0% found this document useful (0 votes)
48 views50 pages

COMPUTER NOTES Final

Uploaded by

Opoka John Modi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views50 pages

COMPUTER NOTES Final

Uploaded by

Opoka John Modi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

COMPUTER APPLICATION NOTES

PREPARED BY:
MR. ALUTIA LUKE

YOU CAN WATCH OUR COMPUTER PRACTICAL TUTORIALS ON OUR YOUTUBE CHANNEL:

DOUBLE CLICK ACADEMY

EMAIL: doubleclickacademy@gmail.com +256788400938 TEL NO: +256788400938


TABLE OF CONTENTS

1.0 DEFINITION OF A COMPUTER ........................................................................................................................... 3


1.1 EVOLUTION /GENERATION/STAGES OF COMPUTER ........................................................................................ 3
1.2 CLASSIFICATION OF COMPUTERS ..................................................................................................................... 8
1.3 APPLICATION/USES OF COMPUTER ................................................................................................................ 10
1.4 CHARACTERISTICS/ ADVANTAGES OF COMPUTER. ........................................................................................ 12
1.4.1 DISADVANTAGES OF COMPUTERS ......................................................................................................................... 13
2.0 DEFINITION OF COMPUTER DEVICES .............................................................................................................. 15
2.1 CATEGORIZE OF COMPUTER DEVICES ............................................................................................................ 15
2.1.1 INPUT UNIT (INPUT DEVICES) .............................................................................................................................. 15
2.1.2 CPU (CENTRAL PROCESSING UNIT)/ PROCESSING DEVICES. ...................................................................................... 23
2.1.3 OUTPUT UNIT (OUTPUT DEVICES). ....................................................................................................................... 25
2.1.4 STORAGE DEVICES/ MEMORY .............................................................................................................................. 30
3.0 DEFINITION: THREATS AND ETHICAL ISSUES .................................................................................................. 33
3.1 ETHICAL ISSUES IN ICT .................................................................................................................................... 33
3.1.1 MEASURES TO ADDRESS ETHICAL ISSUES ................................................................................................................ 33
3.2 KINDS OF THREATS ......................................................................................................................................... 34
3.2.1 COUNTER MEASURES TOWARDS THREATS............................................................................................................... 34
4.0 DEFINITION OF OPERATING SYSTEMS ............................................................................................................ 35
4.1 TYPES OF OPERATING SYSTEMS ..................................................................................................................... 35
4.2 FUNCTIONS OF OPERATING SYSTEM .............................................................................................................. 39
4.3 ADVANTAGE OF USING OPERATING SYSTEM ................................................................................................. 41
4.4 DISADVANTAGES OF USING OPERATING SYSTEM .......................................................................................... 42
5.0 DEFINITION OF UTILITY PROGRAMS ............................................................................................................... 43
5.1 TYPES OR FORMS OF UTILITY PROGRAMS ...................................................................................................... 43
6.0 DEFINITION OF COMPUTER VIRUS ................................................................................................................. 48
6.1 CHARACTERISTICS OF A VIRUS* ...................................................................................................................... 48
6.2 WHAT IS A WORM? ........................................................................................................................................ 48
6.3 WHAT IS A TROJAN HORSE? ........................................................................................................................... 48
6.4 HOW DO YOU PROTECT YOURSELF FROM VIRUSES? ..................................................................................... 49
7.0 DEFINITION OF APPLICATION SOFTWARE ...................................................................................................... 50
7.1 TYPES OF APPLICATION SOFTWARE ............................................................................................................... 50
Topic one: Computer Application

1.0 Definition of a computer


A computer is a programmable machine designed to perform arithmetic and logical
operations automatically and sequentially on the input given by the user and gives the
desired output after processing.

Computer can also be defined as a multipurpose electronic machine capable of


inputting, storing, processing and outputting information.

Computer components are divided into two major categories namely hardware and
software.

Hardware is the machine itself and its connected devices such as monitor, keyboard,
mouse etc. Software is the set of programs that make use of hardware for performing
various functions.

1.1 Evolution /Generation/stages of computer


Generation in computer terminology is a change in technology a computer is/was
being used. Initially, the generation term was used to distinguish between varying
hardware technologies. But nowadays, generation includes both hardware and
software, which together make up an entire computer system.

There are totally five computer generations known till date. Each generation has been
discussed in detail along with their time period, characteristics. We've used
approximate dates against each generation which are normally accepted.

First Generation
The period of first generation was 1942-1954.

First generation of computer started with using vacuum tubes as the basic components
for memory and circuitry for CPU (Central Processing Unit). These tubes like electric
bulbs produced a lot of heat and were prone to frequent fusing of the installations,
therefore, were very expensive and could be afforded only by very large organizations.
In this generation mainly batch processing operating system were used. In this
generation Punched cards, Paper tape, Magnetic tape Input & Output device were
used.

There were Machine code and electric wired board languages used.

The main features of First Generation computers are:


• The computers came in to existence between 1942-1956
• Vacuum tube technology was used to process data, the tubes were very large
and consumed a lot of power.
• Limited memory. These computers had low memory size of only 2000 bytes.
• The processing speed was slow only 10 kilo instructions per second they could
not perform work faster.
• Huge size. These computers were very large in size and could accommodate
between 500-1000 users at ago.
• Very costly
• Generate a lot of heat
• Need of A.C.
• Non portable
• Consumed a lot of electricity

Second Generation
The period of second generation was 1952-1964.

This generation used the transistors and were cheaper, consumed less power, more
compact in size, more reliable and faster than the first-generation machines made of
vacuum tubes. In this generation, magnetic cores were used as primary memory and
magnetic tape and magnetic disks as secondary storage devices.

This generation assembly language and high-level programming language like


FORTRAN, COBOL were used. There was Batch processing and Multiprogramming
Operating system used.

The main features of Second Generation are:


The computer came in existence between 1952-1964 Use of transistors to store
and process data
Smaller size as compared to First generation computers ie fewer user at ago
than 1st generation computers
The processing speed increased between 200000-300000 instructions per
second. Faster than first generation computers.
The storage or memory capacity increased to 32 kilobytes of RAM memory
Generate less heat as compared to First generation computers
Consumed less electricity as compared to First generation computers
Still very costly
A.C. needed
Some computer of this generation were:
□ IBM 1620

□ IBM 7094

□ CDC 1604

□ CDC 3600

UNIVAC 1108

Third Generation
The period of third generation was 1964-1972.

The third generation of computer is marked by the use of Integrated Circuits (IC's) in
place of transistors. Single I.C has many transistors, resistors and capacitors along
with the associated circuitry. The I.C was invented by Jack Kilby. This development
made computers smaller in size, reliable and efficient.

In this generation Remote processing, Time-sharing, Real-time, Multi-programming


Operating System were used.

High level language (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68

etc.) were used during this generation.

The main features of Third Generation are:


The computers existed between 1964-1972
The use of integrated circuits replaced transistors to store and process data
Smaller size than second generation computers hence fewer user at ago
The processing speed increased to 1 million instructions per seconds.
The memory size or storage capacity of the computers increased to 2
megabytes
Generate less heat
Faster
Lesser maintenance
Still costly
A.C needed
Consumed lesser electricity
Support high level Language Some computers of this generation were:

IBM-360 series

Honeywell-6000 series

PDP(Personal Data Processor)

□ IBM-370/168

□ TDC-316

Fourth Generation
The period of Fourth Generation was 1972 to date.

The fourth generation of computers is marked by the use of Very Large Scale
Integrated (VLSI) circuits.VLSI circuits having about 5000 transistors and other
circuit elements and their associated circuits on a single chip made it possible to
have microcomputers of fourth generation. Fourth Generation computers became
more powerful, compact, reliable, and affordable. As a result, it gave rise to personal
computer (PC) revolution.

In this generation Time sharing, Real time, Networks, Distributed Operating System
were used.
All the Higher-level languages like C and C++, DBASE etc. were used in this
generation.

The main features of Fourth Generation are:


The computer came in to existence between 1972 to date
Very large integrated circuits technology was used to store and process data.
The size of computer reduced single user per computer hence the term pc
(personal computer) Portable and reliable. Eg laptop, desktop and palmtop
computer.
The processing speed increased to 5m instructions per seconds
The memory size expanded to gigabytes
Very cheap computers
No A.C. needed
Concept of internet was introduced
Great developments in the fields of networks
Computers became easily available
Some computer of this generation were:
□ DEC 10
□ STAR 1000
□ PDP 11
□ CRAY-1(Super Computer)
□ CRAY-X-MP (Super Computer)

Fifth Generation
They are computer expected in the near future and they will mimic or imitate human
behaviors.

In the fifth generation, the VLSI technology will be ULSI (Ultra Large-Scale
Integration) technology, resulting in the production of microprocessor chips having
ten million electronic components.

This generation is based on parallel processing hardware and AI (Artificial Intelligence)


software.
AI is an emerging branch in computer science, which interprets means and method of
making computers think like human beings.

It is also said that these computers are already in existence though not yet popularized

All the Higher-level languages like C and C++, Java, .Net etc. are used in this
generation.

AI includes:

□ Robotics
□ Neural networks
□ Game Playing
□ Development of expert systems to make decisions in real life situations.
□ Natural language understanding and generation.
The main features of Fifth Generation are:
ULSI technology
Development of true artificial intelligence
Development of Natural language processing
Advancement in Parallel Processing
Advancement in Superconductor technology
More user-friendly interfaces with multimedia features
Availability of very powerful and compact computers at cheaper rates

1.2 Classification of Computers


Computers can be classified according to Size of the computer, purpose of the
computer, process and processor power.

Classification by Size
Under this classification, we consider how big the computer is and this include;

o Main frame computers: these are large general computers with extensive
storage, input and output capabilities hence enhancing large scale data
processing. They have characteristics of first- and second-generation
computers.
o Mini Computers: these are smaller compared to the mainframe computers
mainly used for special purpose/ general purpose. They have characteristics of
third generation computers.
o Micro Computers: they are smaller than main frame and mini computers where
various integrated circuits and elements of computers are replaced by single
integrated circuits called chip. They have characteristic of fourth generation
computers. They facilitate single users only i.e. Visual display unit, keyboard,
mouse and CPU can be used by one person at a time. Sometimes they are
called personal computers (PCs) or Personal Systems (PS’s). Example; Laptops,
desktop computers.

Classification by Purpose.
These are designed according to tasks they are designed to perform. These include
general purpose and special purpose computers.

o General purpose is designed for all tasks like presentation, data management,
computation, document production e.g. excel, access, power point, word
o Special purpose computers: These are designed to perform specific tasks for
instance thermometer for temperatures, calculations for mathematical
computation, digital watches, and petrol pumps. These types of computers do
not perform word processing jobs.

Classification by process
Computers are also classified according to the way data is presented and these
include; digital, analog and hybrid computers

o Digital computers process data in discrete values e.g. 1,2,3,4, etc


o Analog computers; data is presented in a measurable value e.g. weights,
thermometer measurement
o Hybrid computers; this has features of both digital and analog
Classification by processor power.
They are classified according to the processor power; those with a high processor
power are faster and stronger than those with a lower processor power. The most
common processor types include; Pentium 1,2,3,4 etc

1.3 Application/uses of computer


Computers can be applied in different sectors as all sectors use computers in different
ways and they include the following;

Business sector
Of recent most of the businesses have resorted to computer usage in their
productivity. In business, computers are used in the following ways;

❖ Advertisement of their products and services


❖ Computation of their business transactions
❖ Storage of business data
❖ Security of business to monitor both employees and their property
❖ Communication
❖ E-commerce/ online trade
❖ Production through the use of machinery

Scientific research
❖ Computers are used for collecting data where human beings cannot survive or
reach
❖ Storage of information/ data
❖ Communication
❖ Discovery e.g. new drugs, new applications, historical discoveries etc.

Health Sector
❖ Manufacture of drugs
❖ Medical research
❖ Scanning/ testing/ diagonises
❖ Storage of medical data/ information
❖ Communication
❖ Sharing of data/ information

Homes
❖ Entertainment
❖ Educational purposes
❖ Computation of personal budgets
❖ Communication
❖ Security

Sports
❖ Production of new games
❖ Entertainment
❖ Gambling e.g. betting

Recreation e.g. hotels and bars


❖ Entertainment
❖ Booking
❖ Storage
❖ Communication
❖ Security

Education
❖ Teaching/ training
❖ Virtual reality/ virtual University/ online studying
❖ Research
❖ Advertisement
❖ Communication
❖ Entertainment
Security e.g. military and police
❖ Design weapons
❖ Targeting/ location of the enemy
❖ Storage of data
❖ Entertainment
❖ Surveillance
❖ Communication

Government
All different ministries apply computer.

1.4 Characteristics/ Advantages of computer.


The characteristics of computers that have made them so powerful and universally
useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss
them briefly.

Speed

Computers work at an incredible speed. A powerful computer is capable of performing


about 3-4 million simple instructions per second.

Accuracy

In addition to being fast, computers are also accurate. Errors that may occur can
almost always be attributed to human error (inaccurate data, poorly designed system
or faulty instructions/programs written by the programmer)

Diligence/consistent (no boredom)

Unlike human beings, computers are highly consistent. They do not suffer from human
traits of boredom and tiredness resulting in lack of concentration. Computers,
therefore, are better than human beings in performing voluminous and repetitive jobs.

Versatility/ flexible
Computers are versatile machines and are capable of performing any task as long as
it can be broken down into a series of logical steps. The presence of computers can
be seen in almost every sphere – Railway/Air reservation, Banks, Hotels, Weather
forecasting and many more.

Storage Capacity

Today’s computers can store large volumes of data. A piece of information once
recorded (or stored) in the computer, can never be forgotten and can be retrieved
almost instantaneously.

Efficient and Effective

Computers provide both quality and quantity of data and information.

Sharing of data/ networking

Computers help in sharing of both qualitative and quantitative data. This can be
through email, Whatsapp, tweeter, histogram and more other platforms.

Electronic

Computers require some source of power to be able to operate. This power source
may include solar, generator and hydro-electricity.

1.4.1 Disadvantages of computers


Health Hazards: people who use computers get complications in form of eye
problems, backache and others.

Cyber Crime: E.g. hacking like transferring money from peoples’ accounts to their
accounts, conning by sending false messages to people

Unemployment: computers reduce on the manual work force e.g. robots can replace
bar attendants in bars.

Moral degeneration: This is through access of indecent materials for example


pornography.
Virus Spread: All viruses can be spread using computers or manufactured using
computers e.g. AIDS and computer virus.
Topic Two: Computer devices:

2.0 Definition of Computer devices


Computer devices are sets of equipment used in the working of a computer. These
devices make up a composition of a computer.

2.1 Categorize of computer devices


Computer devices can be categorized according to operation/ components of a
computer (how a computer is made up of and functions).

All types of computers follow the same basic logical structure and perform the
following five basic operations for converting raw input data into information useful to
their users.

S.No. Operation Description


1 Take Input The process of entering data and instructions into the
computer system.
2 Store Data Saving data and instructions so that they are available for
processing as and when required.
3 Processing Data Performing arithmetic, and logical operations on data in order
to convert them into useful information.
4 Output The process of producing useful information or results for the
Information user, such as a printed report or visual display.
5 Control the Directs the manner and sequence in which all of the above
workflow operations are performed.

2.1.1 Input Unit (Input devices)

This unit contains devices with the help of which we enter data into the computer.
This unit creates a link between the user and the computer. The input devices translate
the information into a form understandable by the computer.

Following are some of the important input devices which are used in a computer −

• Keyboard
• Mouse
• Joy Stick
• Light pen
• Track Ball
• Scanner
• Graphic Tablet
• Microphone
• Magnetic Ink Card Reader(MICR)
• Optical Character Reader(OCR)
• Bar Code Reader
• Optical Mark Reader(OMR)

Keyboard

Keyboard is the most common and very popular input device which helps to input data
to the computer. The layout of the keyboard is like that of traditional typewriter,
although there are some additional keys provided for performing additional functions.

Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104
keys or 108 keys are also available for Windows and Internet.

The keys on the keyboard are as follows −

S.No Keys & Description


1
Typing Keys
These keys include the letter keys (A-Z) and digit keys (09) which generally give
the same layout as that of typewriters.

2 Numeric Keypad

It is used to enter the numeric data or cursor movement. Generally, it consists of


a set of 17 keys that are laid out in the same configuration used by most adding
machines and calculators.

3 Function Keys

The twelve function keys are present on the keyboard which are arranged in a
row at the top of the keyboard. Each function key has a unique meaning and is
used for some specific purpose.

4 Control keys

These keys provide cursor and screen control. It includes four directional arrow
keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
Control(Ctrl), Alternate(Alt), Escape(Esc).

5 Special Purpose Keys

Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock,
Num Lock, Space bar, Tab, and Print Screen.

Mouse

A Mouse is the most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a round ball at its base, which senses the movement
of the mouse and sends corresponding signals to the CPU when the mouse buttons
are pressed.

Generally, it has two buttons called the left and the right button and a wheel is present
between the buttons. A mouse can be used to control the position of the cursor on
the screen, but it cannot be used to enter text into the computer.
Advantages
• Easy to use
• Not very expensive
• Moves the cursor faster than the arrow keys of the keyboard.

Joystick

Joystick is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its both lower and upper ends.
The lower spherical ball moves in a socket. The joystick can be moved in all four
directions.

The function of the joystick is similar to that of a mouse. It is mainly used in Computer
Aided Designing (CAD) and playing computer games.

Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu
item or draw pictures on the monitor screen. It consists of a photocell and an optical
system placed in a small tube.

When the tip of a light pen is moved over the monitor screen and the pen button is
pressed, its photocell sensing element detects the screen location and sends the
corresponding signal to the CPU.

Track Ball

Track ball is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers on the
ball, the pointer can be moved.

Since the whole device is not moved, a track ball requires less space than a mouse. A
track ball comes in various shapes like a ball, a button, or a square.

Scanner

Scanner is an input device, which works more like a photocopy machine. It is used
when some information is available on paper and it is to be transferred to the hard
disk of the computer for further manipulation.
Scanner captures images from the source which are then converted into a digital form
that can be stored on the disk. These images can be edited before they are printed.

Digitizer

Digitizer is an input device which converts analog information into digital form.
Digitizer can convert a signal from the television or camera into a series of numbers
that could be stored in a computer. They can be used by the computer to create a
picture of whatever the camera had been pointed at.

Digitizer is also known as Tablet or Graphics Tablet as it converts graphics and pictorial
data into binary inputs. A graphic tablet as digitizer is used for fine works of drawing
and image manipulation applications.
Microphone

Microphone is an input device to input sound that is then stored in a digital form.

The microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.

Magnetic Ink Card Reader (MICR)

MICR input device is generally used in banks as there are large number of cheques to
be processed every day. The bank's code number and cheque number are printed on
the cheques with a special type of ink that contains particles of magnetic material that
are machine readable.

This reading process is called Magnetic Ink Character Recognition (MICR). The main
advantages of MICR is that it is fast and less error prone.
Optical Character Reader (OCR)

OCR is an input device used to read a printed text.

OCR scans the text optically, character by character, converts them into a machine
readable code, and stores the text on the system memory.

Bar Code Readers

Bar Code Reader is a device used for reading bar coded data (data in the form of light
and dark lines). Bar coded data is generally used in labelling goods, numbering the
books, etc. It may be a handheld scanner or may be embedded in a stationary scanner.

Bar Code Reader scans a bar code image, converts it into an alphanumeric value,
which is then fed to the computer that the bar code reader is connected to.

Optical Mark Reader (OMR)


OMR is a special type of optical scanner used to recognize the type of mark made by
pen or pencil. It is used where one out of a few alternatives is to be selected and
marked.

It is specially used for checking the answer sheets of examinations having multiple
choice questions.

2.1.2 CPU (Central Processing Unit)/ Processing devices.

Central Processing Unit (CPU) consists of the following features/ uses −

• CPU is considered as the brain of the computer.


• CPU performs all types of data processing operations.
• It stores data, intermediate results, and instructions (program).
• It controls the operation of all parts of the computer.

CPU itself has following three components.

• Memory or Storage Unit


• Control Unit
• ALU (Arithmetic Logic Unit)

Memory or Storage Unit

This unit can store instructions, data, and intermediate results. This unit supplies
information to other units of the computer when needed. It is also known as internal
storage unit or the main memory or the primary storage or Random Access Memory
(RAM).

Its size affects speed, power, and capability. Primary memory and secondary memory
are two types of memories in the computer. Functions of the memory unit are −
• It stores all the data and the instructions required for processing.
• It stores intermediate results of processing.
• It stores the final results of processing before these results are released
to an output device.
• All inputs and outputs are transmitted through the main memory.

Control Unit

This unit controls the operations of all parts of the computer but does not carry out
any actual data processing operations.

Functions of this unit are −

• It is responsible for controlling the transfer of data and instructions


among other units of a computer.
• It manages and coordinates all the units of the computer.
• It obtains the instructions from the memory, interprets them, and directs
the operation of the computer.
• It communicates with Input/Output devices for transfer of data or results
from storage.
• It does not process or store data.

ALU (Arithmetic Logic Unit)

This unit consists of two subsections namely,

• Arithmetic Section
• Logic Section
Arithmetic Section

Function of arithmetic section is to perform arithmetic operations like addition,


subtraction, multiplication, and division. All complex operations are done by making
repetitive use of the above operations.

Logic Section
Function of logic section is to perform logic operations such as comparing, selecting,
matching, and merging of data.

2.1.3 Output Unit (Output devices).

The output unit consists of devices with the help of which we get the information from
the computer. This unit is a link between the computer and the users. Output devices
translate the computer's output into a form understandable by the users.

The following are some of the important output devices used in a computer.

• Monitors
• Graphic Plotter
• Printer

Monitors

Monitors, commonly called as Visual Display Unit (VDU), are the main output device
of a computer. It forms images from tiny dots, called pixels that are arranged in a
rectangular form. The sharpness of the image depends upon the number of pixels.

There are two kinds of viewing screen used for monitors.

• Cathode-Ray Tube (CRT)


• Flat-Panel Display
Cathode-Ray Tube (CRT) Monitor

The CRT display is made up of small picture elements called pixels. The smaller the
pixels, the better the image clarity or resolution. It takes more than one illuminated
pixel to form a whole character, such as the letter ‘e’ in the word help.

A finite number of characters can be displayed on a screen at once. The screen can
be divided into a series of character boxes - fixed location on the screen where a
standard character can be placed. Most screens are capable of displaying 80
characters of data horizontally and 25 lines vertically.

There are some disadvantages of CRT −

• Large in Size
• High power consumption
Flat-Panel Display Monitor

The flat-panel display refers to a class of video devices that have reduced volume,
weight and power requirement in comparison to the CRT. You can hang them on walls
or wear them on your wrists. Current uses of flat-panel displays include calculators,
video games, monitors, laptop computer, and graphics display.

The flat-panel display is divided into two categories −

• Emissive Displays − Emissive displays are devices that convert


electrical energy into light. For example, plasma panel and LED (Light-
Emitting Diodes).
• Non-Emissive Displays − Non-emissive displays use optical effects to
convert sunlight or light from some other source into graphics patterns.
For example, LCD (Liquid-Crystal Device).

Printers

Printer is an output device, which is used to print information on paper.

There are two types of printers −

• Impact Printers
• Non-Impact Printers
Impact Printers

Impact printers print the characters by striking them on the ribbon, which is then
pressed on the paper.

Characteristics of Impact Printers are the following −

• Very low consumable costs


• Very noisy
• Useful for bulk printing due to low cost
• There is physical contact with the paper to produce an image

These printers are of two types −

• Character printers
• Line printers

Character Printers

Character printers are the printers which print one character at a time.

These are further divided into two types:

• Dot Matrix Printer(DMP)


• Daisy Wheel

Dot Matrix Printer

In the market, one of the most popular printers is Dot Matrix Printer. These printers
are popular because of their ease of printing and economical price. Each character
printed is in the form of pattern of dots and head consists of a Matrix of Pins of size
(5*7, 7*9, 9*7 or 9*9) which come out to form a character which is why it is called
Dot Matrix Printer.

Advantages

• Inexpensive
• Widely Used
• Other language characters can be printed

Disadvantages

• Slow Speed
• Poor Quality

Daisy Wheel

Head is lying on a wheel and pins corresponding to characters are like petals of Daisy
(flower) which is why it is called Daisy Wheel Printer. These printers are generally
used for word-processing in offices that require a few letters to be sent here and there
with very nice quality.

Advantages

• More reliable than DMP


• Better quality
• Fonts of character can be easily changed
Disadvantages

• Slower than DMP


• Noisy
• More expensive than DMP

Line Printers

Line printers are the printers which print one line at a time.

These are of two types −

• Drum Printer
• Chain Printer

Drum Printer

This printer is like a drum in shape hence it is called drum printer. The surface of the
drum is divided into a number of tracks. Total tracks are equal to the size of the paper,
i.e. for a paper width of 132 characters, drum will have 132 tracks. A character set is
embossed on the track. Different character sets available in the market are 48
character set, 64 and 96 characters set. One rotation of drum prints one line. Drum
printers are fast in speed and can print 300 to 2000 lines per minute.

Advantages

• Very high speed

Disadvantages

• Very expensive
• Characters fonts cannot be changed

Chain Printer

In this printer, a chain of character sets is used, hence it is called Chain Printer. A
standard character set may have 48, 64, or 96 characters.

Advantages

• Character fonts can easily be changed.


• Different languages can be used with the same printer.
Disadvantages

• Noisy

Non-impact Printers

Non-impact printers print the characters without using the ribbon. These printers print
a complete page at a time, thus they are also called as Page Printers.

These printers are of two types −

• Laser Printers
• Inkjet Printers

Characteristics of Non-impact Printers

• Faster than impact printers


• They are not noisy
• High quality
• Supports many fonts and different character size

Laser Printers

These are non-impact page printers. They use laser lights to produce the dots needed
to form the characters to be printed on a page.

Advantages

• Very high speed


• Very high quality output
• Good graphics quality
• Supports many fonts and different character size

Disadvantages

• Expensive
• Cannot be used to produce multiple copies of a document in a single
printing

Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology.
They print characters by spraying small drops of ink onto paper. Inkjet printers
produce high quality output with presentable features.

They make less noise because no hammering is done and these have many styles of
printing modes available. Color printing is also possible. Some models of Inkjet printers
can produce multiple copies of printing also.

Advantages

• High quality printing


• More reliable

Disadvantages

• Expensive as the cost per page is high


• Slow as compared to laser printer

2.1.4 Storage devices/ Memory

A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in the computer, where data is to be processed
and instructions required for processing are stored. The memory is divided into large
number of small parts called cells. Each location or cell has a unique address, which
varies from zero to memory size minus one. For example, if the computer has 64k
words, then this memory unit has 64 * 1024 = 65536 memory locations. The address
of these locations varies from 0 to 65535.

Memory is primarily of three types −

• Cache Memory
• Primary Memory/Main Memory
• Secondary Memory

Cache Memory

Cache memory is a very high-speed semiconductor memory which can speed up the
CPU. It acts as a buffer between the CPU and the main memory. It is used to hold
those parts of data and program which are most frequently used by the CPU. The
parts of data and programs are transferred from the disk to cache memory by the
operating system, from where the CPU can access them.

Advantages

The advantages of cache memory are as follows −

• Cache memory is faster than main memory.


• It consumes less access time as compared to main memory.
• It stores the program that can be executed within a short period of time.
• It stores data for temporary use.
Disadvantages

The disadvantages of cache memory are as follows −

• Cache memory has limited capacity.


• It is very expensive.

Primary Memory (Main Memory)

Primary memory holds only those data and instructions on which the computer is
currently working. It has a limited capacity and data is lost when power is switched
off. It is generally made up of semiconductor device. These memories are not as fast
as registers. The data and instruction required to be processed resides in the main
memory. It is divided into two subcategories RAM and ROM.

Characteristics of Main Memory


• These are semiconductor memories.
• It is known as the main memory.
• Usually volatile memory.
• Data is lost in case power is switched off.
• It is the working memory of the computer.
• Faster than secondary memories.
• A computer cannot run without the primary memory.

Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower
than the main memory. These are used for storing data/information permanently. CPU
directly does not access these memories, instead they are accessed via input-output
routines. The contents of secondary memories are first transferred to the main
memory, and then the CPU can access it. For example, disk, CD-ROM, DVD, etc.

Characteristics of Secondary Memory


• These are magnetic and optical memories.
• It is known as the backup memory.
• It is a non-volatile memory.
• Data is permanently stored even if power is switched off.
• It is used for storage of data in a computer.
• Computer may run without the secondary memory.
• Slower than primary memories.
Topic Three: Threats and ethical issues in ICT

3.0 Definition: Threats and Ethical issues


What are ICT ethics?

These are the moral and principles that regulate the use of computers.

In other words, ethics is knowing and understanding what is right and what is wrong,
and then doing the right thing right.

What is a security threat?

A threat is anything that has potential to cause serious harm to the computer system.

3.1 Ethical issues in ICT


 Software piracy.

This refers to the copying of software programmes without the authority of the owner.

 Always identify the user accurately. Never use someone's account.

 Respect copyrights and licences. dont copy a licensed programme because it is


illegal.

 Respect intellectual property of others, avoid renaming others work to be yours


especially learners.

 In appropriate use of computing resources.

 In appropriate sharing of information.

3.1.1 Measures to address ethical issues


1. Use of firewalls , is a software which limits people from accessing your
information especially on the internet.

2. Use of strong passwords, usually use a combination of letters and numbers


which are are difficult to gase.

3. Never give out personal information to people you don’t know.

4. Keep watch over your children and how they use the internet, install parental
software i.e. parental guide.
5. Never give out your credit card information to a person you don’t know

3.2 Kinds of threats


➢ Virus, is a piece of software that can duplicate itself without permission
/knowledge of the user.

➢ Spam, is the sending of e-mail messages in bulk which are unnecessary.

➢ Spoofing, is an attack in which a person or a programme pretends as another.

➢ Spyware, is a software that aids in gathering information about person or


organization without their knowledge.

➢ Adware, is a software which creates, displays, downloads advertisements to a


computer.

➢ Botnet,is a collection of software robots which run automated tasks over the
internet.

3.2.1 Counter measures towards threats


 Install antivirus software which detects and removes known viruses e.g.
karpersky antivirus.

 Use of spam filters to screen out e-mail messages with suspect titles.

 Do not open e-mails on unknown sources.

 Real time protection-use antivirus to scan spyware.

 Use of spybot antivirus which searches and destroys adware programmes.

 Use try and error to identify the bot behavior patterns.


Topic Four: OPERATING SYSTEMS:

4.0 Definition of Operating Systems


It is the interface between the user and the computer hardware.

An operating system performs all the basic tasks like managing files, processes, and
memory. Thus operating system acts as the manager of all the resources,
i.e. resource manager. Thus, the operating system becomes an interface between
user and machine.

4.1 Types of Operating Systems


1. Batch Operating System –
This type of operating system does not interact with the computer directly. There is
an operator which takes similar jobs having the same requirement and groups them
into batches. It is the responsibility of the operator to sort jobs with similar needs.

Advantages of Batch Operating System:

• It is very difficult to guess or know the time required for any job to complete.
Processors of the batch systems know how long the job would be when it is in
queue

• Multiple users can share the batch systems

• The idle time for the batch system is very less

• It is easy to manage large work repeatedly in batch systems

Disadvantages of Batch Operating System:

• The computer operators should be well known with batch systems

• Batch systems are hard to debug

• It is sometimes costly

• The other jobs will have to wait for an unknown time if any job fails

Examples of Batch based Operating System include; Payroll System, Bank


Statements, etc.
2. Time-Sharing Operating Systems –
Each task is given some time to execute so that all the tasks work smoothly. Each
user gets the time of CPU as they use a single system. These systems are also
known as Multitasking Systems. The task can be from a single user or different users
also. The time that each task gets to execute is called quantum. After this time
interval is over OS switches over to the next task.

Advantages of Time-Sharing OS:

• Each task gets an equal opportunity

• Fewer chances of duplication of software

• CPU idle time can be reduced

Disadvantages of Time-Sharing OS:

• Reliability problem

• One must have to take care of the security and integrity of user programs and
data

• Data communication problem

Examples of Time-Sharing OSs are: Multics, Unix, etc.

3. Distributed Operating System.

These types of the operating system is a recent advancement in the world of computer
technology and are being widely accepted all over the world and, that too, with a
great pace. Various autonomous interconnected computers communicate with each
other using a shared communication network. Independent systems possess their own
memory unit and CPU. These are referred to as loosely coupled systems or
distributed systems. These system’s processors differ in size and function. The major
benefit of working with these types of the operating system is that it is always possible
that one user can access the files or software which are not actually present on his
system but some other system connected within this network i.e., remote access is
enabled with the devices connected in that network.
Advantages of Distributed Operating System:

• Failure of one will not affect the other network communication, as all systems
are independent from each other

• Electronic mail increases the data exchange speed

• Since resources are being shared, computation is highly fast and durable

• Load on host computer reduces

• These systems are easily scalable as many systems can be easily added to the
network

• Delay in data processing reduces

Disadvantages of Distributed Operating System:

• Failure of the main network will stop the entire communication

• To establish distributed systems the language which is used are not well defined
yet

• These types of systems are not readily available as they are very expensive.
Not only that the underlying software is highly complex and not understood
well yet

Examples of Distributed Operating System are- LOCUS, etc.

4. Network Operating System.

These systems run on a server and provide the capability to manage data, users,
groups, security, applications, and other networking functions. These types of
operating systems allow shared access of files, printers, security, applications, and
other networking functions over a small private network. One more important aspect
of Network Operating Systems is that all the users are well aware of the underlying
configuration, of all other users within the network, their individual connections, etc.
and that’s why these computers are popularly known as tightly coupled systems.
Advantages of Network Operating System:

• Highly stable centralized servers

• Security concerns are handled through servers

• New technologies and hardware up-gradation are easily integrated into the
system

• Server access is possible remotely from different locations and types of systems

Disadvantages of Network Operating System:

• Servers are costly

• User has to depend on a central location for most operations

• Maintenance and updates are required regularly

Examples of Network Operating System are: Microsoft Windows Server 2003,


Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD,
etc.

5. Real-Time Operating System.

These types of OSs serve real-time systems. The time interval required to process and
respond to inputs is very small. This time interval is called response time.

Real-time systems are used when there are time requirements that are very strict
like missile systems, air traffic control systems, robots, etc.

Two types of Real-Time Operating System which are as follows:

• Hard Real-Time Systems:

These OSs are meant for applications where time constraints are very strict and
even the shortest possible delay is not acceptable. These systems are built for
saving life like automatic parachutes or airbags which are required to be readily
available in case of any accident. Virtual memory is rarely found in these systems.

• Soft Real-time Systems:

These OSs are for applications where for time-constraint is less strict.
6. Multiprogramming OS – The main memory consists of jobs waiting for CPU time.
The OS selects one of the processes and assigns it to the CPU. Whenever the executing
process needs to wait for any other operation (like I/O), the OS selects another
process from the job queue and assigns it to the CPU. This way, the CPU is never kept
idle and the user gets the flavor of getting multiple tasks done at once.

7. Multitasking OS – Multitasking OS combines the benefits of Multiprogramming


OS and CPU scheduling to perform quick switches between jobs. The switch is so quick
that the user can interact with each program as it runs.

4.2 Functions of Operating System


Following are some of important functions of an operating System.

• Memory Management

• Processor Management

• Device Management

• File Management

• Security

• Control over system performance

• Job accounting

• Error detecting aids

• Coordination between other software and users

Memory Management

Memory management refers to management of Primary Memory or Main Memory.


Main memory is a large array of words or bytes where each word or byte has its own
address.
Main memory provides a fast storage that can be accessed directly by the CPU. For a
program to be executed, it must in the main memory. An Operating System does the
following activities for memory management −

• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what
part are not in use.

• In multiprogramming, the OS decides which process will get memory when and
how much.

• Allocates the memory when a process requests it to do so.

• De-allocates the memory when a process no longer needs it or has been


terminated.

Processor Management

In multiprogramming environment, the OS decides which process gets the processor


when and for how much time. This function is called process scheduling. An
Operating System does the following activities for processor management −

• Keeps tracks of processor and status of process. The program responsible for
this task is known as traffic controller.

• Allocates the processor (CPU) to a process.

• De-allocates processor when a process is no longer required.

Device Management

An Operating System manages device communication via their respective drivers. It


does the following activities for device management −

• Keeps tracks of all devices. Program responsible for this task is known as
the I/O controller.

• Decides which process gets the device when and for how much time.

• Allocates the device in the efficient way.

• De-allocates devices.
File Management

A file system is normally organized into directories for easy navigation and usage.
These directories may contain files and other directions.

An Operating System does the following activities for file management −

• Keeps track of information, location, uses, status etc. The collective facilities
are often known as file system.

• Decides who gets the resources.

• Allocates the resources.

• De-allocates the resources.

Other Important Activities

Following are some of the important activities that an Operating System performs −

• Security − By means of password and similar other techniques, it prevents


unauthorized access to programs and data.

• Control over system performance − Recording delays between request for


a service and response from the system.

• Job accounting − Keeping track of time and resources used by various jobs
and users.

• Error detecting aids − Production of dumps, traces, error messages, and


other debugging and error detecting aids.

• Coordination between other softwares and users − Coordination and


assignment of compilers, interpreters, assemblers and other software to the
various users of the computer systems.

4.3 Advantage of using Operating System


• Allows you to hide details of hardware by creating an abstraction

• Easy to use with a GUI

• Offers an environment in which a user may execute programs/applications


• The operating system must make sure that the computer system convenient to
use

• Operating System acts as an intermediary among applications and the


hardware components

• It provides the computer system resources with easy to use format

• Acts as an intermediator between all hardware's and software's of the system

4.4 Disadvantages of using Operating System


• If any issue occurs in OS, you may lose all the contents which have been stored
in your system

• Operating system's software is quite expensive for small size organization which
adds burden on them. Example Windows

• It is never entirely secure as a threat can occur at any time


Topic Five: UTILITY PROGRAMS

5.0 Definition of Utility Programs


A utility program, also called a utility, is a type of system software that performs
a specific task, usually related to managing a computer, its devices, or its programs.
Most operating systems include several utility programs. You also can buy stand-alone
utilities that offer improvements over those included with the operating system.

5.1 Types or Forms of Utility Programs


Popular utility programs offer these functions: viewing files, compressing files,
diagnosing problems, scanning disks, defragmenting disks, uninstalling software,
backing up files and disks,
checking for viruses, and
displaying screen savers. The
following paragraphs briefly
discuss each of these utilities.

File Viewer

A file viewer is a utility that


allows you to display and copy
the contents of a file. An
operating system’s file
manager often includes a file viewer. For example, Windows Explorer has two viewers:
one called Quick View to display the contents of text files and another called Imaging
Preview for graphics files (shown in the figure). The title bar of the file viewer window
displays the name of the file being viewed.

File Compression
A file compression utility shrinks the size of a file. A compressed file takes up less
storage space. Compressing files frees up room on the storage media and improves
system performance. Attaching a compressed file to an e-mail message reduces the
time needed for file transmission.
Uploading and downloading
compressed files to and from the
Internet reduces the file transmission
time.

Compressed files, sometimes called zipped files, usually have a .zip extension. When
you receive or download a compressed file, you must uncompress it. To uncompress,
or unzip, a file, you restore it to its original form. Two popular stand-alone file
compression utilities are PKZIP™ and WinZip® (shown in the Error! Reference
source not found.).

Diagnostic Utility

A diagnostic utility compiles technical information about your computer’s hardware


and certain system software programs and then prepares a report outlining any
identified problems. For example,
Windows includes the diagnostic
utility, Dr. Watson, which diagnoses
problems as well as suggests courses
of action.

Disk Scanner

A disk scanner is a utility that (1)


detects and corrects both physical
and logical problems on a hard disk
or floppy disk and (2) searches for
and removes unwanted files. A
physical problem is one with the
media such as a scratch on the
surface of the disk. A logical problem
is one with the data, such as a corrupted file allocation table (FAT). Windows includes
two disk scanner utilities: ScanDisk and Disk Cleanup. ScanDisk detects and corrects
problems. Disk Cleanup searches for and removes unnecessary files such as temporary
files.

Disk Defragment Utility

A disk defragment utility reorganizes the files and unused space on a computer’s
hard disk so the operating system can access data more quickly and programs can
run faster. When an operating system stores data on a disk, it places the data in the
first available sector on the disk. Although it attempts to place data in sectors that are
contiguous (next to each other), this is not always possible. When the contents of a
file are scattered across two or more noncontiguous sectors, the file is fragmented.
Fragmentation slows down disk access and thus the performance of the entire
computer. Defragmenting the disk, or reorganizing it so the files are stored in
contiguous sectors, solves this problem. Windows includes a disk defragmenter, called
Disk Defragmenter.

Uninstall Utility

An uninstall utility removes an application, as well as any associated entries in the


system files. When you install an application, the operating system records the
information it uses to run the software in the system files. The system file entries will
remain if you attempt to remove the application from your computer by deleting the
files and folders associated with the program without running the uninstaller. Most
operating systems include an uninstaller. You also can purchase a stand-alone
program, such as McAfee’s UnInstaller.

Backup Utility

A backup utility allows you to copy, or backup, selected files or your entire hard disk
onto another disk or tape. During the backup process, the backup utility monitors
progress and alerts you if it needs additional disks or tapes. Many backup programs
will compress files during this process, so the backup files require less storage space
than the original files.
For this reason, you usually cannot use backup files in their backed up form. In the
event you need to use one of these files, a restore program reverses the process
and returns backed up files to their original form. Backup utilities include restore
programs.

You should back up files and disks regularly in the event your originals are lost,
damaged, or destroyed. Windows includes a backup utility. Some users opt to back
up their files to an Internet hard drive. An Internet hard drive, sometimes called online
storage, is a service on the Web that provides storage to computer users. A separate
paper discusses backup strategies in more depth.

Antivirus Program

An antivirus program is a utility that prevents, detects, and removes viruses from a
computer’s memory or storage devices. A virus is a program that copies itself into
other programs and spreads through multiple computers. Some malicious
programmers intentionally write virus programs that destroy or corrupt data on a
computer. A separate paper discusses antivirus programs and viruses in more depth.

Screen Saver

A screen saver is a utility that causes a monitor’s


screen to display a moving image or blank screen if
no keyboard or mouse activity occurs for a specified
time period. When you press a key on the keyboard
or move the mouse, the screen returns to the
previously displayed image.

Screen savers originally were developed to prevent a problem called ghosting, in which
images could be permanently etched on a monitor’s screen. Ghosting is not a problem
with today’s monitors. Still, screen savers are popular for security, business, or
entertainment purposes. To secure a computer, you can configure your screen saver
so a user must enter a password to stop the screen saver and redisplay the previous
image. Some screen savers use push technology, which enables you to receive
updated and new information each time the screen saver displays. Push technology
occurs when Web-based content downloads automatically to your computer at a
regular interval or whenever the Web site updates.

An operating system often includes several screen savers. You also can purchase
screen savers or download them from the Web
Topic Six: COMPUTER VIRUS

6.0 Definition of Computer Virus


Generally, a computer virus is defined as a program or a code that gains access
without the users’ knowledge and/or perform actions not intended by the user, often
damaging data and sometimes the whole system in the process. Viruses can be
activated when users run, open, view or copy a file containing them. The action that
will trigger the virus to deliver its “payload” depends on the type of virus that infected
the file. Some security experts define viruses separately from worms, and Trojan
horses.

6.1 Characteristics of a virus*


Virus’ common characteristics:

A virus is a self-replicating program whose main purpose is to propagate itself


to as many places as possible.

A virus propagates itself by modifying another program to include itself.

A virus can only propagate itself by an act of a user of the system in which it
exists. (opening/viewing files that are infected and/or copying/transferring files
from one system to another through diskettes, file transfer, e-mail, Internet
and other means.)

6.2 What is a worm?


A worm is defined as a program propagating itself in a network of computers,
exploiting bugs and vulnerabilities of operating systems and application software or
through guessing /breaking / stealing passwords to gain access to other machines in
the network. Worms slow or shut down computer systems and networks due to their
continuous and uncontrolled replication that consumes system resources which are
needed to run “legitimate” tasks and operations. The worm’s capability to replicate
itself without any action from the user differentiates it from a virus that needs a user’s
action in order to replicate.

6.3 What is a Trojan horse?


A Trojan horse masquerades as a useful or entertaining program but contains hidden
functions that while running may destroy files or create a “back door” that will allow
an intruder to access the system. The intruder can exploit the privileges of the user
e.g. view, copy, or delete files, steal passwords, reconfigure the system or use it to
attack another system. Trojan horses, unlike do not spread by themselves but can be
as destructive.

6.4 How do you protect yourself from viruses?


Do not run any program or open any file from untrusted sources

Always scan diskettes and even CD-ROMs before using.

Install an antivirus program and configure it to automatically check diskettes


and CDs

Always get an updated version of a virus scanner and cleaner.

Always check you hard drive for possible infection, if you are connected to the
Internet

Use diskettes only after they have been cleaned


Topic Seven: Application software:

7.0 Definition of application software


Microsoft Office is one of application software that performs specific tasks for the
user, such as word processing, accounting, budgeting or payroll, presentations and
record keeping. Word processors, spreadsheets, database management systems
and slide presentations are all examples of general-purpose application software
(Word, Excel, PowerPoint, Access and Publisher).
7.1 Types of application software
Application software include the following;
Word processing software: The main purpose of this software is to produce
documents. MS-Word, Word Pad, Notepad and some other text editors are some
of the examples of word processing software.
Database software: Database is a collection of related data. The purpose of this
software is to organize and manage data. The advantage of this software is that
you can change the way data is stored and displayed. MS
access, dBase, FoxPro, Paradox, and Oracle are some of the examples of database
software.
Spread sheet software: The spread sheet software is used to maintain budget,
financial statements, grade sheets, and sales records. The purpose of this software
is organizing numbers. It also allows the users to perform
simple or complex calculations on the numbers entered in rows and columns. MS-
Excel is one of the example of spreadsheet software.
Presentation software: This software is used to display the information in the
form of slide show. The three main functions of presentation software is editing
that allows insertion and formatting of text, including graphics in the text and
executing the slide shows. The best example for this type of application software
is Microsoft PowerPoint.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy