Notes SUB ICT S 5
Notes SUB ICT S 5
Notes SUB ICT S 5
INTRODUCTION TO COMPUTERS
Definition
A computer is a programmable electronic device that accepts data; performs operations on that
data; presents the results, and stores the data or results as needed.The fact that a computeris
programmable means that a computer will do whatever the instructions-called the program-tell it
to do.The programs used with a computer determine the tasks the computer is able to perfrom.
The four operations described in this definition are more technically referred to as
input,processing,output and storage(information processing cycle). These four primary
operations of a computer can be defined as follows;
Input :entering data into the computer.
Processing:performing operations on the data.
Output : presenting the results.
Storage: saving data,programs, or output for future use.
A storage device is an apparatus for storing data and information. A basic computer consists of
4 components: an input device, a CPU, output devices, and memory.
Parts of a computer
The basic parts of a desktop computer are the computer case, monitor, keyboard, mouse, and
power cord. Each part plays an important role whenever you use a computer. The computer
case is the metal and plastic box that contains the main components of the computer. It houses
the motherboard, central processing unit (CPU), power supply, and more.
Data and information
In our definition, we said the computer accept data. Data consists of facts and numbers suitable
for communication or interpretation. When people or computer acts on data, we call it
processing.
Data is defined as raw facts and figures that have less meaning to the end user.
Or
Data is a collection of raw unprocessed facts, figures, and symbols.
Information is data that is organized, meaningful, and useful. To process data into information, a
computer uses hardware and software.
In brief; information is processed data which is meaningful to the end user.
Phases of data processing.
Data processing is the processing of data into information. This processing includes refining,
summarizing, categorizing, and otherwise manipulating data into a useful form.
Compiled by Francis
1
ICT Department 2020 Masaka Secondary School
Storage
Information flow
Input
Data must first be gathered together and then input to the computer system. An example of raw
data for input would be unorganized sales figures for different musical instruments sold by
different sales people in different states. Input means data is converted to a form that can be
processed by the computer.
Data is input into the computer with the help of keyboard, scanner, mouse networks and
modems.
Processing:
In processing, data is manipulated in ways to convert it into information. Processing consists of
classifying, sorting, and summarizing the input data. Processing also consists of performing
calculations and other logical activities, such as comparing sales figure to see which musical
instruments or which salespeople have higher sales.
Software programs and data are processed by the central processing unit (CPU)
Storage
Once displayed on the screen, the information will vanish when you turn the computer off. Thus,
in order to use the information in the future, you need to store it. Storage is saving information in
a computer usable form.
Compiled by Francis
2
ICT Department 2020 Masaka Secondary School
Software and data are stored on hard disks, compact discs, digital versatile discs and magnetic
tapes
Output
Results of processing are produced using devices like printers, monitors, sound cards etc.
Computer System
The way to think about a computer is as a system. The system is made up of five parts the
purpose of the system is to process data into information. This processing proceeds through four
phases of activity.
A computer system is a set of independent parts/device that work together to manage and process
data and information.
A computer system is mainly a combination of five elements;
Compiled by Francis
3
ICT Department 2020 Masaka Secondary School
a computer can store data temporally during processing and permanently in its secondary storage
devices for future reference.
d). Computers are diligent
Computers have the capacity to perform the same task “over and over” for a long period of time
without getting bored. This is evidenced in industrial robots like in car assembling company.
e). Versatile
A computer is versatile i.e. it has capabilities of performing tasks in many different ways. All
modern computers can perform different kind of tasks simultaneously.
f). Automation
A computer is an automatic electric device which can perform several programmed routines
without supervision e.g. booting (is the process of powering on and starting the operating system
of the computer)
g). Artificial intelligence
Computers have artificial intelligence i.e. they can respond to requests given to them and provide
solutions to them. They are capable of doing so by use of programs to make decisions and
functions accordingly.
h). lack of feelings/emotions
Computers lack the ability to make judgment; don’t suffer from stress or fatigue. They cannot
differentiate between users, irrespective of age, gender, social status, etc.
World of ICT
ICT refers to range of electronic tools for storing, displaying and exchanging information, and
for communication. It is a technology used to transmit, store, create, share or exchange
information for communication.
ICT is not limited to computers. People can use other ICT tools without having computers. In
other parts of the country where schools cannot access computers, other equipment of ICT
should be applied.
Examples of ICT tools include;
i). Radios ii). Television (TV)
iii). Video iv). DVD
v). Telephone vi). Satellite systems
vii). Computers e.g. desktops, Laptops, etc.
Compiled by Francis
4
ICT Department 2020 Masaka Secondary School
1
using a computer to deliver part, or all of a course whether it's in a school, part of your mandatory business training
or a full distance learning course
Compiled by Francis
5
ICT Department 2020 Masaka Secondary School
Compiled by Francis
6
ICT Department 2020 Masaka Secondary School
Advantages of E learning;
Learn on your own device. If your organization is against its employees bringing in their own
device to work, you can access your learning when you are not at work.
Learn at your own pace. E-Learning recognizes that your needs are unique and lets you learn
in your own time, in your own way, at your own pace.
You will have access to a unique learning plan that has been designed keeping your job role
and capabilities in mind.
Get access to information as soon as you need it courses are well structured, so you can find
the information you need, easily.
Compiled by Francis
7
ICT Department 2020 Masaka Secondary School
Self-evaluate. Self-assessments after every course let you know where you stand. If you are
unable to fair well in a particular course, you have the option of redoing the course until you get
it right.
Get immediate answers to your most pressing questions through the interactive interface that
connects you with peers and industry experts - across the globe.
Train in a safe environment with simulated learning. This is especially useful for employees
who are exposed to hazardous conditions like the pharmaceutical industry and those who must
train on the use of heavy/dangerous machinery.
ELearning is eco-friendly and drastically reduces your carbon footprint.
Increase your overall productivity by training in your free time, when you are at home or
traveling; it is accessible every day.
You don’t have to be connected to the internet. Organizations, whose employees are
constantly on the move, make sure that they can train, offline; work is automatically uploaded
when you are connected to the internet.
Perform better, and have greater retention of what you have learnt, than your classroom-
trained counterparts, and enjoy the fruit of being a top performer.
Green computing
Green computing refers to environmentally responsible usage of computers and related
resources. It involves the use of efficient hardware equipment, reduced energy consumption and
proper disposal of electronic wastes.
The common practices of green computing include;
Compiled by Francis
8
ICT Department 2020 Masaka Secondary School
COMPUTER MANAGEMENT
Booting process
You may wonder what happens when the computer starts;
Most microcomputers are switched on by the switch on the system unit and the monitor.
As the computer is switched on, it does the Power On Self Test (POST) before it starts. The
POST consists of RAM 2 check, CMOS (complementary metal oxide semiconductor) check,
HDD controller check (Disk Drive controller Check)
In case one of the checks fails, then an appropriate error message is displayed on the screen or
An abnormal number of beeps are sounded.
Note: Each error has a specific number of beeps.
The whole process is called BOOTING.
Note: CMOS memory stores vital data about system configuration, even when your computer is
turned off.
Definition
Booting is the process of starting a computer which involves loading an operating System into
memory.
Types of booting
There are two types of booting;
★ Cold booting /Hard boot
★ Warm booting / soft boot
Cold booting
It is the process of starting a computer which has been previously off.
OR
It can also refer to the process of starting a computer from rest.
Warm booting
It is the process of restarting a computer that is already turned on. In the windows environment,
it is normally performed by pressing Ctrl+Alt+Del keys on the Keyboard.
2
Random Access memory
Compiled by Francis
9
ICT Department 2020 Masaka Secondary School
Application of booting
Booting is done in the following cases;
Cold booting is done always when one is starting up the computer which has been totally off.
Warm booting is done;
- Whenever the computer devices such as keyboards, mouse, etc. stop responding to commands
issued to them.
- After installing a software or hardware onto your computer.
- After scanning for viruses.
Steps that occur during a cold boot using the windows operating system
- The power supply sends an electrical signal to the motherboard and other devices located in the
system unit.
- The CPU resets itself and looks for the ROM that contains the BIOS.
- The BIOS executes the Power on Self-Test (POST) to ensure that all the computer hardware is
connected properly and operating properly.
- The results of the POST are compared with the data in the CMOS chip on the motherboard.
- If the POST is completed successfully, the BIOS looks for the boot program that loads the
Operating system.
- Once located, the boot program is loaded into memory and executed, which then loads the
kernel of the operating system into RAM.
FILE MANAGEMENT
Definition:
File. A file is a collection of related records. An example is an inventory file for sporting goods
store. A file, made up of records, contains information on a specific topic, or group.
Qn. Choose the appropriate file extension from the list given for sentences (a) to (e).
Folder
File Management System
The File Management System (or simply File System) is the layer of system software
responsible for organizing and managing the storage of data on permanent media.
This media is often magnetic, eg: hard and floppy disk drives and tape streamers, but optical
media such as CD-ROM and DVD are also commonplace, and solid state memory devices, such
as pen drives or flash drives are becoming increasingly common.
As you know, each storage device on a computer has a drive letter assigned to it. The table
below shows a typical allocation of drive letters:
Drive Description
A: First floppy disk drive
B: Second floppy disk drive (only normally found on older machines)
C: Hard disk drive
D: Optical drive (CD/DVD reader/rewriter)
E: USB drive
If a machine has two hard disks, the second one is referred to as D: and the letters for subsequent
devices are incremented, eg: the CD/DVD drive would then be E: and so on.
Many of these devices are bootable, meaning that the operating system can be loaded from them.
The usual boot device is the hard disk, but a computer can also be booted from a floppy disk
(often used in emergencies) or from a CD-ROM (often used for installing the operating system).
The order in which the computer attempts to boot from the various devices is known as the boot
sequence. This can be adjusted via the BIOS, a set of instructions stored in a read-only memory
chip which enable a computer to start the operating system and communicate with system
devices.
A computer's file system can be regarded as analogous to a filing cabinet, as used for storing
paper documents. The disk drives correspond to the drawers in the filing cabinet and the
directories correspond to the folders stored in the drawers. The individual files, such as Word
documents, spreadsheets etc. correspond to the sheets of paper stored in the folders of the filing
cabinet.
Qn. a). Differentiate between copy a file and move file.
Copy file is where a file is duplicated to get two or more copies leaving the original behind
While
Move file is where a file is completely transferred from one position to another without leaving
the original behind.
Compiled by Francis
11
ICT Department 2020 Masaka Secondary School
b) Study the file path below and answer questions that follow:
F: \ accounts\bursar \ fees.xls
UTILITY PROGRAMS
These are system software component which are used to support, enhance or expand the existing
programs in a computer system.
OR
Utility programs are referred to as service programs which improve the performance of a
computer.
Many operating system have utility programs built in for a common purposes. However, some
utility programs are available separately and the common examples of utility programs include
the following;
Virus Protection
A virus protection utility is used to detect, remove or destroy viruses. This utility is also referred
to as anti-virus utility or software. It is used to scan hard disks and memory to detect, remove or
even destroy the viruses.
Note: It is always important to update the anti-virus software frequently in order to detect new
viruses.
Examples of common anti-virus software utility include;
- Norton anti-virus.
- Dr Solomon’s anti-virus.
- McAfee Virus Scan.
- Node32.
- Kaspersky anti-virus.
- Esset
- Smadav
- Avast
Compiled by Francis
12
ICT Department 2020 Masaka Secondary School
Archives
Output a stream or a single file when provided with a directory or a set of files. Archive
utilities, unlike archive suites, usually do not include compression or encryption capabilities.
Some archive utilities may even have a separate un-archive utility for the reverse operation.
Backup software
Can make copies of all information stored on a disk and restore either the entire disk (e.g. in
an event of disk failure) or selected files (e.g. in an event of accidental deletion).
Clipboard managers
Expand the clipboard functionality of an operating system.
Cryptographic utilities encrypt and decrypt streams and files.
Data compression utilities output a shorter stream or a smaller file when provided with a
stream or file.
Data synchronization utilities establish consistency among data from a source to target data
storage and vice versa. There are several branches of this type of utility:
File synchronization utilities maintain consistency between two sources. They may be used
to create redundancy or backup copies but are also used to help users carry their digital
music, photos and video in their mobile devices.
Revision control utilities are intended to deal with situations where more than one user
attempts to simultaneously modify the same file.
Debuggers are used to test and "debug" other programs, mainly to solve programming errors.
Also utilized for reverse engineering of software or systems.
Disk checkers can scan operating hard drive.
Disk cleaners can find files that are unnecessary to computer
operation, or take up considerable amounts of space. Disk cleaner helps the user to decide
what to delete when their hard disk is full.
Disk compression utilities can transparently compress/uncompress the contents of a disk,
increasing the capacity of the disk.
Disk defragmenters can detect computer files whose contents are scattered across several
locations on the hard disk, and move the fragments to one location to increase efficiency.
Disk partitions can divide an individual drive into multiple logical drives, each with its own
file system which can be mounted by the operating system and treated as an individual drive.
Compiled by Francis
13
ICT Department 2020 Masaka Secondary School
Disk space analyzers for the visualization of disk space usage by getting the size for each
folder (including sub folders) & files in folder or drive. Showing the distribution of the used
space.
File managers provide a convenient method of performing routine data management, email
recovery and management tasks, such as deleting, renaming, cataloging, cataloging, moving,
copying, merging, generating and modifying data sets.
Hex editors directly modify the text or data of a file. These files could be data or an actual
program.
Memory testers check for memory failures.
Network utilities Analyze the computer's network connectivity, configure network settings,
check data transfer or log events.
Package managers Are used to configure, install or keep up to date other software on a
computer.
Registry cleaners Clean and optimize the Windows Registry by removing old registry keys
that are no longer in use.
Screensavers Were desired to prevent phosphor burn-in on CRT and plasma computer
monitors by blanking the screen or filling it with moving images or patterns when the
computer is not in use. Contemporary screensavers are used primarily for entertainment or
security.
System monitors for monitoring resources and performance in a computer system.
System profilers provide detailed information about the software installed and hardware
attached to the computer.
Compiled by Francis
14
ICT Department 2020 Masaka Secondary School
Compiled by Francis
15
ICT Department 2020 Masaka Secondary School
Health problems
There are a number of health problems that you can suffer if you use ICT devices incorrectly
or for too long
The main ones are:
i). Repetitive Strain Injury (RSI)
ii). Back and Neck Strain
iii). Eye Strain and Headaches
Compiled by Francis
16
ICT Department 2020 Masaka Secondary School
(b) Back and Neck -Working in a cramped - Take regular breaks to stretch your
Problems workspace. body.
Back ache and neck ache can -Not sitting upright in your chair. - Use adjustable chairs so you can sit in a
cause great pain and affect -Incorrect positioning of the position suitable for your height.
the quality of your life. computer screen. - Sit upright against the back rest.
Both back and neck ache can - Tilt the computer screen so it is set just
be caused by sitting below your eye level.
incorrectly and using poor - Keep your feet flat on the floor.
quality chairs without back
rests. This is called poor
posture
(c) Eye strain and - Staring at a computer Screen - Use LCD screens rather than CRT as
headache for a long time. they have less flicker.
Staring at a computer screen - Working in a room with bad - Use an anti-glare screen.
for too long can strain your lighting. - Ensure that room lighting is good with
eyes and cause headaches. - Using a computer screen with no direct light causing glare on the
Compiled by Francis
17
ICT Department 2020 Masaka Secondary School
SAFETY ISSUES
There are a number of safety issues that can arise from using ICT devices.
Some of these safety issues include:
i). Electrocution
ii). Tripping over wires
iii). Heavy equipment falling on you
iv).Fire risks
Compiled by Francis
18
ICT Department 2020 Masaka Secondary School
Compiled by Francis
19