Mbeya University of Science and Technology UQF 8 2021/22 1 Year
Mbeya University of Science and Technology UQF 8 2021/22 1 Year
AND TECHNOLOGY
UQF 8 2021/22 1st YEAR
Calculations,
Outputting data,
• High speed : Computers have the ability to perform routine tasks at a greater
speed than human beings. They can perform millions of calculations in
seconds.
• Accuracy : Computers are used to perform tasks in a way that ensures
accuracy.
• Storage : Computers can store large amount of information. Any item of data
or any instruction stored in the memory can be retrieved by the computer at
lightning speeds.
• Automation : Computers can be instructed to perform complex tasks
automatically ( which increases the productivity).
Advantages of computers :(cont.…)
• Diligence : Computers can perform the same task
repeatedly & with the same accuracy without getting
tired.
• Versatility : Computers are flexible to perform both
simple and complex tasks.
• Cost effectiveness : Computers reduce the amount of
paper work and human effort, thereby reducing costs.
Limitations of computers :
• 1. Input device
• 2. Central Processing Unit (CPU)
• 3. Output device
Block diagram of a Computer :
CENTRAL PROCESSING UNIT(CPU)
Functions of these units
Unit Function
• Input device : Reads information from input media and enters to the
computer in a coded form
• CPU
Memory unit :Stores program and data
Arithmetic Logic unit :Performs arithmetic and logical functions
Control Unit :Interprets program instructions and controls the input
and output devices
• Output device : decodes information and presents it to the user
Input Devices
• Devices used to provide data and instructions to the computer are
called Input devices.
• Some important input devices are:
Key board,
Mouse,
Scanner,
MICR,
Web camera,
Microphone etc.
Keyboard:
• The Key board is used for typing text into the computer
• It is also known as standard Input device.
• A computer keyboard is similar to that of a type writer with additional keys. The
most commonly available computer keyboard has 104 keys.
• There are different types of keys on the keyboard.
• The keys are categorized as :
i. Alphanumeric keys , including letters & numbers.
ii. Punctuation keys, such as colon (:), semicolon (;) Question mark (?),
iii. Special keys such as arrow keys, control keys, function keys (F1 to F12), HOME, END etc
Mouse:
• It is a device that controls the movement of the cursor on a monitor.
A mouse will have 2 buttons on its top, left and right buttons
• There will be a wheel between the left and right buttons.
• The left button is the most frequently used button.
• This wheel enables us to smoothly scroll through screens of
information.
• As we move the mouse, the pointer on the monitor moves in the
same direction.
• Optical mouse is another advanced pointing device that uses a light
emitting component instead of the mouse ball.
• Mouse cannot be used for entering the data.
Scanner: :
• It is an input device that can read text or illustrations printed on paper
and translate into digital form.
• The main advantage of these scanners is that the data need not be
entered separately resulting in saving lot of time.
• Scanners are of two types:
i) Optical scanners
ii) Magnetic Ink Character Recognition (MICR)
Optical scanners
Types of Optical scanners:
i. Optical character Recognition(OCR):
In this, characters are read with the help of a light. This is used in office atomization,
documentation in library etc.
8 Bits = 1 Byte
1024 Bytes = 1 Kilo Byte (KB)
1024 KB = 1 Mega Byte (MB)
1024 MB = 1 Giga Byte (GB)
ASCII – American Standard Code for Information
Interchange.
4 Line printer Prints lines at a time instead of single 300 to 600 LPM
characters.
5 Plotter
Produces drawings or graphs through
pens which are filled with different
colours.
Laser printer
HARDWARE and SOFTWARE
Windows,
MSDOS,
Linux,
Unix,
Mac.
Disk Operating System (DOS)
• In the 1980s or early 1990s, the operating system that shipped with
most PCs was a version of the Disk Operating System (DOS) created by
Microsoft: MS-DOS.
• MS-DOS is a disk-based, single-user, single-task and character based
user interface (CUI) operating system.
WINDOWS
• Trojan Horse
• A worm is a small piece of software that uses computer networks and security holes to
replicate itself. A copy of the worm scans the network for another machine that has a
specific security hole. It copies itself to the new machine using the security hole, and then
starts replicating from there, as well.
• Worms use computer time and network bandwidth when they replicate. A worm called Code
Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet
so effectively that things would completely grind to a halt.
• A worm usually exploits some sort of security hole in a piece of software or the operating
system. For example, the Slammer worm (which caused mayhem in January 2003) exploited
a hole in Microsoft's SQL server.
• Worms normally move around and infect other machines through computer networks. Using
a network, a worm can expand from a single copy incredibly quickly. The Code Red worm
replicated itself more than 250,000 times in approximately nine hours on July 19, 2001.
Vaccines