Eddrine Notes
Eddrine Notes
Monitor
Speaker
Keyboard
Computer Case
(Processor inside)
CD-ROM/DVD Mouse
Drive
Printer
Floppy Disk
Drive
PARTS OF A COMPUTER
The monitor: This is a device which shows/gives the soft copy of the
data/information in the computer screen.
There are two basic types of monitors: CRT (cathode ray tube) monitors and LCD
(liquid crystal display) monitors.
\Keyboard. It’s an input device that converts letters and other characters into
electric signals readable by the processor. It’s a device which enables a computer
user to communicate to the computer system.
Mouse. This is a handheld pointing device which is used to point, select, move
and draw object in the computer screen. Examples of mice include: codeless,
touch pad (touch tone pad), mouse stick/wired.
Printers. These are devices which gives a hard copy of the soft copy of the data
or information held in the computer. Printers are output devices that produce text
and graphics on paper. The two main types of printers are inkjet printers and
laser printers. Inkjet printers are the most popular printers for the home.
Speakers. Speakers are output devices used to play sound. They may be built
into the system unit or connected with cables.
System unit The system unit is the core of a computer system. Inside this box
are many electronic components that process information. The most important of
these components is the central processing unit (CPU), or microprocessor, which
acts as the "brain" of your computer. Another component is random access
memory (RAM), which temporarily stores information that the CPU uses while the
computer is on.
CD/DVD Drive
This a computer hardware device that reads compact discs and DVDs
Hard drive
BASIC PARTS OF A COMPUTER
Monitor
Mouse
Keyboard
System unit
CD/DVD Drive
COMPUTER MODELS
ICT’s can also be defined as diverse set of technological tools and resources
used to communicate and create, disseminate, store and manage information.
These technologies include; computers, the internet, broadcasting technologies
(radio and TV) and telephones
Or
ICT refers to the technologies that provide access to information focusing
mainly on communication technologies such as internet, wireless networks, cell
phones, personal computers and other communication mediums.
Examples of old technologies before the coming of ICTs
✓ News papers
✓ Film
✓ Recordings
✓ Paper printed photographs
Examples of new technologies that came due to ict
✓ E-mail
✓ Video conferencing
✓ Internet
✓ Cellular phones
✓ Optical disks (CDs DVDs etc)
✓ Databases
✓ Satellites etc
Business
1. Electronic Commerce: E-commerce is the use of telecommunications or the
Internet to carry out business of any type. Common examples of e-
commerce are business-to-business e-commerce, online shopping, online
banking, online stock trading etc. One of the advantages of e-commerce is
the reduction of transaction costs.
2. Translation services which are a key to a business wishing to expand
overseas are offered. A business industry which is international, translation
in terms of the written words and literature is extremely important.
Translation software is used.
3. Direct mailing is a way in which production companies send material/
product information directly to potential customers. The aim is to focus on
real customers rather than sending information to people who have very
little interest in the product.
4. Tele-marketing is often used by media companies especially sales
departments to generate appointments with potential customers. Often
electronic versions of customer database lists are purchased allowing sales
to contact potential customers directly.
5. Facilitating activities in the business sector such as manufacturing. There
has been a shift from the old production system to a new mode which is
facilitated by information and Communication technology. While the old
production and manufacturing system is energy-intensive, standardized and
departmentalized the new manufacturing system facilitated by ICT’s is
information intensive, customized, networked and integrated.
Education
1. The online learning system is another web-based application that is
revolutionalising the learning platform of education. This system
compliments the traditional face-to face teaching and learning format. In
the on-line system, students can access class notes, submit assignment
and also join a discussion group with other learners.
2. The education sector is arguably one major area that ICT’s are playing
remarkable role. These technologies are widely used in education as
teaching aids and in research; they are used to access reference materials
thus helping in facilitating learn ship and exchange of educational materials.
3. ICT’s are helping library professionals store and manage academic
information. Libraries have migrated from the traditional Dewey cataloguing
system to an on-line system, which is a web-based cataloguing and search
application.
4. The more commonly used internet communication is email. Used around
workplaces and schools all across the world, this simple way of
communication seems a necessity in today’s society. Being able to send
and receive messages, images and files in seconds, is now one of the most
important systems of communication and without it work places, schools
and companies may not be able to function properly.
Health
▪ Medical automation by the use of ICT’s offers a great assistance in the
areas of:
▪ -Automated diagnosis
▪ -Electro-cardiogram screening and monitoring
▪ ICT’s allow for access to otherwise inaccessible and expensive foreign
expertise or labor and make it possible for hospitals in our country to use
consultants or even surgeons in another country thereby saving patients
from traveling.
▪ They support efficient exchange of information between health professionals,
they enable transfer of patient records between sites and they can improve
clinical effectiveness, continuity, and quality of care by health professionals.
▪ ICT’s offer Special Needs (for the Physically Challenged). For many people
with physical disabilities, ICTs can be extremely useful in providing access
to communication, education and open up opportunities for them. Most
telecommunications infrastructures are now being designed with the
capabilities of meeting the special needs of the physically challenged. For
instance, the Short Message Service (SMS) can be used to send and receive
messages by the hearing impaired; the voice activated dialing service can
be used by visually impaired.
Security
▪ Computers keep law and order, fight crime and offer security and defense.
Police are now able to keep databases of fingerprints which are
automatically analyzed by computers. The police use this database to keep
track of all investigations.
▪ In addition, it also holds information about criminal records and previous
convictions. When information is needed about specific criminal, information
could travel from one police station on one side of the country to another
police station on the other side of the country in a matter of seconds
thanks to the internet communication.
▪ Also computers based on face recognition and analysis, help the police
force in leading to arrest off traffic offenders and criminals.
▪ In defense, ICT’s such as computers are used in electronic intelligence
gathering, efficient communication, detection and tracking of targets, radar
systems warning systems and military laser guided missile systems etc.
Politics and governance
o ICT’s are used as sources for obtaining information. For example, political
candidates provide statements of their policies on their websites, and
possibly, a link to their full manifesto, free access to information on a
particular political issue is a pre-requisite for engaging in public debate,
and such debate is desirable prior to political action like mass
demonstrations.
o Participating in decision making. The most obvious way in which citizens
participate in political decision-making is when they cast their vote for their
government representative. ICTs could make the voting process more
convenient by enabling electronic voting over the Internet from anywhere.
This would also speed up vote counting.
o ICT’s are heavily used in many government ministries such as finance,
planning, education etc to store government records and improve the
efficiency within the civil services.
Positives
Social
Ease of access and availability
Look at how modern ICT allows citizens today to communicate and participate
in society. We use text messaging to vote on TV shows, enter competitions and
have our opinions broadcast on national TV and radio. We use digital TV to
order goods, vote on TV shows etc
We can have access to the Internet in our social lives as well with libraries having
Internet access points and Internet cafes still being popular. Restaurants often
have Internet access points and if you have stayed in a ‘big’ hotel lately you will
find that the rooms have Internet access points for your laptop to plug into.
There is some concern that the widespread use of computers is dividing society
into two kinds of people – the ‘information rich’ and ‘information poor’.
They get information and news from the Internet and buy the latest products
through on-line shopping.
They are able to follow computer-based learning and skills training courses at
home, and look for jobs that are advertised solely on the Internet.
They tend to find it easier to get well-paid jobs and will enjoy a more comfortable
and secure life-style.
The information poor don’t have easy access to computers and don’t have the
IT skills and confidence to take part in teleshopping, telebanking, Internet chat
and news groups. As corporations like the BBC seek public opinion on current
matters increasingly via the Internet, the voices of the information poor may not
be heard. The jobs on offer to them will be less skilled, paid less and much
more insecure.
Economic
Another less obvious effect of computers and IT on the family is the change that
banks have made to our lives. Before banks were computerized, most workers
were paid weekly and in cash, and they did not need a bank account. With the
introduction of computerization, banks started to persuade companies, government
and local authorities to pay employees by cheque. As a result, very little cash
is in circulation now compared with the 1950s and 60s because now people work
with ‘plastic money.
Political
ICT’s such as internet are used to predict and track climate changes in
agriculture, the incidence of forest fires, flood and drought patterns, the movement
of invasive species just to name a few and develop appropriate management and
adaptation strategies, and plot a course toward better environmental management.
ICT’s applications can be used to impart information directly to farmers and the
farming community. There are expert system designed to handle agricultural issues
such as water utilization and management, pest control, harvest management and
so forth.
A folder. It’s an object that can contain multiple documents. Folders are used
to organize information.
Practical questions about a file
• Creation of a folder on a storage medium of a computer.
• Moving a folder to a desired location
• Deleting a folder
Practical questions about a file
✓ -Identifying a file
✓ -saving a file in a desired location.
✓ -using folders and sub folders to effectively categorize files
✓ Describing how to customize the desktop
✓ Explaining the major icons on the desktop
Types of files
Text files, data files, program files, directory files etc. program files store files
where as text files store text.
Associated File Associated File Extension
program extension program
Microsoft word .doc Ms power point .ppt
Microsoft excel .exl Microsoft Access .dbm
Photo .jpeg/ .png
Importance of a file extension
❖ Helps to identify the file type
❖ To identify the software type used to prepare the document
How to recover accidently deleted work in a computer
❖ You can restore from the recycle bin
❖ Use the undo command
❖ Use recovery software
Customizing the desktop
This is the process of changing the different settings of how your computer
screen display will look like i.e. setting screen saver, changing the wall paper,
mouse pointer and setting different icons to appear on the screen
Practical questions
• How to set a screen saver
• How to set a wall paper
• How to change the mouse pointer
• How to disable some icons from being displayed on the screen
Major icons found on the desktop
When a computer starts, it displays different icons that work differently as
explained below;
• Recycle bin icon
Its an icon that represents a container for all deleted items from the
computer or this is where deleted items are stored
• My computer.
It’s the icon that represent computer hard disks i.e. local disk (D), local
disk (C)
Utility programs are system programs that are used to support and enhance
the proper performance of an operating system.
Utility programs include:
Backup programs. These programs let you protect your files by making copies of
them.
Data recovery. These are programs used to restore data that has been physically
damaged or corrupted.
Data compression programs are utilities which are used to remove redundant
elements, gaps and unnecessary data from a computer’s storage space.
Debuggers. These are programs which correct errors in a computer program. A
bug is an error in a computer program and to debug means to correct errors in
a program
Defragmenters. Are programs which bring fragments of a file together for storage
in one location in the computer memory.
Anti-virus programs. These software protect your system from viruses. They
include; Mac fee, Avira, Avast etc.
Disk maintenance utilities like Norton disk doctor, scandisk etc. are programs that
detect errors on a computer disk and fix them.
Air conditioner
• Air conditioning units monitor and maintain the temperature, air distribution and
humidity in a computer room.
• An Air conditioning unit is a device used for cooling and controlling the humidity
and purity of the air circulating in a space.
Fire extinguisher
❖ Fire extinguishers are a critical component of saving property and lives in the
case of a fire emergency.
❖ Owning a fire extinguisher is a form of ensuring safety.
❖ All computer rooms need it just in case a fire starts.
❖ It can save our property from burning because the use of the device will help
prevent it from spreading and can even stop the flame in no time.
❖ Security camera
❖ Security cameras act as a deterrent to theft and other crimes. Cameras monitor
data centers or blind spots outside of doors.
Blower
Used to blow/remove dust that may
Have entered inside the computer
Antiglare screens
Regulate excess light from monitors
Especially CRT monitors.
Reasons to keep a first aid kit: Prevent infection, Prevent excessive blood loss,
Prevent scarring, Prevent an acute injury from becoming a chronic problem and
Prevent death.
Wool carpet
The wool carpet is used to trap dust that
Enters in the computer laboratory.
Internet gateway
An internet gateway is your modem or router or any other peripheral which allows
you to access the internet.
Burglar proofing
Burglar proofing provides protection against any forced physical entry into the
Computer laboratory. Burglar proofing
Involves fitting metal grills in windows and doors.
How a computer lab can be used safely
Computer laboratories give many people access to computer programs, internet
and other resources. Lab computers are used often by people with varying degrees
of computer training. This means they are at risk from viruses, corrupt files,
spyware, malfunction etc so you have to maintain Lab computers regularly in
order to ensure that they do not crash by doing the following;
❖ Plug all your computer equipment into a surge protector to avoid power
spikes which can damage electrical equipment as well as lose user’s
data
❖ Set up a network layer firewall that will deny access to sites or programs
that don’t fit into the acceptable range
❖ Set up weekly updates or automatic updates for your lab computers i.e.
update your programs regularly
❖ Install an up-to-date anti-virus program on the computers this will
usually stop a computer from acquiring virus
❖ Install an up-to-date anti-spyware program on your computers to stop
spyware programs that install themselves onto a computer to gather
personal information
❖ Bach up your computers data on a regular basis so that if your
computers become corrupted by a virus you can return to the previous
backup to restore it
❖ Do not unplug printers, scanners and other connected machines when
the computers are on i.e. eject any USB devices before unplugging them
❖ Ask your users to always press the Ctrl+Alt+Del buttons whenever their
computers freezes rather than shutting it down with the power button
❖ Turn off all computers by selecting the shutdown option on the desktop.
A void pressing the power button to turn off computers
❖ Clean your computer lab regularly. The following are effective ways to
clean a computer lab
a) Dust computer screens using a thin soft microfiber cloth. Dedicate one
cloth to be used only on the screen
b) Use compressed air to clean out keyboards or you may use disinfectant
spray to clean your key board
c) Dust all parts that are found inside the system unit using a borrower
We are often asked to investigate why a computer is running slowly and what
can be done to make it faster. Diagnosing the reason a computer is running
slowly requires checking all of these potential causes, since the symptom alone
is not enough to differentiate or isolate the cause. This list is not
comprehensive; there are some other unusual and rare causes that will make a
computer run more slowly.
1. Insufficient RAM to run all programs in memory without swapping to the hard
drive.
Solution: compare commit charge to physical RAM and add RAM memory.
11. Low performance hard drive with 2mb cache or 5400-rpm spindle motor:
Solution: replace hard drive with faster 8mb cache and 7200-rpm spindle motor
or SSD drive.
TOPIC 4: COMPUTER HARDWARE
It’s a general term used to describe all the various physical or tangible parts of
a computer like monitor, printer, keyboard etc
Hardware is divided into four main components:
▪ Input devices/ units
▪ Output devices
▪ Storage devices
▪ Processing unit
▪ Communication devices
Input devices. These are used to enter data into the computer.
Output devices. These bring out information to the user.
Storage devices. These are used to store information for future use.
Processing devices. These are used to manipulate data into information.
Communication devices. These are used in sending and receiving information
Input devices. These are devices that feed the computer with data and information.
They include; a keyboard, scanner, mouse, digital cameras, joy stick, smart cards,
credit card, automated Teller Machine card (ATM card), light pen, magnetic ink
character reader(MICR), optical mark reader (OCR), bar code readers, optical
character readers, touch screen, digitizer among others.
OR
These are devices used in entering data and instructions into a computer. Note
that, the input could be text (numbers, letters and formulae) images, sound etc
Data can be
Keyboard. It’s an input device that converts letters and other characters into
electric signals readable by the processor. It has a type writer area, function keys,
cursor movement keys and numerical keypad. It’s a device which enables a
computer user to communicate to the computer system.
Parts of a keyboard.
Function keys. Are usually located along the top of the keyboard. They are
labelled F1, F2 up to F12. It is used to perform specialised functions according
to the operating system used. For example pressing F1 key in most programs
starts the help menu.
Alphanumeric keys (Typing keys). This is used for text data entry. These are
labelled alphabetic letters A to Z, numbers arranged in line – 1, 2, 3, ----0 and
special symbols such as ?, ], % etc. this group also includes, Tab, Enter, Caps
lock, Space bar and back space keys.
Numeric keypad keys. These are meant to help the user to rapidly enter numeric
data and are located on the right hand side of the keyboard. The Numeric keypad
is only used when Num lock key is turned on. It consists of numbers 0 to 9,and
arithmetical signs like +(addition), * (Multiplication), - (subtraction) and / (division)
Special purpose keys. These are used in combination with others to give certain
commands to a computer. For example CTRL + ESC is used to display the start
menu. They include SHIFT, CTRL, ALT and ESC.
Cursor control (Navigation) keys. These are used to move the cursor in all
directions. They include; - Arrow keys - Page up and page down - Home and End
keys
Editing keys are used to delete and insert characters in a document. They include;
- Delete key
Insert key
Advantages of using the keyboard
• Entering data and instructions with keyboards is generally faster than pointing
devices
• Keyboards are more reliable and usually produce fewer errors than other input
devices such as voice inputs
• There is no need to buy additional equipments since computers are normally
supplied with keyboards
Disadvantages of using a keyboard
• It takes a lot of time to practice in order to type quickly and accurately
• Typing speed is still very slow when compared with computer speed
Mouse. This is a hand held pointing device which is used to point, select,
move and draw object in the computer screen. Examples of mice include:
codeless, touch pad (touch tone pad), mouse stick.
Scanner. Is a light sensing input device that converts printed texts and graphics
into a digital form that can be further processed by the computer OR This is
advice that is used to read graphical data or information into a computer e.g.
logos, emblems, photos, pictures etc. scanners are usually used to capture
existing documents in an electronic form for further processing or incorporating
into other documents. Text and graphics can be scanned and images can be
manipulated by changing the colors, the sharpness and contrast etc.
Types of scanners
o Hand scanners. These are used in scanning small objects e.g. logos,
signatures, emblems, budges, thumb prints etc.
o Flat bed scanner. These are heavy scanners which are used for scanning
commercial photos and pictures.
Credit card. It’s a small plastic card that allows its holder to buy goods and
services on credit and to pay at fixed intervals. It has a strip of magnetic tape
fixed on it containing coded information which is usually the owner’s code. The
card is inserted into a slot where magnetic data may be picked. Details of the
transaction are then recorded against the credit card number and the owner’s
account is credited with the transaction.
Bar code reader. Most items manufactured are labeled with a Universal Product
Code (UPC), identifying the items .the label code is terms of bars with coded
spacing and thickness. These bars contain information in code that a computer
can interpret. Most supermarkets today use this system and the codes can be
seen on every item on stock. This enables fast pricing, identification and accurate
stock tracking/taking. A bar code reader is a device used t read these codes
and send request to central computer on which the database of the organization
is stored, the central computer sends a response about the product details i.e.
its price, name, manufactured date etc.
Optical mark reader. This is a device which can detect the presence or absence
of a mark on a paper. Light is shown onto the paper and the reflected light is
detected. This device is used for reading answers to questions in an exam or
survey.
The magnetic ink character reader. This is used to read characters written using
magnetic ink. They are used in banks to read cheques and at points of sales in
shops.
The voice recognition device. This is used to recognize words from a person and
follow the instructions. An example of its use is in a computer which opens money
safe, if the correct password is said.
The joystick. It’s a device connected to a terminal with a control level that can
be moved or titled in various directions for moving the cursor to any position on
the screen. It’s commonly used in computer graphics and in playing games.
A light pen. It consists of a stylus connected by a cable to the terminal that can
sense the light from a position on the screen and convert it into an electrical
signal transmitted to the computer. It can be used to move or delete images on
the screen or to create new images.
Touch screen. With touch screen, users of computers just have to point on a
particular item they want to select from the screen using their fingers. When a
particular part is touched, the screen can sense that part and the item in that
area will be selected.
Digital cameras. These take photographs like normal cameras do. The only
difference is that digital cameras do not create an image on a film like ordinary
cameras but instead the image is stored on the camera and after downloaded
onto a computer for editing and printing.
Output Devices
These are external hardware components that transfer information from the
computer’s central processing Unit (CPU) to the computer user in either soft or
hardcopy format.
OR
An output is data that has been processed into useful form called information
Soft copy: This is the output displayed or listened to. OR: Is the un printed
digital document file.
Hard copy: This is the information recorded on a physical medium e.g. paper,
film etc
Printers. These are devices which gives a hard copy of the soft copy of the
data or information held in the computer.
Printers are output devices that produce text and graphics on paper. They are
connected by a cable to a PC through a special socket on the computer
referred to as a printer port.
Types of printers:
They are basically two types of printers i.e. impact and non-impact printers.
Impact printers are the ones which print by physically striking their print heads
on the printing media like paper, cloth etc. e.g. Dot matrix which print using a
set of pins on a print head, Daisy wheel which print using a wheel of
characters etc. Their print heads press the paper with the ribbon to produce
the printout.
Non-impact printers are the ones which print by not physically striking their
print heads on the printing media like paper, cloth etc They use chemicals,
laser or heat to produce the image. They give out high quality printouts. E.g.
laser jet which uses toner contained in toner cartridges and ink jet which uses
ink contained in ink cartridges.
Advantages of Non-Impact printers.
❖ They produce high quality work ie clear resolution.
❖ They do not produce a lot of noise
❖ They are faster than impact printers
❖ They use little power compared to impact printers
❖ They generate less heat during their operation.
Speaker. These are used to produce sound output. A speaker’s sound output is
measured in watts of power output. The higher the speaker’s rating, the better
the sound output.
Projectors. Projectors are used to display information for bigger audiences on
bigger screens. Data projectors are of two types;
- Liquid crystal display projectors; are projectors that use liquid crystal
technology to produce lower quality images.
- Digital light processing (DLP) projectors are projectors that use tinny mirrors
to reflect light. It can produce much better quality images in a well lit room.
NOTE: All devices that reside outside the computer system case whether input
or output are called peripheral devices.
Computer ports
USB (Universal Serial Bus) ports. This connects storage, output and input
devices.
PS/2 ports. This connects a mouse or keyboard.
Serial port. This connects modem, scanner, a mouse etc (sends and receives
data one bit at a time)
Parallel port. This is used to connect newer versions of printers and other
peripherals such as monitor. They transfer data faster than the serial port.
VGA port (Video graphics Array). This only connects monitors.
Fire wire. This connects storage, output and input. Fire wire is made to handle
more data than USB particularly audio and visual information.
Storage devices
These are devices used to store computer data either permanently or
temporarily. E.g. RAM, hard disk, flash e.t.c
A storage drive /media is a device on the system unit where storage devices
are inserted to be read and written on.
Writing data means recording data from memory to the storage device.
Reading data. Means transferring data from a storage media to computer’s
memory. Capacity is the number of bytes (characters) a storage device can
hold
Characteristics of RAM
- It stores data temporarily
- RAM size can be changed or increased
- RAM is a read and write memory
- RAM occupies a bigger portion of the main memory (70%)
- RAM is volatile. It can easily lose its contents
Types of RAM
• Static RAM
• Dynamic RAM
NOTE: Hard disk partitioning/ disk slicing is the creation of one or more
regions on a hard disk so that each region separately.
Reasons for disk portioning
❖ To provide space for data backups access
❖ To safeguard specific information from unauthorized
❖ To speed up computer operations.
ADVANTAGES
❖ It is easy to transport (portable)
❖ They were cheap to buy
❖ Data access took shorter time (Random Access)
Disadvantages
❖ They have limited space of up to 1.44MB
❖ They were prone to virus attacks and this caused data loss
❖ Environmental factors like dust, temperature and sunlight could spoil the
information stored
(b)
Optical Storage devices: These are electro – mechanical units coated with high
reflective material.
Data is written on the disk by focusing it on a high power laser beam.
These include;
CD –R or CD (Compact disk Read memory) This is a compact disk which can
be written to only once and can be read many times. The data on this disk
cannot be erased.
CD – RW (Compact disk Re – writable) This is an erasable compact disk that
can be written to multiple times. CD R and CD – RW have a standard storage
capacity of 700MB (MEGA BYTES)
DVD – R (Digital Versatile Disk) Data on this disk cannot be erased once written
on its storage capacity is 4.7GB
DISADVANTAGES
❖ To record data on a CD one needs a CD writer
❖ Their average access time is slower compared to hard disk
❖ Their destruction rate is high since a single scratch may render it useless.
Solid state storage devices (SSS) Is a type of computer storage device made
from silicon microchips. SSS store data electrically instead of magnetically.
These include;
(i) Memory cards: These are micro storage cards mainly used in small digital
devices like mobile phones, digital camera and personal computer.
(ii) Flash Disk: This is a small external pen – like storage device that can store
all data types it connects through the USB ports Etc
MEMORY MEASUREMENTS
Memory in computers is measured basing on the basic operations of a
computer. A computer operates in the binary system of measurement. I.e. 0’s
and 1’s
Processing device
This is the heart of the computer where the entire processing takes place. It is
sometimes referred to as the brain of the computer. It is the center of activities
in the computer hence referred to as Central Processing Unit.
The microprocessor does the following:
o Carries out commands to make the hardware components perform
actions
o Processing data. This involves performing logical instructions such as
comparing and performing mathematical instructions such as adding and
subtracting.
Machine cycle
This is a series of operations performed to execute a single program
instruction. The machine cycle consists of four steps namely;
❖ Fetch
❖ Decode
❖ Execute
❖ Store
Fetch
Store Decode
Execute
The CPU performs the following steps for each instruction;
1) The control unit fetches (GETS) the instruction from memory.
2) The control unit decodes the instruction and directs that the necessary
data can be moved from memory to the arithmetic logic unit. These first
two steps together are called instruction time or I-time.
3) The arithmetic logic unit execute the arithmetic and logical instruction.
That is the ALU is given control and performs the actual operation on
the data.
4) The ALU stores the result of this operation in memory or in a register.
Step 3 and 4 are together called Execution time or E-time
The registers
This is the component which stores instructions temporarily in the CPU while
awaiting handling by the (ALU).
SCSI port
It is a special high-speed parallel port used to attach
peripheral devices such as disk drives and printers..
IrDA port
Some devices transmit data via infrared light waves. For these
wireless devices to transmit signals to a computer, both the
computer and the
Program. This is a series of step-by-step instructs that provide solutions and tell
the computer what to do. They are logical arranged set of programming statement.
System software
These are programs which control and support all other computer programs and
the hardware.
They manage the computer system resources and ensure efficient running of the
computer.
Types of System software:
• The operating system
• Software development tools (programming languages, compilers,
interpreters)
• The utilities (utility software)
Operating system
This is a software that coordinates all activities among the computer software
and hardware devices.
These are programs that manage the computer resources.
Op supervises and manages the different activities that take place in the computer
like the way the software uses the hardware.
The operating system ensures that the computer operates in a systematic reliable
manner.
Examples of operating systems; Windows Vista, Windows XP, Windows NT (New
Technology), Windows 98, Windows 7, Windows 8, Windows 10 (Latest version),
Linux, Unix, Windows ME (Millennium), DOS, Windows 3X, Windows 95
❑ Multiprogramming
▪ Is the execution of two or more programs on a multi user
operating system.
❑ Multiprocessing
▪ This is done by two or more computers or processors linked
together to perform or work simultaneously.
Programming Languages:
This is a means of communicating with the computer.
Machine language
This is written in binary format i.e. in 0s and 1s
Characteristics
❖ It is very difficult to learn to human beings
❖ Programs are likely to have errors
❖ It is easily understood by the processor
Assembly language
This is a language inverted to simplify machine code language
Characteristics
❖ It closely looks like machine code language.
❖ It is easier to understand that the machine code
❖ It uses few English abbreviations or words e.g. SUB for subtract, FNO for first
number
Advantages
❖ These were introduced as an improvement for assembly language
❖ They make programming much easier due to use of English words
❖ Less time is spent to write a length program
Disadvantages
❖ The language cannot easily be understood by the processor.
LANGUAGE PROCESSORS/TRANSISTOR
These are programs that are used to translate high level languages into low
level languages and vice versa.
These include;
❑ Interpreter
▪ A language translator that translates a program line by line at a
time into machine code
❑ Compiler
▪ A language translator that converts a complete program into
machine language to produce a program that the computer can
process in its entirety
❑ Assemblers
▪ These translate assembly instructions into machine code.
❑ Linkers
▪ These combine compiled programs and determine where the
program will be located in memory.
▪ Backup programs
▪ Data compressor
▪ Anti-virus programs
▪ Backup up programs. These ones let you protect your files by making
copies of them.
▪ Data recovery programs. These are used to restore data that has been
physically damaged or corrupted.
▪ Data compression programs. These are utilities which are used remove
redundant elements, gaps and unnecessary data from a computer’s storage
space. Due to very large sizes of files used in multimedia (graphics, sound
and video files) data compression is used to reduce the storage space
required. There are two major types of data compression, lossy and lossless.
▪ Lossy compression involves a certain loss of accuracy in exchange for
great compression.
▪ Lossless compression achieves compression by removing redundant data
elements and does not achieve as much compression (1:4). An example is
WINZIP.
▪ Debuggers. These are programs which correct errors in a computer program.
▪ A bug is an error in a computer program and to debug means to correct
errors in a program.
▪ Defragmenters
▪ These are programs, which bring fragments of a file together for storage
in one location in the computer memory.
▪ Disk maintenance
▪ Disk maintenance utilities like Norton disk doctor, scandisk etc. These
programs detect errors on a computer disk and fix them like checking for
bad clusters on a hard disk or diskette and marking faulty ones as bad
cluster.
Computer viruses
These are computer programs which silently replicate (reproduce) themselves on
storage media without the computer user realizing it.
These lardy viruses attack the file allocation table (FAT) which is the disc part
used to store every information about the available space, location of files,
unusable space etc.
Worm
This program is very similar to a virus and has the ability to self-replicate
leading to negative effects on your computer.
❖ lovgate.F
❖ sobig.D
❖ trile. C
❖ PSWBugbear.B
❖ Mapson
Trojans
Trojans can illegally trace important login details of users online. For example
E-Banking is very common among users, therefore, vulnerability of tracing your
login details whenever your PC is working without any strong powerful antivirus
installed.
Email Virus
This is a virus spread via an email. Such a virus will hide in an email and when
the recipient opens the mail.
45
❖ Programs and files disappearing mysteriously
❖ Access lights turning on for non referred devices
❖ Computer indicating that storage devices are full when there is still enough space
1. Allocating system resources: The system resources are time, memory, input,
and output. The time in the CPU is divided into time slices. The time slices
is measured in terms of milliseconds. Based on the priority of tasks the
time slices are assigned. Memory is also managed by operating system.
Disk space is the part of main memory. The data flow is controlled by
operating system.
2. Monitoring system activities: The system security and system performance
is monitored by system software. System performance includes response
time and CPU utilization. System security is a part of operating system.
Multiple users can’t access without the security code or password.
3. File and disk management: The user needs to save, copy, delete, move
and rename the files. The system software will handle those functions. Disk
and file management is the technical task.
2. Application software
46
These are programs designed to solve specific problems of the user.
Application software is designed to perform the practical problems experienced in
life.
Application software includes most of the types of programs we use every day
to get our computerized work done. Application programs are widely used in our
society for entering and editing text (word processing), for entering and
manipulating numerical data (spread sheets and other business programs), and
for record keeping (database management programs). These types of programs
are sometimes referred to as general purpose applications.
Application software is divided into two: i.e. off-shelf and Bespoke (custom-made)
software/Tailor made application software.
Off- shelf application software can further be divided into Horizontal market
applications (common applications you can find on every office computer) and
vertical market applications also known as specialized application programs.
47
o Word-processors used to produce text documents that are professionally
laid out.
48
Examples of off the shelf software include:
❖ WORD PROCESSING SOFTWARE
❖ SPREAD SHEET SOFTWARE
Bespoke software is written especially for you, to meet your specific business
requirements.
• Higher initial costs. It will cost more at the beginning, as you have to pay
the development costs.
• Takes longer. Depending on the size and complexity of the software, it
may take months or even years to develop.
Forms of software
49
Freeware: This is a software provided at no cost to users e.g. most of the
applications on phones like whatsapp.
Shareware: This is a software that is distributed free for a trial period and
payment is required for using the software beyond the trial period.
Public domain software: This is free software donated for public use with no
copyright restrictions. For example parliament news, newspapers.
Open source software: This the software which is given to the public and are
free to edit, change and modify.
User interfaces
The commands accept and execute by part of the O/S called command
processor/ command line interpreter.
Command driven software is more flexible than menu driver software but it is
more difficult to learn.
The user must be having the knowledge of available commands of what they
do and the rules governing how they must be typed.
Therefore they are used by experienced user other than beginners and they
tend to be used by technical people such as computer operators, programmers,
and technicians. –
Graphical user interface (GUI). It is the one which allows the user to use
menus and visual images such as icons, buttons, and other graphic objects to
enter commands in the computer.
Advantages of GUI.
Disadvantages
50
❖ It normally requires a larger memory and a faster processor.
❖ It also occupies more disk space to hold the file and different functions.
❖ Sender
❖ Receiver
❖ Transmission media
❖ Protocol
❖ Message
❖ Communication software
51
• Transmission: Communication of data achieved by the processing of
signals.
Electronic mail: This facilitates the sending and receiving of messages across
the globe. This is achieved by the use of devices like computers and phones.
Instant messaging (IM) :This is a form of communication over the internet that
offers an instant transmission of messages from the sender to the receiver.
This facilitates real time sending and receiving of messages.
Skype :This is a tool/ service that facilitates face to face interactions between
distant people.
News group/ chat rooms: This is a tool/ service that facilitates people to
discuss and exchange information on a vast array of topics and share
information.
Advantages
❖ It provides an opportunity to create new friends
❖ It creates ideas that may not rise in classrooms
❖ It improves the typing skills for people since it is text based
❖ It helps people with hearing problems to communicate easily over the internet
❖ It is a recreational activity for spending leisure time
Disadvantages
52
❖ It encourages rumour mongering
❖ It presents an opportunity for cyber bullying and sending un wanted messages
❖ There are high chances of being cheated or corned
There are three ways for transmitting data from one point to another.
Full-duplex: is a mode of data transmission where data signals can flow in both
directions at the same time. E.g. telephone communication.
Use of full-duplex line improves the efficiency as the line turn-around time
required in half-duplex arrangement is eliminated. Example of this mode of
transmission is the telephone line.
53
On the other hand a digital signal may assume only discrete set of values
within a given range. Examples are computer and computer related equipment.
Analog signal is measured in Volts and its frequency in Hertz (Hz).
Analog Signal
Digital signal
On the other hand, in the synchronous mode, the saved data is transmitted
block by block. Each block can contain many characters. Synchronous
transmission is well suited for remote communication between a computer and
related devices like card reader and printers
54
Types of data transmission media Data transmission media is divided into two
categories
❖ Physical/guided transmission media
❖ Wireless/unguided transmission media
Application
1) It is mainly used in telephone networks
2) They are used in Local Area Networks (LAN) for connecting personal computers.
55
NOTE: STP cables are most suitable for environments which are electronically
noisy because they protected by the shields.
Coaxial cables
This cable has a central copper core which is made up of a solid wire.
It is very effective at carrying analog signals at high frequencies.
Coaxial cables are mostly as back bones to connect two or more separate
LANs because of their high band width.
Advantages
❖ It has a large band width of up to 1GBPS
❖ It can carry voice, data and video simultaneously.
❖ It is more resistant to radio and electromagnetic force than twisted
❖ It is stable even under data traffic (loads)
Disadvantages
❖ They are relatively expensive to buy and install as compared to twisted pair
❖ Coaxial cables are thick and thus hard to work with
Advantages
❖ It transmits data at a very high speed
❖ It supports high band width
❖ They have lower attenuation thus transfer data for long distances
❖ It is smaller and lighter than copper cables hence better for space limited
situations
❖ It is resistant to electromagnetic interference (EMI) and eavesdropping.
Disadvantages
❖ It is very expensive to buy and manage
❖ It is very complex to configure
❖ A cable broken is very difficult to repair
❖ Installation of cables is difficult
56
NOTE:
Attenuation: Is a gradual diminishing in the strength of a signal
Is the reduction in the signal strength as it moves along a transmission media.
Band width: Is the maximum amount of data
Unguided media
This is a data transmission media where there is no physical connection
between the communicating devices. Usually the transmission is sent through
the atmosphere.
Examples include: microwaves, satellites, Bluetooth,
Satellite transmission
These receive micro wave signals from earth based communication facilities
(satellite dishes), amplify them and re-transmit the signals to the communication
facilities. The earth based stations use large shaped antennas to transmit and
receive data from satellites.
The transmission to the satellite is called uplink and the transmission from the
satellite is called a downlink.
NOTE: The communication satellites are placed in orbits about 50,000km above
the earth.
Advantages of satellite
Disadvantages
57
❖ There is high level of dependences most people cannot afford owning private
satellites
58
Packetizing: This is the act of dividing messages into fixed length packets prior
to transmission over a network’s communication media.
Routing: This is determining the shortest and fastest path for sending and
receiving messages
Communications processors
Modems
It is a modulator/demodulator.
The modem converts digital signals from a computer to analog signals
(modulation) for transmission over telephone lines, and vice versa
(demodulation).
Modulation is the process of converting digitized data into analog form for a
carrier wave.
Demodulation transforms data transmitted in analog form back into digital form
for computer storage and/or processing. Modems modulate and demodulate
computer data for transmission on telephone lines.
59
• Computer information is stored digitally, whereas information transmitted
over telephone lines is transmitted in the form of analog waves. A
modem converts between these two forms.
Multiplexer
• Multiplexing is carrying multiple signals/messages on one
medium/channel. E.g multiple TV stations in air medium, FM radio
broadcasting.Each separate signal is called a channel.
•
EXTRANET
• An extranet is a private network that uses Internet technology and the
public telecommunication system to securely share part of a business's
60
information or operations with suppliers, vendors, partners, customers, or
other businesses. An extranet can be viewed as part of a company's
intranet that is extended to users outside the company. It has also been
described as a "state of mind" in which the Internet is perceived as a
way to do business with other companies as well as to sell products to
customers.
Integrated Services Digital Network
(ISDN)
ISDN is an international standard for the digital transmission of both voice and
data. Using ISDN lines, data can be transmitted over one or more separate
channels.
COMPUTER NETWORKING
What is a Network?
TYPES OF NETWORKS
The three basic types of networks include: LAN, MAN and WAN.
61
▪ A file server - stores all of the software that controls the network, as well
as the software that can be shared by the computers attached to the
network.
▪ A workstation - computers connected to the file server (Mac or PCs). These
are less powerful than the file server
▪ Cables - used to connect the network interface cards in each computer.
❖ Peer-to-Peer
❖ Client/Server
Peer-to-Peer
In a peer-to-peer network, all computers are considered equal; they all have the
same abilities to use the resources available on the network. Peer-to-peer
networks are designed primarily for small to medium local area networks.
AppleShare and Windows for Workgroups are examples of programs that can
function as peer-to-peer network operating systems.
62
Advantages of a peer-to-peer network:
Client/Server
The file servers become the heart of the system, providing access to resources
and providing security. Individual workstations (clients) have access to the
resources available on the file servers.
63
Fig. 2. Client/server network
❖ It is expensive to set up
❖ It involves extra expenses for living a network administration
❖ If the server fails, the entire network will not work
❖ It requires an expensive, more powerful hardware for the server machine..
Client-server model
64
METROPOLITAN AREA NETWORK (MAN)
Metropolitan Area Network (MAN) covers larger geographic areas, such as cities.
Often used by local libraries and government agencies often to connect to
citizens and private industries
Wide Area Networks (WANs) connects larger geographic areas, such as London,
the UK, or the world. In this type of network dedicated transoceanic cabling or
satellite uplinks may be used.
❖ File sharing Computer networks allow file sharing and remote file access
❖ Resource sharing Computer networks allow resources like printer, modem to be
shared Low set up costs Shared resources mean reduction in the hardware costs
for setting up a network.
❖ Work group computing; this allows for interactive team work.
❖ Increased storage space More than one computer on the network share files and
thus storage capacity gets resolved to a greater extent.
❖ Centralized administration This reduces the number of people needed to manage
the devices and data on the network, thus reducing cost to the company.
❖ Software upgrade is easily done since it is done on the server only
65
❖ It enables online learning/e-learning, electronic connection
❖ It facilitates easy communication through e-mail
Expensive to Install. Although a network will generally save money over time, the
initial costs of installation can be prohibitive. Cables, network cards, and software
are expensive, and the installation may require the services of a technician.
File Server May Fail. Although a file server is no more susceptible to failure than
any other computer, when the files server "goes down," the entire network may
come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
Cables May Break. The Topology chapter presents information about the various
configurations of cables. Some of the configurations are designed to minimize
the inconvenience of a broken cable; with other configurations, one broken cable
can stop the entire network.
Networking Hardware
66
This section provides information on the following components:
❖ File Servers
❖ Workstations
❖ Network Interface Cards
❖ Switches
❖ Repeaters
❖ Bridges
❖ Routers
File Servers
A file server is a dedicated computer or device within a network that provides a
centralized location for storing, managing, and sharing files among connected clients.
The network interface card (NIC) provides the physical connection between the
network and the computer workstation.
67
Switch
Hub
Repeaters
The repeater electrically amplifies the signal it receives and rebroadcasts it.
Bridges
A network bridge is a device that connects multiple network segments, allowing them to
function as a single network.
Routers
A router translates information from one network to another. Routers select the
best path to route a message, based on the destination address and origin.
The router can direct traffic to prevent head-on collisions, and is smart enough
to know when to direct traffic along back roads and shortcuts.
Hub
It is a device that contains multiple ports that enables more then one computer
to interconnect on the network.
Gateways
A gateway is any device that can be configured to provide access to wide area
networks or internet.
Internetworking
68
1) Intranet
2) Extranet
3) Internet
Intranet: These are internal corporate networks that use the infrastructure and
standards of the internet and the World Wide Web.
One of the greatest consideration of internet is the security, making sure that
sensitive company data accessible of intranets is protected from the outside
world. The means of doing this is a security system called a firewall.
Extranets: These are extended intranets connecting not only internal personnel
but also selected customers, suppliers and other strategic offices.
Internet
Requirement
Connection Types
◼ LAN
◼ WLAN
◼ Dial-up Services
69
◼ Broadband Services
◼ WAN
LAN (Local Area Network)
Dial-up Services
◼ Modem
❑ Modulator/demodulator
❑ A device that converts analog signal to digital (modulation) and
vice versa (demodulation).
◼ ISDN
❑ Integrated Services Digital Network
◼ Cable
70
❑ A technology that provides digital data transmission over cable TV
infrastructure
◼ Satellite
❑ A technology that provide digital data transmission over satellites
❑ Need a satellite dish
71
Disadvantages of the Internet:
❖ Pornography: This is a very serious issue concerning the Internet,
especially when it comes to young children.
❖ Spamming: This refers to sending unsolicited e-mails in bulk, which serve
no purpose.
❖ Theft of personal details while using the Internet, there is high probability
that your personal details like name, address and credit card number
may be accessed by con artists and used for fraudulent purposes.
72
Simple Mail Transfer Protocol (SMTP) is a protocol designed to transfer
electronic mail reliably and efficiently. SMTP is a mail service modeled of the
FTP file transfer server. SMTP transfers mail messages between systems and
provides notification regarding incoming mail.
73
(vi) Instant Messaging (IM)
This is a set of communication technology used for text-based communication
between two or more participants over the internet or other types of networks.
(vii) VoIP
VoIP (Voice Over Internet Protocol) refers to the communication protocols,
technologies, methodologies and transmission techniques involved in the delivery
of voice communications and multimedia sessions over the Internet Protocol
network (IP)
OR
VoIP (Voice Over Internet Protocol) is a method for taking analog audio signals
and converts them into digital data that can be transmitted over the internet.
URL
This is an acronym for Uniform Resource Locator. It is the global address of a
website and other resources on the World Wide Web (WWW).
It is a string of characters that specify the address of a web page.
Uploading
This is the process of transferring files (Text, Audio, Video, Graphics and Sound)
from one computer system to another or to a storage device or the internet.
Downloading
This is the process of retrieving or bringing copies of files (Text, Audio, Video,
Graphics and Sound) over to your computer or storage device from another
location such as the internet.
Surfing
This is the process of accessing Data from the internet.
Online meetings
This is where people who are far away can chat virtually using services such as
video conferences, Skyping, etc
74
❖ Type of communication medium used: Physical transmission medium is
slow compared to Wireless
❖ Distance of broadcasting services: If far away from the computers.
❖ Type of browsers: Some browsers may be using outdated technology.
❖ Weather: Prevailing bad weather conditions may affect internet speed.
Email Services
Electronic mail (e-mail) is the process of sending and receiving messages over
the internet
75
Those are much like postal letters, except that they are delivered much faster
than snail mail when sending over long distances, and are usually free.
❖ Gmail
❖ Yahoo mail
❖ Hotmail
❖ Ovimail
76
• Cost .Email is cheap: recent studies have show that businesses can save
large amounts of money using e-mail, in lieu of long-distance phone calls
and postal deliveries.
• Time .Email will reach its destination across the world in a few seconds as
opposed to days or even weeks with the postal service.
• Convenient .Email doesn't worry about crossing time zones or that
colleagues are not in their offices to take telephone calls.
• Email can be sent to groups of people at the same time. This facilitates
collaborative working and efficient dissemination of information.
• Doesn't use any paper (good for the environment).
• Can attach large documents and other files with a click of a button (and
without using up resources like paper).
Disadvantages of emails:
• User has to open email website or email program to read the message. If
you do not login un read the message can remain unread for ever.
• Socially, writing a letter and talking over phone is thought to bring you
closer to the recipient compared to writing an email through a computer.
• A lot of unwanted emails from spammers can fill your email inbox and
important emails may not get delivered.
• Email attachments can bring virus into your computer if not scanned by
network or virus program on your computer.
• Emails cannot really be used for official business documents.
• Less hand-writing practice.
• Can be bad for your eyes if you spend too long sending e-mails on your
computer.
• Messages may be misinterpreted easily.
Components of an e-mail
Address or To
This is where the address of the person whom you are sending the message
must be typed. E.g. siraji1987@learnonline.ac.ug to mean the massage is for
siraji belonging to learnonline which is an academic institution (ac) of Uganda
(Ug)
The subject
This is where you type subject or theme of your document e.g. Inquiry,
Application to someone.
77
CC.
Carbon copy: here you type the addresses of those to whom you are sending
carbon copies. They can be as many addresses for cc as you wish only are
separated by commas e.g. Ronnie@yahoo.com,opio@goodwillenc.co.ug,
siraji3rk@yahoo.com.
BCC
Blind carbon copies: here you type the addresses as in cc, but the recipients
will not know whether the other has received the copy.
Attachment:
This is a textual, graphical, audio or video file that accompanies an email. It
can be downloaded by the recipient for use
Parts of an email
mukeeretonny@gmail.com
User name Domain name Domain
type
Separator
User name: This specifies the identity of the recipient of the email
@: This at symbol acts as a separator between the user name and the domain
name Domain name: This identifies the domain that hosts the email account
Dot(.): This separates the domain name and domain type
Domain type: This specifies the category of the domain.
DOMAIN NAME
This is a unique name that denotes a company, an organization, society or
group on the internet.
78
Government agency e.g. www.epa.gove or www.whitehouse.gov
Mil
Military e.g. www.army.mil or www.navy.mil
Netiquettes
Refers to the do's and don'ts of online communication Or rules and regulations
governing online communication
▪ Refrain from personal abuse. You may express robust disagreement with
what someone says, but don't call them names or threaten them with
personal violence.
▪ Don't spam. That is, don't repeatedly post the same advertisement for
products or services. Most sites have strict and specific rules about who is
allowed to post ads and what kind of ads they are.
▪ Write clearly and succinctly. On a site that has many non-native English
speakers, avoid using slang they may not understand.
▪ Remember that your posts are public. They can be read by your partner,
your children, your parents, or your employer.
▪ Stay on-topic, especially when you're new. Don't post about football in a
hair-care forum or about hair care in a gardening forum!
▪ Don't expect other people to do your homework for you. If you're looking
for technical help, for example, don't ask questions you could easily answer
yourself by reading the manual or online help provided with the product.
▪ Do not post copyrighted material to which you do not own the rights. Sites
vary in how strict they are about this, but as well as facing the possibility of
legal action by the rights holder, you may also get the site sued.
▪ The site's owner, perhaps assisted by one or more moderators, has the final
say in enforcing the rules.
▪ DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are
shouting at them. It's okay to type in caps to accentuate a word or two, but
please don't do it all the time everywhere you go.
▪ Treat others as you would like to be treated. This rule is an oldie but a
goodie and can get you through just about any situation, online or off!
▪ Respect Others' Copyrights: There are wonderful things online, information
for everyone on just about any topic! However, these things have copyrights
and licenses. Copying the works of someone else without permission or
saying it is your own will not only ruin your online reputation, but could
land you with hefty fines and lawsuits!
79
Web browser
Is a software tool or program that allows you to navigate through the web.
It’s a tool that allows you to view web pages and interact on the internet.
Search engine. It’s a program or web site that can be used to search for
keywords on web pages throughout the World Wide Web.
A web search engine is a type of website that helps computer user find specific
information on the Internet.
Search engines include: Google, Yahoo!, Ask.com, Forestle, Bing and Alta Vista.
Or it’s a vast collection of linked documents held on computers all over the
world and is accessible via the internet.
Website
Types of Websites
In static Websites, the information does not change, and the same information
is displayed to all visitors.
80
Mostly coded in HTML so easier to build.
Updating is difficult.
Dynamic-Content: Dynamic website pages are able to accept input data (fill-in
forms) and store that information in a database on the server, allowing a visitor
to create a user profile and personalized experience.
In Dynamic Websites, the information may change at any given time and
according to the visitor. Mostly built in scripting languages like Javascript, and
can be more difficult to build.
Used for large sites with a lot of content, sites that need extensive updates,
use real time services (e.g. online stores), and/or require automatic changes
(e.g. blogs). Updating is easy.
Can do complex tasks, allowing for user interactivity and providing customized,
personalized information
Personal Websites
Commercial/Business Websites
Informative Websites
These are dedicated to providing information. They may include news websites,
online encyclopedias, educational websites, and websites providing topic-specific
information like sports data, medical information, weather reports, stock market
quotes and analysis, and TV guides.
81
Search Engines/Directories
These are search engines index material on the web and automatically respond
to a search query with links to relevant websites.
Wikis
Wikis differ from blogs and other cms options in that wikis allow all users to
change the content of the wiki pages, not just to post comments about the
content.
Blogs
Web logs, or blogs, are the most popular, inexpensive, and widespread form of
web content management. Blog software such as Blogger, Roller, or WordPress
allows nontechnical users to combine text, graphics, and digital media files
easily into interactive web pages.
Media-Sharing Website – where people can share pictures, videos, music, etc.
Review Websites – where people can write and/or view reviews of products,
services, etc.
Social Networking Website – where people can meet, interact and share multi-
media.
82
Internet and World Wide Web terms
Web pages: contain formatted text, graphics, sound, animation and video
allowing point and click.
Telnet: a terminal emulation protocol that allows a user to log onto a remote
device.
FTP (file transfer protocol) is an internet standard that allows users to upload
and download files with other computers.
Website is an electronic page that has links with other pages and contains
information.
83
Web site address: is a unique name given to the web site to communicate and
collect the information.
Web browser is a tool (piece of software) that allows you to view and interact
on the internet. Internet explorer, Netscape, Mozilla Fire fox, Opera, Apple's
Safari, and Google Chrome etc are web browsers.
Webmaster: is the person responsible for developing web pages and maintaining
a website.
Examples of URL.
http//unebuganda.co.ug
Green computing
Advantages:
84
❖ Conserving resources means less energy is required to produce, use,
and dispose of products.
❖ Saving energy and resources saves money.
❖ Green computing even includes changing government policy to
encourage recycling and lowering energy use by individuals and
businesses.
❖ Reduce the risk existing in the laptops such as chemical known to
cause cancer, nerve damage and immune reactions in humans.
Disadvantages:
Cloud computing
In cloud computing, the word cloud (also phrased as "the cloud") is used as a
metaphor for "the Internet," so the phrase cloud computing means "a type of
Internet-based computing," where different services — such as servers, storage
and applications — are delivered to an organization's computers and devices
through the Internet.
COMPUTER SECURITY
Security is quality or state of being secure to be free from danger.
It applies to any vulnerable and valuable asset, such as a person, dwelling,
community, nation, or organization.
85
Computer Security refers to techniques of ensuring that information /data
stored in computers cannot be read or compromised by any individuals without
authorization.
A computer is secure if you can depend on it and its software to behave as
intended.
This is also known as cyber security and it covers all processes and
mechanisms by using computer based equipment. Information and services are
protected from unintended or unauthorized access, change or destruction.
Computer security also includes protection from unplanned events and natural
disasters.
Note: A computer security risk is any event or action that could cause a loss
or damage to a computer hardware, software, data and information.
In order to understand the techniques of securing a computer system, it’s
important to first understand the various types of attacks that can be made
against it.
Security deals with both guarding against external threats as well as authorized
users as potential intruders. Both data and physical (hardware) security must be
adequately secured.
86
Computer security risks include;
1) Internet and network attacks
2) Unauthorized access and use of computer systems. Hardware and software
theft
3) Information theft and information piracy
4) System failure.
On a vast network such as the Internet with no central administrator, the risk is
even greater.
Below are the most common and most damaging forms of security threats to
Internet users and site operators:
❖ Malicious code,
❖ Unwanted programs,
❖ Phishing and identity theft,
❖ Hacking and cyber vandalism
❖ Credit card fraud/theft,
❖ Spoofing (pharming) and spam (junk) Web sites,
❖ Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks,
Sniffing, insider attacks,
❖ Poorly designed server and client software.
(a).Malicious Code:
Every unprotected computer is susceptible to the attack from malicious code.
Malicious code (also called malware) includes a variety of threats such as;
❖ Viruses,
❖ Worms,
❖ Trojan horses,
❖ Bots, etc.
VIRUS
A virus is a piece of software that can replicate itself and infect a computer
without the permission or knowledge of the user. A virus can only spread when
it is transmitted by a user over a network or the Internet, or through removable
media such as CDs or memory sticks.
87
Trajan horse: These are malicious programs that enter a system or network
under the disguise of another program.
Stealth virus: This is a virus type that disguises itself by redirecting commands
around itself to avoid detection.
Computer worm: This is a malicious programs that auto replicates or is capable
of multiplying itself there by using up all the available memory space.
Polymorphic virus: This is a kind of virus which changes form/ hides from the
antivirus software or it will encrypt itself to avoid detection.
Retro virus: This kind of virus directly attacks or bypasses the antivirus software
installed on the computer.
Time bomb: This is a time of a virus that lies dormant until a certain date or
time or for a period of time and cause harm to the computer system when
triggered. OR This is a malicious program that is programmed to detonate at a
specific time and release a virus into the computer system or network.
Logic Bomb: This is a malicious software that is triggered with time.
❖ By use of a removable storage device such as flash disk, memory card which
Has been contaminated.
❖ Through an email attachment.
❖ Through downloading content on the internet from un trusted sites/ sources.
❖ As part of another program
❖ From pirated software (Demo/ trial version software i.e. software without a
product key/ license key)
❖ Through infected proprietary software
88
(b).Unwanted Programs:
These are programs on the internet that install themselves on a computer
without the user’s consent. They include;
Adware
It is a program that displays an online advertisement in a banner or pop-up
window on Web pages, email, or other Internet services.
Browser parasite
It is a program that can monitor and change the settings of a user’s browser.
Spyware
It is a program placed on a computer without the user's knowledge that
secretly collects information about the user e.g. email address, instant
messages, etc.
89
Spoofing is a technique intruders use to make their network or Internet
transmission appear legitimate to a victim computer or network.
Types of spoofing
E-mail spoofing;
This occurs when the sender’s address or other components of the e-mail
header are altered so that it appears the e-mail originated from a different
sender.
IP spoofing;
This occurs when an intruder computer fools a network into believing that its IP
address is associated with a trusted source.
Perpetrators of IP spoofing trick their victims into interacting with the phony
Web site.
For example, the victim may provide confidential information or download files
containing viruses, worms, or other malware.
Spam Web sites are the sites that promise to offer some product or service,
but in fact are a collection of advertisements for other sites, some of which
contain malicious code.
(g). Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks:
A denial of service (DoS) attack is an assault whose purpose is to disrupt
computer access to an Internet service such as the Web or e-mail.
The victim computer network eventually jams, blocking legitimate visitors from
accessing the network.
DoS attacks typically cause a Web site to shut down, making it impossible for
users to access the site.
(h).Sniffing:
Sniffer is a type of eavesdropping (spying) program that monitors information
traveling over a network.
When used legitimately, sniffers can help identify potential network trouble-
spots, but when used for criminal purposes, they can be damaging and very
difficult to detect.
90
Sniffers enable hackers to steal proprietary information from anywhere on a
network, including email messages, company files, and confidential reports.
Once perpetrators gain access to unsecure computers, they often install a back
door or modify an existing program to include a back door, which allows them
to continue to access the computer remotely without the user’s knowledge.
Programmers often build back doors into programs during system development
which help them save development time because the programmer can bypass
security controls while writing and testing programs.
We tend to think the security threats to a business originate from outside the
organization.
Given their complexity and design objectives, all operating systems and
application software have vulnerabilities or (flaw) weaknesses that hackers can
exploit.
91
The firewall controls traffic to and from servers and clients, forbidding
communications from untrustworthy sources, and allowing other communications
from trusted sources to proceed.
Some large organizations such as Yahoo, AT&T use honey pots so that they
can analyze any attack being perpetrated.
These computers, which appear real to the intruder, actually are separated
safely from the organization’s network.
Honeypots allow the organization to learn how intruders are exploiting their
network and also attempt to catch perpetrators who have been doing damage
elsewhere on their network.
92
Unauthorized use is the use of a computer or its data for unapproved or
possible illegal activities.
A cracker:
Cracker accesses a computer or network illegally but has the intent of
destroying data, stealing information, or other malicious action.
Both hackers and crackers have advanced computer and network skills.
Script Kiddie:
A script kiddie has the same intent as a cracker but does not have the
technical skills and knowledge.
Script kiddies often are teenagers that use prewritten hacking and cracking
programs to break into computers.
Corporate Spies:
They have excellent computer and network skills and are hired to break into a
specific computer and steal its proprietary data and information.
Unethical Employees:
They break into their employers computers for a variety of reasons.
Some simply want to exploit a security weakness. Others seek financial gains
from selling confidential information.
Disgruntled employees may want revenge.
Cyber-extortionist:
A Cyber-extortionist is someone who uses email as a vehicle for extortion.
These perpetrators send a company a threatening email message indicating
they will expose confidential information, exploit a security flaw, or launch an
attack that will compromise the company's network - if they are not paid a
sum of money.
Cyber terrorist:
A Cyber terrorist is someone who uses the Internet or network to destroy or
damage computers for political reasons.
The extensive damage might destroy the nation's air traffic control system,
electricity generating companies, or a telecommunications infrastructure.
93
Cyber terrorism usually requires a team of highly skilled individuals, huge sums
of money, and several years of planning.
Definition
An Access control is a security measure that defines;
Who can access a computer
When the users can access the computer
What actions the users can take while accessing the computer.
Access control is normally implemented using a two phase process; i.e.
Identification
This is the phase which verifies whether the user is a valid one.
Authentication
This is the phase which verifies that the user is really the one he or she claims
to be.
Most multiuser (networked) systems require that users correctly enter a user
name and a password before they can access the data, computer, or a
network.
NB: Some Web sites use a CAPTCHA [Automated Public Turing test to tell
Computers and Humans Apart (CAPTCHA)] to further protect a user’s password.
94
A CAPTCHA displays a series of distorted characters and requires the user
enter the characters correctly to continue using the Web site.
AVOID
❖ Using your name, birthday, ID card number or telephone number.
❖ A password of all digits or all the same letter.
❖ Safeguarding your password
❖ Do not share your password with others
❖ Do not write down your password
❖ Change your password frequently
Possessed Objects
A possessed object is any item that one must carry to gain access to a
computer or computer facility.
Examples of possessed objects
❖ Badges,
❖ Cards,
❖ Smart cards,
❖ Key, etc.
These objects are often used in combination with Personal Identity Numbers
(PINs)
Biometric devices
A biometric device authenticates a person’s identity by translating a personal
characteristic, such as a fingerprint, into a digital code that is compared with a
digital code stored in the computer verifying physical or behavioral
characteristics.
95
A hand geometry system. .This measures the shape and size of a person’s
hand.
A face recognition system. This captures a live face image and compares it
with the stored image
A voice recognition system. This device compares a person’s live speech with
their stored voice pattern.
A signature verification system. This device recognizes the shape of a
handwritten signature of a person.
An iris recognition system .It reads patterns in the tiny blood vessels in the
back of the eye, which are as unique as a fingerprint.
Callback systems
A callback system connects a user to a computer only after the computer calls
the user back at a previously established telephone number.
Vandalism
This is the act of destroying computer equipment.
96
❖ Use passwords, possessed objects and biometric devices.
❖ Install surveillance cameras to help you in easy monitoring of the hardware.
❖ Software theft
Software piracy
This is the unauthorized and illegal duplication of copyrighted software.
SYSTEM FAILURE
This is a prolonged malfunctioning of a computer that can cause hardware,
software, data or information loss.
a. Noise
This refers to any unwanted signal which is mixed with the normal voltage
entering the computer.
b. Under voltage
This is a situation which occurs when the electrical supply drops below the
normal value (e.g. Below 220V in Uganda)
Brown out
Is a prolonged under voltage
97
Black out
Is a complete power failure
Spike
Is a momentary over voltage that occurs when the increase in power last for
less than one millisecond.
COMPUTER ETHICS
Computer ethics are moral guidelines that govern the use of computers and
information systems.
Definitions;
Unauthorized access is the use of a computer system or a network without
permission of the owner.
Unauthorized use is the use of a computer or its data for unapproved or illegal
activities.
Software piracy
This refers to the unauthorized and illegal duplication of copyrighted software.
This may involve duplicating someone’s movie, song, book, etc, without his/her
permission.
98
NB: Whenever a consumer purchases a software, he/she is only provided with
a license agreement which gives him/her the right to use the software.
This is the most common license agreement provided to individual users after
purchasing a software.
99
❖ Most buyers believe that they have a right to copy the software they have paid
for.
Information privacy
Privacy is the moral right of individuals to be left alone, free from surveillance
or interference from other individuals or organizations, including the state.
A cookie is a small text file that a Web server stores on your computer that
allows a site to track the actions of its visitors.
NB; although the cookie resides on an individual’s hard drive, it does not
interact with other information store on the system.
Uses of cookies
❖ Web sites that allow for personalization often use cookies to track user
preferences. On such sites, you may be asked to fill in a form requesting
personal information, such as your name, postal code, or site preferences.
❖ A news Web site, for example, might allow users to customize their viewing
preferences to display certain stock quotes. Your preferences are stored in
cookies on your hard disk.
❖ Many Web sites use cookies to store users' passwords, so they do not need to
enter it every time they log in to the Web site.
❖ Online shopping sites generally use session cookies to keep track of items in
your shopping cart. This way, you can start an order during one Web session
and finish it on another day in another session. Session cookies usually expire
after a certain time, such as a week or a month.
❖ Some Web sites use cookies to track how regularly you visit a site and the Web
pages you visit while at the site.
❖ Web sites may use cookie to target advertisements. Your interests and browsing
habits are stored in the cookie.
100
Spyware and Adware
Spyware is a program placed on a computer without the user's knowledge that
secretly collects information about the user.
Web businesses use Web bugs to monitor online habits of Web site visitors.
Spam
Spam is an unsolicited (unrequested) email message or newsgroup posting sent
to many recipients or newsgroups at once. Spam is Internet junk (unwanted)
mail.
Types of spams
Spim
This is a spam sent instant messaging
Spit
This is a spam sent via VoIP
101
NB: The disadvantage of email filters and anti-spam programs is that sometimes
they remove valid email messages. Thus, users should review the contents of
the spam messages periodically to ensure they do contain valid messages.
Phishing
Is a scam (a trick) in which a perpetrator sends an official looking email that
attempts to obtain your personal and financial information.
Pharming
Is a scam in which a perpetrator sends an official looking message that
requests you to type a Web address in the Web browser, and then redirects
you to aphony
Web site that looks legitimate which requests you enter confidential information.
Employee Monitoring
Employee monitoring involves the use of computers to observe, record, and
review an employee’s use of a computer, including communications such as e-
mail messages, keyboard activity, and Web sites visited.
Content Filtering
Content filtering is the process of restricting access to certain material on the
Web.
Many businesses use content filtering to limit employees’ Web access. These
businesses argue that employees are unproductive when visiting inappropriate or
objectionable Web sites.
Some schools, libraries, and parents use content filtering to restrict access to
minors.
102
Or
The sender uses the receiver’s public key to encrypt the message and the
receiver uses his or her private key to decrypt the message.
Information accuracy
Millions and millions of information reside on websites of certain organizations.
But in some instances, the website providing access to information may not be
the one which created it.
TRADEMARK RIGHTS
103
Intellectual property (IP) refers to unique and original works such as ideas,
inventions, art, writings, processes, company and product names, and logos.
Intellectual property rights are the rights to which creators are entitled for their
work.
(iii). Copyright
Is the protection given to the author of an original piece, including “literary,
dramatic, musical, artistic and certain other intellectual works,” whether the work
has been published or not
A copyright gives authors and artists exclusive rights to duplicate, publish and
sell their material. These material may be songs, movies or books.
CODES OF CONDUCT
A code of conduct is a written guideline that helps to determine whether a
specific action is ethical or unethical.
Recognizing that individuals need specific standards for the ethical use of
computers, a number of computer-related organizations have established IT
codes of conduct, which helps determine whether a specific computer action is
ethical or unethical;
104
NETIQUETTE
Netiquette refers to the dos and don'ts of online communication.
It allows the writer (Blogger) to post ideas using conversational language for
many to read and each entry includes a link to leave a comment.
The contents of each blog differ depending on the interests and styles of the
author.
RSS (Really Simple Syndication) This is an XML based format designed for
sharing headlines and other web context.
It’s a time saving way to receive news and informational updates from a
number of sites in a central location.
105
Podcast This is an audio file (usually in MP3 format) posted on the website so
that others may listen to it. Podcasts are automatically delivered over the
internet using either RSS or atom syndication. Subscriptions to podcasts are
usually free.
Wikis This is a website that allows a user to easily create and edit pages. The
characteristics that set Wikis apart from other web based forums and
discussions is that they may be authored and edited at any one time.
Robotics
This is a science or study of the technology associated with the design,
fabrication, theory and application of robots.
Digital forensics.
106
A branch of investigative science around material found in digital devices, often
in relation to computer crime like hacking, cracking, spamming etc.
107
❖ Most ordinary jobs like secretariat, store keeping etc, are likely to phase off.
This will finally lead to a great increase in unemployment and loss of jobs.
Much like a folder on your hard drive, Online Storage allows you to back up
your files and stores them in a safe place for you.
108
❖ Pick a good password. All Cloud services require a master password to get
into your files, so make it a good one, something that is pretty long. When it
comes to passwords, longer is better. True, it can be a hassle to remember a
strong password but it’s an even bigger hassle to have your information stolen.
❖ Don’t reuse your passwords. The password you choose to access the Cloud
should be unlike any other password you use. If a hacker gets access to your
Facebook password which also happens to be your email password, they will not
only have a clear view of where you hold financial accounts, but they will be
able to reset all of your passwords without your knowledge.
❖ Don’t share your passwords. Even with a trusted friend, sharing your password is
never a good idea. The more people who know your password, the more likely
it is to be spread around. Your password is the lock to your information, don’t
let more people in than need be there.
❖ Back up your data. The same way you back up your computer’s hard drive,
back up your Cloud data. There are some companies that offer a small amount
of storage free of cost. Take advantage of this and make sure you have your
most important data backed up in case of an unexpected loss.
Examples are
❖ Cloud storage
❖ Dropbox
❖ Open Drive
❖ SpideOak
❖ ZumoDrive
❖ One drive
GREEN COMPUTING.
Green computing, green IT or ICT Sustainability, refers to environmentally
sustainable computing or IT.
109
Green computing involves the implementation of energy-efficient central
processing units (CPUs), servers and peripherals as well as reduced resource
consumption and proper disposal of electronic waste (e-waste).
110
Many people today are employed in various organizations because of their
association to the computer world.
Information and communication technology (ICT) has created new job titles such
as computer operators, computer technicians, system analyst, computer
programmers, software engineer, Information systems manager, data base
administrator, computer trainer, web administrator, computer graphics designers
and network administrator.
Data entry
This is a job that requires one with the basic computer skills of managing
computer skills.
One has to take information from a hard copy and enter it into an electronic
format or taking electronic data and entering into a database for easy sorting
and locating.
Computer operator.
Some of the responsibilities of a computer operator include;
1) Entering data into the computer for processing.
2) Keeping up-to-date records (log files) of all information processing activities.
Computer technician.
Given that computers require regular maintenance, upgrading as well as
emergency repairs, demand for computer technicians continues to grow as
more people computerize their workplaces and homes.
111
This is a person who methodically examines an information system and
considers improving it when required basing on various data flow models. At
the end of the analysis, a report has to be delivered to a responsible party for
scrutiny and examination.
Computer programmer
This is a person whose responsibility is to write, execute as well as debug
(remove errors) the source code of a given software program.
112
Computer engineer.
Computer and electronic engineers are coming up with new and more efficient
technologies in information and communication technology almost daily.
Web administrator/webmaster.
This is a person whose responsibility is to effectively manage and control a
company’s website.
Self-employment.
113
Self-employment can be achieved by using a computer or other ICT devices
such as mobile phones to start bureau services, internet services, consultancy
services and computer hardware and software vendor business.
Network administrator.
This is a person responsible for configuring and maintaining the day today
operation of a computer network. Typically, a network administrator assigns
user accounts and passwords, establishes security levels and monitors system
to prevent unauthorized access and attacks.
Database administrator
This is a person who develops and maintains a database of a company as well
as designing and implementing policies essential for ensuring its security and
integrity.
Hardware Designer
This is a person who designs different hardware, circuit designs, embedded
systems, firmware etc. It’s a job that requires you to design and create
complete hardware packages or portions of hardware assistance.
114
115