Computer Notes
Computer Notes
- Internal memory holds data and instructions temporarily and retains intermediate results.
Program:
Data:
Data is a collection of raw facts, figures or instructions that do not have much meaning to the user.
Data may be in form of numbers, alphabets/letters or symbols, and can be processed to produce
information.
Types of data.
There are two types/forms of data:
a). Digital (discrete) data:
Information:
Information is the data which has been refined, summarized & manipulated in the way you want
it, or into a more meaningful form for decision-making.
- The information must be accurate, timely, complete and relevant.
Comparison between Data and Information.
Data Information
Access time - The performance of a hard drive or other storage device - how long it takes to locate
a file.
Active program or window - The application or window at the front (foreground) on the monitor.
Application - a program in which you do your work.
Client – Server - A common form of distributed system in which software is split between server
tasks and client tasks. A client sends requests to a server, according to some protocol,
asking for information or action, and the server responds.
Clipboard - A portion of memory where the Mac temporarily stores information. Called a Copy
Buffer in many PC applications because it is used to hold information which is to be
moved, as in word processing where text is "cut" and then "pasted".
Clock Rate (MHz) - The instruction processing speed of a computer measured in millions of
cycles per second (i.e., 200 MHz).
Compiler - a program the converts programming code into a form that can be used by a computer.
Compression - a technique that reduces the size of a saved file by elimination or encoding
redundancies (i.e., JPEG, MPEG, LZW, etc.)
PREPAIRED BY JAMES MAGANGI
Control panel - a program that allows you to change settings in a program or change the way a
Mac looks and/or behaves.
CPU - the Central Processing Unit. The processing chip that is the "brains" of a computer.
Crash - a system malfunction in which the computer stops working and has to be restarted.
Cursor - The pointer, usually arrow or cross shaped, which is controlled by the mouse.
Daisy chaining - the act of stringing devices together in a series (such as SCSI).
Disk - a spinning platter made of magnetic or optically etched material on which data can be stored.
Disk drive - the machinery that writes the data from a disk and/or writes data to a disk.
Disk window - the window that displays the contents or directory of a disk.
Document - a file you create, as opposed to the application which created it.
DOS - acronym for Disk Operating System - used in IBM PCs.
DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed page or on the computer
screen.
Download - to transfer data from one computer to another. (If you are on the receiving end, you
are downloading. If you are on the sending end, you are uploading).
Drag - to move the mouse while its button is being depressed.
Driver - a file on a computer that tells it how to communicate with an add-on piece of equipment
(like a printer).
PREPAIRED BY JAMES MAGANGI
Ethernet - a protocol for fast communication and file transfer across a network. Expansion slot
- a connector inside the computer that allows one to plug in a printed circuit board
that provides new or enhanced features.
File - the generic word for an application, document, control panel or other computer data.
Floppy - a 3.5-inch square rigid disk which holds data. (so named for the earlier 5.25 and 8 inch
disks that were flexible).
Folder - an electronic subdirectory that contains files.
Font - a typeface that contains the characters of an alphabet or some other letterforms.
Fragmentation - The breaking up of a file into many separate locations in memory
or on a disk.
Freeze - a system error, which causes the cursor to lock in place.
Gig - a gigabyte = 1024 megabytes.
Hard drive - a large capacity storage device made of multiple disks housed in a rigid case.
Head crash - a hard disk crash caused by the heads coming in contact with the spinning disk(s).
Hz - Abbreviation for hertz, the number of cycles per second, used to measure clock speed
Icon - a graphic symbol for an application, file or folder.
Initialise - to format a disk for use in the computer; creates a new directory and arranges the tracks
for the recording of data.
Insertion point - in word processing, the short flashing marker that indicates where your next
typing will begin.
Installer - software used to install a program on your hard drive.
Interrupt button - a tool used by programmers to enter the debugging mode. The button is usually
next to the reset button.
K - short for kilobyte.
PREPAIRED BY JAMES MAGANGI
Keyboard shortcut - a combination of keystrokes that performs some function otherwise found
in a pull down menu.
Kilobyte - 1024 bytes.
Landscape - in printing from a computer, to print sideways on the page.
Launch - start an application.
Measurements (summary) -
*a bit = one binary digit (1 or 0) *"bit" is derived from the contraction b'it (binary digit) -> 8
bits = one byte
*1024 bytes = one kilobyte
*K = kilobyte
*Kb = kilobit
*MB = megabyte
*Mb = megabit
*MB/s = megabytes per second
*Mb/s = megabits per second
*bps = bits per second
i.e., 155 Mb/s = 19.38 MB/s MB - short for megabyte.
Megabyte - 1024 kilobytes.
Memory - the temporary holding area where data is stored while it is being used or changed; the
amount of RAM a computer has installed.
Menu - a list of program commands listed by topic.
Menu bar - the horizontal bar across the top of the screen that lists the menus.
MHz - Abbreviation for megahertz, or millions of cycles per second.
Multi tasking - running more than one application in memory at the same time.
Nanosecond - one billionth of a second.
Operating system - the system software that controls the computer.
PREPAIRED BY JAMES MAGANGI
PC - acronym for personal computer, commonly used to refer to an IBM or IBM clone computer
that uses DOS.
PCI - acronym for Peripheral Component Interchange - the newer, faster bus architecture.
Peripheral - an add-on component to your computer.
Pop-up menu - any menu that does not appear at the top of the screen in the menu bar. (May pop
up or down)
Port - a connection socket, or jack.
Power PC - a processing chip designed by Apple, IBM and Motorola (RISC based).
Power Mac - a family of Macs built around the PowerPC chip.
Print spooler - a program that stores documents to be printed on the hard drive, thereby freeing
the memory up and allowing other functions to be performed while printing goes on
in the background.
RAM - acronym for Random-Access Memory.
Resize box - the small square at the lower right corner of a window which, when dragged, resizes
the window.
RISC - acronym for Reduced Instruction Set Computing; the smaller set of commands used by
the PowerPC and Power Mac.
ROM - acronym for Read Only Memory; memory that can only be read from and not written to.
Root directory - the main hard drive window.
Scroll bar - a bar at the bottom or right side of a window that contains the scroll box and allows
scrolling.
Scroll box - the box in a scroll bar that is used to navigate through a window.
SCSI - acronym for Small Computer System Interface.
Serial port - a port that allows data to be transmitted in a series (one after the other), such as the
printer and modem ports on a Mac.
Server - a central computer dedicated to sending and receiving data from other computers (on a
network).
Shut down - the command from the Special menu that shuts down the computer safely.
Software - files on disk that contain instructions for a computer.
Spreadsheet - a program designed to look like an electronic ledger.
Start up disk - the disk containing system software and is designated to be used to start the
computer.
Surge suppressor - a power strip that has circuits designed to reduce the effects of surge in
electrical power. (Not the same as a UPS)
32 bit addressing - a feature that allows the computer to recognize and use more than 8MB of
memory.
Thin client - A simple client program or hardware device that relies on most of the function of the
system being in the server
Title bar - the horizontal bar at the top of a window that has the name of the file or folder it
represents.
Upload - to send a file from one computer to another through a network.
Uninterruptible Power Source (UPS)- a constantly charging battery pack that powers the
computer. A UPS should have enough charge to power your computer for several
minutes in the event of a total power failure, giving you time to save your work and
safely shut down.
UPS - acronym for Uninterruptible Power Source.
Vapourware - "software" advertised, and sometimes sold, that does not yet exist in a releasable
for.
PREPAIRED BY JAMES MAGANGI
Virtual memory - using part of your hard drive as though it were "RAM".
WORM - acronym for Write Once-Read Many; an optical disk that can only be written to once
(like a CD-ROM).
Zoom box - a small square in the upper right corner of a window which, when clicked, will expand
the window to fill the whole screen.
stem from user input, leading to the principle of "Garbage in, Garbage out" (GIGO), which means
that entering incorrect data results in misleading information.
3. Reliability.
A computer delivers accurate results when given correct instructions and data. If it receives a
multiplication instruction instead of addition, it will execute the multiplication, following the
instructions without recognizing user intent. Additionally, if incorrect data is provided, the
output will be correct based on that data but may not meet expectations. Therefore, the
reliability of a computer's output hinges on the accuracy of both instructions and data.
4. Consistency:
Computers are usually consistent. This means that, given the same data & the same
instructions, they will produce the same answer every time that particular process is repeated.
5. Storage:
A computer can store vast amounts of data and instructions in a compact space, allowing for
easy retrieval when needed. Additionally, data can be secured from unauthorized access
through the use of passwords..
6. Diligence:
Unlike human beings, a computer can work continuously without getting tired or bored. Even
if it has to do a million calculations, it will do the last one with the same speed and accuracy as
the first one.
7. Automation:
A computer is an automatic device. This is because, once given the instructions, it is guided
by these instructions and can carry on its job automatically until it is complete.
It can also perform a variety of jobs as long as there is a well-defined procedure.
8. Versatile:
A computer can be used in different places to perform a large number of different jobs
depending on the instructions fed to it.
9. Imposition of a formal approach to working methods:
Because a computer can only work with a strict set of instructions, it identifies and imposes
rigid rules for dealing with the data it is given to process.
Review Questions.
PREPAIRED BY JAMES MAGANGI
1. What is a Computer?
2. Why is a computer referred to as an electronic device?
3. Define the following terms as used in computer science.
a). Data.
b). Programs.
c). Data processing.
d). Information.
4. (a) Briefly explain the two forms of data.
(b) Give THREE differences between Data and Information.
5. The speed of a computer is measured in .
6. What does the term GIGO stands for?
7. List and explain 4 salient features/ properties of a computer.
8. List FIVE advantages of a computerized system over a manual system.
PREPAIRED BY JAMES MAGANGI
1. System Unit.
This is the casing (unit) that houses electronic components such as the ‘brain’ of the computer
called the Central processing Unit (CPU) and storage devices.
The components in the System unit include: -
◻ Central Processing Unit (CPU), which is also referred to as Processor.
◻ Motherboard.
◻ Power supply unit.
◻ Memory storage devices.
◻ Disk drives, which are used to store, record and read data.
Types of System units
There are two makes of System units:
a) Tower style system unit
This system unit is made to stand-alone. They are designed to be placed on the floor.
- Tower style units have more space for expansion than the typical desktop units.
b) Desktop system units
PREPAIRED BY JAMES MAGANGI
Desktop units lie on the desk with the monitor resting on top of the system unit.
rwdgwdtwdg
the computer's brain, responsible for executing all processing tasks, is centered within the system
unit, which contains both the processing and main memory devices. The essential components of
the computer's control center, referred to as processing hardware, include:
The CPU is the core electronic circuitry that manages the interpretation and execution of
instructions.
The ALU is tasked with performing fundamental arithmetic and logical operations, comprising two
main sections:
- ii) Logic Unit: Conducts comparisons and logical operations, determining relationships such as
true/false, greater than, equal to, and less than
The control unit processes the stored instructions and data in the computer, directing the flow of
information to the arithmetic logic unit and overseeing the execution of operations.
Together, these components facilitate the computer's ability to process data and execute programs
efficiently.
CPU
MAIN MEMOR Y
CONTROL UNIT
INPUT OUTPUT
CPU Operation
The operation of most CPUs revolves around executing a sequence of stored
instructions known as a program, which is represented by numbers in memory. This
process consists of four fundamental steps:
1. Fetch: The CPU retrieves an instruction from program memory, with the location
identified by the program counter (PC), which tracks the current position in the
program.
2. Decode: The fetched instruction is broken down into parts meaningful to the CPU.
This interpretation is guided by the CPU's instruction set architecture (ISA). Some
complex CPUs use a micro-program to assist in decoding, which can be modified even
post-manufacture
3. Execute: The CPU performs the operation specified by the instruction. For example,
if the instruction involves an addition, the arithmetic logic unit (ALU) is engaged to
process the inputs and produce an output.
4. Write Back: The results of the execution are written to memory, typically into
internal CPU registers for quick access. Results might also go to main memory. Some
instructions manipulate the program counter to control program flow, enabling
functions like loops and conditional execution.
After each instruction is executed and results are written back, the cycle repeats, usually fetching
the next sequential instruction. If a jump instruction was executed, the PC is adjusted to the new
instruction location. More advanced CPUs can handle multiple instructions simultaneously through
parallel processing.
2. Input devices.
These are the devices used to enter/put data into the computer.
• They accept data for processing & convert it into a suitable form that the computer can
understand. They include
### 1. Keying Devices
PREPAIRED BY JAMES MAGANGI
- Keyboard: Allows users to input text and commands into a computer using keys.
- Keypad: A smaller version of a keyboard typically used for numeric input or specific functions
- Mouse: Enables users to control the cursor on the screen, allowing for the selection and
manipulation of objects.
- Trackball: A stationary pointing device with a ball that users roll to move the cursor on the screen.
- Joystick: Used primarily for gaming and simulations, it allows for multi-directional control.
- Light Pen: A device that lets users draw or select objects directly on the screen.
- Optical Scanners: Capture images or documents, converting them into digital data.
- Optical Mark Reader: Captures data from marked forms, commonly used in surveys and tests.
- Optical Character Reader (OCR): Converts printed text into editable digital text.
- Magnetic Ink Character Recognition (MICR): Reads special ink used in checks, facilitating
automatic processing in banking.
- Magnetic Stripe Card Reader: Reads data encoded on the magnetic strip of credit or identification
cards
- MIDI Keyboard: Used for inputting musical notes into a computer, often in digital audio
workstations.
PREPAIRED BY JAMES MAGANGI
- Allows users to interact with a computer or device directly through touch, enabling selection and
control of applications through taps and gestures.
### 6. Digitizer
- Converts analog signals or drawings into digital format, often used in graphic design or for
creating digital maps.
- Capture images or video that can be transferred to a computer for editing or storage.
- Verify identity through unique biological traits (e.g., fingerprints, facial recognition) for secure
access.
- Allow for collaborative work and learning by enabling users to interact with displayed content
using touch or stylus input.
1. Monitors:
- Function: Display visual output from the computer, including user interfaces,
applications, and multimedia content. They allow users to visually interact with the
information processed by the computer.
- Function: Output audio signals, enabling users to hear sounds, music, or speech
generated by the computer. Examples include speakers and headphones.
3. LCD Projectors:
- Function: Provide visual output using LED technology, often used in monitors,
TVs, and signage. They offer bright and energy-efficient displays.
Hard copy output refers to information that is physically recorded on mediums such
as paper or films. Common examples include
1. Printers:
- Function: Create miniature film copies of documents and data, often used for
archival purposes, allowing for space-saving storage of large volumes of
information.
- Function: Send and receive printed documents over telephone lines, producing
hard copies of documents remotely. Facsimiles are primarily used for quick
document transmission.
Assignment check on the internet and see how the devices look like
4. Speed:
- RAM: Generally much faster than ROM, making it suitable for active data processing.
- ROM: Slower in comparison as it's primarily read-only and does not require frequent
access.
5. Capacity:
- RAM: Available in larger capacities, typically in gigabytes (GB) to accommodate multiple
tasks and applications.
- ROM: Usually smaller in capacity, typically measured in megabytes (MB) or a few
gigabytes.
6. Data Modification:
- RAM: Data can be read from and written to RAM easily and frequently.
- ROM: Data in ROM is primarily read-only and can be modified only through special
processes like flashing.
7. Types:
- RAM: Includes different types such as DRAM (Dynamic RAM), SRAM (Static RAM),
and SDRAM (Synchronous DRAM).
- ROM: Includes various types such as PROM (Programmable ROM), EPROM (Erasable
Programmable ROM), and EEPROM (Electrically Erasable Programmable ROM).
8. Use Cases:
- RAM: Used for running operating systems, applications, and for active processing tasks.
- ROM: Used for storing BIOS or firmware, essential for the hardware to function correctly.
9. Physical Characteristics:
- RAM: Typically comes in modules such as DIMMs or SO-DIMMs that are installed on
the motherboard.
- ROM: Often integrated into the motherboard, chips, or embedded in devices.
10. Cost:
- RAM: Generally more expensive on a per-gigabyte basis compared to ROM, due to its
speed and technology.
- ROM: Less expensive since it is used predominantly for storage of permanent data and
instruction sets.
The programs & data are transferred to & from the secondary storage units to the Main
memory only when they are required; hence the information is said to be online to the
computer.
Examples of secondary storage devices:
• Hard disk * Floppy disks. * Magnetic Tapes. ,Cassette tapes. * Punched cards. * Zip disks.
• Compact disks * Digital Video Disks (DVDs).
Computer peripherals.
A computer is basically made up of a system unit and other devices connected to the system unit
called Peripheral devices.
Peripheral devices are the elements (components) connected to the system unit so as to assist the
computer satisfies its users.
Peripheral devices are connected to the System unit using special cables called data interface cables
that carry data, programs & information to and from the processor. The cables are connected to
the system unit using connectors called Ports.
Examples of peripheral devices include;
-Monitor, - Keyboard, - Mouse - Printer. - Modem. - Speakers.-
Plotter.
Review Questions.
1. List down the components that make up a computer.
2. Clearly draw and label the main physical parts of a simple computer system.
3. What are computer peripherals?
4. (a). Name and explain the two main divisions of computer storage.
(b). Give two common examples of secondary storage devices.
5. Name two output devices.
6. (a). Explain the term System unit.
(b). Name some of the components found in the System unit. (c).
Give three features of a computer’s System Unit.
7. Why the screen is also called a Monitor?
8. What is a Mouse in relation to computing?
9. Discuss different types of printers
PREPAIRED BY JAMES MAGANGI
Printers come in various types, each designed to meet specific printing needs. Here are the
different categories of printers along with their characteristics:
## Impact Printers
Definition: Impact printers work by physically striking an inked ribbon against the paper to produce
text and images.
#### Categories of Impact Printers:
1. Dot Matrix Printers:
- Description: Utilize a grid of pins to form characters by striking the ribbon against the paper.
- Advantages:
- Can produce carbon copies (multi-part forms).
- Generally lower cost for printing in bulk.
- Disadvantages:
- Lower print quality compared to non-impact printers.
- Noisy during operation.
PREPAIRED BY JAMES MAGANGI
2. Ball Printers:
- Description: Use a ball with characters imprinted on it that rotates to strike the ribbon and paper.
- Advantages:
Definition: Non-impact printers use various technologies to transfer ink or toner to paper without
physical contact.
#### Categories of Non-Impact Printers:
1. Inkjet Printers:
- Description: Spray tiny droplets of liquid ink onto paper to create an image.
- Advantages:
PREPAIRED BY JAMES MAGANGI
- Description: Use heat to transfer ink from a ribbon or directly on specially coated paper (direct
thermal).
- Advantages:
- Commonly used in retail for receipts (fast printing).
- Smaller and simpler than other types; fewer moving parts.
- Disadvantages:
- Printing is generally monochrome.
Both impact and non-impact printers serve different purposes and are suited to various printing
needs. Impact printers are typically used in environments requiring durability and bulk printing,
while non-impact printers offer superior quality and versatility for home and business applications.
Understanding their differences helps consumers choose the right type of printer based on their
specific requirements.
DEVELOPMENT OF COMPUTERS.
HISTORY OF COMPUTING.
Before 1900, most data processing was done manually using simple tools like stones & sticks to
count and keep records.
Around 2000 years ago, Asian merchants came up with a special calculating tool called Abacus
that could be used to calculate large figures.
An Abacus is made up of a rectangular frame and a crossbar at the middle. It is fitted with wires
or strings running across from the frame to the crossbar.
Each bead in the lower row has a value of 1, while each bead in the upper row has a value of 5. To
represent a number, the bead is moved to the crossbar. Those beads away from the crossbar
represent zeros.
The Figure
below
represents the
number 6908
(Six thousand
nine hundred
and eight).
After Abacus,
the first
machine that is
usually
regarded as the
PREPAIRED BY JAMES MAGANGI
forerunner of modern computers was named the Analytical Engine, and was developed by an
English mathematician called Charles Babbage.
In 1939, Professor Howard Aken of Horrard University designed the first computer-like machine
named Mark 1. Since then, a series of advancements in electronics has occurred. With each
breakthrough, the computers based on the older form of electronics have been replaced by a new
“generation” of computers based on the newer form of electronics.
COMPUTER GENERATIONS.
The 1st generation of computers used thousands of electronic gadgets called Vacuum tubes or
Thermionic valves to store & process information.
Vacuum tube
The tubes consumed a lot power, and generated a lot of heat during processing due to overheating.
The computers constantly broke down due to the excessive heat generated, hence were shortlived,
and were not very reliable.
Their internal memory capacity was limited. The maximum memory size was approx. 2 KB (2,000
bytes).
The computers used big physical devices in their circuitry; hence they were very large in size, i.e.
the computer could occupy several office blocks. For example, ENIAC occupied an area of about
150m2 - the size of an average 3-bedroom house.
They were very slow - their speed was measured in Milliseconds. E.g., ENIAC (the earliest
electronic computer) could perform 5,000 additions per second & 300 multiplications per second.
◻ ENIAC (Electronic Numerical Integrator And Calculator) built in 1946 for use in World War II.
It contained 18,000 Vacuum tubes.
◻ EDVAC (Electronic Discrete Variable Automatic Computer) developed in 1945 by Dr. John Von
Neumann. It was the first computer that used instructions stored in memory.
◻ IBM 650.
◻ LEO (Lyon’s Electronic Office).
The 2nd generation computers used tiny, solid-state electronic devices called Transistors. The
transistors were relatively smaller, more stable & reliable than vacuum tubes.
Transistor
The computers consumed less power, produced less heat, were much faster, and more reliable than
those made with vacuum tubes.
Their operation speed increased to between 200,000 – 300,000 instructions per second. Their
speeds were measured in Microseconds. E.g., a computer could perform 1 million additions per
second, which was comparatively higher than that of the 1st generation computers.
The computers were smaller in size & therefore, occupied less space compared to the 1st G
computers.
◻ NCR 501, IBM 300, IBM 1401, IBM 7070, IBM 7094 Series & CDC-6600 Mainframe
computers.
◻ ATLAS LEO Mark III.
◻ UNIVAC 1107.
PREPAIRED BY JAMES MAGANGI
◻ HONEYWELL 200.
3RD Generation computers (1964 – 1979).
Used electronic devices called Integrated Circuits (ICs), which were made by combining thousands
of transistors & diodes together on a semiconductor called a Silicon chip.
Integrated circuit
The storage capacity of the computers (i.e., the RAM memory sizes) expanded to 2 MB.
The computers could support more than user at the same time. They were also able to support
remote communication facilities.
The 4th generation computers used Large Scale Integrated (LSI) circuits & Very Large Scale
Integrated (VLSI) circuits. These circuits were made by compressing more tiny circuits and
transistors into even smaller space of the silicon chip.
The computers were small, and very fast. Their processing speeds increased to 50 Million
instructions per second.
Had large storage capacity, i.e., their memory sizes expanded to several hundred Megabytes
Memories used included Magnetic disks, Bubble memories & Optical disks.
Examples of 4th Generation computers:
◻ IBM 308 and 4300;
◻ Amdahl 580
◻ Honeywell DPS-88
◻ Burroughs 7700 and the 16-bit & 32-bit microcomputers. The first microcomputer was called
Apple II.
PREPAIRED BY JAMES MAGANGI
• Games Playing: programming computers to play games such as chess and checkers
Expert Systems: programming computers to make decisions in real-life situations
(for example, some expert systems help doctors diagnose diseases based on symptoms)
• Natural Language: programming computers to understand natural human languages
Neural Networks: Systems that simulate intelligence by attempting to reproduce
the types of physical connections that occur in animal brains
• Robotics: programming computers to see and hear and react to other sensory stimuli
Currently, no computers exhibit full artificial intelligence (that is, are able to simulate
human behavior). The greatest advances have occurred in the field of games playing. In
the area of robotics, computers are now widely used in assembly plants, but they are
capable only of very limited tasks. Robots have great difficulty identifying objects based
on appearance or feel, and they still move and handle objects clumsily.
PREPAIRED BY JAMES MAGANGI
Natural-language processing offers the greatest potential rewards because it would allow
people to interact with computers without needing any specialized knowledge. You could
simply walk up to a computer and talk to it. Unfortunately, programming computers to
understand natural languages has proved to be more difficult than originally thought. Some
rudimentary translation systems that translate from one human language to another are in
existence, but they are not nearly as good as human translators.
There are also voice recognition systems that can convert spoken sounds into written
words, but they do not understand what they are writing; they simply take dictation. Even
these systems are quite limited -- you must speak slowly and distinctly.
In the early 1980s, expert systems were believed to represent the future of artificial
intelligence and of computers in general. To date, however, they have not lived up to
expectations. Many expert systems help human experts in such fields as medicine and
engineering, but they are very expensive to produce and are helpful only in special
situations.
Today, the hottest area of artificial intelligence is neural networks, which are proving
successful in a number of disciplines such as voice recognition and natural-language
processing.
Review Questions.
Generation Technology
First generation A). Very Large Integrated Circuit
Second generation B). Thermionic valves (Vacuum tubes)
Microcomputers use microprocessors, which are manufactured on a single chip, as their CPU.
PREPAIRED BY JAMES MAGANGI
2) Processing speed.
All computers have some amount of RAM (Random Access memory), which is used to hold
the instructions required to perform a task.
Larger computers have more RAM and therefore can handle large volumes of data & also
support many and sophisticated programs which might require large memory sizes.
The storage capacity is the amount of space that is available for storing the instructions
required to manipulate data.
The cost of computers is directly related to the size. Microcomputers are less costly compared
to minicomputers, mainframes or Supercomputers.
The speed of an output device is determined by the amount of information that can be printed
in a specified amount of time.
The speed of microcomputer output device is less than that of the larger computers in that:
For a microcomputer, the speed of its output device is measured by the number of characters
printed per second (cps). For larger computers, their output devices are faster and their speeds
are measured depending on the number of lines or pages printed per minute (lpm / ppm).
7) Number of users who can access the computer at the same time.
Most microcomputers can support only 1, 2 or 3 users at the same time. However, they can
be networked to share resources.
Larger computers can support hundreds of users at the same time.
Review Questions.
1. Briefly explain five factors that can be used to determine the type of a computer.
PREPAIRED BY JAMES MAGANGI
CLASSIFICATION OF COMPUTERS
Computers can be classified into 5 main groups according to their size as:
◻ Supercomputers.
◻ Mainframe computers.
◻ Minicomputers.
◻ Microcomputers.
◻ Portable computers (Laptops, Notebooks & Palmtops).
Supercomputers.
Supercomputers are the fastest, largest, most expensive & also the most powerful computers
available.
They are very fast in processing. They can perform many complex calculations in a fraction of
a second.
Most Supercomputers use multiple processors. In this case, a single task is split among the
processors for faster execution. However, all the processors are controlled by a single central
processor.
PREPAIRED BY JAMES MAGANGI
Supercomputers generate a lot of heat, & therefore require special cooling systems. Sometimes,
the whole CPU is deeped in a tank containing liquid Fluorocarbon to provide cooling.
Supercomputers are very large & heavy, and are usually kept under special environmental
conditions (i.e., in a special room).
They are operated by computer specialists. A Supercomputer can be operated by over 500 users
at the same time.
Supercomputers are mainly used for complex scientific applications that involve many
calculations & require a lot of computational power. Some of the applications that use
supercomputers include;
◻ Weather forecasting.
◻ Petroleum research.
◻ Defence and weapon analysis.
◻ Aerodynamic design and simulation.
Note. These tasks use large amounts of data, which need to be manipulated within a very
short time.
Examples of Supercomputers:
Mainframe computers.
Are powerful computers with very high capacities of Main storage? They also have a large
backing storage capacity.
Have a very high processing speed, i.e., can process large amounts of data very quickly.
They can support a large number of peripherals of different types (can support between 5–300
terminals).
They can handle hundreds of users at the same time, e.g., they can be operated by 200 users at
a time.
Mainframe computers are general-purpose, and can handle all kinds of problems whether
scientific or commercial.
Mainframe computers are mostly found in government departments, big organizations and
companies which have large information processing needs, e.g., they are used;
Examples of Mainframes:
◻ IBM 4381.
◻ ICL 39 Series.
◻ CDC Cyber series.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
Mini computers.
A Minicomputer is physically smaller than a mainframe. However, it can support the same
peripheral devices supported by a mainframe.
A Minicomputer can support several users at a time, e.g., can be operated by 6 users at a time.
Several workstations/ terminals are connected to one central minicomputer so that the users
connected can share its resources (C.P.U time, storage, etc).
They handle small amounts of data, are less powerful, & have less memory than the
mainframes.
Example of Minicomputer:
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
Micro computers.
Microcomputers are the PCs mostly found today in homes, schools & many small offices. They
are called Personal Computers (PCs) because they are designed to be used by one person at a
time.
They consist of very few connected units, i.e. can support very few peripheral devices (usually
1 or 2).
Microcomputers are smaller in size & also cheaper than minicomputers. Their design is based
on Very Large Scale Integration (VLSI) that confines several physical components into an IC.
They are less powerful than minicomputers & their internal memory is smaller than that of
minicomputers.
Examples:
A Laptop is a PC sufficiently small & light such that a user can use it comfortably on his/her
lap. It is designed to be used by placing it on the lap.
- Laptops are very small in size & are portable. They are small enough to fit inside a briefcase;
still leaving room for other items.
- A Laptop computer operates mainly on electricity or by rechargeable batteries.
- Laptops normally have in-built disk drives & Flat screens (Liquid Crystal Displays).
Note. The smaller computers like Laptops tend to be more expensive than Desktop computers
because of the following reasons:
Palmtops.
Palmtops are small enough to fit in the pocket, and can be held in the palm when being used.
Desktop computer.
This is the name given to any computer designed to be used when placed on a desk in an office
environment.
1) Home computer.
This is a low-cost microcomputer of limited capability designed for domestic use. It has
programs that are used typically for computer games or controlling family finances.
- PCs are mostly used in offices, schools, business premises, and at home for various
applications like computer literacy, Games, Database management, Accounting, Word
processing, Telecommunications, etc.
- A PC can be connected to a mini & mainframe computer so as to enable the user access
the facilities offered by the larger machines.
3) Workstation.
A workstation is usually a desktop computer with all the facilities but interlinked to a
network.
i). It is larger & more powerful than a PC. E.g., workstations use 32-bit
microprocessors, while PCs use 16-bit microprocessors.
ii). It has in-built capabilities for its interconnection & operation with other computers,
i.e., it is fully connected to a computer network as any other computer on the network
in its own right.
iii). It has high-resolution graphics.
iv). It has a Multi-tasking operating system, i.e. it is able to run multiple applications at the
same time.
An Embedded computer.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
This is a computer that is within another device or system but is not accessed directly. E.g.,
there are embedded computers operating within Petrol pumps, Watches, Cameras & Video
recorders.
Digital computers can be classified further according to the tasks they perform either as:
◻ General-purpose.
◻ Special purpose ◻Dedicated computers.
General-purpose computers.
General-purpose computers are designed to perform a wide variety of tasks. They use
specifically written instructions (programs) to carry out the desired processing tasks.
Example;
A single computer can be used to process documents, perform calculations, process the Payroll,
simulate the loading on a bridge, process Insurance policies, and play games, among others.
The programs used in a general-purpose computer are exchangeable. This means that, to
perform a particular task, the appropriate set of instructions required to perform that particular
task are loaded into the computer memory.
E.g., if you want to play a game, the appropriate program is loaded into the computer’s memory
& the computer is instructed to execute the instructions which make up the game.
Special-purpose computer.
Such computers cannot perform any other task except the one they were meant to do.
Therefore, the programs which are used in a special-purpose computer are fixed (hard-wired)
at the time of manufacture.
For example;
In a computer Network, the Front End Processor (FEP) is only used to control the
communication of information between the various workstations and the host computer.
A Special-purpose computer is dedicated to a single task; hence it can perform it quickly &
very efficiently.
◻ Has a screen.
◻ It has a Keypad.
◻ Has a Memory.
◻ It is programmable.
Dedicated computer.
Usually, there are two forms of data; Digital data, and Analogue data. Computers can be
classified according to the type of data they can process as either.
Digital computers.
A Digital computer is a computer that operates on discrete data only. It can process both
numeric & alphabetic data within the computer, e.g., 0, 1, 2, 3… A, B,C….
Their operation is based on 2 states, “ON” & “OFF” or on digits “1” & “0”. Therefore, any
data to be manipulated by a digital computer must first be converted to digital form.
Digital computers are usually general-purpose computers; hence, they are widely used in
different areas for data processing.
Examples:
Analogue computers.
They carry out their data processing by measuring the amount of change that occurs in physical
attributes/quantities, such as changes in electrical voltage, speed, currents, pressure, length,
temperature, humidity, etc.
The output from analogue computers is in form of smooth graphs produced by a plotting pen
or a trace on a Cathode Ray Tube (CRT) from which the information can be read.
Note: Analogue computers usually use one characteristic, e.g. a length, to give information
about another physical characteristic, such as weight.
Analogue computers are very accurate & efficient since they are dedicated to a single task.
They are very fast since most of them use multiple processors.
The computer responds to the Cockpit simulator control movements made by the pilot to
physically change the environment so that the pilot feels as if he were controlling an actual
aeroplane.
◻ A Bathroom scale.
◻ Thermometer.
◻ Speedometer.
In Speedometer, the rotation of the wheel is converted to a voltage, which causes a pointer
to rotate over a dial calibrated in Km/h or Miles/h.
◻ A Petrol pump measures the rate of flow of Gasoline (petrol) & converts the volume
delivered to 2 readings; one showing the volume & the other showing the cost.
◻ A Post-office scale converts the weight of a parcel delivered into a charge for posting.
Hybrid computers.
Hybrid computers are designed to process both analogue & digital data. They combine both
the functional capabilities of the digital and analogue computers.
Hybrid computers are designed by interconnecting the elements of a digital computer &
analogue computer directly into one processor, using a suitable interfacing circuitry.
Example;
In a hospital Intensive Care Unit, an analogue device may be used to measure the functioning
of a patient’s heart, temperature and other vital signs. These measurements may then be
converted into numbers and send to a digital device, which may send an immediate signal to
the nurses’ station if any abnormal readings are detected.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
Computer Calculators
1. Costly due to the technology used. 1. Cheaper – they imitate simple computer
technology.
2. Comparatively smaller.
2. Bigger in size.
Review Questions.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
1. State three methods of classifying computers. In each case, list the different types of
computers.
2. What is a Personal computer?
3. Differentiate the following types of computers.
a). Supercomputer and Mainframe computer.
b). Minicomputer and a Personal computer.
c). Special-purpose (dedicated) computers and General-purpose computers.
d). Desktop computers and Laptop computers
4. Briefly describe terms “Analogue” and “Digital computers” as used in computer science.
5. Give three examples of Special-purpose computers.
6. Name any FOUR classes of computers based on size and complexity.
Computers have many advantages over other types of office and business equipments that are used
for data processing functions. Some of the advantages are:
The processing speed of a computer when measured against other devices like typewriters &
calculators is far much higher.
Computers produce more accurate results as long as the correct instructions & data are entered.
They also have the ability to handle numbers with many decimal places.
A computer requires less effort to process data as compared to human beings or other machines.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
4) Computers can quickly and effectively store & retrieve large amounts of data.
5) They are very economical when saving information, for it can conserve a lot of space.
They can be used to perform a number of organizational functions/ activities, which are meant
for individual persons, hence reducing the number of employees & the costs.
14) Computers can operate in risky environments, e.g. volcanic sites, dangerous chemical plants,
where human life is threatened:
3) Requires skilled manpower to operate, i.e., one has to have some knowledge so as to operate
a computer.
4) The records are usually kept in a form that is not visible or human-readable. This makes it
difficult to control the contents of the computer’s master file.
6) Information stored in computers can easily get lost due to power interruptions or machine
breakdown.
7) A computer doesn’t have its own intelligence, i.e., it cannot do any useful job on its own, but
can only work as per the set of instructions issued.
9) The computer technology is changing very fast such that the already bought computers could
be made obsolete/ out dated in the next few years.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
In addition, this rapid change in the computer technology makes computers & related facilities
to become outdated very fast, hence posing a risk of capital loss.
10) The emergence of computers has increased the rate of unemployment since they are now being
used to perform the jobs, which were done by human beings.
11) Computers have led to increase in computer crimes especially in Banks. The computer
criminals steal large amounts of funds belonging to various companies by transferring them
out of their company accounts illegally. In addition, they destroy vital data used in running
the companies.
1. Supermarkets.
- Supermarkets and other retail stores use computers for stock control, i.e., to help them manage
their daily activities.
The stock control system keeps record of what is in store, what has been sold, and what is
out of stock. The Management is automatically alerted when a particular item or items are
running out of stock and need to be reordered.
2. Industries.
The use of computers has made Industries more productive & efficient. They are used:
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
◻To monitor and control industrial processes. The industries use remote controlled devices
called Robots. A Robot is a machine that works like a human being, but performs tasks that
are unpleasant, dangerous, and tedious to be done by human beings.
◻For management control, i.e. to keep track of orders, bills and transactions.
◻By companies as a competitive tool. E.g., they are used to assist in defining new products &
services. They also help industries form new relationships with suppliers and therefore,
enable the producers maintain a competitive edge against their competitors.
3. Banks/Insurance industries
◻To manage financial transactions. They use special cash dispensing machines called
Automated Teller Machines (ATMs) to enable them provide cash deposit & withdrawal
services.
◻ For processing of Cheques.
◻ For preparation of Payrolls.
◻ For better record keeping and processing of documents.
4. Process control.
Computers are used in production environments such as factories to control chemical &
mechanical processes. The computers are usually loaded with specialized programs & each
computer is designed to do a specific job.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
5. Hospitals.
Computers are used in hospitals:
◻To enable medical experts in different countries to share their expertise or labour, thus
reducing the transportation of patients & professionals.
6. Offices.
7. Government Institutions.
◻To store/keep records and improve the efficiency of work within the Civil service. If
computers were not used, the large number of files in government registries would make
information recovery extremely difficult.
◻ To produce bills &
statements.
8. Education.
Computers are widely used in the teaching & learning process. Learning and teaching using
computers is referred to as Computer Aided Learning (CAL) and Computer Aided Teaching
(CAT).
◻Computers are used in learning institutions (schools & colleges) as teaching aids, i.e. to help
in teaching various subjects.
E.g., they are used to demonstrate experiments in subjects like Chemistry or Physics using a
special program that can illustrate them on the screen through a process called Simulation.
◻To assist the Long distance learning in universities usually referred to as the Open University
Concept.
◻ To analyze academic
data.
◻Computers are used in Aviation for training of pilots. Flight simulators are used to monitor
the control movements made by the pilot while the computer is used to physically change the
environment so that the pilot feels as if he were controlling an actual aircraft.
9. Research.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
Computers can be used for research in various fields. They are used by:
◻ Scientists to analyse their experimental data, e.g., in weather forecasting.
◻ Engineers & Architects to design & test their work.
◻ Computers have greatly assisted in space exploration.
The integration of computers & telecommunication facilities has made the transmission and
reception of messages very fast and efficient.
◻They are used in telephone exchanges to switch incoming & outgoing calls.
◻For sending & receiving electronic messages, e.g. fax and e-mails, if connected to a computer
network.
◻Shipping control. The computers are used for efficient management of fleets &
communication.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
◻ To control the movement of aircrafts, take off & landing through the use of radar equipment.
◻ Making reservations (booking purposes).
◻ Storing flight information.
◻Computers are widely used in fighting crime. The Police use computers to keep databases
on fingerprints and also analysed them.
◻The Police also use computers for face recognition, scene monitoring & analysis, which help
them to arrest traffic offenders and criminals.
The information held in computers such as fingerprints, photographs and other identification
details helps law enforcers to carry out criminal investigations speedily.
13. Defence.
◻Computers are used in electronic news gathering, efficient communication, detecting and
tracking of targets; in radar systems, warning systems & in guided missile systems.
◻Computers are used in military defence equipments, e.g. Fighter jets, Rockets, Bombers, etc.
The presentations are done using overhead projectors attached to computers running slide
shows & digital video clips taken using a Camcorder. An overlaid voice is used to describe
the product.
◻In Education & Training, Multimedia discs are used as teaching aids for all types of subjects.
- To enable the library personnel to easily access & keep updated records of books and other
library materials.
- To search for book titles instead of using the manual card catalogue.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
17. Employment.
The emergence of computers has provided employment opportunities to very many people.
Review Questions.
1. Explain exhaustively the importance of computers in the following areas: i). Industries. ii).
Hospitals. iii). Education iv). Research.
v). Communication industry.
vi). Law enforcement agencies.
vii). Domestic and Entertainment.
2. Explain various ways computers have been mostly used in our country.
3. List down and explain 6 uses of computers in our society.
4. Explain the similarities and differences between human beings and computer systems.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.
• Internet: You’re on it. A huge public network of networks to allow you to see cat pictures
• Intranet: Internal network, like a closed off internal network and platforms in a company
where you share information, mostly in web technologies.
• Extranet: A closed off network. Usually it’s a web platform that the customers of a company
can log onto, to make or track orders.
• Ethernet: A network technology that powers most of the cabled networks in the world.
Types of networks
• LAN: Local Area Network A LAN connects network devices over a relatively short
distance. A networked office building, school, or home usually contains a single LAN,
though sometimes one building will contain a few small LANs (perhaps one per room), and
occasionally a LAN will span a group of nearby buildings
• WAN: Wide Area Network As the term implies, a WAN spans a large physical distance.
The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed
collection of LANs.
• Wireless Local Area Network - A LAN based on Wi-Fi wireless network technology
• Metropolitan Area Network - A network spanning a physical area larger than a LAN but
smaller than a WAN, such as a city. A MAN is typically owned and operated by a single
entity such as a government body or large corporation.
• Campus Area Network - A network spanning multiple LANs but smaller than a MAN, such
as on a university or local business campus.
• Storage Area Network - Connects servers to data storage devices through a technology like
Fibre Channel.
• System Area Network (also known as Cluster Area Network) - Links high-performance
computers with high-speed connections in a cluster configuration.
• Private Area Network/PERSONAL- A small network meant for personal use or an office
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first.
The transmission is unidirectional ,Data is transferred in a sequential manner that is bit by bit.
Advantages of Ring Topology Disadvantages of Ring Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
5. Only that node is affected which has failed, 3. If the hub fails then the whole
rest of the nodes can work smoothly. network is stopped because all the
nodes depend on the hub.
Disadvantages of Star Topology
4. Performance is based on the hub that
1. Cost of installation is high.
is it depends on its capacity
1. Every node has its own dedicated connection to the hub.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices. Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology Disadvantages of Mesh Topology
1. Each connection can carry its own data load. 1. Installation and configuration is
difficult.
2. It is robust.
2. Cabling cost is more.
3. Fault is diagnosed easily.
PREPAIRED BY JOHN ORINA KMTC NYAMACHE
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
1. It is a combination of two or topologies
2. Effective.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.
Introduction to Computers
Advantages of networking
3. It lacks robustness.
if a computer network’s main server breaks down, the entire system would become useless. Also, if it has
a bridging device or a central linking server that fails, the entire network would also come to a standstill.
For a computer network to work efficiently and optimally, it requires high technical skills and know-how
of its operations and administration. A person just having basic skills cannot do this job. Take note that the
responsibility to handle such a system is high, as allotting permissions and passwords can be daunting.
Similarly, network configuration and connection is very tedious and cannot be done by an average
technician who does not have advanced knowledge.
1. TCP/IP
Just like two people can communicate easily if they talk in the same language and its rules.
Similarly, all computers connected to Internet follow same rules and procedure, also called
protocols, to communicate with each other. These protocols, or the common language, of the
Internet are known as Transmission Control Protocol/Internet Protocol or TCP/IP.
Every computer on the Internet has a unique address. This is a four-part numeric address called
Internet Protocol Address or IP address, and it contains information that identifies the location of
this computer. Some examples of IP addresses are 255.230.54.1, or 10.11.0.220. Therefore, we
can see that each part of IP address is a number ranging between 0 and 255.
2. DNS
Most computers also have an address called a Domain name system address or DNS address. A
DNS address has two parts: a host name which stands for the name the computer; a domain name
that identifies the type of organisation from which the computer is connected. Some of the most
used domain names today are .com which is used by commercial organisations; .edu used by
educational institutions; .net used by network service providers; .org used by non-profit
organisations; and .gov used by government departments and organisations.
-2-
Introduction to Computers
For the purpose of this tutorial, when we mention Internet, we are actually referring to the World
Wide Web (WWW or the web). The web was developed as a method for incorporating footnotes,
figures, and cross-references into online hypertext documents, also called web pages. These web
pages are files encoded by using the hypertext markup language or HTML, and this language
allows developers to insert hypertext links in the documents. It is through this facility that the
web has become so useful for all of us. The web users can click any link on a web page to access
more information about these links. A collection of related web pages is called a website. The
first page of a website is called its home page. On the home page, links to various webpages of
the website are listed.
4. Web Browsers
You need a web browser to access web pages on the web. A web browser is a software application
specially designed to look up and open web pages on the user's computer. The two most popular
web browsers are Microsoft Internet Explorer, and Netscape Navigator. For the purpose of this
tutorial we will refer to the Microsoft Internet Explorer 5.0 which is used by a vast majority of
web users.
5. URL
The World Wide Web is built on a set of rules called the Hypertext transfer protocol (HTTP).
This protocol requires the Internet addresses in a special format, called URL or Uniform
Resource Locator. A typical example of a URL is as follows:
http://www.enablingdimensions.com/home/home.html
b. www
c. enablingdimensions
d. home
e. home.html
stands for a server that uses the hypertext transfer protocol means the website is on the
World Wide Web part of the Internet stands for the name of the
service/company/organisation whose website you are accessing refers to a web folder
-3-
Introduction to Computers
belonging to the website of enablingdimensions. refers to the specific web page in the
web folder named home.
EMAILS -send and receive mails in electronic format, Email Address. Every email user
has a unique email address. Eg [email protected]
• 'To': This is a text box in which you will type the email address of the person to whom
you want to send your email. When the email form opens, the cursor will be in this field.
Press enter to turn on the forms mode and type the email address of the recipient. Press
tab to go to the next field.
• CC: It refers to carbon copy, that is if you want to send a copy of this email to some other
persons then type the email IDs of these persons in this field. Press tab to go to the next
field. All the recipients will see who else has received this message. To send the same
mail to more than one recipient, separate the email addresses of the recipients by a comma
or a semi-colon.
• BCC: If you want to send a copy of your message to someone, but do not want others to
know, then use the blind carbon copy (BCC) option for this undisclosed recipient. Type
the email IDs of such person/s in this field. Press tab to go to the next field.
• Subject: Type the subject of your email in this field and press tab to go to the next field.
• Text: This is the place where you would write your message. This is like notepad and you
just need to start typing. When you are done, press tab once to go to send button. Press
enter on Send button.
COMPUTER LABORATORY.
Definition:
A Computer laboratory is a room that has been specially prepared to facilitate installation of
computers, and provide a safe conducive environment for teaching & learning of Computer
Studies.
-4-
Introduction to Computers
Computer systems are expensive to acquire & maintain, and should therefore be handled with
great care. Most computer breakdowns are caused by failure to follow the correct instructions
on use of equipment, carelessness, and neglect.
Computer hygiene involves keeping the computers in good care & order.
Review Questions.
After establishing the computer laboratory, a number of safety precautions, rules, and practices
need to be observed in order to avoid accidental injury to the users, damage of computers or lack
of a conducive environment for teaching and learning.
-5-
Introduction to Computers
Food particles may fall into the moving parts of the computer and damage them.
Liquids may spill into the computer parts causing rusting or electrical faults.
◻ Collect any waste materials (e.g., paper bits) which might be lying in the computer
room & put them into the dustbin.
◻ Avoid unnecessary movements, because you may accidentally knock down the
peripheral devices.
◻ Computer users should be trained on how to use computers frequently.
◻ Computer illiterates should not be allowed to operate the computers.
◻ Shut the door of the computer room properly.
◻ Always follow the proper procedure for starting & shutting down the computer to
avoid loss of data and damage to computer programs.
◻ Avoid turning the computer on & off frequently as it is harmful. Every time a PC is
turned on, the internal components get heated and again cool down when the
-6-
Introduction to Computers
computer is turned off. As a result, the circuit boards expand & contract and this can
badly affect the solder-joints of the computer.
a). Inflammable chemicals, such as those used for cleaning & servicing the computer
equipment.
b). Electrical faults, such as open wires or cables.
c). Smoking.
◻ Keep the chemicals away in a store after using them to avoid any accidents.
◻ Ensure that all electrical wires are properly insulated. Open wires or cables
must be properly covered with an Insulating tape or replaced with new ones as
they can cause fire leading to damage of equipment.
◻ The computer room must always have a gaseous fire extinguisher especially those
containing Carbon dioxide in case of any accidents.
Note. Water based or Powder extinguishers should not be used in the computer room
because; they can cause damage to computer components.
Water causes rusting of the metallic parts and short circuits, while Powder particles
normally settle on storage devices and may scratch them during read/write operations.
◻ Any incidence that may result in damage to equipment should be reported to the person
in charge of the laboratory.
◻ No student should attempt to repair the equipment as this may lead to complete damage
of the equipment.
3. INSULATION OF CABLES.
-7-
Introduction to Computers
◻ All power cables in the computer room must be properly insulated and laid away from
busy pathways in the room (i.e., preferably along the walls). This prevents the user from
stumbling on the cables, which might cause electric shock or power interruptions.
◻ System cables should be of the best quality & type, and should also be properly clipped
(fixed).
◻ The cables should be handled carefully especially at the ends to avoid breaking the pins.
◻Ensure that there is a steady flow of input power to the computer in order to prevent loss
of data or information & also prevent damaging the computer’s secondary storage media.
Note. Power from main supply is not always stable and may sometimes experience power
surges or under voltage (also referred to as Brownout). To protect the computer from being
damaged due to power instabilities especially in areas where power fluctuates, avoid
connecting it directly to the main supply. Instead, it is important to connect the computer to
a special power correction equipment or device such as a Stabilizer or Uninterrupted power
supply /source (UPS), and then connect the UPS to the main supply.
The UPS gets charged when the main power is on. When the main power goes off, the UPS
gives some sound (usually a beep) to alert the user.
1. It regulates power from an unstable power source to the required clean stable voltage.
2. It prevents power surges and brownouts that might destroy the computer.
3. It temporarily provides power to the computer in case of the main power failure. This
allows the user to save his/her work and shutdown the computer using the correct
procedure.
However, note that, power from a generator must pass through a UPS before being fed to the
computer, because it is also not stable.
5. BURGLAR PROOFING.
Physical access to the computer room should be restricted to ensure that only authorized
persons get access to the computers.
To prevent unauthorized access to the computer room, the following controls should be
implemented:
-9-
Introduction to Computers
- Fit strong metallic grills and locks on the doors, windows & roofs (in case the roofing is
weak).
- Lock the doors, (i.e., keep the computers in a strong room, which should remain firmly
locked when not in use).
- Avoid welcoming strangers into the computer room.
- Use of Personal Identification cards.
- Use of fingerprint identification.
- Install security alarms at strategic access points so as to alert the security personnel in case
of a break in.
- Use of special voice recorders that would be able to analyse the voice of a trespasser &
check against the database containing the voice patterns of valid users.
6. VENTILATION.
Both computers and human beings emit heat energy into the environment. Therefore, the
computer room must have good circulation of air to avoid overheating and suffocation.
Proper ventilation enables the computers to cool, and therefore, avoids damaging the
electronic parts.
◻ The room should have large & enough windows & doors. ◻
Installing an air-conditioning system.
◻ Installing cooling fans.
◻ Avoid overcrowding of either machines or people in the room.
7. DUST CONTROL
- 10 -
Introduction to Computers
◻ Remove your shoes before you enter the computer room to prevent dust.
◻ The computer room should be fitted with special curtains that would reduce entry of dust
particles.
◻ The floor should be covered with Carpets in order to absorb dust, and also absorb the
noise made by chairs.
◻ Cover the computer devices with Dust covers when not in use or when cleaning the
computer room.
NB: If the environment is dusty, the computers should be regularly serviced to get rid of
harmful dust.
The service should include; blowing dust from the System unit, cleaning the floppy drives,
cleaning the Keyboard, cleaning the Monitor externally, and also cleaning all peripheral
devices such as Printers and Mouse.
8. DUMP CONTROL.
Humidity in the computer laboratory must be regulated to remain at an optimum 50%. If the
humidity is low, it allows static electricity to build up and causes damage to sensitive
electronic components. Similarly, high humidity of over 70% causes rusting of the metallic
parts of the computer system.
To eliminate low humidity, place humidifiers in the room, while high humidity can be
controlled by installing dehumidifiers in the room.
Computer devices must be handled with a lot of care as they are extremely fragile and can
easily get damaged. Dropping or bumping can cause permanent damage on the device, e.g.,
to transport the System unit always handle it on its frame.
◻ Always use the manufacturer’s shipping carton when transporting the devices.
◻ Do not place heavy objects on the computers.
◻ Protect the computer devices especially the Monitor & the disks from any electrostatic
discharge.
◻ The computer devices should not be exposed to direct sunlight or warm objects. This
causes the internal components of the computer to get heated, and as a result, effects the
computer’s solder-joints.
- 11 -
Introduction to Computers
◻ Students should only perform operations on the computer that they are sure of and under
supervision. If in doubt, the student should ask to ensure that no damage is caused due
to lack of proper knowledge.
◻ Computer equipment should be regularly checked and serviced.
Floppy disks are used to store data, and if properly taken care of, they reduce the likelihood
of destroyed or corrupted data.
Note. Data is very difficult & expensive to reconstruct, unlike application software, which
can easily be re-loaded.
1). Insert the diskette in the drive with the correct side up & in the correct direction. The
diskette should slide in easily (with no force at all) until it locks in the drive. To
remove the diskette out of the drive, press the Eject button.
2). Don’t touch the exposed surface of the diskette when inserting or removing it.
3). Don’t remove the diskette from the drive if the drive light is shining. This indicates that
the diskette is in use, and removing it might damage the files on the diskette.
4). Never leave the diskette in the computer after finishing its job.
5). Ensure that all your diskettes are labelled carefully using meaningful names that indicate
the right contents of the diskette. The labels should be applied at the slightly depressed
region at the top surface of the diskette.
Labelling prevents confusing the data in the different diskettes, and also mixing diskettes
that are used everyday with those used for long-term storage of important data.
6). Use a soft writing material such as a soft felt pen to write on the diskette.
- 12 -
Introduction to Computers
7). Use the shutter at the bottom of the diskette to write-protect it in order to protect the
data stored in it.
Note. To write-protect the diskette, the shutter is pushed up until the hole is covered &
no data can be written to the diskette. To write to the diskette, the hole must be left open.
8). Avoid overusing the diskette. If used for long (usually over 6 months), its surface wears
out.
9). Never place heavy objects on the diskette to avoid damaging it.
10). Keep your disks safely away from extreme temperatures or direct sunlight, i.e., avoid
placing the diskette near possible heat sources, e.g. on top of monitor displays.
11). Keep floppy disks away from any magnetic media, e.g., near power supplies & magnets.
They can corrupt the data.
12). Never carry disks in loose bags or in pockets to prevent dust from getting in & harming
them.
Store your diskettes in disk banks or a proper storage jacket. Use envelopes or enclosed
polythene when carrying them.
16). Protect the diskettes against computer viruses, i.e. you should not use foreign diskettes
in your computer, especially if you suspect that they might have viruses in them.
Use of Printers.
1. Different printers have different sensitivity to printing papers. Using the wrong quality
paper in a particular printer can make the paper get stuck.
2. Printers are very specific to manufacturer’s cartridges & ribbons. Use of clones or
imitations (i.e., the wrong make & model) can damage the printer mechanism.
- 13 -
Introduction to Computers
3. Avoid refilling of cartridges or re-inking of Ribbons. This can spoil the printer due to
leakage or use of poor quality materials.
◻ The computer laboratory should have enough floor space to facilitate free movement from
one place to another.
◻ The laboratory furniture must be well arranged to prevent accidents.
◻ Your working surface must be large enough to hold the computer
equipment & any other additional items required. This prevents
squeezing the devices together & also minimizes breakages.
◻ The table/bench on which a computer is placed must be strong and wide enough to bear
the weight and accommodate all the peripheral devices.
◻ The seat for the user must be comfortable, and have a straight backrest that allows
someone to sit upright. This prevents muscle pains & backaches caused by poor sitting
posture.
For example;
- Adjust the height of the chair or working surface so that your forearms are parallel with
the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on
the keyboard comfortably.
- 14 -
Introduction to Computers
- The eyes must be at the same level with the top of the screen when the user is seated
upright.
◻ You should be able to maintain your proper arm position and place your feet firmly flat
on the floor.
◻ Adopt a relaxed, upright working posture. Avoid slouching (bending) forward or leaning
far backwards.
◻The Chairs should have low back support & footrest and should also be adjustable.
For example;
◻ The Keyboard, Mouse & other input devices should be positioned such that your hands
are in a relaxed, comfortable position.
◻ Position the Keyboard directly in front of you. This makes it possible to type with your
shoulders relaxed and your upper arms hanging freely at your sides.
A computer room must be well lit to avoid eyestrain that eventually leads to headaches, stress,
and fatigue. Similarly, when you work at your computer for long periods of time, your eyes
may become irritated. Therefore, special care should be given to your vision.
◻ Tilt the computer so that the display faces away from the windows. This will minimize
glare (or bright reflections) on the screen.
- 15 -
Introduction to Computers
◻ Position the lighting equipment or sources of light such that glare (or bright reflections)
on the display are minimized. Where necessary, use indirect lighting to avoid bright spots
on the display.
◻ Use/fit radiation filter screens that are specially tinted to reduce the light that reaches the
eye.
◻ Avoid using a flickering monitor. This causes extreme eyestrain that can damage your
eyesight.
◻ The wall paints used should not be very bright as they reflect too much light causing
eyestrain.
◻ Use the brightness & contrast controls on the Monitor to adjust the brightness of the
computer monitor until the eyes feel comfortable, and also to improve image quality of
your display.
◻ Turn off the screen when not in use or reduce its brightness in order to prevent screen
burnout.
◻ If the room has windows, use blinds or shades to control the amount of daylight in the
room.
◻ Take frequent breaks and rest your eyes.
◻ You should have glasses that are specifically suited for working with the computer
display.
◻ Keep your glasses and the display clean.
◻ Have your eyes examined regularly by a vision care specialist.
◻ The distant between the user & screen should be between 450 – 500 mm.
Review Questions.
1. List down THREE safety precautions one should observe when entering a Computer
laboratory.
- 16 -
Introduction to Computers
2. Why must foods and beverages be kept out of the computer room?
3. Discuss TWO main causes of fire or accidents in the computer laboratory and give the
precautions that should be taken to guard against them.
4. (a). Give Six safety precautions you should take when handling diskettes.
(b). Where should the arrow on a diskette point when being inserted into the floppy drive.
5. List THREE things that can spoil a Printer if they are not of the correct specification, and
explain what damage may be caused.
6. Why are powders based and water-based fire extinguishers not allowed in the computer
room?
7. Identify three facilities that will ensure proper ventilation in a room.
8. Give THREE reasons why it is important to regularly service the computer.
9. Explain precisely how the Keyboard, mouse, and other Input devices should be arranged to
avoid strain while working on the computer.
10. (a). What name is given to alternative sources of power in a computer. (b). Name any THREE
sources of power in a computer system.
11. State two reasons why a computer needs to be connected to a stable power supply.
12. State two functions of the UPS.
13. State two reasons that are likely to cause eyestrain in the computer room.
14. Identify three proper sitting postures while using the computer.
- 17 -
Introduction to Computers
1. Before switching on a computer, make sure that all the components are properly connected,
and that the computer is connected to an active power source.
2. Turn on the switch at the source of the power supply. If your computer is connected to a
constant voltage Stabilizer or an uninterrupted power supply (UPS), turn it on after switching
the main supply.
- 18 -
Introduction to Computers
3. Turn on the switches on the System unit and the Monitor. Switch on the power button on the
Monitor first, then followed by that of the System unit.
After the power is on, the computer automatically goes through a process called Booting.
Booting is a term used to describe the starting up of a computer. It is the entire process that
makes the computer ready for use.
Types of Booting.
Cold booting.
This happens when a computer that was originally off is switched on by pressing the power button
on the system unit.
Warm booting.
This happens when a computer that was originally on is forced to restart by pressing the Restart
button on the System unit or by pressing a combination of keys on the keyboard (Ctrl+Alt+Del).
In Windows operating systems, one can use the Restart option on the Shutdown dialog box to
perform a warm boot.
When Power is switched on, the computer starts by checking all its components to determine
whether they are available for use and whether they are functioning correctly. It does this by
executing a small program called the Power-On-Self-Test (POST) that is permanently stored in
ROM.
POST prepares the computer for use by instructing it to perform a number of diagnostic tests
when booting up. It instructs the computer to check the memory (RAM) to make sure it is
- 19 -
Introduction to Computers
operating correctly; check the CMOS (BIOS), Hard disk controller, Floppy disk drive controller
& the Keyboard.
During this process, some monitors display information showing the status of each device being
tested. If a problem is found, e.g., in case one of the devices is faulty or missing, the process will
halt and display an appropriate error message on the screen indicating to the user where the
problem is located. Sometimes, an error code is displayed with the message, or an abnormal
number of beeps are sounded.
The special program that directs the POST process is called the Basic Input Output System
(BIOS).
After finishing working with the computer, the user must follow the correct procedure of shutting
down the computer in order to ensure that loss of data, damage of programs and computer
components does not occur.
1. Save all the work done on the computer, and close all programs that may be currently running.
2. Remove any floppy disk you might have inserted in the computer.
3. Follow the proper shutdown procedure required before switching off the computer. For
example;
To turn off any computer running Windows operating systems:
a). Click the Start button on the screen, and then select Shut Down from the list.
b). In the prompt that appears, select Shut down, then press the Enter key on the keyboard.
c). After a few seconds, the message “It is now safe to turn off the computer” appears on the
screen. Switch off the System unit, then the Monitor.
Note. Some system units switch themselves off automatically. In such a case, press the
button on the Monitor to turn off the screen.
Review Questions.
- 20 -
Introduction to Computers
KEY BOARD.
The Keyboard is a computer input device by which data & instructions are typed into the
computer memory.
It enables the user to enter data & instructions into the computer by pressing its keys.
Types of Keyboard.
KEYBOARD LAYOUT.
The Keyboard of a computer consists of keys similar to those of a typewriter. It contains the
usual range of alphabetic characters (A – Z), digits 0 – 9, and other symbols frequently used to
represent data items. However, it has some command keys for giving special instructions to the
computer.
Data & programs are input into the computer by pressing the appropriate keys. When you type
data into the Keyboard devices, it converts it into machine-sensible forms.
- 21 -
Introduction to Computers
Most Keyboards have a total of 101 keys, which are divided into 5 different groups: -
These are the keys located along the top of the Keyboard marked F1 up to F12. They are
used to issue commands into the computer.
Each of these keys is used to perform a special function in various application packages,
e.g., F1 is used in most applications for help.
Function keys are used differently by different applications, i.e. their functions vary with
different programs, and are therefore sometimes called Programmable Keys.
This section consists of alphabetic & numeric keys. Alphanumeric keys are mostly used
for typing of text.
It has the 26 letters of the English alphabet marked on them in capital letters, and Number
keys arranged in their natural order from 0 – 9. Along with these keys are Punctuation
marks (comma, full-stop, etc) and some Symbols.
At the bottom of the alphanumeric keys, is the Space bar, which is used to separate words
or sentences from each other (or to create a blank space after typing each word).
It is on the rightmost part of the Keyboard. It has keys with digits (numbers) 0 - 9 marked
on them in rows from the bottom upwards.
- 22 -
Introduction to Computers
The keypad also has some mathematical symbols marked on its keys. They include: the
multiplication sign (*), subtraction sign (-), addition sign (+), division sign (/) & the decimal
point (.).
The Keypad is used for fast entry of numeric data into the computer.
Note. The numbers on the Numeric keypad can only be used when the Num Lock key is
turned on.
They are used to move the Cursor (insertion point) within the window of an application.
They include; Page Up, Page Down, Home, End, & the four Arrow Keys.
◻ Arrow keys:
To move the cursor one character to the right in a Word processing document, press the
Right arrow key; to move the cursor one character to the left, press the Left arrow key.
To move the cursor one line up, press the Up arrow key; to move the cursor one line
down, press the Down arrow key.
◻Page Up & Page Down:
To move the cursor up one page in case the document has many pages, press the Page
Up key; to move the cursor down one page, press the Page Down key.
To move the cursor to the beginning of the current line, press the Home key; to move
the cursor to the end of the current line, press the End key.
- 23 -
Introduction to Computers
Editing Keys.
They are used to delete or insert characters in a document. These are:
√ Used to erase characters to the left of the cursor (i.e., from right to left on the same
line).
When pressed, it makes the cursor move one space backwards and the immediate
letter or number to the left is erased.
ii). Delete (Del) key.
It is used to erase characters to the right of the cursor, (i.e., from left to
right).
√ Used in a word processor to switch between the Insert mode & Overtype mode.
When pressed, it helps the user to insert text in the middle of a sentence or replace
a character at the cursor position (i.e., overwrite the text).
They are used in combination with the other keys or on their own to perform special
functions/tasks, or to give special instructions to the computer.
- 24 -
Introduction to Computers
Examples; Esc, Tab, Caps Lock, Shift, Ctrl, Alt, Enter, Num Lock, Scroll Lock.
TAB key ( ).
It is used in certain programs such as Word processors to move the text cursor or a certain
text at set intervals on the same line to the required position on the screen, e.g., 10mm,
20mm, etc.
A Cursor is a blinking underscore ( ) or a vertical beam (I ) that shows where the next
character to be typed will appear.
CAPS Lock.
Used to switch between capital (uppercase) letters & small (lowercase) letters.
When pressed on, an indicator with a Green light appears on the top-right hand corner of
the Keyboard, and all the text typed will appear in capital letters. When pressed off, all the
text typed will appear in small letters.
SHIFT key ( ).
√ It can be used to get single capital letters. Hold down the SHIFT key & press an alphabet
key to get the letter in its capital form.
√ It is used to get the punctuation marks on top of the Number keys or the symbols on top
of certain keys especially on the alphanumeric section.
To get the punctuation mark on top of a number key or the symbol on top of a certain
key; press & hold down the SHIFT key before pressing the required key.
- 25 -
Introduction to Computers
√ It is used as a RETURN key. When pressed at the end of a text line or paragraph in a
word processor, it forces the text cursor to move to the start/ beginning of the next line
or paragraph.
√ Itis used to issue completion commands to the computer. It is used to instruct the
computer to carry out (execute) a command that has been typed or selected on the screen.
It generates special code for the computer. In some programs, it is used when you want to
quit doing some task, i.e. escape from or to cancel a task.
It controls various functions in combination with other keys, e.g. CTRL+”S” is used to give
the command for saving the text/object.
Some key shapes cause much confusion. If you use the wrong key, the process you are
working on may not work as expected, but it may be very difficult to determine what is
wrong.
Look closely to spot the difference between capital “I”, one (1) and “l” (lowercase “L”), and
between small “o”, capital “O” and zero “0”.
- 26 -
Introduction to Computers
Note. A blank space is a printing character; it takes up memory, has an ASCII code, and is
printed on the screen in the same manner as any other character.
The Hyphen key (dash or minus) & the Underscore (underline) are on the same physical key
top. To get the underscore, use the SHIFT.
The Underscore is often used in places where a space is needed to separate individual words,
but is not legal in the context. E.g., the filename TAX 1990 is illegal in MS-DOS because of
the blank space between TAX and 1990, but TAX_1990 is legal. The Underscore takes the
places of the blank space.
Both symbols are on the same physical key top. To get the double quote, use the SHIFT.
Accent grave (`) & Tilde (~) are found on the same key top. The Tilde is used in Mathematics,
foreign languages, or in UNIX operating system to indicate the home subdirectory.
- 27 -
Introduction to Computers
Each of these symbols is used differently depending on what program you are running.
1). Sit upright with both feet firmly on the ground, maintaining an alert posture.
2). Place the material to be typed on your left in a position you can read without strain.
3). Rest both hands on the keyboard with fingers resting on the Home keys.
Home keys are the keys on which fingers rest during typing in readiness to press other
keys. The home keys for the left hand starting with the small finger are A, S, D, F with the
thumb on the Spacebar, while those of the right hand are the apostrophe (‘), semicolon (;),
L, K with the thumb on the Spacebar.
4). Start typing the text slowly at first, making sure you are using all the ten fingers, and that you
press the key nearest to the home keys with the closest finger, e.g., to press Q, use the small
finger on the left hand, while to press J, use the index finger on the right hand.
Descriptive Questions.
1. Define a Keyboard.
2. (a) Give the TWO types of Keyboards found in the current market.
(b) State and briefly explain the functions of five categories of keys found on a standard
keyboard.
3. State the use of each the following section or combination of keys on the keyboard: a).
Function keys.
- 28 -
Introduction to Computers
MOUSE.
A Mouse is a pointing device that enables the user to issue instructions to the computer by
controlling a special mouse pointer displayed on the screen.
2). A Roller ball – used to slide/move the mouse on a flat surface. It also enables the cursor to
move on the screen as required.
3). The Sensor Buttons (Right & Left) – used for making selections.
- 29 -
Introduction to Computers
To use a mouse, hold it in your hand and move it across a flat surface or on top of a table. When
you move the mouse, an arrow-shaped pointer called the Mouse pointer moves across the
computer screen in the same direction. The pointer is usually controlled by moving the mouse.
◻Position the tip of the pointer (cursor) over the item to be selected; ◻
Press a button on the mouse to make your selection.
Point: - this means moving the mouse until the tip of the pointer on the screen is over the item
you want to select.
- 30 -
Introduction to Computers
To select an item on the screen, point the item, then press a mouse button. Use the Left button
(Primary button) for most tasks or the Right button (Secondary button) to quickly accomplish
common tasks.
Clicking: - pressing & releasing the left mouse button once. A click usually selects an object/item
on the screen.
Double-clicking: - pressing the left button twice in a row (in a quick succession) without moving
the mouse. Double-clicking usually opens a file or starts a program.
Right clicking: - pressing the right mouse button once (or, selecting an item by use of the right
mouse button).
A right click usually displays a list of commands from which the user can make a selection. This
list of commands is called a Shortcut menu or Context-sensitive menu. This is because; the
commands on this menu apply to the specific item that has been right-clicked.
Shortcut menu:
Drag and drop: This is whereby the user moves an item from one location on the screen to another.
Review Questions.
- 31 -
Introduction to Computers
- 32 -