous processing by the computer system.
A job is a group of tasks taken as a unit of work for a computer, which may include one or more
computer programs, files and instructions to the operating system. Some of the job scheduling functions
include controlling the loading and running of programs, communicating directly with the users and or
the operator and dealing with user commands to organize file and programs.
2. Resource Control
The operating system controls the use of computer resources by other system software and application
programs being executed. These resources include input and output devices and the CPU.
3. Processor Management.
A multi-user or multi-tasking computer system can be accessed by several users or applications at the
same time. However, the CPU can only execute one program at a time therefore access to the CPU must
be carefully controlled and monitored. The operating system must decide which program will be allowed
into the system and for how long.
6. Memory Management
Operating systems determines how much memory is allocated to a particular program whenever it is
being used and for how long. Because the RAM is a scarce resource the operating systems determines
which data remains and which one is pushed out after execution.
7. Error Handling
The operating system deal with errors produced during program execution and keeps the computer
running when errors do occur or notifies the user and normally gives suggestions on how to handle it.
8. File Management
The operating system keeps track of the information in the computer, its location, use and status. The
collective facilities which manage computer files are called the file system.
A file system is concerned with the logical organization of the information and provides a means for
sorting, retrieving and sharing files. The operating system may also provide a means of protection for
data files and programs against unauthorized access and corruption.
For larger computers and networks, the operating system will have some additional functions such as
producing a record of all programs as they are being run, maintaining security, ensuring that users
authorized to use the computer system access it, organizing the use of storage since this has to be shared
among different users, working out the resources used by each program.
Windows 3x
This is one of the earliest operating systems to be launched by Windows. It is used together with DOS to
give DOS a complete applications environment.
These provide better multi-tasking abilities; can provide network support, better power management,
improved battery life and productivity for laptop users.
Their new interface provides users with various options of starting application programs i.e. it’s either
from shortcut folders or the start menu.
They have plug and play ability which helps in installing new devices.
Unlike Windows 95, Windows 98 provided better support and integration with the internet explorer and
made it an ideal tool for web browsers.
OS/2 (Operating Systems - 2)
This has also got multi-tasking abilities. It was designed for IBM model 50 and above computers. It was
designed by Microsoft and IBM Corporations collaboratively. It has GUI features. Doesn’t hang up
when one application program fails.
Novell Netware
It’s a LAN Operating system for IBM standard computers running MS-DOS or OS/2. It has a Netware
Directory Service (NDS). It maintains a directory of network resources and limits access to
authenticated users only. It allows sharing of resources- files, programs, printers, E-mails etc. It’s very
useful in places which are interconnected. It was developed by Novell Inc in 1983.
Windows NT 4.0.
It has features similar to those of Windows 95 and 98 but with integral/essential security and networking
abilities.
UNIX
This is a multi-user, multi-tasking and time sharing system, which was developed at AT and T Bell
Laboratories for mini and mainframe computers.
LINUX
This has features similar to those of UNIX.
Windows CE
This is Windows Compact Edition. It is specifically designed for PDAs. It has an environment
similar to that of the other windows operating system i.e. It has task bar, icons and menu bar.
EPO
Pocket PC 2002
A single user or single tasking system allows one user to operate one program at a time. It can not
support more than one person and supports only one user program at a time. An example is MS-DOS.
Operating systems can be classified into three categories according to the user interface
Windows
Windows are rectangular work areas provided on the screen. In each window a different program or file
can be run. Windows can be moved around the screen and their size and shape can be changed at will.
Icons
These are small pictures that represent commands, files, or windows. Clicking on these icons can
execute a command. This makes the computer easier to use even for those who can’t read.
Menus
A menu is a list of choices. GUI can allow one to execute a command by clicking at a choice from the
menu.
Pointing Device
This refers to a device like the mouse which enables one to select objects by moving the pointer around
the screen.
Desktop
This is the area on the display screen where icons are grouped. Icons are meant to represent real objects
on a real desk.
Pointer
This is a symbol that appears on the screen which is moved to select objects and commands. Normally, it
looks like a small angled arrow though it can be changed at will. Examples of Operating systems under
this category include:-
Windows (95, 98, 2000, XP, Vista, me, NT)
Susie Linux
Novell Netware
Apple Mac OS
Linux
(i) Multi-tasking.
This refers to having several programs running simultaneously on the computer. For example; you can
send a page to print and continue typing a document.
(ii) Multi-threading.
Is when each process runs one or more thread when this happens, it appears to the user as if the
application is performing several tasks at once. For example; Window 95, which performs a spell check
as you type. There is a thread responsible for accepting user input and another for checking the spellings.
A thread is the smallest unit of an execution.
(iii) Multi-Processing.
Tasks are shared among several processors and run simultaneously.
DOS WINDOWS
Requires little memory - More memory
Requires less disk space - More disk space
Not user friendly - User friendly
No ability to multi-tasking - Multi-tasking ability
Cannot be easily corrupted (destroyed) i.e. more stable - Easy to corrupt
When choosing an operating for a computer the following should be put into consideration.
The computers specification for example memory capacity, processor speed, hard disk capacity
etc.
The type of computer in terms of size and make. This would tell you to buy either a PDA or
Desktop Operating system
The application software intended for the computer. This because some applications cannot be
supported by particular operating systems
User friendliness of the operating system
The cost of the operating system
Reliability and security provided by the operating system
The number of processors and hardware it can support
The number of users it can support
APPLICATION PROGRAMME / SOFTWARE
Application programs are programs/software developed to solve the user’s specific problems or tasks.
These are programs which are designed to help the user accomplish specific tasks.
Application software/program is developed for a particular purpose.
These are programs which are uniquely designed and tailored to meet a particular user’s needs.
This is a program that is designed and written just to solve the particular problem for a particular group
of people.
These are not bought from shops or from the counter; the program may be developed by a software
house, a private individual or developed in-house by some one within the organization.
They are designed for a particular market or an identifiable group of users such as; hoteliers, farmers,
SACCOS, schools, banks etc.
They tend to be more expensive and sell fewer because of being occupation specific.
1. WORD PROCESSORS
A word processor is application software that enables a person to create, save, edit, format and print text
documents.
Word processing therefore, is the act of using a word processor to create, save, edit, format and print text
documents.
2. SPREADSHEETS
These are application programs used for the manipulation of numeric data and carrying out calculations.
It is a ledger sheet that lets you enter, edit and manipulate numeric data
TYPES OF SPREADSHEETS
1. MANUAL SPREADSHEETS
These are simply sheets of paper divided into rows and columns which can be used to enter values for
example amounts of money manually using a pen or pencil. They are common in book keeping and in
accounting offices.
2. ELECTRONIC SPREADSHEETS
Electronic spreadsheets are computer based. They are computer programs, which enables the user to
enter values in rows and columns just the same way it is done in manual spreadsheets.
Electronic spreadsheets allow one to manipulate values (numbers) mathematically using formulae.
DISADVANTAGES OF SPREADSHEETS
1. It’s not easy to create documents like letters, reports, or books in this program.
2. It is usually difficult to print spreadsheet because the print area must be set before printing.
3. One error created in calculating formulae can distort all the results in the worksheet.
4. Some formulae may be difficult to formulate
5. They only work when there is electricity, which means that when there is no power all work stalls
6. Since they are computer based, they are liable to virus attacks which causes heavy data loss
7. One needs to be skilled to use them unlike manual ones which need one to only read and write
8. They are expensive to maintain because they may require servicing, paper and ink for printing
COMPONENTS OF A SPREADSHEET
A spreadsheet has three components.
1. Worksheet: A component where data is entered. In Excel, they are three worksheets by default
2. Database: This refers to related data entered into the worksheet.
3. Graphs: This is a pictorial representation of data on a worksheet. Graphs a.k.a Charts
1. Statistical analysis
Spreadsheets can be used to perform complex and simple statistical analyses, which can even be
represented on charts. Simple statistical analyses include average, Median, minimum, maximum etc.
2. Accounting
Spreadsheets are very much ideal as a tool for recording daily transactions and keeping financial
records. They have inbuilt functions which make accounting tasks easier. They can be used to calculate
depreciation and appreciation (value of assets), calculate profits, prepare budgets etc.
3. Data management
Spreadsheets enable neat arrangement of data in rows and columns. This data can be easily sorted,
filtered and compared using spreadsheet functions. They enable the user to create, edit, save, retrieve
and print worksheet data.
Ms Excel,
Lotus 1-2-3,
VisiCalc,
SuperCalc,
Ms Frameworks,
VP-Planner
Quattro Pro.
Microsoft Excel is the most common spreadsheet application. Microsoft Excel has like other software
versions gone under various updates.
A Microsoft Excel worksheet like other Microsoft application programs displays toolbars. By default,
the Menu bar, Standard toolbar and Formatting toolbar, are displayed in that order.
In case they are not displayed,
Point/click view from the Menu bar,
Point to toolbars
Click/check on the toolbar desired.
Title bar
It’s a toolbar which holds the title of the application and control buttons for minimizing, maximizing and
closing.
Worksheet Tabs
These are also called worksheet labels. These are usually indicated sheet 1, Sheet 2, Sheet 3.
These tabs can be changed by right clicking and then renaming them after clicking, rename from the
short cut. Double clicking also can help one rename them.
Formula Bar
This is also referred to as the Edit toolbar. It indicates the contents of the active cell. It is called the edit
toolbar because the contents of the worksheet and the formula can be changed from it. It has an equal
sign or fx and a the name box which displays the current cell. The current cell refers to the cell in which
data or formula is being entered.
Cell pointer
This marks the position of the current cell or the insertion point. It is a special cursor that is rectangular
and makes the current cell appear as if it is darker boundaries
Range: - A group of adjacent cells. A range in a rectangular group of cells. E.g. A1:B8
Cell: - This is the intersection of column and row. It is the basic unit of a worksheet
Worksheet: - One sheet in a spreadsheet workbook. A worksheet is a grid of columns and rows.
It is a component in which data values are entered. The rows are numbered 1 to 65536, while
columns are lettered (A, B, C…….)
Ms Excel by default presents three worksheets in every workbook when opened but more sheets
can be added.
Workbook: - This is a collection of worksheets grouped together.
Cell Address: - This is a reference to a particular cell. It is the position of a cell in a worksheet. It
is given by the column letter and row number respectively e.g. D24. The cell reference is very
vital when formulating formulae.
Range Address: - A range reference which has a format of top-left cell address or e.g.D13:F20.
Formula: - A worksheet entry that calculates data. It can consist of numbers, text, operators, cell
addresses, range names etc.
Active cell: - this is the cell in which the cursor is situated at a particular moment. It is the
selected cell where data is being entered.
Row: Horizontal arrangement of cells.
Column: Vertical arrangement of cells
For example: A1 is the first cell which means that A is a column and 1 is a row. Therefore column A
intersects with 1 to form cell A1.
Spreadsheets are able to handle numerical data because of these and other special tools
Data sorting and filtering feature. This arranges data in ascending or descending order while the
latter removes some values/items depending on a given criterion.
Data validation feature. Ensures correct data is entered in the spreadsheet.
Printing of the entire worksheet or portions of it.
Ability to adjust column width and row, height, hide rows and columns and freeze.
Data formatting e.g. both text and data can be formatted using certain formats (pre-defined
formats) e.g. integers, decimal, scientific, currency data etc. borders and shading.
Built-in functions and formulae for adding (sum) multiplying, percentages, counting, e.g.
(Minimum, Maximum, Average) trigonometric functions, financial functions etc. for example
=Sum(Range) adds the contents, =SQRT (cell) Returns the square root of the Minimum,
Maximum value in a cell.
Charting: this feature helps the user to present data in form of pie charts, bar graphs, histograms
etc. charts accord an impressive look and an easy interpreted.
Labels
This refers to any text or alphanumeric characters entered in a cell. Labels are usually used as row or
column headings. Headings are used to describe the contents of the row or column. Labels can not be
calculated and are always. Numbers can be used as labels but an apostrophe must be used before that
number for example, ‘2013. Other examples of labels include NAME, ITEM, etc.
Values
These are numbers which can be calculated mathematically. They may include numbers 0 – 9, currency,
date, special symbols like +,-, #, @ etc, which can be used for calculation.
Formulae
This is a worksheet entry that is used to calculate data. It is an expression which creates a relationship
between cells and returns a value in a chosen cell. A formula in excel usually begins with an equal sign.
For example, =B2+C2. Formulae are constructed using cell references.
Functions
These are inbuilt predefined formulae that the user can quickly use instead of having to create a new one
each time calculations are to be carried out. Most common calculations have their formulae predefined
like SUM
ARITHMETIC OPERATIONS IN MS EXCEL/SPREADSHEETS
A formula can be built using operators and separators like brackets. Formulae perform mathematical
operations ranging from very simple arithmetic problems to complex scientific, financial and
mathematical analysis.
TYPES OF FORMULA/FUNCTIONS
Three types in spreadsheet
3. Logical Formulae/Functions
These are statements that evaluate conditions. They result into 1 if true, =,>, < and >< and also and OR
and NOT.
Examples of logical functions include;
If: It returns a specified value if a condition is evaluated and found to be true and another value
if it is false.
Count if: Counts the number of cells within a specified range that meet the given criteria. If the
cells A1:E1 contain eggs, beans, beans, eggs, eggs; the formula would look like;
=countif(A1:E1,”eggs”) this will return 3 as the answer.
Sumif: This adds values in cells specified by the condition or criteria. For example, if the cells
A1:E1 contain values 1, 2, 4, 5, 7 to sum all values greater than 4 the formula would look like
this. =sumif(A1:E1,”>4”). 12 will be returned as the answer.
4. Statistical Formulae/Functions
Statistical functions include
Average: This displays the mean for a group of values. For example =Average(D1:D10)
Count: Counts the number of cells that contain values within the range. For example
=Count(D1:D10)
Max: Returns the largest value within the range. =Max(D1:D10)
Min: Returns the smallest value in the range. =Min(D1:D10)
Mode: Returns the most frequently occurring value in the range. =Mode(D1:D10)
Rank: Returns the rank (position/weight) of a number in a list by comparing its size with others.
=Rank(D1,$D$1:$D$10,1) this means RANK(number to be ranked, range, order) order is
usually 1 or 2, 1 ranks in ascending order while 2 ranks in descending order.
QNS
2002. State two examples of spreadsheet programs.
2000. What else can be input in spreadsheets besides text and numbers---Formula, Alphabet numeric,
text and numbers.
2000. Name 3 different operations which you would expect in a spreadsheet cell (in books).
2000. Name 3 different types of number format you would expect in a spreadsheet cell.
QNS:
a (i) What is an application package?
(ii) What is a custom made package?
File viruses
These attach themselves to computer files. They usually delete files or cause erratic behaviors in the file
system.
Hoax viruses
They are usually lies; they don’t exist in real sense. They only exist in the imagination of the press and
public. They don’t exist despite the rumor of their distribution and creation. The rumour about their
creation and spread is usually spread through e-mails or the press.
Worms
This sticks in the computer memory and re-writes (replicate) itself in the memory until it can’t multiply
anymore. This causes the computer to stop working because the memory is full.
Backdoors
This may be a Trojan or a worm that allows hidden access to a computer system.
Droppers
These are programs that have been written to perform useful tasks like compressing files, previewing
video clips etc. but end up introducing viruses in the system in the process of performing their functions.
Failed virus
These are viruses that have failed to meet their goals. This is mainly due to poor programming by the
author/designer or is intercepted by a real virus. They are common on the internet when downloading
software.
Packagers
These hide the existence of a virus from virus guard by masking some codes around the actual software
programs. It is only when a virus has appeared that you realize the software had a virus.
Test virus
These are simply written to test some virus guard or anti-virus software. They are not harmful, just for
learning purposes only.
Time bombs
A program code that’s activated in conjunction with predetermined days/events. For example,
Valentines, Fools’ Day, Friday 13th etc. These use logical calculations to determine their trigger days. A
virus or a Trojan may have a virtual logic in it.
Jokes
A joke is a harmless program that does amusing things on the screen. E.g. Messages like-“ Your
computer is about to explode in five minutes, please run away………….” These messages appear and
disappear in few seconds.
The following viruses are classified according to the way they hide.
File Viruses
This appends itself or inserts itself into program files like those, which have extensions .exe, .com; such
that when these files are run, the virus attacks other executable files either directly of indirectly. It
affects the memory of the computer and whenever the host file is executed, it attacks other files because
it uses the infected memory space.
Overwriting Viruses
These infect files by overwriting the entire or part of a file thereby causing the file not to execute or
work as it is supposed to do. These are normally DOS based.
Macro Viruses
With the introduction of macro programming languages in some applications, macro viruses have
emerged. These can cause some toolbar icons to work differently. Macro viruses are common in
Microsoft word documents.
Companion Viruses
A computer virus works by creating different file names with an extension .com similar to the executable
file with the .exe extension, such that it can be run first and pass control to the actual program file with
the .exe extension.
This is because when running programs under DOS, DOS will prefer to run a file with the .com
extension first rather than with .exe extension.
Multipartite Viruses
These are viruses that use a combination of techniques to infect the different executable files, boot
sectors and or partition sectors.
They are normally difficult to trap.
SOURCES OF VIRUSES
Viruses spread in various ways but the most common ways are:-
Fake Games
Computers games are a common source of viruses because most games are irresistible. Virus designers
design fake games and attach virus onto them. Once a game is executed, a virus is run and activated.
These games keep infecting systems as they are installed. Such games have “irresistible” names like
HOTSEX.EXE, JACKPOT.COM, ROMANCE.EXE etc.
Contaminated systems
Contaminated computer systems can spread virus if used freely. For example, installation diskettes for a
particular application program can introduce viruses on to a system whenever that application is
installed. There by spreading the virus. It is also common for pirated software.
Pirated software
The use of pirated software introduces the risk that the software may be contaminated by virus code or
amended to perform some other destructive function which may affect the system. Pirated software is
that which was copied illegally with an aim of making profit
SYMPTOMS OF VIRUSES
Unfamiliar graphics or quizzical messages appearing on screens.
Programs taking longer than usual to load.
Disk accesses seeming excessive for simple tasks
Unusual error messages occurring more frequently
Less memory available than usual
Access lights turning on for non referred devices.
Programs and files disappearing mysteriously.
Computer indicating that the storage devices are full.
Any evidence of these or similar events should be an immediate cause for concern to isolate the PC at
once and investigate.
ANTI-VIRUS PROGRAMME/UTILITY
An anti-virus utility is a program that prevents, detects and removes viruses from a computer’s memory
or storage devices. This utility is installed into the computer by the computer user or owner to perform
the very purpose identified above. The user is required to check or clean the computer regularly using
this anti-virus. Examples of common anti-virus programs include Kaspersky, AVG, Norton, and
MacAfee, Avila, Avast etc
BUGS
A computer bug is an error in a computer system (software or hardware), which causes undesirable
results or unwanted procedures.
A bug error can be both software and hardware problem or a programming oversight.
The millennium bug for example, was a hardware based error, which affected the computer clock.
Every computer contains two types of clocks i.e. the hardware clock, which is in-built also called the
RTC (Real Time Clock) and Virtual clock/system clock.
The RTC runs continuously whether the computer is on or off and the system clock is a 24hour timer,
which only exist when the computer is running. Therefore, it is the operating system that uses the bios
to read the RTC and track independently.
The millennium bug existed when programmers anticipated that computers may fail to recognize the
year 2000. The BIOS provided had a prefixed ‘19’ and it would therefore read the year ‘2000’ as 1900.
This is a code error (bug).
PREVENTION OF BUGS
Bugs are a consequence of the human factors in the programming tasks. They are caused by oversights
made by computer programmers during designing, coding and data entry.
The software industry has put much effort into finding methods for preventing bugs in programming
which include:-
1. PROGRAMMING STYLE
Innovations in programming style and defensive programming have been designed to make typing errors
(bugs) less likely or easier to spot.
2. PROGRAMMING TECHNIQUES
Programs can be written to check the inconsistency of their own internal data while running. If an
inconsistency is encountered, the program can immediately halt so that the bug can be located and fixed.
The program can also inform the user to attempt to correct the inconsistency and continue running.
These programs that locate bugs are called debuggers
3. DEVELOPING METHODOLOGIES
Programming has been made more automatic than manual because of simplified programming
languages so that fewer bugs can be produced through human error. .
QNS:
1(a) Explain what’s meant by a computer virus?
(b) State two precautions which should be taken to prevent viruses from affecting computers.
2003:
1(a) What is a virus?
(b) Outline four common ways in which viruses are spread.
(c) State four ways used to protect your computer Vs viruses
(d) Name any 3 virus scanning software.
(e) State 3 symptoms of viruses.
(f) Mention 2 ways in which a computer can be infected by a virus.
COMPUTER COMMUNICATION, INTERNET, INTRANET AND ETHERNET
Introduction
With dynamics in information technology (IT), computers have shifted from being used for typing,
editing and printing documents to act as a medium for communication.
Communication can be defined as a process that allows organisms to exchange information through
several methods.
It can also be defined as a process of meaningful interaction among human beings so as to produce
understanding
Information technology on the other hand refers to all the types of equipment and programs used in
processing information (ICT). This encompasses devices like phones, fax machines, copiers, telecom
masts, software programs etc
Communication is also used in the context where little or no feedback is expected. This is known as
broadcasting. In broadcasting, either the feedback is delayed because the sender or the receiver uses a
different method, technology; timing or the feedback is not expected at all.
In computers, communication is basically the interaction or use of computer resources on a network to
meet your needs. For example, E-mails and using the internet resources to find information of your
interest
THE INTERNET
The internet is a Wide Area Network (WAN) that is capable of linking millions and potentially billions
of computers around the world.
It can also be defined as the global connection of computers whereby access to information world wide
is enhanced.
It is a world wide system of inter-connected computers. The internet is not a physical thing (wires,
cables and computers) but rather a set of standards that allow computers of any brand or model to
connect with any kind of wiring (connection). It is just a technology for getting all kinds of computers to
communicate with one another and exchange data.
These standards are called the Internet Protocols (IP) or Transmission Control Protocols (TCP)
commonly referred to as (TCP/IP) Protocols.
TCP/IP is the set of rules that govern computers to communicate on a network including the internet.
To use the internet, you use a tool called a “client”. Your client contacts a distant computer where a
program called ‘server’ is running. The server dishes out the data you want and sends it to your client,
which displays it on your screen.
An internet tool called the World Wide Web (or the web) is the best way to access the riches and
resources of internet.
TERMS
HTTP
Stands for hypertext transfer protocol. It’s a set of rules and regulations that is used to send a page or
pages containing hyper text from one PC to another.
Hyper means over or beyond and thus hypertext is that text that will lead users to other related
information on demand through hyper link.
Website
A website can also be defined as a collection of pages on the web owned by an individual or
organization. It’s the location of the web domain name in a computer somewhere on the internet.
A computer with a domain name is called a site. The computer may be located at the office owning that
particular website but may also be located somewhere else entirely.
The first page a website is known as a Home Page. Every web page has a unique address. This address
is what is known as the URL (Uniform Resource Locator).
The URL usually begins with http://www and tells the web browser that it is looking for a web page.
Most modern browsers have http:// stored so you can start at www.
The text after the www shows the domain name or the organization’s name. For example, bbc, the type
of site e.g. co and com are commercial companies. ac is an academic community and country e.g. uk is
United Kingdom.
If there is no country name, this often means that the website is American.
Web page
It’s a document on a website. A website is composed of a web page or collection of related web pages.
It’s also a document on the World Wide Web that can include text, picture, sound and video.
Home Page
This is the first page that is displayed on a website. It acts like the title page of a book. The home page or
a welcome page identifies the website and contains links to other pages at the site.
If you have your own website (personal), it might consist just one page i.e. the home page, large
websites may have hundreds of pages.
Link
It’s a connection from one webpage to another using hypertext. These web pages are not physically
connected but just contain the address of the page that should be displayed. A link is also known as a
hyperlink.
A Browser
It also known as a web browser. It is software that allows you to view, navigate and interact with the
www. Examples of web browsers include:- Internet Explorer, Netscape Navigator, Mozilla Firefox.
It can also be defined as an interactive program that permits a user to view information from the www.
The information contains selected items, which allow the user to view other information.
Address
Each computer on the internet has a unique address. This address is contained in the hyperlink text of a
document. The browser software uses this address to connect to the server over the network.
Client
This is a computer that is requesting for some information e.g. a web page from another computer.
Server
This is a computer that actually services the requests of other computers. It is also known as host. It is
usually a powerful computer with large memory and hard disk containing many relevant documents.
Bandwidth
The rate of speed of data through a channel and is expressed in bites per second. The difference
between the lowest and highest frequencies transmitted.
Connection
This is the actual process by which the browser software actually contacts the server computer over the
network.
Modem
A communications device that converts analog to digital signals and viceversa. A modem is very
important because the data signals sent through the cable are in form of analog while the computer
understands digital only.
Directory
A collection of files in a given storage media or drive
Browsing
To view data (in database), in object oriented programming languages, browsing means to view
formatted documents. With internet, browsing means searching for particular specific items.
Surfing
It means moving from place to place on the internet searching for topics on the internet.
Directory
It’s a search tool that provides lists of several categories of websites classified by topic such as business,
financial, sports, health, dating, pen pals etc. its purpose is to allow you access information in specific
categories by clicking on the hyper text link. Directories are useful for browsing-looking at web pages
in a general category and finding items of interest. Examples of directories include:- Yahoo, Hotmail,
etc.
Search Engines
These are tools that allow you to find specific documents through key word search and menu choices.
Keyword or phrases are entered in the space provided. It runs a program that searches its own database
an up-to-date list of web-sites and provides you with a lot of ‘hints’ i.e. sites that contain the keywords.
Common search engines include:-
http://www.google.com
http://www.yahoo.com
http://www.altavista.com
http://www.excite.co.uk
Moral and Cultural effects- cartoons and networks which facilitate access to pornography and
other negative morals which has made fight against several problems of HIV/AIDS, bad sexual
behaviors, drugs more complicated.
Spamming- Sending of unsolicited e-mails in bulk which serve no purpose and un necessarily
clog up the entire system.
Personal Information- If you use the internet, your personal information such as; name, address
etc. can be accessed by other people. The credit card information can also be got if at all it’s
used to shop online. This is akin to giving a blank cheque.
Ill Health- People who spend a lot of time of sitting in front of a computer. Radiation emitted by
computer’s screen is harmful to eyes. Sitting for along time is also harmful to the spine. People
who spend a lot of time seated because they need not to go home get weather (monotony).
Addiction- Some people can’t just live without it. They have no real friends and when internet is
down, they get furious. They live sedentary life styles.
Costs- The initial costs of buying network hardware and software in addition to employing
experts to do the work is very high.
Virus- A virus is a program that disrupts the normal functioning of your computer system.
Computers connected to the internet are more vulnerable/prone to virus attacks and they can end
up into crashing the whole hard disk, causing undesirable effects.
Spread of terrorism and drug trafficking- provides a rich recruitment for all illegal activities
because of ease in communication.
The internet or the www is indeed a wonderful and amazing addition in our lives. The internet can be
known as a kind of global meeting place where people from all parts of the world can come together.
It’s a service available on the computer through which everything under the sum is now at the finger tips
of anyone who access to the internet.
A computer: Computer equipment is a sizeable investment and thus you should select a
computer carefully, understand your needs and choose carefully/accordingly. Check the warranty
and the after sales service.
NIC-Network Interface Card.
Modem- Acronym for modulator demodulator. An electronic device that attaches to a computer
and links that computer to the internet through a telephone link. Modems are available for any
computer and can be either internal or external.
A physical connection such as telephone line.
An internet service provider (ISP) to supply the internet.
Internet software- e.g. protocol to make Pcs compatible, Operating system enable configurations.
Telephone Line
These include the various ways you connect to the ISP over the telephone system:-
- Dial up connection through telephone system
- Dedicated connection
- Plain old telephone system
- Integrated service
- A dedicated connection is a telephone line that is attached from your location to the provider and is
always connected. This kind of line is useful when you do not want delay of waiting for a connection or
you want greater data rates than a standard telephone line can carry. They can be very expensive.
- Pots: - In a plain old telephone service, or more formally analog telephone technology. It is a line
attached to your phone. To use it with your PC, you attach a modem and call the ISP.
- ISDN: -Is the new kid on the block. It is a totally digital technology and it offers the potential for
greater data rates than POTS.
INTRODUCTION TO PRESENTATION SOFTWARE
Presentation software refers (applications) to software applications/programmes that are used to enhance
the communication process with the use of visual aids like presentation slides.
Applications used to present information using simple texts, graphics, pictures, sounds, video etc.
Presentation software is very essential in effective communication because they assist the user to
explain ideas graphically and dramatically.
The audience can also interpret the communicator’s ideas easily (because of illustration).
Examples
- Harvard Graphics
- Lotus Freelance.
- Microsoft power point.
- Micro graphic presenter e.t.c.
DISADVANTAGES.
- Light control might not be possible in some rooms. Sometimes its too dark and at times too
much light.
- Technology may break down in the middle of the presentation.
- The teaching does not become adaptive and reactive.
- It depends on the skills and creativity of the presenter.
MICROSOFT POWER POINT.
A graphical application that is capable of adding illustrative graphics with text in the same document. It
can also include motion effects to enhance the presentation.
It also offers word processing, out lining, graphing and presentation of management tools.
NB:
A presentation is the entire work done referring to a particular topic.
A slide refers to the entire page (single) in a power point window. That’s why its sometimes
referred to as slide show or slide presentation. It’s the working area equivalent to a page in word
document. Slides are put together to form a file or presentation.
An object in a slide is defined by handles that appear on its perimeter when selected. An object
in a slide may be a text object i.e. text characters or a graphic object i.e. graphics like clip Art,
pictures or images. An object in a slide can also be a sound object i.e. recorder sound or a movie
object i.e. it has a recorded video.
= When you click in an object, sizing handles will/are displayed on its perimeter. This is how objects are
selected or highlighted.
= To delete an object, you check in it and then press the delete key.
Sizing handles: - Six boxes that enclose a selected object; these may be six or four depending on
the size of the object.
Presenter: - A person who delivers a presentation a.k.a Speaker.
Audience: - Individuals who have an interest in the presentation.
Transition: - Move/switch from one slide to another.
Animation: - Putting monitor and or sound to various objects in your slides.
= When Microsoft power point opens, what appears first is the title slide. Its usually designed (pre
designed) for the title of the presentantion.
= Click in the placeholder- An object on the slide that reserves the place for a text.
1. Normal View.
+ Used to work on all slides detail in a presentation.
+ Has 3 major sections i.e.
- The outlines pane
- The slides pane
- The notes pane.
3. Slide View- This allows you to view your slides one at a time.
4. Slide Master- This is a template used for the slides in a presentation. It allows one/you/to
maintain consistency/uniformity/in formatting. This is because all changes made in the slide master will
occur in all the slides in the presentation.
Steps:
- Click on insert,
- Select new slide (New slide dialog box displayed).
- Select a lay out suitable for your data. E.g. One with charts, pictures, columns e.t.c.
- Click Ok.
HIDING A SLIDE.
If you do not, a slide to appear during the slide show but yet you don’t want to delete it, you follow the
steps.
- Select slide show.
- Click on hide slide from the menu bar.
- Follow the same steps to have it shown in the show.
MAKING A PRESENTATION.
A presentation refers to the entire work done referring to a particular topic. A presentation may consist of
various slides that are animated to create a continuous film like document, hence known like a slide
show. Slide shown are very handly in conveying messages to an audience.
Presentation slide shows are similar to a movie or video clip in that various screen images are displayed
one after the other.
1. ON SCREEN PRESENTATION.
This is a presentation that is viewed on the computer screen. This can be done either in the kiosk
window (application window) preview mode or in the full screen mode.
The In-screen presentation can be delivered to the audience as,
(a). Self-Running presentation.
(b). Speaker presented presentation.
(a). A self –running presentation is one where by once started, it will display all slides continuously and
restart automatically when the presentation reaches the end.
c.f the Kampala roof-top shows (adverts).
(b). Speaker presented presentation is where the speaker controls the slides advances (transitions)
manually or automatically by use of slide timings.
- These presentations usually require demonstrations and explanations (clarifications).
2. WEB PRESENTATIONS.
These are presentations that are viewed using an internet browser software application. This is done by
saving a presentation as a web page file after designing.
4. PAPER PRINTOUTS.
This is where no projectors are used for presenting to the audience. The slides are printed on paper in
either color or black and white. [Every row form of transition]. No effects and transitions can be seen
here.
5. NOTES, HANDOUTS AND OUTLINES PRESENTATION.
This is where each individual in the audience is presented with a copy of the entire presentation. This
copy is called a handout. Each page may contain several slides. The audience uses their copies to
follow what the presenter is narrating.
6. 35MM SLIDES PRESENTATION.
This is where each slide is transformed into a 35mm negative, which is inserted into a still camera and
the image focused on the screen.
PRESENTATION PLANNING.
It’s imperative that before designing a presentation, the presenter first makes a plan of how the
presentation must look like.
- The thinking must be done, thoroughly first.
- The outline of what one wishes to communicate to the audience including the sub-topics
must be done.
- The major ideas, for each slide need a through representation.
e.g. in a commercial company like Coca-cola, the presentation can be prepared in this format.
1. Background/History
-Year of start
-Area of coverage.
-The number of brands.
2. Performance status
-Past performance
-Current performance.
-Future performance/Projections/Targets
3. Threats
-Competition (new companies, private schools, imports etc)
-Tax (USE, Government tax).
-Strikes
-Greener pastures (Employee turnover).
4. Strategies.
-Pricing strategies [Fees]
-Customer care [transport, uniform]
ENHANCING PRESENTATIONS.
Presentations can be improved by adding visual attractions to a slide.
These visual attractions include:-
Slide transitions, speed, sound clips, animation colors (back ground and object).
ANIMATING A SLIDE
- How texts or objects in slides appear or disappear on the screen.
- Animations attract the attention of the audience.
- Arouse interest in the audience.
- Animations can be applied to a single/an individual object.
Note:
Some objects need more animations than others because they deserve/command attention from the
audience.
+ Transition Speed- The speed shouldn’t be very fast not very slow. Because this may bring boredom
and lack of concentration.
+ Slide Contents- Too many contents on a slide may congest the slide. Be precise and concise. Avoid
making some contents more common especially images (boredom).
SLIDE TRANSITION.
How an active slide in a presentation will appear and disappear. This refers to the entire slide including
the objects.
Method.
o Open the presentation to format.
o Click on the slide show menu.
o Select slide transition…..option
o From the effect drops down menu, select a suitable effect e.g. cover down, left, dissolve e.t.c.
o Select suitable speed- Fast, medium, slow.
o Select the suitable mode pf advancing the slides from the ‘advance’ section.
o Sound is added by selecting particular sound by choosing from the list. You can also choose loop
continuously till the next sound.
o Choose (finally) ‘Apply to All or Apply’ commands to have the effects take place.
Apply to All--- All the slides in the presentation.
Apply--- To only the selected slide.
1. Microsoft Access (Ms- Access) is one of the many off-shelf applications used to manage
databases although its ideal for small desktop databases.
Database management system (DBMS), software facilitates the creation, organization and maintenance
of database. DBMS is an application program such as Microsoft Access that enables one to collect
information of interest on a computer and organize it in different ways. They facilitate the creation,
organization and mentainance of databases.
In DBMS one can:-
- Sort data
- Create reports
- Create forms
- Organize queries
- Make tables e.t.c
TYPES OF DATABASES
There are mainly two types of databases; Manual databases and Electronic databases.
However, Electronic databases are today commonly used.
Electronic databases are further categorizes into two—Distributed database (These sit on
individual stand –alone computers) and centralized databases (these sit on a database server).
In this table:-
Row numbers 1 represents Tom’s record while the third Column is a field for middle name.
In a single database file, there can be several tables. Each table should represent one subject e.g.
customer, order, item e.t.c.
NB: A database file can consist of several tables.
These different tables can be joined together to make them related.
That’s why database management programs like Microsoft Access are referred to as relational database
application.
2.FORMS
These (forms) enable one to enter and display (view) records from the database tables easily. They are
also used to add (enter), modify or view the data from (in) the data tables.
Forms look exactly like the local forms on paper e.g. a receipt, registration form e.t.c.
3. REPORTS
Reports enable one to preview and print data in a meaningful format.
Most database systems provide the user with a tool for generating reports from an underlying table or
query.
Examples of reports include lists, invoices, form letters, mailing labels e.t.c.
4. QUERIES
These are tools used to manipulate data in the data tables.
Queries are used to carryout several tasks on the data in database tables.
The tasks that can be carried out using a query include; merging data tables e.t.c
A query acts like a question posed to a database, which a database answers by giving results that are
relevant.
Example:-
You are the headmaster MHS-K and you wish to see/display all the students from Ruk, who are orphans.
You can use a query object to display only this information from various tables in a database.
The business/act of using queries is called querying. Querying used specific set of rules to get only the
relevant data. The query statements (queries) are written using specific language called Structured
Query Language (SQL). See computer studies Book 2, page
Therefore, queries are used to locate specific records with in a table or ask questions to your database. [It
resembles filtering in spread sheets].
Other features of databases include:-
5. MACROS.
6. PAGES
7. MODULES.
5. MACROS
A macro is an automated procedure of action in a computer. It can be called a mini program because it
had a short automated procedure which consists of simple commands.
Example: You can use a macro to instruct the computer to print a specific report (s) at a particular time.
6. MODULES
Like macros, modules also enable one to automatically carryout some processes. However, modules
require one to have a background in programming e.g. Microsoft Visual Basic.
Macros and modules are rarely used in simple databases.
7. PAGES.
These are special web pages that handle data in html environment. They control certain features in a
web page.
8 Sorting is to organize a set of records in a particular order.
WORKING WI TH DOCUMENTS.
C.f.11.6 Page 80. Introduction technology
When Microsoft word is started, a new document window labeled as document 1 is automatically
opened. At this point, one can begin typing in the text immediately. Text is entered at the current cursor
position called the insertation point.
* Cursor- vertical blinking bar indicating where the next character to be typed will appear.
Text is entered continuously up to the right margin, where words that do not fit on the current line are
automatically shifted to the beginning of the next line.
The whole process is done until when a carriage return (enter key) is pressed to mark the end of a
paragraph.
- Saving a document—Save As Vs Save
- Operating a new document.
- Opening/ retrieving a document.
- Character formation – font size, font style, font type.
- Alignment- state how each alignment type displays.
Positive changes.
- Increased communication facilities (e-mail, virtual education institutions).
- Increased speed in execution of operation of data (Type writers).
- Accuracy and reliability (writing, editing, manipulating of texts).
- Recreation (Entertainment and leisure industry).
- Employment opportunities have increased e.g. operators, analysts, technicians, engineers,
information system management.
- Large data storage and analysis and easy retrieval (increased file management).
- More information.
- Stronger and more reliable defense systems have been built (Defense and Security).
- Information industry (less production costs, less costs of products to consumers).
- Easy trading across continents (trading on a Pc).E-Commerce.
Negative.
- Loss of sight due to over use.
- Unemployment
- Moral degradation/decadence/decay due to the influx of ill immoral/material.
- Loss of information due to breakdown of systems.
- High rate of forgery.
- Expenses- maintenance and repair.
Process Control
In production environment.
- Chemical and mechanical processes control.
Communication.
- They play a big role in industry.
- Telecommunication exchange depends on computers.
- Railways to co-ordinate the movement of wagons.
- Airline industry to control air traffic and surveillance of the air space.
Government Institution.
- Are heavily used in many institutions.
- Store records.
- Improve efficiency.
Negative.
- Moral degradation
- Sight effects.
- Consume a lot of power.
- Maintenance and repair are expensive.
- Virus through internet.
- High rate of forgery
- Loss of great information.
- Hackers who usually work in group to easily access and corrupt them.
DOS WINDOWS
- Not user friendly - User friendly.
- The user required to enter command - The commands are behind menus, icons etc.
- It can not be easily corrupted - Easily corrupted
- Less memory required - Requires more memory
- No multi-tasking ability - Multi-tasking.
Setting a Preferred View.
- Views are found under view in menu.
* Normal view, page layout view, toolbars.
Line Spacing.
* Changing case.
This feature helps one to change the characters of an already typed text without retyping it.
Types of cases.
Upper Case - Capital letters only.
Lower case - Small letters only.
Sentence case - Only the first letters in caps.
Title case - Every word in sentence begins with upper case.
Toggle case - All characters but the first letter of each word in lower case.
Method
o Select the text to change.
o Click on format.
o Select change case (the dialog box appears).
o Click on the desired case style.
o Click Ok for changes to take place.
Method.
- Select the test to format.
- Click format menu.
- Select columns.
- Click on the desired column layout.
- Select ok.
NB:
You can select a line between the columns.
You can select the size of column (equal or unequal).
SORTING A TEXT.
Sorting usually works well with tables. Sorting refers to arrangement of a text depending on a particular
interior e.g. ascending, descending order.
- Select required paragraph.
- Click on table menu.
- Select sort
- Specify criteria on i.e. ascending or descending.
- Click ok.
Page Numbering.
- Click insert menu.
- Select Page numbers (A dialog box appears).
- Select the position where the numbers are supposed to be located i.e. Top of page (header),
bottom of page (footer), from the position drop down menu.
- Select the alignment of the page number i.e left, centre, right or inside or outside from the
alignment drop down list bor.
- Select ok.
Tables.
A table is made up of rows and columns.
Columns – top to bottom, Rows – left to right.
- Click on the table menu.
- Select insert and then table.
- Enter the number of columns and the number of rows desired.
- Select ok.
- You can select whether to have fixed row and column size or have them automatically
adjusted according to test content.
Inserting Columns.
- Select a column that succeeds when you want another column.
- Click on the table menu.
- Click insert columns e.g inserting rows.
Deleting Columns.
- Select entire columns
- Click on the table menu.
- Select delete columns.
Deleting Rows.
- Merging cells (joining cells)
- High light the cells to be merged.
- Click on the table menu.
- Click on merge cells.
Printing Documents.
- Connect the printer and turn it on.
- Click on the file menu.
- Select print and the (print dialog box appear).
- Click ok.
ROM:
- It’s used to store programmed instructions and data permanently or semi permanently.
- Data and instructions stored in ROM are those required to remain unchanged for long periods
of time e.g. booting instructions.
There are four types of ROM. This depends on the permanence of the instructions or data written there.
CHARACTERISTICS OF ROM.
- One can only read its contents but you can not write on it unless it’s a special type of ROM.
- It’s non-volatile i.e. its contents can not be lost when the computer is switched off.
- Stores permanent or semi-permanent instructions from manufacturers called FIRMWARE. It
can store semi-permanent instructions because some variations of ROM chips can be
programmed according to the user’s specifications.
CHARACTERISTICS OF RAM
- Data can be read (retrieved) and written (stored) in it.
- RAM is temporary (volatile) storage because its contents disappear when the computer is
switched off.
- Its contents are user defined i.e. they can decide what can be contained in RAM.
TYPES OF RAM
There are two types:-
1. Static RAM (SRAM) and
2. Dynamic RAM (DRAM).
- Static RAM is very fast compared to DRAM and holds its contents as long as there is power.
- DRAM however; can hold its contents for only a short period of time even when power is on.
- The contents of DRAM can be maintained by refreshing the memory chip several times per
second.
- SRAM is more expensive. Its used to make special types of memories.
BUFFERS.
This is a temporary holding place that may be part of the CPU or built in an input or output device.
Because the CPU is very fast compared to the input or output devices; buffers provide temporary storage
so that the CPU is set free to carry out other activities instead of waiting for all data to be entered or
information to be output. For example, since a printer can not work at a speed of a CPU, the printer
buffers temporary holds the output to be printed hence freeing the CPU to perform other functions.
Buffers can hold more than one piece of data at a time.
REGISTERS
Unlike buffers, registers hold one piece of data at a time and are inside the CPU.
CACHE MEMORY.
Most modern processors incorporate small high-speed type of SRAM called Catch Memory. The
purpose of cache memory is to allow the processor to access data and instructions even faster than it
would have taken to fetch it from the relatively slow DRAM.
MEMORY CAPACITIES.
Memory and storage capacity is measured in special units called bytes.
A byte is equivalent to a single character. Characters can be a number from 0-9, letters A-Z or any
special symbol.
Example:-
A number 2545 has four bytes while the word my name has seven bytes, since the space between them
has 1 byte.
FACTORS AFFECTING COMMUNIATION SPEED ON THE INTERNET.
- Transmission (Frequency and band width).
- Line configuration (point to point and multi point).
- Serial and parallel transmission (serial data transmission and parallel data transmission).
- Direction of transmission flow (simplex, half duplex and full duplex).
- Transmission mode (Asynchronous versus synchronous).
- Packet switching (Getting more data on a network)
- Protocols (the rules of data transmission).
- Types of processor.
Band width is a term used to describe how much data you can send through a connection. It’s linked to
the number of cars that can pass through a highway at a given time.
If the highway is empty, the number of cars that will pass through increases.
Internet speed is measured in bps (bits per second or thousands of bits per second kilo bits per second -
kbps). Kbps or bps is a measure of bandwidth. The ISP usually supplies or sells particular amount of
bandwidth to connect you to the internet.
Higher bandwidths are conveniently expressed in mbps-mega bits per second (millions of bots per
second).
Bits- stand for binary digits. Bits are the smallest number of digital information consisting of 0 and 1.
MICROSOFT WINDOWS.
Microsoft windows had been described as a GUI. This is an interface in which almost every thing is
represented graphically.
PARTS OF A WINDOW.
Most windows have all or some of these features.
1. Control Menu Box. Located in the top right corner of a window. It consists of the control menu
which is activated by clicking on this box.
2. Title Bar. This stretches across the top of the window and contains the name of the application,
document and gp directory or file name. Usually the active window title bar is different in
intensity or color than the other windows.
on the right of the title bar, there are three tiny buttons namely:-
3. Minimize and Maximize Buttons and Close. Located top right corner of a window.
- Minimize:- reduces the window to the bar.
- Maximize:- increases the window to fill the entire desktop.
- When the window is maximized, the restore button replaces maximize button.
4. Scroll Bars.
These appear on the right and bottom of windows. These help to move the work area up and down if
it contains more items. It can not fit in the visible work area. Scrolling brings hidden items into
view.
5. Windows Borders.
These area the perimeters which define the wonders work area.
CREATING A FOLDER.
If the folder is to be placed on the desktop.
+ Right click on the desktop,
+ Point to new,
+ Select folder,
+ Give your new folder a name.
+ Press enter or click away.
NB:
If the folder is to be created on any storage device or any storage location, first open that device or
location and then follow the same procedure.
Renaming a Folder.
This is giving a folder a different name.
File.
A file is a collection of related data or information stored in one location and given a unique name
that enables the operating system to identify it during storage and retrieval process.
Every file has details that indicate the following:-
1. A unique name: This enables the operating system to organize the files and identify the
file. The file name usually has got a file name extension.
The extension is usually consisting of a maximum of three characters e.g GUMA.DOC. The file
name and the extension are usually separated by a period. The file extension indicates the type of
information held by the file. Example;
- Doc – Document created in Microsoft word
- Xls - Excel
- Ppt – Powerpoint.
- Pub
- Data, files- Cp filed which store data for use by computer applications or system.
- Text files.
- Exe – Executable file (one that can be accepted by windows) for long names of up to 255
characters including spaces while Microsoft documents handles a maximum of eleven
characters.
There are some symbols and characters that are never accepted in file names e.g. and, slash and
brackets.
2. Size. The file usually indicates the size of the document. It’s usually expressed in KB
(Kilobytes) and MB if it’s larger.
3. Date. The date that is usually shown is date of creation. So incase of anything, one can look up
a file using the date of creation. For example, if one forgets the file name then the date of
creation can help.
There are two types of files; system files and Application files.
SYSTEM FILES.
These contain very important information for the operation of the computers. E.g. all hardware
devices connected to the system must have a file in the computer before they can operate. This is
a system file. This file is first checked by the computer or system at the time of booting.
APPLICATION FILES.
These are also called program files because they hold program or application files. These have
extensions such as exe.
NAMING A FILE.
Microsoft windows accept a maximum of 255 characters including spaces. When naming a file,
make sure the name is meaningful and easy to recall. E.g. when doing Greg practical lessons, it
looks like this Greg lesson 1, Greg lesson 2 e.t.c.
NB: Avoid slashes and brackets in file names.
\/:*<>|.
FOLDERS
A folder or a directory is a named storage area where the user can store related files and enable
easy access.
Folders make the filing system easy by creating a folder for related files e.g. A folder for BOT
exams, BOT marks, EOT exams, EOT results.
SUB FOLDERS.
These are folders found inside the main folder. They are divisions of the main folder. They are
also known as sub-directories. Folders and sub-folders usually appear in yellow color (icons)
while file icons are usually white with a fold at the top right hand corner.
CREATING A FOLDER.
Folders are created to store multiple related files. E.g Exams for all classes term 1, 2008 consist
of many files (different classes) which are related by being EOT 1 exams.
OR
- Click file from the menu bar.
- Click new.
- Click folder
- A folder named new folder will appear- type a new name for your folder and press ENTER or
click on the icon once.
To create a sub folder, first open the main folder created and then follow the steps of creating a folder.
NB: Files are dragged to folders if they were created before the folders (dragged and dropped).
CREATING A FILE.
- Select the location in which you would like to create a new file e.g.3 ½ floppy, created folder,
hard disk.
- Click file form the menu bar.
- Click new.
- Select text document.
- Type a new name for your file and press enter.
NB: When you delete an item from the computer, it is temporary held in a folder called the Recycle bin.
The Recycle bin is located on the desktop by default.
Items in the Recycle bin can be restored (brought back) by,
- Open the Recycle bin folder on the desktop,
- Right click in the file or folder bring back.
- Click Restore.
If the file is to be deleted from the computer completely, then it should be followed up to the Recycle
bin and delete it again (from there).
NB: The items (deleted) in the bin occupy space on the hard disk. So empty the bin if you are so sure
you will no longer need them.
If all the files or folders in a certain location or all in view are to be selected; hold down shift key and
press A on the keyboard or click edit from the menu bar and click select all from the menu.
DESKTOP.
Windows can let the user change or customize the desktop appearance and display.
They desktop background appearance can be changed thus:-
- Right click on the desktop.
- Click properties from the shortcut menu.
- From the display properties dialog box, click background tab.
- Choose the background by clicking.
- Click ok.
NB: on the right.
o Tile- covers the entire screen with small images.
o Stretch- One large images covers screen.
o Center- The small image occupies the center of the desktop.
SCREEN SAVER.
The screen saver is used to prevent screen burn out.
The screen saver starts playing on the screen if the computer is left idle for a set period of time. To
set it,
- Right click on the desktop.
- Click properties
- Click on the screen saver tab.
- Select the screen saver style from a list.
- Select the schemes to apply like the time of the screen saver appearance.
- Click ok.
Screen saver is a utility that is supposedly prevents a monitor display screen from being etched by an
unchanging image.
A screen saver is a utility that causes the monitor’s screen to display a moving image or blank screen if
no keyboard or mouse activity occurs for a specified time period.
COMPUTER GENERATIONS.
1. FIRST GENERATION (1940-1958).
These computers were;
- Very large in physical size.
- Used thousands of electronic gadgets called vacuum tubes of thermionic valves.
- Consumed a lot of power and hence constantly broke down due to excessive heat generated.
- They could not store much information. They had limited primary memory, the maximum
memory was about 2000 bytes (2kb) with a speed of 10 kilo instructions per second.
The first generation computers marked the start of programs and programming languages. Many of the
first generation computers had to be programmed in machine language, which consisted of a series of
zeros and ones. Such computers included the ENIAC (Electric Numeric Integrator and Calculator) and
the EDVAC (Electronic Discrete Variable Automatic Computer).
In the 4th generation, the Apple 1 computer was developed which had good appearance but lacked many
of the features that today’s computers have. It was developed by two high school students Steven Jobs
and Wozniak. They improved it to include many features and formed Apple II.
Apple I was improved to Apple II by Steven Jobs and Steven Wozniak who included several new
features and these included;
- Ability to connect to a color TV for graphics built in BASIC.
- A small speaker for sounds and game paddles.
- A built-in cassette pot was also included.
Soft ware programs were also significantly Improved, High Level Languages are used almost
exclusively to develop application programs and there have been a number of new high level languages.
Although the distinction among the first three generations of computers are clear, defining the next
generation is difficult.
A lot of research is being done to come up with a machine that can work without human interaction.
WORD PROCESSORS
What are word processors?
A word processor is an application software that is used to create, save, edit, format and print documents
that contain text and graphics.
Word Processing is the process of using word processors to create, edit, save and print text documents.
It is a process of manipulating text to form documents and reports
Word processors are mostly used for the following purposes or functions
Writing/ typing letters
writing reports
Writing books
Writing essays
Making memos
Designing Curriculum vitae
Writing articles for books, magazines or newspapers etc
In most offices, word processors have replaced typewriters as the means of creating documents.
Compared to a typewriter and other writing tools, a word processor has a number of advantages and
these include:
1. A document can be stored on the computer for future reference.
2. They reduce on storage costs because the files on the computer do not occupy space like the
paper files.
3. Word processors are easier and more efficient to use because some actions are automated. For
example the word wrap feature which takes the cursor to the beginning of the line once the
current line has been used up
4. They have special editing tools such as spelling and grammar checker and thesaurus that help the
user to easily correct grammar and spelling errors. Thesaurus helps the user to find words with
similar meaning.
5. Word processors have superior document formatting features. For example, underlining,
boldfacing, italicization, applying different colours etc. Formatting refers to the art of making the
document more attractive and appealing to the eye. Thus word processors can print work of
better quality.
6. It automatically corrects errors by the use of the spellchecker feature while typing