F1 NOTES (Summaries) Computer
F1 NOTES (Summaries) Computer
INTRODUCTION TO COMPUTERS
Chapter outline
Introduction
Physical parts of a computer.
Development of computers.
Classification of computers.
Areas where computers are used.
The computer laboratory.
Practical hands on skills.
DEFINITION OF COMPUTER
A computer is an electronic device that accepts data process it using instruction /commands to give
information (output).
Computer is an electronic device that performs logical and arithmetic operation on data and it can
store it for future reference
Data-This is raw facts do not have meaning to the user. They include numbers, letters and symbols
when processed under instruction they become information.
Information-is processed data that is meaningful to the user and can be used to make decisions.
NB; A computer is classified as electronic because it utilizes small electronic signals to process
information.
Before 20th century much of the work of processing information was done manually or by use of
simple machines.
Today computers are popular in offices, homes, schools, etc. They are being used to process and
store all kinds of data.
There are integration of computers and telecommunication facilities for the purpose of
communication.
PARTS OF A COMPUTER
HARDWARE
SYSTEM UNIT
This is the part that houses the brain of the computer called central processing unit (C.P.U) it also
houses other devices called drives.
Drives are used to store, record and read data
PERIPHERAL DEVICES
These are devices that are connected to the system unit using special cable called data interface cables
that carry data and information to and from the device.
These cables are attached to the system unit using connecters called ports.
Peripheral devices include printers, speakers, microphone, scanners, joystick, digital cameras, etc
NB
Any device that can be connected to system unit to perform specific tasks fall in class of peripheral
device
THE KEYBOARD
It enables the user to enter data and instruction by pressing keys on it (input device)
THE MOUSE
It enables the user to issue instruction to the computer by controlling special mouse pointer displayed
on the screen.
THE MONITOR
It is called monitor mainly because through it we monitor what on the system unit. It displays
processed data. A monitor looks like a television screen
SOFTWARE
This refers to programs (set of instructions that run in computer memory). Just like hardware software
can also be grouped into 3 basic groups namely.
System software
Application software
Programming languages.
Most software falls into one of these categories.
Advantages of computers.
1. Computer output is mostly neat and accurate.
2. Computer can repeat tasks as per instructions.
3. Computer is fast in their output they produce constant output no deviation.
4. They store files for future use.
5. They are standard machines using basic operation method globally.
6. They can perform multitasking. This is the ability to do more than one job at a time.
Disadvantages of computers
1. They can be affected by viruses.
2. They are expensive to maintain.
3. They are entirely dependent on instructions such that if you input wrong data you get wrong
results.
4. Computer software is always on the change within a short time. An operator needs to up date
his/her knowledge regularly.
-3-
NB. A virus is a program that interferes with computer operations to make it abnormal.
DEVELOPMENT OF COMPUTERS
Before 1900 most data processing was done manually using simple tools like stones and
slicks to count and keep record. Therefore historical development of computer can he traced
back to the time when humans were struggling to invent tools that could simplify
mathematical calculations. The following were some of the tools that were invented for this
purpose. Abacus. Napier bones. Slide rule, La pascaline machine ,weaving loom and
analytical engine.
Abacus
An abacus was a Chinese instrument which dates back to 3000 BC. An abacus has bead
like parts that move along the rods .Each bead above the middle bar ( cross bar) stands for
five units and each head below the middle bar( cross bar ) stand for one unit Representing
numbers using an abacus.
Napier bones
Napier bones was developed by John Napier , a Scottish mathematician in the 1 7th century
To help in counting. It si made up of marked strips of wood or bone placed side to side with each
other.
Slide rule
A slide rule was invented by William Oughtred in 17th century is a tool that can be used to perform
arithmetic operations.
La pascaline machine
La pascaline machine was made by Blaise Pascal in the 17l century. This machine could add and
subtract numbers.
Weaving loom
In early 19th century .Joseph Jacquard built a weaving loom which could be programmed using
punched cards to pick out threads and weave them in patterns .This idea of using punched cards to
control patterns helped later inventors to develop calculating machines that could follow simple
instructions.
The analytical engine.
Charles Babbage an English mathematician designed a machine that could calculate a long series of
numbers and print the outcome . he called it the difference engine . later in 1932 , he improved the
design of the machine by incorporating the idea of programming using punched cards . He called it
the <
Analytical engine. However, the analytical engine was never constructed. The analytical engine is
recognised as the first real computer and Babbage as the father of computing.
Electronic computers
It took some time after Babbage designed analytical engine to come up with electronic computer.
The first computer like machine Mark 1 was designed in 1939 by Prof Haward Aken of Holland
university in 1939 it became operational in 1943 . it weighted 5 tonnes and was 16 m long. Since
then
rapid changes have been made and can be categorised in five generations .
Examples Electronic Numeric Integrator and Calculator (ENIAC) and the Electronic Disci etc Variable
Automatic Computer (EDVAC
The third generation used electronic devices called Integrated Circuits (1C] instead of transistors.
An integrated circuit consist of thousands of small transistors circuits etched on a semiconductor
called SILICON CHIP. Characteristics of 3rd generation computers.
• Emitted less heat.
• Were small in size .
• Were easier to program .use and maintain compared to their
predecessors.
•
Examples IBM 360,and ICL 19000 series.
From 1970 further technological improvement was done on the silicon chip design by
compressing more tiny circuits and transistors into even smaller space. This design produced
what is called Large Scale Integrated Circuit (LSI) and Very Large Scale Integrated (VLSI)
Circuit which were used in innovation and technological development of the brain of computer
called microprocessor. The result was development of small computers with very high processing
speed and reduction of physical size. Characteristics of fourth generation computers.
• Emit very little heat.
• Are very small in size
• Are very easy to maintain and use.
Examples of 4th generation computers are IBM 370 and 4300, Honey well DPS -88 and Burroughs
7700
This generation falls in today's computers that have very high processing speed and power than
their predecessors .whose size is increasing becoming smaller. These computers have special
instruction sets that allow them to support complex programs that mimic human intelligence often
referred to as artificial intelligence.
Characteristics of fifth generation
computers. • • Use artificial
intelligence.
• Massive connectivity to internet and intranet.
• Superior hardware and software products that are small in size.
• Emit negligible heat.
-5-
Examples of fifth generation computer include portable computers , artificial intelligence and natural
language processing systems.
CLASSIFICATION OF COMPUTERS.
Computers can be classified in many ways. However, the three most common methods of
classification are by:
Physical size and processing power.
Purpose.
Functionality.
They are the fastest, largest, most expensive, powerful computers and have largest memory capacity.
They are able to perform many complex operations in a fraction of a second due to their huge
processing power; supercomputers generate a lot of heat therefore special cooling systems are needed.
Sometimes the whole C.P.U is immersed in an aquarium like tank containing liquid fluorocarbon to
provide cooling.
Super computers are mainly found in large research stations and are used to control complex
operations and perform complex calculations. Typical application areas are in space science, nuclear
physics and aerodynamics.
Mainframe computers
-6-
They are less powerful & less expensive than supercomputers. They are big in size and they are
mainly used for processing data and performing complex mathematical calculations they have large
storage capacity and can support a variety of peripherals.
Mainframe computers are mostly used in large businesses, government agencies, big organisations and
companies such as banks, hospitals, and airports etc which have large information processing needs
where they act as network servers.
Minicomputers
It resembles the mainframe but it is slightly smaller, thus referred to as small scale mainframe
computers although it supports fewer peripheral devices and is not as powerful as the mainframe
computers it was developed as a cheaper alternative to the mainframe computers for smaller
organisation.
They are mainly used in scientific laboratories, research institutions, engineering plants and places
where processing automation is required in manufacturing industries. They are well adapted for
functions such as accounting, word processing, database management and specific industrial
applications.
Micro computers.
Microcomputers also known as personal computers (PC) are the smallest in size, cheapest and slowest
compared to the other three types. They are called micro computers because their processor is very
tiny.
Microprocessors are mainly used in offices, training and learning institutions, small business
enterprises, communication centres among others. Technological advancement has seen the
development of smaller microcomputers. The following are various types of micro processors in
operation today arranged in descending order of according to size.
a) Desktop computer: is designed to be placed on top of an office desk.
b) Notebook or lap top computer: they are portable PCs and more expensive compared to desktop
PCs, they use power from mains as well as rechargeable batteries. The batteries however
require regular charging because they discharge within hours.
c) Palm tops: They are light and small in enough to fit in the palm of hard and the pocket of a
jacket and often referred as hand held’s. They are limited in functions and are most affordable
of all personal computers. Examples are Personal digital assistant (PDA’s).
-7-
Apart from PCs most modern home appliances such as digital TVs, micro waves, wall clocks and
other electronic home appliances are digital in nature.
Analog computers
This refers to computers that process data that is continuous in nature. Continuous data also known as
analog data are usually represented using a continuous wave form shown below.
-8-
Analogue computers are used in manufacturing process control like monitoring and regulating furnace
temperatures, pressure etc. they are also used in other applications like in weather stations to record
and process physical quantities e.g. wind speed, temperature etc.
Hybrid computers
Hybrid computers are designed to process both analogue and digital data.
d) Hospitals
Computers are used to keep patients records to provide easy access to a patients treatment and
diagnosis history. Computerised medical devices are now being used to get across section views
of patients that enable physicians to get proper diagnosis of offered parts o9f the body with high
level of accuracy. Computers also control life support machines in intensive care units(I.C.U).
e) Engineering
Computers can be programmed to control other production machines in the industries in that
case they bring about increased production in quality and quantity. The computer age has seen
the wide use of remote controlled devices perform tasks that are too dangerous or complex and
tedious to assign to human beings.
f) Communications
Integration of computers and telecommunication facilities has made message transmission and
reaction to be very fast and efficient. Because of the speed in which information can be
transmitted in the world is said to have become a global village.
g) Law enforcement agencies.
Information held in computers such as finger prints photographs and other identification details
help law enforcers carry out criminal investigations.
h) Education
Computers are widely used in teaching and learning process. Learning and teaching using
computers is referred to as computer Aided Learning(C.A.I) and Computer Aided
Instruction(C.A.I). for example experiments in subjects like chemistry or physics may be
-9-
demonstrated using special computer programs that can depict them on the screen through a
process called simulation.
i) Library service
In computerised library, a computer enables library personnel to easily access and keep updated
records of books and other library materials. Library users can also use computers to search for
titles instead of using manual card catalogue.
A computer laboratory is a special room set aside and prepared specifically for safe installation
and use of a computer. In schools a computer laboratory provides a safe conducive environment
for teaching and learning of computer studies and I.C.T related displines.
The following are the factors to consider when preparing a computer laboratory.
Security of computers hardware and software.
Reliability of the source of power.
Number of computers to be set up.
Maximum number of users.
Safety precautions and practices.
The computer laboratory just like any other laboratory should be set up with safety precautions on
mind. Safety precautions and practises can be divided into measures that are meant to protect
computers and those meant to protect the users.
Measures meant to protect computers.
Burglar proofing the room. This involves fitting grill on doors, windows and roof to deter
forceful entry into computer room. Installing an intrusion detection alarm systems and
employing guards also increase the level of security, alertness against theft of computers
and their accessories.
Installing fire prevention and control equipments such as smoke detectors and fire
extinguishers. The extinguishers should be gaseous type and should not be non liquid and
non powder based. This is because liquid my cause rusting and corrosion of computer
components on other hand powder particles may increase friction and wear off moving
parts. The particles may also cause hard disk crash.
Providing stable power supply by installing voltage regulators, surge protectors or
uninterruptible power supply (UPS) for each computer and power back up generator.
Installing lightening arrestors on computer room.
The room should be well laid out- there should be enough space for movement computers
should be placed on stable, wide enough desk to avoid accidentally knocking them down ,
cable should be laid away from paths to avoid user tripping over them.
Dust and damp control- By fitting window curtains and air conditioning systems that filters
dust particles from entering the room; also the computers should be covered with dust
- 10 -
covers when not in use. On the other hand dampness or humidity in the lab can be
controlled by using dehumidifiers as high humidity leads to rusting of metallic parts of the
computers.
Cable and power sockets should be well insulated and correct rating to avoid short circuits
that damage computer components.
The users should not eat or drink in computer laboratory food particles may fall in moving
parts like keyboard and clog them while liquid may pour into electrical circuits and cause
short circuit.
Measures that protect the user.
All cables should be insulated to avoid the danger of electric shock to the users.
Cables should be laid away from the user paths to avoid tripping on them.
Providing standard furniture . To avoid poor posture during machine use this may lead to strain
injury and limb fatigue. The table should be of right height relative to the seat to provide
comfortable hand positioning. The seat should have an upright backrest and should be high
enough to allow the eyes of the user to be at the same level with the top of the screen.
Providing anti glare screen (light filters) and adjustable screens to avoid eye strain and fatigue
caused by over bright monitors.
The room should be properly ventilated to avoid dizziness caused by lack of adequate oxygen
and allow the computer to cool also overcrowding should be avoided.
The walls of the computer should not be painted with over bright reflective oil paints and
screens should face away from windows to avoid reflection by bright backgrounds.
Running and playing in computer room is not allowed.
Booting is the process by which the computer loads system files into main memory this process also
involves carrying out of diagnostic tests.
Cold booting
Starting a computer by turning on using its power button. It automatically goes through a process of
self test referred to as power on self test (POST).POST checks on existing drives, basic input and
output devices such as the key board, monitor and the mouse. If a problem is encountered the process
is halted and error message is displayed on the screen. POST is accomplished by a special firmware
program called Basic Input / Output system (BIOS) held in ROM chip mounted on the mother board.
Lastly a special type of computer program used to manage computers called Operating System is
loaded into computer memory.
Warm booting.
This is restarting a computer that have failed to respond to commands (Hanged)by pressing a
combination of keys Ctrl + Alt + Del or pressing reset button on the computer.
Shutting down a computer.
Correct procedure should be followed when shutting down a computer to avoid data loss, damage of
programs and hard disk.
Procedure of shutting down a computer.
- 11 -
Ensure that all the work has been properly stored. –saved
Close all programs that may be currently running.
If your computer is running on Micro soft Windows XP or Vista.
Click the start button
On start menu, click Turn off computer.
On the message box that appears click turn off . The computer will under go the shut down
process.
The system Unit is shut down, then switch off the monitor, then UPS finally switch off from the
socket.
Keyboarding and mouse skills.
Keyboard and mouse are the most widely used devices hence need for one to be conversant with using
them.
Keyboard layout.
The keys in the computer keyboard are arranged is the same way they are in typewriter . The typical
computer keyboard the first typing keys are Q,W,E,R,T,Y keys on thus commonly called QWERTY
keyboard.
The keys on the keyboard can be classified into five categories namely alphanumeric (typing) keys,
Function keys, Cursor movement and editing keys, Special PC keys and Numeric keypad keys.
Alphanumeric keys.
They are also known as typing keys labelled with alphabetic letters A to Z Numeric numbers 0-9 and
special symbols such !,@,#,$,%,^,&,*This group also includes keys caps lock, enter, tab, space bar
and backspace.
Caps lock key: Pressing this key lets the user to type in upper case letters (capitals). T o switch back
to lower case letters simply press the same again.
Enter key (return key) : pressing this key forces the text to move to the next line . the enter key is
also used to execute command that have been selected.
Tab key: this key is used to move the text cursor at set intervals on the same line e.g. 10mm, 20mm
etc.
Space bar. This creates a space between words during typing.
The back space key: This key deletes characters from right to left on the same line.
Function keys
They are located at the top of the keyboard. They are labelled F1 to F12. They are used for tasks that
occur frequently in various programs e.g. pressing F1 key in most programs start the help menu.
Cursor movement and editing keys.
- 12 -
System
A system can be defined as a collection of interrelated components that work together towards a
collective goal. The function of a system is to receive inputs and transform them into outputs.
Information System
An information system is a system that accepts data resources as input and processes them into
information products as output.
Computer System
A computer system is a collection of entities that work together to process data and manage
information using computers.
Computer Specialists are people who develop and operate computer systems. They include
systems analysts, programmers, computer operators etc.
(ii) Hardware
Computer hardware includes all physical or tangible components of a computer system.
Examples of computer hardware are:
Central Processing Unit
Input devices e.g. keyboard, mouse
Output devices e.g. printers and monitors
Secondary storage devices e.g. hard disks and flash disks
(iii) Software
Computer software refers to the instructions that tell the computer hardware how to perform a
task.
- 14 -
COMPUTER HARDWARE
The hardware elements of a computer are generally grouped into four major categories namely:
Input devices
The Central Processing Unit (CPU)
Output devices
Secondary Storage devices
The diagram below shows functional organization of the computer hardware.
CONTROL UNIT
(CU)
ARITHMETIC/
LOGIC UNIT (ALU)
SECONDARY
STORAGE
Legend/Key
Data/Instruction Flow
Command/Control Flow
INPUT DEVICES
Input devices are computer hardware that translates data from human readable into a form that the
computer can process. In other words, input devices allow people to put or enter data into the
computer in a form the computer can use. The human-readable form may be words like the ones in
these sentences but the computer-readable form consists of binary 0s and 1s, or on and off signals.
Input devices can be classified according to how they are used to enter data. These include:
Keying devices
Pointing devices
Scanning devices
Speech/Voice recognition devices
Digital devices
Keying devices
Keying devices are input devices are input hardware that convert numbers and other characters into
machine readable from. Keying devices include keyboard and keypad. Key pads are found on devices
such smart phones and ATMs (Automatic Teller Machines).
- 15 -
Because keying devices require typing by people, the data input this way is less accurate than data
input via non-keyboard source data entry devices.
Pointing devices
One of the most natural of all human gestures is the act of pointing. This concept is incorporated in
several kinds of input devices. The pointing devices used with microcomputers are the mouse, the
trackball, the joystick and the touchpad all of which have variations. All pointing devices have the
same purpose; allowing the user to move the cursor (or pointer) around the screen and to click to
select items or perform other functions.
Mouse
A mouse is a device that is rolled about on a desktop to direct a pointer on the computer’s display
screen. Its name is derived from its shape, which looks a bit like a mouse, its connecting wire that one
can imagine to be the mouse's tail, and the fact that one must make it scurry along a surface. When
you move the mouse on the desktop, the pointer on the screen moves in the same direction. The
mouse pointer is the symbol that indicates the position of the mouse on the display screen. The
pointer will change from an arrow to a pointing finger icon depending on the task you are performing.
It also changes to the shape of an I-beam to indicate where text or other data may be entered.
Mice contain at least one button and sometimes as many as three, which have different functions
depending on what program is running. Some newer mice also include a scroll wheel for scrolling
through long documents. The movement of the mouse over a flat surface is mirrored by a pointer on
the monitor screen. Buttons on the mouse allow you to make selections from the menus, move objects
around the screen and paint or draw.
Types of Mice
Mechanical Mice
Mechanical mice use a rubber-coated ball that contacts the mouse pad. Moving the mouse causes the
ball to move, which in turn causes one or both of the internal cylindrical rollers with which the ball is
in contact to move.
Advantages
Mechanical mice are inexpensive.
Disadvantages
They require frequent cleaning since the ball can get dirty. Dirt causes the mouse pointer to move
erratically.
They provide limited resolution
They are unreliable because of many moving parts
Optical Mice
Optical mouse uses an optical sensor instead of the mouse ball. It emits a small beam of red light
which bounces off the surface into a sensor. The sensor sends co-ordinates to the computer which in
turn moves the cursor or pointer on the monitor screen, according to these co-ordinates.
- 16 -
Advantages
Do not require frequent cleaning as mechanical mice.
More reliable because of the reduced number of moving parts
Can slide over most surfaces since it does not have a ball.
Disadvantages
They are more expensive than mechanical mice
Cordless Mouse
The cordless mouse uses the wireless communication technology (via infrared, radio or Bluetooth) to
transmit data to the computer. And like the wireless, it doesn’t use any cord.
Mouse Terminology
The terms you are most likely to encounter when using a mouse or a trackball are as follows:
Point To move the pointer to the desired spot on the display screen such as over a particular
word or object.
Click Tap – that is press and quickly release the left mouse button. A click often selects an
item on the display screen.
Double Click Tap – press and release the left mouse button twice in quick succession. A double
click often opens a document or starts a program.
Right Click Tap – press and release the right mouse button. Right clicking brings up a pop-up
menu with options available to the object over which the cursor is positioned.
Shift Click Press and release the left mouse button while holding the Shift key down. Shift
clicking enables you to select multiple items.
Drag Press and hold the left mouse button while moving the pointer to another location.
Trackball
Another pointing device, the trackball is a variant on the mouse. A trackball is a movable ball on top
of a stationary device that is rotated with the fingers or palm of the hand. A trackball looks like a
mouse turned upside down. To move the pointer, you rotate the ball with your thumb, your fingers, or
the palm of your hand. There are usually one to three buttons next to the ball, which you use just like
mouse buttons.
The touchpad
The touchpad contains a touch-sensitive pad and is normally found on laptops. It is a pressure- and
motion-sensitive flat surface about the same size as a mouse over which you move your fingers to
control the cursor/pointer on the screen. Buttons placed close to this surface allow for selection of
features on the screen.
Joysticks
A joystick is an input device consisting of a stick which lets you control the movement of an object on
the screen by operating a small lever. It is used mainly for computer games such as flight simulators
and occasionally for CAM/CAD systems. Special joysticks are also available for people with
disabilities that don’t let them use a mouse or a trackball.
Light pen
The light pen is a light-sensitive stylus or pen-like device connected by a wire to the computer
terminal. It allows you to point and make selections more accurately on a screen. The tip of the light
pen contains a light-sensitive element which, when placed against the screen, detects the light from the
screen and enables the computer to identify the location of the pen on the screen. Making selections
with a light pen is far more accurate than using your finger to make selections on a touch sensitive
screen. Light pens also allow the user to draw directly on the screen. However, they are not as accurate
as a digitising tablet and drawing can become uncomfortable.
- 18 -
Pen-Based Systems
Pen-based computer systems use a pen-like stylus to enter handwriting and marks into a computer.
Small handheld computers called PDAs (Personal digital assistants) use pen-based input.
Touch Screens
A touch screen is a video display screen that has been sensitized to receive input from the touch of a
finger. Behind the screen, which is covered with a plastic layer, there are invisible beams of infrared
light. The user can input a request for information by pressing on displayed buttons and then see the
requested information displayed as output on the screen.
Touch screens are often used in automatic teller machines, in directories displaying tourist information
in airports and hotels, in fast-food restaurants to select menu items and in preschool multimedia
education.
Scanning Devices
Scanners are input devices that use laser beams and reflected light to translate hardcopy images of
text, drawings and photos into digital form. The images can then be processed by a computer,
displayed on a monitor, stored on a storage device, or communicated to another computer. Scanning
devices can be classified according to the technology they use to capture data. These are optical
scanners magnetic scanners.
Magnetic Scanners
Magnetic scanners capture by using magnetic technology. Magnetic scanners include: magnetic-ink
character recognition (MICR) and magnetic stripe.
MICR is mainly used in the banking industry to read/sort cheques. Bank cheques have the following
information encoded in them:
• The cheque number
• The bank branch number
• The customer’s account number.
- 19 -
A magnetic stripe is a short length of magnetic coated tape printed on the surface of or sealed into a
ticket or card. It contains information to identify the ticket or card and its user.
The card is read by swiping it – moving the magnetic strip through a reader so that the strip can be
read. Such stripes are found on bank cards which identify the card holder’s bank account, so that the
card holder can perform banking transactions.
Cards with these magnetic stripe codes can provide quick identification of people entering buildings,
allowing access to the card holder. These cards are therefore used for security purposes too. Examples
of other uses are in phone cards and debit cards for cell phones. The magnetic stripe in this instance
contains information about the amount of money left ‘on’ the card.
Optical Scanners
Optical scanners capture data using light. A special type of concentrated light is passed over the
object, image or text that needs to be input. These types of scanners include: image scanners, Optical
Character Recognition (OCR), Optical Mark Recognition (OMR) and Bar-Code Readers.
Hand-held scanner: This is a type of scanner that is rolled by hand over the documents to be
scanned. These scanners are generally used to scan in small images or parts of images. Their
resolution is not very high.
Drum scanner: This is a type of scanner used to scan one sheet at a time. They cannot handle
book-bound pages.
Sheet-fed scanner: This is a scanner that allows only paper to be scanned rather than books or
other thick objects. The sheet that contains the image is fed through rollers and the picture is
scanned as the paper passes through.
- 20 -
OMR detects the position of black marks on white paper. The documents to be read have empty boxes
pre-printed on them. The user makes pencil or ink marks in the appropriate boxes. The intensity of the
reflected light from these marks on the form is detected by the OMR. This is sometimes called mark
sensing. The computer records the position of the marks and analyses it to determine the meaning of
the data. OMRs are used mainly in assessing multiple-choice examinations such as Kenya Certificate of
Primary Education (KCPE), questionnaires given out by researchers or ballot papers.
This technology is also useful for applications in which large numbers of hand-filled forms need to be
processed quickly and with great accuracy, such as surveys, reply cards, questionnaires and ballots.
Examples that use OCR characters are utility bills and price tags on department-store merchandise.
OCR is being used by libraries to digitize and preserve their holdings. OCR is also used to process
checks and credit card slips and sort the mail.
Barcode readers
A barcode is a set of vertical lines of differing thickness with a string of numbers printed at the
bottom found on most manufactured and retail products. You can see barcodes on items in
supermarkets, books in libraries and on such things as magazines. The barcode is read by an optical
scanner (barcode reader) in which a laser beam scans the barcode and the light is reflected back into
the scanner. The information received by the scanner is sent to a computer for processing.
Barcodes form part of the Point of Sale (POS) system usually found at retail outlets. A terminal is
connected to a central computer which records details after the barcode of an item has been scanned.
The price of the product is displayed on a monitor at the point of sale. Meanwhile the central computer
calculates the amount due, including VAT, and prints an itemised receipt. The information recorded
can also be used for stock control and sales analysis.
Radio frequency identification (RFID) uses radio waves as a means of identifying animals, persons
and objects. A chip connected to a small antenna makes up the RFID transponder or RFID tag.
Information such as a serial number is transmitted to an RFID receiver that converts the radio waves to
digital information so that it can be processed by the computer.
RFID chips are used for tracking animals, for example, as they can be embedded in the skin of the
animal and the tag can be read once the animal is within range of the reader. Some stores are now
tagging their merchandise with RFID tags to record POS information, and also as a means of security
- 21 -
to reduce theft. Alarms can be raised when someone tries to exit a store without paying for an item.
Smart cards
In recent years, new means of storing data on cards have become available. ‘Smart’ cards with very
thin gold-coloured memory chips sealed into them can store more information than magnetic stripe
cards. Data is stored on the memory chip embedded in the card, allowing a greater amount of
information to be kept and updated on the card than would be the case with the old-style magnetic
stripe. The chips can hold information for cell phone use, debit and credit cards, and any prepaid
services. Eventually, smart cards may store information about a person’s driving history, their birth
certificate or paper, and could even be imprinted with the holder’s voice, fingerprints and retinal scans.
Optical Cards
These are plastic, laser recordable, wallet-type cards used with optical card readers. They can store
much more data than smart cards and may become more popular in future.
Simple commands can be used to control machines or even ‘type’ letters in a word processor. Voice
recognition has become important in many areas of our lives. It has made life easier for people with
movement difficulties, such as the paralysed, who with suitable equipment can now operate a
wheelchair, lighting and even open doors using voice commands.
- 22 -
Sound capture
All modern computers contain a built-in microphone for sound capture. This means that you can
record your voice, for example, to make comments that are embedded in a word processing document.
A sound card on your computer is required for recording voice or music. The sound card digitises the
information into a form that the computer can understand.
MIDI instruments
Electronic musical instruments can have a MIDI port (Musical Instrument Digital Interface) for input
into the computer. The sounds are digitised and stored as a file, can be displayed on screen, edited and
played back, using appropriate software.
Remote control
A remote control emits a beam of infra-red light that carries data signals. Commonly used for input to
televisions, stereo systems, VCRs and DVD players, they are now being used by computers as a
wireless means of communication.
Sensors
A sensor is an input device that collects specific kinds of data directly from the environment and
transmits it to a computer. Although you are unlikely to see these devices connected to a computer,
they exist all around us. Sensors convert chemical or physical changes in humans and their
environment to electrical signals that can be passed to a computer, where it is analysed, stored and
manipulated by special software. Sensors are useful in the fields of medicine, environmental planning
and preservation, weather reporting, and so on. A variety of sensors can be used to measure such
things as heat, light, sound, pressure, strain, acidity (pH), oxygen concentration, humidity, pulse, water
level, water flow, speed, tilt or even something like a door or a valve opening or closing.
Biometric systems
Biometrics refers to the science of identifying an individual through their body characteristics such as
face geometry and hand geometry (e.g. fingerprints), iris or retinal scans, veins and voice patterns. All
these forms of identifying an individual can be input into a computer system set up for security
purposes. In the near future they may become common, for allowing access to buildings and bank
accounts. Retinal scans use a ray of light directed into the eye to identify the distinct network of blood
vessels at the back of the eye. Fingerprint readers scan the imprint made by the pattern of ridges on the
finger and compare it to a set of patterns stored in memory. Fingerprints are considered unique, as no
two individuals have the same fingerprint.
Line-of-Sight Systems
Line-of-sight systems enable a person to use his/her eyes to point at a screen. This technology allows
users with physical disabilities to direct a computer. This is accomplished using a video camera
mounted beneath the monitor in front of the viewer. When the user looks at a certain place on the
screen, the video camera and the computer translate that location into screen coordinates.
Terminals
People working on a large computer system are usually connected to the main or host computer via
terminals. A terminal is an input/output device that uses a keyboard for input and a monitor for
output. There are two types of terminals:
Dumb: A dumb terminal can only be used to input data to and receive information from a
computer system; it cannot do any processing on its own.
For example, airline clerks use dumb terminals at airport ticket and check-in counters.
Intelligent: An intelligent terminal has built-in limited processing capability and RAM but does
not have its own storage capacity. Intelligent terminals are not as powerful as microcomputers and
are often found in local area networks where users share application software and data stored on
the server. Examples of intelligent terminals include ATMs and Point-of-Sale (POS) terminals.
Modern CPU's are called 'integrated chips' or microprocessors. The idea of an integrated chip is that
several processing components are integrated into a single piece of silicon fixed on the motherboard.
A CPU is plugged in a CPU socket on the motherboard, on top of the CPU is placed a heat sink and
a fan which must run whenever the CPU is in use to keep it cool. Cooling is necessary because the
CPU generates a lot of heat as it processes data, and for it to function properly and to prevent it from
crashing, it must be cooled.
Logical operations are comparisons. These operations involve comparing one data item with
another, and determine if the first item is greater than, equal to, or less than the second item.
Logical operations work with conditions and logical operators such as AND, OR, and NOT.
Some common logic comparison symbols include the following;
Operator Meaning
= equal to
< Less than
> Greater than
<= less than or equal to
>= greater than or equal to
<> not equal
- 25 -
Data Bus
The data bus carries the data between the processor and other components. The size of the data bus
determines the amount of data that can be transmitted simultaneously.
Address Bus
The address bus is a collection of wires connecting the processor with main memory that is used to
identify particular locations (addresses) in main memory.
Control Bus
The control bus is used by CPUs for communicating with other devices within the computer by
carrying commands from the CPU and returns status signals from the devices.
The primary memory itself is implemented by two types of memory technologies namely; Random
Access Memory (RAM) and Read Only Memory (ROM).
Random Access Memory (RAM) is a temporary working storage. This means that RAM is the
computer’s ‘work space’ or ‘desk area’ where data and programs needed for immediate processing are
held. Computer memory is contained on memory chips mounted on the motherboard. Memory
- 26 -
capacity is important because it determines how much data can be processed at once and how big and
complex the program used to process data can be.
Functions of RAM
It holds data waiting processing
It holds the instructions (programs) for processing the data.
It holds data that has been processed (information) and is waiting to be sent to an output,
secondary storage, or communication devices.
Characteristics of RAM
RAM is a temporary storage whose contents are lost when the power is turned off. Thus RAM is
volatile.
RAM is a random access memory i.e. the memory is accessed by the processor in a random
fashion.
The size of RAM determines how much data can be processed at once and how big and complex a
program a program may be used to process the data.
Types of RAM
Random Access Memory (RAM) is available in two types: Dynamic Random Access Memory
(DRAM) and Static Random Access Memory (SRAM).
Types of ROM
Mask-Programmed ROM
Classic mask-programmed ROM chips are integrated circuits that physically encode the data to
be stored, and thus it is impossible to change their contents after fabrication.
Programmable Read Only Memory (PROM) are blank chips on which the user using a special
device called a PROM programmer can write programs. Once a program is written, it cannot be
erased.
Erasable Programmable Read Only Memory (EPROM) can be erased by exposure to strong
ultraviolet light (typically for 10 minutes or longer), then rewritten with a process that again needs
higher than usual voltage applied. Repeated exposure to UV light will eventually wear out an
EPROM, but the endurance of most EPROM chips exceeds 1000 cycles of erasing and
reprogramming. EPROM chip packages can often be identified by the prominent quartz "window"
which allows UV light to enter. After programming, the window is typically covered with a label
to prevent accidental erasure.
Electrically Erasable Programmable Read Only Memory (EEPROM) is based on a similar
semiconductor structure to EPROM, but allows its entire contents (or selected to be electrically
erased, then rewritten electrically, so that they need not be removed from the computer (or camera,
MP3 player, etc.). Writing or flashing an EEPROM is much slower than reading from a ROM or
writing to a RAM.
Registers
Registers are special high-speed temporary storage locations within the CPU that store data during
processing and provide working areas for computation. Registers are found within the CU and the
ALU.
Cache Memory
Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central
processing unit (CPU), or located next to it on a separate chip. The CPU uses cache memory to store
instructions that are repeatedly required to run programs, improving overall system speed. The
advantage of cache memory is that the CPU does not have to use the motherboard’s system bus for
data transfer. Whenever data must be passed through the system bus, the data transfer speed slows to
the motherboard’s capability. The CPU can process data much faster by avoiding the bottleneck
created by the system bus.
The performance of cache memory is highly affected by its level. The level of cache to refers to its
connecting circuits or electronic pathways (bus) and physical proximity to the CPU.
Buffers
This is a temporary holding place that maybe part of the CPU or built-in an input or output device.
Because the CPU is very fat compared to input and output devices, buffers provide temporary storage
so that the CPU is free to carry out other activities instead of waiting for all data to be entered or
information to be output. For example, printer buffers temporarily hold the output to be printed thus
freeing the CPU to perform other functions.
particularly desirable if you are running program that display a lot of graphics. VRAM chips are
usually located on a special video adapter card inserted in an expansion slot on the system board.
Memory Capacities
The following terms are used to express computer capacity.
Bit: This is the smallest unit of measurement in a computer. Bit refers to a binary digit – either 0
or 1.
Byte: To represent letters, numbers, or special characters such as ! or * bits are combined in
groups. A byte refers to a group of eight bits and a byte represents one character, digit or value.
Kilobyte: A kilobyte (K, KB) is about 1000 bytes or precisely 1024 bytes.
Megabyte: A Megabyte (M, MB) is about 1 million bytes (1,048,576 bytes).
Gigabyte: A Gigabyte (G, GB) is about 1 billion bytes (1,073,741,824 bytes).
Terabyte: A Terabyte (T, TB) is about 1 trillion bytes (1,009,511,627,776 bytes)
Petabyte: A Petabyte is a new measure that accommodates the huge storage capacities of modern
databases. A petabyte represents about 1 million gigabytes.
THE MOTHERBOARD
The motherboard or system board is the main circuit board in the system unit. This board acts as a
container for the different components in the system unit such as the CPU, ROM chips and RAM
chips.
ROM CHIP
The ROM chips fixed on the motherboard, contain instructions, which are specific for that
particular system board, the PC cannot write new data to those chips. All PC's have instructions in
ROM chips or ROM BIOS chips on the system board, usually start-up instructions of the computer.
The ROM chips are supplied by specialty software manufacturers, who make BIOS chips.
Memory Slots
Modern computer system board slots support either DDR (184 pins) or DDR2 RAM (240 pins),
which is becoming the more popular type of memory. Slots usually come either two or four to a
board, and are often color-coded to tell you where to place matching memory cards. This means that
more than one memory card can be fixed on a motherboard.
CMOS
CMOS (complementary metal-oxide semiconductor) memory is a special type of memory chip that is
used to store information about the computer system configuration, such as the amount of memory,
the type of peripheral devices (keyboard, mouse etc.) installed on the computer, and the capacity of
disk drives fixed on the computer. CMOS also keeps track of the date and time. The system
information in the CMOS memory is needed each time the computer is started. CMOS memory has
very low electricity requirement and is powered by a battery known as the CMOS battery fixed on
the motherboard. The battery power enables CMOS memory to retain the stored information even
when the power to the computer is turned off, which is why your computer clock runs even when the
computer is off. Information in the CMOS is changed whenever installation of a device is done.
To install a new adapter card in your computer, you must plug the card into a bus slot to enable the
new device to communicate with the rest of the computer system.
THE MICROPROCESSOR
Most of today’s microprocessors chips are of two kinds; those made by Intel and those made by
Motorola although that situation may be changing.
- 31 -
Output Devices
Output hardware consists of devices that translate information processed by the computer into a form
that humans can understand. Thus the function of output devices is to provide the user with the means
to view and use information produced by the computer system.
Information is output in either hardcopy or softcopy form. Soft copy or temporary output refers to
information displayed on a screen or in audio or voice form through speakers. This kind of output is
not tangible and disappears when the computer is switched off. Hard copy output or permanent output
refers to output printed on paper. This kind of output is tangible; the output can be held in your hand.
Monitors are softcopy output devices that many people use most. Monitors can output still or moving
pictures. Monitors run under the control of a graphics display adapter card plugged into an expansion
slot on the motherboard. The adapter allows information to leave the computer and appear on the
monitor. The display adapter comes with its own RAM, called VRAM or Video RAM. VRAM
controls the resolution of images displayed on the monitor as well as the number of colours and the
speed at which the images are displayed. The more video memory you have, the higher the resolution
and the more colours you can display. Images and text are formed by many tiny dots of coloured light
called pixels (short for picture element). A pixel is the smallest unit on the screen. It can be turned on
or off or coloured in different shades. Pixels are so numerous that when placed together in certain
patterns they appear to form a smooth image on the screen, be it a character in a word, a diagram or a
photograph. There are two types of monitors: cathode ray tube (CRT) and flat panel display.
A cathode ray tube (CRT) is a vacuum tube used as display screens in a computer or video display
terminals. This same kind of technology is found not only in desktop computer screens but also in TVs
and flight-information monitors in airports. A stream of bits defining the image is sent from the CPU
- 32 -
to the CRT’s electron gun, where the bits are converted to electrons. The inside of the front of the
CRT screen is coated with phosphor. When a beam of electrons from the electron gun (deflected
through a yoke) hits the phosphor, it lights up selected pixels to generate an image on the screen.
Arrangement of transistors
Flat panel displays are either active-matrix or passive-matrix displays according to where transistors
are located.
In an active-matrix display, each pixel on the screen is controlled by its own transistor. Active-
matrix displays are much brighter and sharper than passive-matrix displays but are more
- 33 -
complicated and thus more expensive. An example of active-matrix display is thin film
transistor (TFT) display.
In a passive-matrix display, a transistor controls a whole row or column of pixels. Passive
matrix provides a sharp image for one-color (monochrome) screens but is more subdued for
color. Passive-matrix displays are less expensive and use less power.
Multimedia projector
This device is used to create and deliver dynamic multimedia presentations (presentations in which
sound, photos, video, text and other moving graphics may be combined to interesting effect). There
are two types of multimedia projectors: LCD projector and LCD panel.
The LCD projector has its own built-in lenses and light source and connects directly to computer,
television, video/DVD player and video camcorder. Images from these devices are projected through
the LCD projector onto a screen or wall. Versions of the LCD projector now come with a digital video
camera on an arm extension attached to it. This video camera allows real-time videos and pictures to
be instantly projected through the LCD projector onto a screen. For example, the camera can be
directed at a page in a book or at someone performing a demonstration; the video camera image is
projected through the LCD projector onto a screen or wall.
The LCD panel is used with a normal overhead projector (OHP). This panel is the size of a notebook
and is placed directly on the surface of the OHP. Like the LCD projector, the panel can be connected
to devices such as computer, television, video/DVD player and video camcorder. The image displayed
on the panel is projected onto a screen when the light of the OHP shines through it.
Speakers
A simple speaker will make a range of sounds available to the computer user. Computer-generated
sound, music output, computer-synthesised voice and the normal speaking voice are now conventional
output using a speaker. Sound cards need to be installed in microcomputers to obtain good sound
quality for music or games.
Speech Synthesizers
This system converts written text into computer generated speech (‘text to speech’). It is used for
computer-aided conversations by hearing and speech-impaired persons to aid speaking, sight-impaired
persons to aid reading, or for converting conversations/text from one language into another.
- 34 -
Printers
A printer is a hardcopy output device which produces a text and/or graphics of documents stored in
electronic form, usually on physical print media such as paper or transparencies. Printers can be
categorized into two ways namely:
(i) according to whether or not the image produced is formed by physical contact of the print
mechanism with the paper (printing technology)
(ii) according to the number of characters printed at ago (basic unit of printing)
There are therefore many different kinds of printers, which vary in their speed and print quality,
depending on the desired print output.
Character printers
These are printers that print one character at a time much like a typewriter. They are also known as
serial printers. Daisy wheel printers and dot matrix printers are examples of character printers.
Character printers are slower than line and page printers.
Line printers
These are high-speed printers capable of printing an entire line at one time. A fast line printer can print
as many as 3,000 lines per minute. The disadvantages of line printers are that they cannot print
graphics, the print quality is low, and they are very noisy. They are used with mainframe computers
where high speed is vital for the large volume of printed output required.
Examples of line printers include drum printers, band printers and chain printers.
Page printers
These printers print a whole page at a time. They are therefore even faster and deal with very large
volumes of printed output. A laser Printer is an example of page printers.
This printer is not used much any more: it is becoming obsolete, as laser printers are able to produce
the same quality print as the daisy wheel printers and are much more versatile.
A Chain printer is an impact printer that carries the type slugs by links of a revolving chain. Chain
printers placed the type on moving bars (a horizontally-moving chain). As with the drum printer, as
the correct character passes by each column, a hammer is fired from behind the paper. Compared to
drum printers, chain printers have the advantage that the type chain could usually be changed by the
operator. By selecting chains that had a smaller character set (for example, just numbers and a few
punctuation marks), the printer can print much faster than if the chain contained the entire upper- and
lower-case alphabet, numbers, and all special symbols.
One other type of printer worth mentioning is the Braille printer. This is an impact printer which
converts text into the Braille code, producing patterns of raised dots on paper for use by the blind.
Non-impact printers
Non-impact printers form characters and images without making direct physical contact between the
paper and printing mechanism. These printers are faster and quieter than impact printers because they
have fewer moving parts. The main types of non-impact printer are:
– Thermal printer
– Laser printer
– Ink-jet printer
Plotters
Plotters are special output devices used to produce hard copies of large graphs and designs on paper.
Plotters are often used for the production of construction maps, engineering drawings, architectural
plans and business charts.
Plotters are slow, but can draw continuous lines often in a variety of colours.
- 37 -
They are useful for producing architectural drawings, building plans, maps and CAD
(computer aided design) drawings, where precision is required.
The paper is sometimes laid on a flat bed (flat-bed plotter) or on a rotating drum (drum plotter).
There are four main types of plotters: drum (pen plotters), flat-bed plotters, inkjet plotters and
electrostatic plotters.
Drum Plotter
A drum plotter is pen plotter that wraps the paper around a drum with a pin feed attachment. The drum
then rotates the paper as pens move across it and draw the image. It was the first output device used to
print graphics and large engineering drawings. There are two types of drum plotters, external and
internal. With an external drum plotter, the paper is wrapped around its external surface, while the
internal drum plotter uses a sheet of paper wrapped around its internal surface.
Flat-Bed Plotter
A flat-bed plotter is a mechanical drafting device used with many CAD programs for designers. The
paper remains stationary on a flat surface while a pen moves across it horizontally and vertically. This
plotter may use several different colours of pens to create the graphics. The size of the graphic is
limited to the size of the flat-bed plotter's surface.
Inkjet Plotter
The inkjet plotter is a plotter that creates an image by spraying small droplets of ink onto a piece of
paper. A popular choice for advertising agencies and graphic designers, inkjet plotters are used
generally for large outputs, such as banners and billboards and large signs often seen on roadsides.
They are available in thermal or piezoelectric models. Thermal inkjet plotters use heat to apply
droplets of ink, while piezoelectric plotters use charged crystals to apply the ink. Inkjet plotters tend to
produce better quality graphics than other types of plotters.
Electrostatic plotter
This is a plotter that uses an electrostatic method of printing. Electrostatic plotters apply colour using
coloured toner particles suspended in a liquid carrier. Charges are applied to the paper and passed
through liquid toner, where charged toner particle adhere to the paper. As the paper is removed from
the bath, the toner emerges dry.
- 38 -
Secondary storage, also called auxiliary or backup storage, is used to store data and program
instructions when they are not in use. The most commonly used secondary storage devices are
magnetic storage (magnetic tapes and magnetic disks), optical storage (CD-ROM, CD-R, CD-RW,
DVD-ROM, DVD-R and DVD-RW) and solid state memory (flash memory and USB drives).
Magnetic Tapes
Magnetic tape is a ribbon of plastic material coated with a metal oxide film on which data is recorded
as magnetized or unmagnetized spots. The magnetic orientations of the magnetized and unmagnetized
spots represent the binary digits 0 and 1. On mainframe computers the tape is stored on reels or
cartridges. In microcomputers tapes are stored in cartridges similar to those used to store music, but of
a much higher quality. Just like the tape in a tape recorder, data can be written to, or read from, the
tape as it passes the magnetic heads.
Magnetic tape is not suitable for data files that are revised or updated often because it stores data
sequentially. This means that data is retrieved in the order in which it was stored. Therefore accessing
data is very slow as you cannot go directly to an item of data on the tape. It is necessary to start at the
beginning of the tape and search for the data as the tape goes past the heads.
However, magnetic tapes are erasable, reusable and moderately durable, and are made to store large
quantities of data inexpensively. For these reasons they are mainly used for emergency backup
purposes.
Magnetic Disks
Magnetic disks are one of the most widely used secondary storage media for computers. All magnetic
disks provide direct access to data stored. This means that you can go directly to a specific piece of
data without having to access any other data either before or after the data you want. The capacity and
access speeds of magnetic disks vary with each device or medium. Magnetic disks include floppy
disks (diskettes) and hard disks.
To use a diskette, you need a disk drive. A disk drive (floppy drives) is a device that holds, spins and
reads data from and writes data to a diskette. Read means that the data stored on the secondary
storage is copied to the primary storage. Write means that the information held in the main memory is
transferred to a secondary storage device.
Floppy disks are useful for transferring data between computers and for keeping a backup of small
files.
- 40 -
Hard disks
Hard disks are thin but rigid metal platters covered with a substance that allows data to be held in the
form of magnetized spots. Hard disks are tightly sealed within an enclosed hard-disk drive unit to
prevent any foreign matter from getting inside. Data may be recorded on both sides of the disk
platters.
The disks constantly rotate at a high speed and may have one read/write head per disk (moveable
head).
The access time (time to get data) from a spinning disk with one read/write head is a combination of:
Seek time – how long it takes the head to get to the right track;
Rotational delay or latency time – how long it takes for the data to rotate under the head; and
Transmission time – the time taken to read the data and transmit it to the CPU.
Like floppy disks, a hard disk must also be formatted before any data can be stored on it. Formatting
sets up the tracks, sectors and cylinders. A cylinder is made up of all the tracks with the same number
from all the metal disks that make up the hard disk, which can be read or written to at the same time.
For example, if you start from the bottom of a stack of disks, track 5 of the second disk will be directly
above track 5 of the first disk. Track 5 of the third disk will be directly above track 5 of the first and
second disks and so on. If you put these all together on top of each other, you’d have something that
looks like a tin can with no top or bottom – a cylinder.
The computer keeps track of what it has put where on a disk by recording the addresses of all the
sectors used – a combination of the cylinder, track and sector numbers. Data is written down the disks
on the same cylinder. This works quickly because each metal platter has a read/write head for each
side and they all move together. So for one position of the read/write heads, the computer can put
some data on all the platters.
Cross-section of a hard disk arranged and divided into tracks, sectors and cylinders
Virtual Memory
Sometimes the computer uses hard-disk space called virtual memory to expand RAM. When RAM
space is limited, the use of virtual memory can let users run more software at once, if the computer’s
CPU and operating system are equipped to use it. The system does this by using some free hard-disk
space as an extension of RAM – that is the computer swaps parts of the program and/or data between
the hard disk and RAM as needed.
house another hard drive. It may come with its own power source and is connected to the system
unit via a special cable. External hard drives can be easily removed and connected to another
computer, thereby giving them a certain amount of portability and flexibility of use.
Removable hard disks or cartridge systems
Hard disk cartridges or removable hard disks consist of one or two platters enclosed along with
read/write heads in a hard plastic case. The case is inserted into an internal or detached external
cartridge drive connected to a microcomputer. These cartridges are often used to transport huge
files. They are also used for backing up files. Although they are relatively expensive, they hold
much more information and are much faster than diskettes and tapes. Examples include zip drives
and jaz drives.
Zip drive
These are a floppy-like technology that use design concepts from hard disks and Iomega's earlier
Bernoulli disks developed by Iomega Corporation. Zip disks are slightly larger than conventional
floppy disks, and about twice as thick. They can hold 100 or 250 MB of data. Because they're
relatively inexpensive and durable, they have become a popular media for backing up hard disks and
for transporting large files.
Jaz Drive
This is a removable hard disk drive developed by Iomega Corporation. The removable cartridges hold
up to 2 GB of data. The fast data rates and large storage capacity make it a viable alternative for
backup storage as well as everyday use.
Fixed disk drives: These are similar to those found in PCs. They have a high storage capacity and
are more reliable than removable hard disks. A mainframe computer may have between 20 and
100 fixed disks housed in a single cabinet. Data is transmitted to the CPU using a single data path.
RAID storage system: RAID stands for Redundant Array of Independent Disk. A RAID storage
system consists of a cabinet which may contain a large number of disk drives (up to 100). Besides
holding more data than a fixed disk, it stores multiple copies of data on different drives. If one
drive fails, others can take over allowing the data to be recovered. Data is transmitted to the CPU
using multiple data paths.
For larger computer systems hard disks consist mainly of removable hard disk packs, fixed disk
drives and RAID (Redundant Array of Independent (or Inexpensive) Disks) storage systems.
Usually pronounced scuzzy, SCSI hard disks are generally used in servers and high-end workstations,
where they provide two major advantages: improved performance relative to IDE and SATA in
multitasking, multi-user environments and the ability to daisy-chain many drives on one computer.
Optical disks
An optical disk is a removable disk on which data is written and read through the user of laser beams.
The disk is made mainly of a type of plastic (polycarbonate). In optic technology, a high-power laser
beam is used to represent data by burning tiny pits (holes) onto the surface of a plastic disk. The data
is stored on a layer inside the plastic. To read the data, a low-power laser light scans the disk surfaces;
pitted areas are not reflected and are interpreted as 0 bit; the areas that do not have pits (land) are
interpreted as 1 bit. Thus in optical devices the presence of light is interpreted as ‘1’ and the absence
of light is interpreted as ‘0’. Because the pits are so tiny, a great deal more data can be represented
than is possible with the same amount of space on a diskette.
The optical disk technology used with computers consists of four types:
CD-ROM (Compact Disk - Read Only Memory) disks
CD-R (Compact Disk – Recordable) disks
CD-RW (Compact Disk – Rewritable) disks
DVDs (Digital Versatile Disks)
CD-ROM Disks
This is an optical disk format that is used to hold pre-recorded text, graphics and sound. Read only
means that the disk’s content is recorded at the time of manufacture and cannot be written on or erased
by the user.
The speed at which the data is accessed depends on how fast the disk spins. The faster the disk spins,
the faster the data can be transferred to the computer’s memory. The speed of a CD-ROM drive is
indicated by a number followed by an ‘X’. Typical CD-ROM drive speeds are 48X, 50X, etc. The
higher the number the faster the disk spins, resulting in faster data access.
Because of their large storage capacity (up to 750 MB), CD-ROMs are used to store software
packages for sale or distribution. They are particularly useful for storing multimedia (text, graphics,
sound and videos) and application software packages such as encyclopaedias, reference works, word
processors, training programs, games and graphics packages.
CD-R
This is a CD format that allows users to use a CD-Recorder to write data (only once) onto a specially
manufactured disk that can then be read by any compatible CD-ROM drive. It is ideal for storing large
volumes of data that does not need to change. A typical use is to create music CDs. The storage
- 43 -
capacity of CD-R, like all CDs, is between 750 and 800 MB.
CD-RW
This is a CD format that allows users to record and erase data so that the disk can be used over and
over again. The data layer of these disks uses a phase-changing metal alloy film. By using a higher
intensity laser light the film can be melted to level out the marks made by the laser burner when the
data was stored, effectively erasing previously stored data. New data can then be recorded using a
lower intensity laser light to burn the new data. In theory you can erase and write on these disks as
many as 1000 times. It therefore makes it an ideal backup storage device for storing large volumes of
data that change frequently.
DVD disks
This is an optical disk format that represents a new generation of high-density CD-ROM disks, which
are read by laser and which have both write-once and rewritable capabilities. The main types are
DVD-ROM (read only), DVD-R (recordable) and DVD-RW (rewritable). They look similar to a CD-
R disk but are capable of holding much more information. This is possible because:
The tracks on a DVD are placed closer together as compared to a CD, thus allowing more tracks.
The pits on a DVD are much smaller and closer together than those on a CD allowing far more
information to be represented there.
The technology uses a new generation of lasers that allows a laser beam to focus on pits roughly
half the size of those on CDs.
DVD formats allow for two layers (dual layer) of data-defining pits
Some DVDs are double-sided. This allows data to be stored on both sides and therefore
dramatically increases the disk’s capacity.
Data is squeezed into fewer pits through data compression.
Single-sided single-layer DVD has a capacity of 4.7 GB, single sided dual layer has a capacity of 8.5
GB. Double sided single layer has a capacity of 9.4 GB and double sided dual layer has a capacity of
17 GB.
The following are some guidelines for the proper handling of CDs and DVDs.
1 CDs and DVDs should be stored in their cases when not in use to prevent them from being
scratched or getting dirty.
2 Avoid soiling the surface of a CD – hold it by the edge or centre hole.
3 Keep your CDs clean by gently wiping both sides with a clean damp cloth from the centre to the
outer edge, not by wiping around the disk. Wiping in a circle can create a curved scratch, which
can confuse the laser. For stubborn dirt, use isopropyl alcohol or methanol, or CD/DVD cleaning
detergent.
4 Do not write on the top side of the CD with a ballpoint pen or other hard object as this can damage
the data layer on the other side. Use a CD marker instead.
5 Don’t write on the top side with a fine-point marker or with any solvent-based marker. (Solvent
may dissolve the protective layer.)
6 Do not expose a CD to high temperature or humidity for an extended period of time, as the CD
may warp.
- 44 -
Flash memory
Flash memory technology is based on EEPROM (Electrically Erasable Programmable Read Only
Memory) technology. Like EEPROM, flash memory is non-volatile. However, reading from and
writing to flash memory is a lot faster than with EEPROM. This is because data in flash memory can
be erased a block at a time instead of only a single byte at a time as is the case with EEPROM. Flash
memory got its name because a block of memory cells is erased in a single action or ‘flash’.
The compact nature of flash memory enables it to be incorporated into very small solid state (no
moving parts) devices that are available in all shapes and forms. These devices are rapidly becoming
an integral part of modern living. Flash memory is particularly well known today because of the
popular flash memory cards used in digital still cameras.
USB drive
This new type of flash memory storage device does not yet have a generally accepted name. Each
company calls it something different, including flash drive, flash pen, thumb drive, key drive and
mini-USB drive. They often double as MP3 players, i.e. you can download music to them from your
PC, plug in some headphones and listen to your favourite songs. All are small, about the size of your
thumb or a large car key, and plug into a USB port on the computer. No additional software is needed
for Windows XP, 2000 or ME. Plug it in and the computer notices that a new hard drive has been
added, and will show it on your desktop. These small flash drives can have storage capacities from 8
MB to 1 GB or more! Some flash drives include a password protection facility and the ability to run
software directly off the USB drive.
- 45 -
SYSTEM SOFTWARE
These are software that performs a variety of fundamental operations that avails computer resources
to the user. These functions include.
o Booting the computer and making sure that all the hardware elements are working properly.
o Performing operations such as retrieving, loading, executing and storing application programs.
o Storing and retrieving files.
o Performing a variety of system utility functions.
System software can be further be divided into four sub –categories namely.
i. Operating system.
ii. Firmware.
iii. Utility software.
iv. Networking software.
Operating system
It is the main program that controls the execution of user application and enables the user access
hardware and software resources of the computer. It manages input , output and storage operations in a
computer examples are Micro Soft windows (95,98,2000 Xp, Vista ,7,8),UNIX,LINUX and
Macintosh(Mac OS).
Firm ware
Firmware also referred to as Store Logic is a combination of both software and hardware recorded
permanently on electronic chips. Usually a firmware is a read-only memory chip that is mounted or
plugged into the mother board, firmware may hold an operating system, utility programs, languages
processors etc.
Utility software.
Utility software is a special program that performs commonly used services that make certain aspects
of computing go on smoothly . Such services include sorting, copying , file handling, disk
management etc
The two basic types of utility software are:
i. System level utility : these helps the user to work with the operating system with its functions.
Eg a utility software tells the user when he/she enters a wrong command and gives suggestions
how an error can be corrected.
ii. Application level utility: These make application programs run more smoothly and efficiently.
Such utility programs are commonly purchased separately or maybe part of an operating
system.
- 46 -
iii. Others program translators, setting editor, text editor, sort editor, calculator, time, back up
utility, anti virus, diagnostic utility calendar utility.
Networking software
Its used to establish communication between two or more computers by linking them with using
communication channel like cables to create a comp(uter network. It enables exchange of data in a
net work as well as providing data security. Network software may come as independent or
integrated in an operating system.examples are Windows server 2003, novel netware, linux
APPLICATION SOFTWARE.
These are programs that are designed to help the user accomplish a specific task
Examples of application software and their uses.
Open source or non proprietary software-these refers to software whose source code (programmed
set of instructions) is freely made available to users. The users are encouraged to use modify and
distribute the modified product. Most distribution of Linux operating system and open office are open
source software which are made available to users under General Public License.(GPL).
Proprietary software on the other hand are those software whose source code is hidden from users.
Modification are only made by the software manufacturer. They are usually licensed to users at a fee
or applied freely. Micro soft Windows Operating systems and office are examples of proprietary
software.
Freeware are software products that are freely made available to the user. However, beware of
freeware because some may be Malicious software example of free ware is Grisoft anti virus software
Known as AVG.
1. Scope of the cover for example ,six months, one year etc.
2. Callout response and liability agreement. Eg how long should the supplier take to repair a fault
or replace the product and if he/she delays who bears the cost.
3. Preventive maintainance for example regularity of service at intervals etc.
Cost
The cost of computer depends on :
i. Its processing capability.
ii. Whether it is branded or a clone. Branded computers are more expensive than their equivalent
clone.
iii. Its size . portable computers are more expensivethan their desktop equivalents because of the
superior technology involved to manufacture small components without losing performance
abilities.
Its important to do a market survey from magazines,newspapers and electronic media or visit a
number of vendors to compare prices before purchasing a computer. Computer information
exhibitions also enlighten a buyer on current trends and costs.
Upgradability and compatibility
The hardware bought must be compatible across platforms and easily upgradable for example some
older computers cannot support large hard disks and high speed bus devices ( USB and firewire)
available in the market today.
Portability
Portable computers such as laptops PDAs are ideal for people who do not take most of their time in
office.
Special user needs
When selecting computer hardware, consider the unique user needs , for example , if a user is
physically challenged , consider buying voice input devices.
Monitor
Depending on preference , choice of a monitor may depend on size, resolution and the technology
used on it. Currently, flat panel displays are gradually replacing CRTs.
Multimedia capability.
Multimedia capability refers to the ability for a computer to process and output text, sound, video and
pictures. A multimedia system consists of speakers, CD/DVD drive , sound card and a SVGA monitor.
Other considerations
Other considerations include available ports, wireless connectivity and the system unit form factor
whether tower type or desktop.
Software considerations
Although one may have agood computer with the best hardware, the actual determinant of a computer
value to the user is the software in it. The following factors should be considered when selecting
software:
Authenticity
The term authenticity refers to genuineness, validity and legitimacy of an item. When you acquire
software from the vendors , make sure it is original copy that is accompanied by the developers license
and certificate of authenticity. This is because some people illegally produce pirated copies which is
an offence.
Documentation.
It refers to the manuals prepared by the developer having details on how to install, use and maintain
the software. These include installation guide, maintenance guide, and user guide. This documentation
enables the user to work with the software with minimum guidance.
User needs
User needs dictate the type of operating system and application programs that, should be considered
acquisition ,For example, if the user needs to type documents most often he or she would go for a
word processor.
- 49 -
People with special disability would require software that recognizes other forms of input like voice
and natural sound. A good rxample is a software used in mobile phones to store voice and allow the
user to make a call by just calling a name instead of keying in the number.
Reliability and security
Data security is paramount. A good software especially the operating system should have security
mechanisms that protect data and information from illegal access.
User friendliness
One of the most important features normally considered when using the computer program is it user
friendliness. This is a measure how easily the user can be able to operate the computer. Some
programmes are more user friendly than others. A lot of research and efforts has been dedicated in
trying to come up with more user friendly software. The ease to use a program will most likely
influence whether the user will prefer it or not.
Cost
Software tend to be more expensive than hardware. The cost of acquiring software product must be
carefully considered before acquiring them against benefits that it is likely to bring. It is not also
advisable to always go for a freeware because some of them may be malicious programs.
Compatibility and system configuration
A software product should be compatible with the existing hardware , operating system or application
programs and should be readily upgradable.
Portability
Portability in this aspect refers to whether a program can be copied or installed in more than one
computer. Although most software in market today are portable, some developers produce software
which can be installed on one machine only. This means that if one has twenty computers , one should
buy a license for each.
EIDE and SATA are commonly used on most Personal Computers while SCSI is used in Servers. SATA is
meant to replace of older Parallel ATA (PATA) and EIDE because is more efficient and supports Hot
Swapping. Hot Swapping means that a drive can be removes or inserted while the computer is still on.
Each EIDE Controller supports up to two drives on a single ribbon cable. This type of a set up is called
master/slave configuration because one controller directs the activities of both drives. To mount an
EIDE Drive proceed as follows.
1. Wear anti static wrist member to discharge any static charge on the body.
2. Determine which drive will be the master and use the drive label information to determine which
jumper settings to use foe a master or a slave.
3. Check that a free drive bay is available, slide the disk into that bay and screw it into place.
4. Ensure that there is agree power connector fr4om the power supply unit and connect it to the drive.
Notice that it is designed to fit in its socket in only one direction.
5. Identify pin 1 as labeled on the drives socket and match it with the red or brown continuous line of the
ribbon cable. Most cables will only fit in one direction.
6. Connect the interface cable to the drive, then into the controllers slot on the motherboard.
7. If installation is complete replace the casing cover.
Floppy drives are installed the same way as the EIDE drives, only that there is no master/slave
configuration. However you can attach two floppy drives on the same ribbon cable. One floppy drives
will be automatically be assigned letter A, while the other will be drive B.
CONNECTING EXTERNAL DEVICES.
To connect a device to the system unit, you need to identify its port and interface cable.
1. Gently and carefully connect the interface cable of each device to the correct port and to the device if it
is not already fixed permanently.
2. Connect the computer to the power source and switch on.
3. Observe boot up information on the screen to see whether Power On self-Test (POST) Display any error
Message.
4. A successful boot means that the computer was properly set up.
NB: If the computer is completely new, programs have to be copied (installed) on the hard disk.
- 53 -
OPERATING SYSTEM
CHAPTER OUTLINE
o Definition of operating system.
o Functions of operating system.
o Organization of information using an operating system.
o File management using an operating system.
o Disk management using an operating system.
o Devices under operating system control
o Installation and configuration of an operating system.
3.1 Introduction
Operating system is the main program that controls the execution of user application and enables the
user to access hardware and software resources of a computer.
User applications does not communicate directly with hardware devices instead they send messages
through the operating system which give instructions to the hardware to perform a particular task.
Role of an operating system
An operating system acts as the interface between the user applications and the computer hardware as
illustrated below.
User
(runs application programs)
Application programs
(send users requeste to OS)
a situation where a particular job holds a requested resource and fails to release it , yet it is requesting
for a resource held by other job.
iv. Input/ output management.
The operating system uses special software called device drivers to manage and communicate with
input and output devices such as keyboard, mouse, monitors, sound input and output devices , printers
and scanners. for example when printing the CPU directs its attention to printing function the
operating system searches for the printer, chooses the correct one , translates the name for the CPU
and finally the CPU sends the document to the printer. This makes the CPU available for other
activities.
v. Memory management.
Data and instructions entered into a computer are temporally held in main memory (RAM) before and
after processing
The operating system divides the main memory(RAM) into partitions . if the partitions are of fixed
size, they are called pages and the operating system knows exactly on which page a process or data is
currently held .
At any one time , not all pages may be held in the main memory (RAM) since it is a scarce resource
therefore those which are not needed immediately are held in Virtual memory. Virtual memory is an
image created on secondary storage device like the hard disk in order to allow programs that are too
large to fit in RAM to be executed. To manage memory the operating system swaps pages between
main memory and secondary storage.
The graphical user interface(GUI), is the latest effort to make the user interface more user
friendly. Beside menus ,GUI make use of rectangular work areas called windows, graphical
objects called icons and most commands are executed using a pointing device. These feature
are given acronym WIMP which stands for windows, icons, menus and pointing devices. Some
examples of GUI operating systems include; Microsoft windows versions 2000,XP and Vista;
Apple Mac OS and various distributions of Linux.
Figure below shows how an operating system organizes information on a hard disk
- 57 -
Files
A file is a collection of related data given a unique name for ease of access, manipulation and
storage on a backing storage. Every file has the following details:
1. A unique name and an optional extension. The name and extension s are separated by a period [.]
e.g. JUNE. DOC. In this case the file name JUNE and the extension is DOC. Extensions are used to
identify the file type, for example:
Doc is a word processor file
Txt is a plain text
Sys is a system file.
2. The size, data and time the file was created or modified.
Types of files
There are three types of files namely system, application and data files. System files contain
information that is critical for the operation of the computer. Application files hold programs that
are executable. Data files contain user specific data.
Table showing different types of files.
EXTENSION FILE TYPE DESCRIPTIONS
.txt Data A plain text file created using note pad or DOS
editor.
Folders
A folder is a named storage location where related files can be stored. All folders or directions
originate from a special directory called the root directory or folder. The root directory is
represented by a back slash [\]. A folder may be subdivided into smaller units called subfolders or
sub directories.
- 58 -
Drives
The operating system views storage media or devices as drives. The user can access either a physical
or logical drive to store their data. Drives may be given labels such as letters A-Z to identify them.
Here is a summary of how Microsoft operating systems identify drives.
Storage location Drive Remarks
Floppy drive A and B If a computer has two floppy drives, one will be
assigned letter A and the other one B.
Hard disk C, D, E, F If a computer has 4 hard drives they will be assigned
letter C- F.
Optical drives D, E, F, G If a computer has one hard disk and three or more
CD\ DVD drives , they will take up any number
between D and Z
Other removable D, E…, Z If a computer does not have an optical drive, any
removable drive attached to the computer can take
up any letter between A and Z
Network drive Logical drives D and Z In a network environment, network drives can take
up any letter D to Z depending on the number of
physical drives installed or attached.
3.6 Getting started with Microsoft windows.
Although there are different versions of Microsoft Windows , Most of them have almost similar features,
apart from a few variations and enhancements. With knowledge in one you can easily learn how to use
another.
Background
Background is the work space area on the monitor on which icons and running tasks are placed.
Windows lets the user to customize the desktop background by applying favorite themes and
wallpapers as we shall see later.
Icons
Icons are mostly manipulated using a pointing device e.g. the mouse. Some of the common icons on
the desktop are my computer, recycle bin, internet explorer and my documents
Task bar
The task bar enables the user to easily switch between different programs and tasks that are currently
running. Whenever the user starts a program or opens a file, its button appears on the task bar and
stays there until the user exits the program.
The taskbar has at least three main parts:
Start button: The left most button on the task bar that the user clicks to display the start menu.
- 59 -
Task manager: This is the band where the buttons of currently running tasks are displayed. You can
switch between various tasks by clicking their respective buttons on the task manager
System tray: This is at the right part of the task bar. It has icons of tasks running in the background but
are not displayed on the screen. Examples are, the time and calendar, an antivirus program, volume
control, etc. To display such a task, simply double click its icon
Programs menu
Programs or all programs menu displays a list of programs installed in the computer. The menu has a
small solid arrow. When you point the arrow, a sub menu called sidekick menu is displayed.
My recent documents
My recent documents list the last fifteen recently accessed files. You can open any of the listed files
from a storage device by clicking its name provided that the device is accessible.
Control panel
The control panel is the computer maintenance and configuration toolbox. It provides tools used to
maintain and make changes to the computer set up. It is important not to tamper with this menu
because you may interfere with the computer functionality.
Find/ search
Search in XP helps the user to search for a file or folder in case the user forgets its name or its
location.
Run
It enables the user to:
1. Install programs on the hard disk.
2. Open files and folders from a storage location
3. Run programs from the removable media without necessarily installing it on the hard disk
Log off
To log off is to terminate the current user session. To go back or switch to a new user, the user must
log in. Loging in is a security measure that restricts unauthorized users from accessing computer
resources. To log in the user must enter the correct name and password or in some cases use other
methods such as finger print authentication. It prompts for a user name and password for one to gain
access.
Turn off
This menu lets the user shut down, restart, make computer go tp standby or Hibernation. Hibernation
saves everything in memory on disk and turns off the computer. Standby on the other hand makes the
computer consume less power in idle mode but remain available for immediate use.
To manage files or folders you can either use my computer icon from desk top or windows explorer
from the start menu. Each on its own way lets you see how storage devices or locations , files and
folders are arranged.
Windows explorer
It lets the user display the drives and folders in hierarchy or tree structure. The computer tree is an
upside down structure with the highest level in this case the desktop being the root. The explorer
divides the window into two panes . The left pane displays a tree of drives and folders while the right
pane displays a list of files and sub folders contained in a particular open drive or folder.
To display the explorer using the start menu:
1. Click start point to programs then accessories.
2. Click windows Explorer. An explore window is displayed. As shown below.
To display the explorer using My Computer icon.
1. Right click on My Computer.
2. Click explore.
Double clicking on My computer Icon gives you a graphical view of what is in the computer
this includes the drives, the control panel and other resources.
Creating a folder.
It is advisable that all related files be kept together in one folder. To create a new folder proceed as
follows:
1. Using my computer icon ,display the explorer window.
2. On the folder tree on the left pane ,select location in which you want to create a new folder
3. On the file menu point to new then click folders as shown below with a temporary name new
folder appears in the explore window.
4. Type a new name for the folder to replace the temporary name then press enter key or click the
icon once.
NB In windows ,file names can contain up to 255 characters, including spaces but, with no
special symbols such as \,/: * < > I .
Work area
Status bar
Title bar : This is a bar across the top of the window that displays the name of the current
application program or task.
On the right of the title bar are three tiny buttons namely
Minimize button: it reduces a window by pressing the button which is then placed on the task bar.
The restore/maximize button: It stretches the window to cover the entire desktop or restore it to its
original size.
The close button: is used to exit an application.
Menu bar : it provide a list of commands that can be used to manipulate a task.
Tool bar : These are buttons arranged in a row that are shortcuts to menu commands.
Work area :this is the area where you ca create you document.
Status bar : This is an interactive strip at the bottom of the application window that acts as a
communication link between the user and the operating system. Such interactive activities include
saving, opening a file, printing, cursor position etc.
Scroll bars : Provides a way to pan your window up and down or left and right to show information
that doesn’t fit in the window.
Insertion point/ text cursor: Marks the place where text and graphics will appear when typing drawing
is started.
The following are some boot and run time errors and suggested solution;
Invalid system disk
Invalid system disk error may occur if the drive configured as the active partition no longer
contains essential system files required to load the operating system. Make sure that the active
partition is selected as start up drive or re-install the operating system.
- 63 -
Processor :It is the operating system which determines which task ( process) will be executed first.
Memory :The operating system determines which task(process) remains in the memory and which
one will be temporarily suspended to the virtual memory.
Input/output devices and ports: the operating system allocates requests from application to
input/output devices. It also ensures smooth data transfer between the various input/output devices.
Secondary storage devices: The operating system manages the storage and retrieval of data from
backing storage.
Communication devices: The operating system manages various communication devices and
provides an environment within which communication protocols operate. Protocol refer to the rules
that govern communication between devices.