ICT Concepts and Impacts Explained
ICT Concepts and Impacts Explained
The following tables shows the difference between data and information
Data Information
Data is raw, unorganized facts
that need to be processed. When data is processed, organized, structured or
Meaning Data can be something simple presented in a given context so as to make it
and seemingly random and useful, it is called Information.
useless until it is organized.
The class' average score or the school's average
Each student's test score is one
Example score is the information that can be concluded from
piece of data
the given data.
Latin 'datum' meaning "that
which is given". Data was the
Definition Information is interpreted data.
plural form of datum singular
(M150 adopts the general use
ICT class notes prepared by Derek Kizito
Data Information
of data as singular. Not
everyone agrees.)
COMMUNICATION
The transmission of data from one computer to another, or from one communication to another.
A communications device, therefore, is any machine that assists data transmission. In the electronic world, it
is the transfer of data and information from one location to another
Technology
Technology can be most broadly defined as the entities, both material and immaterial, created by the
application of mental and physical effort in order to achieve some value. In this usage, technology refers to
tools and machines that may be used to solve real-world problems
Examples of technology
1. Computer technology - the activity of designing and constructing and programming computers
An example of computer technology is the development of a software program that allows people to
accomplish work at home which has been automatically assigned from computers at their job location
2. Information technology
Information technology (IT) is the application of computers and telecommunication equipment to store,
retrieve, transmit and manipulate data, often in the context of a business or other enterprise. The term is
commonly used as a synonym for computers and computer networks, but it also encompasses other
information distribution technologies such as television and telephones.
Information Communication Technology
Information Communication Technology (ICT) is a large umbrella term that covers all the technical
equipment to process and communicate information. ICT covers two aspects of information technology and
communication technology. Information technology encompasses all matters relating to the processing, use
as a tool, manipulation, and management of information.
While communication technology is everything associated with the use of tools to process and transfer data
from one device to another. Therefore, the information technology and communication technology are two
inseparable concepts. So the Information and Communication Technology (ICT) contains the broadest sense
of any activity related to the processing, manipulation, management, transfer of information among media.
The term ICT emerged after the combination of computer technology (both hardware and software) and
communications technology in the mid-20th century
Examples of ICT equipment
Fax machines
Telephone
Mobile phone
Computers
Printers
THE POSITIVE AND NEGATIVE IMPACTS OF ICT
As it is known from time immemorial that everything in life is like the two side of a coin, there is always a
positive and negative side of every phenomenon. But whether the effect is positive or negative the effects of
Information Communication Technology (ICT) is far reaching and cannot be overemphasized. The Effects
of ICT lens looks at how our lives have been changed, for better and for worse, by the impact of ICT. It
includes both positive effects and negative effects and looks at how individual’s organizations and society
are affected.
POSITIVE IMPACTS OF ICT ON THE SPCIETY
ICT CAN HAVE POSITIVE IMPACTS ON PEOPLE
ICT class notes prepared by Derek Kizito
1. Access to information: Possibly the greatest effect of ICT on individuals is the huge increase in access
to information and services that has accompanied the growth of the Internet. Some of the positive aspects
of this increased access are better, and often cheaper, communications, such as VoIP phone and Instant
Messaging. In addition, the use of ICT to access information has brought new opportunities for leisure
and entertainment, the facility to make contacts and form relationships with people around the world, and
the ability to obtain goods and services from a wider range of suppliers.
2. Improved access to education, e.g. distance learning and on-line tutorials. New ways of learning, e.g.
interactive multi-media and virtual reality. New job opportunities, e.g. flexible and mobile working,
virtual offices and jobs in the communications industry.
3. New tools, new opportunities: The second big effect of ICT is that it gives access to new tools that did
not previously exist. A lot of these are tied into the access to information mentioned above, but there are
many examples of stand-alone ICT systems as well:
4 FASTER COMMUNICATION SPEED
In the past, it took a long time for any news or messages to be send. Now with the Internet, news or messages
are sent via e-mail to friends, business partners or to anyone efficiently. With the capability of bandwidth,
broadband and connection speed on the Internet, any information can travel fast and at an instant. It saves time
and is inexpensive.
5 LOWER COMMUNICATION COST
Using the Internet is cost-effective than the other modes of communication such as telephone, mailing or
courier service. It allows people to have access to large amounts of data at a very low cost. With the Internet we
do not have to pay for any basic services provided by the Internet. Furthermore, the cost of connection to the
Internet is relatively cheap.
3. Marketing
In Marketing uses of computer are following:
Advertising: With computers, advertising professionals create art and graphics, write and revise copy, and
print and disseminate ads with the goal of selling more products.
At Home Shopping: At home shopping has been made possible through use of computerized catalogues that
provide access to product information and permit direct entry of orders to be filled by the customers.
4. Health Care
Computers have become important part in all Medical Systems. The computers are being used in hospitals to
keep the record of patients and medicines. It is also used in scanning and diagnosing different diseases. ECG,
Diagnostic System: Computers are used to collect data and identify cause of illness.
Lab-diagnostic System: All tests can be done and reports are prepared by computer.
5. Communication
Communication means to convey a message, an idea, a picture or speech that is received and understood clearly
and correctly by the person for whom it is meant. Some main areas in this category are:
ICT class notes prepared by Derek Kizito
General-purpose Special-purpose
1 It is designed to perform variety or task. It is designed for a specific application
2 It is more versatile. It is less versatile.
3 It is less efficient. It is more efficient.
4 Programs are temporarily stored in memory. Instruction permanently programmed into the memory.
5 It is comparatively slower than special purpose It is comparatively faster than general purpose computer.
computer.
6 Example: microcomputer. Example: to control traffic lights.
4. Classification by function
⦁ Servers
Server usually refers to a computer that is dedicated to providing a service. For example, a computer
dedicated to a database may be called a "database server". "File servers" manage a large collection of
computer files. "Web servers" process web pages and web applications. Many smaller servers are actually
personal computers that have been dedicated to providing services for other computers.
⦁ Workstations
Workstations are computers that are intended to serve one user and may contain special hardware
enhancements not found on a personal computer.
⦁ Information appliances
Information appliances are computers specially designed to perform a specific user-friendly function —
such as playing music, photography, or editing text. The term is most commonly applied to mobile devices,
though there are also portable and desktop devices of this class.
⦁ Embedded computers
Embedded computers are computers that are a part of a machine or device. Embedded computers
generally execute a program that is stored in non-volatile memory and is only intended to operate a
specific machine or device. Embedded computers are very common. Embedded computers are typically
required to operate continuously without being reset or rebooted, and once employed in their task the
software usually cannot be modified. An automobile may contain a number of embedded computers;
however, a washing machine and a DVD player would contain only one. The central processing units
(CPUs) used in embedded computers are often sufficient only for the computational requirements of the
specific application and may be slower and cheaper than CPUs found in a personal computer.
5. Classification by placement
Desktops
ICT class notes prepared by Derek Kizito
A desktop computer is a computer that fits on or under a desk. It has a monitor or another display,
keyboard, mouse, and either a horizontal or vertical (tower) form factor.
These are a type of microcomputers also called Personal Computers (PCs).
They are compact, powerful and versatile machines
They generally serve a single user
The desktop type may be one integral unit having monitor and CPU or may be separate ( Tower units)
Laptops
Are devices that hold data, instructions and information temporarily ie for a short period of time. Also
known as temporal memory or primary memory or internal memory
Notebook: - These computers are as powerful as desktop but size of these computers are comparatively
smaller than laptop and desktop. They weigh 2 to 3 kg. They are more costly than laptop.
Palmtop (Hand held): - They are also called as personal Digital Assistant (PDA). These computers are
small in size. They can be held in hands. It is capable of doing word processing, spreadsheets and hand
writing recognition, game playing, faxing and paging. These computers are not as powerful as desktop
computers. Ex: - 3com palmV.
Wearable computer: - The size of this computer is very small so that it can be worn on the body. It has
smaller processing power. It is used in the field of medicine. For example pace maker to correct the heart
beats. Insulin meter to find the levels of insulin in the blood.
A generation refers to the state of improvement in the product development process. This term is also
used in the different advancements of new computer technology. With each new generation, the
circuitry has gotten smaller and more advanced than the previous generation before it. As a result of
the miniaturization, speed, power, and computer memory has proportionally increased. New
discoveries are constantly being developed that affect the way we live, work and play.
ICT class notes prepared by Derek Kizito
Classification according to generation
Each generation of computers is characterized by major technological development that fundamentally
changed the way computers operate, resulting in increasingly smaller, cheaper, and more powerful and
more efficient and reliable devices.
The Generations of Computers
It used to be quite popular to refer to computers as belonging to one of several "generations" of computer. These
generations are:-
1. First Generation (1940-1956)
The first generation computers had the following features and components Hardware
The hardware used in the first generation of computers was: Vacuum Tubes and Punch Cards.
Features
Following are the features of first generation computers −
· It supported machine language.
· It had slow performance
· It occupied large size due to the use of vacuum tubes.
· It had a poor storage capacity.
· It consumed a lot of electricity and generated a lot of heat.
Memory
The memory was of 4000 bits.
Data Input
The input was only provided through hard-wired programs in the computer, mostly through punched cards and
paper tapes.
Examples
The examples of first generation computers are −
ENIAC
UNIVACTBM 701
Advantages of first generation computers
Here are the list of some advantages of using first generation computer at that time:
Vacuum tubes were the only electronic component available during those days.
Vacuum tube Technology made possible to make electronic digital computers.
These computers could calculate data in milliseconds.
Disadvantages of first generation computers
Here are the list of some disadvantages of using the first generation computers at that time:
The computers were very large in size
They consume a large amount of energy
They heated very soon due to thousands of vacuum tubes
They were not very reliable
Air conditioning was required
Constant maintenance was required
Costly commercial productions
Limited commercial use
2) Second Generation (1956-1963)
Several advancements in the first-gen computers led to the development of second generation computers.
Following are various changes in features and components of second generation computers −
Hardware
The hardware used in the second generation of computers were −
Transistors
Magnetic Tapes
Features
ICT class notes prepared by Derek Kizito
It had features like −
· Batch operating system
· Faster and smaller in size
· Reliable and energy efficient than the previous generation
· Less costly than the previous generation
Memory
The capacity of the memory was 32,000 bits.
Data Input
The input was provided through punched cards.
Examples
The examples of second generation computers are −
Honeywell 400
CDC 1604
IBM 7030
Advantages of second generation computers
Here are some of the main advantages of using second generation computer at that time:
Smaller in size as compared to the first generation computers
The second generation computers were more reliable
Used less energy and were not heated
Wider commercial use
Better portability as compared to the first generation computers
Beta speed and could calculate data in microseconds
Used faster peripherals like tape drives, magnetic disks, printer etc.
Disadvantages of second generation computers
And here are some of the main disadvantages of using second generation computers at that time:
Cooling system was required
Constant maintenance was required
Commercial production was difficult
Only used for specific purposes
3) Third Generation (1964-1971)
Following are the various components and features of the third generation computers −
Hardware
The hardware used in the third generation of computers were
· Integrated Circuits made from semi-conductor materials
· Large capacity disks and magnetic tapes
Features
The features of the third generation computers are −
· Supports time-sharing OS
· Faster, smaller, more reliable and cheaper than the previous generations
· Easy to access
Memory
The capacity of the memory was 128,000 bits.
Data Input
The input was provided through keyboards and monitors.
Examples
The examples of third generation computers are −
IBM 360/370
CDC 6600
PDP 8/11
ICT class notes prepared by Derek Kizito
Advantages of third generation computers
Following are some main advantages of using third generation computers:
Smaller in size as compared to previous generation
More reliable
Used less energy
Better speed and could calculate data in nanoseconds
Used fan for heat discharge to prevent damage
Disadvantages of third generation computers
Following are some main disadvantages of using third generation computers:
Air conditioning was required
Highly sophisticated Technology was required for the manufacturing of IC chips
4) Fourth Generation (1972-2010)
Fourth generation computers have the following components and features −
Hardware
The Hardware used in the fourth generation of computers were −
ICs with Very Large Scale Integration (VLSI) technology
Semiconductor memory
Magnetic tapes and Floppy
Features
It supports features like −
Multiprocessing & distributed OS
Object-oriented high level programs supported
Small & easy to use; hand-held computers have evolved
No external cooling required & affordable
This generation saw the development of networks and the internet
It saw the development of new trends in GUIs and mouse
Memory
The capacity of the memory was 100 million bits.
Data Input
The input was provided through improved hand held devices, keyboard and mouse.
Examples
The examples of fourth generation computers are −
Apple II
VAX 9000
CRAY 1 (super computers)
Advantages of fourth generation of computers
Following are the advantages of using all those computer machine that are based on fourth generation over
previous generation:
Much faster
Less expensive
More powerful and reliable than previous generations
Small in size
Uses advanced techniques
Have greater data processing capacity than equivalent size previous generation computer that is third
generation computers
Fast processing power with less power consumption
Fan for heat discharging and thus to keep cold
No air conditioning required
ICT class notes prepared by Derek Kizito
Uses advance application software package like process controller, relational database management,
electronic spreadsheet, CAD (Computer aided design).
All types of high level languages can be used in this type of computers
Disadvantages of fourth generation computers
Below is the main disadvantages of fourth generation computers:
The latest technology is required for manufacturing of microprocessors
5) Fifth Generation (2010-Present)
These are the modern and advanced computers. Significant changes in the components and operations have
made fifth generation computers handy and more reliable than the previous generations.
Hardware
The Hardware used in the fifth generation of computers are −
· Integrated Circuits with VLSI and Nano technology
· Large capacity hard disk with RAID support
· Powerful servers, Internet, Cluster computing
Features
It supports features like −
· Powerful, cheap, reliable and easy to use.
· Portable and faster due to use of parallel processors and Super Large Scale Integrated Circuits.
· Rapid software development is possible.
Memory
The capacity of the memory is unlimited.
Data Input
The input is provided through CDROM, Optical Disk and other touch and voice sensitive input devices.
Examples
The examples of fifth generation computers are −
IBM
Pentium
PARAM
ELEMENTS OF A COMPUTER
1. Hardware:
The physical components of a computer constitute its Hardware. They are tangible, i.e. you can see and
touch them.
The four types of hardware are,
Input Hardware: For users to input data into the computer system. Examples: Keyboard, mouse,
Scanner
Output Hardware: To translate and display the result of the data processing =. Example: Monitor
Screen, Printer etc
Processing and Memory Hardware: Where data and information are processed and manipulated to
perform the task at hand.
Memory Hardware : It is also the workspace of the computer, where it temporarily stores data.
Examples: Central Processing Unit (CPU), Read Only Memory (RAM) Secondary Storage
Hardware: Where the computer system stores data permanently. Example: Hard disk, Pen drive
etc
ICT class notes prepared by Derek Kizito
2. Software:
A set of programs that form an interface between the hardware and the user of a computer system are
referred to as Software. Software is nothing but a set of programs (computer instructions), which helps
the user to do a set of specific tasks. It helps the user interact with the computer system with the help of
hardware. Software, as you can imagine, is the intangible aspect of the computer system. Basically, there
are The six main types of software are as follows,
Operating System: These specialized programs allow the communication between software and
hardware. The operating systems run all the other computer programs, and even regulate the
startup process of the computer. Examples: Windows XP, Macintosh etc
Application Software: These are designed to perform a specific task or a bunch of tasks. They
can be user-designed (specific to the user’s needs) or readymade application software. Example:
PowerPoint, Tally etc.
Utility Software: Like operating systems, it is system software. It helps maintain and protect the
computer system. For example, Anti-virus software is utility software.
Language Processors: Software that interprets computer language and translates it into machine
language. It also checks for errors in language syntax and fixes the problems.
System Software: These types of software control the hardware, the reading of the data and other
such internal functions.
Connectivity Software: The special software that facilitates the connection between the computer
system and the server. This allows the computer to share information and communicate with each
other.
3. People or orgware or liveware
The most important element of a computer system is its users. They are also called live-ware of the
computer system.
The following types of people interact with a computer system:
Programmers: Professionals who write the computer programs that allow users to interact with
the computer. They must have technical knowledge of computers and computer languages.
System Analyst: They mainly design data processing systems, and solve problems that arise in
data processing
End-Users: Also known as operators, they are the people who interact with the computer system.
Database administrators: They design, setup and manage a database which is an organized storage
of data items relating to different entities such as products, customers, students, course e.t.c
Network administrators: They design, setup and maintain a network which is an interconnection
of computers using communication media or channels
Computer technician: They provide software and hardware support to users both remotely via
telephone calls or physically
System Operators:
People who operate the system and use it for different purposes. Also called the end users.
4. Procedures:
Procedure is a step by step series of instructions to perform a specific function and achieve desired
output.
In a computer system, there are three types of procedures:
Hardware oriented procedure:
It defines the working of a hardware component.
Software oriented procedure:
It is a set of detailed instructions for using the software.
Internal procedure:
It maintains the overall internal working of each part of a computer system by directing the flow of
information.
ICT class notes prepared by Derek Kizito
5. Data:
The facts and figures that are fed into a computer for further processing are called data. Data is raw until
the computer system interprets it using machine language, stores it in memory, classifies it for processing
and produces results in conformance with the instructions given to it. Processed and useful data is called
information which is used for decision making.
6. Peripherals
These are devices connected externally to the computer so as to improve on the functionalities of a
computer system. An example is a earphone, microphone, mouse etc
In summary A computer system is a system of interconnected computers that share a central storage
system and various peripheral devices such as a printers, scanners, or routers. Each computer connected
to the system can operate independently, but has the ability to communicate with other external devices
and computers.
COMPUTERIZATION
It’s the process of taking activities or tasks not previously done on the computer and shifting them to
being done on the computer.
Advantages of computerization in an organization
1. Response time is greatly reduced
2. Very large data are stored for information and decision-making
3. Accuracy of information is considerably improved, thereby improving the quality of the decision
4. Problems are handled more easily by using various operation research models
5. The cost involved in the decision-making process is reduced 6. More secrecy is observed as compared
to manual file system
Disadvantages of computerization
1. Unemployment Different tasks are performed automatically by using computers. It reduces the need of
people and increases unemployment in society
2. Wastage of time and energy Many people use computers without positive purpose. They play games
and chat for a long period of time. It causes wastage of time and energy. Young generation is now
spending a lot of time on the social media websites like Facebook, Twitter etc or texting their friends all
night through smartphones which is bad for both studies and their health. And it also has adverse effects
on the social life. 3. Data Security The data stored on a computer can be accessed by unauthorized
persons through networks. It has created serious problems for the data security.
4. Computer Crimes People use the computer for negative activities. They hack the credit card numbers
of the people and misuse them or they can steal important data from big organizations.
5. Privacy violation The computers are used to store personal data of the people. The privacy of a person
can be violated if the personal and confidential records are not protected properly.
6. Health risks. The improper and prolonged use of computer can results in injuries or disorders of
hands, wrists, elbows, eyes, necks and back. The users can avoid health risks by using the computer in
proper position. They must also take regular breaks while using the computer for longer period of time. It
is recommended to take a couple of minutes break after 30 minutes of computer usage.
7. Impact on Environment. The computer manufacturing processes and computer waste are polluting
the environment. The wasted parts of computer can release dangerous toxic materials. Green computer is
a method to reduce tire electricity consumed and environmental waste generated when using a computer.
It includes recycling and regulating manufacturing processes. The used computers must be donated or
disposed off properly
TOPIC 3 COMPUTER SOFTWARE
Computer software (often called just software) is a set of instructions and associated documentation that
tells a computer what to do or how to perform a task
Classes of computer software
1. Classification of according to acquisition
In-house developed software
ICT class notes prepared by Derek Kizito
Vendor off-the-shelf software
In-house developed
Are programs that are uniquely designed and tailored to meet a particular user’s needs For example a bank
may decide to manage its banking operations using a unique program developed by hired programmers and
these programs are not available in the shops
Advantages of in-house software
1. Handles specific needs of the user
2. They can easily be modified to suit the needs of the user
Disadvantages of in-house software
1. Expensive to develop
2. Cannot be used to solve several tasks
Vendor off-the-shelf
Are programs developed by software engineers, packaged and then made available for purchase through a
vendor, a distributer or directly from the developer. A developer may bundle more than one but closely
related software into one package to form a suite. eg Microsoft Office
Advantages of Vendor off shelf software
1. They are less expensive to acquire than the in-house software
2. They are readily available for almost any task
3. Most of the packages are user friendly.
4. Saves development time and cost of developing programs.
5. The packages are generally portable
Disadvantages of Vendor off-the-shelf software
1. The user cannot modify the program to meet his/her needs.
2. The package may not meet the organization needs.
2. Classification of according to End-User-License (EUL)
i. Open source or non- proprietary software
ii. Proprietary software/ freeware
Open source software
Software whose source code (programmed set of instructions) is freely made available to users, hence users
can use, modify and distribute the modified product
Proprietary software
Software whose source is hidden from users. Modifications are only made by the software manufacturer. It
may be licensed to users at a fee or applied freely
3. Classification according to purpose
System Software
Application Software
System software
System software is a type of computer program that is designed to run a computer’s hardware
and application programs. If we think of the computer system as a layered model, the system software is
the interface between the hardware and user applications.
Types of system software
1. Utility programs
2. Operating system
Utility programs
Utility programs also referred to as system utility are software used to perform standard operations, as
sorting data or copying data from one file to another, for application programs or other system software.
Examples of utility programs
ICT class notes prepared by Derek Kizito
Backup software makes copies of all information stored on a disk and restores either the entire disk
(Disk cloning) in an event of disk failure or selected files that are accidentally deleted or
corrupted. Undeletion utilities are sometimes more convenient.
Disk checkers scan an operating hard drive and check for logical (filesystem) or physical errors.
Disk compression utilities transparently compress/ uncompressed the contents of a disk, increasing
the capacity of the disk.
Disk defragmenters detect computer files whose contents are scattered across several locations on
the hard disk and collect the fragments into one contiguous area.
Text editors for creating a file with some lines of text. Examples include word pad, notepad, paint,
calculator
Anti virus program that protects a computer from virus infections. Examples inlude avast, AVG,
Kerspasky. A virus is a program that's designed to interfere with the well functioning of a computer
Disk formatters prepare a data storage device such as a hard disk, solid-state drive, floppy disk or
USB flash drive for initial use. These are often used to permanently erase an entire device.
Disk partition editors divide an individual drive into multiple logical drives, each with its own file
system which can be mounted by the operating system and treated as an individual drive.
A device driver is a computer program that controls a particular device that is connected to your
computer. Typical devices are keyboards, printers, scanners, digital cameras and external storage
devices. Each of these needs a driver in order to work properly. Device drivers act as a translator
between the operating system of the computer and the device connected to it. For many types of
devices, the necessary drivers are built into the operating system. When you plug in a device, the
operating system starts looking for the right driver, installs it and you are ready to start using the
device. This is referred to as plug-and-play and is much preferred over having to manually install
the correct drivers.
Translator: Translates high-level languages to low-level machine codes.
Examples of language translators
Interpreters While a program is running, interpreters read, translate, and execute one statement of
the program at a time. The interpreter displays any errors immediately on the monitor. Interpreters
are very useful for people learning how to program or debugging a program. However, the line-by-
line translation adds significant overhead to the program execution time leading to slow execution.
Compilers A compiler uses a language translation program that converts the entire source program
into object code, known as an object module, at one time. The object module is stored and it is the
module that executes when the program runs. The program does not have to be compiled again until
changes are made in the source code.
Advantages of utility software
Utility software has been designed specifically to help in management and tuning of operating system,
computer hardware and application software of a system.
It performs a specific and useful function to maintain and increase the efficiency of a computer
system
Aids in keeping the computer free from unwanted software threats such as viruses or spyware
Adds functionality that allow the user to customize your desktop and user interface
Manages computer memory and enhances performance
Operating system
An Operating System is a computer program that manages the resources of a computer. It accepts
keyboard or mouse inputs from users and displays the results of the actions and allows the user to
run applications, or communicate with other computers via networked connections
ICT class notes prepared by Derek Kizito
Input devices
Are devices used to transfer data from the external environment in a computer system. The classes of
input devices are:
1.Typing Devices
example: Keyboard
2. Pointing Devices
example: Mouse, joystick, trackball, light pen or stylus, track pod, track point, touch screen, touch
pod.
3.Optical Reading Devices
Microphone
Headset
Voice Recognition Unit
Earpiece
ICT class notes prepared by Derek Kizito
6. Connectivity Devices
Bluetooth
Infrand
WiFi
The Keyboard
Keyboard is the most common and very popular input device which helps to input data to the
computer. The layout of the keyboard is like that of traditional typewriter, although there are some
additional keys provided for performing additional functions. The following is an image of a computer
keyborad
5. Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a mouse. This is
a ball which is half inserted and by moving fingers on the ball, the pointer can be moved.
Since the whole device is not moved, a track ball requires less space than a mouse. A track ball comes in
various shapes like a ball, a button, or a square.
Direct data entry devices
These are devices that capture data directly from the source document and converts it into computer
readable form. They include
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used when some
information is available on paper and it is to be transferred to the hard disk of the computer for further
manipulation.
ICT class notes prepared by Derek Kizito
Types
Optical scanners
Magnetic scanners
OPTICAL SCANNERS OR DIRECT DATA ENTRY DEVICES
1) Scanner
Scanner captures images from the source which are then converted into a digital form that can be stored
on the disk. These images can be edited before they are printed.
There are two different types of scanner :
· Flatbed Scanner : You place the image on top of the scanner. The scanner moves the light and sensor
itself and scans the whole image automatically. Most flatbed scanners are A4 size.
Handheld Scanner : You must manually push the light/sensor along the image. Handheld scanners are usually
5 inches wide.
2) Magnetic readers
a) Magnetic Ink Card Reader (MICR)
MICR input device is generally used in banks as there are large number of cheque to be processed every
day. The bank's code number and cheque number are printed on the cheques with a special type of ink that
contains particles of magnetic material that are machine readable. This reading process is called Magnetic
Ink Character Recognition (MICR). The main advantages of MICR is that it is fast and less error prone.
Digital Camera
ICT class notes prepared by Derek Kizito
A digital camera takes pictures and stores the images digitally, rather than on traditional film. Digital
cameras use different media to store images, which include flash memory card, floppy disk and compact
disc.
Advantages of a digital camera include
Save money for buying films and developing costs in the long term.
Images taken can be reviewed.
Unwanted images can be deleted immediately after the preview.
Photographic images can be digitized directly without using a scanner.
Disadvantages of a digital camera include
Digital cameras are normally more expensive than ordinary film cameras with similar functions.
Photo printing cost for digital cameras is generally higher than that for ordinary film cameras.
Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer can convert a
signal from the television or camera into a series of numbers that could be stored in a computer. They can be
used by the computer to create a picture of whatever the camera had been pointed at.
Digitizer is also known as Tablet or Graphics Tablet as it converts graphics and pictorial data into binary
inputs. A graphic tablet as digitizer is used for fine works of drawing and image manipulation applications.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.
The microphone is used for various applications such as adding sound to a multimedia presentation or for
mixing music.
OUTPUT DEVICES
Output devices are computer devices used to display/ disseminate/ relay an output which is information
from a computer
CLASSIFICATION OF OUTPUT DEVICES
Based on the hard copy and soft copy outputs, the output devices are classified into: hard copy and soft copy
output devices. Printers, plotters, and microfilms are the most commonly used hard copy output devices
while monitors, voice response systems, projectors, electronic whiteboards, and headphones and headsets
are some commonly used soft copy output devices
Figure 7.3. Classification of Output Devices
Drum printer
An impact printer in which a complete set of characters for each print position on a line is on a continuously r
otating drum behind an inked ribbon, with paper in front of the ribbon; identical characters are printed simult
aneously at all required positions on a line, on the fly, by signal-controlled hammers. A drum printer is a line
printer that uses a rotating drum with raised characters, against which the paper is pressed.
Laser Printers:
Laser printing is the most advance technology. In Laser printing, a computer sends data to the printer.
Printer translates this data into printable image data. This kind of printers uses xerographic principle. A
laser beam discharges photo sensitive drum. A Latent Image is created on drum, during development
process toner is attracted to the drum surface and then transferred to the paper. Its consumable called
toner cartridge or laser toner. Buy laser toner here.
Advantages:
1. Low cost per page. Compare to inkjet printer
2. Low noise
3. High speed
4. High printing quality
Disadvantage
1. Laser printers are more expensive, but getting more affordable these year. (Now can get RM 2xx for
mono laser printer, below RM 600 for color laser printer)
2. Their size are generally larger.
PLOTTERS
A device that draws pictures on paper based on commands from a computer. Plotters differ from printer in
that they draw lines using a pen. As a result, they can produce continuous lines, whereas printers can only
simulate lines by printing a closely spaced series of dots. Multicolor plotters use different-colored pens to
draw different colors.
In general, plotters are considerably more expensive than printers. They are used in engineering applications
where precision is mandatory.
A flat piece of film containing microphotographs of the pages of a newspaper, catalogue, or other document.
Headphones and headset
lot of people seem to get headphones and headsets mixed up.
►Headphones have miniature speakers (also known as drivers and transducers and receivers and receiver
elements) and are mainly used for listening to music. It's unusual to hear the word "headphone." The word
almost always has an "s" at the end. It's a contraction for "pair of headphones," like "pants" is short for a
"pair of pants" and "scissors is short for "pair of scissors."
►A Headset has miniature speakers (or a single speaker) plus a microphone (which is also a kind of
transducer), and is used for listening and talking on the phone, computer, air traffic control console, etc.
►An earphone is a tiny speaker that fits in or on your ear, commonly used for listening to a portable radio.
►EarPhone® is a tiny ear-mounted speaker with a short microphone boom (sort of a mini headset), made
by Jabra for phones.
►EarSet® is an all-in-the-ear speaker/microphone, also made by Jabra. Similar products from other
companies are called ear buds.
►HeadPHONE is an advertising label that Panasonic uses for some phones that have headset jacks.
►A handset is the part of a phone that you hold in your hand. (Some people call it a receiver.) If the phone
is a cellphone, the whole phone can be called a handset.
Computer monitors
A computer monitor is an electronic device that shows pictures. Monitors often look similar to televisions.
The main difference between a monitor and a television is that a monitor does not have a television tuner to
change channels. Monitors often have higher display resolution than televisions. A high display resolution
makes it easier to see smaller letters and fine graphics.
There are three types of computer displays:
Types Of Monitors
Monitors are one out of three most important parts of computer; rest of the two are keyboard and Central
Processing Unit. Monitors are more commonly referred as display screen.
Monitors are available from 12” to 42”, which you can pick according to your needs and space you have.
ICT class notes prepared by Derek Kizito
Here, in this piece of writing, we would be discussing some types of monitors. Some of which are not more
in use, while some can be found easily, on the other hand, few are used for commercial or special purposes
only.
CRT Monitors
Cathode Ray Tube, or in simpler words CRT, are oldest among all available models these days. These
monitors function on the old cathode ray tube phenomena.
The best thing in CRTs is that they are easily available and are in cheaper in price. These monitors have high
dynamic range and remarkable color and resolutions with excellent viewing angles.
These monitors allow the use of external devices like light pens and light guns. One of the drawbacks of
these monitors is their weight and another is their size.
They consume more power, like many other old electrical and electronic appliances. That is why, experts on
energy do not advice to buy CRT.
LCD Monitors
Liquid crystal display monitors consists of a layer of color or monochrome pixels arranged schematically
between a couple of transparent electrodes and two polarizing filters. Optical effect is made possible by
polarizing the light in varied amounts and making it pass through the liquid crystal layer. The two types of
LCD technology available are the active matrix of TFT and a passive matrix technology. TFT generates
better picture quality and is more secure and reliable. Passive matrix, on the other hand, has a slow response
time and is slowly becoming outdated.
The advantages of LCD monitors include their compact size which makes them lightweight. They also don’t
consume much electricity as CRT monitors, and can be run off of batteries which makes them ideal for
laptops.
Plasma Monitors
Plasma screen and/or plasma monitors are considered as high contrast screen with bright, vibrant colors and
brightness that claims to make your visual experience worthwhile.
It works on plasma discharge on almost ideally flat panel of glass. The discharge is composed of xenon and
neon without any use of mercury in it. Plasma monitors are in, mainly because of their excellent and
remarkable viewing angles, color saturation, and contrasts.
Central Processing Unit (CPU)
CPU is the component that actually responsible for interpreting and executing most of the commands from
the computer hardware and software and also controls the operation of all other components such as
memory unit, input and output devices. It simply accepts binary data as input and processes data according
to those instructions and provides the result as output. It is the logic machine. So, its main function is run
the program by fetching instructions from the RAM, evaluating and executing them in sequence. In
summary, the function of CPU are as follow:
ICT class notes prepared by Derek Kizito
Read instruction from memory
Communicate with all peripherals using the system bus.
It controls the sequence of instructions.
It controls the flow of data from one component to another component.
Performs the computing task specified in the program.
The CPU has three components responsible for different function, these components are Control units,
arithmetic-logical unit (ALU) and Register.
Components of the processor
Control Unit (CU)
Arithmetic Logic Unit(ALU)
Registers
Control Unit
The control unit provides the necessary timing and control signals to all the operations on the computer. It
controls the flow of data between the CPU, memory and peripherals. It also controls the entire operation of
a computer. It obtains the instructions from the program stored in the main memory, interprets the
instructions and issues the signals, which cause the other units of the system to execute them. So, it is
considered as a central nervous system of a computer that provides status, control and timing signals
necessary for the operation of other parts of CPU, memory and I/O devices. The main functions of control
units are given below:
It performs the data processing operations with the aid of program prepared by the user and send
control signals to various parts of the computer system.
It gives commands to transfer data from the input devices to the memory to an arithmetic logic unit.
It also transfers the results from ALU to the memory and then to the output devices.
It stores a program in the memory.
It fetches the required instruction from the main storage and decode each instruction and hence
execute them in sequence.
Control unit repeats four basic operations:
• Fetch - obtain program instruction or data item from memory
• Decode - translate instruction into commands
• Execute - carry out command
• Store - write result to memory
Arithmetic Logic Unit
This is the area of CPU where various computing functions are performed on data. The ALU performs
arithmetic operations such as addition, subtraction, multiplication and division and logical operation such
as comparison AND, OR and Exclusive OR. The result of an operation is stored in Accumulator or in some
register. The main functions of ALU are as follow:
It accepts operands from registers.
It performs arithmetic and logic operations.
It returns a result to register or a memory.
The logical operations of ALU give the computer the decision-making ability.
Registers
Registers are the high-speed temporary storage locations in the CPU made from electronic devices such as
transistors, flip-flops, etc. So, registers can be thought as CPU’s working memory. Register are primarily
used to store data temporarily during the execution of a program and are accessible to the user through
instructions. These are the part of Control unit and ALU rather than of memory. Hence, their contents can
be handled much faster than the contents of memory. Although the number of registers varies from
computer to computer. There are some registers which are common to all computers. Five registers that are
essential for instruction execution are:
ICT class notes prepared by Derek Kizito
Program Counter (PC): Contains the address of the next instruction to be fetched.
Instruction Register (IR): Contains the instruction most recently fetched.
Memory Address registers (MAR): Contain the address of a location in memory for read and
write operation.
Memory Buffer Register (MBR): It contains the value to be stored in memory or the last value
read from memory.
Accumulator (ACC): An accumulator is a general purpose register used for storing temporary
result and result produced by the arithmetic logic unit.
What is a machine cycle?
•Four operations of the CPU comprise a machine cycle . Also called instruction cycle
• Execution time (e-time) - time taken to execute and store e-time
• Instruction time (i-time) - time taken to fetch and decode
What is pipelining? Machine Cycle (without pipelining) Machine Cycle (with pipelining) Instruction 1
Instruction 2 Instruction 3 Instruction 4
CPU begins executing second instruction before completing first instruction
Results in faster processing
What is the system clock?
Its a device that generates clock pulses (timings) that the CPU uses to control an operation. It synchronizes
all computer operations
What is a microprocessor?
Single processor chip found in personal computers
MEMORY
Are devices that hold data, instructions and information temporarily ie for a short period of time. Also
known as temporal memory or primary memory or internal memory
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the
storage space in computer where data is to be processed and instructions required for processing are stored.
The memory is divided into large number of small parts called cells. Each location or cell has a unique
number called memory address which varies from zero to memory size minus one. For example if
computer has 64k words, then this memory unit has 64 * 1024=65536 memory locations. The address of
these locations varies from 0 to 65535.
A collection of cells form a location and a location has the following:
Memory address which is a unique number assigned to each location to uniquely identify a location
Size which measures the volume of data stored in a given location which can be in different units
such as bytes, Megabytes, Kilobytes
ICT class notes prepared by Derek Kizito
Name- is a name given to each location
Memory is primarily of three types
Cache Memory
Primary Memory/Main Memory
Secondary Memory
Cache Memory Cache memory is a very high speed semiconductor memory which can speed up CPU. It
acts as a buffer between the CPU and main memory. It is used to hold those parts of data and program
which are most frequently used by CPU. The parts of data and programs are transferred from disk to cache
memory by operating system, from where CPU can access them.
Advantages
The advantages of cache memory are as follows:
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantages
The disadvantages of cache memory are as follows:
Cache memory has limited capacity.
It is very expensive.
The cache memory lies in the path between the processor and the memory. The cache memory therefore, has
lesser access time than memory and is faster than the main memory..
Primary memory
Also called main memory or temporal memory or internal memory. Main memory refers to physical memory
that is internal to the computer which stores data, instructions and information for a short period of time. The
computer can manipulate only data that is in main memory. Therefore, every program you execute and every
file you access must be copied from a storage device into main memory. The amount of main memory on a
computer is crucial because it determines how many programs can be executed at one time and how much
data can be readily available to a program.
Characteristics of Main Memory
Usually volatile memory, it only holds data when powered hence data is lost in case power is
switched off.
It is working memory of the computer, what the computer is working on must be loaded to main
memory
Faster than secondary memories.
A computer cannot run without primary memory.
Types of primary memory
Flash Drive
This is also known as a pen drive. It helps in easy transportation of data from one system to another. A pen
drive is quite compact and comes with various features and designs. Pen drive is a portable memory device
that uses solid state memory rather than magnetic fields or lasers to record data. It uses a technology similar
to RAM, except that it is nonvolatile.
Optical disks
1. CD Drive
CD stands for Compact Disk. CDs are circular disks that use optical rays, usually lasers, to read and write
data. They are very cheap as you can get 700 MB of storage space for less than a dollar. CDs are inserted in
CD drives built into CPU cabinet. They are portable as you can eject the drive, remove the CD and carry it
with you. There are three types of CDs −
CD-ROM (Compact Disk – Read Only Memory) − The data on these CDs are recorded by the
manufacturer. Proprietary Software, audio or video are released on CD-ROMs.
CD-R (Compact Disk – Recordable) − Data can be written by the user once on the CD-R. It
cannot be deleted or modified later.
ICT class notes prepared by Derek Kizito
CD-RW (Compact Disk – Rewritable) − Data can be written and deleted on these optical disks
again and again.
2. DVD Drive
DVD stands for Digital Video Display. DVD are optical devices that can store 15 times the data held by
CDs. They are usually used to store rich multimedia files that need high storage capacity. DVDs also come in
three varieties – read only, recordable and rewritable.
3. Blu Ray Disk (BD) is an optical storage media used to store high definition (HD) video and other
multimedia filed. BD uses shorter wavelength laser as compared to CD/DVD. This enables writing arm to
focus more tightly on the disk and hence pack in more data. BDs can store up to 128 GB data.
Peripheral Device
A peripheral device, also sometimes called an auxiliary device, is any connected device, internal or external,
that provides a computer with additional functionality.
Peripheral devices can be external or internal. For example, a printer is an external device that you connect
using a cable, while an optical disc drive is typically located inside the computer case. Internal peripheral
devices are also referred to as integrated peripherals. When most people refer to peripherals, they typically
mean external ones.
Examples of external peripherals include mouse, keyboard, printer, monitor, external Zip drive or
scanner.
Examples of internal peripherals include CD-ROM drive, CD-R drive or internal modem.
Measurements of memory
Memory size or memory capacity refers to the maximum amount of data that a memory device can
hold. Memory can be can be measured in several units.These units include:-
Bit
Byte
Kilobyte
Megabyte
Gigabyte
Therefore we can say that:-
I digit= 1 bit
8 bits=1 byte
1000 bytes=1 Kilobyte
1024 Kilo bytes= 1 Megabyte
1024 Megabyte= 1 Gigabyte
COMPUTER BUSES
A computer system comprises so many components which need to work together and therefore there is a
great need to have these components interconnected for them to work. This interconnection is provided for
by the use of internal pathway through which information is passed through one component to the other.
Inside computers, there are many internal components. In order for these components to communicate with
each other they make use of wires that are known as a ‘bus’ .
A bus is a common pathway through which information flows from one computer component to another.
This pathway is used for communication purpose and it is established between two or more computer
components. We are going to check different computer bus architectures that are found in computers.
FUNCTIONS OF BUSES
ICT class notes prepared by Derek Kizito
I. Data Addressing. For data to be sent to and from the processor, the computer has to have pathways that
facilitate data addressing processes at the speed of the Processor.
II. Data Sharing. The Peripherals connected to the computer have to share data with the computer
through the Expansion bus.
III. Power. Chipsets mounted inside the computer such require power to operate. This power is supplied
within the computer through special pathways, unlike Hard Disks, Floppy Disks and CD-ROMs which
need to be connected to the Power Supply channels.
IV. Timing. To synchronize the operations of the computer devices together with the peripherals
connected to it, the signals generated by the System Clock have to be communicated between these
components.
All PCs internal components, external devices and peripherals are connected to the CPU and Main Memory
through Buses. The fastest Bus is that between the Processor and the Primary cache. The next level is the
System Bus which links the Processor with the Main Memory.
he computer case serves critical functions much as skin does for the human body. System cases protect the
computer chassis, hard drive, motherboard, and other internal components for advanced blade servers,
computer networks, or small desktop units. The desktop computer case protects internal components from
electrical interference, physical damage, and intrusive foreign objects. Systems cases provide an
aesthetically pleasing appearance, generate organized internal structure, keep components separated, and
help to cool systems by enabling better air circulation. These external computer case shells generate space
for expansion slots, warning lights, graphics cards, RAM, and other server applications.
The computer system unit is the enclosure for all the other main interior components of a computer. It is
also called the computer case, computer chassis, or computer tower. Cases are typically made of steel or
aluminum, but plastic can also be used.
Functions
The primary function of the computer system unit is to hold all the other components together and protect
the sensitive electronic parts from the outside elements.
The desktop computer case protects internal components from electrical interference, physical damage, and
intrusive foreign objects. Systems cases provide an aesthetically pleasing appearance, generate organized
internal structure, keep components separated, and help to cool systems by enabling better air circulation.
These external computer case shells generate space for expansion slots, warning lights, graphics cards,
RAM, and other server applications.
The motherboard holds together the central processing unit or CPU and connectors for input and output
devices
A hard disk functions as a secondary media that uses magnetic principle to store data and information
permanently
Optical drive functions as a secondary media that uses magnetic principle to store data and information
permanently
Connectors also known as ports provides physical connection between peripheral devices such as mouse,
keyboard with the system units
Power supply is a hardware component that supplies a refined power output to all other components such
as hard disk, optical drive etc
CPU:-The CPU is the central electronic chip that determines the processing power of the computer
Expansion slots allows one to add more hardware devices such as sound card, tv card, network card so as
to improve on the functionalities of a computer
Bays:-A bay is a space inside the computer case where a hard drive, floppy drive or CD- ROM drive sits
Types of coaxial
Thicknet cable (also known as 10Base5) is a fairly thick cable (0.5 inches in diameter). The 10Base5
designation refers to the 10 Mbps maximum data rate , baseband signalling and 500 metre maximum segment
length
ICT class notes prepared by Derek Kizito
Thinnet cable (also known as 10Base2) is thinner than Thicknet (approximately 0.25 inches in diameter) and as a
consequence is cheaper and far more flexible. The 10Base2 designation refers to the 10 Mbps maximum data
rate , baseband signalling and 185 (nearly 200) metre maximum segment length
Types
Single mode
Multimode
Wireless or Unguided Media or Unbound Transmission Media: wireless transmission media are the ways of
transmitting data without using any cables. These media are not bounded by physical geography. This type of
transmission is called Wireless communication. Nowadays wireless communication is becoming popular.
Wireless LANs are being installed in office and college campuses. This transmission uses Microwave, Radio
wave, Infra red are some of popular unbound transmission media.
Factors to be considered while selecting a Transmission Medium
1. Transmission Rate
2. Cost and Ease of Installation
3. Resistance to Environmental Conditions
4. Distances
Types of Networks
Criteria for classifying networks
ICT class notes prepared by Derek Kizito
i. According to span( distance between the nodes)
ii. Relationship between the nodes
iii. According to topology
iv. Jlj
1) According to span( distance between the nodes)
a) Local Area Network (LAN)
A LAN connects network devices over a relatively short distance. It is smallest network compared to the
other two networks.
The simplest form of LAN is to connect two computers together. LAN is operated within a limited physical
area, such as at home, school, a single building or several buildings.
A network which consists of less than 500 interconnected devices across several buildings is still recognized
as a LAN.
In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a
single person or organization. They also tend to use certain connectivity technologies,
primarily Ethernet and Token Ring
b. Wide Area Network (WAN)
A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN connects
different smaller networks, including local area networks (LAN) and metro area networks (MAN). This ensures
that computers and users in one location can communicate with computers and users in other locations. WAN
implementation can be done either with the help of the public transmission system or a private network.
A WAN connects more than one LAN and is used for larger geographical areas. WANs are similar to a banking
system, where hundreds of branches in different cities are connected with each other in order to share their
official data.
A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP is the protocol used for a
WAN in combination with devices such as routers, switches, firewalls and modems.
c) Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is similar to a local area network (LAN) but spans an entire city or campus.
MANs are formed by connecting multiple LANs. Thus, MANs are larger than LANs but smaller than wide area
networks (WAN).
MANs are extremely efficient and provide fast communication via high-speed carriers, such as fiber optic
cables.
A MAN is ideal for many kinds of network users because it is a medium-size network. MANs are used to build
networks with high data connection speeds for cities and towns.
The working mechanism of a MAN is similar to an Internet Service Provider (ISP), but a MAN is not owned by
a single organization. Like a WAN, a MAN provides shared network connections to its users. A MAN mostly
works on the data link layer, which is Layer 2 of the Open Systems Interconnection (OSI) model.
Campus Area Network – it is a network spanning multiple LANs but smaller than a MAN, such as on a
university or local business campus.
2. According to topology
Network topology is the how computers are physically interconnected and they communicate
Types of topology
a) Physical topology
How computers are physically interconnected
Star topology
A star network features a central connection point called a "hub" that may be a hub, switch or router. This
topology consist of a central nodes or a central wiring system to which all other nodes are connected,
ICT class notes prepared by Derek Kizito
Merits
Diagnostic and isolation of problem is easy
Easy to add a new computer system to the network
Failure of one workstation does not affect the entire network
Uses a single access protocols
Provide ease of service
Is very fast
Demerits
Requires more cable length than a linear topology.
If the hub or concentrator fails, nodes attached are disabled.
More expensive than linear bus topologies because of the cost of the concentrators.
Becomes expensive when purchasing the nodes
Always requires very long cable length when connecting many nodes
Ring topology
In a ring network, every device has exactly two neighbors for communication purposes. All messages (token)
travel through a ring in the same direction (either "clockwise" or "counterclockwise each node is connected to
form a single, closed data path. Data from one node is passed along to the next node from which it will be
examined, and if that node is not the intended destination, then it is transmitted to the next node until the
destination is reached. Versions of ring topology include
Single ring – All the devices on the network share a single cable
Dual ring – The dual ring topology allows data to be sent in both directions.
Merits
The ability to achieve transmission rates of the order of 10 million bits per second
Provision of local communication via a single channel
No central server which reduces the cost of establishing the ring topology
Demerits
Failure of one node result into entire network failure
Detection of fault is very difficult in ring topology
Isolation of fault is not easy in this topology
Dual Ring
Single Ring
ICT class notes prepared by Derek Kizito
Bus topology
It is the simplest method of networking computers. It consists of a single cable known as a trunk, backbone or
segment that connects all the computers in the network. Each system is directly attached to a common
communication channel. Signal that is transmitted over the channel makes up the messages.
Trunk/backbone
Merits
Cheap because of its simplicity
Requires a short cable length
Easy to expand the network
Simple to setup compared to Star and Ring topology
There is no chances of data collision since one computer transmit at a time
Locating cable fault in a bus topology is relatively easy
Bus topology is ideal for one to many data transmission
Signal on the cable are bidirectional hence reaches all the nodes
Demerits
Fault diagnosis is difficult in a bus topology – detection of fault may have to be performed from any point in
the network.
Fault isolation is difficult – if fault in the node is detected the node can simply be removed but if the fault is
in network medium itself and entire segment of the Bus must be disconnected to isolate the fault
Mesh topology
A mesh network in which every device connects to every other is called a full mesh. As shown in the
illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
ICT class notes prepared by Derek Kizito
Tree topology
Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest
form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree
of devices.
APPLICATIONS OF INTERNET
3.4.1 Applications of internet:
The internet is treated as one of the biggest invention. It has a large number of uses.
1. Communication
2. Job searches
3. Finding books and study material
4. Health and medicine
5. Travel
6. Entertainment
7. Shopping
8. Stock market updates
9. Research
10. Business use of internet: different ways by which internet can be used for business are:
• Information about the product can be provided can be provided online to the customer.
ICT class notes prepared by Derek Kizito
• Provide market information to the business
• It helps business to recruit talented people
• Help in locating suppliers of the product.
• Fast information regarding customers view about company’s product
• Eliminate middle men and have a direct contact with contact with customer.
• Providing information to the investor by providing companies back ground and financial information on web
site.
INTERNET SERVICES
1- World Wide Web (WWW)
The World Wide Web is commonly known as web. It is a network of web servers that stores web pages. The
web pages are connected to each other using hyperlinks. The user can jump from one page to another by clicking
the hyperlinks. The web web pages are accessed using web browsers. The HTTP (Hyper Text Transfer Protocol)
protocol is used for communication between browser and web servers.
2- E-Mail
E-mail stands for electronic email. It is the most popular service provided by the Internet. It provides the fast
and efficient way to send and receive messages through Internet. One message can be sent to many persons with
a single e-mail. Different types of files can also be sent through e-mail.
3- Telnet
Telnet is an abbreviation for Terminal Network. It is software. It is used to connect to a remote or host
computer for accessing information. Through this service, the user can also access information on the Internet.
When a user runs this software on his/her computer, it provides a prompt on the user's computer screen. The user
can access the host computer by giving commands through this prompt. When a command is sent to the host
computer, information is accessed from host and displayed on user's computer screen. The user's computer
linked to the remote computer will act as a terminal. The expert users mostly use this service. In some remote
servers, this service is not allowed.
4- File Transfer Protocol (FTP)
FTP stands for File Transfer Protocol. It is a way for transferring files from one computer to another. The
process of transferring a file from a server (or remote computer) to local computer is called downloading.
Similarly, the process for transferring a file from local computer to the server on the Internet is called uploading.
Different FTP client programs are available for uploading and downloading files to and from the server. The
most commonly used FTP client programs are WS_FTP and Cute FTP.
5- Gopher
A gopher is a menu-based information retrieval system. It is used for retrieving files and programs on the
Internet. Gopher allows access to files found on FTP servers and web servers.
6- Chat Groups
Internet provides the facility to Internet users to chat (talk) with people online all over the world. Different
programs like MSN Messenger, Yahoo Messenger, AOL online etc. are available for chatting on the Internet.
Chat rooms allow the users to participate in a chat on the Internet. Chat rooms on are locations on the web that
provide facilities to the users to chat with each other online over the Internet. They send messages by typing with
keyboard and receive messages from other end instantly. Some chat rooms support voice chats and video chats
where people talk with each other and see them also.
a) Explain any three benefits of computer networks
Facilitate communication via email, video conferencing, instant messaging, etc.
Enable multiple users to share a single hardware device like a printer or scanner
Enable file sharing across the network
Allow for the sharing of software or operating programs on remote systems
ICT class notes prepared by Derek Kizito
Make information easier to access and maintain among network users
b) Describe any three uses of the internet
Research: Anyone can be able to find articles or information readily available on the Internet. It is an
open library with access to some university online libraries.www.google.com
To Communicate: The Internet has enabled users to get faster and more reliable communication.
Communication ranges from electronic mail to Internet access. Through chatting and emails the Internet
can be used to meet people. www.yahoo.com.
To shop: The Internet offers a wide range of goods that can be bought online e.g. cars, books e.t.c.
However, security online is still questionable. E.g www.amazon.com
To have Fun: The Internet provides access to many games that one can download to play online.
(Entertainment in form of music, movies etc)
Internet
Internet is defined as an Information super Highway, to access information over the web. However, It can be
defined in many ways as follows:
Internet is a world-wide global system of interconnected computer networks.
Internet uses the standard Internet Protocol (TCP/IP).
Every computer in internet is identified by a unique IP address.
IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer location.
A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can
locate a computer by a name.
For example, a DNS server will resolve a name http://www.tutorialspoint.com to a particular IP address
to uniquely identify the computer on which this website is hosted.
Internet is accessible to every user all over the world.
Evolution
The concept of Internet was originated in 1969 and has undergone several technological & Infrastructural
changes as discussed below:
The origin of Internet devised from the concept of Advanced Research Project Agency Network
(ARPANET).
ICT class notes prepared by Derek Kizito
ARPANET was developed by United States Department of Defense.
Basic purpose of ARPANET was to provide communication among the various bodies of government.
Initially, there were only four nodes, formally called Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located at different countries and thus
became known as Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW, browsers,
scripting languages etc.,Internet provided a medium to publish and access information over the web.
Advantages
Internet covers almost every aspect of life, one can think of. Here, we will discuss some of the advantages of
Internet:
Internet allows us to communicate with the people sitting at remote locations. There are various apps
available on the wed that uses Internet as a medium for communication. One can find various social
networking sites such as:
o Facebook
o Twitter
o Yahoo
o Google+
o Flickr
o Orkut
One can surf for any kind of information over the internet. Information regarding various topics such as
Technology, Health & Science, Social Studies, Geographical Information, Information Technology,
Products etc can be surfed with help of a search engine.
Apart from communication and source of information, internet also serves a medium for entertainment.
Following are the various modes for entertainment over internet.
o Online Television
o Online Games
o Songs
o Videos
o Social Networking Apps
Internet allows us to use many services like:
o Internet Banking
ICT class notes prepared by Derek Kizito
o Matrimonial Services
o Online Shopping
o Online Ticket Booking
o Online Bill Payment
o Data Sharing
o E-mail
Internet provides concept of electronic commerce, that allows the business deals to be conducted on
electronic systems
Disadvantages
However, Internet has prooved to be a powerful source of information in almost every field, yet there exists
many disadvanatges discussed below:
There are always chances to loose personal information such as name, address, credit card number.
Therefore, one should be very careful while sharing such information. One should use credit cards only
through authenticated sites.
Another disadvantage is the Spamming.Spamming corresponds to the unwanted e-mails in bulk. These e-
mails serve no purpose and lead to obstruction of entire system.
Virus can easily be spread to the computers connected to internet. Such virus attacks may cause your
system to crash or your important data may get deleted.
Also a biggest threat on internet is pornography. There are many pornographic sites that can be found,
letting your children to use internet which indirectly affects the children healthy mental life.
There are various websites that do not provide the authenticated information. This leads to misconception
among many people.
Intranet
Intranet is defined as private network of computers within an organization with its own server and firewall.
Moreover we can define Intranet as:
Intranet is system in which multiple PCs are networked to be connected to each other. PCs in intranet are
not available to the world outside of the intranet.
Usually each company or organization has their own Intranet network and members/employees of that
company can access the computers in their intranet.
Every computer in internet is identified by a unique IP address.
Each computer in Intranet is also identified by a IP Address, which is unique among the computers in that
Intranet.
ICT class notes prepared by Derek Kizito
Benefits
Intranet is very efficient and reliable network system for any organization. It is beneficial in every
aspect such as collaboration, cost-effectiveness, security, productivity and much more.
Communication
ICT class notes prepared by Derek Kizito
Intranet offers easy and cheap communication within an organization. Employees can communicate using chat,
e-mail or blogs.
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement and it can be accessed by the
authorized users, resulting in enhanced teamwork.
Platform Independency
Intranet can connect computers and other devices with different architecture.
Cost Effective
Employees can see the data and other documents using browser rather than printing them and distributing
duplicate copies among the employees, which certainly decreases the cost.
Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the employees work
faster.
Business Management
It is also possible to deploy applications that support business operations.
Security
Since information shared on intranet can only be accessed within an organization, therefore there is almost no
chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know whom he is
interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.
Issues
Apart from several benefits of Intranet, there also exist some issues.. These issues are shown in the following
diagram:
ICT class notes prepared by Derek Kizito
Applications
Intranet applications are same as that of Internet applications. Intranet applications are also accessed
through a web browser. The only difference is that, Intranet applications reside on local server while
Internet applications reside on remote server. Here, we've discussed some of these applications:
ICT class notes prepared by Derek Kizito
PowerPoint is a program that allows you to present ideas with text, graphics, sounds, video, and animation. To
understand PowerPoint better, you must first become familiar with special terms used by the program. This
document provides definitions of many terms you may encounter when working with PowerPoint.
Animations
Animation is a visual or sound effect accompanying text or graphics. For example, you can have an Excel pie
chart appear one slice at a time, allowing you to discuss one slice before the next appears. For more information
on animation, refer to Using Animation (Win | Mac).
Clip Art
Clip Art is the collection of pictures available in the PowerPoint Clip Art gallery.
Master
A Master contains formatting and design elements common to every slide in your presentation. There are three
types of master slides: the Slide Master (Win | Mac), Handout Master (Win | Mac), and Notes Master.
Objects
An Object can be an item that you create or a graphic that you import from another source (such as a scanned
image). Some examples include text boxes, Clip Art, WordArt, SmartArt, and shapes.
Presentation
The Presentation is the file containing the collection of slides. A PowerPoint 2007/2008 file has
a .pptxextension.
Slide Show
A Slide Show is the presentation of your PowerPoint slides. A slide show can be viewed online, on a computer
(e.g., set to loop continuously in a display booth), or projected to a screen (e.g., live conference presentation).
Template
A Template contains slide default settings. These characteristics include colors, fonts, bullet types, and special
elements such as graphics.
Transitions
A Transition is the effect that takes place when you advance from one slide to the next. This feature is available
only with Slide Shows.
Wizard
A Wizard is a step-by-step guide for completing a task.
ICT class notes prepared by Derek Kizito
Slide and Slideshow
Think back to the days of the old-fashioned slideshow that used a slide projector. PowerPoint produces an
updated version of sorts. Slideshows can comprise text and graphics or be completely covered by a single
picture, as in a photo album.
Each page of a PowerPoint presentation is called a slide. The default orientation of the slide is landscape. You
can change the slide orientation and the slide size. Add text, graphics, and pictures to the slide to enhance its
appeal and illustrate your point.
Bullet or Bulleted List
Bullets are small dots, squares, dashes, or graphic objects that begin a short descriptive phrase. Almost every
slide type in PowerPoint contains a placeholder text box for a bulleted list. You'll use these bulleted list text
boxes to enter key points or statements about your topic. When creating the list, press Enter to add a new
bullet for the next point you want to add.
Design Template
Think of a design template as a coordinated package deal. When you decorate a room, you use colors and
patterns that work together. A design template acts in much the same way. Even though different slide
types can have different layouts and graphics, the design template ties the whole presentation together in an
attractive package.
Slide Layouts and Slide Types
The terms slide type and slide layout are used interchangeably. PowerPoint has a few types of slide layouts.
Depending on the type of presentation you are creating, you may use several different slide layouts or just
keep repeating the same few.
Slide types/layouts include, for example:
Title slides
Section heading slides
Picture with caption slides
Content slides for adding charts, pictures, and tables
Blank slides
Slide Views
There are several ways to view slides and slideshows. These views are:
Normal view: Also commonly known as slide view. It is the main working window in the presentation.
The slide is shown at its full size on the screen.
Outline view: Shows all the text of all slides, in a list on the left of the PowerPoint screen. No graphics
display in this view. Outline view is useful for editing and can be exported as a Word document to use
as a summary handout.
Slide Sorter view: Displays thumbnail versions of all your slides, arranged in horizontal rows. This
view is useful for making global changes to several slides at one time. Rearranging or deleting slides is
easy to do in slide sorter view.
Notes Page view: Shows a smaller version of a slide with an area underneath for notes. Each slide is
created on its own notes page. Print these pages to use as a reference while making the presentation.
The notes do not show on the screen during the presentation.
Task Pane
Located on the right side of the screen, the task pane changes to show options that are available for the current
task that you are working on. For example, when changing the background for a slide, the Format Background
task pane appears; when adding animations, you'll set animation options in the Animation pane.
Transition
Slide transitions are the visual effects that appear as one slide changes to another. PowerPoint offers several
different transitions, such as fade and dissolve.
Animations and Animation Schemes
ICT class notes prepared by Derek Kizito
In Microsoft PowerPoint, animations are visual effects applied to individual items such as graphics, titles, or
bullet points, rather than to the slide itself. Apply preset visual effects to paragraphs, bulleted items, and titles
from a variety of animation groupings.
PowerPoint Online
PowerPoint Online is the web version of PowerPoint. It allows a PowerPoint presentation to be played on any
computer, even one that doesn't have PowerPoint installed. To use PowerPoint Online, you'll need a Microsoft
account or an Microsoft 365 work or school account. To view a presentation in a web browser, save the
presentation to OneDrive or Dropbox and open it in PowerPoint Online.
Slide Master
The default design template when starting a PowerPoint presentation is a plain, white slide. When you want to
design your own template, use the Slide Master. After you update the Slide Master with your design choices,
all the slides in your presentation will use the fonts, colors, and graphics in the Slide Master. Each new slide
that you create takes on these aspects.
Action Button: An action button is an item that can be added to a presentation that contains pre-programmed
commands for performing commonly done tasks. An example of an action button is the right pointing arrow
which, when clicked during a presentation, will advance the viewer to the next slide.
Animation: Animation refers to visual effects that are added to individual items (such as titles, bulleted text
and graphics) on a slide rather than to the slide itself. Animation that is applied to the changing of one slide to
the next is known as "Transistion".
Bullets/ Bulleted List: A bulleted list is used to enter key points or phrases. Each key point or phrase begins
with a bullet, which is a small dot, square or other graphic. The 'Enter' key on the keyboard is used to end one
list item and begin another one with a new bullet. The bulleted list layout is the preferred method of presenting
text in a slideshow.
Color Theme: A predefined set of complementary colors that can be applied to elements in a PowerPoint
presentation.
Design Theme: A design theme is a predefined set of formatting options that control the look and feel of
your presentation. Theme settings include backgrounds, layout, colors, fonts, sizes and bullets.
Flip: Flipping an object (either horizontally or vertically) will create a mirror image of the object in the
direction that is chosen.
Handouts: When printing a PowerPoint presentation, it is important to check the print settings before
sending the file to print. One of the options most commonly used is to print a presentaton is the "Handouts"
option rather than "Full Page Slides". The handouts options allows you to print multiple slides on a page, saving
paper, ink and toner.
Handout Master: The master view that determines the layout and formatting of the printable handouts. (see
also "Master" and "Slide Master").
Layout (Slide Layout): When adding a new slide to a presentation, you must first decide on the type of
layout you would like to use. There are several different types of layouts available in PowerPoint and the layout
that you choose depends on the type of information that you will be displaying on the slide. For example, the
first introductory slide in a presentation would most likely use the Title Slide Layout, while a Bulleted Slide
Layout would be more appropriate for a slide that is covering several key points presented in a list. Other slide
layouts include Content Layout (which could contain items such as images, video and charts) and Section
Header Layout (which assists you in breaking up and separating sections of a larger presentation into
manageable parts). In addition to the predefined layouts, you can also choose the Blank Layout option which
would allow you to place items wherever you would like to on the slide.
ICT class notes prepared by Derek Kizito
Master (Slide Master): The Slide Master is a template that stores all of the design options that you would
like to apply including font styles, placeholder sizes and positions, color schemes and background designs and
images. The power of the slide master comes when you would like to make a change to all slides in a
presentation. For example if you would like to add a logo or image to the bottom right corner to all slides in your
slideshow, you could simply add the image to the Slide Master in the desired location. Every slide based on the
Slide Master would then have the image added to it. The Slide Master can also be used to make global changes
in formatting such as font type, size, bullet shape and color. There are also similar Master templates for speakers
notes and handouts.
Normal View: The Normal View in Powerpoint displays three items as you work on creating your
presentation. The items in the normal view are the Slides and Outline Pane (found on the left of side of the
window), the Slide Pane (the main area of the window for working on the content of your slides) and the Notes
Pane (found at the bottom of the window).
Notes Master: The Notes Master view determines the layout and formatting of the printable speaker's notes.
(see also "Master" and "Slide Master").
Notes Pane: The Notes Pane is the white area at the bottom of the Powerpoint window, directly below the
main Slide Pane. It is used to add speaker notes to your slides that will not appear to your audience during the
slideshow.
Notes Page View:The Notes Page View displays an image of the current slide as well as any Notes that have
been added to it in the Notes Pane. In the Notes Page View, the area in which you can type is larger and allows
you to add additional items to your notes such as images.
Outline View: The Outline View is found on the left side of the PowerPoint window with the Slides and
Outline Pane. You control how the pane displays your presentation in this pane by using Slides and Outline tabs
at the top of the pane. The Slide view will show miniature images of your slides (complete with images, layout
and formatting) while the Outline View will only show the text (in bullet form) that exists on each slide. The
outline view is very useful for proofreading an entire presentation, editing text, or exporting text-based content to
another application such as Microsoft Word.
Placeholder: A placeholder on the slide is a holding area where you will add your content. When you choose
a particular slide layout, it will included standard placeholders (in the shape of rectangles) in which you can click
to either type text or insert another item, such as an image. Additional placeholders can be added to the standard
slide layout as needed.
Presentation File: A presentation file is the end result of what is created using the PowerPoint application.
The presention file contains any work that you have done in PowerPoint such as your slides, text, images, sound,
transitions, animations, timing settings and notes pages.
Rotate: Rotating an object is the action of turning an object on a slide so that it faces another direction. When
a placeholder is selected in Powerpoint, a green dot will appear at the top of the placeholder. This dot can be
used to rotate the object to the desired new angle.
Slide: A slide is an individual page (or screen) in a slideshow. Content such as text (bullets), images, sound,
animations, etc. are added to each slide.
ICT class notes prepared by Derek Kizito
Slide Layout: When adding a new slide to a presentation, you must first decide on the type of layout you
would like to use. There are several different types of layouts available in PowerPoint and the layout that you
choose depends on the type of information that you will be displaying on the slide. For example, the first
introductory slide in a presentation would most likely use the Title Slide Layout, while a Bulleted Slide Layout
would be more appropriate for a slide that covering several key points presented in a list. Other slide layouts
include Content Layout (which could contain items such as images, video and charts) and Section Header
Layout (which assists you in breaking up and separating sections of a larger presentation in to manageable parts.
In addition to the predefined layouts, you can also choose the Blank Layout option which would allow you to
place items wherever you would like to on the slide.
Slide Master: The Slide Master is a template that stores all of the design options that you would like to apply
including font styles, placeholder sizes and positions, color schemes and background designs and images. The
power of the slide master comes when you would like to make a change to all slides in a presentation.
Presentation
a set of slides or handouts that contains information you want to convey to an audience.
Normal View
PowerPoint's default view that displays the slide pane, the Notes pane , and the slides / Outline pane.
Placeholders
Designated areas in PowerPoint layouts that can be used to easily insert text, graphics, or multimedia objects.
Active Slide
The slide currently selected or displayed.
Slide Layout
Prearranged sets of placeholders for various types of slide content.
Theme
Formatting feature that applies a background, colors, fonts, and effects to all slides in a presentation.
Clip Art
Pre-drawn artwork, photos, animations, and sound clips that you can insert into your files.
Contextual Tab
a Ribbon tab that displays only when needed for a specific task such as formatting a table or offering picture
formatting options.
Font
A set of characters with a specific size and style.
Template
A presentation that is already formatted with a slide design and may also include sample text to guide you in
completing the presentation.
Footer
An area at the bottom of a slide in which you can enter a date, slide number, or other information.
Header
An area at the top of a slide in which you can enter a date or other information that repeats for each page.
Handouts
Printed copies of the presentation for the audience to refer to during and after the slide show.
Landscape Orientation
A slide or printout that is taller than it is tall.
Portrait Orientation
A slide or printout is taller than it is wide.
AutoFit
PowerPoint feature designed to reduce font size to fit text in the current placeholder.
Crop
ICT class notes prepared by Derek Kizito
Remove a portion of a picture that you don't want.
Scaling
Specifying a percentage of the original dimensions to enlarge or reduce a picture or shape.
Slide Master
A slide that stores information about the formats applied in a presentation, such as theme, fonts, layouts, and
colors.
Template
A document that contains formatting, styles, and sample text that you can use to create new documents.
Transitions
The visual effects used when one slide moves off of the screen and another moves onto the screen.
Advance Slide Timing
A setting that controls the amount of time a slide displays on the screen.
COMPUTER FILES
Computer files
A computer file is a resource for storing information, which is available to a computer program and is usually
based on some kind of durable storage. A file is "durable" in the sense that it remains available for other
programs to use after the program that created it has finished executing.
, computer file types can be characterized in a few major groups as follows:
System File - These usually exist in the “Windows” folder. In most litigation cases, these files are not
necessary, but in some cases, they may be critically important. This needs to be documented in the Litigation
Response Plan.
Program Files - These usually exist in the “Program Files” folder (e. g. Microsoft and Adobe products). In
most litigation cases, these files are not necessary, but in some cases, they may be critically important. This
needs to be documented in the Litigation Response Plan.
Document Files – For example, Microsoft Word or Excel files. These are often important in litigation.
Multimedia Files – For example, video, audio, and graphic files. These are often important in intellectual
property cases.
Emails – A common and important data type in litigation.
What is File Organizations?
File organization refers to the way data is stored in a file. File organization is very important because it
determines the methods of access, efficiency, flexibility and storage devices to use. There are four
methods of organizing files on a storage media. This include:
sequential,
random,
serial and
indexed-sequential
1. Sequential file organization
Records are stored and accessed in a particular order sorted using a key field.
Retrieval requires searching sequentially through the entire file record by record to the end.
Because the record in a file are sorted in a particular order, better file searching methods like the binary
search technique can be used to reduce the time used for searching a file .
Since the records are sorted, it is possible to know in which half of the file a particular record being
searched is located, Hence this method repeatedly divides the set of records in the file into two halves
and searches only the half on which the records is found.
For example, of the file has records with key fields 20, 30, 40, 50, 60 and the computer is searching for a
record with key field 50, it starts at 40 upwards in its search, ignoring the first half of the set.
Advantages of sequential file organization
ICT class notes prepared by Derek Kizito
The sorting makes it easy to access records.
The binary chop technique can be used to reduce record search time by as much as half the time taken.
Disadvantages of sequential file organization
The sorting does not remove the need to access other records as the search looks for particular records.
Sequential records cannot support modern technologies that require fast access to stored records.
The requirement that all records be of the same size is sometimes difficult to enforce.
1. Random or direct file organization
Records are stored randomly but accessed directly.
To access a file stored randomly, a record key is used to determine where a record is stored on the
storage media.
Magnetic and optical disks allow data to be stored and accessed randomly.
Advantages of random file access
Quick retrieval of records.
The records can be of different sizes.
1. Serial file organization
Records in a file are stored and accessed one after another.
The records are not stored in any way on the storage medium this type of organization is mainly used on
magnetic tapes.
Advantages of serial file organization
It is simple
It is cheap
Disadvantages of serial file organization
It is cumbersome to access because you have to access all proceeding records before retrieving the one being
searched.
Wastage of space on medium in form of inter-record gap.
It cannot support modern high speed requirements for quick record access.
1. Indexed-sequential file organization method
Almost similar to sequential method only that, an index is used to enable the computer to locate individual
records on the storage media. For example, on a magnetic drum, records are stored sequential on the tracks.
However, each record is assigned an index that can be used to access it directly.
File Access Methods
Information is kept in files. Files reside on secondary storage. When this information is to be used, it has to be
accessed and brought into primary main memory. Information in files could be accessed in many ways. It is
usually dependent on an application. There are three file access methods.
a) Sequential Access: A simple access method, information in a file is accessed sequentially one record
after another. To process the with record all the 1-1 records previous to 1 must be accessed. Sequential
access is based on the tape model that is inherently a sequential access device. Sequential access is best
suited where most of the records in a file are to be processed. For example, transaction files.
b) Direct Access: Sometimes it is not necessary to process every record in a file. It may not be necessary to
process records in the order in which they are present. Information present in a record of a file is to be
accessed only if some key value in that record is known. In all such cases, direct access is used. Direct
access is based on the disk that is a direct access device and allows random access of any file block.
Since a file is a collection of physical blocks, any block and hence the records in that block are accessed.
For example, master files. Databases are often of this type since they allow query processing that
involves immediate access to large amounts of information. All reservation systems fall into this
category. Not all operating systems support direct access files. Usually files are to be defined as
sequential or direct at the time of creation and accessed accordingly later. Sequential access of a direct
access file is possible but direct access of a sequential file is not.
ICT class notes prepared by Derek Kizito
c) Indexed Sequential Access: This access method is a slight modification of the direct access method. It is
in fact a combination of both the sequential access as well as direct access. The main concept is to access
a file direct first and then sequentially from that point onwards. This access method involves maintaining
an index. The index is a pointer to a block. To access a record in a file, a direct access of the index is
made. The information obtained from this access is used to access the file. For example, the direct access
to a file will give the block address and within the block the record is accessed sequentially. Sometimes
indexes may be big. So hierarchies of indexes are built in which one direct access of an index leads to
info to access another index directly and so on till the actual file is accessed sequentially for the particular
record. The main advantage in this type of access is that both direct and sequential access of files is
possible.
COMPUTER VIRUS?
A computer virus is a small software program that spreads from one computer to another and interferes with
computer operation. A computer virus might corrupt or delete data on a computer, use an email program to
spread the virus to other computers, or even delete everything on the hard disk.
Computer viruses are frequently spread by attachments in email messages or by instant messaging messages.
Therefore, you must never open an email attachment unless you know who sent the message or you are
expecting the email attachment. Viruses can be disguised as attachments of funny images, greeting cards, or
audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in
pirated software or in other files or programs that you might download.
Types of Computer Virus
There are different types of Computer Virus it depend on the intent the Virus designer what to achieve and the
ease of doing so. However, for the sake of simplicity there are two broad categories. The Operating System
Virus and the Application Virus.
The Operating System is the platform on which Computer applications operates. It is the brain behind the
computer functionality. Computer Operating System Virus is more difficult to deal with than application
Viruses.
1. Boot Sector Virus: The Boot sector of the Computer control the Computer switch to on or off the System. If
this sector is infected with a Virus, it can deter the Computer from switching on. If perhaps the System comes
on, as the Computer boot, the Virus can use it as a medium to replicate itself to other parts of the Computer.
2. Fat Virus: This is the type of Virus that attack File, applications or programs directory of a Computer System.
It has the ability to modify the instruction base of the directory in order to gain control over the Computer
System. It can indicate that there are no more space for new applications or files which is not true.
3. Resident Virus: This type of Computer Virus resides in the RAM of a Computer. It usually waits for the
system to boot and in the cause of using the Computer, it will spread itself.
4. Macro Virus: This is a recent name in the World of Computer Viruses. Macro Virus target are documents and
the mostly attack Microsoft Word Documents are the most targeted by this Virus.
5. Companion Virus: This is a Computer Virus that attaches itself with files and maliciously gets activated each
time such files are opened or worked upon. In the process they can corrupt or replace existing files or programs.
6. Trojan Horses: Trojan Horses is not a Virus per say going by the definition of Computer Virus but have the
ability to create a loophole in a Computer for Virus infection. Trojan Horses is the brain behind Rootkit Virus
infection against Computer.
What is a worm?
A worm is computer code that spreads without user interaction. Most worms begin as email attachments that
infect a computer when they're opened. The worm scans the infected computer for files, such as address books or
temporary webpages, that contain email addresses. The worm uses the addresses to send infected email
messages, and frequently mimics (or spoofs) the "From" addresses in later email messages so that those infected
messages seem to be from someone you know.
What is a trojan horse?
A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden
ICT class notes prepared by Derek Kizito
inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a
hacker to access the infected computer. Trojan horses do not usually spread by themselves. They are spread by
viruses, worms, or downloaded software.
What is spyware?
Spyware can install on your computer without your knowledge. These programs can change your computer’s
configuration or collect advertising data and personal information. Spyware can track Internet search habits and
can also redirect your web browser to a different website than you intend to go to.
Virus infection in Computers can be contacted through different means. Below are the commonest causes of
Computer Virus attack.
1. Through the internet: The easiest and quickest means of spreading Computer Virus is through the
internet. Basically through downloaded files and documents. When the source of a document is not
trusted it should not be downloaded. If at all it will be downloaded it has to be thoroughly scanned for
virus with a reliable anti-virus Software.
2. Through Email attachments: When the source of an email attachment is not known and trusted it
should not be opened especially the messages of “get rich quickly”. Some of them are Scam and coded
virus. This kind of offer is usually appealing and used as a bait to trap the unsuspecting public or
computer user.
3. Removable Storage Devices: Going by the definition of a Computer Virus, it has the ability to
replicate itself through every medium instructed in the coded software. One of the means of doing so is
through a removable storage facility such as Floppy Disc, USB Flash drive, Memory cards etc. Before
accepting any of these devices used on a system they should be scanned for Virus.
4. Through Bluetooth Transfer: Viruses can be contacted through a transfer of documents via a
Bluetooth once one of the Computers is infested with a Virus or the document so transferred. This called
for the installation of a reliable anti- Viru
Rogue security software
Examples of Online Cybersecurity Threats
Computer Viruses
Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a
computer operates, without the permission or knowledge of the user. A virus replicates and executes itself,
usually doing damage to your computer in the process.
Carefully evaluating free software, downloads from peer-to-peer file sharing sites, and emails from unknown
senders are crucial to avoiding viruses. Most web browsers today have security settings which can be ramped up
for optimum defense against online threats. But, as we'll say again and again in this post, the single most-
effective way of fending off viruses is up-to-date antivirus software from a reputable provider.
Spyware Threats
A serious computer security threat, spyware is any program that monitors your online activities or installs
programs without your consent for profit or to capture personal information. We’ve amassed a wealth of
knowledge that will help you combat spyware threats and stay safe online.
While many users won't want to hear it, reading terms and conditions is a good way to build an understanding of
how your activity is tracked online. And of course, if a company you don't recognize is advertising for a deal that
seems too good to be true, be sure you have an internet security solution in place and click with caution.
We’ve amassed a wealth of knowledge that will help you combat spyware threats- learn more about the dangers
of spyware and stay safer online
Hackers and Predators
People, not computers, create computer security threats and malware. Hackers and predators are programmers
who victimize others for their own gain by breaking into computer systems to steal, change, or destroy
information as a form of cyber-terrorism. These online predators can compromise credit card information, lock
you out of your data, and steal your identity. As you may have guessed, online security tools with identity theft
protection are one of the most effective ways to protect yourself from this brand of cybercriminal.
ICT class notes prepared by Derek Kizito
What scams are hackers using lately? Learn more about the dangers of hacking how to combat protect yourself
against dangerous malware attacks online.
Phishing
Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal
information through fraudulent email or instant messages. Phishing attacks are some of the most successful
methods for cybercriminals looking to pull off a data breach. Antivirus solutions with identity theft protection
can be "taught" to recognize phishing threats in fractions of a second.
Pharming:
The activity in which a hacker accesses an web server and modifies the source code of an web page to redirect
all requests to the website to another fake or bogus website or intentionally harmful website. An hacker can also
this by hacking DNS servers. Targets of Pharming are many such as takings users of a famous website to a
bogus website to bring down the reputation of the famous website etc.
Data processing refers to any operation or set of operations performed upon data, whether or not by
automatic means, such as collection, recording, organization, storage, adaptation or alteration to convert it
into useful information.
Data processing is the conversion of data into usable and desired form. This conversion or “processing” is
carried out using a predefined sequence of operations either manually or automatically. Most of the data
processing is done by using computers and thus done automatically. The output or “processed” data can be
obtained in different forms like image, graph, table, vector file, audio, charts or any other desired format
depending on the software or method of data processing used.
DATA PROCESSING CYCLE
Data processing cycle as the term suggests a sequence of steps or operations for processing data, i.e.,
processing raw data to the usable form. The processing of data can be done by number of data processing
methods.
Once data is collected, it is processed to convert it into useful information. The data is processed again and
again until the accurate result is achieved. This is called data processing cycle.
STAGES OF DATA PROCESSING:
The data processing is very important activity and involves very careful planning. Usually, data processing
activity involves three basic activities
1. Input – The raw data after collection needs to be fed in the cycle for processing. This is considered the
first step and called input.
2. Processing – Once the input is provided the raw data is processed by a suitable or selected processing
method. This is the most important step as it provides the processed data in the form of output which will be
used further.
3. Output – This is the outcome and the raw data provided in the first stage is now “processed” and the data
is useful and provides information and no longer called data.