Computers Notes
Computers Notes
Information Technology
It is an organized combination and use of hardware, software, telecommunications,
database management and other information processing technologies used in a
computer-based information system.
Computer
It is a device that has ability to accept data, internally store and execute a program
of instructions, perform mathematical, logical and manipulative operations on the
data and reports on the results.
Put simply, it is a machine that accepts data (input) and processes it into useful
information (output).
Computer System
It is an interrelated system of input, processing, output, storage and control
components
Thus a computer system consists input and output devices, primary and storage
devices, the central processing unit, the control unit within the CPU and other
peripherals
The terms data and information are loosely used interchangeably in ordinary
discussions. The terms, however, are different in their usage in the field of information
systems.
Data – it is the complete range of facts, events, transactions, opinions, judgments that
exist both within and outside the organization. Data are raw facts from which
information is produced.
CHARACTERISTICS OF A COMPUTER
All computers have certain common characteristics irrespective of their size and type
1.Word length- a digital computer operates on binary digits, 0 and 1. It can understand
information only in terms of 0s and 1s. a binary digit is called a bit and a group of 8 bits
is called a byte. The number of bits that a computer can process at a time in parallel is
called its word length. Commonly used word lengths are 8, 16, 32, 64 bits. Word length
is the measure of the computing power of a computer and the longer the word length,
the more powerful the computer is.
2.Speed- computers can calculate at very high speeds. A microcomputer eg can execute
millions of instructions per second over and over again without making any mistake. As
the power of the computer increases, the speed also increases.
3.Storage- computers have their main memory and auxiliary memory systems which can
store a large amount of data. What makes a computer unique is that information can be
retrieved in a few seconds
4.Accuracy- the accuracy of a computer system is very high. Errors in hardware can
occur but error detecting and correcting techniques will prevent false results. In most
cases the errors will be to the human error rather than technological.
5.Versatility- computers are very versatile machines ie they can perform activities
ranging from simple calculations to performing complex activities
6.Diligence- means being constant and earnest in effort and application. Human beings
suffer from weakness like tiredness, lack of concentration, hence will affect their
performance
COMPUTER SYSTEMS
Microcomputers
They are also called Personal Computers (PCs) or Desktop Computers.
These are relatively small and inexpensive.
They consist of a single processor or a chip
The system is normally made up of the microprocessor, keyboard, VDU one or
two floppy disk drives, a printer and a hard disk drive.
It has a hard disk capacity of 20Mb to 520Mb
May use a color or monochrome cathode ray tube (CRT)
Have capabilities for networking.
They are single user.
They occupy little space.
They are capable of multiprogramming.
They are compatible with a wide range of software.
PCs come in a variety of sizes: notebooks (handheld), laptops, desktops and floor
standing.
Hardware features
- Support magnetic tape storage
- They are multi-user more than 100 users at time for super minis
- Have multiple hard disks, both fixed and exchangeable
- Can be upgraded when necessary
- They do not require a special environment to work so can allow for
decentralisation.
- They are less expensive than the mainframe systems
- They have bigger capacities than microprocessors, some have 32 bit
microprocessors.
Mainframe computers
These are large, powerful computers with a lot of processing capabilities.
They are suitable for medium-size to large corporations.
They can also be linked together to form a powerful and flexible system.
Hardware Features
- Similar to minicomputers but have several large processors and high
processing speeds of up to 200 million instructions per second (mips)
Supercomputer Systems
These are extremely powerful mainframe computer systems. They are specifically
designed for high-speed numeric calculations. These an process hundreds of millions
instructions per second (mips)
Word size - the number of bits dealt with at the same time, some processors are 8 bit,
others even 32 bit. The larger the word size the more powerful a computer system is. So
some physically bigger systems may have smaller word sizes and hence less power.
Speed of the microprocessor - it is the clock rate or rate of data transfer, it is the rate at
which data bits are moved around inside at bits per second (megahertz) this is also
called the baud rate. Systems with higher speeds tend to be more powerful though they
tend to be physically small.
2. Home Computer - it is a cheap computer that is used for domestic purposes e.g.
programmes for games and controlling home finances.
6. Lap - top - it is a small computer with a flat screen that a user can place on his
lap. It is portable and has an in-built rechargeable battery that can support it
when there is no power from the mains. It can be carried in a briefcase.
Processor
CONTROL UNIT
Interprets stored
instructions in
sequence. Issues
commands to all
elements of the
computer
ARITHMETIC &
LOGIC UNIT
Performs
Arithmetic &
logic
functions
INPUT OUTPUT
Data and Information
-the results of
instructions
processing
AUXILLARY STORAGE
(BACKING/SECONDARY STORAGE)
To supplement main memory
Key
Command/Signal flow
INPUT DEVICES/METHODS
These facilitate communication between the user and the computer. They facilitate the
insertion of data into the computer for processing.
(b) Keyboard
A keyboard is laid out like a typewriter
It allows data to be typed in by the pressing of the relevant keys
The pressed key or instruction is displayed or executed
This is the most commonly used input device
(Study Key-to-disk systems, Key-to-diskette systems –Refer to Clifton)
(c) Mouse
It is a hand held pointing device electronically connected to the
computer which is used to control the cursor or a pointer on the screen
through the rolling motion of a ball on a flat surface.
The cursor or pointer on the video screen moves in the same direction
as the movement of the mouse.
OUTPUT DEVICES
Hardcopies are needed when copies are to be taken away from the computer to be sent
to a user of the information thereon, or to be filed away or even as legal
documentation.
Computers, therefore can produce a number of different documents e.g. reports, sales
invoices, payrolls, or graphics.
Some computers are capable of producing speech. The computer can actually speak out
from a stored digital representation of either words or other sounds. A person's voice
can be stored and reproduced later.
These method of output is of great use to the blind, or in poor light. Advanced forms of
speech output are being used to answer telephones, answer some inquiries from an
organization's callers etc.
COM is most suitable where large amounts of data are processed but are to be used
much later e.g. in a government registry department (birth registrations, important
national statistics for example population censuses.
Graph Plotters
These are used to plot graphs, maps and other forms of graphic onto a medium usually
larger than the size of a normal paper. They can print in different colours.
It is the unit of the computer system that includes the circuits that control the
interpretation and execution of instructions. It is the most important component of a
computer system. It consists of the CU, the ALU and the registers. A computer may have
more than one processor and this can help improve the performance of the computer
by increasing its processing power.
Functions of the processor
To control the use of the memory to store data and instructions
To control the sequence of operations
To give instructions to all parts of the computer to carry out processing
The CPU can be subdivided into two major subunits; the control unit (CU) and the
arithmetic logic unit (ALU). The primary (main) memory is an extension of the CPU and
assists the CPU in its operations.
Address bus
Memory
Other
Address
Register
Register
Data bus Main memory
Memory Data
Register
Control bus
Electronic
pulses
Electronic
clock
Buses
It is the common pathway through which the processor sends/receives data and
commands to and from primary and secondary storage and all I/O peripheral devices.
Three sets of wires called buses connect the processor to the main memory and I/O
devices. These are address bus, data bus and the control bus.
Address bus
Carries the address information from the processor to the main memory and any other
devices attached to the bus. It is unidirectional or one-way only. The number of wires in
the address bus (width of the bus) determines the number of storage locations which
the processor can address. A typical microcomputer with 32 wires in the address bus is
said to have a 32-bit address bus.
Control bus
Is made up of a number of separate wires or lines, each with its own function. These
include the read, write, clock, interrupt and reset
Clock –carries a series of clock pulses at a constant rate. These clock pulses are used to
keep the processor and its related components in step with one another. Clock rate is
the frequency at which the clock generates pulses and is measured in Hertz. It is one
way of increasing the performance of a computer system.
Interrupt – is a signal to the processor, typically from an input or output device. It allows
peripheral devices to communicate with the processor. It also causes a break in the
execution of the processor’s current program.
Reset – is used to return the processor and the whole computer system to its initial
state, as if it has just been switched on. The main use of the reset line is to recover from
a system crash
Instruction time
Place result
in memory Decode instruction- CU
ALU to
RAM
Execution time
Execution time
Execute instruction- using whatever processor resources needed, primarily the ALU, the
instruction is executed
Place result in memory- the results are placed in the appropriate memory position or
the accumulator
Operational features
The memory has uniquely addressable storage locations that are easily
accessible to the CU.
Random Access - it is possible to fetch data from the locations in main storage in
any order and time taken to access the location does not depend on the position
of the location.
Volatility - the main memory can be volatile or non-volatile depending on the its
physical characteristics
Details of single location - Each location consists of tiny devices that can take two
states (on/off). The two states of each device are used to represent binary (0 -
off, 1 - on). Each location in the main memory holds a unit of data called a word.
Some computers had locations holding 8 binary digits and were therefore said to
have an 8-bit word. Other computers have 16 bit storage locations, while others
tend to have 32 bit locations.
The Random Access Memory (RAM)
This forms the largest part of the Main Memory and is often used to measure the power
of a computer. It is used for temporary storage of data and programs during processing.
RAM contains user data and application programs being processed. Data may be read
from RAM and data can also be written onto and stored on RAM. RAM contents are
volatile i.e. stored data is lost and the contents disappear if the power is interrupted or
when computer is switched off.
Storage capacity on RAM
8 bits = 1 byte
1024 bytes = 1 kilobyte
1024 X 1024 bytes = 1 megabyte
1024 X 1024 X 1024 bytes = 1 gigabyte
Types of RAM
Dynamic RAM (DRAM)
Is a type of RAM chip which needs to have its contents constantly refreshed or any data
contained in it will be lost.
Virtual memory- a way of using fast backing storage as temporary location for programs
and data. It is useful in situations where a computer has insufficient RAM to hold a
complete program and its associated data. Sets aside part of the computer’s backing
storage device(like a hard disk) as a temporary storage area. Data and programs are
swapped between RAM and the backing storage device as the processor requires them
for processing.
Such devices include Memory cards, Memory sticks, CDs, DVDs, External hard drives etc
Measures of performance
Clock speed- clock signal is carried out by one of the lines on the control bus. The clock
generates clock pulses at a constant rate. Everything that the processor does is kept
precisely in time with the clock.
FLOPS- floating point operations per second is the measure of the arithmetical
calculating speed of a computer system.
SOFTWARE
Software refers to computer programs that control the workings of the computer
hardware, along with the program documentation used to explain the programs to the
user.
Computer programs are sets of instructions or statements to the computer that direct
the circuitry within the hardware to operate in a certain fashion.
Systems Software
Application Software
Development Software
SYSTEMS SOFTWARE
It is a collection of programs that interact with the computer hardware and application
software programs creating a layer of insulation between the two. Systems Software
contains instructions which:
(a) Manage a computer system’s hardware components to coordinate them so that
they work efficiently
(b) Schedule the computer’s time to make the best use of that time.
(a) User Interfacing – an Operating System allows a user to communicate with the
computer in loading programs, accessing files and accomplishing tasks through
command driven, menu driven or graphical user interfaces. In command driven
interfaces, the user uses brief end commands, in menu driven interfaces the user
selects choices from menus of options, in graphical user interface (GUI) the user
selects icons, bars, buttons, boxes or other images to him get things done by the
system.
(b) Operating Environment Management – Use of GUI enables the user to connect
to other separate application packages so that they can communicate and work
together and share data files. Operating environment packages provide icon
displays and support the use of some input devices to allow the running and
output of several programs to be displayed at the same time. The Operating
System allows for multitasking – i.e. where several programs or tasks can be
processed at the same time.
(d) File Management – The file management programs in the operating system
control the creation, deletion and access of data and programs. The programs
also keep track of the physical location of files on secondary storage units. They
maintain directories of information about the location characteristics of files
stored on a computer system’ s secondary storage devices.
Windows
A widows based operating system is more advanced than the MS-DOS based
operating system.
It features graphical user interfaces (GUIs) – User can feed commands into the
computer through the selection of relevant icons, bars, buttons, boxes or other
forms of images (mostly resembling the intended device or operation).
True multitasking – the operating system allows for numerous tasks to be done at
the same time.
Networking – the operating system is multi-usable – many users can use it at the
same time. It is capable of holding a number of computer systems networked
together.
Multimedia Presentations- the operating system allows for the presentation of
information in a variety of media including text, graphic displays, voice and other
audio, photographs and video.
Virtual Memory – It allows for the use of storage devices as extension of the main
memory thus giving the appearance of a larger main memory than actually exists.
Deleted file go to recycle bin
Makes use of easier input methods e.g. mouse, joystick
UNIX
It was originally developed by AT&T but now being offered by many other vendors.
It is a multitasking, multi-user and net-work managing operating system
Because of its portability, it can be used on mainframes, midrange computers and
microcomputers.
It is a popular choice for network servers.
Language translators
Utility programs
Control programs
Communication programs
Interpreter
This is a language translator that converts each statement in a program into machine
language and executes the programme statement at a time
Utility programs
It is a standard set of routines that assist the operation of the computer system by
performing some frequently required processes such as to sort and merge sets of data,
copy and keep track of computer jobs being run.
Control programs
These are designed to manage the general functions of the processor, memory and
terminal interface. The programs are arranged in a hierarchy at the top of which is a
kernel or executive program that controls the running of the other programs. In
microcomputers the supervisor is held in ROM while on larger computer systems it is
held on backing store. When the computer is switched on the supervisor is loaded into
main memory, the other programs are kept on disk and are transferred to main memory
when they are needed.
The job scheduler selects, initiates, terminates, queues and sequences the jobs that
demand the use of the processor and main memory.
The file manager has the responsibility of achieving the interleaving effect of
Multiprogramming.
The Input/Output manager has the responsibility of managing the interface with
terminals and backing store in response to the requirements of any applications
program being executed.
Communications Programs
This refers to a system for extending the capacity of main memory for running large
application or utility programs. The operating system separates programs into sections
some of which are put into backing store. The locations of these sections (addresses) and
the part of the program being executed are held in main memory; the sections are called
in and processed
When required and then returned to backing storage. The sections of the programs are
called pages and are said to page in from backing store and page out when being
replaced by other pages. The execution of virtual storage is therefore called paging.
APPLICATION SOFTWARE
Applications are programs designed to help the user carry out specific tasks for
example to manipulate figures or write texts.
Word Processing
Spreadsheets
- A spreadsheet package is used to perform calculations that have been entered onto
a grid.
Databases
- A database is an organised store of information, for example an address book, list of
employees, list of students, customers or items of assets.
- A database package is used to store records.
- Data can be sorted, filtered for separate viewing.
- Calculations and comparisons between data items can be done.
- Popular database packages are: Microsoft Excel, lotus Approach, Paradox, dBase IV,
Data Ease.
Graphics
- These are applications designed solely for designing graphs and text charts/posters.
- They are often used to produce slides for use on overhead projectors, or
presentations on computer-projectors.
- Various types of charts are also produced
- Examples of graphics packages are: Microsoft PowerPoint, Lotus Freelance, Harvard
Graphics, Corel Draw
Desktop Publishing
- Desktop Publishing (DTP) applications give users powerful and versatile page design
capabilities.
- The user can incorporate text and graphics on very exact page layouts.
- These applications produce magazines, catalogues, invitation cards, business cards
and other sophisticated documents.
- The application links up well with other applications as the user can import text and
graphics from the other applications.
- Examples of DTP packages are: Microsoft Publisher, PageMaker, Ventura and Frame
maker.
Suites
- Many applications are grouped together into suites which users can purchase as one
product containing, for example, Word-Processing, a Spreadsheet, Desktop
Publishing, Database application can be found within a Microsoft Office suite.
-Performance - it must have efficiency in both response time and run time.
In-house
Off-the shelf
From a contractor.
In-house Developed Software
This approach requires a development team from within the organisation. The team is
usually comprised of programmers and analysts. The team members should be high
calibre, highly trained and reliable
Advantages
Internal professionals understand operations better and therefore can produce an
accurate solution.
The Software usually meets user requirements.
Management are in total control of the development process
More flexibility - there is more flexibility in making modifications.
Problem specificity - in-house developed software can give an organisation software
programs that are easily tailored to a unique problem or task.
Time and costs of developing the program may be greater than other options
In-house staff may lack the expertise needed for the project
Reliability of the resultant software is highly questionable.
In some cases the developers may attempt to gain fraudulently from the system
Off-the Shelf
This is software that can be purchased, leased, or rented from a software company that
develops programs and sells them to many computer users and organisations.
Applications such as financial accounting, business graphics and pay roll may be bought.
Advantages
Cheaper - the software company is able to spread the software development cost
over a large number of customers, hence reducing the cost any one customer must
pay.
Less risky - the software is existing, hence you can analyse the features and
performance of the package.
The program is a well-tried and tested product with few errors.
Less time - Off-the -shelf software is often installed quickly and easily.
The package is well documented
The packages require little maintenance
There is continued support from the supplier through upgrades.
Disadvantages
The organisation might need to pay for the features that are not required and never
used.
Tie package may be for general needs and therefore not ideal for the user.
The user has no direct control over the package,
This involves contracting out software development to a software house - better known
as outsourcing especially where off-the-shelf packages are not available.
Advantages
Software houses employ professionals and this may benefit the organisation
Transfer of skills to the existing professionals in an organisation
Organization can get support from the contractor.
DEVELOPMENT SOFTWARE
It allows the user to create software for various applications.
All software programs (systems and application) are written in coding schemes called
programming languages. The primary function of a programming language is to provide
instructions to the computer system so that it can perform a processing activity to
achieve an Objective or solve a problem. Program code is the set of instructions that
signal the CPU to perform circuit-switching operations,
Programming languages
Low-level languages
High-level languages
Low-level languages
In machine languages programmers wrote their instructions in binary code (0 and 1),
telling the CPU exactly which circuits to switch on (1) and off (0). Machine language is
considered a low-level language because it is very simple to the computer. Machine
language is the language of the CPU. It is the only language capable of directly
instructing the CPU.
All languages beyond the first generation are called symbolic languages- they use
symbols easily understood by humans, allowing the programmer to focus
on structuring a problem solution rather than on the complexities of coding specific
computer programs.
The commands are written in simple mnemonics (abbreviated form) instead of the
binary coding . For example A for ADD MV for MOVE. It is therefore easier to work with
assembly coding than machine coding. However, the instructions have to be translated
into machine code by a program called an assembler. Although it is a step above
machine language in terms of sophistication, assembly language is still considered a low-
level language,
These use greater symbolic code. They are problem oriented. They specifically instruct
the computer on how to complete an operation. The instructions are English-like and
have to be translated into machine code by a compiler or interpreter.
They are at a higher level than 3GLs. They demand few lines of code as compared to
3GLs.
They are easy to learn and their statements are close to natural language. Being
easy they are used to develop simple systems.
It emphasises what output results are desired more than how programming
statements are to be written.
Many managers and executives with little or no training in computers and
programming are using fourth generation languages for programming.
Features of 4GLs
These are used to create programs for artificial intelligence and expert systems.
They are sometimes called natural languages because they use English syntax.
They allow programmers to communicate with the computer using
normal sentences.
DATA COMMUNICATION
Is the electronic collection and distribution of information between two points. Refers
to the means and methods whereby data is transferred between processing locations
through the use of communication systems. Once information has been converted into
binary, it is transmitted over the transmission media eg fibre optic cable has a series of
binary bits(1s &0s). Data communications hardware is used to transmit digital
information between terminals and computers or between computers and other
computers. These primary hardware components includes the modem, front-end
processors, the multiplexor and the router
Components
1. Computer to process information.
Communication systems are defined as systems for creating, delivering, and receiving
electronic messages. The communication system comprises of the following: - a device
to send the message
- The channel or communication medium
- A device to receive the message
There are various modes and codes of data transmission signals from the sending to the
receiving device.
Analogue transmission
Analogue signals are continuous sine waves that send a continuous 5-volt signal on a
channel but the signal will vary continuously between +5 to -5 volts. The number of
cycles per second is the frequency of the signal and is expressed in units called hertz
(Hz). The human voice forms oscillating patterns of changes in air pressure. The
vibrations act on the telephone microphone and are converted to electrical voltage
patterns that reflect the characteristics of the speech pattern. Analogue transmission is
used to transmit voice or data in analogue signals. It is used in telephone systems and
radio transmission.
Voltage
Analogue Signal
+5
-5 Time
Digital Transmission
This is the sending of data with digital symbols of 0 and 1 representing the switching on
(1) and switching off (0) pulses of electricity. Most computer systems use this to create
Digital Signal
1 1 1
0 0 0
Time
These are ways through which organisations can communicate via the channel or
transmission media.
Simplex transmission
Transmission takes place only in one direction. These are not suitable for long distance
transmission because there is need for acknowledgement or error messages. It is used
in the computer - printer communication. This is also used in radio and television
transmission.
Sender Receiver
Half Duplex
Sender Receiver
Full Duplex
This permits simultaneous transmission of messages in both directions. Sending and
receiving can be done at the same time using the same devices. This is the mode used in
modern telephone/cellular transmission.
Sender Receiver
Serial transmission
Binary signals representing the data are transmitted one after another in a serial
fashion. It is normally used except for very short connections between a peripheral and
a computer where parallel techniques are employed.
Parallel transmission
Data bits are transmitted as groups in parallel. Is quicker than sending them serially but
it is only practicable over short distances
Protocols - There is need for there to be a way of signalling the start and end of
the message by the use of data transmission protocols. The use of the parity bits
is one method, use of "roger", "over" are protocols in two-way radio
communication.
DTE- Refers to all the external devices attached to a network. Egs computer terminals
Dumb terminal- the DTE maybe a dumb terminal, ie one which has no processing power
of its own, possibly no storage and is entirely dependent on a controlling computer. As
soon as each character is entered by the operator, its transmitted over the
communication link, to the controlling computer. This makes editing difficult and slow.
Having no processing power and no buffer memory, dumb terminals use a point-to-
point connection with the remote controlling computer hence data is transmitted
asynchronously.
Intelligent Terminal- this has memory and processing power, so an operator can use it to
store, edit and manipulate data independently of any other connected computer eg a
document can be retrieved from a remote computer, be edited and updated within the
intelligent computer. Having this ability, it can accumulate the keyed characters and
send them in blocks or streams.
Switching Alternatives
Circuit Switching
When a call is made the communication channel is opened and kept open until the
communication session is complete.
Message Switching
Each message is sent to the receiver if a route is available. The messages are sent in
blocks one at a time. The message may be stored for later transmission if the route is
not available, sometimes this is called store-and-forward transmission. The message is
delivered when the route becomes available or upon demand from the receiver.
Packet Switching
This involves sub-dividing the message into groups called packets. Each packet is then
sent to the destination separately via the fastest route. At the destination the packets
are put in sequential order and delivered to the receiver. Sometimes when there is no
route open, the packets are stored and then forwarded once the route is open, so these
are also store-and-forward systems. These fully put the network to better utilisation.
a. Telephone Systems - telephone lines are used with online systems. The lines can
be divided into leased and dial service lines.
(i) Leased Lines - These are telephone lines that are dedicated to the
sole use by the user to support online systems within the
organisation. The telephone service provider (e.g Tel One) then
charges a flat monthly rate for the service. In calculating the rate the
length of the line may be considered.
(ii) Dial service - With this telephone line the user is charged each time
the line is used for online processing. When all the lines connecting
the system are busy a user has to wait and an appropriate message is
given by the system. The rate charged depends on the distance, time
of use (peak or off peak), time spent during transmission. This is
usually used for long distance communication between systems e.g.
the Internet
A leased line service provides for high-level online activities. It is much
cheaper to use and provides better quality transmission. The leased lines are
much more flexible than dial service lines. Users in the system have greater
access through the many lines provided by the common carrier.
Destination
Source
Earth
This form of transmission can transmit large amounts of data over wider areas.
This is in much use in wide area television broadcasting. Although transmission is
of high quality, setting up the system is very expensive.
d. Radio Transmission - This form of transmission uses radio waves, transportation
and taxi companies for easier communication use it. The police and army to
communicate also use this.
e. Cellular Transmission - The local area under the transmission is divided into
cells. As the cellular transmission user moves from one cell to the other the
connection is passed from one cell to the other. The signals from individual cells
are integrated into one regular telephone system.
f. Physical Cables - Transmission uses physical cables which are connected to the
communication points. There are three types of these cables:
(i) Twisted-Pair Wire cable - this consists of a pair of twisted copper wires.
The wires are insulated and twisted to avoid mixing of signals from or
into each other. There are shielded wires (with a special conducting
wire) and unshielded twisted-pair (UTP) that has no insulation. It is
the type used in home telephone connections. The twisted pair wire
cable is inexpensive. However, it does not allow high rates of data
transfer, and is prone to interference and too bulky.
(ii) Coaxial cable - Consists of a sturdy copper or aluminium wire wrapped
with spacers to insulate and protect it. The insulation minimizes the
interference and distortion of the signals the cable carries. Groups of
coaxial cables may be bundled together in a big cable for ease of
installation. They allow high speed data transmission
(iii) Fibre optic cable - This is made up of a glass or plastic core surrounded by
a cladding material (paper, polyethylene, twine or other sheathing).
They use light which is turned on and off rapidly creating the on off
bit. The sheathing of the cable prevents loss of reflection.
Advantages
1. High transmission capacities
2. Smaller cable size and lighter weight
3. Very little cross talk and spying
A network is a number of computers connected through some channel so that they may
share some of the resources and allow access into them by users from other points.
Computers are networked for various reasons depending on the nature of the
organization, the most of these being the need to share limited resources and to
communicate
Advantages of networking
a. Resources can be shared e.g. printers, computer files and programmes.
b. More even distribution of processing and other work by the computers and
users.
c. More economic and fuller use of computers.
d. Allow for the provision of local facilities without loss of central control.
e. Mutual support and a spirit of cooperation exist.
Disadvantages of networking.
a. There could be congestion at the shared resources.
b. Control of information and confidentiality may be lost.
c. The costs of the system may be considerable.
d. Viruses and other forms of corruption to programmes spread faster
WAN hardware
Hosts - This provides users with processing software and access. The host is usually a
mainframe computer with microcomputers connected to it.
Modems - This is short for Modulate Demodulate. Telephone lines that are common link
media between computers use the analogue signal whereas computers use digital
signals. So there is need to convert the signals. From the sending computer, the digital
signal should be modulated to analogue signal for transmission over the telephone link.
At the receiving end the analogue signal has to be demodulated (converted back) into
the digital signal.
Terminals - These are the microcomputers connected to the system on which the users
can work to sent data or access information. Terminals may be dump or intelligent.
Dump terminals have limited memory and intelligence while intelligent terminals have
processing and memory capabilities that they can process data themselves.
Multiplexor -it is a device that can subdivide one big channel so that many people can
use it at the same time. There are two types of multiplexors: time division and
frequency division.
Time Division Multiplexors (TDM) - It slices multiple incoming signals into small
time intervals that are then transmitted over a channel and then split by another
TDM at the receiving end.
HOST
Multiplexor Multiplexor
WAN Software
In order for the WAN hardware to operate there should appropriate software which
should include telecommunications access programmes that handle messages between
the host's memory and the remote devices, this programme could be in the FEP. There
is also the network control programme that has the work of running the network off the
host by checking if terminals have messages to send, do editing of incoming messages.
WAN Topology
Modem Modem
Network Workstations - these are usually microcomputers from where a user can work
to enter or receive data from the network. These could be dump terminals or diskless
workstations.
File Servers - These are computer systems attached to a network that control access to
and other wise manage hard disks to allow the workstations to share disk space,
programmes and data and to control the network.
Print Servers - these are computers that have the duty of managing the printer
resources, that is allocating print time, and carrying out other print routines.
Cabling - these connect the different computer systems and devices in the network.
Sometimes LANs use radio waves and thus are wireless.
Network interface Cards- these provide the necessary translation of signals between
the devices in the network. They are sometimes called adapters.
The Network operating System - These are programmes that manage the operations of
the network allowing the user to install the network, the application software, analyse
and solve network problems, manage the sending, routing and delivery of messages and
do other routine and housekeeping duties for the network.
LAN Topologies
Topologies are ways in which a network can be structured or arranged depending on the
resources, the needs and the structure of the given organisation.
1. Star Topology – All computers are connected to the hub or central computer.
The hub uses a method called polling when computers are communicating.
Polling is whereby the central computer asks each network computer if it has a
message to send. Communication is in both directions but passes through the
hub
Advantages
a. It is easy to trouble shoot
b. It is economic and offers intensive use of the terminals
c. Requires a single intelligent computer, terminals could be dump there by
saving on the cost of the network.
d. Each terminal has direct and quicker access to the host
e. If one cable fails, this doesn’t disrupt the whole network
f. There is network security and control is easy to implement through the
central computer.
Disadvantages
a. It is prone to failure - failure of the node mean loss and breakdown to the
whole system.
b. The cabling may be costly ie it uses too many cables so its expensive to set up
c. Viruses can be transmitted easily within the network
Terminal
Host
All the computer are connected to a linear transmission medium called a bus and there
are terminators at each end of the bus. When a computer wants to send a message, it
first checks to see if the bus is not busy then sends. If the bus is busy, it waits for a
random time and then rechecks. This method is called Carrier Sense Multiple Access
with Collision Detection(CSMA/CD). Terminators are required in order to catch stray
signals and prevent them from interfering with other signals on the bus
Advantages
a. Costs of setting up and maintaining the network are low.
b. Each terminal can communicate directly with any other on the network.
Disadvantages
a. Risk of network malfunction ie it can be slow if there is a large number of users
b. Trouble shooting is more difficult.
c. There is the risk of data collision.
3. Ring Topology
It is made up of a series of nodes connected to each other to form a closed loop. Each
loop can accept data transmitted to it from an immediate neighbour and forward data
not addressed to it to the next neighbour. Messages are transmitted in packets or
frames. Each node has an address and packet is delivered to the node bearing the
address required. Communication in a ring occurs by a method called token passing. A
ring network would have one token which has the ability to transmit data. Each
computer is given the chance to grab the token and receive or send a message. When a
token has a message, each computer checks to see if the token is addressed to it so that
it can grab it, otherwise it passes it on along the ring
Disadvantages
a. There is poor response time
b. There is risk of data interception so there should be data encryption.
c. Unwanted data may continue to circulate the network, thus reducing traffic
carrying capacity of the network.
d. It is difficult to implement central network security since there is no controlling
computer
e. If the cable develops a problem, the whole network is disrupted and is difficult to
troubleshoot
4. Mesh Topology
This topology combines the ring and the star topologies. Bi-directional links are
established.
This offers better communication and reduces the risk of data collision because of the
existence of alternative routes. The network has quick response time and is very
accurate. However, the costs of the cabling are quite considerable.
The nodes are connected to form a hierarchy. Messages are passed along the branches
until they reach their destinations. These networks do not need a centralised computer
that controls communications. These are also very easy to troubleshoot and repair
because the branches can be separated and serviced separately.
6. Mixed Topologies
Bridge – is used to connect two LANS of the same type. This is known as local inter-
networking. Packets crossing such a link are forwarded by the bridge device. They can
also divide large networks into smaller segments
Peer-to-Peer network
Every workstation on a PP network has a similar status in the hierarchy, each having its
own local storage devices for programs and data. One node on the network may act as a
file server another as a printer server but both of these nodes are also network nodes
which are capable of being used as client work stations
Advantages
-each station on a PP network has a similar status in the hierarchy, each having its own
local storage devices.
-cheaper than client server, no need for file server software
Disadvantages
-no central file storage
-users must backup their own data
-it is less secure than client server
Client-Server Network
Whereby client workstations make use of resources available on one or more servers
Advantages
-increased security over PP. Each user must log in to server
-different users can be given different levels of access to data
-resources are controlled through the server
-workgroup computing-many users can work on the same document simultaneously
-backup is done centrally
Disadvantages
-if file server is down, then users can not access data
-is more expensive than peer since it is necessary to buy a server software
Switch –divides a network into separate segments, one segment for each connected
machine
Router –is a device which links two or more networks. The function of the router is to
look at the destination addresses of the packets of data passing through it and decide
which route each packet should take
THE INTERNET
It either uses the TCP/IP protocol or interacts with TCP/IP networks via
gateways(interpreters). The Internet covers the globe and includes large, international
networks as well as many smaller, local area networks.
It offers access to data, graphics, sound, software, people and a variety of services and
tools for communication and data exchange. It is the fastest and cheapest means to get
and compile information.
There are many organizations that offer internet services. These are called Internet
Service Providers (ISPs) and they usually charge a fee for the connection.
Internet access
You can connect to the internet in one of the 2 basic ways ie dialing into an Internet
Service Provider(ISP) or with a direct connection to an ISP. The difference is mainly in
the speed and cost
Dial-up Connection
It uses the modem to convert computer bits and bytes into modulated (tonal) signals
that the phone lines can transmit. These signals are received by a modem at your ISP
and demodulated into bits and bytes for their computer. Modem is short for modulator-
demodulator. To establish a conventional dial-up connection to the Internet , you will
need the following
Direct connection
Is when you have a fixed cable or a dedicated phone line to the ISP. It will also include all
the other requirements except that it does not use a modem
Wireless connection differs from the two in that it does not use a phone line.
For large organizations, its ideal that they network their computers. One would need a
server-based network to effect network security and to use one connection as a
gateway to the Internet.
Internet Protocols
The most commonly used protocols are:
4.Telnet- enables one computer to connect to another a process known as remote login.
A user’s computer which initiates the connection is referred to as the local computer
and the machine being connected to, which accepts the connection is referred to as the
remote. The remote computer can be physically located in the next room, next town or
in another country
www.gzu.ac.zw
www . gzu . ac . zw
geographical location
type of organisation
name of site/organisation
(a) Snooping on one’s e-mail – someone else may look into another person’s e-mails
especially those sent and received at work. At some workplaces workers are
even warned that their e-mails may be opened by the employer.
(b) Spam – this is the equivalent of junk mail. It comprises of unwanted or
unsolicited messages usually of an advertising nature. In 2010, 262 billion spam
messages were sent daily, using up enough electricity enough to power 4 million
homes for a year (Williams & Sawyer, 2011). This shows that spam is a real
problem and every e-mail user should be aware of it. To reduce spam some
users create separate e-mail accounts for different purposes, e-mail accounts for
shopping are more susceptible to spamming than e-mail accounts used for other
purposes.
(c) Spoofing, Phishing and Pharming and sniffing
Spoofing is the forgery of an e-mail sender name so that the message appears to
have originated from someone or somewhere other than the actual source.
Spoofing is a way of inducing recipients into opening and perhaps responding to
the solicitations of spammers. Sometimes this is referred to as hoaxing in which
the spammer makes a lie in order to elicit certain confidential information.
Messages such as “You have won …” are quite common. In most cases huge
amounts are involved and the unsuspecting victim may be lured by some
seemingly genuine pieces of information like phone numbers. The provided
numbers can be answered and the spammers may confirm the win and advise
that the person deposit a processing fee into a bank account before payment can
be processed. In other cases the victim may be requested to provide private
information such as bank details. One of the biggest ways to identify hoax e-
mails is in wrong spellings and vague subject lines. One should also ask himself
“what have I done to win so much money?”
Phishing (pronounced fishing) is the sending of a forged e-mail that directs
recipients to a replica of an existing web page, both of which pretend to belong
to a legitimate company. The purpose of phishing is to entice people to share
their personal, financial or password data information.
Pharming involves the implanting of malicious software on a victim’s computer
that redirect the user to an impostor web page even when the correct address
has been entered. One way of staying safe is to make sure that one goes to
special websites that begin with https rather than the standard http sites that do
not have encryption to protect data on transfer.
(d) Cookies – these are little text files such as those with one’s log-in name,
password and preferences left on the computer hard disk by some web sites
visited. The web sites retrieve the data each time they are visited, a web site that
welcomes a user by name uses cookies. Cookies are not necessarily dangerous,
they are not programmes and they cannot transmit computer viruses. However,
Extranet
Newsgroups
World wide web (WWW)
DATA PROCESSING
Disadvantages
a. The whole system is disturbed when the computer is down.
b. Users of the system have little control over the data even their own.
c. Loss of data by the processing computer may mean loss of data at other points.
d. Needs specialists to set up and maintain the system and its environment.
e. Processing of data may be slow due to congestion at the central computer.
2. Distributed processing
Data is processed at different points in the organisation. Branch or department may
have a microcomputer or minicomputer that processes the information. The
minicomputer in the branch then sends to a host computer after processing.
HOST COMPUTER
1 2 3 4 5 6
Advantages
a. Data lost at any point may be recovered from the host
b. Faster processing of data
c. Processing may occur even if the host computer is down
d. User have some control over their data
e. Problem can be solved at the different points
Disadvantages
a. The system needs expensive equipment and has high maintenance costs.
b. Management and control difficult
c. There is dada duplication at the different points
d. No uniformity of data
e. There is no overall control time
3. Batch processing
A central computer system normally processes all transactions against a central data
base and produces reports at intervals. In batch processing transactions are
accumulated over a period of time and processed periodically. A batch system handles
the inputing, processing, job queuing and transmission of the data from the remote sites
with little or no user intervention. Batch processing involves.
a. Data gathering from source documents at the remote site through the remote
job entry (RJE)
b. recording the transaction data onto some medium e.g. magnetic tape or disk.
c. Sorting the transactions into transaction files
d. Processing of the data
e. Updating the master file.
Advantages
a. It is economical when large amounts of data are being processed
b. Suitable where reports and information is needed periodically.
c. Reduced risk of error due to the time involved in validation and verification.
Disadvantages
a. Master files are often out of date
b. Immediate updated responses cannot be made.
c. Unsuitable where decisions and follow up transactions depend on the results of
earlier transactions e.g. in bank withdrawals and deposits.
d. Once the system fails all output is delayed.
4. On-line Processing
It is the input of transactions while the input device is connected directly to the main
CPU of the system. There is no necessity of a batch.
Advantages
a. Items can be input much easier and quicker.
b. Many errors are dealt with by the operator at entry
c. Time is saved because a batch does not have to be produced first.
d. User can recognise anomalies in the data being entered
Data is fed directly into the computer system from on-line terminals without the storing,
sorting (these are done on-line)
Advantages
Processing is instantaneous
Files and databases are always up to date
Disadvantages
The systems are expensive to and complex to develop and put up.
Data with errors may be processed with damaging effect.
Hardware costs are high, there is need for on-line terminals, more CPU power,
large on-line storage and back up facilities.
Advantages
a. Each user is given a chance
b. More than one person can use the computer at the same time.
Disadvantages
The user may not require a service at the time his slice is given - this results in too much
excess capacity at some periods.
Data Acquisition
(From source Documents)
Storage Processing
Stage 1
Data acquisition - this is the collection of data from source documents for input into the
computer system.
Stage 2
Input/Capture - This is the putting of the acquired data into the system e.g. through
typing, scanning, or other forms of input.
Validation - the quality of the data is checked before it is entered or processed and
errors detected and eliminated.
Verification - data is checked for mistakes in copying so that it is correct.
There may be gabbage in and gabbage out (GIGO) meaning that information systems
will produce erroneous output if provided with erroneous input data or instructions. To
avoid GIGO common validation is done:
a. Checking data reasonableness, e.g. pregnancy for a three year old would be
unreasonable.
b. Checking data consistency - e.g. it would be inconsistent to record a pregnant
male.
c. Checking range units e.g. it would be impossible to have 30hours worked by one
worker in a day.
d. Timeliness - that data is not out of date.
Stage 3
Processing - this is the key part of the cycle where data is converted into information.
This is where calculations and other logical and manipulative operations on the data are
done. Specific applications are used to process the data e.g. word processing,
spreadsheet, payroll packages etc
Stage 4
Stage 5
Output - The processed information is eventually displayed for use by the user through
the various output systems - printers, VDUs, sound cards & speakers.
The data processing department interacts with all other departments from where it gets
data and for whom it processes and eventually provides the information to.
The main functions of a DP department are:
a. Design and install a custom built system of data capture and processing.
b. Provision of advice to the organisation on matters regarding the processing of
information e.g. the selection of the correct devices for input, process, storage
and output.
c. Provides advice on the installation of a package or information system
d. Manage the organisation's data processing resources.
A typical DP/IT department
CO CO CO CO CO CO
2. System Analyst
The title and function of this person may vary from organisation to organisation or as an
organisation develops from stage to the other. As the computer is applied to the
different organisational problems, the duties of the analyst may change.
A business analyst would require less skill than the system designer or the technical
analyst. These personnel deal with more or less the same task but with differing depth.
Main Duties
a. Examine the feasibility of potential computer applications and to consider all the
various approaches to computerisation that are available.
b. To perform the proper analysis of user systems and requirements.
c. Develop a cost benefit analysis in conjunction with the users.
d. Design system, which take into account not only the computer procedures but
the clerical and other procedures around the computer system.
e. To specify the check and controls to be incorporated into the system in
conjunction with the audit staff.
f. To specify the most appropriate processing techniques to be used e.g. micro,
mini or mainframe, batch or real time processing.
3. Programmer
After design the programmer comes in. He uses the program specifications
produced by the analyst/system designer to develop the programme. The
programme specifications may consist of file and records layouts, field description,
report and screen layouts.
A flow chart or diagram indicating the main logical steps in the proposed program
may be made.
The programmer converts specifications from the system analyst into a working
programme.
Duties
a. To reach an understanding of what each programme is expected to do and to
clarify any problems with the analyst or systems designer.
b. To design the structure of the programme in accordance with installations
standards.
c. To provide a working of an efficient programme using the installations standards
within the budgeted time and funds.
d. To test programmes thoroughly both as a unit and in relation to other
programmes.
e. To provide the required programme documentation.
Once the programme is in place, the maintenance programmer would take the
responsibility of correcting any subsequent problems and recommend any
improvements.
4. Systems Programmer
He specializes in non-application programmes e.g. operating systems, data
communications
Duties
a. Liaising with computer supplier to keep abreast with operating system changes.
b. Support systems analyst and programmer regards queries on the system
software performance and features.
c. Assisting the programmer to interpret and resolve problems which appear to be
caused by the system software rather than application software.
5. Application programmer
6. Computer Operator
S/he operates the mainframe or mini computer. He is responsible for the efficient
running of the computer equipment, which if not ensured efficient running time of the
computer may be lost.
Duties
a. Collecting files and programs required for a computer run from the library.
b. Loading magnetic tapes and disks into drives.
c. Putting stationery into the printer.
d. Carrying out routine maintenance such as cleaning the tapes and read write
heads.
e. Ensure the equipment is running efficiently and reporting any faults to the
technicians.
f. Replacement of computer accessories e.g. toner catridges, ribbons, ink.
g. Switching the computer on/off.
h. Handles and operates the computer hardware.
i. Handles computer input and output.
j. Responds to messages on the operator's console prompted by the operating
system that monitors the user's requests and the status of the peripherals.
k. Watching the process of individual jobs and of the computer in general.
l. Keeping a log of what happens to supplement the log that the computer
produces.
8. Database Administrator
This is a person responsible for planning, designing and maintaining the
organisation's database. This person relates to the management, system analysts,
programmers and other stakeholders in the organisation. He needs to have
adequate managerial and technical abilities to suit the job. He therefore must have a
sound knowledge of the structure of the database and the DBMS.
Duties
a. Ensure that the database meets the needs of the organisation.
b. Ensure facilities for the recovery of data
c. Ensure the functioning of report generation systems form the DBMS
d. The DBA is also responsible for the documentation of the DBMS through the
designing and availing of the data dictionary and manuals for the users giving
such direction as the general use of the database, access to information, deletion
of records from the system and the general validation and verification of data.
Duties of the personnel overlap and depending on the size of the organisation or the IT
department some duties are done by one person.
File Concepts
The purpose of a computer file is to hold data required for providing information. A
computer file is a collection of related records. Records consist of fields and the fields
are made up of characters. A character is the smallest element of a file. A character may
be a letter of the alphabet, a digit or of a special form (symbols).
Logical files show what data items are contained and what processing may be done
while physical files are viewed in terms of how data is stored on storage media.
Types of Files
1. Master Files – They hold permanent data for use in applications such as stock
control, credit control. Usually much of the data items in these files do not
change frequently or with each transaction e.g name, address or date of birth.
2. Transaction files – These are also called movement files. They hold temporary
records of values. They are used to update the master file and are overwritten
after the updating of the master file.
File Structures
This is the way a records are stored on the storage device or medium. This is how the
files are arranged. The arrangement also affects the way these files will be accessed.
1. Sequential Files – the files are stored and accessed in sequence i.e. one after
another. Access the file is dependent on the position of the file on the storage
medium. Accessing the files is by moving usually through spooling to the relevant
file. This is the structure of filing on magnetic tapes. It is most suitable where all
the records on the file are being considered e.g. in the preparation of a payroll
but would be inefficient where the selection of one record is necessary e.g.
access to one employee on the payroll.
2. The Direct File Structure – The files are randomly stored. Access and storage of
the records not depend on the physical position of the record on the file. This is
the form of file structure on magnetic disks, floppy disks, or on optical disks.
Each record is given a specific disk address by which it is recognized and
accessed. This is the structure used to store and access records and files on the
Automatic Teller Machine (ATMs) systems. Access to records is much faster.
However, there could be conflict resolution where several records generate the
same address – this problem has been dealt with the use of conflict resolution
mechanisms on the computer and filing systems.
3. Indexed Sequential File Structure – This combines the features of sequential and
direct file structures. Records are stored sequentially on a direct access medium
like the hard disk and each record occupies an addressable location identifiable
by the unique disk address. An index is developed to keep track of the records
and their physical locations on the storage medium. The records can be stored
and accessed sequentially starting from the beginning moving through the
records one at a time or can be stored and accessed directly e.g. the way the cell
phone’s phone book is structured.
On all the types and structures discussed above a user may add or remove a file or
record, modify contents of the file or record, view the contents of the data and
create reports as may be necessary. These operations on the data can be done on-
line i.e. files and records updated as the transactions are being entered from a
device connected onto the main CPU of the system.
DATABASE CONCEPTS
Data Independence - data can be defined and described separately from the
application programme. Where there is no data independence a change in any
record would then necessitate the changing of the programme to access the file.
Data Redundancy - The same data element appears in a number of files but serving
the same purpose and usually thus staying unused.
Data Inconsistency - this is when redundant data is not updated accurately so much
that there are differences in the data elements on the different files.
Disadvantages of Databases
a. Concurrence problems - where more than one user access and attempt to
update the same record at the same time - there is file edit locking to prevent
this.
b. Ownership problems - sometimes some individuals tend to own the data and
thus refuse access by other individuals or departments in the organisation.
c. Resources problem - with database extra resources are needed e.g. more
workstations and other devices.
d. Security problems - there is increased exposure to unauthorized entry into the
data this could be reduced by the use of regularly changed passwords and by
physically denying access to unauthorized users.
Application
Programme DB
DBMS
Application
Programme
Components of a DBMS
Data Dictionary - this is a database management tool that has names and
descriptions of all data elements within a database.
Data repositories - these are an extension of the data dictionary which provide a
directory of component parts of the dB and other information resources in the
organisation.
Data languages - a definition language is needed to place the data in the data
dictionary through the use of commands such as sort, get, find etc.
Archiving and Recovery Systems - these systems are used to store backups of the
original record so that if the original database is damaged the information can still
be recovered.
Report Writers - these allow the user to obtain reports from the data quicker and
easier.
Records in the database may be set in different ways depending on the relationships
between the records themselves.
1. One to One relationship - this is where one record is related to one other record
e.g. single parent record to one child record
Record
Recor
d
1 Represents 1
This could be where one sales representative deals with one customer for example.
Record
Record
In E-R diagram
4. Many to many - with two or more parents relating to two or more children
In E-R diagram:
A replicated dB is one that has been copied and is kept at different geographical
locations. This allows for easier recovery if one fails and reduces data transmission costs,
as there would be little long distance transmission thus is also faster. This, however, it is
expensive in terms of computer resources.
A partitioned dB is one that is split into segments and each segment distributed to the
relevant location. This reduces transmission costs and provides a faster turnaround time
in input, processing and output. There is reduced data inconsistency and redundancy.
However, there is need for more computer resources that are costly.
An Online dB - this is a dB that is allows for the immediate updating of files from remote
terminals since input will be directly intyo the system e.g. stock market information.
DATA SECURITY
Data is a valuable resource like any other asset of an organization. Data like money can
be stolen and exchanged for some value. Organisations have some pieces of data that
are confidential and these need to be secure. Every organization needs to take security
of hardware, software and data seriously because the consequences of breaches of
security can be extremely damaging to a business. This may lead to loss of production,
cashflow problems, loss of customers and reputation.
Threats to security come from outside (external) and inside (internal) the organisation
Securing data entails making sure that the computers are in the right environment,
there are right software measures to reduce loss or theft of data.
Security of Equipment
There is need to look after the computer hardware well to avoid loss of data or the
computers themselves.
Security of Data
Accidental Loss
To reduce the risk of loss to accidental loss there is the use of back up of data – there
should be a saved copy of the original file that is kept on a different medium and place.
Deliberate Damage
Viruses
A computer virus is a harmful program that copies itself onto other programmes and
destroys them or interferes with their proper functioning.
Viruses are transmitted from computer to computer. They copy themselves quickly.
Effects of viruses may be mild to severe. Some viruses are harmless and computers may
operate normally.
Characteristics of viruses
Computer and computer equipment have negative health effects on the users. Research
is still being carried out to determine the extent of the effects on the health of users.
This refers to disorders that affect the hands, wrists, arms, shoulders or neck of
computer operators. It is inflammation of the joints and is caused by making the
same small movements over and over again. This can cause pain, numbness,
swelling and the inability to lift or grip objects. In some cases, operators have
become permanently disabled.
To reduce RSI
- make sure the desk and chair are at suitable heights
- sit at a comfortable distance fro the keyboard
- make sure that lower arms are horizontal and wrists straight when using
a keyboard or mouse.
- Use a wrist rest if necessary so that you do not rest you wrists on the
edge of the table or keyboard.
Using the VDU for long periods at a time may affect a user’s eyes and in some
instances cause headaches.
(c) Posture
1. The Internet
Definition
Facilities
Bulletin Boards – Magazines, newspapers * Web Television
Music * Software downloading
(shareware)
Discussion Groups * Shopping Malls
Libraries * Research
Tuition and Virtual Learning (e-learning) * Job Opportunities
E-commerce * E-mail
Weather reports * Date line
2. Telecommuting
This involves working from home while connected to the office through computer
networks. This means the workers do not need to travel to workplaces. This has the
advantage of saving time to the worker in terms of travel especially in highly congested
cities. It also saves costs of fuel to the worker. However, traditional supervision methods
do not apply.
3. Teleconferencing
This is also know as confra-vision. It is a facility through which people in distant places
can hold a conference like discussion while seeing each other on computer screens. The
biggest advantage of this form of technology is in the saving of conference costs like
venue hire, travel and subsistence. There is also the benefit of body language that the
people using this technology have.
5. Connectivity
9. Globalization
Role of IT in Globalisation