Ict Notes
Ict Notes
AND
COMMUNICATION TECHNOLOGY
UNIT:
Functions of ICT............................................................................................................................................................7
Classification of computers...........................................................................................................................................8
Classification by purpose..........................................................................................................................................8
Classification by size.................................................................................................................................................8
Computer Generations.................................................................................................................................................10
Input devices................................................................................................................................................................13
Output devices.............................................................................................................................................................17
CPU Operation............................................................................................................................................................18
Computer buses...........................................................................................................................................................19
Characteristics of a bus............................................................................................................................................19
Bus Categories.........................................................................................................................................................19
Storage Media..............................................................................................................................................................20
Printers.........................................................................................................................................................................26
Impact printer..........................................................................................................................................................26
Non-impact printers.................................................................................................................................................27
Software classification.................................................................................................................................................28
SYSTEM SOFTWARE...........................................................................................................................................28
APPLICATION SOFTWARE................................................................................................................................29
Operating Systems.......................................................................................................................................................31
Booting........................................................................................................................................................................31
Single program........................................................................................................................................................32
Multitasking OS.......................................................................................................................................................32
Booting a Computer................................................................................................................................................32
FORMATING WORKSHEET....................................................................................................................................55
TERMINOLOGIES.....................................................................................................................................................62
CHARACTERISTICS OF DBMS..............................................................................................................................62
DATABASE ELEMENTS..........................................................................................................................................62
3 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
Components of a DBMS.............................................................................................................................................64
Information security....................................................................................................................................................76
COMPUTER VIRUS..................................................................................................................................................77
Worms.........................................................................................................................................................................79
Conclusion...................................................................................................................................................................81
Computer crimes.........................................................................................................................................................81
Hacking....................................................................................................................................................................81
Hacking is when an individual gets unauthorized access into a computer where they may; -look at the data, copy
the data, modify or erase the data............................................................................................................................81
Phishing...................................................................................................................................................................81
A Phishing attack is when you are sent an email that asks you to click on a link and re-enter your bank or credit
card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and
both the email and the web site it links to appear genuine. When you enter your bank or credit card details they
are then used fraudulently.......................................................................................................................................81
Zombies...................................................................................................................................................................81
Virus Hoaxes...........................................................................................................................................................82
Bluesnarfing............................................................................................................................................................83
Worms.....................................................................................................................................................................83
Controls/Protection..................................................................................................................................................85
Audit trail.....................................................................................................................................................................85
Hacking....................................................................................................................................................................85
Log off correctly from the computer when leaving the machine............................................................................85
Encrypting data that is transmitted using the telecommunications network or wireless communication...............85
Firewalls..................................................................................................................................................................85
A physical firewall keeps a fire from spreading from one area to the next. Similarly, a firewall is a program or
hardware that filters information coming through the internet and connections into your personal computer or
network. Firewalls can prevent unauthorized remote logins, limit or stop Spam, and filter the content that is
downloaded from the internet. Some firewalls offer virus protection but it is worth the investment to install Anti-
virus software on each computer.............................................................................................................................85
Access control..........................................................................................................................................................87
Defense in depth......................................................................................................................................................88
Process.........................................................................................................................................................................88
Sources of standards....................................................................................................................................................90
Professionalism............................................................................................................................................................91
Conclusion...................................................................................................................................................................91
Computer Network......................................................................................................................................................92
Functions of networks.................................................................................................................................................92
Star...........................................................................................................................................................................94
Mesh........................................................................................................................................................................94
CHAPTER 6: INTERNET...........................................................................................................................................95
5 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
How do DNS Servers work?...................................................................................................................................96
ONLINE SERVICES..................................................................................................................................................97
Examples of web browsers: internet explorer, Mozilla Firefox, google chrome, opera, safari................................101
User interface.........................................................................................................................................................101
E-mail Address......................................................................................................................................................104
iii) Data
This refers to a collection of disorganized figures, facts, statistics, opinions or predictions that
are not useful for decision making.
-Also refers to the raw facts which have not been processed
iv) Information
This is processed data which is in a form that is meaningful for decision making
6 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
v) Information Communication Technology
Is an integration of computers, communication and other technologies applied to the
collection and storage of data that is subsequently processed and transmitted with the
intention of providing information to the recipient or decision makers?
Functions of ICT
i) Functions of ICT in an organization
- It increases operational efficiency
- Enhances employee productivity
- Improves customer service
- Increases customer satisfaction
- Promote effective decision making
- Enables development of competitive products
- Enables Strategic Planning for future expansion
- Remote processing
Through time sharing and telecommunication, many persons at different locations can
use the same computer at one location for information processing eg ATM banking or
air-time top up.
- Enhance productivity
Productivity increase once workers learn to use computers to perform their duties better
and faster
- Accelerate decision making
Managers can sort issues faster and make better decisions
- Reduce operation costs
Computers help to hold down the costs of labour, energy and paper work
- Reduce storage space
Information can be stored in computer components which occupy smaller space unlike
paper
iii) Disadvantages of computers
- High initial costs-requires high initial cost to purchase and install the computers
- Require skilled operators-Training needs to be done for the computer operators
- Cause health problems-use of computers causes health related problems such as neck
ache, eyes
- Reduce employment opportunities-one computer can perform several tasks that could
have been performed by several people hence causes unemployment
7 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
- Greater loss of data in case of breakage or system failure
Classification of computers
Classification by purpose
Analog Computers
These are computers that perform logical operations by measuring changes in physical
magnitudes and convert them to numeric values. These computers process data that is in a
continuous form or measurable quantities/units. Analog data includes physical variables like
temperature, pressure, length, weight, electrical voltages and resistance.
-Analog computers include thermometers, weighing scales, voltmeters and speedometers.
-These computers are used mainly for scientific and engineering purposes because they deal
with quantities that vary constantly.
-They give approximate results and are applied in industries, post office and weather stations
-Handles small volume of data.
Digital Computers
. These computers process data that is represented in the form of discrete or individually
distinct form usually in a binary or two state formats/digits 0 and 1. In the binary system,
each 0 and 1 is called a bit and a group of 8 bits is 1 byte.
Example of these devices include digital clock.
-handles high volume of data and gives accurate information
Hybrid Computers
These are computers that have the combined features of both the digital and analog
computers. Example is where patient’s vital signs like temperature, heart functions etc are
measured and converted to numbers and supplied to the digital components that monitor the
patient’s vital signs. A fluctuation can thus be noticed immediately.
Classification by size
Super computers
These are the most powerful, fastest and most expensive computers. Only a few of these
are manufactured each year because only a few organizations need and can afford their
processing capabilities. They have large memories and high processing speeds so fast that
they can process nearly a billion transactions per second and nearly a trillion arithmetic
operations at the same time. They apply parallel processing.
Application
Worldwide weather forecasting and analysis of weather phenomena
Produce images that can be incorporated into movies
Aircraft design
8 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
Mathematical research
Main frames
These are large, general purpose computers which can serve 100 or more end users.
They are fast with large storage capacities.
Application
Processing of high-volume batch applications eg in banks
Management of very large centralized databases
To control access, interpret queries and retrieve & update records
Ideal for transaction processing, financial applications, payroll calculations and
airline reservations.
Mini computers
These are computers which are neither too big nor too small in size
They are designed to accommodate more than one user
The are a bit costly than micro computers
Their processing speed is a bit faster than micro computers
They have a large storage capacity than microcomputers and lesser than
mainframe computer
Micro computers
- Desktops
These are a type of microcomputers also called Personal Computers (PCs).
They are compact, powerful and versatile machines
They generally serve a single user
The desktop type may be one integral unit having monitor and CPU or may be
separate ( Tower units)
- Laptops
These are powerful portable computers
They are designed for single user
They have low processing speed
Computer Generations
The history of computer development is often referred to in reference to the different generations of
computing devices. A generation refers to the state of improvement in the product development process.
9 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
This term is also used in the different advancements of new computer technology. With each new
generation, the circuitry has gotten smaller and more advanced than the previous generation before it. As a
result of the miniaturization, speed, power, and computer memory has proportionally increased. New
discoveries are constantly being developed that affect the way we live, work and play.
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often
enormous, taking up entire rooms.
A magnetic drum, also referred to as drum, is a metal cylinder coated with magnetic iron-oxide material on
which data and programs can be stored.
The tracks on a magnetic drum are assigned to channels located around the circumference of the drum,
forming adjacent circular bands that wind around the drum. A single drum can have up to 200 tracks. As the
drum rotates at a speed of up to 3,000 rpm, the device's read/write heads deposit magnetized spots on the
drum during the write operation and sense these spots during a read operation. This action is similar to that
of a magnetic tape or disk drive.
They were very expensive to operate
They used a great deal of electricity,
Generated a lot of heat, which was often the cause of malfunctions.
First generation computers relied on machine language to perform operations, and they could only solve one
problem at a time. Machine languages are the only languages understood by computers. While easily
understood by computers, machine languages are almost impossible for humans to use because they consist
entirely of numbers. Computer Programmers, therefore, use either high level programming languages or
an assembly language programming. An assembly language contains the same instructions as a machine
language, but the instructions and variables have names instead of being just numbers.
Acronym for Electronic Numerical Integrator and Computer, the world's first operational electronic digital
computer, developed by Army Ordnance to compute World War II ballistic firing tables. The ENIAC,
weighing 30 tons, using 200 kilowatts of electric power and consisting of 18,000 vacuum tubes, 1,500
relays, and hundreds of thousands of resistors, capacitors, and inductors, was completed in 1945.
They had maintenance problems
They had limited primary memory
Transistors replaced vacuum tubes and ushered in the second generation computer. Transistor is a device
composed of semiconductor material that amplifies a signal or opens or closes a circuit. Invented in 1947 at
Bell Labs, transistors have become the key ingredient of all digital circuits, including computers. Today's
latest microprocessor contains tens of millions of microscopic transistors
They were smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation
predecessors.
Second-generation computers still relied on punched cards for input and printouts for output.
Second-generation computers moved from cryptic binary machine language to symbolic, or assembly,
languages, which allowed programmers to specify instructions in words. High-level programming languages
were also being developed at this time, such as early versions of COBOL and FORTRAN.
These were also the first computers that stored their instructions in their memory, which moved from a
magnetic drum to magnetic core technology.
10 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
The first computers of this generation were developed for the atomic energy industry.
The development of the integrated circuit was the hallmark of the third generation of computers. Transistors
were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed
and efficiency of computers. Silicon is the basic material used to make computer chips, transistors, silicon
diodes and other electronic circuits and switching devices because its atomic structure makes the element an
ideal semiconductor. Silicon is commonly doped, or mixed, with other elements, such as boron,
phosphorous and arsenic, to alter its conductive properties.
A chip is a small piece of semi conducting material (usually silicon) on which an integrated circuit is
embedded. A typical chip is less than ¼-square inches and can contain millions of electronic components
(transistors). Computers consist of many chips placed on electronic boards called printed circuit boards.
There are different types of chips. For example, CPU chips (also called microprocessors) contain an entire
processing unit, whereas memory chips contain blank memory.
Computer chips, both for CPU and memory, are composed of semiconductor materials. Semiconductors
make it possible to miniaturize electronic components, such as transistors. Not only does miniaturization
mean that the components take up less space, it also means that they are faster and require less energy.
Instead of punched cards and printouts, users interacted with third generation computers through keyboards
and monitors and interfaced with an operating system, which allowed the device to run many different
applications at one time with a central program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were smaller and cheaper
than their predecessors.
High reliability
Smaller size
Use parallel processing
Introduction of simpler programming language eg BASIC
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits we
rebuilt onto a single silicon chip. A silicon chip that contains a CPU. In the world of personal computers, the
terms microprocessor and CPU are used interchangeably. At the heart of all personal computers and most
workstations sits a microprocessor. Microprocessors also control the logic of almost all digital devices, from
clock radios to fuel-injection systems for automobiles.
Instruction Set: The set of instructions that the microprocessor can execute.
Clock Speed: Given in megahertz (MHz), the clock speed determines how many instructions per second the
processor can execute.
As these small computers became more powerful, they could be linked together to form networks,
which eventually led to the development of the Internet.
Fourth generation computers also saw the development of GUI's, the mouse and handheld devices
Introduction of a wide variety of software
11 Compiled By Lazaro Mwangi
Compiled By Lazaro Mwangi
They became cheap enough for schools and homes to purchase them
Games Playing: programming computers to play games such as chess and checkers
Expert Systems: programming computers to make decisions in real-life situations (for example,
some expert systems help doctors diagnose diseases based on symptoms)
Natural Language: programming computers to understand natural human languages
Neural Networks: Systems that simulate intelligence by attempting to reproduce the types of
physical connections that occur in animal brains
Robotics: programming computers to see and hear and react to other sensory stimuli
Currently, no computers exhibit full artificial intelligence (that is, are able to simulate human behavior). The
greatest advances have occurred in the field of games playing. In the area of robotics, computers are now
widely used in assembly plants, but they are capable only of very limited tasks. Robots have great difficulty
identifying objects based on appearance or feel, and they still move and handle objects clumsily.
Natural-language processing offers the greatest potential rewards because it would allow people to interact
with computers without needing any specialized knowledge. You could simply walk up to a computer and
talk to it. Unfortunately, programming computers to understand natural languages has proved to be more
difficult than originally thought. Some rudimentary translation systems that translate from one human
language to another are in existence, but they are not nearly as good as human translators.
There are also voice recognition systems that can convert spoken sounds into written words, but they do not
understand what they are writing; they simply take dictation. Even these systems are quite limited -- you
must speak slowly and distinctly.
In the early 1980s, expert systems were believed to represent the future of artificial intelligence and of
computers in general. To date, however, they have not lived up to expectations. Many expert systems help
human experts in such fields as medicine and engineering, but they are very expensive to produce and are
helpful only in special situations.
Today, the hottest area of artificial intelligence is neural networks, which are proving successful in a number
of disciplines such as voice recognition and natural-language processing.
A standard QWERTY keyboard has about 102 keys grouped into categories;
-
Functional keys
-
Alphabetic keys
-
Special keys
-
Cursor movement keys
-
Numeric keypad
The following are some functions of important keys on the keyboard
1) The Function Keys (F1- F12)
These keys are used to perform specific tasks eg F1 to activate help menu in MS-Word
2) Alphabetic keys
These are keys with alphabetical letters used for typing letters and words.
3) Special keys
These are keys used either alone or in combination with others to perform a function. Eg
i) Control Keys (Ctrl)
Used as a shortcut to activate task when held down while taping another key eg
Ctrl + C = Copy
Ctrl + S = Save Ctrl + U = Underline
Ctrl + V = paste Ctrl + X = cut
Ctrl + A = Select all Ctrl + B = Bold
Ctrl + P = Print Ctrl + I = italic
Ctrl + Z = Undo Ctrl + N = New window
Ctrl + Y = Redo
5) Numeric keypad
Enter numbers 0-9
ii) Mouse
It is an input device which lets user move the cursor around the screen. It has at least two buttons. The left
button select icons and commands. The right button brings up a menu.
A mechanical mouse has a rubber or metal ball on it’s under side. When the ball rolls in a certain
direction, electronic circuits in the mouse translated the movement of the mouse into signals that the
16
computer can process. A mouse pad is a rectangular rubber or a foam pad that provides a better traction
than the top of a desk.
An optical mouse, by contrast, has no moving mechanical parts inside. Instead, it uses devices that emit
and sense light to detect the mouse movement.
A mouse contacts the computer in several ways. Many are attached to a serial port, mouse port or USB
port and system.
– Terminologies
- Clicking
This is pressing the mouse button once to activate a button.
- Double clicking
This is pressing the mouse button twice in rapid succession to open a file or folder.
- Right clicking
This is pressing the right mouse
- Left clicking
This is pressing the left mouse
- Scrolling
This is the process of moving the open window content either upward or downward using vertical scroll
bar or to the left or right using horizontal scroll bar.
iii) Scanner
It an input device that can create a digital representation of a printed image.
17
Output devices
i) Monitor (Visual display unit)
The display screen are also called monitors which serve as a one way window between the computer user
and the machine. Most displays fold into one of the two classes: television –style cathode-ray tube (CRT)
monitors and flat-panel liquid crystal display (LCD) displays. Overhead projection panels and video
projectors also use LCDs to project computer screen images for meetings and classes.
ii) Printer
A printer can produce a hard copy on paper of any static information that can be displayed on the
computer screen. Printer come in several varieties, but they all fit into two basic groups: impact printers
and nonimpact printers.
i) Arithmetic unit – this performs the calculations such as addition, multiplication, division and
subtraction.
ii) The logic unit – this performs the comparisons such as true or false, greater than, equal to, less
than, etc.
b) Control unit
It processes the instructions and data stored in the computer and transfers them to the arithmetic logic unit.
18
CPU
MAIN MEMORY
CPU Operation
The fundamental operation of most CPUs, regardless of the physical form they take, is to execute
a sequence of stored instructions called a program. The program is represented by a series of numbers that
are kept in some kind of computer memory. There are four steps that nearly all CPUs use in their
operation: fetch, decode, execute, and write back.
i) The first step, fetch, involves retrieving an instruction (which is represented by a number
or sequence of numbers) from program memory. The location in program memory is determined by a
program counter (PC), which stores a number that identifies the current position in the program. In other
words, the program counter keeps track of the CPU's place in the program.
The instruction that the CPU fetches from memory is used to determine what the CPU is to do.
ii) In the decode step, the instruction is broken up into parts that have significance to other portions of
the CPU. The way in which the numerical instruction value is interpreted is defined by the CPU's
instruction set architecture (ISA).
However, in more abstract and complicated CPUs and ISAs, a micro-program is often used to assist in
translating instructions into various configuration signals for the CPU. This micro-program is sometimes
rewritable so that it can be modified to change the way the CPU decodes instructions even after it has been
manufactured.
iii) After the fetch and decode steps, the execute step is performed. During this step, various portions
of the CPU are connected so they can perform the desired operation. If, for instance, an addition operation
was requested, an arithmetic logic unit (ALU) will be connected to a set of inputs and a set of outputs. The
inputs provide the numbers to be added, and the outputs will contain the final sum. The ALU contains the
circuitry to perform simple arithmetic and logical operations on the inputs.
iv) The final step, write back, simply "writes back" the results of the execute step to some
form of memory. Very often the results are written to some internal CPU register for quick access by
subsequent instructions. In other cases results may be written to slower, but cheaper and larger, main
memory. Some types of instructions manipulate the program counter rather than directly produce result
data. These are generally called "jumps" and facilitate behavior like loops, conditional program execution
(through the use of a conditional jump), and functions in programs.
After the execution of the instruction and writeback of the resulting data, the entire process repeats, with
the next instruction cycle normally fetching the next-in-sequence instruction because of the incremented
value in the program counter. If the completed instruction was a jump, the program counter will be
modified to contain the address of the instruction that was jumped to, and program execution continues
19
normally. In more complex CPUs than the one described here, multiple instructions can be fetched,
decoded, and executed simultaneously.
Computer buses
A bus is a path between components of a computer. There are two main buses in a computer; the internal
(or system) bus and the external (or expansion) bus. The system bus connects all the internal computer
components to the CPU and main memory.
When a word or data is transferred between units, all the bits are transferred in parallel over a set of lines
called bus. In addition to the lines that carry the data, the bus must have lines for address and control
progress.
All buses consist of two parts; an address bus and a data bus.
The data bus transfers information about the data whereas the address bus transfers information about
where the data should go. The size of a bus determines how much data can be transmitted at a time.
Every bus has a clock speed measured in Mhz. A fast bus allows the data to be transferred faster. This
makes applications run faster on PCs.
Characteristics of a bus
A bus is characterized by the amount of information that can be transmitted at once. This amount,
expressed in bits, corresponds to the number of physical lines over which data is sent simultaneously. A
32-wire ribbon cable can transmit 32 bits in parallel. The term “width” is used to refer to the number of
bits that a bus can transmit at once.
Additionally, the bus speed is also defined by its frequency (ranging from 100-133 Hertz), the number of
data packets sent or received per second. Each time that data is sent or received is called a cycle. This
way, it is possible to find the maximum transfer speed of the bus.
Bus Categories
In reality, each bus is generally constituted of 50 to 100 distinct physical lines, divided into three
subcategories.
i). Address bus
The address bus (sometimes called the memory bus) transports memory addresses which the processor
wants to access in order to read or write data. It is a unidirectional bus. It connects only the CPU and
RAM and carries only memory address (Note- each byte in RAM is associated with a number which is its
memory address.
ii). Data bus
The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.
Actually it is a group of parallel wires.
iii). Control bus
The control bus or (command bus) transfers orders and synchronization signals coming from the control
unit and travelling to all other hardware components. It is a bidirectional bus, as it also transmits response
signals from the hardware.
The primary buses
There are generally two buses within a computer;
i). System (internal) bus – sometimes called the front-side bus, or FSB for short. Cables from disc
drives and other internal devices are plugged into the bus. The internal bus allows the processor to
communicate with the system’s central memory the RAM. It enables various motherboard components
(USB, serial and parallel ports, cards inserted in PCI connectors, hard drives, CD-ROM and CD- RW
drive etc) to communicate with one another.
ii) External (Expansion) bus
20
This connects external devices such as keyboard, mouse, modem, printer and so on to the CPU.
However, it is mainly used to add new devices using what are called expansion slots connected to the
Central Processing Unit.
a) Peripherals
These are attachments to the system unit and include keyboard, mouse, speakers etc
Storage Media
i) Primary (Main memory)
The memory unit stores information inform of instruction and data. Computer memory is contained on
memory chips mounted on the motherboard.
There are two types of main memory in use today: Random Access Memory (RAM) and the Read Only
Memory (ROM).
It is the most common computer memory which can be used by programs to perform necessary tasks
while the computer is on, an integrated circuit memory chip allows information to be stored or accessed
in any order and all storage locations are equally accessible.
The RAM is the place in a computer where the operating system, application programs, and data in
current use are kept so that they can be quickly reached by the computer’s processor. RAM is much
faster to read from and write to than the other kinds of storage in a computer, the hard disc, floppy disc,
and CD-ROM. However, the data in RAM stays there only as long as your computer is running. When
you turn off your computer, RAM loses its data. When you turn on your computer again, your operating
system and other files are once again loaded into RAM usually from the hard disc.
21
There are two technologies used for RAM memories; static and dynamic.
STATIC RAM
It stores a bit of information with a flip-flop i.e. the contents of a static RAM remains stable forever, as
long as power is available.
DYNAMIC RAM
It stores a bit of information as a charge. Due to the way in which the information is stored here, the
packing density is much higher than for static RAM.
On the other hand, ROM provides permanent or semi permanent storage only, its content can be read but
cannot be re-written during normal computer operations (is non-volatile). It stores some standard
processing programmes supplied by the manufactures to operate the personal computer (PC). The basic
input/output program is stored in the ROM that examines and initializes various equipment attached to
the PC, when the switch is made ON.
One important reason a computer needs ROM is that it must know what to do when the power is first
turned on. Among other things, ROM stores a set of start-up instructions, which ensures that the rest of
memory is functioning properly, checks for hardware devices and checks for an operating system on the
computer hard disc.
ii) Cache
Hard Discs
A hard disc is a metal platter coated with magnetic oxide that can be magnetized to represent data. Hard
discs come in a variety of sizes.
- Hard disc for mainframes and minicomputers may be as large as 14 inches in diameter. Several discs can
be assembled into a disc pack. There are different types of disc packs, with the number of platters
varying by model. Each disc in the pack has top and bottom surfaces on which to record data. Many disc
devices, however, do not record data on the top of the top platter or on the bottom of the bottom platter.
The mechanism for reading or writing data on a disc is an access arm; it moves a read/write head into
position over a particular track. The read/write head on the end of the access arm hovers just above the
track but does not actually touch the surface. When a read/write head does accidentally touch the disc
surface, this is called a head crash and all data is destroyed. Data can also be destroyed if a read/write
head encounters even minuscule foreign matter on the disc surface.
- Tapes
- The amount of data on a tape is expressed in terms of density, which is the number of characters per
inch (CPI) or bytes per inch (bpi) that can be stored on the tape.
The highest-capacity tape is the digital audio tape, or DAT, which uses a different method of recording
data. Using a method called helical scan recording, DAT wraps around a rotating read/write head that
spins vertically as it moves. This places the data in diagonal bands that run across the tape rather than
down its length. This method produces high density and faster access to data.
22
Two reels are used, a supply reel and a take-up reel. The supply reel, which has the tape with data on it
or on which data will be recorded, is the reel that is changed. The take-up reel always stays with the
magnetic tape unit. Many cartridges and cassettes have the supply and take-up reels built into the same
case.
Tape now has a limited role because disc has proved the superior storage medium. Disc data is quite
reliable, especially within a sealed module. Furthermore, as we will see, disc data can be accessed
directly, as opposed to data on tape, which can be accessed only by passing by all the data ahead of it on
the tape. Consequently, the primary role of tape today is as an inexpensive backup medium.
- Diskettes
Made of flexible Mylar, a diskette can record data as magnetized spots on tracks on its surface. Diskettes
became popular along with the personal computer.
The older diskette, 5-1/4 inches in diameter, is still in use, but newer computers use the 3-1/2 inch diskette
(Figure 1). The 3-1/2 inch diskette has the protection of a hard plastic jacket, a size to fit conveniently in
a shirt pocket or purse, and the capacity to hold significantly more data than a 5-1/4 inch diskette.
- Flash discs
Personal computer users, who never seem to have enough hard disc storage space, may turn to a
removable hard disc cartridge. Once full, a removable hard disc cartridge can be replaced with a fresh
one. In effect, a removable cartridge is as portable as a diskette, but the disc cartridge holds much more
data. Removable units also are important to businesses concerned with security, because the units can be
used during business hours but hidden away during off hours. A disadvantage of a removable hard disc
is that it takes longer to access data than a built-in hard drive. Also it can be infected with viruses which
delete files.
Optical storage technology is categorized according to its read/write capability. Read-only media are
recorded on by the manufacturer and can be read from but not written to by the user. Such a disc cannot,
obviously, be used for your files, but manufacturers can use it to supply software. Applications software
packages sometimes include a dozen diskettes or more; all these could fit on one optical disc with plenty
of room to spare. The most prominent optical technology is the CD-ROM, for compact disc read-only
memory.
The Compact Disc Read-Only Memory (CD-ROM)
The most prominent optical technology is the CD-ROM, for CD-ROM has a major advantage over other
optical disc designs: The disc format is identical to that of audio compact discs, so the same dust-free
manufacturing plants that are now stamping out digital versions of Mozart or Mary Chapin Carpenter
can easily convert to producing anything from software to an encyclopedia. Furthermore, CD-ROM
storage is large -up to 660 megabytes per disc, the equivalent of over 400 3-1/2 inch diskettes.
a) Point. Moving the mouse pointer to a desired spot on the screen such as over a particular word or
object.
b) Click. Used to select or highlight an object or icon on the screen. Also click is used to position the
cursor for instance in a word processor to indicate where to start inserting text, numbers, pictures or
images. This is done by pressing and releasing quickly, the left mouse button once.
c) Double click is used to
open icons on the desktop. This is done by, pressing the left mouse button in two quick successive clicks.
d) Drag & drop is used to
change the position of icons on the desktop. It’s also used to move an icon from one location to another.
This is done by pressing and holding down the left mouse button over an icon; the mouse pointer is used
to move the object to a new location or position and then release it.
e) Right click is used to
access shortcut menu. This is done by, pressing the right mouse button once, and then a pop-up menu
appears.
1. Trackball is a movable ball on top of a stationary device that is rotated with fingers or palm of the
hand. It’s like an upside down mouse with a protruding ball on top.
Trackball
2. Pointing stick looks like a pencil eraser protruding from the keyboard between letters G, H and B. It
is commonly found in laptops.
3. Joystick is a pointing device that consists of a vertical handle like gearshift lever mounted on a base
with one or two buttons. Joysticks are used in video and computer games.
4. Touch pad is a small, flat surface which you slide your finger to move the cursor. Touch pads have
sensors used to detect finger movement. They’re also found in laptops.
5. Light pen contains a light sensitive cell on its tip. Light pen is a light-sensitive stylus, or pen like
device connected by a wire to the computer terminal. The user brings the pen to a desired point on the
display screen and presses the pen button, which identifies that screen location to the computer.
Engineers and illustrators use light pens.
24
Advantages & disadvantages of the following pointing devices.
Advantages. Devices. Disadvantages.
ii). Magnetic ink character recognition (MICR) used by banks for handling cheques. Some
of the characters are printed in special magnetic ink.
A barcode & barcode number
A sample cheque
iii). Optical mark reader (OMR) works on the principle that a beam light is used to read and
detect marks on specially prepared documents e.g. answer sheets for multiple choice in an
examination.
iv). Optical character reader (OCR). This is a device used to read printed characters (letters
& figures) in a particular font and concerts them into a digital code. It is used in preparation of gas
and electricity bills.
v). Scanner is a device that translates photos, images, drawings and text into digital form.
A flatbed scanner
Processing hardware.
The data processing hardware here is the CPU; which stands for central processing unit. It is also referred
to as the “brain” of the computer. It follows the instructions of the software to perform calculations,
manipulates data into information and manages the flow of the same information through
the computer.
Microprocessor architecture.
There are four major functional elements or units in a microprocessor system, namely: -
i). The control unit. It directs the movement of electronic signals between main memory and the
arithmetic logic unit. It also directs these electronic signals between main memory and the
input/output devices. For every instruction, the control unit carries out four basic operations known
as the- machine cycle. In the machine cycle the CPU (i). Fetches an instruction (ii). Decodes the
instruction (iii). Executes the instruction (iv). Stores the results.
26
ii). Arithmetic and logic unit (ALU). The ALU performs arithmetic and logical operations
and controls the speed of those operations. Arithmetic operations are the fundamental math
operations such as addition, subtraction, division and multiplication.
Logical operations are comparisons. That is, the ALU compares two pieces of data to see whether
one is equal to, greater than or less than logical operation.
iii). Registers are special high-speed storage areas. The control unit and the ALU also use registers,
special areas that enhance the computer’s performance. Therefore, registers are high-speed storage
areas that temporarily store data during processing.
They may store program instructions while it is being decoded; stores data while it is being
processed by the ALU or store the results of a calculation.
iv). Computer bus. A bus is a set of parallel wires or electronic pathway used to transmit data,
commands/instructions and power between the CPU and other components of the motherboard.
A bus resembles a multilane highway. The more bus lines it has, the faster the data bits can be
transferred.
Output hardware/Devices.
These are devices that translate information processed by the computers into a form that humans can
understand.
The two types of outputs are soft copy such as the one shown on the display screen, and the hard copy,
which is a printout from a printer.
Soft copy refers to data that is shown on the monitor, audio or voice form. This kind of output is not
tangible.
Hard copy is a printout from a printer and these are tangible output.
Display screens.
Display systems convert computer signals into text and pictures and display them on a television like
screen. Display screens use either cathode ray tube (CRT), liquid crystal display (LCD), plasma or flat
panel display.
An example of CRT is a monitor. A monitor is a specialized high-resolution screen similar to high quality
television set. The video card sends the contents of the system memory via the video RAM on the VGA
card into the monitor.
Speakers.
Speakers are output devices that communicate sound to the user. Speakers produce soft copy output.
Printers.
A printer is an output device that prints characters, symbols and graphics on a paper or any other hard
copy medium.
There are two classes of printers: -
1. Impact printers.
2. Non-impact printers.
Impact printer
forms characters or images by striking on the paper with “hammers” when printing against an inked
ribbon. Therefore the printing head comes into contact with the printing media.
Impact printers can be further subdivided into: -
i). Line printers.
ii).Character printers.
27
i). Line printers print one line of characters at a time. It prints at a rate of 300 to 3000 lines per
minute.
Examples of line printers are drum printers and chain printers.
ii). Character printers. They print one character at a time. They are much slower than the line
printers.
Examples of character printers include daisy wheel and dot matrix printers.
Non-impact printers
don’t have “hammers”. The printing head does not come into contact with the printing media. Instead it
uses laser beam to produce a printout. Non-impact printers print a page at a time.
Examples of non-impact printers are laser and inkjet printers.
a) Laser printers use a laser beam to create a page printout. It is a high quality printer, which operates at
a high speed.
b) Ink jet printers use the concept of spraying ink onto the paper. Ink is sprayed from tiny holes on the
ink cartridge onto the paper. Print quality is better than impact printers but not as good as laser
printers.
Advantages and disadvantages of both laser and ink jet printers.
Laser printers. Ink jet printers.
Advantages. Advantages.
They are quiet and fast when printing. They are also quiet & fast when
printing.
Produces excellent quality printout. Less expensive to buy compared to laser
printers.
Plotters are used for producing technical drawings or even marketing materials such as posters. They can
print on architectural size paper.
SYSTEM SOFTWARE
These are programs that start up the computer and function as the principal coordinator of all
hardware components and applications software programs. This is first loaded into the RAM of
the computer before loading the application software. It is developed and installed in the
computer system for the purpose of developing other programs. The software is developed and
installed by the manufacturer of the system hardware.
Functions of system software
1. Booting the computer and ensuring that all the hardware elements are working properly.
2. Performing operations such as retrieving, loading, executing and storing application
programs.
3. Storing and retrieving files
4. Performing a variety of system utility programs
System software is divided into:-
i) Operating system-programs used start up a computer. Examples include MSDOS,
windows, Linux.
ii) Utility software
iii) Firmware
iv) Networking software
Firmware (Stored logic)
This is a combination of both the software and hardware recorded permanently on
electronic (memory) chips that is mounted/plugged into the motherboard.
Utility software
This is a special program that makes certain aspects of the computer to go on more
smoothly and support the development of the application programs and render services
by performing the common processing requirements.
Such services include sorting, copying, file handling and disc management.
These utility programs are usually available on separate diskettes.
Examples
i) Virus protection – the anti-virus utility program scans hard discs, diskettes,
and memory to detect and delete viruses. Example – Norton, NOD32,
Kaspersky, McAfee, Avira etc
ii) Backup – this utility make automatic backup or duplicate copy of
information on the hard disc
iii) Data recovery – it is used to restore data that has been physically damaged
or corrupted.
Common service programs
a) Text editors
29
b) Language translators
c) Linker
d) Loader
e) Sort utility
f) Merge utility
g) Copy utility
h) Dump utility
i) Database Management System (DBMS)
APPLICATION SOFTWARE
Application packages are programs that are designed to help the user accomplish specific tasks.
These consist of computer programs designed to satisfy a user’s specific needs. They are
developed by software engineers, packaged and then made available for purchase through vendors.
A developer may bundle more than one but closely related software into one package to form a
suite or integrated software. Examples – Lotus suite, Microsoft office 2003,
Advantages of offshelf software
1. They are less expensive to acquire than the in-house software
2. They are readily available for almost any task
3. Most of the packages are user friendly.
4. Saves development time and cost of developing programs.
5. The packages are generally portable
Disadvantages of offshelf software
1. The user cannot modify the program to meet his/her needs.
2. The package may not meet the organization needs.
30
Tailor made (in-house)
These are programs that are uniquely designed and tailored to meet user’s needs. For example,
a bank may decide to manage its operations using a unique program developed by the
programmer.
These software are developed using specific program language. These programs are not
available in the shops and once developed for one company or user may not address needs of
other users.
Advantages of in-house software
1. Handles specific needs of the user
2. They can easily be modified to suit the needs of the user
Disadvantages of in-house software
1. Expensive to develop
2. Cannot be used to solve several tasks
a) Installation of basic computer software
When a program is to be installed in the computer, the program CD is inserted in the CD drive and
further systematic instructions will be displayed on the desktop. Once all the steps have been
completed, a dialog box indicating that the program has been successfully installed will be
displayed. Usually it is recommended to restart the computer for the new program to function.
Additional hardware such as printers usually comes with installation software for that particular
printer.
iv) Programming languages
A programming language is a set of rules that provide a way of telling the computer what
operations to perform.
Levels of languages
v) Lower Level language – are close or similar to the language computer itself uses
or understand or machine understandable language ie 0s &1s
vi) Higher level language- are closer or similar to language people use or human
understandable language like English
GENERATION OF LAGUAGES
There are five levels of language corresponding to generations.
1) Machine languages
Represents data and program instructions as 0s and 1s ie binary digits that correspond to the
on/off electrical states in the computer. It is composed of numbers.
2) Assembly languages
To replace the 0s and 1s in machine language, assembly language use mnemonic codes,
which are abbreviations that are easy to remember eg A for Add, C for Compare, MP for
Multiply etc?
Since machine language is the only language that the computer can actually execute, a
translator called Assembly Program is required to convert the assembly language program
into machine language
3) High-level languages
Programs were written in an English-like manner, thus making them more easy and a
programmer could accomplish more with less effort.
A translator is needed to translate the symbolic statements of a high-level language into
computer executable machine language and this translator is a compiler. There are many
compilers for each language and at least one for each type of computer eg FORTRAN
FORmula TRANslator.
4) Very High-level languages
These are shorthand programming languages. They are often known by their generation
number ie fourth generation languages or 4GLs.
31
An operation that requires hundreds of lines in the 3rd GL typically requires only 5-10
lines in 4GL. These are difficult to describe because there are so many types eg COBOL
& Query Language for database.
5) Natural languages
These resemble the ‘natural’ spoken English language ie they are similar to human
understandable language. They are the latest 5th GL and most ill-defined than 4th GLs. A
user of one of these languages can say the same thing in a number of ways.
The compiler translate this natural language to machine language and when it is not sure
what the user has in mind, it politely as for further explanation.
Booting
refers to the process of starting up a computer.
There are two ways of booting up a computer;
a) Cold booting – done using the power button on the computer’s system unit.
Normally done when the computer is initially off.
b) Warm booting – this is done when the computer hangs (it temporarily stops to
receive instructions). It is done by use of the reset/restart button on system unit or
by a combination of the following keys from the keyboard; CTRL + ALT +DEL.
1. During booting, a small program known as bootstrap which is stored in ROM is executed.
2. During execution, the program checks:-
i) Mouse, keyboard and monitor, discs are functioning well
ii) Carries out diagnostic check of the CPU, RAM, ROM to confirm that none of them is has a
fault.
iii) If all items are working well, the bootstrap loads program of the memory resident portion
of the OS from the disk into the memory.
iv) The bootstrap then passes control to the OS by causing the first instruction of OS to be
executed.
v) The OS then display on the screen an interface through which one can interact with the
computer.
Non-resident
They are only loaded into a RAM as and when it is needed. These include:-
i) Program development tools
32
ii) House-keeping utilities
iii) Sorting programs that manage data into some required order
iv) Special maths programs
Single program
It allows processing of only one user program in the main memory at a time. User can only run one
interface program at a time. The user must exit from the program before loading and running another
program. Example Ms-DOS
Multitasking OS
It allows single CPU to execute what appears to be more than one program at the same time. The CPU
switches its attention between programs as it receives requests for processing, executing instructions from
one program and then from another using the concept of giving a time slices to each application.
Booting a Computer
33
Wait as the computer goes off or prompts you to safely turn it off. This depends on
the type of the computer’s processor.
Directories/folders/files management
i) Creating folders/files
Creating a file or folder on the desktop
a) Right click an empty location on the desktop
b) Point at New from the pop - up menu
c) To create a file, select the name of the program to create the file by e.g. Microsoft
Word. To create a folder, click on folder from the side kick menu
d) Type the name of the file or the folder
e) Press enter
Creating a file or folder in another folder window
a) Click on the file menu
b) Point at New from the pop - up menu
c) To create a file, select the name of the program to create the file by e.g. Microsoft
Word. To create a folder, click on folder from the side kick menu
d) Type the name of the file or the folder
34
e) Press enter
NB: A folder in another folder is called a subfolder.
ii) Copying files and folders
Duplicating the file or the folder in the same storage location or another.
Steps
a) Select the file/folder to copy
b) Click on the edit menu
c) Click on copy from the pull down menu
d) Open the new location to copy the folder to
e) Click on edit menu again
f) Click on paste from the pull down menu
Assignment
Locate the shortcut commands from the standard toolbar used for copying and
pasting files and folders.
iii) Moving/copying folders/files
Relocating the file or the folder to same storage location or another location.
Steps
a) Select the file/folder to move
b) Click on the edit menu
c) Click on cut from the pull down menu
d) Open the new location to move the folder to
e) Click on edit menu again
f) Click on paste from the pull down menu
Assignment
Locate the shortcut commands from the standard toolbar used for moving and
pasting files and folders.
iv) Renaming files/folders
File and folder names can be changed
Steps
a) Select the file/folder to rename
b) Click on the file menu
c) Click on rename from the pull down menu
d) Type the new name and then press enter from the keyboard
Or
Right click the file or the folder to rename
Click on rename from the popup menu
Type the name then press enter key from the keyboard
v) Deleting files/folders
Folders stored in drive c: / are temporary send to the recycle bin when deleted and
can be later deleted permanently or restored to their original locations.
Those stored in removable media like floppy disks and flash disks are not sent to
the recycle bin and may not be recovered.
Steps
a) Select the file/folder to delete
b) Click on the file menu
c) Click on delete and confirm deletion
OR
Select the file/folder, press delete key form keyboard the confirm deletion
vi) Searching and sorting files
vii) File security and protection
There are different methods used to ensure that files and folders are free from
unauthorized access. This may include
a) Assigning passwords to open and write files
35
b) Assigning log-in user names and password for the computers containing the
files
c) Applying the read-only attributes to ensure that new data cannot be
accidentally written in the file
d) Write protecting storage media like the floppy disks
e) Applying hide attributes to ensure that the files are not visible to the
unauthorised access
f) Encrypting data/information in the file
viii) Drive/file/folder properties
Relocating the file or the folder to same storage location or another location.
Steps
a) Select the drive/file/folder to view its properties
b) Click on the file menu
c) Click on properties from the pull down menu. The properties dialog box appears.
d) Properties window appears. Using the properties you be able to ascertain the size and
attributes of the drive/file/folder etc
b) Managing discs
i) Assigning a volume label
ii) Checking disc storage status
iii) Formatting a disc
iv) Scanning a disc
36
They have superior editing tools such as spelling checker, the Thesaurus etc. hence
making editing easier.
Can store documents for future retrieval
They have superior formatting features that make a document more appealing to the
reader.
The user can produce multiple copies more easily
Copy and move (cut) operation make it easier to manipulate a document.
37
i) Title bar - Title bar indicates the name of the application program in use the
currently open file, minimizes, and restore and the close buttons.
ii) Menu bar - The menu bar provides the user with group of commands in drop down
list used to create and manipulate a document.
iii) Standard Toolbar – this comprises many buttons of commands that provide
shortcut to the same commands available in the menu bar. These buttons relate to
frequently performed activities, which are performed while typing the text. To know
which button perform which activity, rest the mouse pointer on the button for a while.
When you do so, a message, called tool tip will get displayed. For example, when the
“save” button is clicked, typed text will be saved.
iv) Document window/Work Area - This is the work area where you create your
document. It resembles an ordinary piece of paper.
v) Status bar - The status bar is the communication point between the user and the
application program. For example in Microsoft Word, when saving a document the
status bar may indicate “Word is saving ……”
vi) Vertical and horizontal scroll bars/Arrows - Used to view the hidden parts of the
document. E.g. one can view text hidden at the top of the page by scrolling down and
view hidden at the bottom by scrolling down the document using the scroll bars or the
arrows.
vii) View buttons - Used to switch between different document views e.g. normal view.
viii) Cursor/Insertion pointer – Shows where the next character will appear as
you type.
Document Views
• Microsoft word provides different views for viewing the document that include;
a) Normal
b) Web layout
c) Print layout
d) Outline
To change from one view to another, follow the steps below;
1) Click on view menu
2) Click on the type of view that you want to display
QS: What is the difference between the different views of the Microsoft word document?
a. Fonts
To format text font:
1. Highlight the text
2. From the Format menu, click Font
3. In the font dialog box, select the font type, style, size and colour and any other
attribute.
4. Click OK.
Paragraph formatting
A paragraph is a separate block of text dealing with a single theme and starting on a new
line or indent. Some of the formatting features you can apply onto a paragraph include
Alignment
38
Alignment is the arrangement of text relative to the left margin, centre of page or the right
margin. The five major alignment options available are the left, centre, right and justified
and force justified.
To align text:
1. Highlight the text
2. From the Format menu, click Paragraph.
3. In the paragraph dialog box, select the alignment option from the alignment list box
then click the OK.
NB: You can apply alignment by simply clicking any of the five alignment buttons on the
formatting toolbar
Spacing
You can set the space between lines, paragraphs or blocks text.
To space lines:
1) Highlight the lines of text
2) From the Format menu, click Paragraph
3) In the paragraph dialog box, select the line spacing option from the line spacing list
box
4) Click the OK button.
Drop caps
•A drop cap is a large character in a paragraph that occupies more than one line down.
•To create a dropped cap:
1) Highlight the paragraph you want to begin with drop cap
2) Click on format menu
3) Click Drop Cap. Drop cap dialog box appears
4) Click Dropped or In Margin.
5) Specify the number of lines and other options
6) Click OK.
39
Bullets and numbers are used to create ordered lists.
To add bullets or numbers to a list:
Highlight the text
Click on the format menu
Click on bullets and numbering from the pull down menu
From dialog box displayed, click Bullets or Numbered tab.
Click the bullet or numbering thumbnail you want to apply.
Click Ok.
Page setup
• Page set up options let you define the paper size, margins and operations.
• To set up a page:
1. Click on File menu
2. Click Page Setup from the pull down menu
In the page setup dialog box, click either of the following:
– Margins tab to set up page margins
– Paper tab to specify the paper type and orientation
– Layout tab to specify the page content layout relative to the margins
3. Click OK to apply the settings.
Page breaks
•Page, section and column breaks are used to force the cursor to move from a new page,
section or column even before the end of the current.
•To insert a break:
1. Position the insertion pointer where you want to break
2. Click on the insert menu
3. Click on Break from the pull down menu
4. In the break dialog box, set the break type
E.g. page break, column break etc
5. Click OK.
Change case
The cases applied to text are; lowercase, UPPERCASE, Sentence case, Title Case and
tOGGLE cASE. To change case:
1. Highlight the text
2. From the Format menu, click Change Case
3. From change case dialog box, select the case option you want to apply.
4. Click OK.
NB: The use of case in this sentence is deliberate.
40
Page numbering
i) Page numbers are used to organize a large document for ease of reference.
ii) To insert page numbers:
iii) Click Insert menu
iv) Click on page numbers the insert page numbers dialog box appears
v) In the position box, specify whether to place the page numbers at the top of page
(header) or at the bottom of the page (footer).
vi) In the Alignment box, specify whether to align page numbers to the left, centre or right
of page.
vii) If you don’t want a number on the first page, clear the “Show number on first page”
check box
viii) Click OK.
Headers and footers
• Headers are lines of text that appears at the top margin of every page or selected pages
while footers appears at the bottom margin.
• To insert a header or footer:
a) Click on the View menu
b) Click Header and Footer from the pull down menu
c) To create a header, enter text or pictorial object in the header area.
d) Click on switch between header and footer command button from the header and
footer toolbar to create footer.
e) Click inside the footer area and enter the text or pictorial object.
f) Click Close on the header and footer toolbar.
Creating a table
a) Click where you want to create a table.
b) On the Table menu, point to Insert, and then click Table.
c) Under Table size, select the number of columns and rows.
d) Under AutoFit behaviour, choose options to adjust table size.
e) To use a built-in table format, click AutoFormat.
f) Click ok
41
•Select the same number of cells, rows, or columns as the number of rows or
columns you want to insert. .
•Click on the Table menu
•Point to Insert
•Click an option from the sidekick menu e.g. rows above etc
NB:
•You can also use the Draw Table tool to draw the row or column where you want.
•To quickly add a row at the end of a table, click the last cell of the last row, and
then press the TAB key.
•To add a column to the right of the last column in a table, click in the last column.
On the Table menu, point to Insert, and then click Columns to the Right.
c) Mail merging
i) Creating a main document
• A feature that enables one to create a standard document e.g. forms letters to be received b
many recipients.
• One can use the Mail Merge Wizard to create form letters, mailing labels, envelopes,
directories, and mass e-mail and fax distributions.
• This is done in four basic steps:
a) Open or create a main document
• Main document: In a mail-merge operation in Word, the document that contains the text
and graphics that are the same for each version of the merged document, for example, the return
address or salutation in a form letter.
43
• This is a feature used to locate for a word or a phrase and replace it with another.
To find and replace a word or phrase:
1. From Edit menu, click Find or Replace
The find and replace dialog box
Step-by-Step.
1. Click the mouse on “start ‘button
2. Selet “all programs’
3. Select” Microsoft Excel” and Ms-Excel window will appear
4. Decide on the items to be included in the worksheet.
5. Decide on the layout of the worksheet. (That is, which items should appear in which
columns, etc.)
Name Description
i Active cell indicator
45
This dark outline indicates the currently active cell (one of the 17,179,869,184 cells on
each worksheet).
ii Application Close button - Clicking this button closes Excel.
iii Application Minimize button - Clicking this button minimizes the Excel window.
iv Column letters - Letters range from A to XFD — one for each of the 16,384 columns in the
worksheet. You can click a column heading to select an entire column of cells, or drag a column
border to change its width.
v File button - Click this button to open Back Stage view, which contains many options for
working with your document (including printing), and setting Excel options.
vi Formula bar - When you enter information or formulas into a cell, it appears in this line.
vii Help button - Clicking this button displays the Excel Help system window.
viii Horizontal scrollbar - Use this tool to scroll the sheet horizontally.
ix Minimize Ribbon button - Clicking this button hides the Ribbon, giving you a bit more space
onscreen. When you click a tab, the Ribbon reappears.
x Name box - This field displays the active cell address or the name of the selected cell, range, or
object.
xi Page View buttons - Change the way the worksheet is displayed by clicking one of these buttons.
xii Quick Access toolbar - This customizable toolbar holds commonly used commands. The Quick
Access toolbar is always visible, regardless of which tab is selected.
xiii Ribbon - This is the main location for Excel commands. Clicking an item in the tab list changes the
Ribbon that displays.
xiv Row numbers - Numbers range from 1 to 1,048,576 — one for each row in the worksheet. You can
click a row number to select an entire row of cells.
xv Sheet tabs - Each of these notebook-like tabs represents a different sheet in the workbook. A
workbook can have any number of sheets, and each sheet has its name displayed in a sheet tab.
xvi Insert Sheet button - By default, each new workbook that you create contains three sheets.
Add a new sheet by clicking the Insert Worksheet button (which is displayed after the last sheet
tab).
xvii Sheet tab scroll buttons - Use these buttons to scroll the sheet tabs to display tabs that aren’t
visible.
xviii Status bar - This bar displays various messages as well as the status of the Num Lock, Caps
Lock, and Scroll Lock keys on your keyboard. It also shows summary information about the range of
cells that is selected. Right-click the status bar to change the information that’s displayed.
xix Tab list - Use these commands to display a different Ribbon, similar to a menu.
xx Title bar - This displays the name of the program and the name of the current workbook, and
also holds some control buttons that you can use to modify the window.
xxi Vertical scrollbar - Use this to scroll the sheet vertically.
xxii Window Close button - Clicking this button closes the active workbook window.
xxiii Window Maximize/Restore button - Clicking this button increases the workbook window’s
size to fill Excel’s complete workspace. If the window is already maximized, clicking this button
“unmaximizes” Excel’s window so that it no longer fills the entire screen.
xxiv Window Minimize button - Clicking this button minimizes the workbook window, and it
displays as an icon.
xxv Zoom control - Use this scroller to zoom your worksheet in and out.
Ribbon tabs
The commands available in the Ribbon vary, depending upon which tab is selected. The Ribbon is
arranged into groups of related commands. Here’s a quick overview of Excel’s tabs.
i) Home: You’ll probably spend most of your time with the Home tab selected. This tab contains the
basic Clipboard commands, formatting commands, style commands, and commands to insert and
delete rows or columns, plus an assortment of worksheet editing commands.
ii) Insert: Select this tab when you need to insert something in a worksheet — a table, a diagram, a
chart, a symbol, and so on.
iii) Page Layout: This tab contains commands that affect the overall appearance of your worksheet,
including some settings that deal with printing.
iv) Formulas: Use this tab to insert a formula, name a cell or a range, access the formula auditing
tools, or control how Excel performs calculations.
v) Data: Excel’s data-related commands are on this tab.
vi) Review: This tab contains tools to check spelling, translate words, add comments, or protect
sheets.
vii) View: The View tab contains commands that control various aspects of how a sheet is viewed.
Some commands on this tab are also available in the status bar.
viii) Developer: This tab isn’t visible by default. It contains commands that are useful for
programmers. To display the Developer tab, choose File ➪ Options and then select Customize
Ribbon. In the Customize the Ribbon section on the right, place a check mark next to Developer
and then click OK.
ix) Add-Ins: This tab is visible only if you loaded an older workbook or add-in that
customizes the menu or toolbars
Step-by-Step.
To Enter Data in a Worksheet1. Point the mouse pointer at the cell (intersection of a row and
column) and click the left mouse button. The cell pointer moves to the cell in which you want to
enter data.
2. Type in the data using the keyboard.
3. Press the Enter key.
Filling in the month names
In this step, you enter the month names in column A.
1. Move the cell pointer to A2 and type Jan (an abbreviation for January). At this point, you
can enter the other month name abbreviations manually, but you can let Excel do some of the work
by taking advantage of the AutoFill feature.
2. Make sure that cell A2 is selected. Notice that the active cell is displayed with a heavy outline.
At the bottom-right corner of the outline, you’ll see a small square known as the fill handle. Move
your mouse pointer over the fill handle, click, and drag down until you’ve highlighted from A2
down to A13.
3. Release the mouse button, and Excel automatically fill in the month names.
Your worksheet should resemble the one shown in Figure 1.16.
c) Building worksheet
At this point, your worksheet should resemble the one shown in below. Keep in mind that
except for cell B2, the values in column B are calculated with formulas. To demonstrate, try
changing
the projected sales value for the initial month, January (in cell B2). You’ll find that the formulas
recalculate and return different values. These formulas all depend on the initial value in cell B2,
though.
48
d) Manipulating data on worksheet
3. Click OK to close the Create Table dialog box. Excel applies its default table formatting
and also displays its Table Tools ➪ Design contextual tab. Your worksheet should
look like Figure 1.18.
4. If you don’t like the default table style, just select another one from the Table
Tools ➪ Design ➪ Table Styles group. Notice that you can get a preview of different
table styles by moving your mouse over the Ribbon. When you find one you like, click it, and
style will be applied to your table.
49
Editing the contents of a cell
If the cell contains only a few characters, replacing its contents by typing new data usually is
easiest.
However, if the cell contains lengthy text or a complex formula and you need to make only a slight
modification, you probably want to edit the cell rather than re-enter information.
When you want to edit the contents of a cell, you can use one of the following ways to enter cell
edit mode.
Double-click the cell to edit the cell contents directly in the cell.
Select the cell and press F2 to edit the cell contents directly in the cell.
Select the cell that you want to edit and then click inside the Formula bar to edit the cell
contents in the Formula bar.
You can use whichever method you prefer. Some people find editing directly in the cell easier;
others
prefer to use the Formula bar to edit a cell.
An Excel workbook can hold any number of worksheets, and each worksheet is made up of more
than 17 billion cells. A cell can hold any of three basic types of data:
A numeric value
Text
A formula
A worksheet can also hold charts, diagrams, pictures, buttons, and other objects. These objects
aren’t contained in cells. Rather, they reside on the worksheet’s draw layer, which is an invisible
layer on top of each worksheet.
g) Charts
51
Creating a chart
How about a chart that shows the projected sales for each month?
1. Activate any cell in the table.
2. Choose Insert ➪ Charts ➪ Column and then select one of the 2-D column charts
types. Excel inserts the chart in the center of your screen.
Freezing panes keeps the headings visible while you’re scrolling through the worksheet.
To freeze panes, start by moving the cell pointer to the cell below the row that you want to
remain
visible while you scroll vertically, and to the right of the column that you want to remain visible
while you scroll horizontally. Then, choose View ➪ Window ➪ Freeze Panes and select the
Freeze Panes option from the drop-down list. Excel inserts dark lines to indicate the frozen rows
and columns. The frozen row and column remain visible while you scroll throughout the
worksheet.
To remove the frozen panes, choose View ➪ Window ➪ Freeze Panes, and select the
Unfreeze Panes option from the drop-down list.
Figure 3.8 shows a worksheet with frozen panes. In this case, rows 1:4 and column A are frozen
in
place. This technique allows you to scroll down and to the right to locate some information while
keeping the column titles and the column A entries visible.
The figure below shows a worksheet with frozen panes. In this case, rows 1:4 and column A are
frozen in
place. This technique allows you to scroll down and to the right to locate some information while
keeping the column titles and the column A entries visible.
KAIBO
1 4
42 3 4 35 9
MED 11
E
E WT
EP P MA ICT P
2 3
42 2 4 35 7
MVD 11
E
P ME
LS EP T MA ICT S
3 2
71 7 36 14 8
AGD 11
M
E IMP WT
EP S T ES T
53
5
43 3 68 35 5
ELD 11
A
N
LS EIT E MA ICT EEP
7 6
71 2 71 69 9
GAD 11
C
LS EP P MA AP AE
The vast majority of the time, you’ll want to freeze either the first row or the first column. The
View ➪ Window ➪ Freeze Panes drop-down list has two additional options: Freeze Top Row and
Freeze First Column. Using these commands eliminates the need to position the cell pointer before
freezing panes.
To insert a new row or rows, you can use any of these techniques:
Select an entire row or multiple rows by clicking the row numbers in the worksheet border.
Right-click and choose Insert from the shortcut menu.
Move the cell pointer to the row that you want to insert and then choose Home ➪Cells ➪ Insert
➪ Insert Sheet Rows.
If you select multiple cells in the column, Excel inserts additional rows that correspond to the
number of cells selected in the column and moves the rows below the insertion down.
54
column, select Undo from the Quick Access toolbar (or press Ctrl+Z) to undo the action.
Creating a Table
Most of the time, you’ll create a table from an existing range of data. However, Excel also allows
you to create a table from an empty range so that you can fill in the details later. The following
instructions assume that you already have a range of data that’s suitable for a table.
1. Make sure that the range doesn’t contain any completely blank rows or columns;
otherwise, Excel will not guess the table range correctly.
2. Select any cell within the range.
3. Choose Insert ➪ Tables ➪ Table (or press Ctrl+T). Excel responds with its Create
Table dialog box, shown in Figure 5.4. Excel tries to guess the range as well as whether
the table has a header row. Most of the time, it guesses correctly. If not, make your corrections
before you click OK.
Moving a table
To move a table to a new location in the same worksheet, move the mouse pointer to any of its
borders. When the mouse pointer turns into a cross with four arrows, click and drag the table to
its new location.
To move a table to a different worksheet (which could be in a different workbook), you can drag
and drop it as well — as long as the destination worksheet is visible onscreen.
Filtering a table
Filtering a table refers to displaying only the rows that meet certain conditions. (The other rows
are
hidden.)
Using the real estate table, assume that you’re only interested in the data for the N. County area.
Click the drop-down arrow in the Area Row Header and remove the check mark from Select All,
which unselects everything. Then, place a check mark next to N. County and click OK. The table,
shown in Figure 5.12, is now filtered to display only the listings in the N. County area. Notice that
some of the row numbers are missing; these rows contain the filtered (hidden) data.
Also notice that the drop-down arrow in the Area column now shows a different graphic — an icon
that indicates the column is filtered.
FORMATING WORKSHEET
The Home tab of the Ribbon provides quick access to the most commonly used formatting options.
56
Start by selecting the cell or range; then use the appropriate tool in the Font, Alignment, or
Number groups.
Using these tools is very intuitive, and the best way to familiarize yourself with them is to
experiment.
Enter some data, select some cells, and then click the controls to change the appearance.
Note that some of these controls are actually drop-down lists. Click the small arrow on the button,
and the button expands to display your choices.
On the Mini toolbar that appears when you right-click a range or a cell
When you right-click a cell or a range selection, you get a shortcut menu. In addition, the Mini
toolbar appears above the shortcut menu.
l From the Format Cells dialog box
The formatting controls available on the Home tab of the Ribbon are sufficient most of the time,
but some types of formatting require that you use the Format Cells dialog box. This tabbed dialog
box lets you apply nearly any type of stylistic formatting, as well as number formatting. The
formats
that you choose in the Format Cells dialog box apply to the cells that you have selected at the
time. Later sections in this chapter cover the tabs of the Format Cells dialog box.
In addition, many common formatting commands have keyboard shortcuts that you can use.
57
ii) Note down the values in the worksheet required for the calculation and use these to write
down the formula e.g. Quantity*Price.
iii) Substitute these values with their cell references e.g. B3*D3
2. Select the cell where the result of the formula will be displayed.
3. To tell Microsoft Excel that you are entering a formula in a cell, you must begin with the equal
sign (=).
Note: You can also type +, -, or @ to begin a formula, Microsoft
Excel will convert these into an equal sign.
A simple formula like adding, subtracting or dividing cells requires at least one cell reference.
4. When you create formulas that perform calculations, or when you use formulas that generate
information from your data, you need to tell Microsoft Excel where to find the data. To do this,
you either type a cell reference or a range name.
Example.
1. Suppose you want to calculate the cost of milk using the values shown in the worksheet below:
A B C D
1 Item Quantity Price Cost
2 Milk 268 6 15.50
3 Sugar 190 7 48.90
2. The cost of milk depends on the quantity and the price and is calculated by the formula Quantity
* Price gives us the cost. (The asterisk (*) is used as the multiplication sign.)
3. The cell references for Quantity and Price are B2 and C2 respectively, hence we write B2*C2.
4. In cell D2 we type the formula =B2*C2.
If you omit the ‘=’ symbol before B2, Excel will not recognize it as a formula and what you have
typed will literally appear as ‘B2*C2’ which will not yield the expected result.
5. Press the Enter key. Excel immediately calculates and shows the result in the cell, while the
formula is displayed on the Formula bar.
58
Use AutoFill to enter a series.
You can enter a series of data, either numbers or text, into several cells by using AutoFill. This can
save time involved in typing common series like days of the week, months of the year and
numbers that follow a pattern or series like 2, 4, 6, 8, 10, 12 etc.
To enter a set series, such as months of the year, or days of the week, you can type the first item in
the series without typing anything else. For example, if you want to enter the days of the week into
a row, you simply type ‘Monday’ in the first cell and then use AutoFill to fill in the rest.
To enter a series of numbers, you must type the first two numbers of the series, and then use
AutoFill to enter the rest of the series.
For example, if you want to enter the series 10,15,20,25,30 etc., you can type ‘10’ into the first
cell, and ‘15’ in the second cell, and then use AutoFill to quickly fill in the rest.
Step-by-Step.
1. Type in the first text item in the series or the first two numbers of the series.
2. Select the cell(s) containing the information and then move the mouse pointer to the bottom
right corner of the cell until the pointer changes to a solid plus sign.
3. Drag the AutoFill handle across the cells in which you want to fill the rest of the series.
Note:
When you copy a formula using this method Excel indicates to you what will be entered into the
cell even before you release the mouse.
Tip:
You can enter month or day names either in full (January) or in short (Jan) form.
When you fill the series into the other cells, the rest of the series will either be in full (February) or
short (Feb) form as well.
You can merge any number of cells occupying any number of rows and columns. In fact, you can
merge all 17,179,869,184 cells in a worksheet into a single cell — although I can’t think of any
good reason to do so, except maybe to play a trick on a co-worker.
The range that you intend to merge should be empty, except for the upper-left cell. If any of the
other cells that you intend to merge are not empty, Excel displays a warning. If you continue, all
the data (except in the upper-left cell) will be deleted. To avoid deleting data, click Cancel in
response to the warning.
The Home ➪ Alignment ➪ Merge & Center control contains a drop-down list with these
additional
options:
Merge Across: When a multirow range is selected, this command creates multiple merged
cells — one for each row.
Merge Cells: Merges the selected cells without applying the Center attribute.
Unmerge Cells: Unmerges the selected cells.
DESKTOP PUBLISHING
a) Functions of DP
b) Tools used
c) Manipulations
d) Enhancement of typeset work
e) Printing of documents
PRESENTATION PACKAGES
a) Types of presentation packages
b) Creating slides
c) Formatting slides
d) Running slides
e) Editing objects
f) Printing slides and handouts
62
CHAPTER 8: DATABASE MANAGEMENT SYSTEM (DBMS)
A database management system (DBMS) is a collection of programs that enables one to store modify and
extract information form a database.
This is a software system that enables users to define, create, maintain and control access to database. This
is in contrast to filed-based system;- which is a collection of application programs that perform services
for the end user e.g. reports. Each program defines and manages its own data e.g. – bursar –student name,
no, fees payable, paid, balance or Library- student name, no, book borrowed, date of return.
a) Meaning of database
Database is a shared collection of logically related data and a description of this data designed to meet the
information needs of an organization
Examples of application of database
ATM card, mobile phone, Super-market, Library, School Management Information System
TERMINOLOGIES
i Entity
-Is an object that exists and is distinguishable from other objects.
o Example: specific person, company, event, plant, student, book
ii Attribute
-Refers to the property of an entity, i.e. entities have attributes e.g. name, reg no, book no, title
iii Schema
The structure of a database is called a schema (tables, property of tables, relationships –names
iv Relationship
-Refers to the association between entities e.g. borrows, returns
v Relation
-Is a table with columns and rows
vi Tupule
-Is a row of a relation
vii Domain
-is the set of allowable values for one or more attributes
viii View
- A view is named relation corresponding to an entity in conceptual schema, whose tuples are physically
stored in database. Contents of a view are defined as a query on one or more base relations.
b) Database design
Database design has the following conceptual steps
1) Build local conceptual data model for each user view
2) Build and validate local data model for each user view
3) Build and validate global logical data model
4) Translate global data model for targets DBMS
5) Design physical representation
6) Design security mechanism
7) Monitor and tune the operational system
CHARACTERISTICS OF DBMS
c) Data manipulation
- Data is arranged in columns (fields) and rows (records)
- Each column has similar items or entries
- Each row contains information pertaining (belonging) to the single individual
d) Data sorting and indexing
63
This involves arranging the records into a predefined sequence or way and this requires one to
identify certain fields to be key fields so as to sort either in ascending/descending order or
alphabetically.
e) Data retrieval/searching
This involves the ability to extract information from a database- either entire content, specific
record or a set of records.
DATABASE ELEMENTS
A database consists of four elements as given,
i) Data
ii) Relationships
iii) Constraints
iv) Schema
Data items
Relationships
Data base
Constraints
i) Data Schema
Data are binary computer representations of stored logical entities.
Software is divided into two general categories-data and programs.
A program is a collection of instruction for manipulating data.
Data exist is various forms- as numbers or texts on pieces of paper, as bits and bytes stored
in electronic memory or as facts stored in a person’s mind.
ii) Relationships
Relationships explain the correspondence between various data elements.
iii) Constraints
Are predicates that define correct database states.
iv) Schema
Schema describes the organization of data and relationships within the database.
Schema defines various views of the database for the use of various system components of
the database management system and for the application’s security.
A schema separates physical aspects of data storage form the logical aspects of data
representation.
Types of schema
a) Internal schema: defines how and where the data are organized in physical data storage.
b) Conceptual schema: defines the stored data structures in terms of the database model used.
c) External schema: defines a view (or) views of the database for particular uses.
In database management systems data files are the files that store the database information
whereas offer files, such as index files and data dictionaries, store administrative information
known as metadata (data about data).
Data base are organized by fields, records and files.
i) Fields: is a single piece of information.
64
ii) Record: is one complete set of fields.
iii) File: is a collection of records.
Advantage of Data in database
Database system provides the organization with centralized control of its data
1) Redundancy can be reduced:
In non-database systems, each application (or) department has its own private file
resulting in considerable amount of redundancy (or) the stored data. Thus storage space is
wasted. By having centralized database most of this can be avoided
Components of a DBMS
Data Catalog
Application
Management
Transaction
65
Management
Concurrency Control
Recovery Management
Security Management
Language Interface
Database Data Access
Storage Management
Functions of DBMS
i) Transaction Management
A transaction is a sequence of database operations that represents a logical unit of work and
that accesses a database and transforms it from one state to another.
A transition can update a record, delete (or) modify a set of records etc.
ii) Concurrency control
Concurrency control is the database management activity of co-coordinating the actions of
database manipulating process that separate concurrently that access shared data and can
potentially interfere with one another.
iii) Recovery Management
The recovery management system in a database ensures that the aborted or failed
transactions create non adverse effect on the database or the other transitions.
iv) Security Management
Security refers to the protection of data against unauthorized access. Security mechanism
of a DBMS makes sure that only authorized users are given access to the data in the database
v) Language Interface
The DBMS provides support languages used for the definition and manipulation of data in
the database. The data structures are created using the data definition language commands. The
data manipulation is done using the data manipulation commands.
66
However, each program by itself does not transform the database from a consistent state to a new
consistent state.
Thus, those programs are not transactions.
Storage Management
Databases typically require a large amount of storage space.
Corporate data bases are usually measured in terms of gigabytes or, for the largest
databases, terabytes of data.
A gigabyte is 1000 megabytes (1 billion bytes), and a terabyte is 1 million megabytes (1
trillion bytes).
Since the main memory of computers cannot store this much information, the information
is stored on disks. Data are moved between disk storage and main memory as needed.
Since the movement of data to and from disk is slow relative to the speed of the central
processing unit, it is imperative that the database system structure the data so as to minimize the
need to move data between disk and main memory.
The goal of a database system is to simplify and facilitate access to data.
High – level views help to achieve this goal.
A storage manager is a program module that provides the interface between the low-level
data stored in the database and the application programs and queries submitted to the system.
The storage manager is responsible for the interaction with the file manager.
The raw data are stored on the disk using the file system, which is usually provided by a
conventional operation system.
The storage manager translates the various DML statements into low-level file-system
commands.
Thus, the storage manager is responsible for storing, retrieving, and updating of data in the
database.
Database Administrator
One of the main reasons for using DBMSs is to have central control of both the data and the
programs that access those data.
The person who has such central control over the system is called the database administrator
(DBA).
The functions of the DBA include the following:
Schema definition. The DBA creates the original database schema by writing a set of definitions
that is translated by the DDL compiler to a set of tables that is stored permanently in the data
dictionary.
Storage structure and access-method definition. The DBA creates appropriate storage
structures and access methods by writing a set of definitions, which is translated by the data-
storage and data-definition-language compiler.
Schema and physical-organization modification. Programmers accomplish the relatively rare
modifications either to the data base schema or to the description of the physical storage
organization by writing a set of definitions that is used by either the DDL compiler or the data
storage and data – definition-language compiler to generate modifications to the appropriate
internal system tables (for example, the data dictionary).
Granting of authorization for data access. The granting of different types of authorization
allows the database administrator to regulate which parts of the database various users can access.
The authorization information is kept in a special system structure that is consulted by the database
system whenever access to the data is attempted in the system.
Integrity-constraint specification. The data values stored in the database must satisfy certain
consistency constraints.
For example, perhaps the number of hours an employee may work in 1 week may not exceed a
specified limit (say, 80 hours).
Such a constraint must be specified explicitly by the database administrator.
The integrity constraints are kept in a special system structure that is consulted by the database
system whenever an update takes place in the system.
67
Database Uses
Are computer professionals who interact with the system through DML calls, which are
embedded in a program, written in a host language (for example, COBOL, PL/I, Pascal, C).
These programs are commonly referred to as application programs.
The DNL syntax is usually markedly different from the host language syntax, DML calls
are usually prefaced by a special character so that the appropriate code can be generated.
A special preprocessor called the DML precompiled, converts the DNL statements to
normal procedure calls in the host language.
The resulting program is then run through the host-language compiler, which generates
appropriate object code.
There are special types of programming languages that combine control structures of
Pascal-like languages with control structures for the manipulation of a database object (for
example, relations).
These languages, sometimes called fourth-generation of forms and the display of data on
the screen.
Most major commercial database systems include a fourth-generation language.
2) Software
These include;
i) DBMS- DBMS back end is the server to control access and DBMS front end
are the clients
ii) Operating System
iii) Network software
iv) Data capture s/w
v) Application s/w
3) Data
h) Operational data
i) Metadata – data about data bridging machine components and human components
4) Procedures
i) Instructions and rules applied to design & use the db and DBMS
ii) Instructions to log on the DBMS
iii) Use of particular facilities
iv) Start and stop DBMS
v) Handling h/w & s/w failures
5) People/Users
i) Data Administrator (DA)
ii) Database Administrator (DBA)
iii) Db designer (DD)
iv) Application Programmer (AP)
v) End users (naive and sophisticated)
vi) Application Developers (AD)
69
/ Inference Model
i) Hierarchical Model:
It uses a structure in which records are divided into segments. A record contains one root
segment (which also becomes a key) and a variable number of subordinate segments that
define a field within a record.
Hierarchical Model is one of the oldest database model, dating from late 1950s. First
Hierarchical database model – was Information Management system (IMS). IMS become the
world’s leaching mainframe hierarchical database system in the 1970’s and early 1980’s.
The hierarchical model represents relationships with the notion of logical adjacency or more
accurately with ‘logical proximity’ in a linearized tree.
Advantages:
i) Simplicity: The relationship b/w the various layers are logically simple. Thus the
design of a hierarchical database is simple.
ii) Data security: Hierarchical model was the first database model that offered the data
security that is provided and enforced by the DBMS.
iii) Data Integrity: Since the hierarchical model is based on the parent /child relationship,
there is always a link between the parents segment and the child segments under it.
iv) Efficiency – The hierarchical database model is a very efficient one when the database
contains a large number of 1: n relationships.
Disadvantage:
i) Implementation Complexity
Even though it is simple and Easy to design it is quite complex to implement. The
database designers should have very good knowledge of the physical date storage
characteristics.
Advantages:
i) Conceptual simplicity: It is simple and easy to design.
ii) Capability to handle more relationship types. If can handle the one-to-many (I:
n) and many to many (n: n) relationship.
iii) Ease of data access: The data access is easier than and flexible than in the
hierarchical model.
iv) Data independence – the network model is easy to isolating the programs from
the complex physical storage details.
v) Data integrity. The network model does not allow a member to exist without an
owner
Disadvantages:
i) System complexity
ii) Absence of structural independence.
3. Relation model:
Relational model stores the data is the form of a table.
A single database can be spread across several tables.
A relational model uses tables to organize data elements.
Each table corresponds to an application entity and each row represents an instance of that
entity.
Advantage:
i) Structural independence:
The relational model does not depend on the navigational data access system thus
freeing the database designers, programmers and uses form learning the details about the data
storage.
ii) Conceptual simplicity:
Since the relational data model free the designer from the physical data storage details,
the designer can concentrate on the logical view of the database.
iii) Design, implementation, maintenance and usage ease – It is easier than other two models.
Disadvantages:
i) Hardware over heads:
Relational database systems hide the implementation complexities and the physical data
storage details from the users.
ii) Ease of design can lead to bad design:
It is easy to design; the users need not know the complex details of physical data storage.
EXAMPLE
NB;
i) A record is a set of entire data items in a row. A single record represents a horizontal row in a table
ii) Field – a set of entire similar data items in a column e.g. individual names, sex, adm no, marks
iii) Field types- specify the way specific data items are stored. MS Access support up to 10
different field types e.g. text, memo, number, date/time, currency, Y/N, OLE object, auto-
number, look-up, hyperlink.
Type
Auto-number A number is automatically incrementally &
never changes again
Currency A numeric field automatically assigned with a
currency sign e.g. £
Date/Time A date or time data type & can change
appearance of each from general type
Text Any character not needed for calculation
Number Any figure needed for calculation
Yes/No A logical field that needs yes or no
Memo A whole sentence e.g. comments/remarks
OLE object Any linked object e.g. picture
Hyperlink Stores data that are internet address e.g.
[email protected]
Link-up Values from external table
Relational Keys
i) Candidate key
It is a unique identifier of each record in a table. A table can have number of candidate
keys and out of these, one candidate key is designed as the primary key and it is by this
value that records can be sorted in a table unless otherwise, e.g. admission number.
ii) Primary key
Is a field or a set of fields whose content, is unique to one record and can therefore be
used to identify that record while sorting.
iii) Foreign key
This is the attribute or set of attributes within one relation that matches candidate key of
some other relation.
5. Entity-Relationship Model
A database can be modeled as:
o a collection of entities,
o relationship among entities.
An entity is an object that exists and is distinguishable from other objects.
o Example: specific person, company, event, plant
Entities have attributes
o Example: people have names and addresses
An entity set is a set of entities of the same type that share the same properties.
o Example: set of all persons, companies, trees, holidays
6. FLAT FILES
In a flat file, a database holds only one set of data and is not any different from the
manual files. For example the cards in a library books catalogue. The cards are arranged
sequentially for easy access e.g. alphabetically using book’s title or by author’s names.
CREATING DATABASE
To create and manage database, we use Database Management System (DBMS) software. This
software facilitates the creation, organization and maintenance of databases. Examples of
DBMS software are Microsoft Access (MS Access), Microsoft SQL Server, Oracle, FoxPro,
DbaseIV, Lotus Approach and MySQL.
Tables/file structure
This is a database structure that is used to hold related records. Tables are organized in
rows and columns with each row representing a record while each column represents
common fields in each record.
Queries
A query is a statement use to extract, change, analyze or request for specific data from
one or more tables. Because a query is a question posed to the database, it returns a
result for the user.
Query statements are written using a special language called Structured Query
Language (SQL). The user creates a query by writing Structure query language
statement such as;
Select student admission number,
From
Admission table
Where
Class = year of admission
Forms/Input screen
A form is a graphical interface that resembles an ordinary paper form. Enter into or
view data from database. However, a database form enables the user to view and enter
data into a table. Form interface is a more convenient and easy way of entering and
viewing records from a table.
Reports
Most database systems provide the user with a tool for generating reports from
underlying tables o queries. It is the report generator that provides the user with a
means to specify the output layout and what is to be output or printed on a report.
Macros
In most DBMS software, it is possible to automate frequently performed procedures or
tasks using database components known as a macro. For example, if you frequently use
a particular form when you start a database program, you need to create a macro that
automates the opening of the form.
45
To create a new database;( Microsoft Office 2003)
1. Click start, point to programs, Microsoft Office, then Access 2003
2. On the New File, click create New
3. On the new file pane, click blank database
4. Select the location where the database will be created, type the database
name then click create.
The new database dialog box appears. This lets you specify the name and location
where your database will be stored. Click create.
5. Microsoft Access database objects window is displayed, from which you
can choose the type of object you wish to create such as tables, forms, queries etc.
Students database
Tables Queries Forms Reports Macros Modules
Open
Design view
New
ok
Assuming the “students database is open;
5. Click on the Tables tab and click on the New button to create a new
table. Access displays a New Table dialog box with various options of creating the
table
6. Select Design view and click ok. A blank data table structure is
displayed.
7. Using the grid displayed, enter a unique name for each field in the table.
A field name must start with a letter and can be up to a maximum of 64 characters
including letters, numbers, spaces and punctuation.
8. Choose appropriate data type before adding the next field. By default,
Ms Access inserts text as a data type. To specify the data type, click on the box
besides Text and select the required data type from the drop-down menu.
9. The field size and Formats are entered automatically on the General Tab
table structure. However, you can change the field sizes and Formats accordingly.
Note that when a field is empty, information in the general tab is not visibly displayed
immediately until you click in the data type column.
10. To save the table, click the save button on the standard tool bar or save
from the file menu and save as (e.g. Students Table and click ok).
11. Access will ask you whether you want to create a Primary Key, click
yes.
12. Click on the View menu and select Datasheet View to see results of the
structure. At this point, you can enter a few records just to check that the table
structure designed will be suitable for the data.
13. Click on File and select Close to complete the table structure design. A
new table is complete and ready for the data entry.
A data table showing defined fields (complete table ready for data entry)
Information security
is the process of protecting information. It protects its availability, privacy and integrity. Access to
stored information on computer databases has increased greatly. More companies store business and
individual information on computer than ever before. Much of the information stored is highly
confidential and not for public viewing.
Data/information security
means protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, perusal, inspection, recording or destruction, disclosure or transfer, whether
accidental or intentional.
Data control is the measure taken to enforce the security of the program and data. Data may be lost in
various ways such as virus, user errors, computer crushes, hacking, etc.
Many businesses are solely based on information stored in computers. Personal staff details, client lists,
salaries, bank account details, marketing and sales information may all be stored on a database. Without
this information, it would often be very hard for a business to operate. Information security systems
need to be implemented to protect this information.
Effective information security systems incorporate a range of policies, security products, technologies
and procedures. Software applications which provide firewall information security and virus scanners
are not enough on their own to protect information. A set of procedures and systems needs to be
applied to effectively deter access to information.
The terms information security, computer security and information assurance are frequently incorrectly
used interchangeably. These fields are interrelated often and share the common goals of protecting the
confidentiality, integrity and availability of information; however, there are some subtle differences
between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of
concentration. Information security is concerned with the confidentiality, integrity and availability of
data regardless of the form the data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of a computer system
without concern for the information stored or processed by the computer.
Simple security measures can be used by everyone to keep data secure. Changing passwords on your
computer, and using combinations of letters and numbers, makes it harder for hackers to gain access.
Also, do not keep a note of your password where it can be easily accessed. This is the same idea as not
keeping your bank card and PIN number together. You would not want anyone to have access to the
information or funds in your bank account, and it is the same with your computer.
COMPUTER VIRUS
Computer Virus is a malicious software program written intentionally to enter a computer without the
user's permission or knowledge. It has the ability to replicate itself, thus continues to spread. Some
viruses do little but replicate, while others can cause severe harm or adversely affect program and
performance of the system. A virus should never be assumed harmless and left on a system.
It can be a code segment that replicates by attaching copies of itself to existing executable files. The
new copy of the virus is executed when a user executes the new host program. The virus may include
an additional code that triggers when specific conditions are met. For example, some viruses display a
text string on a particular date. There are many types of viruses, including variants, overwriting,
resident, stealth, and polymorphic.
a) TYPES OF COMPUTER VIRUSES
There are different types of computer viruses which can be classified according to their origin,
techniques, types of files they infect, where they hide, the kind of damage they cause, the type of
operating system or platform they attack as follows;
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros.
These mini-programs make it possible to automate series of operations so that they are performed as a
single action, thereby saving the user from having to carry them out one by one.
Examples: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Virus
Directory viruses change the path that indicate the location of a file. When you execute a program file
with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the
virus program, while the original file and program is previously moved by the virus. Once infected it
becomes impossible to locate the original files.
Examples: Dir-2 virus.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and
encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find
them using string or signature searches (because they are different in each encryption). The virus then
goes on creating a large number of copies.
Examples: Elkern, Marburg, Satan Bug and Tuareg.
FAT Virus
The file allocation table or FAT is the part of a disk used to store all the information about the location
of files, available space, unusable space etc. FAT virus attacks the FAT section and may damage
crucial information. It can be especially dangerous as it prevents access to certain sections of the disk
where important files are stored. Damage caused can result in information losses from individual files
or even entire directories.
Multipartite Virus
These viruses spread in multiple ways possible. It may vary in its action depending upon the operating
system installed and the presence of certain files.
Examples: Invader, Flip and Tequila
Besides, there are many other computer viruses that have a potential to infect digital data. Hence, it is
a must that data is protected by installing a genuine quality anti-virus software.
Worms
Worms are programs that replicate and spread, often opening a back door to allow hackers to gain
access to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of computers that are
connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email.
A self-replicating program that is self-contained and does not require a host program. The program
creates a copy of itself and causes it to execute; no user intervention is required. Worms commonly
use network services to propagate to other host systems. A worm is a program very similar to a virus;
it has the ability to self-replicate and can lead to negative effects on your system. But they can be
detected and eliminated by anti-viruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Stealth virus
A form of a virus that hide itself from detection by anti-virus software
Companion virus
This virus does not actually inject a program but gets a run when the program is supposed to run
Conclusion
Information security is the ongoing process of exercising due care and due diligence to protect
information, and information systems, from unauthorized access, use, disclosure, destruction,
modification, or disruption or distribution. The never ending process of information security involves
ongoing training, assessment, protection, monitoring & detection, incident response & repair,
documentation, and review. This makes information security an indispensable part of all the business
operations across different domains.
Computer crimes
Hacking
Hacking is when an individual gets unauthorized access into a computer where they may; -look at the
data, copy the data, modify or erase the data.
Phishing
A Phishing attack is when you are sent an email that asks you to click on a link and re-enter your bank
or credit card details. These emails can pretend to be from banks, Internet service providers, on-line
stores and so on, and both the email and the web site it links to appear genuine. When you enter your
bank or credit card details they are then used fraudulently.
Zombies
A Zombie is a dormant program that lies inactive on a computer. It can be activated remotely to aid a
collective attack on another computer. Zombies don’t normally damage the computer on which they
reside but can damage other computers.
Zombies often arrive as email attachments and when the attachment is opened they install themselves
secretly and then wait to be activated.
While your computer is connected to the Internet it can be subject to attack through your network
communications. Some of the most common attacks include:
Bonk – An attack on the Microsoft TCP/IP stack that can crash the attacked computer.
RDS_Shell – A method of exploiting the Remote Data Services component of the Microsoft
Data Access Components that lets a remote attacker run commands with system privileges.
WinNuke – An exploit that can use NetBIOS to crash older Windows computers.
Spyware, Adware and Advertising Trojans are often installed with other programs, usually without
your knowledge. They record your behaviour on the Internet, display targeted ads to you and can
even download other malicious software on to your computer. They are often included within
programs that you can download free from the Internet or that are on CDs given away free by
magazines.
Spyware doesn’t usually carry viruses but it can use your system resources and slow down your
Internet connection with the display of ads. If the Spyware contains bugs (faults) it can make your
computer unstable but the main concern is your privacy. These programs record every step that you
take on the Internet and forward it to an Ad Management Centre which reviews your searches and
downloads to determine your shopping preferences. The Ad Management Centre will build up a
detailed profile of you, without your knowledge, and can pass this on to third parties, again without
your knowledge. Some Spyware can download more serious threats on to your computer, such as
Trojan Horses.
Virus Hoaxes
Virus hoaxes are messages, usually sent by email, that amount to little more than chain letters. They
pretend to alert you to the latest "undetectable" virus and simply waste your time and Internet bandwidth.
The best course of action is to delete these hoaxes - they can cause genuine fear and alarm in the disabled,
elderly and other vulnerable groups.
Unsecured Wireless Access Points
If a wireless access point, e.g. an ADSL (Broadband) Router, hasn't been secured then anyone with a
wireless device (laptop, PDA, etc) will be able to connect to it and thereby access the Internet and all the
other computers on the wireless network.
Bluesnarfing
The act of stealing personal data, specifically calendar and contact information, from a Bluetooth enabled
device.
Social Engineering
Tricking computer users into revealing computer security or private information, e.g. passwords, email
addresses, etc, by exploiting the natural tendency of a person to trust and/or by exploiting a person's
emotional response.
Example 1: Spammers send out an email about victims of child abuse and provide a link to click in the
email for further information or to help the victims. When the link is clicked the spammers know the
email address is "live" and add it to their live list which they then use to target their spam.
Example 2: A company computer user is tricked into revealing the network password by someone on the
telephone who is impersonating the voice of an employee in authority and who has a story of distress.
Worms
Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access
to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of computers that are
connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email.
Trespass
This is when someone is able to connect to your computer and control it in some form. This can
range from being able to view or access your files, to actually running programs on your computer
Some programs have special features that allow for remote access. Others contain bugs that allow a
backdoor or hidden access, that provides some level of control of the program, and trespassers will
make use of this to gain access to your computer.
Tracking
Tracking is when someone is able to monitor what you are doing on your computer system. This
applies mainly to tracking Internet usage, where someone may monitor what sites you visited and
what links you clicked on so that they can determine your interests, and use that information for
future marketing.
Tapping
Tapping is when someone gains access to information that is being transmitted via communication
links. Any information that is transmitted across a network is at risk of being intercepted, if
appropriate security measures are not in place
Cracking
Cracking is similar to hacking, but with one major distinction. In hacking, someone feels the need
to understand how the computer or network system of an organization works, but without the intent
of causing damage. In cracking, someone uses his or her knowledge of information systems to
literally to illegally or unethically penetrate computers system for personal gain.
Sabotage
Sabotage occurs when a malicious user renders a system unusable by other users. Sabotage takes
different forms;
‘Denial of service’ is common on the internet. A hacker using his/her computer, but mimicking
different computers, sends many requests to connect to the web server. The server attempts,
unsuccessfully, to establish communication with each one of this ‘computers’. These attempts
create much activity (traffic) that slows down the server to crawl and may eventually cause it to
crash. Genuine users will then have been denied service.
Release of viruses is also another form of sabotage
Spam
By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail, called
spam to thousands of users. This is done quite often by redirecting the email through the mail
server of an unsuspecting host, making the actual sender of the spam difficult to track.
Alterations
When a system is compromised, the data stored in it can be altered. Typical examples of data
alteration are when students break into a system to alter exam results, or someone breaks into a
banking system to change account details or divert money.
Confidentiality
Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or
systems. For example, a credit card transaction on the Internet requires the credit card number to be
transmitted from the buyer to the merchant and from the merchant to a transaction processing network.
The system attempts to enforce confidentiality by encrypting the card number during transmission, by
limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on),
and by restricting access to the places where it is stored. If an unauthorized party obtains the card
number in any way, a breach of confidentiality has occurred.
Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose
personal information a system holds.
Integrity
In information security, integrity means that data cannot be modified undetectably. Integrity is violated
when a message is actively modified in transit. Information security systems typically provide
message integrity in addition to data confidentiality.
Availability
For any information system to serve its purpose, the information must be available when it is needed.
This means that the computing systems used to store and process the information, the security controls
used to protect it, and the communication channels used to access it must be functioning correctly
Authenticity
In computing, e-Business and information security it is necessary to ensure that the data, transactions,
communications or documents (electronic or physical) are genuine. It is also important for authenticity
to validate that both parties involved are who they claim they are.
Controls/Protection
Audit trail
Audit trail help to detect trespassing and alteration. It is used to keep a record of who has accessed a
computer system and what operations he/she has performed during a given period of time.. in case a
system is broken into by a hacker, an audit trail enables their activities to be tracked. Any unauthorized
alterations can be rolled back to take the system back to the state it was in before the alterations were
done.
Hacking
To prevent or stop such;
Log off correctly from the computer when leaving the machine
Chose passwords that are not obvious, with at least 6 characters and a mixture of numbers and
both upper and lower case letters
Keeping passwords confidential and not writing them down anywhere
Changing passwords regularly
Encrypting data that is transmitted using the telecommunications network or wireless
communication
Firewalls
A physical firewall keeps a fire from spreading from one area to the next. Similarly, a firewall is
a program or hardware that filters information coming through the internet and connections
into your personal computer or network. Firewalls can prevent unauthorized remote logins,
limit or stop Spam, and filter the content that is downloaded from the internet. Some firewalls
offer virus protection but it is worth the investment to install Anti-virus software on each
computer.
When Management chooses to mitigate a risk, they will do so by implementing one or more of three
different types of controls.
Administrative
Administrative controls (also called procedural controls) consist of approved written policies,
procedures, standards and guidelines. Administrative controls form the framework for running the
business and managing people. They inform people on how the business is to be run and how day to
day operations are to be conducted. Laws and regulations created by government bodies are also a type
of administrative control because they inform the business. Some industry sectors have policies,
procedures, standards and guidelines that must be followed - the Payment Card Industry (PCI) Data
Security Standard required by Visa and Master Card is such an example. Other examples of
administrative controls include the corporate security policy, password policy, hiring policies, and
disciplinary policies.
Administrative controls form the basis for the selection and implementation of logical and physical
controls. Logical and physical controls are manifestations of administrative controls. Administrative
controls are of paramount importance.
Logical
Logical controls (also called technical controls) use software and data to monitor and control access to
information and computing systems. For example: passwords, network and host based firewalls,
network intrusion detection systems, access control lists, and data encryption are logical controls.
An important logical control that is frequently overlooked is the principle of least privilege. The
principle of least privilege requires that an individual, program or system process is not granted any
more access privileges than are necessary to perform the task. A blatant example of the failure to
adhere to the principle of least privilege is logging into Windows as user Administrator to read Email
and surf the Web. Violations of this principle can also occur when an individual collects additional
access privileges over time. This happens when employees' job duties change, or they are promoted to
a new position, or they transfer to another department. The access privileges required by their new
duties are frequently added onto their already existing access privileges which may no longer be
necessary or appropriate.
Physical
i) Physical controls monitor and control the environment of the work place and computing
facilities. They also monitor and control access to and from such facilities. For example: doors, locks,
heating and air conditioning, smoke and fire alarms, fire suppression systems, cameras, barricades,
fencing, security guards, cable locks, etc. Separating the network and work place into functional areas
are also physical controls. To prevent loss of hardware (theft), computers should be kept in strong
rooms and data back-up should be done regularly. An important physical control that is frequently
overlooked is the separation of duties. Separation of duties ensures that an individual can not
complete a critical task by himself. For example: an employee who submits a request for
reimbursement should not also be able to authorize payment or print the check. An applications
programmer should not also be the server administrator or the database administrator - these roles and
responsibilities must be separated from one another.
ii) Restricting access to areas with computers, so that only authorized personnel are allowed to use
the system
iii) Keeping computer rooms locked after working hours
iv) Installing alarm systems and other security devices
An important aspect of information security and risk management is recognizing the value of
information and defining appropriate procedures and protection requirements for the information. Not
all information is equal and so not all information requires the same degree of protection. This requires
information to be assigned a security classification.
The first step in information classification is to identify a member of senior management as the owner
of the particular information to be classified. Next, develop a classification policy. The policy should
describe the different classification labels, define the criteria for information to be assigned a particular
label, and list the required security controls for each classification.
The type of information security classification labels selected and used will depend on the nature of
the organization, with examples being:
In the business sector, labels such as: Public, Sensitive, Private, Confidential.
In the government sector, labels such as: Unclassified, Sensitive But Unclassified,
Restricted, Confidential, Secret, Top Secret and their non-English equivalents.
In cross-sectoral formations, the Traffic Light Protocol, this consists of: White, Green, Amber
and Red.
All employees in the organization, as well as business partners, must be trained on the classification
schema and understand the required security controls and handling procedures for each classification.
The classification a particular information asset has been assigned should be reviewed periodically to
ensure the classification is still appropriate for the information and to ensure the security controls
required by the classification are in place.
Access control
Access to protected information must be restricted to people who are authorized to access the
information. The computer programs, and in many cases the computers that process the information,
must also be authorized. This requires that mechanisms be in place to control the access to protected
information. The sophistication of the access control mechanisms should be in parity with the value of
the information being protected - the more sensitive or valuable the information the stronger the
control mechanisms need to be. The foundation on which access control mechanisms are built start
with identification and authentication.
There are three different types of information that can be used for authentication: something you
know, something you have, or something you are. Examples of something you know include such
things as a PIN, a password, or your mother's maiden name. Examples of something you have include
a driver's license or a magnetic swipe card. Something you are refers to biometrics. Examples of
biometrics include palm prints, finger prints, voice prints and retina (eye) scans. Strong authentication
requires providing information from two of the three different types of authentication information. For
example, something you know plus something you have. This is called two factor authentication.
On computer systems in use today, the Username is the most common form of identification and the
Password is the most common form of authentication. Usernames and passwords have served their
purpose but in our modern world they are no longer adequate. Usernames and passwords are slowly
being replaced with more sophisticated authentication mechanisms.
After a person, program or computer has successfully been identified and authenticated then it must be
determined what informational resources they are permitted to access and what actions they will be
allowed to perform (run, view, create, delete, or change). This is called authorization.
Authorization to access information and other computing services begins with administrative policies
and procedures. The policies prescribe what information and computing services can be accessed, by
whom, and under what conditions. The access control mechanisms are then configured to enforce
these policies.
Different computing systems are equipped with different kinds of access control mechanisms - some
may even offer a choice of different access control mechanisms. The access control mechanism a
system offers will be based upon one of three approaches to access control or it may be derived from a
combination of the three approaches.
The non-discretionary approach consolidates all access control under a centralized administration.
The access to information and other resources is usually based on the individuals function (role) in the
organization or the tasks the individual must perform. The discretionary approach gives the creator
or owner of the information resource the ability to control access to those resources. In the Mandatory
access control approach, access is granted or denied basing upon the security classification assigned
to the information resource.
Information security uses cryptography to transform usable information into a form that renders it
unusable by anyone other than an authorized user; this process is called encryption. Information that
has been encrypted (rendered unusable) can be transformed back into its original usable form by an
authorized user, who possesses the cryptographic key, through the process of decryption.
Cryptography is used in information security to protect information from unauthorized or accidental
disclosure while the information is in transit (either electronically or physically) and while information
is in storage.
Cryptography provides information security with other useful applications as well including improved
authentication methods, message digests, digital signatures, non-repudiation, and encrypted network
communications.
Cryptography can introduce security problems when it is not implemented correctly. Cryptographic
solutions need to be implemented using industry accepted solutions that have undergone rigorous peer
review by independent experts in cryptography. The length and strength of the encryption key is also
an important consideration. A key that is weak or too short will produce weak encryption. The keys
used for encryption and decryption must be protected with the same degree of rigor as any other
confidential information. They must be protected from unauthorized disclosure and destruction and
they must be available when needed. PKI solutions address many of the problems that surround key
management.
Defense in depth
Information security must protect information throughout the life span of the information, from the
initial creation of the information on through to the final disposal of the information. The information
must be protected while in motion and while at rest. During its life time, information may pass through
many different information processing systems and through many different parts of information
processing systems. There are many different ways the information and information systems can be
threatened. To fully protect the information during its lifetime, each component of the information
processing system must have its own protection mechanisms. The building up, layering on and
overlapping of security measures is called defense in depth. The strength of any system is no greater
than its weakest link. Using a defense in depth strategy, should one defensive measure fail there are
other defensive measures in place that continue to provide protection.
Process
The terms reasonable and prudent person, due care and due diligence have been used in the fields
of Finance, Securities, and Law for many years.
In the field of Information Security, Harris offers the following definitions of due care and due
diligence:
"Due care are steps that are taken to show that a company has taken responsibility for the activities
that take place within the corporation and has taken the necessary steps to help protect the company,
its resources, and employees." And, [Due diligence are the] "continual activities that make sure the
protection mechanisms are continually maintained and operational."
Attention should be made to two important points in these definitions. First, in due care, steps are
taken to show - this means that the steps can be verified, measured, or even produce tangible artifacts.
Second, in due diligence, there are continual activities - this means that people are actually doing
things to monitor and maintain the protection mechanisms, and these activities are ongoing.
Disaster recovery planning
While a business continuity plan (BCP) takes a broad approach to dealing with organizational-wide
effects of a disaster, a disaster recovery plan (DRP), which is a subset of the business continuity plan,
is instead focused on taking the necessary steps to resume normal business operations as quickly as
possible. A disaster recovery plan is executed immediately after the disaster occurs and details what
steps are to be taken in order to recover critical information technology infrastructure.
Computer crime is a growing industry. Some of the issues addressed by ICT legislation are;
In Kenya, the Copyright Act was amended in 1996 to include protection for computer programs and
software copyright. In addition to copyright protection, there are other laws in force in other countries.
Some examples are listed below with a description of what the legislations entails.
Legislations Description
Privacy Laws Non-disclosure of private data to persons than
those to whom it was given
Data Protection A safeguard to protect personal data. It basically
ensures that holders of personal data do not
misuse data
Computer Misuse To prevent misuse of both hardware and software,
including computer viruses, hacking, etc
Health and Safety An explanation of what employers must do and
what the equipment must be like to safeguard the
health and safety of employees
Prohibited Publication To prevent undesirable publication being
published and distributed electronically, for
example pornography and hate mail
Below is a partial listing of European, United Kingdom, Canadian and USA governmental laws and
regulations that have, or will have, a significant effect on data processing and information security.
Important industry sector regulations have also been included when they have a significant impact on
information security.
UK Data Protection Act 1998 makes new provisions for the regulation of the processing of
information relating to individuals, including the obtaining, holding, use or disclosure of such
information. The European Union Data Protection Directive (EUDPD) requires that all EU member
must adopt national regulations to standardize the protection of data privacy for citizens throughout
the EU.
The Computer Misuse Act 1990 is an Act of the UK Parliament making computer crime (e.g.
cracking - sometimes incorrectly referred to as hacking) a criminal offence. The Act has become a
model upon which several other countries including Canada and the Republic of Ireland have drawn
inspiration when subsequently drafting their own information security laws.
EU Data Retention laws requires Internet service providers and phone companies to keep data
on every electronic message sent and phone call made for between six months and two years.
The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232 g; 34 CFR Part
99) is a USA Federal law that protects the privacy of student education records. The law applies to all
schools that receive funds under an applicable program of the U.S. Department of Education.
Generally, schools must have written permission from the parent or eligible student in order to release
any information from a student's education record.
Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires the adoption of
national standards for electronic health care transactions and national identifiers for providers, health
insurance plans, and employers. And, it requires health care providers, insurance providers and
employers to safeguard the security and privacy of health data.
Gramm-Leach-Bliley Act of 1999 (GLBA), also known as the Financial Services
Modernization Act of 1999, protects the privacy and security of private financial information that
financial institutions collect, hold, and process.
Sarbanes-Oxley Act of 2002 (SOX). Section 404 of the act requires publicly traded companies
to assess the effectiveness of their internal controls for financial reporting in annual reports they
submit at the end of each fiscal year. Chief information officers are responsible for the security,
accuracy and the reliability of the systems that manage and report the financial data. The act also
requires publicly traded companies to engage independent auditors who must attest to, and report on,
the validity of their assessments.
Payment Card Industry Data Security Standard (PCI DSS) establishes comprehensive
requirements for enhancing payment account data security. It was developed by the founding payment
brands of the PCI Security Standards Council, including American Express, Discover Financial
Services, JCB, MasterCard Worldwide and Visa International, to help facilitate the broad adoption of
consistent data security measures on a global basis. The PCI DSS is a multifaceted security standard
that includes requirements for security management, policies, procedures, network architecture,
software design and other critical protective measures.
State Security Breach Notification Laws (California and many others) require businesses,
nonprofits, and state institutions to notify consumers when unencrypted "personal information" may
have been compromised, lost, or stolen.
Personal Information Protection and Electronics Document Act (PIPEDA) - An Act to support
and promote electronic commerce by protecting personal information that is collected, used or
disclosed in certain circumstances, by providing for the use of electronic means to communicate or
record information or transactions and by amending the Canada Evidence Act, the Statutory
Instruments Act and the Statute Revision Act.
Sources of standards
The USA National Institute of Standards and Technology (NIST) is a non-regulatory federal agency
within the U.S. Department of Commerce. The NIST Computer Security Division develops standards,
metrics, tests and validation programs as well as publishes standards and guidelines to increase secure
IT planning, implementation, management and operation. NIST is also the custodian of the USA
Federal Information Processing Standard publications (FIPS).
The Internet Society is a professional membership society with more than 100 organization and over
20,000 individual members in over 180 countries. It provides leadership in addressing issues that
confront the future of the Internet, and is the organization home for the groups responsible for Internet
infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet
Architecture Board (IAB). The ISOC hosts the Requests for Comments (RFCs) which includes the
Official Internet Protocol Standards and the RFC-2196 Site Security Handbook.
The Information Security Forum is a global nonprofit organization of several hundred leading
organizations in financial services, manufacturing, telecommunications, consumer goods, government,
and other areas. It undertakes research into information security practices and offers advice in its
biannual Standard of Good Practice and more detailed advisories for members.
The IT Baseline Protection Catalogs, or IT-Grundschutz Catalogs, ("IT Baseline Protection Manual"
before 2005) are a collection of documents from the German Federal Office for Security in
Information Technology (FSI), useful for detecting and combating security-relevant weak points in the
IT environment (“IT cluster“). The collection encompasses over 3000 pages with the introduction and
catalogs.
Professionalism
Information security professionalism is the set of knowledge that people working in Information
security and similar fields (Information Assurance and Computer security) should have and eventually
demonstrate through certifications from well respected organizations. It also encompasses the
education process required to accomplish different tasks in these fields.
Information technology adoption is always increasing and spread to vital infrastructure for civil and
military organizations. Everybody can get involved in the Cyber war. It is crucial that a nation can
have skilled professional to defend its vital interests.
Conclusion
Information security is the ongoing process of exercising due care and due diligence to protect
information, and information systems, from unauthorized access, use, disclosure, destruction,
modification, or disruption or distribution. The never ending process of information security involves
ongoing training, assessment, protection, monitoring & detection, incident response & repair,
documentation, and review. This makes information security an indispensable part of all the business
operations across different domains.
• The network operating system/network software contains instructions that enable the hardware
to work as a network.
• Computer networks can be classified into different categories. E.g. according to geographical
coverage, ownership etc.
A network is a logical extension of a data communication system. In a computer network, two
or more processors or computers are linked together with carriers and data communication
devices for the purpose of communicating data and sharing resources. The term "topology" in
the context of a communications network determines the data paths that may be used between
any pair of stations of the network. A network consists of multiple computers connected using
some type of interface, each having one or more interface devices such as a Network Interface
Card (NIC) and/or a serial device for networking. Each computer is supported by network
software that provides the server or client functionality. The hardware used to transmit data
across the network is called the media. It may include copper cable, fiber optic, or wireless
transmission.
In a server based network, there are computers set up to be primary providers of services such
as file service or mail service. The computers providing the service are called servers and the
computers that request and use the service are called client computers.
Functions of networks
i) All users can easily share or exchange information
ii) The computers in a network can share resources such as printers and scanners
iii) Software can be shared hence using same license
iv) Data backup can be achieved easily
a) Networks configuration/Topology
The physical topology of a network is the actual geometric layout of workstations. There are
several common physical topologies, as described below and as shown in the illustration.
In the bus network topology, every workstation is connected to a main cable called the bus.
Therefore, in effect, each workstation is directly connected to every other workstation in the
network.
In the star network topology, there is a central computer or server to which all the workstations
are directly connected. Every workstation is indirectly connected to every other through the
central computer.
In the ring network topology, the workstations are connected in a closed loop configuration.
Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly
connected, the data passing through one or more intermediate nodes.
If a Token Ring protocol is used in a star or ring topology, the signal travels in only one
direction, carried by a so-called token from node to node.
The mesh network topology employs either of two schemes, called full mesh and partial mesh.
In the full mesh topology, each workstation is connected directly to each of the others. In the
partial mesh topology, some workstations are connected to all the others, and some are
connected only to those other nodes with which they exchange the most data.
The tree network topology uses two or more star networks connected together. The central
computers of the star networks are connected to a main bus. Thus, a tree network is a bus
network of star networks.
Logical (or signal) topology refers to the nature of the paths the signals follow from node to
node. In many instances, the logical topology is the same as the physical topology. But this is
not always the case. For example, some networks are physically laid out in a star configuration,
but they operate logically as bus or ring networks.
Topology can be understood as the shape or structure of a network. This shape does not
necessarily correspond to the actual physical design of the devices on the computer network.
The computers on a home network can be arranged in a circle but it does not necessarily mean
that it represents a ring topology.
Advantages of Bus Topology
i It is easy to handle and implement.
ii It is best suited for small networks.
iii Easy to connect a computer or peripheral to a linear bus.
iv Requires less cable length than a star topology.
Disadvantages of Bus Topology
i The cable length is limited. This limits the number of stations that can be connected.
ii This network topology can perform well only for a limited number of nodes.
iii Entire network shuts down if there is a break in the main cable.
iv Terminators are required at both ends of the backbone cable.
v Difficult to identify the problem if the entire network shuts down.
vi Not meant to be used as a stand-alone solution in a large building.
Star
Advantages of a Star Topology
i Easy to install and wire.
ii No disruptions to the network when connecting or removing devices.
iii Easy to detect faults and to remove parts.
iv Due to its centralized nature, the topology offers simplicity of operation.
v It also achieves an isolation of each device in the network.
Disadvantages of a Star Topology
i Requires more cable length than a linear topology.
ii If the hub, switch, or concentrator fails, nodes attached are disabled.
iii More expensive than linear bus topologies because of the cost of the hubs, etc.
iv The network operation depends on the functioning of the central hub. Hence, the failure of the
central hub leads to the failure of the entire network.
Mesh
Advantage of Mesh Topology
The arrangement of the network nodes is such that it is possible to transmit data from
one node to many other nodes at the same time.
System provides increased redundancy and reliability as well as ease of
troubleshooting.
This type of network is very reliable, as any line breakdown will affects only
communication between the connected computers.
Communication is very fast between any two nodes.
Disadvantage of Mesh Topology
The arrangement wherein every network node is connected to every other node
of the network, many of the connections serve no major purpose. This leads
to the redundancy of many of the network connections.
System is expensive to install because it uses a lot of cabling.
It is most expensive system from the point of view of line cost. if there are (n)
nodes in the network, then n (n-1)/2 links are required. Thus the cost of
linking the system grows with the square of the numbers of the nodes.
Additions of the new nodes to the network is difficult.
i) Tree topology
Advantages of a Tree Topology
Point-to-point wiring for individual segments.
Supported by several hardware and software venders.
Disadvantages of a Tree Topology
Overall length of each segment is limited by the type of cabling used.
If the backbone line breaks, the entire segment goes down.
More difficult to configure and wire than other topologies.
b) Meaning and uses of internet
CHAPTER 6: INTERNET
The purpose of networking is to connect friends, business people, corporations, information and
research centers, entertainment and enrichment resources with the whole world. Computers can
connect to the Internet in a variety of ways; such as through a university or business LAN that can
connect directly to the internet, or directly through an ISP. In this topic (6.3) we will be looking at
some of the requirements and terms you might encounter when you want to connect to the internet.
1. DATA TERMINAL EQUIPMENT (DTE)
Data terminal equipment (DTE) is an instrument that converts user information into signals
and/or reconverts received signals back into the original data. Data terminal Equipment is on both
ends of the transmission circuit, i.e. at the senders end and at the receivers end.
Data terminal equipment (DTE) can be a computer, a terminal, a router, an access server
2. SERVER AND CLIENT
A server is a computer program or a series of computers that provides essential services to other
computers across a network. Servers provide unique capabilities that can be shared by all other
devices in a network. There are several types of servers such as;
File servers; it allows all users to share one or more large capacity disk drives
Print servers; provides access to one or more printers
Communication servers; provides access to other LAN and host computers.
Application servers; which provide processing capacity for applications that are shared by many
people/computers.
Web servers; which allows websites that can be accessed over a corporate intranet or one that
gives access to the www.
A server function can be performed by a computer that is used as a normal workstation or by a
dedicated computer that has the sole purpose of providing server functions to other users on a
network.
When a network has server(s) the other workstations are called clients. This introduces the concept
of client/server computing. In this system, a client request data from a server which then provides
the requested data or information back to the client. Therefore we can say that a client is an
application or system that accesses a remote service on another computer system, known as a
server, over a network.
The client can be a dumb terminal i.e. it has no processing capabilities, or it can be a fully
functioning terminal with processing and storage capabilities. Today there are very few dumb
terminals existing. An example of how a client server system works
PORTS
A port is a virtual/logical data connection that can be used by programs to exchange data directly.
The most common of these are TCP and UDP ports, which are used to exchange data between
computers on the Internet.
These ports allow software applications to share hardware resources without interfering with each
other. Computers and routers automatically manage network traffic traveling via their virtual ports.
Before PPP and SLIP accounts most internet accounts were text only (Not graphical) you used a
terminal emulation program on your PC to connect to the Internet host computer. This customer
account with an ISP allows the subscriber to enter UNIX commands to send and receive files and
mail. Basically a shell account gives you access to the ISP servers that have connection to the
internet.
ONLINE SERVICES
An online service is a commercial service that enables you to connect and access its proprietary
information system. Most online services also provide an internet connection, email, web access
and other internet services. Online services usually require special programs to connect to and use
your account. The two most common online services in the USA are America online and
CompuServe.
WHAT IS INTERNET?
Definition:
• The term Internet is an acronym that stands for International Network.
• It is defined as a world-wide computer network linking countless thousands of computer
networks, through a mixture of private and public data and telephone lines.
• Internet is just like a wide highway in a cyber space (space of electronic movement of data)
that moves data and information. Therefore, the terms Cyber Space and Information Super
Highway are frequently used to refer to Internet.
Administration of Internet - Who owns Internet?
• It is good to note that no single person is in charge of Internet. Each company/organization
manages its own network/s but there are agreed rules/protocols for connecting the networks
e.g. all networks should use TCP/IP protocols.
• The technical management of internet protocol is carried out by an Internet Society and the
International Standards for Organization (ISO). Internet has no political borders or boundaries
on the exchange of data and information.
Internet Connectivity
• To access and use Internet you must get connected.
Requirements:
– A computer, a PDA or WAP enabled mobile phones) – It is worthwhile to note that with
the dynamic growth of telephone and wireless technologies, it is now possible to use
cellular phones and Personal Digital Assistance (PDAs) to access information on
Internet just as you would use a computer.
– Transmission media – This is a physical (telephone line) or wireless (radio e.g. GPRS –
General Package Radio Service) pathway used to the medium for transferring
data/information from one computer to another.
– Internet Service Provider - These are licensed commercial or non-commercial
organizations that provide access to internet. Examples are Access Kenya, Swift Kenya,
Nairobi net, Africa online, Wananchi, Celtel, Safaricom etc.
Assignment: What are the factors to consider when choosing an ISP?
• MODEM (Modular-Demodulator) - Transforms digital data signals from a computer into
analog data signals (a form that can travel over the transmission media) and vice versa.
NB: Modern communication devices may not require the use of MODEMS.
• Software – The main categories of internet software are:
– Browser Software - This lets you access the Internet resources examples are Internet
explorer, Netscape Navigator, Opera, Monzila FireFox, Mosaic etc.
– Email Software enables you to receive, compose and send emails e.g. Outlook express,
Eudora Light, Pegasus Mail, Yahoo mail etc.
– Search Engines – These are search agent programs that enable one to quickly search
and access internet resources. They provide a catalogue of all information available
over the internet for quick access. They all provide a search form where one types key
words of the information he/she wants to access. Examples are: Yahoo, Google,
Inforseek, Alta Vista, Lycos etc.
Internet Connection Types
There are two principal ways of connecting to the Internet, that is; Direct and Dial – up
connection
1. Direct
– In this, the user has a fixed or dedicated link (physical line/wireless)to the ISP.
– Direct connections provide continuous, “always on” access to the Internet.
– A direct connection can be obtained in many ways e.g. Local Area Network (LAN) – A
LAN can be connected to the Internet through a special hardware component called a
router which is connected to another router at the ISP by a high-speed line.
Advantages:
– High speed connection
– You do not need a modem but a router
– It is convenient as one does not have to keep on dialing up.
Disadvantage:
– It is expensive to maintain the connection
– Only economical for large corporation/organizations.
2. Dial-up
– In this you connect your computer by use of a modem and/or phone line/wireless only
when you want to use Internet.
– The user gains Internet access when he/she contact the ISP and the ISP transfers
him/her to Internet. When he/she finishes, they disconnect from the ISP. The speed
with which you can access the Internet is determined primarily by the speed of your
modem.
– To gain faster dial-up connections, you can install an Integrated Service Digital
Network (ISDN) line which is a digital line provided by the local phone company.
Advantage:
– Initial connection fee is less as compared to direct connection
– Cost can be controlled by reducing connection time
– Connection done only when there is a need
Disadvantages:
– May be disappointing in case of resource contention/traffic jam during dial up process
as one has to keep on dialing up.
Transfer Process and Address System of Internet
• Internet Transfer Process - A common communication protocol/rule is used worldwide for
convenient interchange of information between a computer and another over the Internet. This
Protocol is known as TCP/IP (Transmission Control Protocol/Internet Protocol) protocol. This
was established by the U.S department of Defense and later became the standard protocol for
transfer of data over the Internet.
• Internet Address System - Every computer on the Internet has a unique address (IP address)
that identify the computer sending or receiving data. An example of an IP address is
192.168.11.70.
Domain Name System - IP address is composed of digits making it difficult for users to
remember. The IP addresses can therefore be translated into a domain (host) name address
which is easier to remember e.g. The above IP address may have its domain name equivalent
as: www.kaiboitech.ac.ke
E-mail Address
• For one to send and receive an email, he/she must have an email address.
• Email address directs the computers on the Internet on where to deliver the email message.
• A typical email address has this format: [email protected] e.g.
[email protected] i.e. the email parts are:
– Pekyalo – This is the user name that identifies the owner of the email address.
– @ - Separates the username from the rest of the address parts
– Yahoo – The name of the host computer on the Internet in to which the email account is
hosted.
– The period (.) – read as dot. Separates different parts of the email address.
– Com – The domain. Identifies the type of Institution that owns the host computer.
Commonly Used Domains
– .com – commercial organizations (www.safaricom.com )
– .co – company/commercial organization ( www.airtel.co.ke )
– .org – NGOs (www.worldvision.org.ke )
– .go – government (www.pcsr.go.ke )
– .edu – educational institution (www.mmu.edu.ke )
– .ac – academic/educational institution etc ((www.mmu.ac.ke )
– Country Domains are:
– .ke – Kenya – .uk – United Kingdom
– .tz – Tanzania – .ug - Uganda
LOG ON/SIGN IN
• Load the e-mail program that you are using e.g. for yahoo mail account holders, type
‘www.mail.yahoo.com’ in address bar of your browser to load the mail program.
• In the username text box, type your user name .e.g. jepkemboi
• In the password text box, type the password. The password appears encrypted for security.
• Click on Sign in command button and wait as your mails window is opened
Composing and sending Email
Steps:
• Load email application program/Email Editor
• Log in/Sign in if required by typing your user name and password.
• Click on compose command button – mail editor window appears as shown on the left.
• Type email address of the recipient in the TO: text box.
• To send Carbon Copies (Cc) & Blind Carbon Copies (Bcc) type the addresses in the Cc: & Bcc:
textboxes respectively. Separate two or more addresses by commas. Bcc recipients don’t see the
identity of other recipients.
• Type the subject/title of your message in the Subject: text box.
• Type the message and format it as you want in the message text area.
• Click on send command button to send mail.
• The computer confirms on sending the mail.
Receiving/Replying/Forwarding mail
Steps:
• Load email application program/Email Editor
• Log/sign in if required to access your email account by supplying your username and password.
• Click on ‘check mail’ command button
• Click on Inbox to view the mails received as shown on the left.
• To read a mail, click on its subject/title from the list of received mails. To read an attachment, click
on the attachment icon & follow the instructions that follow.
• To reply the mail, simply click on Reply tab/command and type the reply message then click on
send command to send it.
• To forward the mail, click on ‘Forward’ tab, type the address of the person whom you want to
forward the mail to, click on send.
File Attachment
Steps:
• Load email application program/Email Editor
• Log in or sign in as expected to access your account by supplying your username and password.
• Compose your mail as usual.
• Click on Attach Files command button.
• From the dialog box that appears, browse to specify the file/s to attach from your computer.
• Click on Open command button from the ‘Choose file’ dialog box after choosing the file to attach.
• The attachment progress bar appears. Wait as the file/s is/are attached to you mail.
• An attachment bar is inserted in the mail window with the name of the attached file.
• Click on send command to send the mail.
Saving an E-mail
a) With the mail window opened, click on file menu
b) Click on save as from the pull down menu
c) Select the location to save the mail and type the file name
d) Click on save
Deleting and Spamming mails
a) From the inbox window, select the mail to delete or spam
b) Click on the delete or spam command button to delete or spam the mail
NB: For deleting, confirm the deletion
Printing Mails
a) Open the mail that you want to print
b) Click on the file menu
c) Click on print from the pull down menu
d) Specify the printer and the number of copies
e) Click on print.
Sign Out/Log Off
• Once you have read your mail, it is advisable to sign out or log off to ensure that unauthorized
users do not read the mail.
• To sign out or log off, click on the sign out or log off command button.