Form 4 Notes
Form 4 Notes
studies
Form four
work
1
Table of contents
1. Introduction to networking and data communication
2. Application areas of information and communication technology
(ICT)
3. Impact of information and communication technology (ICT) on so-
ciety
4. Career opportunities in information and communication technol-
ogy (ICT)
2
Chapter 1
Introduction to networking and
data communication
3
Computer network
It’s a collection of computers linked together using
transmission media for the purpose of communication
and resource sharing.
Data communication
Refers to the process of transmitting data signals from
one point to another through the network
4
Terms used in data communication 1
Bandwidth – it’s the maximum amount of data that a trans-
mission medium can carry at any one time.
Base band signal – it’s a digital generated and applied to the
transmission medium directly without modulation.
Broadband transmission – refers to sending analog signal
over transmission medium using a particular frequency.
5
Terms used in data communication 2
Multiplexing – it’s a
process of sending
multiple data signal
over the same me-
dium while demulti-
plexing is the process
of separating the mul-
tiplexed signals at the
receiving end.
6
Modes of data communication
Simplex transmission – refers to communication
in only one direction e.g. radio transmission.
Half duplex – refers to communication in both
directions but one direction at a time e.g. police
walkie talkie.
Full duplex – in this transmission communication
occurs in both directions simultaneously e.g.
computers connected in network.
7
Types of computer network
Local Area Network (LAN) – this is formed whenever com-
puters are connected together in a small geographical area
e.g. floors, building, school etc within a radius of 10m up to
3km.
Wide Area Network (WAN) – this covers unlimited geo-
graphical area e.g. across states, entire country or entire
world. They are expensive to build and have low data rates
and higher speed (over 100Mbps or higher).
Metropolitan Area Network (MAN) – this network covers a
metropolitan are like a town or city within a radius of
between 5 and 50km. They are data rates of 100Mbps and
above and are more expensive than LANS.
Computer Networking – refers to a collection of independent
entities that are arranged in such a manner as to exchange
data, information or resources. 8
Purpose of networking 1
Resource sharing –
different computers
are connected to
each other hence a
user at one site may
be able to use the re-
source available at
another site e.g.
printers, programs
etc.
9
Purpose of networking 2
Remote communication – this involves transmission of
data signals between two communication devices loc-
ated at different geographical location. Through remote
communication, people can be able to share ideas and
pass messages over the network.
Cost effectiveness – reduction of resources in network-
ing lead to reduction in costs. Example instead of pur-
chasing many computers resources, one buys one which
can be shared hence reducing the costs.
Distributed processing – if a particular process can be
sub-divided into several sub-process then each sub-pro-
cess can be processed at different sites co-currently
hence speeding up the entire process.
Reliability – if one site fails in a computer network, the
remaining site can potentially continue operating. 10
Limitation of networking
Cost – it’s expensive to acquire networking equipments, train net-
work administrators and users and maintenance of network. The
cost are high.
Data security – data and information held on a network is prone to
more illegal access, danger of data theft and also tapping by unau-
thorised people during transmission.
Network failure – there is a danger of failure which may paralyze the
operational of an organisation besides damaging files and pro-
grams.
Moral and cultural effects – large networks like Internet have chat
rooms and messaging services that may enable underage children
to meet peers and adults on the net some of whom have bad inten-
tions. Access to pornographic and other negative materials is also a
problem.
Over-reliance on networks – most organisations have done away
with manual operations. This means that all business process and
society depend on computer networks. The disadvantage of over-re-
liance is that if the network fails then many systems will stop operat-
11
ing.
Elements of networking
Data communication media – a data communication is a
channel through which data is transmitted between com-
puters and other devices. Data communication media
are categorised into two:
Communication with cables (bounded media)
Two wire open lines cables
Twisted pair cable
Coaxial cable
Fibre optic cables
13
Twisted pair cable
This consists of two insulated copper wires
twisted in a spiral pattern to minimize elec-
tromagnetic interference. It’s the cheapest
media used for both analogue and digital
signals. Mainly used in telephone system.
There are two types of twisted pair
Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP)
14
Unshielded Twisted Pair (UTP)
They do not have a
shield the prevents
electromagnetic inter-
ference hence they
are susceptible to
noise and signal inter-
ference.
15
Shielded Twisted Pair (STP)
They have a braid
wrapped around the
wires to shield or pro-
tect them from noise.
16
Category of twist pair cables
Twisted pair cables
are categorised into
five groups according
to the type of data
transmitted and max-
imum rate of trans-
mission, as shown in
table right.
17
Advantages and disadvantages of twisted pair cable
Advantages
Easy to install
Very cheap
Disadvantages
Has low data transmission rates.
It’s sensitive to electromagnetic interference.
Suffers high attenuation.
18
Coaxial cable
This cable has a central copper core which may
be solid or stranded wires surrounded by an in-
sulator. The insulator is then surrounded by a
hollow mesh conductor covered by a shield to
prevent electromagnetic interference. The dia-
meter of the centre core or conductor determ-
ines the attenuation rate. There are two types of
coaxial cables:
Thin coaxial cable (thinnet) which has one dialectric
insulator.
Thick coaxial cable (thicket) has two dialectric insula-
tor around the core and is thicker than thinnet.
19
Samples of coaxial cables
20
Advantages and disadvantages of coaxial cables
Advantages
They are immune to external electrical interfer-
ence because of insulation.
High data transmission rate.
Has capability of carrying more signals.
They are very stable even under high loads.
Disadvantages
Lack of security due to illegal taps.
They are relatively expensive to buy.
It’s bulky therefore difficult to work with i.e. in-
stall. 21
Fibre optic cables
These are made of glass fibres and
transmit information in light form. The
cable is made up of:
The core – the central part of the cable which
is made of transparent plastic or glass.
Cladding – it’s a single protective layer sur-
rounding the core, and has some light bend-
ing characteristic inside it.
Buffer – it surrounds the cladding and its func-
tion it to strengthen the cable.
Jacket – outer covering of the cable. 22
Types of fibre optic cables 1
Single mode fibre – it
has a very narrow
centre core. The light
in the cable therefore
take only one path
through it making it to
have a low attenu-
ation rate.
23
Types of fibre optic cables 2
Multimode fibre – it has a
thicker core and allows
several light rays to be
fed in the cable have a
high attenuation rate and
they are mainly used for
shorter distance trans-
mission. The light is bent
back into the core hence
propagates along the
length of the cable as
shown in figure right be-
low. 24
Fibre based network transmits data
25
Advantages and disadvantages of fibre optical cable
Advantages
Has high bandwidth hence high carrying capacity.
It’s immune to electromagnetic interference.
Covers large distances because of low attenuation.
Very secured because they are un-tappable.
Disadvantages
Very expensive
Installation is difficult.
It’s complex to configure
Broken cable is difficult and expensive to repair
26
Wireless communication (unbounded media)
Microwave
Satellite
Radio transmission
Infrared transmission
27
The electromagnetic spectrum
Figure right is a dia-
grammatic represent-
ation of an electro-
magnetic spectrum.
All these waves travel
at the speed of light.
For our concern here,
we will only deal with
microwaves radi-
owaves and infrared
waves.
28
Microwave
In microwave trans-
mission signals travel
in a straight line and
therefore the transmit-
ter and receiver must
be in a direct line of
sight of each other.
29
Advantages and disadvantages of microwave
Advantages
They operate at a high speed.
It’s less prone to transmission errors unlike twis-
ted wire pair.
Are capable of operating in digital or analog
data.
Disadvantages
Signal is affected by atmospheric conductor like
lightning.
Additional number of repeaters are added after
every few kilometres. 30
Satellite
In this transmission microwave radio signal is transmitted
from antennae from the ground to a satellite on the orbit
around the earth. The microwave radio signal is beamed
to the satellite on a specific frequency called uplink fre-
quency where it is received, amplified and then rebroad-
casted on a different frequency called downlink. The
satellite transmit the signal to many earth stations to
form a point to multipoint transmissions. Very Small
Aperture (VSAT) is a new technology used in microwave
transmission. It’s a very small satellite dish used both in
data, radio and TV communication. This technology en-
ables direct access to satellite communication instead of
having to go through the state owned or licensed satellite
gateways. 31
Satellite transmission system
32
Advantages and disadvantages of satellite
Advantages
The cost is not dependant on distance.
Has the second highest bandwidth after optical
cable.
Earth station can be installed on a customer
property than layering extensive cables.
Disadvantages
Any station can receive the signals.
It’s expensive to install ground stations.
Heavy rains or bad weather will increase loss of
signals 33
VSAT technology
The new trends in microwave
transmission have seen the
use of very small aperture ter-
minal (VSAT) technology. This
refers to a very small satellite
dish used both in data, radio
and TV communication. Many
businesses are adopting this
new technology because it en-
ables direct access to satellite
communication instead of hav-
ing to go through the state
owned satellite gateway. Fig-
ure right shows VSAT technol-
ogy as set up to enable two
laptops in geographically dis-
parate locations to communi-
cate.
34
Radio communication
Radio waves travel just like
surface water waves, i.e. they
are omnidirectional. This
means that they start from a
central point and spread out-
wards in all directions. As they
travel outwards, their energy
spreads outwards over the
covered area. The waves are
radiated into the atmosphere
by a radio frequency antenna
at constant velocity. Radio
waves are not visible to the
human eye. Figure right shows
a typical radio waves link be-
tween two separate geograph-
ical locations.
35
Radio transmission
Data can be transmitted over ra-
dio waves communication. The
radio waves can be High Fre-
quency (HF), Very High Fre-
quency (VHF) or Ultra-High Fre-
quency (UHF). The high fre-
quency radio waves signal is
transmitted by directing it to
ionosphere of the earth. The
ionosphere will reflect it back to
the earth’s surface and the re-
ceiver will pick the signal. Very
high frequency radio waves are
transmitted along the earth’s sur-
face. Ultra high frequency radio
waves use the line of sight prin-
ciple thus there should be no
barrier between the sending and
receiving devices. 36
Blue tooth technology
This is a new transmis-
sion technology that en-
able people to use hand
held communication
devices like mobile
phones and personal di-
gital assistant to access
the Internet. It enhance
communication of per-
sonal communication
devices through wireless
technology.
37
Infrared transmission
Communication through this medium is
achieved by having infrared transmitters
and receivers. The transmitter and re-
ceiver of infrared signals must be within a
line of sight in the same room.
38
Advantages and disadvantages
of wireless communication
Advantages
They can cover larger geographical area easily.
They are flexible in operation unlike the bounded
media.
Disadvantages
Initial cost is very high.
Relatively difficult to establish or configure.
39
Communication media 1
Modem – It’s a device used
to connect computer to a
telephone line. It changes
the digital signal to analog
form and then analog back
to digital signal.
Hub – it’s a component that
connects computers on a
network and is able to relay
signals from one computer
to another on the same
network.
40
Communication media 2
Repeater – it receives a
signal from one segment
of a network, cleans it to
remove any distortion,
boosts it and then sends
it to another segment.
Routers – its intercon-
nects different networks
and directs the transfer of
data packets from source
to destination.
41
Communication media 3
Bridge – it’s a network
device that selectively de-
termines the appropriate
network segment for
which a message is
meant for delivery
through address filtering.
Gateway – it’s a device
that can be configured to
provide access to wide
area network or Internet.
42
Communication media 4
Network Interface Card –
it’s a circuit board that fits
inside an expansion slot of
a workstation and creates
a physical link between the
computer and the trans-
mission media.
Switches – unlike the hub,
the switch forwards a
packet of data directly to
the address mode without
broadcasting. It transmits
the packet using a point to
point transmission. 43
Wireless communication devices 1
Access points (AP) –
mainly used for wire-
less devices such as
personal digital as-
sistants, laptops and
computers with wire-
less links. These
devices need to have
antennas in order to
detect signals in the
surrounding. 44
Wireless communication devices 2
Personal Computer
Memory Card Interna-
tional Association Cards –
the PCMCIA is an add on
card inserted into a
device such as personal
digital assistants or a
laptop in order to enable
wireless communication
between the devices and
a wired network server.
45
Network software
This refers to programmes that generally
manage a network. They include:
Protocols
46
Network operating system
It’s function involves
Making sharing of resources possible.
Transmitting data around network.
Respond to requests from application pro-
grams running on the networks.
Enables nodes on the network to communic-
ate with each other more efficiently.
Implementing network security features.
Supporting services.
47
Examples of network operating systems
Windows NT/2000/2003
Unix
Linux
Novell Netware
48
Protocols
Network protocols are rules and technical
procedures that govern communication
between different computers. Data trans-
mission process is broken into discrete
systematic steps. At each step, a certain
action takes place and it has its own rules
and procedures.
49
How protocols work
The data transmission process over
the network has to be broken down
into discrete systematic steps. At
each step, a certain action takes
place. Each step has its own rules
and procedures as defined by the
network protocols. The work of these
protocols must be co-ordinate so that
there are no conflicts or incomplete
operations. This co-ordination is
achieved through protocol layering.
Network protocols are designed after
the open system interconnection
(OSI) model. The open systems in-
terconnection model is not a protocol
as such but is meant to help design-
ers to come up with high quality
layered protocol it has seven layers,
each performing distinct functions as
shown in table right 50
Examples of protocols
Transmission Control Protocol / Internet
Protocol (TCP/IP) – TCP is responsible for
delivery of sequenced data over network.
The IP handles the address scheme i.e. it
does packet forwarding and routing.
Advantages
Easy to configure.
It’s easily expanded.
If one workstation fail it does not affect the others.
Allows centralization of key networking resources e.g.
server.
Disadvantages
If the central hub fails, the entire network will be down.
Requires more cables to install hence more expens-
ive.
Installing this type of network topology is time consum-
ing. 55
Example of physical topology 2
Ring topology – in this
topology all the com-
ponents are connec-
ted to a single cable
forming a ring. The
data flows in only one
direction and the sig-
nal is actively re-
transmitted by each
node to its neighbour
if its not addressed to
it. 56
Advantages and disadvantages of ring topology
Advantages
It’s simple to install.
Data transmission is very fast.
Use a short length cable hence cheap.
Disadvantage
If one site fails it affects all the other nodes.
Troubleshooting can be difficult.
Modification may be difficult because adding or
removing a device can disrupt the entire net-
work. 57
Example of physical topology 3
Mesh topology – this
topology uses separ-
ate cables to connect
each device to every
other devices on the
network providing a
straight communica-
tion path.
58
Advantage and disadvantages of mesh topology
Advantages
Easy to troubleshoot.
Disadvantage
Costly to provide the redundant cables.
Difficult to install and maintain.
59
Example of physical topology 4
Tree/Hierarchical topo-
logy – all the nodes are
connected in form of a
tree with nodes as leaves
and links as branches.
The transmission medium
is a branching cable with
no closed loops. The
branches in turn can have
more sub-branches.
Branches are connected
to each other by means
of devices called hubs.
60
Advantage and disadvantages
of tree/hierarchical topology
Advantage
If the workstation below the main worksta-
tion fails, the network does not fail.
Disadvantages
If the top node fails the network fails be-
cause it control all other nodes.
Installation is expensive and complex.
61
Example of physical topology 5
Bus topology – all
devices are connected to
a central cable called the
bus or backbone.
Transmission and recep-
tion of a message is
done by all the nodes.
However, only one node
can carry out a trans-
mission at any one time.
62
Advantages and disadvantages of bus topology
Advantages
It’s easy to install.
It’s less expensive.
If one mode fails, others are not affected.
Disadvantages
The failure of the cable will bring the whole net-
work to a stand still.
Only one node can transmit message at a time.
Difficult to troubleshoot.
63
Review questions 1
1. List four network systems that are not computer-based networks.
2. Define the term computer network.
3. Define the term communication.
4. Differentiate between a baseband and broadband signal.
5. State four advantages of networking.
6. Give two disadvantages of networking.
7. Differentiate between a network server and a workstation.
8. Explain the concept of distributed processing in networking.
9. Why is a network more reliable than stand alone computers?
10. Explain the three most common types of computer networks in use
today.
11. Differentiate between remote client and remote host.
12. Explain the term bandwidth.
13. What is a “resource” in networking?
14. Differentiate between half duplex and full duplex transmission.
64
Answer of review questions 1-1
1. Road networks, telephone networks, nervous system and railway
network
2. A computer network can be defined as a collection of computers
connected together using transmission media for the purpose of
communication and resource sharing.
3. Data communication is the process of transmitting data from one
location to another through a transmission media.
4. Baseband refers to a digital signal that is generated and applied to
the transmission medium directly without modulation while broad-
band transmission refers to a process where analog signal is sent
over the transmission medium using a particular frequency.
5. Advantages of networking
A) Sharing of resources
B) Efficient communication
C) The running cost is low
D) Reliable and error free
65
Answer of review questions 1-2
6. Disadvantages of networking
A) High initial installation cost
B) Security threats
C) Moral and cultural effects
7. A network server is a computer dedicated to servicing
requests from other computers on the Internet while a
workstation is a computer connected to a network on
which users do their work.
8. Distributed processing is a configuration in which ter-
minals with processing power are located in a wide geo-
graphical area.
9. If one of the computers breaks down information can still
be accessed from the server using another computer on
the network.
66
Answer of review questions 1-3
10. Common types of computer networks
A) Local Area Network (LAN)
B) Metropolitan Area Network (MAN)
C) Wide Area Network (WAN)
11. The computer mailing a remote request is called a re-
mote client while the computer that is being accessed
is called a remote host.
12. Bandwidth is the maximum amount of data that a
transmission medium can carry at any one time.
13. A resource is anything that can be shared on a net-
work.
14. Half duplex refers to communication in both directions
but one at a time while full duplex transmission refers to
67
Review questions 2-1
1. Define the term transmission media.
2. Differentiate between a router and a gateway.
3. Why is a switch preferred to a hub on the network?
4. Compare and contrast a brouter and a router.
5. Describe an electromagnetic spectrum?
6. Describe at least five devices used in data commu-
nications.
7. What is the function of a repeater on a network?
8. Give one disadvantage of a hub on a network.
9. Give one application area of infrared transmission.
68
Answer of review questions 2-1-1
1. A transmission medium is a pathway used for carrying
data and information from one station to another.
2. A router is a device used to interconnect different net-
works and direct the transfer of data packets from
source to destination. On the other hand a gateway is
any device that can be configured to provide access to
WAN or Internet. This means that a gateway may not
necessarily be a router.
3. Unlike a hub, a switch directs a packet directly to the
addressed node without broadcasting.
4. A router connects logical networks while a brouter has
both functionalities of a router and a bridge.
69
Answer of review questions 2-1-2
5. Electromagnetic spectrum is a diagrammatic repres-
entation of carious electromagnetic wave frequencies.
It consists of radiowaves, microwaves, infrared radi-
ation, visible light, ultraviolet rays, X-rays, Gamma rays
and cosmic rays.
6. Network Interface Card (NIC’s), modems, hubs,
bridges, repeaters, routers, switches and brouters.
7. A repeater receives a weak signal on the network,
cleans it and amplifies it for transmission over the next
portion of the network. Signals become weak due to at-
tenuation.
8. A hub may cause broadcast problems.
9. Communication in wireless devices. 70
Review questions 2-2
10. Explain the importance of a gateway on a network.
11. State two advantages of satellite communication.
12. Give two advantages of fibre optic media.
13. Define the term pitch as used in twisted pair cabling.
14. Give two advantages of coaxial cables.
15. Differentiate between single mode and multimode
fibre.
16. Describe the VSAT technology.
17. Explain the concept of a geostationary satellite.
18. Explain the importance of the wire braid in coaxial
cable.
19. Explain the line of sight principle in wireless transmis-
sion.
71
Answer of review questions 2-2-1
10. Gateway provide access to the wide area networks and Internet.
11. Advantages of satellite communication:
A) Covers a wide area.
B) As opposed to earth-to-earth microwaves, it overcomes line of sight problem.
12. Advantages of fibre optic media:
A) Allows faster communication.
B) Transmits data over longer distances compared to other cables.
C) It is immune to interference and eavesdropping.
D) Supports high bandwidth.
13. Pitch refers to the twists per foot of each pair of the UTP cable.
14. Advantages of coaxial cables:
A) Supports higher bandwidth compared to twisted pair cables.
B) It’s installation is relatively simple.
C) It can carry voice, data and videos on the network.
D) It is more resistant to radio and electromagnetic interference than twisted pair
cables.
72
Answer of review questions 2-2-2
15. Single mode fibre has a very narrow centre core com-
pared of multimode.
16. VSAT refers to a very small satellite dish used both for
data and radio communication. It enables direct ac-
cess to satellite transmission instead of having to go
through the state owned satellite gateway.
17. Geostationary satellite’s speed in its orbit is relatively
equal to the rotation of the earth hence, an observer
on earth will see as if the satellite is stationary in
space.
18. The braid protects the carrier wire from radio fre-
quency interference and electromagnetic interference.
19. In line of sight principle, a signal is directed through a
focused beam from the transmitter station to receiver
station without obstructions in between them. 73
Review questions 3
1. List two types of network software.
2. Give three examples of protocols used in networking.
3. Outline the seven Open Systems Interconnection (OSI)
reference model layers.
4. Define the term network topology.
5. Distinguish between logical and physical network topo-
logy.
6. Explain the importance logical and physical network to-
pology.
7. List four examples of network operating system.
8. Outline the functions of network operating system.
74
Answer of review questions 3-1
1. Types of network software
A) Network operating systems.
B) Network protocols.
2. Examples of protocols used in networking:
A) Transmission control protocol / Internet protocol (TCP/IP). It is the main
internetworking protocol that has enabled the setting up of the Internet.
B) OSPF – it stands for Open Shortest Path First. This protocol is used by
routers to forward the packages on the network through the path that is
not only shortest but has least load.
C) NetBEUI – a local area network protocol and is limited to Microsoft and
IBM networks.
D) IPX/SPX – is an internetworking protocol like TCP/IP. It also routes
packets. However, duplication of network addresses is the main.
3. OSI model layers – application layer, presentation layer, session layer,
transport layer, network layer, data link layer, physical layer.
4. Network topology refers to the layout of the computers, printers, and other
equipment connected on the network. 75
Answer of review questions 3-2
5. Logical topology also called signal topology deals with the way that
data passes from one device to the next on the network. Physical
topology on the other hand refers to the physical layout or arrange-
ment on the network.
6. Does the actual sending of data on the transmission medium in bin-
ary form.
7. Microsoft Windows NT/2000/2003, UNIX, Novell Netware, Linux.
8. Functions of network operating systems:
A) Provides access to network resources e.g. printers and folders.
B) Enables nodes on the network to communicate with each other.
C) Supports inter-process communication i.e. enables the various
processes on the network to communicate with one another.
D) Responds to requests from application programs running on the
network.
E) Supporting network services like network card drivers and pro-
tocols.
76
Revision questions
1. Determine the type of a network characterised by:
a. Connection between computers, printers and other resources using
UTP cables.
b. Over 180 stand alones in an office building.
c. Over 254 computers connected to share resources in a city.
2. Explain the function of a NIC in networking.
3. The computer that is dedicated to serving requests from other com-
puters in a network is called a ( ) while the computer that
sends requests is called ( ).
4. Distinguish between thinnet and thicknet coaxial cables.
5. Distinguish between radio and microwave transmission.
6. The layer that surrounds the core of a fibre optic cable is called (
).
7. Describe any three types of physical network topologies used in LAN.
8. The device that connects workstations and the server to a central point
is called a ( ).
9. Define the term protocol. 77
Answer of revision questions 1
1. A). Unshielded twisted pair cabling – LAN.
B). Stand alones – None.
C). Over 254 computers in a city – MAN.
2. Network interface card creates a physical link be-
tween the computer and the transmission media.
3. Server, Client.
4. A thicknet is thicker than the thinnet and has two
insulators around the core.
5. Microwave transmission is point-to-point while in
radio transmission the signals are Omni directional
i.e. they originate from a central point and then
spread outward. 78
Answer of revision questions 2
6. Cladding.
7. Types of physical network topologies used in
LAN:
A) Star topology.
B) Bus topology.
C) Ring topology.
D) Mesh topology.
E) Tree topology.
8. Hub.
9. A protocol is a special set of rules that enable
computers on a network to communicate.
79
Chapter 2
Application areas of informa-
tion and communication tech-
nology (ICT)
Uriri Boys high school
Form four work
98
Reservation systems
This are distributed networked systems
that are used mainly to make bookings in
areas such as:
Hotels booking
Airline booking
99
Hotels booking
Booking and reservation of rooms in hotel
are made from remote terminal connected
to a centralized computer database. A cus-
tomer makes enquiries via the remote
terminal connected to the central com-
puter.
100
Airline booking
Major airline have centralized databases.
This means that all flights and passengers
records are stored in a computer system in
one location. Travel agents from all over
the world can access each data via com-
munication lines. In that way, agents book
in client where tickets have not been
bought.
101
Retail system
Point of sale system – an
Electronic Point Of Sale (E-
POS) is a computer terminal
in retail stores to input and
output data at the point
where sales are transacted
e.g. supermarket checkout
counters.
Stock control – a computer-
ized stock control is used to
track what is in stock and
what needs recording.
102
Banking system 1
Processing customer transactions – computers are
used in banks to carry out financial transactions
such as recording, deposits, withdrawals and calcu-
lating interests on loans and savings.
Electronic funds transfer – involves movement of
money using information and communication tech-
nology e.g. when paying goods using credit card,
payment is transferred electronically from the cus-
tomers account to recipient account.
Cheque processing – the use of Magnetic Ink
Character Reader (MICR) details of the cheque are
automatically entered into a computer for cheque
processing. 103
Banking systems 2
Cash dispensers
(ATM) – they allow
customers to do their
banking at any hour
of the day or night
seven days a week.
104
Educational systems 1
Computer Aided Learning (CAL) – this presents educational
materials the way a teacher does in a classroom. In this
program there are clear graphical presentations such as
video clips and voice for demonstration or for explaining
concepts.
E-learning – lessons and lectures are presented from cent-
ral site and presentation is transmitted to remote confer-
ence terminals. Learners can also access learning materials
on the Internet.
Computer based simulation – refers to the science of repre-
senting the behaviour of a real life situation by using com-
puterized models. This programs creates real situation
which replaces very dangerous and expensive experiments
in science. Mainly used in areas where practical skills have
to be learnt like training pilots, engineers etc.
105
Educational systems 2
Computer Aided Instruc-
tions (CAI) – refers to the
use of a computer to
learn, drill and practice
particular educational
principles. The learner is
presented with explana-
tion of the concept. The
computer then presents
questions from which the
learner is to select correct
answer.
106
Industrial systems 1
Modelling – computer modelling is the creation
of electronic representations of objects or ideas.
Computer model shows what something might
look like when the real thing would be too diffi-
cult or too expensive to create and visualize.
122
Internet
This Internet transmits huge amounts of information in
form of words, images and sounds. Some of the ser-
vices available on the Internet are:
World Wide Web (www) – www refers to a collection of web
pages, which may be made up of text, images, animations,
sounds and video held on web servers. One can access in-
formation using a computer or other devices like mobile
phones.
E-mail – once you subscribe for Internet services through a
service provider, you can send or receive e-mails to or from
anyone connected to Internet using a computer or a WAP
enabled cellular phone. 123
Law enforcement systems
Immediate and accurate in-
formation is very crucial in
crime detection, biometrics
analysis using computers is
used in this area which in-
volves the study, measure-
ment and analysis of human
biological characteristics. The
biometric devices attached to
computer are used to identify
people by recognizing one or
more specific attributes such
as finger, lips, facial features
e.g. iris etc.
124
Virtual reality (artificial reality)
This refers to a condition in which a per-
son becomes psychologically immersed in
an artificial environment generated by a
computer system. The following interactive
sensory equipments are used to achieve
virtual reality effect.
Head mounted display (HMD) headgear
Gloves
Virtual reality software
Body suit
125
Head mounted display headgear
A headgear is made up of two
tiny display screens and sound
systems that channel images
and sound from the source to
the eyes and ears thus
presenting a stereo three di-
mensional sound effect in the
virtual world. The wearer of the
headgear is able to look
around in the virtual environ-
ment. A boom is an alternative
to the often-uncomfortable
headgear. Screen, optical and
sound systems are housed n a
box (figure right below). The
user looks into the box through
the two screens to see the vir-
tual world.
126
Gloves and body suit
They are worn on the
hands to allow the user
navigate through the vir-
tual world and interact
with virtual objects. The
gloves have sensors that
collect data about the
movement of the hands
and relay the data into
the system. They give the
wearer a sense of touch
in the virtual world.
127
Virtual reality software and body suit
Virtual reality software –this software gives the
wearer of the sensory devices an interactive vir-
tual sensory experience that makes him/her feel
as if he/she is in a world.
135
Field work report
Visit one in the information and communication
technology (ICT) application areas discussed in
this chapter and write a detailed report of about
five pages on the use of computers in the area.
The report should include the following:
Title page
Table of contents
Introduction
A detailed description of information and communica-
tion technology implementation in the area of field
work study
Conclusion
136
Revision questions
1. Differentiate between an electronic point of sale
and a cash register.
2. Explain how computers are used in accounting
systems.
3. Define the following terms:
4. Differentiate between computer aided design
and computer aided manufacture.
5. Explain why computer have become important
library management tools.
6. List some of the interactive sensory devices
used in virtual reality. 137
Answer of revision questions 1
1. EPOS is connected to a computerised system hence utilizes
computer’s intelligence and processing power. A cash register
simply records cash transactions.
2. A). Generating payroll reports.
B). Generating ledger, balance sheets and accounts payable.
C). Balancing books.
D). Capturing daily transactions.
3. A). Biometric analysis: a computer system that can recognise
features of human body parts like fingerprints, iris colour, fa-
cial features etc.
B). Telex: sending/receiving of text via television.
C). Videotex: sending/receiving of video via television.
D). Telecommuting: working from home via a computer net-
work instead of commuting to work. 138
Answer of review questions 2
4. CAD involves designing models using
computers. CAM involves controlling
manufacturing processes using comput-
ers.
5. A). Keeping book records and stock
management.
B). Tracking overdue books.
6. Headgear, glove and body suit.
139
Chapter 3
Impact of information and
communication technology
(ICT) on society
140
Introduction
An impact is a positive or negative effect.
Information and communication techno-
logy sector, like any other sector has its
positive and negative effects at different
levels in society.
141
Issues resulting from the use of ICT
A number of issues have risen as a result
of use of ICT. These issues include:
Effectson employment
Automated production
Issues of workers health
Environment issues
Cultural effects
142
Effects on employment
The computer based information systems
have altered the job market. Incorporation
of computers has changed the way work
has traditionally been done. Also it has its
effect in employment through job creation,
job replacement and job displacement.
143
Job creation
ICT has introduced new employment op-
portunities that never existed before. The
use of computers in banks, industries,
communication, reservation system etc
has created new jobs titles such as com-
puter operators, programmers, network
administrators, software engineers, sys-
tem analysts, web administrators etc.
144
Job replacement
Job replacement – this is a situation
whereby certain jobs disappears in an or-
ganisation but reappears in another form
requiring more and high skilled manpower
e.g. copy typist using typewriters are still
needed in organisations but now use
computer word processor instead of type-
writer.
145
Job displacement
Job displacement – this is the process of
replacing man power with computerized
machines, their own or with the help of a
few skilled and highly trained people. In
most cases, the eliminated jobs are those
involving monotonous and unskilled labour
e.g. factory jobs can be displaced by ma-
chine like robots.
146
Automated production
This involves computerization of production process in industries i.e.
the use of computer aided production which does not require high
manpower.
150
Electromagnetic emissions
Electromagnetic emissions – these are
waves of electrical and magnetic energy
that are emitted by current carrying con-
ductors. Computer users are advised to
use low emission devices in order to avoid
exposing themselves to excess emissions.
151
Eye strain and headache
Eye strain and headache – since computer
users have their eyes at close range with
the monitor, there is danger of developing
the Computer Vision Syndrome (CVS).
The syndrome is characterised by eye
strain, headache etc. the solution to this
problem is to use monitors with good res-
olution and fitted with antiglare screen that
filters excess light, specific changes in
screen brightness.
152
Stress
Stress – mental stress is another compliant.
Many people who work at computer feel that
they are expected to produce more and do it
faster because computers themselves are
fast. Also those been monitored by com-
puters frequently feel additional pressure.
153
Isolation
Isolation – people can conduct business
and communication without ever coming
face to face. Computer operators can work
an entire shift, taking their instructions
from a computer screen, sending and re-
ceiving memos to each other electronically
without engaging in personal conversation.
These people feel isolated from other
workers.
154
Radiation and visual display unit
Radiation and visual display unit – there
have been reports that VDU emit radi-
ations that causes, birth defects, blind-
ness, cancer, miscarriages, sterility etc.
155
Computer chip toxin
Computer chip toxin – workers in com-
puter chip manufacturing industries are
exposed to toxic chemicals that may pose
health hazards similar to those feared from
VDU
156
Ergonomics
The science of designing the workplace for
the comfort and safety of the worker. This
is the study of how living and working con-
ditions can be adapted to the information
technology. The need for better working
environment has resulted to designing of
special furniture to prevent backaches,
special monitors to prevent eyestrain etc.
157
Environmental issues 1
Energy consumption and
radiation – initially com-
puters consumed a lot of
energy hence generated
a lot of heat and emitting
electromagnetic radiation.
In recent years the Envir-
onment Protection
Agency (EPA) launched
energy star policy to en-
courage minimal use of
power of electronic
devices.
158
Environmental issues 2
Environmental pollution – it has contrib-
uted to environmental pollution e.g.
garbage dumps of dead computer parts,
printers, monitors etc are disposed in land-
fills hence causing environment pollution
Nickie-Cadmium laptops batteries contain
cadmium and when buried in landfills can
leak into underground water tables and
catchments areas.
159
Cultural effects
Moral effects – it has changed the way we talk,
affected our primary, human rights and integrity.
Internet users are exposed to so many things
e.g. watching pornographic materials, chatting
online, sending dirty messages online etc that af-
fect morals negatively. People also use com-
puters as a tool to accomplish their vices e.g.
forging documents such as certificates, pass-
ports etc.
Computer crimes – this is the use of computers
software for illegal purpose. 160
Types of computer crimes 1
Data manipulation – refers to altering the
data that enter or exit a computer e.g.
changing data on a certificate.
Time bomb – this is coding a computer
program to destroy itself after it has been
run a certain number of times.
Computer virus – a program entered into a
computer with aim of destroying or altering
data and spreading the distraction to other
computers. 161
Types of computer crimes 2
Trap door – creating of a special password
that gives its creator a sole access to the
system.
Data stealing – is using a computer to
steal information that has been gathered
for someone else legitimate purpose.
Eavesdropping – tapping without autho-
rization into communication lines over
which computer data and messages are
sent. 162
Types of computer crimes 3
Industrial espionage – using a computer to
steal designs, marketing plans or other
trade secrets from one company and sell
them to another company.
Piracy – this is making unauthorized cop-
ies of copyrighted computer software.
Fraud – this is the use of computers to
cheat other people with the intention of
gaining, money or information. 163
Types of computer crimes 4
Sabotage – this is illegal destruction of
data and information with the aim of caus-
ing great loss to organisation.
Artificial intelligence
168
Application area of artificial intelligence
Expert systems
Natural language processing
Voice recognition
Voice synthesis
Computer vision
Neural networks
Robotics
169
Expert systems
This is software that store the knowledge of human
experts and is then used as consultant in a particular
field e.g. to help doctors diagnose patients.
172
Voice synthesis
Voice synthesis – these are machines that
are able to create human voice or talk e.g.
a computerized bank teller giving you your
account balance in human like voice.
173
Voice recognition
This is a system that will allow voice input. The user
inputs data by speaking into a microphone. A few sys-
tems can’t satisfactory perform this task because of:
Words with similar sound e.g. here, hear.
Different people pronounce same words differently.
One word has multiple meanings.
Computers that can recognise and read properly human
voice will make information systems and other computerized
applications accessible to people who can’t enter data in the
normal way i.e. blind, handicapped etc.
174
Computer vision and neural networks
Computer vision – scientists hope to develop computers
that will process and interpret lights waves just as the
human brain does, such a system would use scanning
devices to sense and interpret objects, graphics and text
character shapes. It will allow a computer to see as hu-
man do, read and interpret text in almost any format.
177
Review questions 1
1. Explain at least three effects of introduc-
tion of ICT in workplaces.
2. List three advantages and two disad-
vantages of automated production.
3. Describe some of the effects of ICT on
human health.
4. Why is there concern on the disposal of
Nickel-cadmium batteries?
178
Answer of review questions 1
1. A). Job replacement: workers without IT skills are re-
placed by computerised machines and people who have
the skills to operate the machines.
B). Job displacement: employees moved to another de-
partment where IT skills are not needed.
C). Job creation: new jobs are created.
2. A). Advantages of automated production.
A) Efficiency, increase in production.
B) Productivity increases in work place.
C) Cost effectiveness.
D) Improved communication.
B). Disadvantages of automated production
E) Unemployment.
F) Data and information insecurity.
G) Over reliance on ICT may cause a disaster if systems go down.
179
Answer of review questions 2
3. A). Repetitive strain injuries.
B). Exposure to radiation.
C). Eye strain and headaches.
D). Pollution of environment due to
dumping of ICT related components like
batteries.
4. Nickel-cadmium battery contents are not
biodegradable hence may seep down to
the underground water table causing
poisoning. 180
Revision questions
1. Explain the effects of ICT on employment.
2. Explain how the use of ICT may affect health and the environment.
3. Explain the role of Environmental Protection Agency (EPA).
4. Define the term flaming.
5. Why should a parent be concerned when a child requests oftenly to be
given some money to go and browse Internet in a cyber cafe?
6. ( ) is an electronic device designed to emulate the human nervous
system.
7. Explain the four main areas of artificial intelligence.
8. Give a reason why success in natural language processing is important.
9. Define the term robot.
10. Describe the features and capabilities of an intelligent robot
11. Briefly explain the possible features of microcomputer and information
technology in a few years to come.
12. Briefly explain the concept “information superhighway”, its services and po-
tential growth.
181
Answer of revision questions 1
1. Effect on employment – job creation, replacement and displace-
ment.
2. Effect of ICT on:
A) Health – repetitive strain injury, eye strain, headaches and elec-
tromagnetic emissions.
B) Environment – energy consumption, pollution etc.
3. Environmental Protection Agency (EPA) launched the energy star
policy to encourage minimal use of power by electronic devices.
4. Flaming refers to the use of derogatory, obscene or dirty language.
5. Because the child might have discovered some dirty sites e.g. on
pornographic materials that are likely to affect the child morally.
6. Artificial neural networks.
7. Main area of artificial intelligence.
A) Expert systems.
B) Natural language processing.
C) Artificial neural networks.
182
D) Robots.
Answer of revision questions 2
8. This will make data processing task faster.
9. A robot is an automated device used to perform tasks that are
difficult and dangerous to a human being.
10. An intelligent robot has artificial senses that emulate the five
common senses of a human being. (this is an open question
that seeks to test whether students have any vision of ICT in
future).
11. Sublimation of ICT into a totally intelligence driven capacity
with devices that can emulate or simulate human communica-
tion, speech, reasoning, learning and performance.
12. Information superhighway mainly deals with communication of
data and information on a large scale based on cable networks
and more sophisticated wireless communication. It is aimed at
making communication more efficient and reliable.
183
Chapter 4
Career opportunities in infor-
mation and communication
technology (ICT)
184
Introduction
ICT has created new job Software engineer
titles. Some of the Computer engineer
computer career oppor- Web designers
tunities include: Computer operator
Computer technician
System analysts Duties processing
Chief programmer/pro- manager
gramming manager Information system
Computer programmers manager
Database administrator Computer trainer
(DBA) Network administrator
Computer typesetters
Librarian
185
System analysts
This is a person who is responsible for analysing a com-
pany’s needs or problems then design and develop a
computer based information system.
Duties
Design and develop computer components e.g.
motherboard, storage devices etc.
Design and develop engineering and manufac-
turing computer controlled devices such as ro-
bots.
Re-engineer computer components to enhance
its functionality and efficiency. 193
Web designers
Web designers design website using vari-
ous software tools. These webs contains
pages where individuals and organisation
can advertise themselves when promoting
the products.
194
Web administrators
He administrate the web organisation, websites
by making sure the website is updated periodic-
ally to give the right information.
Duties
Developing and testing websites.
Monitoring the access and use of Internet con-
nection by enforcing security measures.
Downloading information needed by an organ-
isation from Internet website.
Maintaining, updating and modifying information
on the website. 195
Computer operator
This is a person who interfaces the user demands
to the computer hardware by use of set of special
instructions known as commands.
Duties
Entering data into the computer for processing.
Keeping up-to-date records of all information pro-
cessing activities.
Responsible for the general equipment layout
within the computer room.
Activating the computer to obey programs through
use of commands.
Mounting the storage media e.g. disk to their
196
drives.
Computer technician
These are member of the technical staff whose
job is service and repair computers.
Duties
Troubleshooting computer hardware and soft-
ware related problems.
Ensuring that all computer related accessories
such as printers, storage media etc are in good
condition.
Assembling and upgrading computers and their
components. 197
Data processing manager
This is the person in the data processing de-
partment within the organisation. His major duty
is to ensure that the organisation’s needs are
met.
Duties and responsibilities
In charge of data and information flow within the
department.
Responsible in data collection and preparation.
Purchase of hardware and other facilities and
their management.
Software development and maintenance.
Assessment and evaluation of staff perfor-
198
mance.
Information system manager
This person controls, plans, staffs, schedules
and monitors all the activities of the ICT depart-
ment in the organisation.
Responsibilities
Making sure that all tasks in the IT department
are done correctly and on time.
Preparing budgets for the departments.
Keeping the department inventory records up-to-
date.
Managing the human resource within the de-
partment. 199
Computer trainers
These are specialized personnel in the field of
computing, well conversant with various discip-
lines and computer related issues, which they
can execute with ease for those who are first
venturing into this field.
Duties
Training people on how to use a computer and
various application programs.
Developing training reference materials.
Guide learners on how to acquire knowledge
through carrying out research.
Preparing learners for ICAT examinations.
200
Network administrator
This is a specialist who oversees the smooth
running of network systems in an organisation.
Responsibilities
Set-up a computer network.
Maintain and enforce security measures on net-
work.
Monitor the use of network resources.
Maintain and troubleshoot network rekated prob-
lems. 201
Computer typesetters
Graphic designers and typesetters are re-
quired in order to design graphical objects
and profession publications e.g. books,
newspapers, magazines.
202
Librarian
He is responsible for keeping the files in various
storage devices. He is responsible for the phys-
ical security of storage media.
Duties
Ensures that there are enough physical files
available for use.
Maintains the external files labels.
Ensures duplicates files are kept.
Ensures access of files is restricted to autho-
rised persons. 203
Further educational opportunities in ICT
There are other areas in computing where
one would further his or her educational
ambitions. These areas include institutions
such as colleges, university, polytechnics,
institutions etc.
204
ICT courses offered in tertiary institutions
University
Public university
Private university
Polytechnics
Colleges
205
University
This is considered as the highest institu-
tion in formal education. There are two
categories of universities.
213
Examples of colleges
Rift valley of science and technology.
Kaiboi technical training institute.
Thika institute of science and technology.
Kiambu institute of science and technology.
Coast institute of science and technology.
Kirinyaga technical training institute.
Nairobi technical training institute.
Nyeri technical training institute.
Kenya technical training institute.
Kenya science teachers college.
Machakos technical training institute.
214
Examinations bodies for higher dip-
loma, diploma and certificates
PITMAN
215
Factors to consider before joining a
college to pursue ICT course
216
Review questions
1. Explain the role of the following ICT specialists:
A) Database administrator.
B) Software engineer.
C) System analyst.
D) Computer technician.
E) Information systems manager.
2. Differentiate between a system analyst and a program-
mer.
3. Outline the roles of a network administrator.
4. Differentiate between a software engineer and a com-
puter engineer.
5. List three types of job opportunities that are available in
the field of computer hardware.
217
Answer of review questions 1
1. A). Database administrator – designs, develops, up-
dates and maintains information system database.
B). Software engineer – develops and updates soft-
ware.
C). System analyst – analyses, designs and develops
information systems.
D). Computer technician – troubleshoot computer hard-
ware and software problems.
E). Information system manager – managing ICT opera-
tions.
A system analyst is mostly responsible for analysing the
weaknesses of the existing system and designing an al-
ternative system while a programmer mainly writes 218
Answer of review questions 2
3. A). Setting up a computer network.
B). Securing the network against unauthorised access.
C). Managing the network to enhance performance and
uptime.
D). Monitoring use of network resources.
4. Software engineer develops software/programs as per
requirements. Computer engineer designs computer
hardware and improves on existing ones.
5. Job opportunities in computer hardware:
A) Computer engineer
B) Computer repair and maintenance
C) Computer assembling
219
Revision questions
1. Give at least six examples of public and accredited private
universities that offer computer related courses in Kenya.
2. Identify at least three ICT related courses offered at
1. University level
2. Polytechnic level
3. College level
3. Define the term accreditation as used in education.
4. Identify ICT courses you would enrol in at the postgraduate
university level.
5. Identify three national polytechnics that offer ICT courses in
Kenya.
6. Identify at least three colleges that offer computer science
as a subject at diploma level.
7. State and explain some of the factors you would consider
before enrolling for an ICT course in a college.
220
Answer of revision questions 1
1. A). Moi university B). Polytechnic level
B). Nairobi university i. Diploma in information
C). Kenyatta university technology.
D). Jomo Kenyatta university of ii. Diploma in computer
agriculture and technology hardware mainten-
E). Catholic university ance.
F). Daystar university iii.Diploma in computer
programming.
G). Baraton university
C). College level
2. A). University level:
iv.Diploma in information
i. Bsc. Computer science technology
ii. Bsc. Information technology v. Certificate in informa-
iii. Msc. Information systems tion technology
vi.Diploma in education221
(computer science).
Answer of revision questions 2
3. Accreditation is the process of recognising an institution as being
able to offer degrees and diplomas.
4. A). Msc. information system /Ph.D
B). Msc. Information technology /Ph.D
5. National polytechnics in Kenya are Kenya polytechnic, Mombasa
and Eldoret Polytechnics.
6. Colleges that offer compute science as a teaching subject at dip-
loma level are Kenya Science, Kagumo Teachers College, Kenya
technical Teachers College etc. (The list is not exhaustive).
7. Factors to consider when enrolling for ICT course in a college:
A) Cost
B) Job opportunities
C) Whether the examinations offered are recognised etc.
D) The organisation offering the course.
222
END
223