Unit Name: Unit Code: Bucu 002 Lecturer
Unit Name: Unit Code: Bucu 002 Lecturer
UNIVERSITY
NKUBU CAMPUS
UNIT NAME: COMPUTER SKILLS
and
APPLICATION
UNIT CODE: BUCU 002
LECTURER: MR. MARETE
jmarete@mku.ac.ke
0725-118625
2017
jmarete@mku.ac.ke
INTRODUCTION TO
COMPUTER
• COMPUTER
• A computer is an electronic device
or set of devices that work under the
control of a stored program inputting
data from external source and
processing it to produce information
that can stored and retrieved for
future reference.
jmarete@mku.ac.ke
Terminologies
• Input: It is the data to be fed into the
computer.
• Output: it is the out information or
feedback.
• Data: They are the raw facts and
figures that are collected and fed
into the computer for further
processing, retrieval and storage.
• Information: It is the processed
data, structured and summarized in
jmarete@mku.ac.ke
QUALITIES OF A COMPUTER
• It is automatic –i.e can work with
minimum human intervention; once
supplied with data and instructions.
• It is a data processor – processes raw
facts and figures to produce
information.
• It is a storage device- stores
information for later date and future
reference.
• It is electrical – requires some form
of electric power to operate
jmarete@mku.ac.ke
ADVANTAGES OF USING
COMPUTERS
jmarete@mku.ac.ke
The first generation
1940- 1956
• This generation of computer relied on
the vacuum tubes to store and process
information.
• They consumed great power hence
they were short-lived.
• They were huge in size
• Had small internal storage capacity of
2kb(kilobyte)
• Used magnetic drum memory
• They were very slow
• Expensive
jmarete@mku.ac.ke
The 2nd Generation
1957-1963
• Computers were then built from
individual transistor wired up together.
• Transistors were much more stable
than the vacuum tubes.
• They generated less heat and
consumed more power.
• Memory size was expandable to 32kb
and the speed was accelerated.
• Used high level languages
• Cheaper
jmarete@mku.ac.ke
3rd generations
1964-1978
• Used integrated circuits (IC) made by
combining several transistors
together.
• Magnetic disks were developed at
the stage. Computer memory was
expanded to 20Mb (megabyte).
• Storage capacity increased
• Speed was also accelerated.
• Used high level languages
• Cheaper
jmarete@mku.ac.ke
4th generations
1979-1989
• Used integrated circuits (IC) in large
scale integration (LSI).
• Magnetic disks were developed at
the stage. Computer memory was
expanded to 32Mb (megabyte).
• Storage capacity increased
• Speed was also accelerated.
• Used high level languages
• Cheaper
jmarete@mku.ac.ke
5th generations
1990 up to date
• Used integrated circuits (IC) in very
large scale integration (VLSI).
• Magnetic disks were developed at the
stage. Computer memory was
expanded to Gigabytes
• Storage capacity increased
• Speed was also accelerated.
• Used high level languages
• Cheaper
jmarete@mku.ac.ke
Cont..
• The major thrust of 5th generation of
computers are distributed through
– computing systems and
– the merging of the telecommunication and
– computing technology.
• The anticipated computers will be able
to parallel process
• Would be based on logical inferences
operation
Expected to have artificial intelligence,
which stimulates some aspect of human
jmarete@mku.ac.ke
KINDS OF COMPUTERS.
• NB: Computers can be classified in
various criteria;
1.Computer generation
1. 1st – 5th generation
2.Size of memory and number of users it
can support.
3.Mode of performance
4.Price , capability and size
5.By purpose
1. Special
2. Dedicated
3. General
jmarete@mku.ac.ke
Cont..
• 6. By the type of data accepted as(input)
and processed.
• There are three major types of
computers:
a.Digital computers-
used to manipulate discrete data i.e data is
processed in digits form.
Their arithmetic and logical operations are
based on
digits or other characters that have been
numerically coded.
They are widely used in research, business
jmarete@mku.ac.ke
Cont..
B. Analogue computers
- used to manipulate analog data
(continuous and non-countable data
such as pressure, Temperatures,
humidity, etc).
- They perform arithmetic and logic
operations by measuring changes in
the physical magnitudes such as
electronic voltage, pressure changes,
and etc .
- Their output is often in graphs or
jmarete@mku.ac.ke
Cont..
3. Hybrid computers-
These are computers that have
combined features of digital and
analog i.e the digital & analog
features are built within the same
processor.
jmarete@mku.ac.ke
Types of Digital computers-
1. A Mainframe computer
• is a very large and powerful
computer.
• It is a general –purpose computer
with a range of input and output
devices and in most cases several
C.P.U’s (can be used by many people
at the same time).
• It is a very expensive computer.
• It is used in very large organizations
e.g U.N and Government.
jmarete@mku.ac.ke
2. A mini computer
- can be described as a scaled down
version of the main frame.
- It also has a range of input and
output devices used in Medium sized
organizations.
- Data is processed at a slower rate&
lower volume compared to
mainframe.
jmarete@mku.ac.ke
3. A micro computer
jmarete@mku.ac.ke
3. COMPUTER SYSTEMS
• What is a system?
System : Is a group of related parts or
elements (components) that work
together to realize a common goal. Its
a set of components that are designed
to work together to achieve a certain
goal.
• Complete system is made up of the
following:
• Hardware : these are the physical
components of the computer.
• Software: These are the programs
jmarete@mku.ac.ke
1. HARDWARE
jmarete@mku.ac.ke
The keyboard has several sets
of keys:
1. The functional key:_
These perform different task
depending on the software program
you’re using (i.e.F1-F12).They are
programmable keys normally used
for shortcutts.e.g.F7 in Ms. word
gives a short cut to spelling and
grammar check
2. The Arrow Key/Cursor Control
Key:
These are used to move the cursor.
Facilitate horizontal and vertical
jmarete@mku.ac.ke
CONT..
3. The Data keys:
These are used to enter data like
letters, numbers and symbols.
4. The Special Purpose Keys:
These are used to perform specific
tasks, e.g. Backspacing, Del, Shift,
Alt, Ctrl ,Enter ,Esc, Pause, e.t.c
jmarete@mku.ac.ke
TYPES OF SPECIAL PURPOSE
KEYS
• Caps lock- ( for capital letters)
• Tab key ,(for indenting paragraph)
• Shift key (shift from upper case character to
lower case and vice versa.
• Control key -ctrl
• Alternate key -alt
• Space bar -on pressing it the cursor moves
one space to the right
• Backspacing -for deleting(erasing) characters
to the left of the cursor
• Delete - for deleting(erasing)character to te
right of the cursor
jmarete@mku.ac.ke
CONT..
• Enter key-for moving the cursor downwards
in a document. It is also used issuing
commands
• Winlock key- it is the shortcut to the start
button.
• Numeric key pad(0-9)- mainly used to enter
first numeric data when the Num lock key is
on. Its normally toggled (switched) on or off
by pressing the num lock key.
• Page up- takes one up the page.
• Page down – takes one down the page
• Home key- takes you at the beginning of a
sentence.
• End key – takes one at the end of a
jmarete@mku.ac.ke
MOUSE
• This is a small lightweight device that
helps in the input and execution of
commands/instruction and process of
data in the computer.
• Software programs designed to use a
mouse display a mouse pointer on the
screen.
• The mouse pointer maybe an arrow,
small , small rectangle, an I-beam, or
even a hand with a pointed finger. To
move the pointer, you gently slide the
mouse over the mouse –pad.
jmarete@mku.ac.ke
A mouse has its own
language. i.e
• Point : To move the pointer to a
desired spot.
• Click: To press and release the
mouse button
• Double-click: Pressing and releasing
the mouse pointer twice as quickly
as possible
• Mouse drag & drop: Pressing and
holding the left mouse button, then
move to a desired location and
release i.e move the mouse pointer
jmarete@mku.ac.ke
The mouse is composed of two
buttons:
1. Left mouse button
• This is used to:
• Issue commands
• Move items
• Select
• Highlight (by holding down the left mouse
button and dragging.
2. Right mouse button
• This is used to:
• Retrieve commands
• Create shortcuts
jmarete@mku.ac.ke
3.THE SCANNERS
jmarete@mku.ac.ke
• Scanner allows you to scan
documents, pictures, or graphics
and view
• them on the computer. You can also
use software to edit the items you
• scan. Used to put printed pictures
and text into a computer. It Converts
an
• image into dots that the computer
can understand .To scan text, optical
• character recognition (OCR) software
jmarete@mku.ac.ke
4. Digital Camera Used to take
electronic pictures of an object.
The pictures taken by a digital
camera can be used directly by a
computer
5. Microphone Used to put sound
into a computer. Need sound
recording software
6. Video Capture Card Usually
place inside the computer's case.
Use to put video into a computer.
Need a video source, either a video
jmarete@mku.ac.ke
7. Voice input device-A computer
I/O device in which vocal
commands may be entered into a
computer system.
8. Optical character recognition
(OCR) is computer software
designed to translate images of
handwritten or typewritten text
(usually captured by a scanner) into
machine-editable text, or to translate
pictures of characters into a standard
encoding scheme representing them
jmarete@mku.ac.ke
o Optical Mark Reader (OMR) A
special scanning device that can
read
carefully placed pencil marks on
specially designed documents. OMR
is frequently used in forms,
questionnaires, and answer-sheets
o Magnetic Stripe reader Cards
with magnetic stripes are used
as credit cards,
debit cards, railway tickets, phone
cards and many other applications.
jmarete@mku.ac.ke
• o Magnetic Ink Character
Recognition (MICR) In this
method, human readable
characters are printed on documents
such as cheque using special
magnetic ink.
The cheque can be read using a
special input unit, which can
recognize magnetic
ink characters.jmarete@mku.ac.ke
• o Bar code reader/scanner, also
called a price scanner or point-of-
sale ( POS ) scanner, is a hand-held or
stationary input device used to capture and
read information contained in a bar code .
• A barcode reader consists of a scanner , a
decoder (either built-in or external), and a
cable used to connect the reader with a
computer.
• Because a barcode reader merely captures
and translates the barcode into numbers
and/or letters, the data must be sent to a
computer so that a software application can
make sense of the data.
jmarete@mku.ac.ke
• o Bar code reader/scanner, also
called a price scanner or point-
of-sale ( POS ) scanner, is a hand-
held or stationary input device used
to capture and read information
contained in a bar code .
• A barcode reader consists of a
scanner , a
decoder (either built-in or external),
and a cable used to connect the
reader with a computer.
jmarete@mku.ac.ke
Cont..
• Because a barcode reader merely
captures and translates the barcode
• into numbers and/or letters, the data
must be sent to a computer so that a
software
• application can make sense of the
data. The scanner is commonly used
in point of
• sale such as in supermarkets,
bookshops, libraries etc to scan the
jmarete@mku.ac.ke
2. Output devices:
• These are used to get (produce) the
already processed data (information
from a computer.
• Examples of output devices :
• Screen,
• Speaker,
• printers, e.t.c
• Output : The already processed
data(information) produced from the
computer.
• jmarete@mku.ac.ke
THE MONITOR/ VISUAL
DISPLAY UNIT(V.D.U)/
SCREEN
• It is the screen where the typed data
appears
• It provides the user with a soft copy
of information
• It has some buttons along its
baseline that are used to change its
appearance.
jmarete@mku.ac.ke
THE PRINTER
jmarete@mku.ac.ke
We have various types on the
basis of speed, quantity ,
number of copies produced
etc.
• Impact – where the mechanism producing
the print comes into direct contact with the
paper e.g
• Dot matrix- creates letters and graphics by
striking an inked ribbon with a column of
small wires called pins.
• Daisy wheel- they work like a type writer
where a piece of metal or plastic with raised
letters strike an inked ribbon against a
sheet of paper leaving an image of the
letters in a sheet of paper.
• Inkjet printers – they are printer, which
the mechanism producing the print doesn’t
come into direct jmarete@mku.ac.ke
contact with the paper e.g
• Inkjet and bubble printer-they use the
There are two types of output
namely;
1. Soft copy:
-Is the output (information) displayed on
the screen or heard from the
speakers. (it is not tangible)
2. Hardcopy :
-Is the output (information) produced on
a material such as paper or fabric. E.g
information printed on a piece of
paper. (it is tangible).
jmarete@mku.ac.ke
CENTRAL PROCESSING UNIT
(C.P.U)
• This is a part of the computer system
unit where all processing takes
place. It is an electronic circuitry in a
computer that executes instructions
for the processing of data.
• The C.P.U retrieves’ instructions &
data from Random Access
Memory(R.AM), processes them and
places the result back in R.AM so
that they can be displayed on the
screen or stored.
jmarete@mku.ac.ke
The CPU is divided into 3 major
parts namely:
1. Control unit(CU)
-this directs and co-ordinates all the
processing taking place in the C.P.U i.e
it carries out instructions and tells the
rest of the computer what to do.
2. Arithmetic and Logic unit(A.L.U)
- Carries out all arithmetic and logic
operations. i.e arithmetic operations
such as addition, subtraction, division
etc& logic operations such as
comparing two numbers to give the
results as either True or False.
jmarete@mku.ac.ke
3. Main memory-
• This is a part of the computer system
unit that holds or stores current data
& instructions .
• It is divided into 2 major parts:
1. Read Only Memory (R.O.M)
2. Random Access Memory (R.A.M)
jmarete@mku.ac.ke
1. READ ONLY MEMORY
(ROM)-
• contents of ROM are permanent and it
holds some system files necessary for
the boot process.
The ROM is also divided into two major
parts:
1. Programmable Read Only memory
(PROM)
-its contents are permanently stored and
cannot be altered. The contents are
meant for reading only.
2. Erasable Programmable Read Only
jmarete@mku.ac.ke
2. RANDOM ACCESS
MEMORY(R.A.M)-
• It is an area (memory) in the computer
unit that temporarily holds data before
and after it is processed i.e it holds data
and instruction that is currently in use.
• Qualities of RAM
• Volatile – loses its content when power
goes off.
• Expandable – an upgrade can be done
to increase a machine’s memory size.
• NB: The larger the main memory the
faster the computer.
jmarete@mku.ac.ke
4. STORAGE
• Storage:
• refers to the process of retaining or
maintaining the already processed
data & instructions in the main
memory for future use or reference.
• There are two types of storage:
1. Primary storage e.g Fixed Disk drive.
2. Secondary storage.
jmarete@mku.ac.ke
1. Primary storage e.g Fixed
Disk drive.
• HARD DISK
• This is where most of the computer
data is stored especially the
programs and personal files.
• It consist one or more rigid metals
platters coated with metal oxide
material that allows data to be
magnetically recorded on the
surface.
jmarete@mku.ac.ke
2. Secondary storage.
jmarete@mku.ac.ke
Types of software
1. System software
2. Application software
3. Programming software.
jmarete@mku.ac.ke
1. SYSTEM SOFTWARE
• This is collection of programs
(instructions) written to service other
programs they control both the
computer hardware and the
application software. They provide
facilities that extend the general
capabilities of a computer. They also
interface the application software to
the hardware in order to allow the
computer user (operator) to perform
specific tasks.
jmarete@mku.ac.ke
OPERATING SYSTEM
SOFTWARE
(o.s)
• This is a collection of suit of
programs that directs and controls all
operation of a computer. E.g
• Ms- Windows 95, 98, 2000, XP ETC.
• Unix
• Linux
• Novel
jmarete@mku.ac.ke
APPLICATION SOFTWARE
• These are programs that are used in
specific functional areas to perform
given tasks.
• They are mainly provided by the
computer manufacturers or supplier
but a computer user can develop his
own programme. These personal
application software are called user
programs.
jmarete@mku.ac.ke
Examples of application
software:
1. Spreadsheets e.g Ms Excel, Lotus 1-2-
3, etc.
2. Word processors e.g Ms word, word
perfect, word star e.t.c
3. Databases e.g Ms Access, Dbase etc
4. Electronic Mail e.g –Internet & E-mail
5. Communication- outlook express,
internet explorer etc.
6. Desktop publishers e.g Adobe
Pagemaker, Ms publisher photo shop,
corel draw etc.
7. Presentation tools-Ms power point, 3d
jmarete@mku.ac.ke
4.Computer virus
• V-vital
• I-Information
• R-resources
• U-Under
• S- Siege
jmarete@mku.ac.ke
Cont.. Def:..
• A virus is a program designed
especially to change other programs
and course irregular behavior.
• It can be either a computer or data-
code signed:
• To replicate itself from computer
system in which a way has to make it
possible for it to amend/ destroy
programs, data files by interfering with
the normal process of operation.
jmarete@mku.ac.ke
Sources of virus
1. Contact with contaminated system-
any diskette used on a contaminated
system will be contaminated and if the
same diskette is inserted in another
system it will contaminate the system
hence making the computer virus
spread.
2. Pirated software
3. Infected proprietor software
4. Fake games
5. Freeware and shareware
jmarete@mku.ac.ke
Symptoms of virus
1. Unfamiliar graphics and quizzical messages
appearing on the screen
2. Programs taking longer than usual to load
3. Unusual error message occurring more
frequently
4. Less memory available than usual
5. Disk access lights seeming excessive for
simple task
6. Executing files changing in sizes for no
obvious reasons
7. Access lights turning on for no-referenced
devices.
jmarete@mku.ac.ke
Types of Virus
1. Trojan horse- it’s a program that
while visibly perform one function
secretly carries out another. E.g A
program could be running a computer
game, while simultaneously destroying
data, file or another program.
2. A time bomb- it is a piece code
triggered by certain events. A program
that stays in your system undeleted
until it is triggered by a certain event
in time, such as when a computer
system c lock reaches a certain date.
3. A trap door- its undocumented entry
jmarete@mku.ac.ke
Protective measures
1. Avoid down loading information
from unprotected sites
2. Make back up copies of your data.
3. Use antivirus program/tool kits e.g
Dr Solomon, Norton antivirus,
McAfee antivirus etc.
4. Guard against intrusion of
unauthorized system.
jmarete@mku.ac.ke
COMPUTER NETWORK
jmarete@mku.ac.ke
Disadvantages of
sneacernet
1. very slow
2. inefficient to meet the need and
expectations of todays
computer.
jmarete@mku.ac.ke
Computer network have 2
goals
1. To increase efficiency
2. Reduce cost
2. CONFIGURATION
- PEER –to-PEER
- CLIENT-SERVER
jmarete@mku.ac.ke
1. LOCAL AREA NETWORK
(LAN)
LAN – is the basic building block of any
computer network.
- can range from a simple (2 computers
connected by a cable to a complex 100s of
connected computers and peripherals
through a major operation)
- LAN are usually located in a single building
or campuses and handles interoffice
communications.
- LAN consists of computers , network
interface card (NIC) networking media ,
network traffic control devices and
peripherals devices.
jmarete@mku.ac.ke
They are designed to do
the following.
1. operate within a limited
geographical area.
2. Allow many users to access media
3. Provide full time connectivity to
local services
4. connect physically adjacent devices
jmarete@mku.ac.ke
Characteristic of LAN
1. high speed
2. low error data networks
3. cover a few thousand metres
4. They are owned by LAN
implementer of the network.
jmarete@mku.ac.ke
2. WIDE AREA NETWORK
As computer in business grew LAN’s were
found to be insufficient there was a
need for business to share information.
The solutions to this were WAN which
covers a large geographical area and
connect cities and countries.
They are designed to do the
following.
1. Allow access through serial interfaces.
2. operate at lower speed
3. provide full time and part time
connectivity
• 1. Low speed
• 2. high error data networks
• 3. cover several thousand kms
• 4. They are owned or controlled
by government.
jmarete@mku.ac.ke
3. METROPOLITAN AREA
NETWORK.
- This refers to a network with a
diameter of not more than 50kms.
- Spans metropolitan area.
- - Generally MAN span large
geographical area than LAN but
smaller than WAN.
- Meets the need for intermediate size
information communication that
could have benefit between those
offered by either WAN or LAN.
jmarete@mku.ac.ke
The choice of network to
implement depends on:
1. Size of organization
2. level of security required
3. Type of administrative support
available.
4. Amount of network traffic
5. Needs of network users.
6. network budget
jmarete@mku.ac.ke
CONFIGURATION
a. peer- to-peer network
• This refers to the simplicity form of network.
Each workstation work as both client and
server all are equal and therefore are known
as peers.
• Data and resources are distributed
throughout the network and each user is
responsible for sharing data and resources
connected to their systems.
• Peer –to –peer are also known as called
workgroups.
• They are relatively cheap because there is
no need for a powerful central server or
other component required for high capacity
network.
jmarete@mku.ac.ke
• Peer to peer is built into many networking
Peer –to- peer
implementation offers the
following advantages
jmarete@mku.ac.ke
2. SERVER BASED.
• Consist of client that make request to
dedicated server.
• - dedicated server one that function only as
a server and is not used as a client or
workstation.
• - Servers are optimized to service request
from network quickly and as to ensure
security of the files and directories.
• - As the network increase in size i.e the
number of computers , physical distance ,
and traffic between them. More than one
server is usually needed.
• - Server controls jmarete@mku.ac.ke
the data as well as printers
Server based
• Advantages.
• 1. dedicated server sharing resources.
• 2. centralized security.
• 3. easy back up
• 4. redundancy – data is duplicated across the
drives which help to restore the system incase
of phase failure.
• 5. number of users. –can support 1000s of users
• 6. hardware consideration – client need not to
be so powerful.
• Disadvantages
• 1. expensive
• 2. dependent on administrator
jmarete@mku.ac.ke
NETWORK TOPOLOGIES
• Topology – this defines structure of
a network. Divide into two parts.
• 1. Physical topology – they are the
actual layout of media or wire.
• 2. Logical topology –this defines
how media is accessed by the host. It
determines how computer
communicate on the network e,g
• -broadband
• - Token passing
jmarete@mku.ac.ke
Cont..
• Network topology affects its
capabilities the choice of any
topology will have impact on:
• the type of equipment the network
needs
• capability of equipment
• growth of the network
• The way the network is managed.
jmarete@mku.ac.ke
Physical topologies
jmarete@mku.ac.ke
• -It consist of devices connected to a
common shared cable.(Backbone).
-This is the simplest and most
common method of networking
computers.
• - Computers on a bus topology
network will see the sent data but
only the computer whose the
address matches the address
encoded in the signal accept the
information
jmarete@mku.ac.ke
Cont…
– All other computers reject the data.
– Only one computer can send data at any
time on first come first served basis.
– This type of logical topology is referred
broadcast
– Where by each host sends its data to all
other hosts to the network medium.
jmarete@mku.ac.ke
cont..
– The signal is sent to the entire network
from one end of the cable to another.
– At the both ends of the cable there is a
terminator – the purpose of this device
is to prevent the signal loss as it moves
back and forth (bouncing)
– The function of the terminator is either.
• transmit data to other computer on the
network
• Listen for data from other computer on
network.
– They are not responsible for moving
data from one computer to the next
jmarete@mku.ac.ke
hence if one computer fails it does not
• Factor that affect performance
of Bus Topology are:
• number of computers
• Hardware capability of computer on the
network.
• Total number of queued command awaiting
to be executed.
• Types of application running on the network.
• types of cables used on the network
• distance between computers
jmarete@mku.ac.ke
jmarete@mku.ac.ke
Cont..
• - It connects cables to a central point of
concentration usually a Hub/Switch.
• - Signals are transmitted on sending
computer through a hub to all computers
on the network. This type of logical
Topology is referred to as broadcasting.
• Advantages
• centralized resources and management
• Modifying system and adding new
computers is easy.
• Disadvantages
• If central point fails the entire network
goes down. jmarete@mku.ac.ke
jmarete@mku.ac.ke
• Ring Topology – connect one host
to the next and the last to the first.
– There are no terminated ends.
– These form a physical ring as illustration
above.
– The signal travel around the loop in one
direction and pass through each
computer.
– One method of transmitting data around
the ring is called token passing.
•
jmarete@mku.ac.ke
jmarete@mku.ac.ke
Cont..
• In mesh topology each computer is connected to
every other computer by separate cabling this
configuration provides regarded part through the
network so that if one cabling fails another one
will take over the traffic.
– it is used where there can be absolutely no
break in communication.
– E.g control system of a nuclear power plant.
• Disadvantage
• Expensive to install – a lot of cables are
required.
• Advantages.
• very reliable
• easy to troubleshoot jmarete@mku.ac.ke
jmarete@mku.ac.ke