Ict Notes Handout 1 121337
Ict Notes Handout 1 121337
ICT Notes
CHAPTER ONE
Process
Computer terminologies
1. Program-is a step by a step instruction which helps the computer to perform a given
task. It can also be referred to as software.
2. Data - These are raw or basic facts which are meaningless unless undergone
processing. It may include numbers, letters and symbols.
3. Information- is processed data which is meaningful. It also refers to summarized
data.
Page 1 of 99
ICT Notes
Parts of a computer
A computer is made up of a collection of different components that are inter-connected
together in order to function as a single entity.
i) System unit- This is the part that houses the brain of the computer called central
processing unit (CPU). It also houses other devices like: - Drives, Motherboard,
Power supply unit, Hard disk etc. Drives are used to store (write), record and read
data. There are two common types of system units namely: Tower system unit
and Desktop system unit.
ii) Monitor/ Visual Display Unit (VDU)/ Screen- It is a television like device used
for displaying output. It is called the monitor because it enables the user to
monitor or see what is going on in the computer.
iii) Mouse- It is a device that enables the user to issue instruction in the computer by
controlling a special mouse pointer displayed on the screen. It is a pointing device
mainly used in Graphical User Interfaces (GUI).
iv) Keyboard- It is a device that enables the user to enter data and instruction in the
computer by pressing its keys.
NB: Devices connected together to the system unit using cables are called peripheral
devices. Examples of peripheral devices include: Mouse, Keyboard, Monitor, Scanner,
Speakers e.t.c.
Page 2 of 99
ICT Notes
Diagram of computer system
CLASSIFICATION OF COMPUTERS
Computers are classified according to:
1. Physical size and processing power
2. Purpose
3. Functionality
Page 3 of 99
ICT Notes
a) Super computers
They are the fastest, largest, most expensive and powerful computers.
They are mainly used in scientific research, simulation weapon analysis etc.
Due to their extreme weight they are kept in a special room.
Due to their high processing power they generate a lot of heat and therefore they
require special cooling system.
They are mostly found in developed countries such as USA where they are used for
advanced scientific research such as nuclear physics.
c) Mini computers
They are physically smaller and cheaper than main frame computers and they are
referred to as small – scale main frame computers.
They support fewer peripheral devices than mainframes.
They are less powerful and have less speed than main frame.
They are used mainly in scientific laboratories, research institutions, engineering
plants and other places where processing automation is required.
They are well adapted for functions such as accounting, word processing, database
management and specific industry application.
d) Micro computers
Page 4 of 99
ICT Notes
They are the smallest, cheapest and less powerful than any other type of computer.
They are called micro computers because their CPU is called a micro processor
which is very small compared to that of mini, main frame or super computers.
Micro computers are also called Personal Computers (PC) because they are designed
to be used by one person at a time.
They are mainly used for teaching and learning institutions, small businesses and
communication centres etc.
Technological advancement with time has seen the development of smaller micro
computers that have greater processing speed and power.
Page 5 of 99
ICT Notes
They are designed to perform a specific task.
They cannot perform other tasks except the one they were meant to do.
Since, they are dedicated to only a single task, they can perform it quickly and very
efficiently.
Examples of such computers include robots, Mobile phones and electronic
calculators.
a) Digital Computers
Page 6 of 99
ICT Notes
They process data which is discrete in nature.
Any data to be manipulated by a digital computer must first be converted to digital
form.
These types of computers are mainly used in scientific and industrial areas.
b) Analog Computers
They process data which is continuous in nature.
They are used in manufacturing process like monitoring and regulating furnace
temperatures, pressures etc. they are also used in weather stations to record and
process physical quantities like wind, cloud speed, temperature etc.
c) Hybrid Computers
They are designed to process both analog and digital data.
DEVELOPMENT OF COMPUTERS
The first computing machine was known as Abacus.
It was used in ancient China and Japan thousands of years BC.
It was made up of rectangular frame and a crossbar at the middle.
In 17th Century, a Scottish Mathematician, John Napier developed a machine called
Napier bones which helped in multiplication and division.
An English mathematician called Charles Babbage developed a machine called
Analytical engine. This machine is regarded as the forerunner of the modern
computers and thus, Charles Babbage is referred to as the father of modern
computers.
Charles Babbage died in 1871 and thereafter, there was little improvement on his
work until the 1930s.
NB: The Abacus, Napier bones and the Analytical engine were all non-electronic tools
that would simplify arithmetic.
Page 7 of 99
ICT Notes
ICT Notes
They used Large Scale Integrated (LSI) and Very Large Scale Integrated (VLSI)
circuits which was an improvement of silicon chip.
These circuits were designed by compressing more tiny circuits and transistors into
even smaller space.
The circuits were used for the development of the brain of the computer called the
micro processor which was used in micro computers.
Then 1st micro computer was called Apple II.
Examples include: IBM 370/ 4300, Honeywell DPS – 88, Burroughs.
2. Offices
Most modern offices functions have been automated for faster message distribution
and processing.
3. Banks
Page 9 of 99
ICT Notes
Efficiency and speed has increased in banks due to better keeping and document
processing by computers.
Special Cash Dispensing Machines called ATMs (Automatic Teller Machines) have
enabled automated cash deposits and withdrawal services.
4. Industry Commerce
Computers are being used to monitor and control industrial processes.
Remote controlled devices like robots are also being used to perform human tasks
which are too dangerous, complex, unpleasant and tedious to human beings.
5. Health care
Computers are used:
To keep patients records in order to provide easy access to all patients’ treatment
and diagnosis. A doctor in need of specialized opinions can easily retrieve such
information from computer storage memory.
For electro-cardiogram screening and motoring for patients’ diagnosis.
Enable access to foreign consultations and expertise / labor easily which would
otherwise have not been possible due to high traveling costs
To carry out computerized diagnosis
To carry out computerized surgery
Page 10 of 99
ICT Notes
In teaching and learning processes and in research institutions. E.g. long distance
learning, open university concept
Learning and teaching using computers is referred to as Computer Aided Learning
(CAL) and Computer Aided Teaching (CAT).
In aviation for training pilots through simulation i.e. computers are used to physically
change the environment so that the pilot feels as if he controlling an actual aircraft.
Engineers and architects use computers to design test and re-design.
By scientists to analyze experimental data
For manned and unmanned space exploration
Page 11 of 99
ICT Notes
10. Employment
Computers create many jobs e.g. computer engineers, system analysts, programmers,
Teachers etc
Advantages of computers
1. Speed
Computers process data faster compared with devices like calculators and type
writers.
The speed of a computer is measured in fractions of seconds.
2. Accuracy
Computers never make errors normally
Usually errors committed by users feed in incorrect data. When you enter incorrect
data and have it processed, the computer will give you misleading information thus
the saying “Garbage In Garbage Out” (GIGO).
3. Storage
A computer is capable of storing large amount of data and it can produce this data
again and again on demand. A human being cannot do that.
4. Diligence
This means that a computer never gets tired or bored if it has to do the same job again
and again. Human beings will get bored and tired very easily.
Page 12 of 99
ICT Notes
Even if the computer has to do a million calculations, it will do the last one with the
same speed and accuracy as it did the first one.
5. Automation
Once the instructions have been given, the computer can carry on with its job
automatically until it is complete.
6. Versatile
A computer is capable of performing large number of different jobs depending on the
instructions fed to it and hardware characteristics.
Page 13 of 99
ICT Notes
THE COMPUTER LABORATORY
A computer lab is a room specially prepared to facilitate installation of computer and
to provide a safe conducive environment for teaching/ learning of computer studies.
Factors to consider when preparing a computer lab
1. Security of computer programs and other resources.
2. Reliability of the source of power.
3. Number of computers to be installed and the available floor space.
4. The maximum number of users the lab can accommodate.
Page 14 of 99
ICT Notes
ii) Avoid carrying food and beverages in the lab. This is because food may fall
into the moving parts of a computer and damage them. Liquids may also spill
into the computer causing rusting or electrical faults.
iii) Avoid unnecessary movements because you may accidentally knock down
peripheral devices.
iv) At all times follow the correct procedure for starting and switching off the
computer to avoid loss of data and also avoid damage to computer
Programmes.
v) Do not open up the metallic covers of computer or peripheral devices without
permission and particularly when the computer is on.
Page 15 of 99
ICT Notes
Organizations, schools, hospitals and banks usually install stand-by generators that
automatically comes on incase of power failure.
Power from generators must pass through UPS before being fed to the computer
because it is not stable.
NB: Generally devices that produce alternative source of power are usually referred
to as power backups.
5. Burglar proofing
Computer should be protected against theft at all times.
Unauthorized access to the computer lab should be avoided by the following:
i) Fit strong metallic grills and padlocks on doors, windows and roof incase the
roofing is weak.
ii) Do not welcome strangers in computer lab.
iii) Install security alarms that would alert security personnel incase of a break in.
6. Proper ventilation
Computers generate a lot of heat and electronic components can be damaged by
excessive heat. It is therefore, important to ensure adequate flow of air in the lab.
Proper ventilation enables the computer to cool and hence avoid damage to computer
components.
Proper ventilation can be ensured by:
1. Installing air-conditioning systems
2. Ensure the room has enough ventilation points e.g. windows.
3. Avoid overcrowding of machine/ people in the room.
Page 16 of 99
ICT Notes
7. Dust and dump control
Computer lab should be located away from excessive heat.
The lab should be fitted with special curtains to reduce entry of dust particles.
The computers must remain covered using dust covers when not in use.
Humidity lower than 50%, allows electricity to build up and cause damage to
sensitive electronic components.
Humidity of over 70%, causes rusting of the metallic parts of the computer system.
8. Proper lighting
A computer lab must be well lit to avoid eye strain that eventually leads to headache,
stress and fatigue.
Very bright wall paints, reflect too much light causing eyestrain.
The user should adjust the brightness of the computer monitor until the eyes feel
comfortable.
Avoid using a flickering monitor which may cause eye strain leading to eye sight
damage.
Consider fitting radiation filter screens (antiglare screens) to reduce the radiation
rays and light that reaches the eyes.
9. Standard furniture
The table which a computer is placed must be strong and wide enough to bear the
weight and accommodate all the peripherals devices.
The seat must be comfortable and have a straight backrest that allows the user to sit
upright. This is important because it avoids muscle pains and backaches caused by
poor sitting posture.
The chair must be high enough relative to the table to enable comfortable use of the
hands on the keyboard.
The eyes must be at same level as the top of the screen when the user is seated
upright.
Page 17 of 99
ICT Notes
PRACTICAL HANDS-ON-SKILLS
Types of booting
i) Cold booting
ii) Warm booting
i) Cold booting
This is starting up a computer that was originally off. This is achieved by pressing the
power button on the system unit.
ICT Notes
Procedure
1. Ensure that all the work has been properly saved/ stored.
2. Close all the Programmes that may be currently running in the computer.
Page 19 of 99
Special Keys
Diagram byofJames
Downloaded a keyboard layout
Malingi (malingijamestaura@gmail.com)
lOMoARcPSD|31321005
ICT Notes
i) Alphanumeric keys
These keys are labeled with alphabetical letters A – Z, numbers arranged in a line 1,
2, 3 … 0 respectively and symbols like? { [ > , @ % &.
This group also includes the following keys: CapsLock key, Enter key, Tab key, Space
bar key and Backspace key.
CapsLock key - Pressing this key lets the user to type in upper case letter (Capitals).
To switch back to lower case letters, press the same key again.
Enter key (return key) - Pressing this key forces the cursor to move to the beginning
of the next line. Cursor is a blinking insertion ( I ) that shows where the next
character to be typed will appear. The Enter key is also used to instruct the computer
to execute a command that has been selected on the screen.
Tab key - This key is used to move the cursor at set intervals on the same line.
The space bar key – This key creates a space between words during typing.
Back space key – This key deletes characters that are to the left side of the cursor.
Page 20 of 99
ICT Notes
(a) Arrow keys - Pressing the left arrow moves the cursor towards the left. The Cursor
moves to the right if you press the right arrow. The cursor move up or down
whenever you press the up arrow or down arrow respectively.
(b) Page up or page down keys - Pressing page up key moves the cursor up one page and
pressing page down key moves the cursor down one page incase the document has
many pages.
(c) Home and end keys - Pressing home key moves the cursor at the beginning of the
current line. Pressing end key moves the cursor at the end of the current line.
Editing keys are used to delete or insert characters in a document. They include:
(a) Insert key – This key helps the user to replace or insert characters at the cursor
position.
(b) Delete (Del) key – This key erases characters that are to the right side of the cursor.
v) Numeric keypad
The numeric keypad consists of a set of numbers from 0 to 9 and arithmetic signs like
+ (addition), - (minus), * (multiplication), and / (division). The numeric key pad is
located on the right hand side of the keyboard.
The keypad is meant to help the user to rapidly enter numeric data.
The numbers on the numeric keypad can only be used when the Num Lock key is
turned on. When the Num Lock is turned off, the keys can be used as cursor
movement and editing keys.
Page 21 of 99
ICT Notes
2. Place the material to type on your left hand side, in a position you can read
without straining.
3. Rest your fingers on the home keys i.e. left hand fingers on A, S, D, F and the
right hand fingers on J, K, L, ; and the thumbs on the space bar.
4. Always return the fingers to the home keys after striking other keys.
5. Start typing and don’t look at your fingers or even the keyboard when typing.
NB: To gain speed in typing, you can use typing tutor software such as typing master, typing
pal, touch tutor, mavis beacon etc.
Mouse skills
i) Clicking - This means pressing and releasing the left mouse button once. Clicking
selects an icon or object.
ii) Double clicking – This means pressing the left mouse button twice in a quick
succession. Double clicking usually opens a file or starts a programme.
iii) Right clicking – This means pressing the right mouse button once and releasing it.
Right clicking displays a list of commands from which the user can make a selection.
iv) Drag and drop - This is where the user points at an item, holds down the mouse
button, slides the mouse and moves the item to a different location on the screen.
Once you reach to the desired location release the mouse button.
Page 22 of 99
ICT Notes
CHAPTER TWO
COMPUTER SYSTEMS
A System - is a collection of independent entities that collectively work together to achieve a
desired goal.
A Computer system – is a collection of entities that work together to process and manage
information using computers.
Hardware
The hardware elements of the computer are grouped into four categories namely:
1. Input devices
2. Output devices
3. Storage devices
4. C.P.U (Central Processing Unit)
1. Input devices
Input is a way of entering or keying data and information into the computer using input
devices.
Data may be entered into a computer using keying devices such as keyboard or using
pointing devices such as mouse.
Page 23 of 99
ICT Notes
The main purpose of input devices is to convert human readable data into machine
readable form.
Input devices are classified according to how they are used to enter data; this include:
i) Keying devices e.g. keyboard, keypads
ii) Pointing devices e.g. mouse, track ball
iii) Scanning devices
iv) Speech recognition
v) Touch screen digitizer and digital cameras
Keying devices
These are the most common input devices. They enter data into a computer by typing.
A computer keyboard resembles a typewriter keyboard,
Examples include: keyboard and keypad.
A keypad is a tiny keyboard which is mostly used on small portable computers,
calculators, palmtop, mobile phones etc.
Types of keyboard include:
Traditional keyboard – is the most common type of keying device. It is a full
sized rigid keyboard.
Flexible keyboard – is a more portable keyboard that can be folded and
packed into a bag.
Ergonomic keyboard – is a keyboard specially designed to provide comfort
and alleviate wrist strain.
Braille keyboard – is a keyboard designed for use by the blind. It consists of
keys identified by raised dots.
ICT Notes
They are used for controlling a pointer on the screen.
Examples include: mouse, trackball, joystick, light pen, pointing stick touch etc.
Mouse
A mouse is a pointing device mainly used in GUI (Graphical User Interface)
operating system.
Uses of a mouse
i) Used to select icons and options from menus
ii) Used to position the cursor when editing text
iii) Used to select text or objects
Advantages of a mouse
i) Easy and convenient to use
ii) It is cheap
iii) Selects a position on screen faster than a keyboard
Disadvantages of a mouse
Page 25 of 99
ICT Notes
i) The mouse requires a flat surface to operate
ii) It is not accurate for drawing purposes
iii) It cannot be used to input text easily
Track ball
It is like a mouse that has been turned upside down. The ball is on top and the user
just rolls the ball without moving the whole gadget. It does not require a flat surface
or extra space for movement.
Joystick
It is a hand held device with an upright handle that resembles a gear lever.
The handle is moved sideways, upwards or downwards to control the position of the
cursor on the screen.
Joysticks are mainly used to play computer games.
Light pen
It is a light sensitive device with the size of an ordinary pen.
It is sensitive to presence and absence of light through a light sensitive cell at its end.
A light pen does not emit/ produce light instead it reacts to the light emitted by the
display using a photo sensitive detector at its base.
Page 26 of 99
ICT Notes
i) Design tool – used to indicate which shape to draw, where they should be drawn on
the screen and the size.
ii) Reading bar codes - indicating the point on a screen e.g. when selecting options for
drawing.
Scanning devices
These are input devices that can read or capture data directly into the computer as
electronic signals from source document. Documents that can be read may include:
bank cheques, electricity meter reading etc.
Scanner is like a photocopying machine that captures a copy of text or a drawing
from a piece of paper and then produces the same in a computer.
Page 27 of 99
ICT Notes
Scanning is the process of using a scanner to capture information from a document
into the computer.
After scanning a document, its copy which looks more like a photocopy of the
original is referred to as bitmap of the original document. This is because the copy is
made up of tiny dots called bits.
Classification of scanners
Scanners are classified according to the technology they use to capture data.
i) Optical scanners
ii) Magnetic scanner
i) Optical scanners
They use the principles of light to sense the document contents.
An optical scanner converts the data into digital form and passes it to the computer
for processing.
Page 28 of 99
ICT Notes
5. National examination registration forms
6. Supermarkets for stock records
7. Insurance premium collection
Advantages of OMR
1. Data can be prepared where it is collected e.g. students sitting for a multiple choice
examination mark the answers themselves.
2. Data can be prepared without any other special equipment.
3. Has low error rates
Disadvantages of OMR
1. The person putting the marks on the document/ form has to follow instructions
precisely.
2. It’s difficult for a computer to check marked data i.e. verification of data is difficult.
3. Documents may be difficult to understand and fill.
Uses of OCR
1. Stocktaking sheet- the computer prints out stock sheet in OCR characters and the
stock checkers enter actual quantities on the form in careful handwriting. The sheet
can then be read by OCR into the computer for amending the stock records.
2. In electricity billing
Page 29 of 99
ICT Notes
Advantages of OCR
1. Provides a faster input compared to typing.
2. The contents of the documents are both human or machine sensible.
3. Data can be captured at the source hence errors are limited.
Disadvantages of OCR
1. Documents should not be folded or creased for accurate reading.
2. Expensive methods of input because special technique and equipment are required.
3. Only a certain font type is acceptable.
A diagram of Barcodes
Page 30 of 99
ICT Notes
Captures data by use of magnetic technology. The data being read can either be in
form of special magnetic characters or a continuous magnetic strip.
Uses of MICR
1. In banks for cheques processing
2. In local authorities for payments of rates by installments.
N/B: An example MICR device is a cheque reader that reads the cheques number, the branch
number of the bank and the customer’s account number and sends the details to the
computer for updating the customer’s account.
Advantages of MICR
1. It is fast, accurate and automatic
2. The codes are both machine and human readable
3. Reduces forgery
Disadvantages of MICR
1. MICR readers and encoders are very expensive
2. MICR system is limited to only 14 characters
3. MICR system is based on magnetism and can be damaged
Page 31 of 99
ICT Notes
Page 32 of 99
ICT Notes
4. Recognition is slow i.e. the vocabulary and speech response is relatively low.
Touch screen
It is an input method that utilizes the technology of touch sensitive screen. When the
user touches the screen the computer detects the finger and responds to it.
Used in places where keyboards are prone to damage due to the environment. They
are also used in areas where there is little space for keyboard.
Digital cameras
They capture images the same way as other cameras, only that the image is stored in
digital form.
The images are entered directly into the computer for editing or printing by
connecting the camera to the computer using a special cable.
Page 33 of 99
ICT Notes
Interactive whiteboard
It is also known as smart board.
It is a large interactive display that is connected to a computer. The computer display
is projected onto the board’s surface where users control the computer.
Smart boards are used in places like classrooms, corporate board rooms and
broadcasting studios.
Page 34 of 99
ICT Notes
ii) Main Memory (Primary Storage)
Provides storage location for data and instructions accessed by the control unit.
Functions of the main memory
1. Holds data awaiting processing
2. Holds data that has been processed awaiting to be output
3. Holds data being processed
NB: Computer memory can be classified into:
i) Read Only Memory (ROM)
ii) Random Access Memory (RAM)
iii) Arithmetic Logic Unit (ALU)
It carries out all the arithmetic and logical operations of the CPU
The basic arithmetic operations include: addition, subtraction, multiplication and div-
ision.
Logical operations include: equal to, not equal to, less than, greater than etc.
Functions of ALU
i) Carries out all the mathematical computations in the computer
ii) Carries out all the logical comparison of values
NB: In order for ALU to be able to process data, it has special temporary storage
locations called registers. A register is a special temporary storage location for holding
data just before processing and after processing.
Types of ROM
Page 35 of 99
ICT Notes
a) MROM (Mask Read Only Memory)
Once contents are written on it by the manufacture they cannot be changed.
b) PROM (Programmable Read Only Memory)
Allows the user to alter it only once after the content is written on it.
c) EPROM (Erasable Programmable Read Only Memory)
The content stored in the memory can be erased by exposing them to ultra violet
(UV) light and then reprogrammed for another use.
d) EEPROM (Electrically Erasable Programmable Read Only Memory)
This type of ROM can be erased and programmed using electricity e.g. BIOS
Characteristics of ROM
1. Can only be read but cannot be written on it unless it is a special type of ROM
2. It is non-volatile i.e. its content is not lost when the computer is switched off
3. Stores permanent instructions from the manufacturer
2. RANDOM ACCESS MEMORY
It is most common type of main memory
It is called random access memory because its content can be read directly regardless
of the sequences in which it is stored.
NB: The content in RAM is held temporarily and therefore, the content is lost once the
computer is turned off.
Types of RAM
a) SRAM (Static Random Access Memory)
It is a very fast memory and holds its content as long as there is power.
It is more expensive than DRAM.
b) DRAM (Dynamic Random Access Memory)
Holds its content for short time, even when power is on. To maintain its content, it
must be refreshed severally per second.
Characteristics of RAM
1. Data can be read (retrieved/ opened) & written (stored) in it.
2. It is volatile (temporary) storage because its content is lost when the power is
switched off.
Page 36 of 99
ICT Notes
3. Its content is user defined i.e. the user dictates what is to be contained in RAM.
a) Buffer
It is a special purpose memory used to provide temporally storage so that the CPU is
set free to carry out other activities instead of waiting for all data to be entered or to
be output.
For example, a printer cannot work at the speed of the CPU, therefore the printer
buffers temporarily holds the output to be printed hence freeing the CPU to perform
other functions.
NB: Buffers can hold more than one piece of data at a time.
b) Cache memory
It is a very high speed type of SRAM whose purpose is to allow the processor to
access data and instructions faster.
c) Registers
They are special purpose memories which hold data temporarily before and after
processing.
Unlike buffers, registers hold one piece of data at a time and are inside the CPU.
Purpose of registers
i) Used for holding instructions currently being processed.
ii) It is a high speed storage location.
Examples of Registers
i) Accumulator – Temporarily holds the results of the last processing step of ALU.
ii) Instruction register - Temporarily holds an instruction just before it is interpreted into
a form that CPU can understand it.
iii) Address register - Temporarily holds next piece of data waiting to be processed.
Page 37 of 99
ICT Notes
iv) Storage register - Temporarily holds a piece of data that is on its way to and from the
CPU and the main memory
Memory capacities
Memory and storage capacity is measured in units called bytes.
A byte is equivalent to a single character. A character can be letters of the alphabet,
punctuation marks, digits, symbols. Eg. A – Z, 0 – 9 etc
A byte is made up of 8 bits. Bit is an acronym standing for BInary digiT.
There are two standard 8-bit codes widely used today to represent information in
computers i.e. American Standard Code for Information Interchange (ASCII) and
Extended Binary Coded Decimal Interchange Code (EBCDIC).
8 Bits
8 Bits = 1 byte
1 Kilobyte (KB) 1,000 bytes (1 Thousand bytes)
1 Megabyte (MB) 1,000,000 bytes (1 Million bytes)
1 Gigabyte (GB) 1,000,000,000 bytes (1 Billion bytes)
1 Terabyte 1,000,000,000,000 bytes (1 Trillion bytes)
Page 38 of 99
ICT Notes
It is a pathway to all timings and controlling functions sent by the control unit to other
parts of the system.
ii) Address bus
It is the pathway used to locate the storage position in the memory where the next
instruction or data is to be executed are found.
iii) Data bus
The pathway where the actual data transfer takes place.
CPU Organization/ Structure
Control Unit
(CU)
Page 39 of 99
ICT Notes
Pentium (II)
Pentium (III)
Pentium (IV)
Processor Clock Speed
The speed of which a processor executes is determined by its clock speed.
The system clock speed is measured in units called Hertz (Hz).
The hertz is a unit of frequency which measures the number of cycles per second in a
signal.
1 kilohertz (KHz) 1000 hertz
1megahertz (MHz) 1000000 hertz
1gigahertz (GHz) 1000000000 hertz
OUTPUT DEVICES
These are peripheral devices that a computer uses to give out information produced after
processing operations.
Page 40 of 99
ICT Notes
i) MONITOR (VDU)
It displays information on its screen thus helping the user to monitor operation being carried
out by the computer.
NB: The size of a monitor is measured in inches (“) diagonally; as in from corner to corner.
Size 15”
(Measured
Diagonally)
TYPES OF MONITORS
a) Monochrome monitors
They display images and text in only one colour mostly black and white.
b) Colour monitors
They display images and text in multiple colours.
Note: Monitors display text and graphics with the help of Video Card (Graphics Adapter).
- Video Card (Graphics Adapter) is a circuit board where the monitor must be connected
for it to display information. The video card is plugged into the motherboard.
- However, some monitors come with on-board video capability and therefore there is no
need for a video card.
Page 41 of 99
ICT Notes
1. Monochrome Display Adapter (MDA) - It was the first video card that displayed
text in only one colour and could not support images.
2. Hercules Graphics Cards (HGC) - Supports monochrome images and text.
3. Colour Graphics Adapter (CGA) - Displays text and images using 16 colours.
4. Enhanced Graphics Adapter (EGA) - An improvement of Colour Graphics Adapter.
5. Video Graphics Array (VGA) - Displays images and text with at most 256 colours.
6. Super Video Graphics Array (SVGA) - An improvement of VGA but offering over
256 colours.
- The sharpness and clarity of an image on the screen depends on the type of monitor.
Monitors that display sharp and clear images are said to have high resolution.
- The images on the screen are formed by small dots called pixel (picture element) hence, the
more the number of pixels per square centimeter, the higher the resolution thus high clarity of
the image.
- Resolution-is the measure of how fine, clear or sharp an image appears on the screen.
- Pixel – Are small dots that form an image on the screen.
1. CRT MONITORS
- It uses a long tube called cathode ray tube that emits light.
- The screen of CRT is curved slightly outwards forming a convex shape.
- The CRT must be refreshed constantly and if the refresh rate is low, the screen flickers
or a line scrolls down the screen.
Characteristics of CRT Monitors
1. The screen is curved slightly outwards
2. They are not portable i.e. they are bulky hence occupy a lot of space
3. They consume a lot of power
4. They are cheap
Page 42 of 99
ICT Notes
Page 43 of 99
ICT Notes
1. The screen might not allow the full viewing of all the data
2. Can lure the computer user not to keep hardcopy records
NB: The term hardcopy output refers to the tangible output produced mostly on papers.
Page 44 of 99
ICT Notes
- Hardcopy output is permanent.
i) PRINTERS
They produce hardcopy information mainly on paper.
Types of printers
a) Impact Printers
b) Non-Impact Printers
a) Impact Printers
- The printing head comes into actual contact with the paper. The printing mechanism is
similar to that of a typewriter.
- They use special hammers with characters and the paper is placed behind an inked ribbon.
- The printing head element creates the imprint when the printing head strikes.
3. Drum Printer
Page 45 of 99
ICT Notes
- It provides one whole line print at a time.
- The characters are incorporated on circular band that move round the surface of the drum
surface.
- Each band contains all the possible character sets.
4. Chain Printer
- It incorporates engraved character printing slugs on a moving belt/chain.
- The chain /belt moves the character printing slugs at a high speed past printing positions.
b) Non-impact Printers
- These printers do not use the striking mechanism to produce characters.
- The printing head element does not come into actual contact with the stationary.
Page 46 of 99
ICT Notes
4. Electrostatic printers
- It uses electrostatic charges to form characters in a line on a special paper.
ii) PLOTTERS
Page 47 of 99
ICT Notes
- They are output devices that mainly produce graphical output e.g. diagrams, maps, posters.
- They are mostly used in the field of engineering and architecture for producing graphical
output.
- The commonly used graph plotters include flat bed plotters and drum plotters.
Types of Microforms
a) Microfilm
- The output is usually on a roll of film, which is about 16mm.
b) Microfiche
- The output is on a page of film where data images are arranged in a grid of patterns. It
measures 105mm by 48mm.
Advantages of COM
1. Saves on stationery and space
2. Faster than printing
3. Not bulky hence portable
4. The contents of COM are not easily read using naked eyes, hence guaranteeing
the security of reports.
5. Have longer life span compared to paper output
Disadvantages of COM
1. It is expensive
2. Cause eyestrain in an attempt to read its content.
3. Additional equipment for viewing its contents are required
Application of COM
Page 48 of 99
ICT Notes
1. In libraries for books, catalogues and references
2. In local authorities to retain town plans, maps etc.
3. In banks, Insurance companies to store personal and customer’s records.
Page 49 of 99
ICT Notes
SECONDARY STORAGE DEVICES AND MEDIA /BACKING STORAGE/
AUXILLARY STORAGE
- These are devices that compliment the primary memory or the main memory. They store
information for longer period.
- Data is either read from or written to the storage media.
- To write data means to store/save it i.e. moving it from the main storage to backing
storage.
- To read data means to open/ retrieve it i.e. moving it from the backing storage to the
main storage.
Characteristics of secondary storage
1. Non-volatile storage - data stored is permanent unless deleted by the user.
2. Mass storage- stores large volume of data
3. Re-usability- stored data can be erased and the media is re-used to store fresh
data.
4. Data is accessed using read/write heads. The head transfers data while the
medium rotates the drive.
N/B: A storage medium has either serial access or direct access.
Serial access - All the preceding data is read before the required data can be accessed,
e.g. magnetic tapes, compact cassettes.
Direct access - Stored data items can be accessed without reading other data first, e.g.
Compact disk, floppy disk.
Classification of secondary storage
1. Removable storage devices
- These devices are housed outside the system unit hence they can be used in
another computer e.g. floppy disk, CD, zip disks etc.
2. Fixed storage devices
- These devices are housed inside the system unit e.g. hard disk.
Page 50 of 99
ICT Notes
MAGNETIC DISKS
- A magnetic disk is a flat circular platter on which data can be stored using magnetic
process.
- Data can be read from and written to the disk.
Note:
ACCESS TIME - Is the time taken to read the data from the disk to the main storage.
The access time consists of:
i.) Seek time - This is time taken by the read/write head to locate the right track
which contains the required data.
ii.) Rotation delay time - This is time taken for the drive motor to spin the
read/write head until the right contents come and align directly below the
read/write head.
iii.) Data transfer time – This is time taken for data to be transferred to the main
storage.
a) Floppy disk/ Diskettes
- Is a thin, light flexible disk held in a protective cover.
- It is made of small flexible disk coated with iron oxide.
- Floppy disks are inserted in a floppy disk drive which has read/write head.
- Initial floppy disks were large in size but with smaller storage capacities. The two common
disks are 51/4 inch and 31/2 inch. Floppy disks are gradually becoming obsolete and being
replaced by CDs, Memory sticks and Flash disks.
- Each of these disks has low density (single sided) and high density (double sided) versions.
- For the single sided, data can only be recorded on one side; while for the double sided, data
can only be stored on both sides of the disk.
Internal structure of floppy disk
Sector
Tracks
Block
Page 51 of 99
ICT Notes
b) Zip Disk
- Resemble floppy disk but have higher storage capacity
- They are slightly larger and thicker in size
- It can hold 250MB of data
- They come with portable external zip drive
c) Jaz Disk
- They are small portable disks with high storage capacity of about IGB to 2GB.
- They are used for storing large amounts of data.
- They come with portable external jazz drives.
Page 52 of 99
ICT Notes
MAGNETIC TAPES
- Magnetic tape is a ribbon of Mylar (plastic like) material coated with a thin layer of iron
oxide.
- It resembles the ordinary music cassettes.
- Data is stored in blocks separated by inter-Record Gaps (IRG) which is left for the purpose
of stopping the tape.
- Examples of magnetic tapes are: Reel to reel tapes, Cassette tapes & Cartridge tapes.
Advantages of Magnetic Tapes
1. They are portable
2. They are cheap
3. Can be erased and re-used
4. Holds a lot of data in a compact space
Page 53 of 99
ICT Notes
- They mostly store video, music, software and data requiring a lot of space.
Forms of CD
1. CD-ROM (Compact Disk Read Only Memory) - When data is recorded on them one
cannot add or change anything.
2. CD-R (Compact Disk Recorder) - They are initially blank and the user can record
data in it. NB: Once data has been written or recorded in it, it cannot be changed but
can be read or opened.
3. CD-RW (Compact Disk Re- Writable) - Unlike the CD-R, CD-RW allows the user to
record and erase information. It behaves like a floppy disk.
NB: Both CD-ROMs and CD-Rs are referred to as WORM. That is (Write Once Read Many)
because they allow the user to record data on them once but read/ open the data as many
times as possible.
d) Optical Card
- It resembles Magnetic Ink Character Reader (MICR) but uses optical recordable stripe that
stores information.
- Mainly used in banks and companies.
e) Optical Tape
- It resembles a magnetic tape only that data is stored using optical technology.
f) Photo CD
- This is used to process photographic film or negative to produce and store high quality
photographs on a CD-R.
Page 54 of 99
ICT Notes
Page 55 of 99
ICT Notes
2. Switch off the computer using the right procedure. Improper procedure would risk
head scratches on rotating disks hence clutching them.
Flash Disk
- This is the most current storage device in the market; it is removable media in the emerging
trends in storage devices
- It is a massive storage media move and is reliable and portable
- It is small in size and can store data from 250 MB, 512 MB, 1GB, 2GB, 4GB etc
Page 56 of 99
ICT Notes
- The advantage of this cable is that they transmit data faster over a short distance.
- It connects to a parallel interface port commonly referred to as Line Printer (LPT).
- Parallel cables are used to connect printers, optical scanners and some removable storage drives
such as zip drive.
USB Symbol
Page 57 of 99
ICT Notes
- Originally, most computers used the 5-pin DIN to connect a keyboard to the system unit but the
smaller 6-pin mini-DIN (PS/2) interface has replaced this technology.
- Currently most desktop computers come with two PS/2 ports, one for mouse and the other for
keyboard.
PS/2 Port
5 – Pin DIN Port
Page 58 of 99
ICT Notes
Page 59 of 99
ICT Notes
Page 60 of 99
ICT Notes
Page 61 of 99
ICT Notes
COMPUTER SOFTWARE
- Software is a set of instructions that enables a computer to operate. It is also known as programs.
i) System Software
- It manages the operation of the computer and makes sure that the computer works efficiently.
- It performs operations to avail computer resources to the user.
Its functions include:
1. Booting the computer and making sure that all the hardware elements are working properly.
2. Performing operations such as retrieving, loading, executing and storing application programs.
3. Storing and retrieving files.
4. Performing a variety of system utility functions.
Page 62 of 99
ICT Notes
1. Operating systems (OS)
- The OS is the main program that controls and supervises the execution of user applications and
hardware resources.
-It acts as a go-between (interface) between the applications and the computer hardware.
- It manages input, output and storage operations in a computer.
- Examples of common operating systems are:
- Microsoft Windows (2000, XP, Vista, 7, 8 etc)
- UNIX
- Linux
- Macintosh (Mac OS), etc
2. Firmware
- It is a combination of both the software and hardware recorded permanently on electronic chips.
- Firmware is also referred to as stored logic.
- It is a read-only memory chip (Contents cannot be changed) that is mounted or plugged into the
motherboard. Read-only memory means that its contents cannot be changed.
- It may hold an operating system, utility programs, language processors etc.
3. Utility software
- It is a special program that manages computer files, repairs computer problems and makes the
computer run more efficiently.
- It performs commonly used services like sorting, copying, file handling, disk management etc.
There are two basic types of utility software:
a) System-level utility - These help the user to work with the operating system and its functions. For
example, a utility software tells the user when he/she enters a wrong command and gives suggestions
how the error can be corrected.
b) Application-level utility - These make application programs run more efficiently and smoothly.
Other common utility Programs are:
- Text editor – Used to type text without any special format. E.g. Line editor and
Screen editor.
Page 63 of 99
ICT Notes
- Linker and Loader – Linker accepts separately translated modules as inputs and
combines them into one logical module. Loader transfers the load module of the
linker from storage to main memory for execution.
- Language translator – Used to convert source code of a programming language to
object code.
- Sort & Merge utility – Sort utility arranges records in a file to predetermined
sequence. Merge utility is used to combine two or more input files into one output
file.
- Diagnostic tools - Used to detect and correct system errors. E.g. Norton Utilities,
PC Tools, QAPlus, Dr. Watson etc.
4. Networking software
- It is used to establish communication between two or more computers by linking them using a
communication channel like cables to create a computer network.
- It enables exchange of data in a network as well as providing data security.
- Networking software may come as independent software or integrated in an operating system. An
example of networking software is novel Netware.
Page 64 of 99
ICT Notes
- The table below gives a summary of application packages.
Application software Examples Uses
Word Processors - Microsoft word, - Word perfect, Used for typing documents like
- WordPro, - Lotus, etc letters.
Spreadsheets - Microsoft Excel, - Lotus 123, Used in performing
- Quattro Pro, - Visi Calc, - Sage, mathematical calculations.
- Quick Books, etc
Page 65 of 99
ICT Notes
- These programs are not available in shops and once developed for a particular company/
organization/ user may not necessarily meet the needs of other users.
Page 66 of 99
ICT Notes
i) Open source (non-proprietary software)
ii) Proprietary software
iii) Freeware.
i) Open source or non-proprietary software
- is software whose source code is made available to users for free.
- The users may use, modify and distribute the modified software.
- Examples include: Linux Operating system
ii) Proprietary software
- is software whose source code is hidden from users.
- Modifications are only made by the software manufacturer.
- Proprietary software may be licensed to users at a fee or applied freely.
- Examples include: - Microsoft Operating System
- Microsoft Office
- Adobe PageMaker
- Corel Draw Suite
iii) Freeware
- Is a form of Proprietary software which is freely made available to the user.
- Most freeware may be malicious, and therefore take caution when acquiring one.
Examples include: - Avast Free Edition Antivirus
- AVG Free Edition Antivirus
HARDWARE CONSIDERATIONS
There are a number of factors you need to put into consideration before acquiring a computer or
hardware accessories.
1) Microprocessor type and speed
- The processing power, speed and cost of a computer mainly depends on the type of a
microprocessor and its clock speed.
Page 67 of 99
ICT Notes
- Consider an acceptable speed that meets the user requirements at a fair price.
2) Memory Capacity
- The memory capacity of a computer determines what operating system and application programs
can be installed.
- A computer might be having a Processor with very high speed, but it may perform poorly if it has
low memory capacity.
- When purchasing a Computer or memory modules for upgrade consider the following::
a) The type of memory package e.g. DDR, DDR II
b) Availability of empty memory slot
c) Capacity of memory modules e.g. 128 MB, 256 MB etc
d) Compatibility with other Modules in case of upgrade
3) Warranty
- This is the agreement between the seller and the buyer that spells out the terms and conditions of
maintaining/ replacing the product after sale.
- A good warranty should cover:
a). Scope of cover e.g. Six months, one year, etc
b). Callout response and liability agreement – repair or replace cost.
c). Preventive maintenance.
4) Cost
- It is important to make a market survey from Newspapers, Magazines, and Vendors to compare
prices before purchasing a computer.
- It is important also to know what kind of computer you are buying, i.e. is it a branded computer or a
clone.
- A branded computer; all its components are from one manufacturer and it has not been tampered
with. Some brands are IBM, Compaq, HP etc.
- A Clone Computer; its components have been assembled together perhaps from different
manufacturers. A clone may work well, but the components are not optimized to work with each
other.
- Clones are usually cheaper than Branded computers.
- The cost of a computer depends on:
a) The Processor Speed
b) The RAM Capacity
Page 68 of 99
ICT Notes
c) The Hard Disk Capacity
d) Whether it is a Clone or Branded
e) Its Portability – Laptops are more expensive than Desktops
6) Portability
Consider if the computer can be easily moved from one point to another. Laptops can easily be
moved around than Desktops.
7) User needs
Consider how the computer will be used and if some physically challenged people will use it, it must
have features for such. E.g. Braille Keyboard for the Blind.
8) Monitor
- Consider the type of monitor you need depending on size, resolution and technology used on it.
Whether it is CRT or TFT etc.
9) Multimedia capability
- Multimedia refers to the ability for a computer to process and output text, sound, video and pictures.
- A multimedia system will consist of speakers, CD/DVD drive, sound cards and a SVGA monitor.
Other considerations
These include available ports, wireless connectivity and the system unit design (Tower or Desktop).
SOFTWARE CONSIDERATIONS
The following factors should be considered when selecting software:
1) Authenticity
- This is the genuineness, validity and/ or legitimacy of an item.
- An original copy of software is accompanied by the developer’s license and certificate of
authenticity.
Page 69 of 99
ICT Notes
- It is illegal to produce pirated copies of somebody’s software.
2) Documentation
It refers to the manuals/ booklet prepared by the developer having details on how to install, use and
maintain the software.
3) User needs
User needs dictates the type of operating system and application programs one should have. E.g. we
need Microsoft Office in schools for learning, Banks will require accounting software for their
activities, physically challenged people may require software to recognize voice input, etc.
5) User friendliness
- This is a measure of how easily the user can operate the computer.
- A good software will have the WIMP feature; i.e.
W – Has a Window (A Frame like Interface)
I – Has Icons representing commands, Files or folders.
M – Has a Menu of commands to choose from
P – Uses a Pointing device to select commands
6) Cost
The cost must be considered before buying a program against the benefits that it is likely to bring.
7) Compatibility and system configuration
A software product must be compatible with the existing hardware, operating system or application
programs and should be upgradable.
8) Portability
Software portability is the capability of the software to be installed in more than one computer.
Page 70 of 99
ICT Notes
OPERATING SYSTEM (OS)
- The OS is the main programme that controls the execution of user applications and enables
the user to access hardware or software resources.
- The OS therefore supervises all the other Programmes in the computer and manages access
to the hardware.
1. Processor
- It executes tasks called processes.
- The OS arranges the tasks according to priority and has the ability to stop a particular task
to allow the processor to service another one.
Page 71 of 99
ICT Notes
2. Main memory
- The OS determines which task will remain in main memory awaiting execution and which
one would be sent back to secondary storage to wait.
- The OS is usually installed in the hard disk and must be loaded to RAM during the booting
process.
NB: It is only a small special part of the OS that is loaded to RAM during booting process
because it contains the most necessary commands and procedures for the booting process.
This special part is called the kernel.
Page 72 of 99
ICT Notes
FUNCTIONS OF OPERATING SYSTEM (OS)
1. Job Scheduling
2. Job Sequencing
3. Error Handling
4. Input/Output Handling
5. Interrupt Handling
6. Resource control & Allocation
7. Memory Management
2. Job sequencing
- The OS keeps a list of jobs or tasks currently being run and clocks them in and out of the
processor.
- It arranges these tasks in a particular order to make it easy for the processor to execute
them and to know how and when to fetch instructions for each task.
3. Error handling
- The OS provides error correction routines to ensure smooth operations within the C.P.U
and possibly make suggestions on how to correct the errors.
- The OS does this by monitoring the status of the computer system and performing error
checks on both the hardware and software.
4. Input/output handling
- The OS co-ordinates the input or output devices and other peripherals making sure that
data flows properly between them and sorting out any possible confusion.
Page 73 of 99
ICT Notes
- The OS also governs the input and output of data and the allocation, storage and retrievals.
5. Interrupt handling
- An interrupt is a break from normal sequential processing of instructions in a programme.
- The OS determines the cause of the interrupt and transfers the control to the most
appropriate programme.
- An external request causes the processor to stop executing current tasks and do something
else before returning the control back to the process that was initially interrupted.
- Each hardware device communicates to the processor using a special unique number called
IRQ (Interrupt Request Number)
6. Memory management
- All the data and instructions must be temporarily held in the main memory before and after
processing.
- The OS therefore organizes the main memory into blocks of sizes called page frames.
- Processes are divided equally into pieces that can fit into frames called pages.
- The O.S swaps/ exchanges pages between the main memory and the secondary storage.
- When the hard disk is used to hold the pages it is referred to as a virtual memory.
- The OS constantly assigns the main memory storage pages to data and instructions.
- To access a piece of data or instruction the OS knows how to find each piece of data or
instructions as long as the correct address or the page is used.
Page 74 of 99
ICT Notes
- Deadlock is a situation where a shared resource is being requested by two or more
processes at the same time.
- Conflict occurs when two or more resources have a common IRQ.
- NB: examples of resources that can be shared include: Processor, Memory areas protected
against modification, Read only files etc.
Page 75 of 99
ICT Notes
b) Multi-User Operating System (Multi-access operating system)
- It allows more than one user to interactively access a computer at the same time.
- Examples of these are: Novell, UNIX, Linux, and Windows NT/2000
- The term User Interface refers to the method of interaction between computer and the user
and determines how easily the user can operate the computer.
iii. It does not make use of emerging hardware and software technologies.
Page 76 of 99
ICT Notes
c) Graphical user interface (GUI)
- This type of interface represents commands as small pictures on the screen called icons.
- An icon is a graphical representation of a command or a file or a folder or an application
which is selected using a pointing device like a mouse.
- GUI has become the latest effort to make user interface more user friendly. Examples of
GUI are Linux, Apple Macintosh and Microsoft Windows etc.
1. Hardware configuration of the computer such as memory size, hard disk capacity
and processor speed.
2. User friendliness of the operating system i.e. is it command-line or menu driven or
GUI.
3. Basic design of the computer i.e. is it an IBM compatible or an apple computer.
4. Availability in the market e.g. Microsoft windows based OS is very common.
5. The cost of the operating system.
6. Reliability i.e. can it run without crushing or hanging
7. The number of users it can support.
8. The application software intended for the computer
9. The documentation available.
Page 77 of 99
ICT Notes
DISK MANAGEMENT USING WINDOWS
Windows provides the user with tools that help the user manage storage devices and media.
1. Formatting of disks
3. Defragmenting disks
4. Compressing disks
6. Backing up data
8. Partitioning disks
1. Formatting Disks
Formatting a disk is the process of preparing a new disk for use by imprinting empty sectors
and tracks on the surface of the disk.
The formatting is done so that the OS can recognize and be able to access the disk.
Other drives which are not disks can also be formatted so as to create a file system on them.
A file system is an efficient way of organizing information on a storage device.
Page 78 of 99
ICT Notes
Procedure
1. Insert the disk into the drive
2. Double click my computer icon
3. Right click the drive then select format
4. Select the disk capacity e.g. 1.44 MB.
5. Select a File System e.g. FAT 32 or NTFS
6. Select the format type i.e. either quick erase or full.
7. Give the diskette an internal name (label)
8. Click start to begin formatting
9. Once the process is over click close.
Procedure
1. Double click My Computer icon.
2. Right click a drive of icon e.g. 3½ floppy disk (A:).
3. From the shortcut menu click properties then click Tools tab.
4. Click the check now button.
5. A prompt appears requesting the use of specifying scan disk options like whether
errors found should be corrected automatically.
6. Once scan disk is complete, windows will give a summary of statistics on errors
encountered if any.
3. DISK DEFRAGMENTATION
Disk Defragmentation is the process of rearranging scattered folders and files in a storage
media.
The main reason of defragmentation is to speed up access to files and folders in storage
media.
Page 79 of 99
ICT Notes
Defragmentation is done using a disk defragmenter tool. This enables the read/write head not
to waste time looking for the same item allover the disk.
Fragmentation is a condition in which files and folders are scattered allover in the storage
surface of the disk. This translates into wastage of time when retrieving data and also
wastage of disk space.
Fragmentation occurs naturally when you use a disk frequently especially when creating,
deleting or modifying files.
Procedure
1. Double click my computer icon.
2. Right click a disk drive icon e.g. 3 ½ floppy disk (A:)
3. From the short cut menu, click properties then click Tools tab
4. Click defragment now button then click defragment, a progress status bar is
displayed.
5. Wait for the process to complete then close the defragmenter.
4. DISK COMPRESSION
Disk Compression is the process of decreasing the amount of space occupied by files and
folders stored in the disk.
This process creates more space in the disk for more files to be stored.
Microsoft Windows provides the user with two compression tools namely:
1. Compression agent
2. Drive space
Procedure
1. Double click My Computer icon
2. Right click a drive icon e.g. 3 ½ floppy disk
3. Click Properties, if you are using windows XP select the Compress drive to save disk
space check box and click OK to start the Zip process.
4. Confirm Attribute Changes; select the options that you want i.e. whether to zip the
folder only or the entire content and then click OK.
Page 80 of 99
ICT Notes
Computer viruses may be spread through storage devices or through e-mail and internet.
To protect a computer against virus attack special programs called antivirus software are
installed in the computer. The antivirus software checks the computer for known viruses and
eradicates them.
Some of the antivirus software available in the market are: Norton antivirus, PC- Cillin,
McAfee, AVG-Grisoft, NOD 32, Avira, Avast, Kerspasky, Quick Heal etc.
Procedure
1. Double click My Computer icon
2. Right click drive icon
3. Select the name of the antivirus program e.g. Norton, Kerspasky, Quick Heal
4. Follow the instructions displayed on the antivirus program to start scanning.
6. BACKING UP DATA
Backing up data is the creation of duplicate copies of data and programs especially on a
separate storage device.
The aim of backing up data is to avoid losing important data and program files in case the
original storage device or the computer fails.
It is therefore, a good practice to keep the back ups of data away from the computer room
to ensure security of the information incase of a calamity such as fire.
Microsoft Windows comes with a back up utility which enables the user to create copies.
Page 81 of 99
ICT Notes
Procedure
1. Double click My Computer icon, then click Control Panel.
2. Select Add /Remove programme.
3. Click Startup disk, then select create disk.
4. The start up disk creation progress will be displayed.
8. PARTIONING A DISK
Partitioning refers to the process of dividing a large physical disk into two or more partitions
called logical drives.
A logical drive is a drive that can be accessed as if it is a separate disk but in actual sense it is
a partition of one large physical disk. Each Partition or Logical drive is treated like a separate
disk drive.
ICT Notes
Before partitioning a disk, you need to know which file systems are used in your operating
system:
1. FAT (File Allocation Table) – was mainly used in MS DOS and Windows 95
2. FAT 32 (File Allocation Table 32 bit) – was mainly used in Windows 98 and
Windows Me. Windows XP also uses FAT 32.
3. NTFS (New Technology File System) – is mainly used in Windows NT, 2000, XP,
2003, and Vista.
Procedure
Before partitioning a disk you must have a start up disk.
1. Insert the start up disk and switch on the computer
2. Select Start with CD ROM support if necessary
3. Let the computer boot to A:\> prompt
4. Type FDISK command and then press enter key
5. A prompt “Do you wish to enable a large disk supporting” appears. Press (Y) to
enable the computer support a large capacity of hard disk of more than 500 MB
otherwise press (N)
6. Choose 1 to create disk partition or logical disk drive.
7. From the sub menu displayed:
(i) Choose 1 to create primary DOS partition which is treated as the
bootable disk or drive C.
(ii) Choose 2 to create extended DOS partitions
(iii) Choose 3 to give your extended DOS partitions drive labels.
NB: Once you finish partitioning the disk, re-boot the computer for the changes to be
effected then format the drive created.
Page 83 of 99
ICT Notes
Installation differs from copy paste process in that Installation is specifically meant to copy
executable files in a format that allows the computer to run the program.
To correctly install an OS, carefully study manufacturer’s documentation (readme or html
file) in order to get the correct information on installation procedures and system
requirements.
To install Windows 98 Microsoft recommends the following minimum requirements:
1. At least 486-66 MHz of processor
2. At least 16 MB of RAM
3. At least 170 MB of hard disk space
4. CD-ROM drive because windows 98 comes with a CD-ROM.
Page 84 of 99
ICT Notes
1. Failure to load the operating system during the booting process.
2. The computer hanging (not responding to commands) often.
3. Abnormal restarting to the computer
4. Displaying a blue screen with the message such as: fatal exception error has
occurred, etc.
The above problems may result from: -
1. Invalid system disk – this occurs as a result of missing system files in the primary
partition needed to load the operating system. Ensure that the active partition is
selected as the start up drive or re-install the operating system.
2. Missing Operating System – Missing system files such as HIMEM.SYS,
CONFIG.SYS etc. during the installation process. This may lead to boot failure. Use
start up disk or rescue disk or re-install the operating system to counter the problem.
3. Corrupted system registry - Registry is a database where Windows stores all its
System software and application software information installed in the computer. If the
registry is corrupted, repair it using emergency repair disk, or restore the registry back
up or re-install the operating system.
4. Infection by malware – this may lead to failure to load the GUI desktop due to
missing or corrupted display drivers by viruses. The viruses may also attack the hard
disk boot sector and lead to boot failure. Locate the malfunctioning device in the
device manager and disable it or start the system in safe mode or scan for viruses.
5. Runtime problems – this is hanging of the system where it does not respond to
commands. Restart the system by pressing the restart keys (Crtl+Alt+Del) in order to
display the Task manager and terminate non-responding programs. Shutdown the
computer and turn it on again if the problem above persists.
6. Hardware conflict or incompatibility caused by IRQ. IRQ conflict that is if two or
more devices are sharing the interrupt request number.
7. Insufficient system memory or damaged system memory.
Page 85 of 99
ICT Notes
HOW AN OPERATING SYSTEM ORGANIZES INFORMATION
Most operating systems organize information in three-tier hierarchy namely:
1. Files
2. Folders
3. Drives
1. FILES
A file is a collection of related data stored in a storage media and given a unique name
that enables the operating system to identify it during storage and retrieval process.
2. The size, date, and the time the file was created or modified.
TYPE OF FILES
a) System files
b) Application files
c) Data files
a) System files
These are files that contain critical information necessary for the computer operation e.g.
System.ini, Autoexec.bat, command.com, msdos.sys, user.dat, system.dat etc
b) Application files
They are also called program files because they hold program or application files.
c) Data files
Data files are user files that contain users, created data. E.g. letter, reports, memos.
Page 86 of 99
ICT Notes
The table below shows files extensions and the file types.
2. FOLDERS (Directory)
A folder or a directory is a named storage location where related files are stored.
A folder enables easy access of files since they are grouped together.
A folder is meant to help the user divide a large storage media into small and manageable
storage locations.
All folders/ directories originate from a root directory/ root folder. A root directory/ root
folder is a special directory where all folders originate from.
A folder/ directory can be created inside another folder or directory; such a folder is called a
subfolder or a subdirectory.
3. DRIVES
A drive is a way in which the operating system recognizes storage devices. Usually, drives
are given labels such as letters (A-Z) to identify.
The table below shows how Microsoft operating system identifies drives.
Page 87 of 99
ICT Notes
Hard disk C, D, E, F Any hard disk in the computer will take letter
starting from C – F.
Optical disks D, E, F, G Any CD/ DVD attached to the computer may
take any letter from D – Z.
Other removable devices D, E, F, …Z Any removable drive attached to the computer
may take any letter from D – Z.
Network drives Logical Network drives takes D – Z depending on the
number of physical drives attached
The figure below shows how information in the hard disk is organized. The folder system
is hierarchical and forms a tree like structure called a folder tree. To access a certain file,
the right path should be followed from the root folder. In this case, the root folder is C:\>.
C:\>
File 6
File 8
File 1 File 2 File 3 Subfolder File 7
6
File 9
File 4
File 5 File 10
- For instance, to open File 1, follow the path: C:\Folder 1\Subfolder 1\File 1.
Page 88 of 99
ICT Notes
SOME COMMON FEATURES IN WINDOWS OPERATING SYSTEMS
Microsoft Windows Operating system is one of the world’s most popular operating system in
use today. It has evolved gradually through upgrading of the previous versions in order to
make it more user-friendly. Some of the recent Microsoft Windows Operating systems
available in the market today include: Windows 2000, Windows NT, Windows XP, Windows
Vista, and Windows 7. Earlier versions include: Windows 95 and Windows 98.
All these versions of Windows have some features in common, which include:
1. They all have similar user structure interface.
2. They all support multiple tasks and multiple users.
3. Various versions of windows operating system automatically accept new
hardware once it is connected to the computer. This feature is called PnP (Plug
and Play).
4. They have ability to handle long file names of up to 255 characters including
spaces.
Page 89 of 99
ICT Notes
Programs/ All programs: Displays a list of all programs installed in the computer. This
menu has a small solid arrow called a side kick menu which when clicked on displays a list
of other menus.
Documents/ My Recent Documents: Displays a list of 15 most recently accessed files.
Settings/ control Panel: It provides tools from which the user can select and make changes
to the computer set up. N/B: Never tamper with this menu as you may interfere with the
computer's functionality.
Find/ Search: It enables the user to search for a file, folder, picture or even music incase the
user forgets the name and location.
Help/ Help & Support: One can learn more about the OS using this menu. It also gives
detailed information on how to troubleshoot a problem in case the computer fails to function
properly.
Run: It enable one to:
Install programs on the hard disk.
Open files and folders from a storage location.
Run programs from a removable storage media.
Log on/ log Off
Log on: Is a security measure that restricts one from accessing the computer unless one has a
user ID and password.
Log off: Exiting from one's user account in order to move to a log on window.
Shut down: Enables one to turn off, restart, standby or hibernate the computer.
Turn off: Shuts down the OS so that one can safely turn off the computer.
Restart: Shuts down the OS and starts it again.
Standby: It puts your computer in low power state so that you can quickly resume windows
session. It does not switch off the computer.
Hibernation: Is where a computer stores whatever it has in memory to your hard disk and
then shuts down the computer but will then resume to its previous state when put on.
Page 90 of 99
ICT Notes
Either of the two lets you to view the arrangement of storage devices/ their storage locations,
files and folders.
Windows Explorer:
It displays files, folders and drives in a hierarchy/tree structure.
The computer tree has an upside down tree structure with the highest level being the
root (desktop).
To launch the Explorer window:
Click on START menu then click on ALL PROGRAMS.
Click on ACCESSORIES then select WINDOWS EXPLORER
The Explorer window appears that divides the window into two panes:
The left pane: Displays a tree structure consisting of storage locations i.e. drives, files and
folders.
The right pane: Displays a list of files and sub-folders contained in an open
drive or folder.
In windows Explorer window, some items have a plus (+) or minus (-) sign
Plus sign: Means the item has some other lower items. Therefore, to display
them, just click on the plus sign.
Minus sign: Means that all sub-folders in that level have been accessed. Click on
it to reduce (collapse) the tree.
My Computer icon
It displays the different drives and folders found in the computer. E.g. drives, control
panel and other resources.
To display files and folders in a particular drive:
Double click the drive icon e.g. C
A window appears having files and folders stored in the root of the drive.
Double click the folder to display its content.
Page 91 of 99
ICT Notes
From File Menu, click on NEW, then click on FOLDER. A new folder with a temporary
name NEW FOLDER appears.
Type a new name for the folder to replace the temporary name and press ENTER key.
In DOS:
The command MD (Make Directory) is used to create a directory.
C:\>MD directory name Then Press Enter e.g. C:\>MD jane Then Press Enter
To create a sub-folder, follow the same procedure, but choose a folder to be its storage
location.
Page 92 of 99
ICT Notes
To create a document file called John with the text "Home is the sweetest place to
stay" type C:\>COPY CON John.DOC
Home is the sweetest place to stay
<Ctrl Z>
EDIT command
This is the latest version of DOS that has an editor screen for creating text files. It is a
full screen editor that allows one to create, edit, save and print files.
To create a file using EDIT
C:\>EDIT File name Then Press Enter
Page 93 of 99
ICT Notes
In DOS:
The command REN (Rename) is used to rename files or folders.
C:\>REN Old Name New Name Then Press Enter e.g. C:\>REN Jane Job Then
Press Enter
Page 94 of 99
ICT Notes
In DOS:
The command for deleting a file is DEL (Delete).
C:\>DEL Job.txt, Then Press Enter Deletes a file in drive C called Job with the
extension .txt.
The command for deleting a folder is RD (Remove Directory)
e.g. C:\>RD Directory name Then Press Enter e.g. C:\>RD Jane, Then Press
Enter Deletes/ Removes a directory called Jane in drive C.
Page 95 of 99
ICT Notes
From the folder tree on the left pane, select file/folder you wish to move.
From EDIT Menu, click on CUT,
Select the folder or drive you want it moved to.
From EDIT Menu, click on PASTE
A move dialog box will be displayed showing that the information/ item is being moved to a
new location.
In DOS:
The command COPY is used to copy files or folders.
C:\>COPY Source File Destination drive
e.g. C:\>COPY Jane.txt A: Then Press Enter Copies a file Jane.txt which is in drive C to
drive A.
To copy a file to a folder e.g. jane.txt to a folder named Job in drive C, C:\>COPY Jane.txt
Job
ix) Changing Files and Folders
In windows, to change from one folder to another, simply click or select the folder you wish
to change to in the windows Explorer.
In DOS: We use CD (Change directory) command
C:\>CD Directory name , Then Press Enter
Page 96 of 99
ICT Notes
Open the folder, then click EDIT menu and click on SELECT ALL.
OR
Press Ctrl+A on the keyboard.
xii) Searching for Files and Folders
It is used when one is not sure of the name of a file or folder and its location.
To search for files and folders:
From the START menu, click SEARCH.
In the Search dialog box, type the name of file or folder and its location
Click Search.
Page 97 of 99
ICT Notes
Work area: An area where text or graphical objects are inserted. It has an insertion pointer.
Status bar: An interactive strip at the bottom of the window that displays activities of the
programs that are currently running. E.g. Ready, Saving, Cursor position etc
Scroll bar: Are horizontal and vertical bars that the user drags to move upwards, downwards,
right or left of the document.
Rulers: Are vertical and horizontal onscreen rulers that enable the user to position text or
objects in their right position. It is used to adjust column width, change page margins, set tabs
etc. if it is not visible: Click on VIEW, then on drop down menu click on RULER.
Page 98 of 99
ICT Notes
Page 99 of 99