Basic Computing Simplified --- Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 1 Basic Computing Simplified INTRODUCTION TO THE COMPUTER Definition: 1. A computer is an automatic electronic device that inputs data, processes, stores it and output meaningful information. 2. A computer is an automatic electronic device that helps in data processing tasks. Data refers to a collection of raw facts or unprocessed information while Information refers to data that has been processed into a meaningful form. A computer follows a basic logical structure and performs the following basic operations for converting raw input data into useful information. a. Input. The process of entering data and instructions into the computer system b. Processing Data. Performing arithmetic, and logical operations on data in order to convert them into useful information. c. Store Data. Saving data and instructions so that they are available for processing as and when required. d. Output Information. The process of producing useful information or results for the user, such as a printed report or visual display. e. Control of the workflow. Directing the manner and sequence in which all of the above operations are performed. Modern computers are electronic and digital. The actual device (wires, transistors and circuits among others) is called the Hardware meanwhile the instructions/programs and data are called Software. The term hardware refers to the physical (tangible) components that you see. E.g. CPU (Central Processing Unit), Monitor, Keyboard, Mouse, Printer, etc. Software, on the other hand refers to sets of instructions/programs used in the running of the computer hardware. E.g. Microsoft Windows 95, 2000, XP, Microsoft Excel, Publisher, PowerPoint, etc. Input Data is entered via keyboard, mouse, microphone, etc Processing Storage The information is digitized, The information is becoming a simple code that the computer can store stored as a part of the computer’s memory Output Information is shared via monitor, printer, speakers or projector Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 2 Basic Computing Simplified EVOLUTION AND GENERATIONS OF COMPUTERS When we analyze critically, the evolution and generations of computers include: The origin – when and how they started. Personnel involved. I.e. the brains behind the inventions and changes up to date. Changes in physical size, costs, programs, accessories, programming languages and procedures. Emission of heat. User friendliness. The invention of the abacus (Origin of calculation) The abacus was a series of beads lined up in a tiny strong rope which was able to make people calculate with little difficulty in their transactions. This was introduced in the Middle East (China) in 500 BC. It remained the fastest form of calculation until in the middle of the 17th Century. Each bead on the abacus below the middle bar stands for one unit and each bead above the middle bar stands for 5 units. Napier’s bones Napier’s bones was developed by John Napier, a Scottish mathematician in the 17th century. It helped in multiplication and division. Pascal’s Arithmetic engine. In 1642, a French scientist and philosopher named Blaise Pascal (1623-1666) invented the first mechanical calculator. The machine comprised a system of gears and wheels that could add and subtract decimal numbers. He named it Pasculine. Leibniz wheel In 1671, a German mathematician and philosopher Gottfried Wilhelm Leibniz (1646-1716) came up with a similar but more advanced machine. He made an improvement on Pascal’s machine. Instead of using wheels, it had a “stepped drum” (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical era for 300 years. He is also remembered for inventing the binary code. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 3 Basic Computing Simplified Jacquard’s Loom In 1801, Joseph Marie Jacquard invented a weaving loom with an automatic card reader, which allowed it to use punched cards to program patterns of colors in woven fabric. Charles Babbage’s Analytical difference engine. Charles Babbage (1791-1871), regarded as the father of computing, developed an analytical engine in 1832 that could feed in numbers and store them while complex calculations were taking place. The output was on printed media. Before he could finish up the analytical engine, he again came up with another design (the difference engine) that would use stored information. While searching for other means to support his project, Babbage met ADA AUGUSTA, Lady Lovelace. She was a very enthusiastic mathematician. She became the first computer programmer, writing out the sequence of instructions for the analytical engine. Babbage never finished any of his engines and Ada died quite young. Hollerith’s tabulator. Dr. Herman Hollerith (1860-1929) built one of the world’s first practical calculating machines which was called the tabulator. His tabulator was used to compile the census data of the US. By 1880s, the population of the United States had grown so much that it became hard to come up with the statistics. The census took 7 ½ years to be analyzed. Dr. Hollerith then used his tabulator to tally the 1890 census in only six weeks and completed the full analysis in just 2 ½ years. The Information was stored on punched cards and paper tapes. He later left the census bureau and set up the Tabulating Machine Company in 1896 to manufacture it commercially. A few years later, it changed its name to the Computing Tabulating Recording (CTR) Company and then in 1924, the company was named IBM (International Business Machine) company Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 4 Basic Computing Simplified COMPUTER GENERATIONS Computer generations are the various stages through which computers have undergone. First Generation (1940 – 1956) In this generation, computers possessed the following characteristics: Use of vacuum tubes for internal operations. They were very expensive. They consumed a great amount of electricity. Use of punched cards for input and output was displayed on print outs. Use of magnetic drums for memory/storage. Very low processing speed compared to the next generations. Generated a lot of noise and heat during processing. Vacuum tubes produced a lot of light which is typical of heat. They were very big in terms of physical size. They had relatively very limited storage capacities measuring in terms of bytes and kilobytes. They had no operating systems They had very limited usage as a result of very high cost of implications involved. Examples of first generation computers include: The UNIVAC (Universal Automatic Computer, EDVAC (Electronic Discrete Valuable Arithmetic Computer) and ENIAC (Electronic Numerical Integrator and Calculator) Second Generation (1956 – 1964) The following features identify computers in this generation: Use of transistors for internal operation as opposed to vacuum tubes of the first generation. Use of magnetic tapes and disks for data backups. These were the first computers to store instructions in their memory. Emission of less heat and noise compared to the first generation. Increase in processing speeds and reliability Reduction in sizes and costs of computer hardware and software. Use of microcomputers Introduction of interpreter programs as an interface between the user and the computer system. Use of low level languages during programming. Mnemonic codes or abbreviations (assembly languages) were used. Use of punched cards for input and printouts for output. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 5 Basic Computing Simplified Third Generation (1965 – 1970) The most outstanding characteristics of third generation computers are: Introduction of Integrated Circuits (ICs) chips for internal operations Increased capacities of RAM, ROM and secondary storage devices. Reduction in the general physical size and cost of computers. Introduction of machine independent languages (High Level Languages, HLL) FORTRAN, BASIC, etc. for programming. Introduction of microcomputers and multitasking Introduction of computer networking Use of operating systems for better interface, booting and general system management. Improvement in processing speeds, reliability and memory capacity compared to the first generation. Fourth Generation (1971 to present) Computers in the 4th generation have the following characteristics: Introduction of Large Scale Integration (LSI), Very Large Scale Integration (VLSI) and Grand Scale Integration (GSI). E.g. Pentium I, II, III & IV. Development of super and mainframe computers. Development of expert systems. Operating systems became more user friendly. More use of computers in business and domestic works. Introduction of query languages, report generators and application generators. Software tools performed tasks and leaving the computer to determine what to be done. Programming was done in High Level Languages (HLL). E.g. Structured Query Language (SQL) Use of microprocessors. Development of Graphical User Interfaces (GUIs). `` Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 6 Basic Computing Simplified Fifth Generation (Present and beyond) This generation is assumed to be at its early stages. The fully developed fifth generation computers are expected to have the following characteristics: Use of Very Very High Level Languages (VVHLL) Introduction of Ultra Large Scale Integration technology Use of natural interfaces like cyber world. Computer tools becoming more user friendly. E.g. interactive applications, databases, spreadsheets, word processing, etc. Increased use of hybrid and neurologic systems. Computer use and programming are expected to be more and purely interactive (conversational) Use of parallel processing and superconductors to process multiple instructions to make artificial intelligence a reality. Use of voice recognition devices Other future generation of computers Two major innovations are in the experimental stage; DNA computers and Optical computers. With the DNA (Deoxyribonucleic Acid) computing, information can be written onto individual DNA molecules. They process data in parallel and potentially twice as fast as today’s fastest supercomputers. Optoelectronic computers use beams of light instead of electrons. They are expected to process information several times faster than the current computers. Revision Questions UCE 2009 3. Which of the following characteristics will be associated with future computers? A. Expensive computers B. Advanced robotics C. Big sized system units D. Inadequate storage systems 24. c) What electronic technology characterized each of the four generations of computers? i) First generation ii) Second generation iii) Third generation iv) Fourth generation UCE 2008 21. a) Describe the term evolution of computers b) Mention four characteristics of the first generation computers c) How do the second generation computers differ from fifth generation computers? List down four differences. 29. What are the possible characteristics of the future generation of computers? Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 7 Basic Computing Simplified UCE 2007 1. The scientific milestone of using Integrated Circuits (IC) was a characteristic of the A. First generation B. Second generation C.. Third generation D. Fourth generation 2. What major invention defined the second generation of computers? A. Magnetic cores B. Machine language C. Microprocessor D. Transistor 28. Reasonably predict the future in computing; from the perspective of the past to the present developments in the technology and use of computers. 1. 2. 3. 4. 5. 6. 7. CHARACTERISTICS OF COMPUTERS Speed. Computers are fast in processing data compared to the manual system. Their speed is measured in Millions of Instructions Per Second (MIPs). Diligence. Computers are capable of performing repetitive tasks over and over without making any error, getting tired or bored. Accuracy. Computers are perfect in performing tasks as compared to the manual system. They are capable of detecting mistakes and correcting them once made by users. Hence Garbage In Garbage Out (GIGO). This means when you input wrong data, you get wrong information and vice versa. Storage/Memory. Computers are capable of holding data for a long period of time without losing or forgetting it. Versatility. A computer is able to perform different tasks at the same time. Different programs can be installed into a computer to create different programs. E.g. playing music, computerized accounting, map drawing, typesetting documents, etc. Automation. Computers receive instructions and work on their own automatically. They do not need any supervision in order to perform programmed routines. Artificial intelligence (AI). Computers are very intelligent devices that can receive, respond and give appropriate response. This basically depends on the programs installed in them. Uses/Advantages/application of Computers 1. Business. A computer is used in business for purposes such as e-commerce and e-business transactions (buying and selling of goods, services, and works online). E.g. by distributing, buying, selling and marketing products and services online. 2. Banking. Computers help banking institutions and individual customers to easily get access to transfer and depositing of funds. ATM machines are making it even easier for customers to deal with banks. 3. Insurance. Insurance companies are maintaining a database of all clients with information showing Survival benefits, starting date of policies, Interests due, etc. 4. Education and training. Computer education is rapidly increasing with many universities, colleges and public libraries online with websites to make easy access to educational Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 8 Basic Computing Simplified information. Trainers also use computers to provide Computer based training and e-learning courses. E.g. Computer Aided Learning (CAL) and Computer Aided Instruction (CAI) 5. Library services. Computers help library personnel to easily access and keep updated records of books and other library materials. 6. In schools, universities and other educational institutions, computers are used to prepare a database about performance of students. 7. Transport and communication. Computers are also used in transport and communication to track movement of planes and trains, make reservations for travelers, hotels, send and receive messages (e-mail SMS) over the internet. 8. Domestic and entertainment. Computers are used for recreation and entertainment purposes like playing of computer games, listening to music, watching movies, etc. 9. Computers are used by musicians to make music productions 10. Industries. Computers are used in manufacturing processes such as use of robots to handle tasks that are to be performed by humans. 11. Research. Computers are used by scientists for research purposes like introduction of new drugs, exploring the space, etc. 12. Military organizations also use computers to locate enemy positions and direct missiles. 13. Meteorologists use computers for making weather forecast. I.e. predicting weather changes. 14. Hospitals. Doctors use computers to keep health details of patients, make medical tests, drug prescription and carrying out sensitive operations on sensitive body parts like the brain, heart, kidney, etc. 15. Revenue authorities keep records of tax payers and make tax assessments using computers 16. Bureaus of statistics also use computers to process and interpret statistical data such as health, income, population among others. 17. Marketing. Computers are used in marketing for advertisement such as creating and designing graphics, newsletters, brochures and draft press release. There are computerized catalogues that provide access to product information and permit direct entry of orders to be filled by customers. 18. Accountants use computers to keep financial records, make financial statements and invoices. 19. Offices. Computers are used in modern offices to create documents, spreadsheets, databases, presentations among others. 20. Engineering Design. Computers are widely used in engineering purposes. One of major areas is CAD (Computer aided design) that helps in design of Ships, Buildings, Bridges, Airplanes, planning towns, designing buildings, determining a range of buildings on a site using both 2D and 3D drawings. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 9 Basic Computing Simplified 21. Government. The government uses computers to prepare budgets, compute sales tax, income tax, voters’ lists, driving licensing systems 22. Law enforcement agencies. Information stored on computers such as fingerprints, images and other identification details help law enforcers to carry out criminal investigations. Revision questions: 1. Match the following generations of computers with the technology used to develop them: Generation 1st generation 2nd generation 3rd generation 4th generation 5th generation Technology Artificial intelligence Very large integrated circuits Transistors Vacuum tubes Integrated circuits 2. 3. 4. 5. 6. Identify and explain at least five areas where computers are used in day to day activities What were the characteristics of the first generation computers? Who developed the analytical engine? What is artificial intelligence? Write the following initials in full: a) ENIAC b) VLSI c) IC 7. Using the abacus, represent 5,780 8. Match the following computer application areas with the role played by computers in each case. Area of application Role Supermarket Matching fingerprints Hospital Entertainment Bank Stock control Hotel Booking rooms Home Analyzing academic data School manufacturing process control Industry Life support machines Police station processing cheques Negative impacts of computers 1. Disposal of damaged computer systems is hard since they cannot be decomposed but can cause damage to the environment. 2. Long usage of computers without protective gears can lead to eyesight impairment 3. Computer systems are very delicate and they require experts knowledgeable in timely maintenance and repairs. 4. There is high cost incurred in computer maintenance and repairs. 5. Computer systems require electric power in order to operate effectively which may not be available in some places 6. Acquisition of computer systems are also expensive. 7. Computer systems require literacy in order to learn. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 10 Basic Computing Simplified 8. Computer technology has encouraged forgery and conning of people’s property and loss of lives as well. 9. The invention of computer technology has caused unemployment to many employees since most organizations are using computers to reduce their workforce. 10. Secrecy is limited since computer technology can detect and penetrate virtually every information storage using experts knowledge. 11. It is encouraging immorality through pornographic technology leading to decline in moralities. 12. Viruses can spread through the internet into your system and may destroy your data or information from the whole system. 13. E- Commerce has caused business irregularities since a commodity can be accessed and purchased online and a different product may be delivered instead. Revision Questions UCE 2006 28. Suggest reasons why there is an increase in the use of computers in most organizations in Uganda today. UCE 2009 29. Suggest ways in which computers can be used in business and industry in Uganda UCE 2008 27. “Computers are a necessary requirement.” How do computers affect people in everyday life? Limitations of computers Much as computers are advantageous in our daily life, it also has limitations as experience has shown. 1. Accuracy and correctness of programs. A computer operates basing on the program code set by programmers; so the accuracy and correctness of the code leads to a right solution whereas the incorrectness of the code leads to wrong solution. 2. Data accuracy and correctness. If a user feeds wrong data into the computer, the computer will automatically output wrong information. Hence, GIGO – “Garbage In Garbage Out” 3. Experience. A computer cannot learn from past mistakes or correctness 4. Alternative. Computers do not have the ability to try other alternatives or options. The concept of data and information Data refers to a collection of raw facts, figures and symbols. Data can also be defined an unprocessed information. Examples of data include: Hours worked by an employee, sales figure for a day, etc. Data can further be classified in two ways: Primary data/Direct data: This is data which originates from the source. That is – first hand data. Secondary data. This is data that comes in a more roundabout way. It is data that has already been researched. Examples include: Text books, magazines, newspapers, etc. Other forms of data include: currency (data expresses in monetary value), number (0-9), Memo, text (data from letters of alphabet or combination of alphabet and numbers), date/time, image, voice, etc. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 11 Basic Computing Simplified Data processing methods include: Manual method; this is the use of human beings for data processing Mechanical; this involves the use of mechanical typewriters, abacuses, slide rules, etc Electronic data processing Electro – mechanical data processing Information: This is data that has been processed into a meaningful and useful form Levels of information Strategic information Tactical information Operational information Types of information Past information Present information Future information Strategic information Tactical information Operational information The monetary value placed on information depends on: The accuracy of information Its intended purpose Good information can do one or all of the following: Reduce cost Eliminate losses Lead to a more efficient use of resources Provide more management and accurate decision making Qualities of a good information Timeliness. Having data at the right time Cost effectiveness. Having data which is within the means of a firm Completeness/comprehensiveness. Having information that is not lacking in any form Relevancy. Having data that is free from errors and doubts. Must be through an appropriate channel; i.e. a channel which is noise free User specific or easily attached to the user. It must be properly qualified or structured Accuracy. This is all embracing; i.e. time accuracy, cost accuracy, etc. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 12 Basic Computing Simplified INFORMATION & COMMUNICATION TECHNOLOGY (ICT) AND THE SOCIETY ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve data and information. ICT/IT can also refer to all computerized gadgets and devices capable of sending and receiving of information. ICT/IT can also be referred to as the study, design, development, implementation, and management of computer based information systems, particularly software applications and computer hardware. Computers and communication have brought and is still bringing changes in our lives. Therefore, it is very common to come across the following concepts: Information technology The communication revolution/telephone revolution Internet revolution Multimedia (data, sound & video) The binary age Information society The information super highway/ “Information” /I – Way/ Data – Way The digital age/Dot age, etc. The need for better ways of doing things has caused more research for the best technologies, more reliable information and best communication means hence the following concepts: Telecommunication. This refers to the use of electromagnetic systems for communication over long distances. Such systems/devices include: Radio broadcast, TVs, Telephones & cable TVs, etc. Information. Information refers to the knowledge obtained from reading, investigation, study or research. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication. This is the electronic transfer of data from one place to another. Technology. It is the use of scientific knowledge, experience and resources to create processed products that fulfil human needs. Whereas old technologies of ICT/IT such as newspapers, recordings, radio, paper printed photographs, film, television are fading, new technologies such as satellites, cellular phones, compact discs, e-mails, internet, data, warehouses & databases, video conferencing, fiber optic (for communication media), fax machines and computers have come in place to replace the old technologies. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 13 Basic Computing Simplified Impacts/advantages of ICT/IT on our society 1. It has led to increased interaction through e-mails, chat rooms, video conferencing, etc. 2. It has led to increased sharing and access to common databases within and outside organizations through networking. 3. In education, it has helped students, teachers and researchers to get access to relevant information. 4. Processing of data is much faster on a computer. E.g. calculating an annual budget on a spreadsheet. 5. Repetitive processing can be best done using computerized machinery e.g. Use of robots in industries. 6. Increased access to information through DBMS (Database management Systems) thus making research easier. E.g. finding a patient’s record in a doctor’s surgery can be done in seconds on a computerized database systems. 7. Data storage capacity is almost unlimited in a computer system. For instance, large quantities of data can be stored on media such as CDs or DVDs instead of paper and large filing cabinets. 8. Data communication is fast as data can be transmitted over a network in just a few seconds. 9. Data can be output on a computer in a variety of different formats. E.g. annual sales figures can be printed as a spreadsheet, displayed as a graph or as a multimedia presentation involving text, sound, graphics and animations. 10. It has led to increased inventions and innovations. 11. It has led to increased technology in management fields. 12. It has improved and sustained quality goods and services 13. It has increase efficiency and effectiveness, leading to increased productivity. 14. It has increased investment opportunities in commercial tele-centers, internet cafes, chat rooms, etc. 15. It has improved on the standard of living as people get shorter working hours. 16. Highly skilled jobs are being created like programing, systems analysis, software engineering, etc. as a result of ICT/IT. 17. Many IT products are being made available for the disabled. 18. It has reduced cost of production through less demanding ICTs. 19. It has improved the corporate image. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 14 Basic Computing Simplified Negative impacts of ICT 1. Older generations find it difficult to catch up with the changing technologies today. 2. It bombards people with too much information especially through the internet both good and bad. 3. It has increased instability as people get compelled to learn new things every day. 4. It causes health problems such as eye sight losses, repetitive strain injury, etc. 5. Moral degeneration is caused through access to pornographic materials on the internet. 6. It has widened the gap between the rich and the poor as the rich use ICTs to produce faster and flood the market. 7. It has eroded individual privacy as more data stored on databases can be accessed anytime. 8. It causes addiction to computers by young people. E.g. computer games. 9. Increased crimes through forgery and piracy. 10. Virus threats make data stored on computers very unsecure 11. Initial cost and maintenance costs of ICT is very high 12. ICT isolates man and erodes the social aspect of work as some people prefer performing official duties from their homes. 13. ICT causes unemployment to the less skilled people. 14. People are rejecting the casual routine of even shopping for online shopping instead. 15. Depletion of resources is caused since printing is done on papers that requires many trees to be cut down to be processed into paper thus even increasing global warming. INFORMATION TECHNOLOGY Is the development, implementation and management of computer based information systems, mostly software applications and hardware. IT professionals perform a variety of functions that range from installing applications to designing complex computer networks and information databases. Duties that IT professionals perform Data management Networking Engineering computer hardware Database and software design Management and administration of entire systems Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 15 Basic Computing Simplified Components of Information Technology Computers. These are very important in order to input data, process, store and output information. They are divided into four categories. E.g. Super computers, mainframe computers, mini and microcomputers. Servers. A server is a central host computer that provides services to the client computers. These services include storage and retrieval of information. Database Management Systems (DBMS). This is basically a set of software programs which manages the storage, retrieval and organization of information in a computer. Networking. This refers to the interconnection of computers and peripherals through telephone lines or other communication channels to share information and resources (such as printers, scanners, etc.) Network security and cryptography. This refers to the provisions made in a computer network to prevent unauthorized usage of information. It is also helpful in providing protection from computer hacking at the cyber boundaries of an organization. Careers in Information Technology Technical support agent. To help customers resolve hardware and software issues. Network administrator. Responsible for setting up computer-to-computer interactions, as well as workstations and mobile devices. Database engineer. To design databases for handling day-to-day operations like customer account, order tracking, human resources and financial information. Video game development. This requires individuals and teams who specialize in art, design, 3D modelling, project management. Music composition and more. Technical writer. Writing text books, manuals and training courses dealing with computer hardware and software that conveys the needed information to the end-user. Computer Literacy. This refers to having knowledge and understanding of computers and their uses. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 16 Basic Computing Simplified THE COMPUTER LABORATORY A computer laboratory refers to a room in which computers are kept and used for learning purposes. The following factors must be considered when preparing a computer laboratory: i. ii. iii. iv. Security of computer hardware and software Reliability of the source of power Number of computers to be setup Maximum number of users Safety precautions, care and maintenance to be taken while in a computer laboratory 1) Avoid abrupt switching off your computer; always follow the right procedures of shutting down your computer. 2) Ensure that you protect your computers using up-to-date antivirus to avoid viruses from infecting your computer memory. 3) Avoid or scan foreign storage media before using them in your computer. E.g. floppy diskettes, flash disks, etc. 4) Avoid opening programs you are not familiar with. 5) Avoid eating or drinking while using a computer since liquids can pour on the computer hardware. E.g. mouse, keyboard among others. 6) Carry out open cleaning of computers regularly to ensure its effective functioning. Remember to blow off dust inside your system. 7) Always cover your computer with a cloth or any other cover to avoid dust and moisture form spoiling it. 8) Avoid downloading cache files or unsecure games from the internet since they are not safe. 9) Endeavor to use Universal Power Supply (UPS) or stabilizers to control power instabilities. 10) Always check the capacity of your hard disks and perform related maintenances like disk cleaning, defragmenting, deleting unwanted files or folders to free up disk space, etc. 11) Never expose a diskette, flash disk, CD ROM/DVD, etc to magnetic fields or objects 12) Guard or protect your storage media such as CD/DVD/Flash disks when near X-ray machines. Their magnetic fields can easily erase all the data from your storage media. 13) Avoid spilling anything such as beverages on storage media 14) Do not subject your storage media to extreme heat or coldness. Room temperature is better for your storage media. 15) Never touch the shiny or glittering part of your storage media such as Compact Disks (CDs). Oil and dirt from your hands can easily spoil the surface of the storage media; the finger prints can also cause problems when the computer tries to read or write tie the storage media. 16) Clean the storage media only using the recommended cleaning reagents but not any cleaning product. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 17 Basic Computing Simplified 17) Do not use any other person’s computer without prior permission from the owner. 18) Do not attempt to disclose or discover any other person’s password. 19) Do not copy or transfer any computer software without the user’s or owner’s permission. 20) Do not use any college, school or university computers to violate the terms of any software license agreement or copyright provisions. 21) Do not copy, rename, change, examine or delete files of information belonging to some other user. 22) Do not intentionally use computer facilities to harass others or to interfere with their work. E.g. sending obscene, abusive, threatening message to a user or users. 23) Do not tamper with terminals, microcomputers or any other associated equipment and faults should be reported immediately to the system administrator. 24) Do not attempt to modify system facilities, illegally obtain extra resources or degrade any system’s performance. 25) Always close tasks running before shutting down the computer. 26) Refer services to fully qualified personnel in case of problems you cannot easily get the solutions. Maintenance of computers (Measures that protect computers) The following are some of the ways to keep your computer clean for maximum performance: Buy dust covers to prevent the build-up of dust on your computer Place the computer in a cool area Clean the computer on a regular basis Properly manage the files on the computer’s hard drive. Remove old files from the computer hard disk and back them up to an external storage device in case you need them. Utilize virus protection and detection software to protect the computer against malicious software Avoid using a computer during a storm since lightning can affect them. Use uninterruptible Power Supply (UPS) to protect the computer from crashing during power surge. Always backup information to external storage devices to avoid loss of data. Recover from crashes by pressing Ctrl + Alt + Delete keys at the same time to reboot your computer. Never open an email attachment from unknown sources Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 18 Basic Computing Simplified Do not download files from internet sites you don’t know and trust. Never turn a computer off with the power switch except when the hard drive is not running Never unplug peripherals from the computer when it is powered up as it may short out the connector socket or the motherboard. Keep at least 300MB of your C: drive free to avoid the computer from becoming slow and dumping data to the hard drive. Do not load too many programs onto the computer’s memory Use firewalls to avoid unnecessary access to your system by hijackers. Keep track of the software disks you receive because they contain valuable software drivers and programs for windows. Use burglar proofing. This includes filling grills on doors, windows and the roof to prevent forceful entry into a computer room. Install fire prevention and control equipment; such as smoke detectors, non-liquid based and non-powder based fire extinguishers. Liquids may cause corrosion of computer equipment; Powder particles may increase friction and wear of movable parts as well as causing disks to crash. The room should be well laid out. Computers should be placed on stable, wide desks to avoid accidentally knocking them down. Cables should be laid out in trunks from user paths to avoid people stumbling on them. Installing lightening arrestors on the computer room. How to keep a computer clean Never spray your computer’s monitor with water, instead use a lint-free cloth lightly with glass cleaner and then clean the screen. Use specific computer vacuum cleaners to clean keyboards, computer case vents and around drive openings. NB: Never try to open your computer to clean the inside parts; take it to an authorized technician for cleaning. Measures that protect the user i. All cables should be insulated to avoid danger of electric shocks to the users. ii. Cables should be laid away from user paths to avoid stumbling on them. iii. Providing antiglare screens (light filters) and adjustable screens to avoid eye strains and exhaustion caused by CRT monitors. However, modern flat panel displays such as Liquid Crystal Display (LCD) do not strain the eye. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 19 Basic Computing Simplified iv. Provide standard furniture to avoid poor sitting posture which may lead to strain injury and limb tiredness. The seat should have an upright backrest and should be high enough to allow the eyes of the user to be level with the top of the screen. v. The room should be properly ventilated to avoid dizziness caused by inadequate supply of oxygen to allow computers to cool. vi. Overcrowding in the computer room should not be allowed. This causes suffocation. vii. The walls of the computer room should not be painted with over bright reflective oil paints and the screens should be faced away from the window to avoid glare caused by bright backgrounds. 1 Revision questions: 1. What is the name given to alternative sources of power? A. Generators B. UPS C. Power backups D. The sun 2. Which of the following will not ensure proper ventilation in a room? A. Adequate windows and doors B. Overcrowding C. Installing fans’ D. Air conditioning systems 3. All the following are dangerous to a computer except one. Which one is it? A. Water B. Smoke C. Proper ventilation D. Dust 4. Why must foods and beverages be kept out of the computer room? A. Because computer users should not eat Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 20 Basic Computing Simplified B. Because spilling beverages may clog and destroy computer components C. Because the smell of food is not good for the computer lab. D. Because all foods affect computers 5. Which one of the following statement is correct? A. Opening the system unit when it is still on B. Using magnets in the computer room C. Covering the computers with dust covers after shutting them down D. Stepping on power and data cables 6. Why are powder fire extinguishers not allowed in the computer room? A. Powder particles settle on storage devices and may crash them during read/write operation B. Powder is poisonous C. It fills the room with mist D. Powder changes to liquid when sprayed on fire 7. All the following are functions of the UPS except one. Which one is it? A. It prevents sudden power surges to destroy the computer B. It supplies power to the computer during blackouts. C. It provides stable power supply (clean power) D. It can be used as the main power source for computers 8. Which of the following reasons are likely to cause eye strain in the computer room? A. Poor lighting B. Bright monitor C. Poor ventilation D. Anti-radiation screen 9. All of the following are proper sitting postures while using a computer except one. Which one is it? A. Straight posture on the seat back B. Feet firmly on the floor C. High enough seat allowing eyes to be level with top of the screen D. Bending the back backwards on a relaxing chair 10. What can be done to deter illegal access to a computer room by unauthorized persons? A. Burglar proof the room by reinforcing doors and weak access points B. Welcome strangers to the room C. Leave the room open when nobody is using it D. Switch off security alarm when leaving the room NB: To clean a computer laboratory: Shut down all computers Wipe the keyboards with antimicrobial wipes Clean each mouse Clean the tops of the computer desks Wipe the buttons on the computers Dust the monitors Sweep the floors Wipe down the chairs Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 21 Basic Computing Simplified Physical parts of a computer A desktop computer is made up of a collection of different components that are interconnected in order to function as a single unit. A typical desktop is made up of a system unit and other devices connected to the system unit called peripheral devices. Examples of these peripheral devices include; monitor/screen, keyboard, mouse, etc. System Unit This is the part that houses the brain of the computer called the CPU. It also houses other devices called drives. There are two types of systems unit namely; Tower and Desktop type. Peripheral devices. These are devices connected to the system unit using special cables called interface cables that transmit data and information to and from the devices. These cables are attached to the system unit through ports. Keyboard. This is a peripheral device that enables a user to enter data and instructions into a computer. Mouse. This is a pointing device that enables the user to execute commands. Monitor. It is a device used for displaying information. It is called a monitor because it enables a user to monitor or see what is going on in the computer. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 22 Basic Computing Simplified CLASSIFICATION OF COMPUTERS Computers can be broadly classified by their size, process, purpose and processor power. CLASSIFICATION BY SIZE. Under this classification, we have Super computers, mainframe, mini and microcomputers. 1. Super Computers Supercomputers are one of the fastest computers designed to handle sophisticated tasks. They are very expensive and are employed for specialized applications that require huge amount of mathematical calculations (number crunching). They are nearly 50,000 times faster than microcomputers since they process data in Trillions of Instructions Per Second. For example, they are used in weather forecasting, scientific simulations, animated graphics, fluid dynamic calculations, nuclear energy research, electronic design, nuclear plants, and analysis of geological data (e.g. in petrochemical mining). Input Unit 2. Mainframe Computers Mainframes are very large in size and are expensive computers capable of supporting a hundred to a thousand users at once. Mainframe performs many programs at the same time and supports many immediate execution of programs. They have stronger multi-processors compared to mini computers, they are relatively big in terms of physical size compared to mini and microcomputers. They are relatively expensive compared to mini computers. They are used by banks, aviation companies and universities, 3. Mini Computers It is a midsize multi-processing system capable of supporting 250 – 500 users at once. They have relatively stronger multi-processors compared to micro computers, they are relatively big compared to micro computers; they are used in small and medium sized organizations. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 23 Basic Computing Simplified 4. Micro/personal computers (PC) These computers are the smallest, relatively inexpensive and designed for an individual user. They are preferred mostly by homes and schools. Tey are called microcomputers because they have CPUs called Microprocessors. Examples include: Desktop computers. They are designed to be placed on top of a desk hence the name desktop derived. Desktop computer Laptop computers. They are small, easily transportable, lightweight micro computers that can easily fit into a briefcase and good for mobile computing. Notebooks. They are smaller laptops convenient for mobile users. Thin client systems. These are desktop computer systems that do not offer full functionality of a PC. Examples are Terminals and network computers. Mobile devices. These are handheld devices called Personal Digital Assistants (PDAs) or handheld personal computers. Examples of PDAs include: Handheld companions. They are designed to access and manage data as additions to notebooks or PCs. PC companions. Used for Personal Information Management (PIM), e-mail and Light Data creation capabilities. Smart phones. They are phones with added PDAs, PIM, data, e-mail creation capabilities Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 24 Basic Computing Simplified Vertical Application Devices. Devices used for data access, management, creation and collection. They are used for vertical markets. Pen Tablets. Devices with pen input and tablet form for gathering data in the field or in mobile situation. Handheld Keypads. Devices with alphanumeric keypads used in specialized data collection applications. Tablet PCs. Devices with touch sensitive displays that can be tapped with a pen while foregoing a mouse or touchpad. Although personal computers are designed as single-user systems, these systems are normally linked together to form a network. In terms of power, now-a-days High-end models of the Macintosh and PC offer the same computing power and graphics capability as low-end workstations by Sun Microsystems, Hewlett-Packard, and Dell. Workstation A workstation is a single computer system which is similar to personal computers but has a more powerful microprocessor. It is used for engineering applications (CAD/CAM), desktop publishing, software development, and other such types of applications which require a moderate amount of computing power and relatively high quality graphics capabilities. 11 Workstations generally come with a large, high-resolution graphics screen, large amount of RAM, inbuilt network support, and a graphical user interface. Most workstations also have a mass storage device such as a disk drive, but a special type of workstation, called a diskless workstation, comes without a disk drive. Common operating systems for workstations are UNIX and Windows NT. Like PC, Workstations are also single-user computers like PC but are typically linked together to form a local-area network, although they can also be used as stand-alone systems. CLASSIFICATION BY PROCESS Computers are classified by process according to how the data processed is represented. They include: i. Digital computers. These are computers that process data represented in discrete values. Discrete values are numbers that can be defined such as 1, 2, 3, 4, 5… E.g. Digital watches. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 25 Basic Computing Simplified ii. Analog computers. These are computers that process data represented in a continuous form or in measurable quantities usually of physical nature. These quantities are length, voltage, pressure, speed, current, temperature, time, weight, etc. and the results are estimated in the nearest unit. E.g. thermometer, speedometer, voltmeter, etc. iii. Hybrid computers. These computers have combined features of both the digital and analog computers. They are used for specific applications. E.g. robots used in industrial control processes. CLASSIFICATION BY PURPOSE. The hybrid computers are further classified according to the work they are designed for. They are grouped into two classes: i. Special purpose computers. These computers are designed to handle only a specific task. Their forms of operation are limited in nature. E.g. digital watches, pocket calculators, lifts in buildings, computer guided missiles, etc. ii. General purpose computers. These are computers designed to perform a wide range of tasks. They perform all activities as desired by the user such as word processing, games, spreadsheets, keeping date and time, etc. CLASSIFICATION BY PROCESSOR POWER. Due to rapid changes in technology, processor power is also increasing as computers are getting faster every time. The higher the processor power, the faster the computers become. Earlier computers had a processor power of less than 0.4 MIPS (Millions of Instructions Per Second) but today, computers have at least 15 MIPS which is the minimum. The most common types of processor power are: 80286 Pentium III 80386 Pentium IV 80486 Pentium M Pentium I (80586) Celeron Pentium II (Pentium Pro) Duo Core Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 26 Basic Computing Simplified Review questions 1. Define the term computer 2. State different physical parts that make up a computer. 3. Differentiate the following types of computers: a) Supercomputers and mainframe computers b) Minicomputer and a PC 4. Differentiate between digital and analog computer 5. Which of the following is not true about the system unit? A. It houses the CPU B. It houses the monitor C. It connects to all peripheral devices using ports D. It has the computer’s power switch 6. What is a mouse in relation to computing? A. A small destructive rodent B. A round plastic container with a tail C. A device that controls a pointer on a screen D. A device used for typing 7. Why is the screen also called a monitor? A. It monitors the user B. It helps the user to track computer operations C. It monitors system performance D. It is a television 8. A. B. C. D. Pick the odd one out in the list below. Calculator Mobile phone Robot Laptop 9. A. B. C. D. Pick the odd one out in the list below Mainframe Microcomputer Minicomputer Digital computer 10. Which of the following will be most suitable for travelers? A. Supercomputer B. Mainframe computer C. Palmtop computer D. Minicomputer Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 27 Basic Computing Simplified 11. Why is a mobile phone regarded as a computer? A. It is electronic, has a screen, keypad, memory and is programmable B. It looks like a palmtop C. It is portable D. It produces tones 12. What is meant by the term analog data? A. Data never stops B. Discrete data C. Large data D. Continuous data 13. Which of the following is called a microprocessor? A. The CPU of a mainframe B. The CPU of as microcomputer C. The CPU of a minicomputer D. The CPU of a supercomputer Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.com 28 THE COMPUTER SYSTEM A computer system refers to all the functional units required for a computer to perform its tasks. A computer system is into four (4) basic categories: Hardware Physical components Software Programs User/Liveware Human beings using the computer Data/Information Input/Output COMPUTER HARDWARE The term hardware refers to the physical and tangible components of a computer. They are features that you can see, touch and feel. Computer hardware is categorized as follows: Input devices/hardware Output devices/hardware Processing devices/hardware Storage devices/hardware INPUT DEVICES. These are devices used to enter data and instructions into the computer. Data is fed into the computer in order to be processed. Data can be in form of pictures (graphics), sound, or text (characters). These input devices include: 1. Keyboard. This is an input device used to enter text and other characters and to control the operation of the computer. It is made up of numbers, letters, symbols and special keys to control the sending of data to the Central Processing Unit. A standard keyboard has about 103 keys. Most keyboards use the QWERTY layout named for the first six keys on the top rows of the letters. Most keyboards are divided into five main sections as shown below: Function Keys F1 – F12 Alphanumeric Keys Numeric Keypad A–Z 0 - 9, +, -, *, / Arrow keys, Page Up, Page Down, Home, Insert, Delete, End Cursor control & editing keys Modifier/Special purpose keys Shift, Alt, Ctr````````l, Esc. Allows a user to execute commands mostly during program installation or startup, just at the touch of a key. This is the main typing area of the keyboard used to enter text and commands to the computer. To input figures For moving the cursor To delete & insert characters Used mostly in combination to execute a command Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 29 Basic Computing Simplified Keyboard special keys: a) Alt (Alternative) Key The Alt key is used in combination with other keys to perform specific functions. In most window programs, the main menu tabs have got underscored letters. E.g. File, Edit, View, Format, Tools, Table, Window and Help. Pressing Alt with the underlined letter will activate that menu. E.g. Alt + F4 is used to exit a program. b) Control Key (Ctrl) It is used with other keys to perform specific operations. E.g. Ctrl + F2 – Print preview, Ctrl + S – Save, Ctrl + U – Underline, Ctrl + P – Print, Ctrl + B – Bolds a selection, Ctrl + Alt + Del – Restarts a computer (warm boot), Ctrl + Alt + F2 – initiates the Open file dialog box, Ctrl + X – Cuts a selection, Ctrl + W – Exit, Ctrl + Esc – Activates the Start up menu, etc c) Shift Key. The Shift key switches between lowercase and uppercase characters during regular typesetting. When the cursor is in the last bottom cell of a table, pressing tab adds another row; Shift + Tab takes you back to the previous field. It is also used for other shortcut operations. E.g. Shift + F3 alternates between lowercase and uppercase characters, title case and sentence case characters; Shift + Arrows – used to select text; Shift while inserting the CD-ROM deactivates Auto run. d) Windows Key. It activates the startup menu for the computer user to run shutdown, Run, Help, Search, Settings, Documents, Programs, Control panel, etc using arrow keys. E.g. Ctrl + Esc. e) Enter/Return key. Used to enter/confirm commands or move from field to field, and to add a field/row in a table. f) Del key. Erases characters to the right of the cursor position g) Tab key. Moves the cursor five spaces to the right by default compared to the space bar where the number of spaces are usually adjustable. h) Backspace key. Erases characters to the left of the cursor position. i) Esc (escape) key. Used to exit or close a dialog box j) Cursor control keys. They are: Home key Moves the cursor to the beginning of a line End Moves the cursor to the end of a line Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 30 Basic Computing Simplified Insert Del Page up Page down Num lock Print screen Scroll lock Used for overtyping Deletes characters to the right of the cursor position Moves the cursor to the top of a page Moves the cursor to the bottom of a page Activates the numeric keypad For printing what is on the computer’s screen For scroll lock. Disabled in modern keyboards Types of keying devices Traditional keyboard. This is the most common type of keying device with a full sized rigid keyboard. Flexible keyboard. It is a more portable keyboard that can be folded and packed into a bag Ergonomic keyboard. It is a specially designed keyboard that provides comfort and alleviate wrist strain. Keypad. It is a miniature keyboard used on portable devices such as PDAs, laptops and mobile phones. Braille keyboard. A keyboard designed for use by the blind. It consists of keys identified by raised dots. Pointing devices. These are devices with which one can move or control a cursor pointer on a Graphical User Interface. These are: 2. Mouse. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 31 Basic Computing Simplified This is a handheld input device used to position the cursor, point, select, move and confirm operations. It can be used to give commands, draw and perform other types of input task. A mouse follows the basic techniques below: Pointing. Moving the mouse to move the on-screen pointer. Clicking. Pressing and releasing the left mouse button once more rapidly and consistently. Double clicking. Pressing and releasing the left mouse button twice more rapidly and consistently. Dragging. Holding down the left mouse button while pointing on an icon as you move the pointer to a desired location. Dropping. Releasing the left button in the process of dragging an icon, a file or a folder. Right clicking. Pressing and releasing the right mouse button to display a list of commands from which a user can make a selection. Scrolling. Using the scroll wheel to move a page in a ny direction to allow the user to navigate it well. Moving a mouse on a flat surface makes the pointer on the screen to move in the same direction as the mouse itself. When using the mouse, follow these guidelines: i) Place the mouse on a flat smooth surface ii) Gently hold the mouse with your right hand, using the thumb and the two fingers iii) The index finger should rest on the left button while the middle finger rests on the right button Types of mice include: (i) Desktop mouse Desktop mouse include: a. Mechanical/standard/traditional mouse. This is a type of mouse that has a rubber or metal ball on its underside and it can roll in every direction. Sensors within the mouse, which are mechanical, detect the direction in which the ball is moving and moves the pointer on the screen in the same direction. A mouse pad is used to run the mouse on. b. Opt-mechanical. This is a type of computer mouse that uses optical sensors to the motion of the ball. c. Optical. This type of mouse uses laser for detecting the mouse’s movement. Optical mice do not have any mechanical moving parts. They respond more quickly and precisely than the mechanical and opt-mechanical mice. (ii) Trackball mouse. This type of mouse is common on most laptop computers with a rolling ball and buttons fixed within the keyboard. (iii) Touch pad mouse. This type is common on modern laptop computers. It has a rectangular pad with two push buttons. Once a finger is moved on a pad, the mouse pointer change positions accordingly. Advantages 32 It does not need as much desk space as a mouse Can readily be built into the keyboard Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Has finer resolution, i.e. to achieve the same cursor movement onscreen takes less movement of the finger on the glide pad than it does mouse movement. Can use either buttons or taps of the pad for clicking. Disadvantages The hand tires faster than with a mouse since there is no support Some people don’t find the motion as natural as a mouse Parts of a mouse Primary button Secondary button Wheel button Rubber ball (for track ball and opt-mechanical types of mouse) Housing – This can be held into a hand Cables connecting the mouse to the system unit Interface connector to attach the mouse piece to the mouse board A mouse’s advantages include: Easy to use Not very expensive Moves the cursor faster than the arrow keys of keyboard. Types of mouse interface (Connection) Serial interface. A serial port transmits one bit at a time. Used by old PCs with 9 – 25 pin male connectors, most PCs have got two serial ports. I.e. COM 1 and COM 2. Once the device driver is initialized, it searches for the connected port. PS/2 Mouse interface. It is an on board mouse port interface or motherboard mouse interface Bus – card interface. This works through Input/Output (I/0) card onto the system motherboard. Cordless interface. A cordless mouse uses infrared technology to do away with the cord. Mice faults Mouse pieces are usually disturbed by the following: Accumulation of dirt on the mouse rollers and the whole mechanism as well. Bending of the pins Interruption conflicts. The mouse piece fails to be recognized. Advantages of using a mouse A mouse is user friendly for computer beginners A mouse is easy to and convenient to use with a Graphical User Interface Using a mouse to select items or move to a particular location on the screen is faster than using a keyboard. 33 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Disadvantages of using a mouse It is not easy and convenient to input text with a mouse Giving commands using a mouse is slower than using a keyboard It needs some practice in order to control a mouse properly A mouse is not accurate enough for drawings that require high precision A mouse usually requires a flat surface to operate A mouse needs more desk space to operate compared to a trackball or touchpad. 3. Track Ball Track ball is an input device that is mostly used in notebook or laptop computer, instead of a mouse. This is a ball which is half inserted and by moving fingers on ball, pointer can be moved. Since the whole device is not moved, a track ball requires less space than a mouse. A track ball comes in various shapes like a ball, a button and a square. 4. Stylus. A pointed instrument used as input device on a pressure-sensitive screen 5. Cyber glove. Is an input device for virtual reality environment. Various sensor technologies are used to capture physical data such as bending of fingers. Usually, a motion tracker such as a magnetic tracking device or inertia tracking device is attached to capture the global position or rotation data of the glove. These movements are then interpreted by the software that accompanies the glove, so any one movement can mean any number of things. Gesture can be categorized into useful information such as to recognize sign language or other symbolic functions. NB: Virtual reality is an environment that can be interacted with in a seemingly real or physical way by using special electronic equipment. 6. Eye tracking/eye gaze. Eye tracking follows the eye movements of a person looking at any graphic such as printed advertisement. It is used to analyze the usability and effectiveness of the layout. 7. Scanner. This is an input device that reads images or texts and converts the data and transmits them into the computer in form of digital signals. Graphical scanners read photos or other images into the computer and digitize them. Types of scanners a) Magnetic Ink Character Recognition (MICR) MICR input device is used to capture data written using magnetic ink or coded onto a magnetic strip. It is generally used in banks because of a large number of cheques to be processed every day. The bank's code number and cheque number are printed on the cheques with a special type of ink that contains particles of magnetic material that are machine readable. This reading process is called Magnetic Ink Character Recognition (MICR). The main advantage of MICR is that it is fast and less error prone. 34 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified b) Optical Character Recognition (OCR) OCR is an input device used to read a printed text. OCR scans text optically character by character, converts them into a machine readable code and stores the text on the system memory. A more advanced OCR scanner called flat-bed scanner is used to capture pictures and real objects. c) Bar Code Readers Bar Code Reader is a device used for reading bar coded data or Universal Product Code (UPC) (data in form of light and dark lines). Bar coded data is generally used in labeling goods, numbering the books etc. It may be a hand held scanner or may be embedded in a stationary scanner. Bar Code Reader scans a bar code image, converts it into an alphanumeric value which is then fed to the computer to which bar code reader is connected. d) Optical Mark Recognition (OMR) OMR is a special type of optical scanner used to recognize the type of mark made by pen or pencil and a piece of paper. It is used where one out of a few alternatives is to be selected and marked. It is specially used for checking the answer sheets of examinations having multiple choice questions. 35 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified 8. Digitizer. This device also known as a graphic tablet allows a user to draw images using a stylus. It is used together with a digitizing tablet in making maps (cartography) and architectural drawings to accurately trace out lines on a map. 9. Digital camera. This device can be used like a traditional camera except that its images are stored digitally in memory housed within the camera and later imported or downloaded onto the computer for further editing and printing. 10. Touch sensitive screens. These are screens that can sense when a particular part of their screen is touched and they respond accordingly. They are mostly used in retail stores, airports, on smart phones and PDAs. 36 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified 11. Web cam. It is a small digital cam mounted onto a PC monitor to allow two way communication involving sound and video communication not only text communication. 12. Joystick and game pads. It is an input device used in modern computer games. E.g. flight simulator. A joystick looks like a car gear lever; it works like a track ball mouse that can rotate in 360 degrees. 13. Light pen. It is a pen like input device which allows a person to point to areas on the screen and it is often used to select menu choices. It consists of a photocell and an optical system placed in a small tube. When the tip of a light pen is moved over the monitor screen and pen button is pressed, its photocell sensing element detects the screen location and sends the corresponding signal to the CPU. E.g. used in ware houses to input large amount of data quickly by moving a light beam across a bar code. 14. Smart boards. This is a large interactive display that connects to a computer. The display is projected onto the board’s surface where users control the computer and write using a pen or finger. The board is typically mounted to a wall or on a floor stand. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 37 Basic Computing Simplified 15. Voice recognition equipment. This device is used to enter data into as computer inform of sound input. Recent systems allow you to talk to a PC and see text appear on the screen. Revision Questions 1. a) What is the difference between function keys and Special PC keys/control keys? b) Explain the various categories of keys found on a standard keyboard 2. i) Define the following terms: a) Double clicking b) Clicking c) Drag and drop d) Right clicking e) Pointing ii) What makes a mouse pointer move on the screen? 3. Classify the following keyboard characters: a) A, B, C, D,…….Z b) 0, 1, 2, ……..9 e) Home, End, Page UP, Arrow key c) F1, F2,…….F12 d) Del, Insert f) Ctrl, Shift, Alt 4. a) What is a computer system? b) Differentiate between a computer and a computer system 5. a) A scanner used at points of sale terminals in supermarkets is an example of a…………..scanner b) The automated input technique where keying of input data is eliminated is sometimes referred to as…… c) The type of scanner used to grade multiple choice examination is called…………….. d) Describe two situations in which speech recognition devices may be useful as a method of data entry. OUTPUT DEVICES These are devices used to bring out information from the computer and present it in a suitable form to the user. This unit is a link between computer and users. Output devices translate the computer's output into the form understandable by users. These devices can be classified into two categories namely: Hard copy and soft copy output devices Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 38 Basic Computing Simplified Soft copy refers to the intangible output that can be seen or heard; such as screen display and sound Hard copy refers to the tangible output that can be felt such as paper. Examples include printers, plotters and facsimile (fax) The type of output depends on whether a computer is to produce a hard copy or a softcopy output. E.g. output can be text, pictures or graphics, sound and computer usable output on the screen. Examples of output devices include: 1. Speakers. These are output devices that produce information in form of sound. 2. Plotters. These are output devices that produce hardcopy output on paper and are used to print line drawings. They have a series of moving parts that can accurately draw straight, thin and meandering lines. Plotters are often used to produce architectural drawings, map making, charts and other technical drawings. 3. Monitor/screen/Visual Display Unit (VDU). This is a TV like device which produces information in a visual output or soft copy. It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image depends upon the number of pixels. There are two kinds of viewing screen used for monitors. Cathode-Ray Tube (CRT) Monitor The CRT display is made up of small picture elements called pixels. The smaller the pixels, the better the image clarity, or resolution. It takes more than one illuminated pixel to form a whole character, such as the letter in the word help. 39 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified A finite number of characters can be displayed on a screen at once. The screen can be divided into a series of character boxes - fixed location on the screen where a standard character can be placed. Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically. Advantages Can produce fast color output Can be viewed from a very wide angle Cheaper in cost than LCD monitors There are some disadvantages of CRT: Large in Size High power consumption Emit higher electromagnetic radiation (EMR) than LCDs Flat-Panel Display Monitor The flat-panel display refers to a class of video devices that have reduced volume, weight and power requirement in comparison to the CRT. You can hang them on walls or wear them on your wrists. Current uses of flat-panel displays include calculators, video games, monitors, laptop computer, graphics display. The flat-panel display is divided into two categories: Emissive Displays - The emissive displays are devices that convert electrical energy into light. Examples are plasma panel and LED (Light-Emitting Diodes). Non-Emissive Displays - The Non-emissive displays use optical effects to convert sunlight or light from some other source into graphics patterns. Example: LCD (Liquid-Crystal Display) that is made up of special liquid crystals to create images on the screen. Advantages of LCDs They are less bulky, Consume less power Have little strain effect on eyes Have a higher resolution than CRTs Have a higher refresh rate compared to CRTs They have a narrow viewing angle compared to CRTs Disadvantages They are usually more expensive compared to CRTs They can only be viewed from a very narrow angle Gas plasma displays that uses gas instead of liquid crystals. They contain millions of pixels that are illuminated by charged neon gas. 40 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Monitor display terminologies Pixel. Stands for picture elements. Are tiny dots which are used to form the images displayed on the screen. Color depth. Refers to the number of colors which can be displayed by a pixel called color depth. It is measured in bits. Resolution. This is the number of pixels per inch on the screen usually given in dots per inch (dpi) or bits. The higher the resolution, the more the number of pixels per square inch, hence clearer images. Refresh rate. Since CRTs cannot hold an image for a long time, image in the video RAM is used to refresh the one on the screen as long as necessary. If a screen has a low refresh rate, images tend to flicker hence causing eye strain. Display size. Is measured in inches as the digital length of the screen measured from the top right to bottom left. i. ii. There are basically two categories of monitors. They include: Monochrome monitors. These monitors display only one color especially white on a dark background. They are not expensive and are used principally for word processing and other applications where color is not applicable. Color monitors. These are often called Graphics Monitors which display text and graphics in color. Examples of these monitors are: CGA – Color Graphics Adapter. Displays 16 colors EGA – Enhanced Graphics Adapter. An improvement of CGA but also displays 16 bits VGA – Video Graphics Array. Displays text, graphics and video using 256 colors SVGA - Super Video Graphics Array. Displays text, graphics and video using more than 16 million colors, has a minimum resolution of 800 x 600 pixels. XGA - Extended Graphics Array. Has a resolution of up to 1024 x 768 pixels. It is popular with 17 and 19 inch monitors SXGA – Super Extended Graphics Array. Has a resolution of upto 1280 x 1024 pixels and is popular with 19 and 21 inch monitors. UXGA – Ultra Extended Graphics Array. It is the largest and highest standard type of 41 monitor. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified NB: Portable monitors. These are monitors used on laptops, notebooks, digital diaries, mobile phones, calculators, etc. they are flat panel monitors that consume little power and can also display color. However, they can also be either monochrome or color monitors. Advantages of display devices The time to display the image is fast Screen displays can include text, graphics and colors Display devices are usually quiet No paper is wasted for obtaining output Disadvantages Information produced on the screen is only temporary and lost when power is turned off. Unsuitable for users with visual problems Needs a separate device to produce the hard copy Factors to consider while monitoring the performance of a monitor Luminance. This is measured in candelas per square meter. (cd/m2) also called a nit.++66 4. Data projectors. Are used to display output from a computer onto a plain white screen like wall or whiteboard. It is a creative way of presenting computer output to an audience. 5. Printers. A printer is an output device which produces hard copies of computer processed data. Printers are classified according to whether the output produced is by physical contact of the print mechanism with the paper or not. Categories of printers Impact printers. These are printers that produce their hardcopy output by the print mechanism. i.e. print heads physically touching the print media. The print media can be paper, transparencies, cloth, some plastic, etc. Examples of impact printers include: i. Character printers. These are low speed printers that imitate the action of typewriters by printing one character at a time. 42 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Line printers. These printers print a whole line of characters at once. I.e. they print from one end of paper to the other end, hence called line printers. E.g. Daisy wheel printers;, thimble printers, etc. Daisy wheel printers have letters on the ends of spokes to form a wheel. The letters strike an inked ribbon onto paper. Advantage It has good typewriter resolution Disadvantages Very slow – ½ ppm Very noisy Can only print the characters provided on the wheel and no graphics (line drawings, pictures, etc) It prints only in one color. Dot matrix printers. These printers form characters by the print heads forming a pattern of dots on paper to make out a character. E.g. Epson LQ 1170 (24 pin), Epson FX880 (9 pin), etc Advantages of using a dot matrix printer It is quite fast – 2 ppm Slightly noisy Can print any shape of character (font) stored in the computer memory and any graphics, all on the same page. Some are capable of printing low quality colors on the same page using multiple ribbons Page printers. These are printers that use the method of printing page by page. They are much faster than the above three printers. 43 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Advantages of impact printers 1. The cost of per page printing is lower and the printed characters last longer 2. Impact printers are cheaper to purchase 3. They do not require special paper to print on 4. They are easy to maintain as its print heads require fewer periodic cleaning 5. Dot matrix printers are very fast that they go over a speed of 160 characters per minute thereby increasing their productivity. 6. They can print on multi-part forms (Carbon or Carbonless) Disadvantages of impact printers 1. They are very noisy during operation 2. They have a lower print resolution compared to other types of printers 3. They print slowly compared to non-impact printers. 4. The ink ribbon has a short lifespan and has to be replaced frequently. 5. The resulting image is of low print quality and, if used to print barcodes, it might be difficult to read them. 6. Their print heads get heated up during long printouts thereby reducing the entire productivity. ii. Non impact printers. These are printers that produce a hardcopy output without the print heads physically touching the printing surface. Examples include: Inkjet printers/DeskJet printers. These printers spray small droplets of ink to create characters. They use either the drop-on-demand technique or the intermittent jet technique. In the drop-on-demand technique, liquid ink is pushed out of the nozzles in drops while in the intermittent jet technique, ink is fired out of the nozzles in a continuous stream. The ink pumps work by heating a coil around a particular ink channel, which expands and constricts the ink in the channel causing a droplet if ink to pass through the nozzle. Each pump channel works at a rate of approximately 5 KHz (5,000 droplets per second). Examples include HP DeskJet 690C and Epson Stylus 640. Advantages It is very quiet Full black and color print on the same page It has a very high resolution of between 300 – 600 dpi Thousands of colors are created by mixing tiny dots of cyan, magenta and yellow (CMY) ink on the paper Disadvantage It is very expensive in the long run to replace the cartridge after being used up 44 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified LaserJet printers. Laser printers are high quality printers with a greater Near Letter Quality (NLQ) capability and a high speed output. Excellent graphics are obtained with this type of printers. In the print mechanism, a laser light source is used to transfer the image stored in the printer’s memory onto a special drum. The drum attracts the toner (ink used to print the characters) and the paper is pressed against the drum; the image is then transferred to the paper and heated before the paper comes out of the printer. Examples are HP LaserJet 1100 series printer, HP LaserJet 5M (Color printer) HP LaserJet M1132 MFP, etc. Advantages of laser printers Very fast – 6-16 ppm for multiple choices Almost silent It prints many copies before the cartridge is used up Disadvantage Color laser printers are quite expensive but are cheaper to run than color inkjet printers. Bubble Jet printers. These printers are also called thermal Ink Jet printers. They also work by the print head nozzles spraying tiny droplets of ink onto the print surface. But here, the ink pumps heats ink in the ink channel until a bubble is formed; this bubble grows larger and larger until it bursts forcing a droplet of ink through the print head nozzle onto the print media. Since the droplets are heated Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 45 Basic Computing Simplified up, it dries faster on paper than the DeskJet printers. Canon BJC 200 is an example of a Bubble Jet printer. Photo printers. They are special purpose printers designed for printing photos Thermal printers. These printers have the print heads containing dot heaters (heating elements). During the printing process, the print head circuitry transfers electrical energy to each desired dot heater which heats up rapidly. The heated up dot heater then causes specific points on the special paper to discolor accordingly. The thermal printing paper normally discolors to a black or blue color in accordance to its make . 1. 2. 3. 4. Advantages of Thermal printers They are nearly noiseless since they do not have any moving parts to generate noise. They also consume very little power as compared to other printers Their print mechanisms are reliable because they do not experience inconveniences like paper jams or blocked nozzles. They produce clear and crisp images with very high resolutions. Disadvantages of Thermal printers 1. They cannot print on any other paper because the heat generated will not cause any discoloration without burning the entire paper. 2. The papers used for printing are also limited to a particular shelf life. I.e. the longer they stay unused or used, the more they will be affected by age, sunlight, humidity and chemical vapors which may cause it to discolor completely thereby causing characters to disappear. 3. They are not ideal for commercial printing. The papers need to be specially prepared before they can be used in printing and they can only be stored for a few years before they go bad. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 46 Basic Computing Simplified 4. They are expensive to maintain. The print heads cannot be serviced or repaired even if a single dot heater fails. The whole print head has to be replaced. 5. The print speed is also very slow because the heads have to be allowed to cool befor the next printing cycle. 6. Thermal print heads have a shorter life span than other print heads. They are expected to print a maximum of 10 million characters accurately whereas other printers like the dot matrix can print over 500 million characters in their life span. Braille printer. This printer produces patterns of raised dots on paper for use by the blind; this is done by converting text into Braille code. Multifunction printer. This type of printer can perform more than one task. They can operate as fax machine, copier and scanner in addition to their traditional printing duties. Methods of printing Characters Per Second (CPS). This is a method where the printer speed is rated by the printed characters per second. They use dots to create characters and graphics and are low speed printers. Lines Per Minute (LPM). This is where printers use the method of printing line by line and the printing speed is measured in printed lines per minute. Pages Per Minute (PPM). This is where printers use the method of printing page by page and the printing speed is measured by printed pages per minute. Common terms in printing Print spooler. This is a program that stores information selected to the printer. Printer buffer. This is a section of the memory in the printer that stores information that has been selected for printing. A spooler can store more information that the buffer and lets you continue using your computer without having to wait for a document to hurry printing. Less common types of printers include: Line printer, Daisywheel printer, Ball printer, Thermal printer, Plotter, Large format printer, portable printer, photo printer, label printer, Braille printer. Advantages of Non Impact Printers 1. They are much faster in printing 2. They have lower ink cost over time 3. It is easy to maintain them 4. Non impact printers are better for multi-use 5. It is easier to find their spare parts in case they need replacement 6. There is less time spent in refilling paper 7. They generate less noise compared to impact printers 8. They are much more reliable 9. They have a high quality print resolution 10. The printer cartridges and drums are recyclable, resulting in environmental benefits. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 47 Basic Computing Simplified Disadvantages if non - impact printers 1. More money is required to replace the toner/ink 2. They are expensive in terms of purchase 3. Their maintenance is more complicated 4. They are harder to use with old computer technologies. 5. A laser printer occupies a lot of space and emits dust particles that can cause respiratory diseases. 6. They cannot be used to produce multiple copies of a document in a single printing. Factors to consider when purchasing a printer i) Initial cost. Though the prices of printers have come down, laser and thermal printers are still expensive compared to inkjet printers ii) Print quality. Dot matrix are good for bulk printing of draft documents; laser is good for printing official documents while thermal printer is good for check-out counter receipts iii) Running cost. The cost of maintaining an inkjet printer is higher than that of maintaining a LaserJet printer. iv) Speed. The speed of a printer is measured in Pages per minute v) Color printing. Most printers support black and color printing. However, color printers, especially lasers are relatively more expensive vi) Printer buffer and spooler. To help holding back the information sent from the computer and releasing it at a rate the printer can handle. Review Questions 1. 2. 3. 4. Differentiate between soft copy and hard copy What is the difference between a CRT monitor and a flat-panel display? Name four criteria used when selecting a printer Distinguish between impact and non-impact printers and give two examples of each. 5. State one advantage and one disadvantage of laser and inkjet printers. 6. Nile Construction Company Limited intends to buy an output device they can used to produce road maps, which device would you advise the company to buy and why? 48 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified THE SYSTEMS UNIT This is the metallic casing that houses the most important components. The major integral components in a computer systems unit include: PROCESSING DEVICES The major integral components in a computer processing system are: Central Processing Unit (CPU) This is the main centre of activity in the computer which performs all the processing of data. Microprocessor. This is an integrated circuit containing all the functions of a central processing unit of a computer. 49 The CPU controls all the activities taking place within a computer. The CPU consists of three sub units: Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified a. Control Unit. This is the unit which controls and supervises the operations of a computer. Functions of the control unit. It directs data from storage to memory It sends data required for mathematical operations from the memory to the Arithmetic Logic Unit (ALU). It sends processed data to the printer or a storage device It erases/deletes/rubs data from the memory when instructed to do so It controls and times all tasks by the CPU (this is typical of multi-tasking where processor time is shared amongst competing tasks) It manages and coordinates all the units of the computer. It obtains the instructions from the memory, interprets them, and directs the operation of the computer. It moves a program statement to the instruction register. To coordinate all these activities, the control unit uses a system clock. The system clock sends electric signals as its means of communication in the CPU. The faster the clock pulses, the faster the CPU, hence the faster the computer can process data. b. Arithmetic Logic Unit (ALU). This unit consists of two subsections, namely: Arithmetic section Logic Section Arithmetic section This section performs arithmetic operations like addition, subtraction, multiplication and division. All complex operations are done by making repetitive use of above operations. Logic Section The basic function of the logic section is to perform logic operations such as It also identifies whether a number entered is positive or negative. It also compares two or more numbers to determine which one is than, equal to or lower than the other. This is performed due to the logic capability. It also merges data (combining two or more files a single file) c. Memory/Registers This refers to the area of the computer that stores data and programs during operation. Examples of registers include: Accumulator. It temporarily holds the results of the last processing step of the ALU. Instruction register. It temporarily holds an instruction just before it is interpreted into a form that the CPU can understand. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 50 Basic Computing Simplified Address register. This temporarily holds the next piece of data waiting to be processed. Storage register. This temporarily holds a piece of data that is on its way to and from the CPU and the main memory The systems motherboard. The motherboard is contained within the systems unit and all the vital components are plugged directly into the motherboard. The CPU is normally housed on the system board along with all other components. Other items such as the hard disk are attached to the system board either directly or via cables (buses) Data buses. A bus is an electrical pathway through which data passes. It is a circuitry that is responsible for transferring data to and from the processor. They consist of a set of parallel wires. Types of buses Control bus. This is the pathway for all timing and controlling functions sent by the control unit to other parts of the system Data bus. This is an electrical pathway where the actual data transfer takes place. It connects the CPU, memory and other hardware devices on the motherboard Address bus. This is the pathway used to locate the storage position in the memory where the next instruction data to be processed it held. It carries the memory addresses BIOS chip. BIOS stands for Basic Input Output System. They are software instructions that ensure that all the components on the motherboard work together. They are contained in a BIOS chip attached to the motherboard. When a computer is switched on, an electronic charge activates the BIOS instructions to execute the Power On Self Test (POST) routine. Device Interfacing Bays These are the points of contact on a computer which are used for connecting additional system components or peripherals to a computer Revision Questions 1. 2. 3. 4. Define the term Central Processing Unit Describe three functions performed by the CPU What is a microprocessor? Explain the functions performed by: a) Control Unit b) Arithmetic and Logical Unit c) Memory Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 51 Basic Computing Simplified 5. Name three special purpose memories found either inside or outside the microprocessor and explain what each does. 6. Explain the purpose of the system clock 7. What is the meaning of BIOS, and what role does it play in a computer? 8. List three buses found in the CPU UCE 2009 Paper 1 23. a) State any two functions of the Central Processing Unit (CPU) b) Define the following memory storage terms: i) Bit ii) Byte c) State two categories of computer memory giving an example in each case d) Describe the major difference between the two categories of computer memory in c) 24. a) What is a microprocessor? STORAGE DEVICES/DISK DRIVES A disk drive is a device which allows data to be read from or written to a disk, either a hard disk or compact disk. Storage devices are devices that store information for future use. They are called secondary storage devices. Secondary storage devices are classified according to: Portability as removable and fixed Technology used to store and retrieve data as magnetic, optical, magneto-optical and solid state. A. Removable Storage media. They are devices that are not housed inside the computer. They include: i. Floppy diskette. This is a secondary storage device/medium onto which data is stored randomly by means of magnetized spots on an inexpensive disk. Care for floppy diskettes and other magnetic storage media Do not bend the disk Do not touch the exposed data parts with fingers Do not apply paraffin Do not expose the diskettes to magnetic fields like radios, mobile phones, etc Always label diskettes for easy identification Do not write on or label using sharp pens or objects Store the disk in its jacket Hold diskettes by their corners Keep diskettes away from dust Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 52 Basic Computing Simplified Do not remove a media from the drive when it ias still being accessed by the computer because it may result into data loss. Do not drop magnetic media on the ground because the impact weakens magnetism. Advantages of floppy disks they are cheaper compared to other storage media they are protected in plastic casing they facilitate data transfer They are in standard sizes. E.g. 3 ½, 5 ½, 5 ¼ and 8 ¼. This make them very usable by different computer manufacturers. They can easily be edited and formatted They are flexible and easy to transfer Disadvantages They provide less storage capacity compared to hard disks They operate at a slow speed If not handled properly, they can lead to data loss Data can easily be lost once the magnetic media is exposed to magnetic fields They can affect machines with viruses ii. Zip disk. These are storage devices that were made to store medium amount of data. Their capacity is bigger than that of floppy disks. iii. Jaz disks. They resemble zip disks but they can hold as much as 2 GB. Data is read or written using internal or external jaz drives iv. High capacity floppy. High capacity disks simply known as HiFD disks are high capacity diskettes that can store up to 200 MB of data. HiFD drive can also read the magnetic 1.44 MB diskette. v. Laser Servo 120 SuperDisks. (LS 120), is a diskette that resemble a 3.5 inch diskette but uses optical technology. It has a greater storage capacity and speed of data retrieval (It can store upto 240MB). The LS – 120 can read and write both the 3.5 inch floppy disk and the 120 MB super disk. vi. Magnetic tape. This is a plastic tape coated with a thin film of magnetic material. They are mainly used with mini and mainframe computers. The main disadvantage is that they Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 53 Basic Computing Simplified only allow “serial access”. I.e. to access data at the end of the tape, it is necessary to roll past the rest of the tape first. NB: The above storage devices are known as magnetic storage media. Data is written using magnetic drives vii. Compact Disc This is an optical storage medium that contains data accessible by a computer. It is called compact disk because it is small with a diameter of 12cm and a thickness of a few millimeters. Information on a CD is permanently stored. Currently compact disks are available in three forms: Compact Disk Read Only Memory (CD – ROM). This contains data that can only be read but not written on Compact Disc Recordable (CD – R). They are coated with special dye which changes color to represent data when burned using a laser beam. Once data is burned on a CD-R, it becomes read only. NB: CD – ROM and CD – R are referred to as Write Once Read Many (WORM). Data is written only once but can be read as many times. Compact Disk Rewritable (CD-RW). These types allow a user to record, erase, and rewrite new information onto it. Advantages They hold a great deal of information in a very small area (Up to 700MBs of data). They are easy to store. They are portable because of their small size. Their data access speed is also very fast. They are convenient in distributing huge software programs because the data life of information in nearly 100%. Disadvantages They can attack computer systems with viruses Just a single scratch on a CD can make the whole CD useless viii. Digital Versatile Disc Read Only Memory (DVD – ROM) This is an advanced optical storage media format that can be used for data storage including movies with high video and sound quality. DVD resembles CD – ROMs but CD – ROM readers cannot read DVDs due to the fact that they are encoded in a different format of a greater density. A DVD can store 4GB of data and more which is available in recordable format which enable computer users to write and store data on it. For writing data on a DVD, a special writer must be installed in your computer. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 54 Basic Computing Simplified ix. Flash disks. These are devices that contain the type of memory which can be erased and are integrated with USB connectors. They are connected to the USB port; data can be written to and erased from memory using the current of electricity. NB: A flash disk is a solid state storage media. This is a type of media that employs integ9rated circuits rather than mechanical, magnetic or optical technology. x. Optical card. An optical card resembles a MICR card but data is read and written optically on a stripe. They are mostly used in banking and other business organizations to record customer details. xi. Optical tape. This is similar to a magnetic tape only that data is stored on it by using optical technology. The above devices are known as optical storage media. This is so because data is written to and read from them using a laser beam. Optical storage media is used because: They store very large volumes of data Data stored in them is more stable and more permanent than the magnetic media. B. Fixed storage media. They are devices mounted inside the computer. xii. Hard Disk Drive (HDD)/fixed disk. This is a metallic magnetic media housed in a rigid box inside the computer system. Advantages They provide a greater storage capacity They are speedy that the time of data access is very fast and convenient The data life of a hard disk is quite long once in use Data is always secure since they reside inside the system and have fewer chances of being stolen or misplaced. They facilitate data backup as they supplement RAM Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 55 Basic Computing Simplified Disadvantages They are relatively expensive They are prone to viruses They can crash leading to information losses Since they are metallic, they can expand and contract depending on temperature changes, thus, causing data loss Information can be easily lost once they are malfunctioned Most computer hard disks are connected to the motherboard via a channel called a controller. Some of these controllers are Integrated Drive Electronic (IDE), Enhanced IDE, or AT attachment (ATA) The following table shows the various disk drive types and their corresponding letters. However, in some cases, the drive letters may change Disk drive Drive letters 3.5 or 3 ½ inch floppy diskette A: 5.25 inch B: Hard disk/fixed disk C: CD-ROM D: Zip Drive E: Network (system drives) F: - Z: Revision Questions 1. 2. 3. 4. 5. 6. Differentiate between primary and secondary storage devices Distinguish between removable and fixed storage What are the advantages of a hard disk over a floppy diskette? Why re CD-ROMs and CD-Rs referred to as WORM? Describe the difference between magnetic and optical storage media Jet Publishers is a company that specializes in production of newspapers. One of the editors wanted to transfer a 50MB document from the hard disk of one computer to another using a removable storage media. Give four examples of the devices he/she could use. 7. Describe three precautions you would take to avoid damaging the hard disk. UCE 2009 6. Which of the following can be written to only once? A. Diskette B. Hard disk C. Flash disk D. CD-ROM UCE 2007 21. (c) i. Distinguish between primary and secondary storages ii) Give an example of each type of storage in c)i above iii) Identify one disadvantage of a hard disk over a floppy disk. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 56 Basic Computing Simplified UCE 2006 2. Which of these components is the brain of a computer system? A. Main memory B. Secondary chip C. Processor chip D. Power supply Other hardware devices Power supply unit. This is a device which controls the supply of power in a computer circuit as they need power in varying amounts. It is responsible for: Distributing power to different parts of a computer Converting Alternating Current (AC) to Direct Current (DC) Expansion slots. These are empty spaces found on the system board (motherboard) where control circuits or other separate devices can be attached later. E.g. modem, network adapter, sound card, etc. Device drivers or control circuits. These are devices that work as interface between the computer and other devices attached to it. E.g. monitor, keyboard, mouse, etc. Uninterruptible Power Supply (UPS). This is a device that controls the amount of current entering the computer. It therefore; Acts as a backup power in case of power failure It converts AC (Alternating Current) to DC ( Direct Current) needed for the computer Computer memory. This refers to the storage area or space in the computer where programs and data reside during computer operation. Functions of memory unit are: It stores all the data and the instructions required for processing. It stores intermediate results of processing. It stores final results of processing before these results are released to an output device. All inputs and outputs are transmitted through main memory. There are two basic types of computer memory: 57 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Random Access Memory (RAM) or Primary memory. This is the temporary type of memory found on the computer. It is also known as Main memory or primary storage. It is responsible for storing data, program and program result. It is a read/write memory which stores data until the machine is working. As soon as the machine is switched off, data is erased. Characteristics of RAM Access time in RAM is independent of the address that is, each storage location inside the memory is as easy to reach as other locations and takes the same amount of time. It is the temporary memory where the computer holds data for the current processing task. The user can read from it and write to it. Data in the RAM can be accessed randomly but it is very expensive. RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a power failure. Hence a backup uninterruptible power system (UPS) is often used with computers. RAM is small, both in terms of its physical size and in the amount of data it can hold. There are two types of RAM Static RAM (SRAM) The word static indicates that the memory retains its contents as long as power is being supplied. However, data is lost when the power gets down due to volatile nature. SRAM chips use a matrix of 6-transistors and no capacitors. Transistors do not require power to prevent leakage, so SRAM need not have to be refreshed on a regular basis. Because of the extra space in the matrix, SRAM uses more chips than DRAM for the same amount of storage space, thus making the manufacturing costs higher. So SRAM is used as cache memory and has very fast access. Characteristic of the Static RAM It has long life There is no need to refresh It is faster It is used as cache memory It has a large size It is expensive It has high power consumption Dynamic RAM (DRAM) DRAM, unlike SRAM, must be continually refreshed in order to maintain the data. This is done by placing the memory on a refresh circuit that rewrites the data several hundred Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 58 Basic Computing Simplified times per second. DRAM is used for most system memory because it is cheap and small. All DRAMs are made up of memory cells which are composed of one capacitor and one transistor. Characteristics of the Dynamic RAM It has short data lifetime There is need for DRAM to be refreshed continuously It is slower as compared to SRAM It is used as RAM It is lesser in size It is less expensive It has less power consumption Read Only Memory (ROM). This is the permanent type of memory found in the computer. The inbuilt permanent instructions which are put in at the time of manufacture are called Firmware and are stored on ROM chips. Characteristics of ROM The user can only read the contents but cannot write on it. This type of memory is non-volatile. The information is stored permanently in such memories during manufacture. It stores instructions that are required to start a computer. This operation is referred to as bootstrap. Types of ROM MROM (Masked ROM) These were hard-wired devices that contained a pre-programmed set of data or instructions. PROM (Programmable Read only Memory) PROM is read-only memory that can be modified only once by a user. The user buys a blank PROM and enters the desired contents using a PROM program. Inside the PROM chip there are small fuses which are burnt open during programming. It can be programmed only once and is not erasable. EPROM(Erasable and Programmable Read Only Memory) The EPROM is a read – only memory that can be erased by exposing it to ultra-violet light for a duration of up to 40 minutes. During programming, an electrical charge is trapped in an insulated gate region. The charge is retained for more than ten years because it has no leakage path. For erasing this charge, ultra-violet light is passed through a quartz crystal window (lid). This exposure to ultra-violet light dissipates the charge. During normal use the quartz lid is sealed with a sticker. EEPROM(Electrically Erasable and Programmable Read Only Memory) The EEPROM is a ROM that is programmed and erased electrically. It can be erased and reprogrammed about ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased one byte at a time, rather than erasing the entire chip. Hence, the process of re-programming is flexible but slow. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 59 Basic Computing Simplified Advantages of ROM They are non-volatile in nature. I.e. they do not lose their contents even when power goes off. These cannot be accidentally changed They are cheaper than RAMs They are easy to test They are more reliable than RAMs They are static and do not require refreshing Its contents are always known and can be verified Other memory options (Special purpose memories): Virtual memory. This is the storage space in the hard disk used to extend or expand the RAM. It enables the computer user to open more programs than the available RAM capacity can actually handle. Video Memory (VRAM). It is used to store display images for the monitor. Its size determines how fast images can appear on the screen, and the number of colors available for either monochrome or colored monitors. Flash memory. This is a non-volatile RAM chip inserted into the USB port to stimulate and supplement the hard disk. It is light and portable. Buffers. These are special memories that are found in input/output devices. Cache Memory. Cache memory is a very high speed semiconductor memory which can speed up the CPU. It acts as a buffer between the CPU and main memory. It is used to hold those parts of data and program which are most frequently used by CPU. The parts of data and programs are transferred from disk to cache memory by operating system, from where CPU can access them. Advantages Cache memory is faster than main memory. It consumes less access time as compared to main memory. It stores the program that can be executed within a short period of time. It stores data for temporary use. Disadvantages Cache memory has limited capacity. It is very expensive. Differences between Primary memory and Secondary memory Primary Memory Secondary memory These are semiconductor memories It is known as main memory. Usually volatile memory. These are magnetic and optical memories It is known as backup memory. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 60 Basic Computing Simplified Data is lost in case power is switched off. It is non-volatile memory. Data is permanently stored even if power is switched off. It is working memory of the computer. Computer may not run without primary memory It is used for storage of data in a computer. Faster than secondary memory Computer may run without secondary memory. Slower than primary memory. Measurement of Memory units A memory unit is the amount of data that can be stored in the storage unit. It is a unit in which storage capacity is expressed in terms of Bytes. Below are the main memory storage units: Bit (Binary Digit). A binary digit is logical 0 and 1 representing a passive or an active state of a component in an electric circuit. Nibble. A group of 4 bits is called nibble. Byte. A group of 8 bits is called byte. A byte is the smallest unit which can represent a data item or a character. Word. A computer word, like a byte, is a group of fixed number of bits processed as a unit which varies from computer to computer but is fixed for each computer. The length of a computer word is called word-size or word length and it may be as small as 8 bits or may be as long as 96 bits. A computer stores the information in the form of computer words. The table below summarizes the actual and equivalent measurement units of computer memory: 1 Bit 1 Byte 1 Kilobyte (KB) 1 Megabyte (MB) 1 Gigabyte (GB) 1TeraByte (TB = = = = = = 1 binary digit (0 or 1) 20 / 8 bits 10 2 bytes / 1024 Bytes 220 bytes / 1024 KB 230 bytes / 1024 MB 240 bytes / 1024 GB OR 1 Byte Approximately = 8 bits Actual Size Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 61 Basic Computing Simplified 1Kilobyte 1 Megabyte 1 Gigabyte 1 Terabyte = = = = 1,000 Bytes 1,000,000 Bytes 1,000,000,000 Bytes 1,000,000,000,000 Bytes 1,024 bytes 1,048,576 bytes 1,073,741,824 bytes 1,099,511,627,776 bytes The following are among the standard binary codes that have been developed with each standard having unique set: ASCII code. The ASCII code is a code that was suggested by the American Standard Code for Information Interchange (ASCII) and it consists of 256 characters. EBCDIC code. The Extended Binary Coded Decimal Interchange (EBCDIC) code was mainly used during the larger computers generation. I.e. Third generation machines. It is also referred to as the 8-bit ASCII code because it has fewer characters than the ASCII. BCD code The Binary Coded Decimal (BCD) code is the least used code that uses the 6-bit representation of characters. This 6-bit code is now outdated and almost extinct. The table below summarizes the comparison across the three major codes for each of the selected characters. Character Value A B C D 65 66 67 68 ASCII code 0100 0001 0100 0010 0100 0011 0110 0100 EBCDIC code 1100 0001 1100 0010 1100 0011 1100 0100 BCD code 110 001 110 010 110 011 110 100 Review Questions 1. Define the terms: volatile memory and non-volatile memory 2. Define and explain the differences between RAM and ROM 3. How many characters (bytes) of data are held in each of the following memories? 4KB, 640KB, 16MB, 20GB UCE 2009 17. The text you type is directly stored in……….. A. RAM B. A file C. A directory D. ROM 27. A computer system comprises hardware, software, user, data and communication. Describe the importance of each component. UCE 2008 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 62 Basic Computing Simplified 7. The device that stores programs and data when working with a computer and is lost when power is switched off is…… A. CPU B. ROM C. GUI D. RAM 28. a) Explain what is meant by volatile and non-volatile when referring to primary memory b) Explain the advantages and disadvantages of using primary and secondary storage devices UCE 2007 3. A device that interprets and executes instructions in the computer and also called the brain of the computer is the A. System Unit B. Base Unit C. CPU D. ALU CONNECTION TREMINALS (SLOTS, SOCKETS, PORTS) OF A COMPUTER Connection terminals are found both inside and outside the computer system. The ones found inside the system are called Sockets or Slots while the ones found outside the system are called ports. Slots, sockets and ports are always identified by the data bus width or architecture that is designed for them. A data bus width is the size of the paths that transfer data to and from the processor. These standards include ISA, EISA, PCI, etc depending on the data transmission that they support. Therefore, slots are classified as ISA, EISA, PCI slots or AGP slots as for those for the video card. Slots are long linear structures on the motherboard that have a series of connection pins which act as contacts to a card that may be plugged into them. Sockets are commonly processor sockets on the motherboard which are identified depending on the processor architecture they support. E.g. Socket 7 for Pentium I processors, socket 5 for 80486 processors. Peripheral device interfacing This refers to connecting a peripheral device to a computer through ports using either cables or wireless connectivity. A port is a physical connection point through which an external device can be connected to the computer. It can also be a programmatic connection point through which information flows from a program to computer or over the internet. A port has the following characteristics: External devices are connected to a computer using cables and ports. Ports are slots on the motherboard into which a cable of external device is plugged in Examples of external devices attached via ports are mouse, keyboard, monitor, microphone, speakers etc. Following are few important types of ports: Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 63 Basic Computing Simplified Serial (COM) Port It is used for external modems and older computer mouse and printers It is a male port with two versions: 9 pin, 25 pin models Data travels at 115 kilobits (kbps) per second – 1 bit at a time Small Computer System Interface (SCSI) Port It is a female 48 – pin port It transfers data at a higher rate than parallel ports They are for storage devices on the network Parallel (LPT – Line Printer) Port It is used for scanners and printers It transmits data in parallel bits It is also called printer port It is a female 25 pin model It is also known as IEEE 1284-compliant Centronics port that is commonly known as the local port (LPT). Personal System (PS/2) Port It is used for old computer keyboards and mice It is also called mouse port Most of the old computers provide two PS/2 port, each for mouse and keyboard It is also known as IEEE 1284-compliant Centronics port Universal Serial Bus (or USB) Port It can connect all kinds of external USB devices such as external hard disk, printer, scanner, mouse, keyboard etc. It was introduced in 1997. Most of the computers provide two USB ports as minimum. Data travels at 12 megabits per seconds USB compliant devices can get power from a USB port VGA Port Connects monitor to a computer's video card. It has 15 holes. Similar to serial port connector but serial port connector has pins, it has holes. Power Port It is connected directly on a power unit that is responsible for administering power There are two power ports: power input from the mains for the computer and power output to the monitor The input power port has three-pronged pins that plug into a female main power cable The output power port has three-pin plug in port. These ports always input power rating of either 110 – 220V 0r 220 – 240V depending on the power line rating in a particular area. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 64 Basic Computing Simplified Connects to the computer's power cable that plugs into a power bar or wall socket Firewire Port It transfers large amount of data at very fast speed. It connects camcorders and video equipments to the computer Data travels at 400 to 800 megabits per seconds It was invented by Apple It has three variants : 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector and 9-Pin FireWire 800 connector Modem Port It connects a PC's modem to the telephone network. This connection offers the capability of connecting (dialing in) to remote computers over the internet. Ethernet Port/Network Port It connects to a network and high speed Internet. It connects network cable to a computer. This port resides on an Ethernet Card. Data travels at 10 megabits to 1000 megabits per seconds depending upon the network bandwidth. Game Port Connect a joystick to a PC Now replaced by USB. Advanced Technology (AT) Port It is a female circular port with 5 holes arranged mainly in its lower circle It was developed in 1948 and widely used as the keyboard connector for IBM compatibles and clone computers. Apple Desktop Bus (ADB) port It is a female port consisting of 4 holes in pairs with a guiding square at the top It was used by earlier Apple computers as keyboard interface i.link port It transfers very large volumes of data in a short time It can achieve up to 400Mbps of data transfer It is suitable for interface devices like digital cameras, camcorders and other imaging devices A single link can connect up to 63 external devices Digital Video Interface (DVI) port It connects Flat panel LCD monitors to the computer's high end video graphic cards. It is very popular among video card manufacturers. Audio Port It is used to connect microphones and speakers to the sound card of the computer Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 65 Basic Computing Simplified Infrared interface Infrared, also referred to as Infrared Data Association (IrDA) is a wireless interface that uses infrared to connect to infrared – enabled devices. Bluetooth interface Bluetooth is also a wireless interface that uses short range radio broadcast to connect to any Bluetooth – enabled device. Review Questions 1. Define the following terms: a) Port b) Interface cable c) Power cable 2. What is the function of the power supply unit found in the system unit? 3. Differentiate between parallel serial interface cables 4. Give two advantages of a USB interface cable 5. What would happen if you bend the pins of a monitor port as you try to connect the monitor interface cable to the system unit? Computer hardware problems Excessively low or high temperature causes circuit or bus cracks, connection breaks and dislocation Corrosion as a result of coming into contact with atmospheric chemicals, food, human body and water, hence, causing rust. Effects of dust that builds thick coatings in slots, ports, internal chips, etc , therefore causing unnecessary heat, data and electric insulation Effect of electrical noise in form of electrostatic discharge causing short circuits, electromagnetic interferences and electromagnetic reductions travelling in space Electrical power variations causing blackouts, excessive low voltage, etc COMPUTER SOFTWARE Software is a set of instructions, given to a computer to accomplish various tasks. It can also be defined as the programs that a computer system utilizes to perform various tasks. Software also refers to the intangible components of a computer. A program is a sequence of instructions written to solve a particular problem. When a computer processes data, it follows a particular sequence of instructions. This sequence of instructions is stored in memory with specific details of What is to be done The alternative paths that can be taken once decision are to be made Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 66 Basic Computing Simplified a) b) c) d) e) f) Locations where inputs can be collected from Locations where outputs are to be written to Such a sequence is called a Program and the preparation of such instructions is called programming. Forms of software Packaged software. This is a commercial software which is copyright protected and is designed to meet the needs of a wide variety of users Custom software. This is a specially made software developed at a user’s request for a specific function. Freeware. This is a copyright software provided at no cost to the users but without permission to modify it. Shareware. This is a copyright software distributed for a trial period of time and payment is required for continued use after the trial period. Public Domain Software. It is a free software that is donated for public use and it has no copyright restriction. Firmware. These are programs built in the computer at factory level with special instructions for basic computer operation Types of computer software Computer software is divided into two main types or categories. Namely: 1. SYSTEMS SOFTWARE. This refers to a set of computer programs that control the way a computer operates. These programs are written by computer manufacturers or professional system programmers. Some of these programs reside in the ROM and are known as Firmware. Systems software is comprised of the following: a) Operating systems. This is a set of programs that contain instructions that manage and coordinate all activities among computer hardware. It manages resources such as Processors, Storage, Input & Output devices, Data and Programs. Functions of the Operating system It schedules and loads programs so as to provide a continuous sequence of processing It manages the processor by carrying out all controlling processes It enables the booting of a computer by accessing starter files called bootstrap loader It controls hardware devices. E.g. control over the selection and operation of devices for input, storage or output. It protects the hardware, software and data from improper use. E.g. preventing illegal access to system files It calls into memory programs and instructions when required It passes control from one program to another when more than one application program occupies memory Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 67 Basic Computing Simplified It helps in provision of error correction routines. E.g. when data is lost during transfer, it should be recovered It provides a record of whatever is happening during processing. E.g. keeping record of hardware use. It communicates with the user. E.g. reporting suspended programs due to errors, request for operation like “insert disk”, etc. It manages the storage of various processes and data into the memory It provides an interface for applications by acting as a translator for all application software in their utilization of resources. It sends interrupt requests to the CPU to be handled An interrupt is a break from the normal sequential processing of instructions in a program NB: Input/output control programs are the programs that control the input from various devices and output to those devices as well. Classifications of operating system Previous Operating Systems were classified according to the platform they operated on. E.g. PDA Operating System. The operating systems below have been classified according to the number of users and tasks they perform: Real Time Operating Systems (RTOS). These are types of operating systems designed to control the system resources of a given computer in exactly the same manner that each time, a given set of condition occurs. Computers that use RTOS have no interaction with humans and can only be used for control purposes. E.g. industrial robotic for control of machines. It runs one application program in the main memory at a time. Single User Single Task Operating Systems (SUST OS). These are operating systems designed for use in those computing devices that are commonly used by one user at a time. Such computers using SUST OS carry out limited tasks and operation but they use other bigger computers to accomplish their bigger roles. E.g. PDA Operating Systems. Single User Multitask Operating Systems (SUMT OS). These are operating systems where a single user can have access to all system resources when performing various tasks. A user can type a document, download emails, and play audio files at the same time. E.g. Microsoft windows 98, 200, XP Multi User Multitask Operating Systems (MUM OS). These are operating systems capable of running several processes and are designed to support many users at the same time. Here, each user has a portion of the system resources sufficient for their operational requirements. E.g. VMS on the mainframe computers, VME on the ICL mini computers. Single User Network Operating System (SUN OS). This is an operating system that is capable of 68 supporting very many interconnected users on a network. E.g. Novell Netware, Microsoft Windows 2000 server, Windows NT, etc. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Examples of operating system software include: Disk Operating System (DOS). This operating system uses Command Line Interface (CLI) and it is the main system control program that enables the computer to operate. The user controls by typing commands like DEL, RUN, and CHKDSK at a prompt. With DOS, you can load only a single program into memory at a time. For instance, you can copy a file called Fruits.Dat from a hard disk C to a floppy disk A as follows: COPY C:\Fruits.DatA:\ NB: the user must press the enter key for each command to be executed. Examples of those operating systems are PC-DOS, OS/2, UNIX and MS-DOS. Command Line Interface Functions of DOS are: Controlling the flow of information between the user and the computer It allows a user to store information in the computer It allows a user to retrieve information stored in the computer It interrupts and translates the software in the computer It gives access to all its functions. I.e. saving, copying and printing files, etc Advantages of Command Line Interface It is very flexible and can alter the parameters to do different things Commands are very fast with experienced users The user can achieve a lot with just one command Disadvantages of Command Line Interface It is quite difficult to learners It is less suitable for beginners or irregular users It is prone to typographic mistakes At times, use of obscure abbreviations or key words and syntax is very important 69 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Windows Operating System. This operating system uses window and icon based Graphical User Interface (GUI). E.g. Microsoft Windows 95, Microsoft Windows 2000, Microsoft Windows XP, Windows Vista, Windows 7, etc. Graphical User - Interface Networking Operating System. These are operating systems designed to be used on computers that exist on a network. E.g. Windows NT, Novell Netware, Solaris, etc UNIX. This is a multi-user and multitasking operating system. It can run multiple applications and multiple tasks) Linux. This is an “open source software”. Its code is made available to the public. E.g. Ubuntu, SuZie, Red Hat Linux, etc PDA Operating System. This is an operating system designed to be used by Personal Digital Assistants. E.g. Pocket PC 2002, Palm OS, etc. Factors to consider when choosing an operating system a) The hardware configuration of the computer such as the memory capacity, processor speed and hard disk capacity. b) The type of computer in terms of size and make. c) The application software intended for the computer d) User-friendliness of the operating system e) The documentation available f) The cost of the operating system g) Reliability and security provided by the operating system h) The number of processors and hardware it can support i) The number of users it can support. b) Utility Programs. These are system programs that perform tasks usually related to managing a computer and its devices or programs. Utility programs are classified into two: System utility. This is a program that increases operation of the system software. For example; device drivers. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 70 Basic Computing Simplified NB: A device driver is software designed to interpret instructions from the OS to the devices and from the devices to the OS. Application utility. This is a program which boosts the performance of the application software. Examples of utility programs. (i) Debuggers. These are used during the testing of a program. They are able to trace the flow of a program and display various values as requested. Therefore, errors are traced and removed from the program (ii) Sorting utility. This is used to rearrange data in any order as specified by the user. E.g. in ascending or descending order. (iii) Merging utility. This is a utility program used to combine two or more files to produce only one file (iv) Copying / Backup utility. This is used to duplicate/move contents of as file from one location to a backing storage device. (v) Antivirus utility. This is used to detect, remove and prevent viruses from the computer’s memory or storage device. (vi) File compression utility. It is used to reduce or compress the size of a file. E.g. PK ZIP and WinZip (vii) Diagnostic utility. It compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems. (viii) Disk scanner. It detects and corrects both physical and logical problems on a disk (ix) Disk defragmenter. It reorganizes the files and unused space on a hard disk (x) Uninstaller. it removes an application and its associated entries in from the system files (xi) Screen saver. It causes the screen to display a moving image or a blank screen if no keyboard or mouse activity occurs for a specified period. This protects the screen. (xii) Data recovery utility. It is used to undelete a file or information that has been accidentally deleted. E.g. recycle bin for windows, Norton un-erase wizard, etc (xiii) Data processing utility. It removes redundant elements, gaps and unnecessary data from the computer storage. E.g. Drive space to stacker, Double disk, super star pro, etc. (xiv) File viewer. It displays the contents of a file. (xv) Memory management utility. It determines how to efficiently control and allocate memory resources (usually activated by software drivers. (xvi) Disk repair utility. It checks your disk drive for defects and makes repairs on the spot. E.g. Norton disk doctor. Review Questions Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 71 Basic Computing Simplified 1.What is a system software? 2.Outline the importance of an operating system 3.Give four examples of operating systems and their respective uses 4.Why do computers need network software? 5.Define the term utility as used in computer software 6.Outline and explain the uses of at least six utility programs. UCE 2009 9. Real time processing is a task of…….. A. Utility program system B. Tailor made application C. Programming language D. Operating 25. a) Explain the following terms: i) Off-the-shelf software, example ii) Custom software, example c) i) What is a utility program? ii) State any four functions of utility programs 7.Which of the following is necessary for running application software? A. Operating system B. Network Interface Card Interface C. Utility program D. Graphical User 26. a) i. Explain what is meant by the term Operating System ii) Give any two features of a graphical interface. UCE 2007 8.Computer programs used in tasks such as removal of viruses or data compression can be categorized as A. Word processors B. Desktop publishing C. Utility programs D. Communication programs UCE 2006 8. An antivirus is an example of A. A user interface C. An application software B. An operating system D. A utility program 22. a) Explain the following terms as used in computer studies i) System software ii) Application software iii) Utility programs 72 b) Outline four functions of an operating system software Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified c) List any five operating systems that you know UCE 2005 24. c) Define the following terms: j) Software ii) Hardware iii) Application program k) d) Programming Languages. This refers to a set of instructions that tells the computer what to do during the programming process. It can also be defined as a set of symbols and usage rules employed to direct the operation of a computer. A program is a set of instructions that a computer must follow in order to process data into information. There are many programming languages. However, they can be placed in two basic categories; namely, Low Level Languages and High Level Languages. (i) Low Level Languages. They are called low level languages because they are used for designing programs or instructions for the processors. They include: Machine Code Language. This is also referred to as first generation languages. It consists of binary numbers. Information is stored in computer circuits as “On” and “Off”; the “On” and “Off” can be represented in the binary system by the two values 1 and 0 also called Binary Digits (BITS). The example below shows the ASCII (American Standard Code for Information Interchange), and EBCDIC (Extended Binary Coded Decimal Interchange) coding systems: Value 1 2 3 4 5 6 7 8 9 10 Binary code (EBCDIC) 1111 0001 1111 0010 1111 0011 1111 0100 1111 0101 1111 0110 1111 0111 1111 1000 1111 1001 1111 1010 ASCII 0011 0001 0011 0010 0011 0011 0011 0100 0011 0101 0011 0110 0011 0111 0011 1000 0011 1001 0011 1010 A B C D E F 1100 0001 1100 0010 1100 0011 1100 0100 1100 0101 1100 0110 0100 0001 0100 0010 0100 0011 0100 0100 0100 0101 0100 0110 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 73 Basic Computing Simplified G H I J 1100 0111 1100 1000 1100 1001 1100 1010 0100 0111 0100 1000 0100 0101 0100 0110 Advantages of Machine Code Language It can be used directly by the computer without interpretation They are machine or computer reliant It is highly efficient and allows control of each operation. It allows the programmer to pay more attention to the problem Disadvantages of Machine Code Language It is less user friendly. i.e. not very easy to learn, write and correct It is time consuming during programming It is more technical compared to others Each type of processor had its own set of codes, so that machine code programs written for one processor could not be used on another Assembly Language. They are also referred to as Second Generation Languages. It used English tags such as “ADD” or “SUB” for the codes to add and subtract values. These tags were called mnemonics. However, for the processor to understand these codes, they have to be translated first to machine code by use of an assembler. Advantages of Assembly Language Programs could be written more easily than with machine code language It had a closer control over the computer hardware and executes very efficiently It is useful for writing operating systems and game programs which require fast and efficient use of the CPU It is more user friendly compared to machine code It is less technical compared to machine code It is less time consuming as compared to machine code Disadvantages of Assembly Language They are designed for specific machines and specific processors Programming using assembly language is laborious (ii) High Level Languages. These are third generation languages whose instructions resemble human language or mathematical notations, hence, making it easy to learn and understand. In a high level language, fewer instructions are written and therefore a lot is done in less time It is less technical compared to first and second generation languages It is more user friendly Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 74 Basic Computing Simplified Types of High Level Languages Scientific languages. These are languages with the ability to handle mathematical expressions and procedures. They have inbuilt mathematical functions and can handle arrays. E.g. FORTRAN and Algorithmic Oriented Language (ALGOL) Special purpose languages. They are languages designed to be tailor made for a particular type of functions like wages, inventory management, machine control, etc. e.g. Business or Commercial languages. Command languages. These are programs used to control the operation of the computer. E.g shell used with UNIX. Multipurpose languages. These are languages intended to cope with a variety of different types of application areas. E.g. business, science, health, etc. examples include; BASIC, PASCAL, C, C++, PL/1 by IBM. Translation of a high level program is done by Compilers and Interpreters. Examples of high level languages are: a. COBOL (Common Business Oriented Language). It was produced to enable efficient software to be produced for business applications. Examples are: payrolls, accounting and stock control. Advantages It is fairly easy to understand It enables programmers to easily arrange records within a file It enables programmers to produce reports It can be used on different types of computers Disadvantages Coding is lengthy and tiresome to make. It takes longer to learn b. BASIC (Beginners All Purpose Symbolic Instruction Code). It was developed as a means of introducing non-science students to the fundamentals of programming. Advantages of BASIC It is the easiest of all the programs It is so popular Several books exist that are used as self teaching manuals Disadvantages It is not a standard language There are many different versions of BASIC with so little compatibility between them c. FORTRAN (Formula Translator). It was developed by IBM to write scientific, mathematical and engineering applications because of its simplicity, conciseness, consistency, effectiveness and numerical accuracy. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 75 Basic Computing Simplified Advantages of FORTRAN It is widely accepted and understood It is easy to write a simple FORTRAN program Disadvantages of FORTRAN Using it for other applications other than scientific and engineering applications is quite difficult Input and output operations cannot be accomplished easily Creating easy to read reports or screen display is difficult d. PASCAL. It was named after Blaise Pascal. The language was developed to teach the concepts of structured programming. Advantages of PASCAL It reinforces the principles of structured programming It cannot be used in business since is limited to scientific applications e. C. this is the most portable general purpose language. It isa choice for many operating systems and application packages. Other derivatives of C include C+ and C++ Other high level languages include: APL (A Programming Language) PL/1 (Programming Language 1) PROLOG (Programming in Logic) ALGOL (Algorithmic Language) LISP (List Processing) JAVA PHP (Hypertext Preprocessor) PERL (Practical Extraction and Report Language) (iii) Application Generators (Fourth Generation languages). These are Very Very High Level Languages (VVHLL) designed to allow a user to program by only telling the computer what to do and the computer does the programming by itself. The user defines certain tasks and then the application generators will create the program code that will perform the tasks that have been defined. E.g. SQL (Structured Query Language), NOMAD, Focus, Intellect for IBM, C++, etc. (iv) Artificial Intelligence languages (Fifth Generation Languages). These are programming tools that allow questions or commands to be in a more conversational way. They are normally used in Intelligent Knowledge Based Systems (IKBS) such as robots. (v) HTML (Hyper Text Markup Language). This is one of the programming languages used to create web pages for the internet. (vi) Language Translators. These are programming tools which change high level languages to machine code language. They include: Compilers. A compiler is a language translator that converts the entire program of a high level language into machine language before the computer executes the Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 76 Basic Computing Simplified program - (Executes later). Examples of High Level languages using compiler are Pascal, C, COBOL and FORTRAN. Assembler. An assembler is a language translator that translates an assembly language into machine code. It allows a programmer to use abbreviations or easily remembers words instead of using numbers or binary codes. An assembler assigns specific memory spaces with each symbol name such that even if the program changes or is transferred to another processor, it will still function well. Interpreter. An interpreter is a language translator that converts each high level language statement into machine language and executes immediately, line by line. Due to their way of operation, interpreters make the entire computing process very slow and less productive. Linker. A linker is a system software program that combines compiled programs and determine where they will be located in memory. 2. APPLICATION SOFTWARE. Definitions: This is a set of instructions that are designed to enable a computer to perform a specific task. These are programs that are designed to solve users’ specific problems. Application software is sometimes referred to as “application packages” or “packaged software”. They make the computer perform different activities of users like word processing, spreadsheets, accounting, etc. Application software is designed to run with one particular operating system. However, cross-platform applications can run on multiple operating systems. Application software is divided into two categories, namely: 1) Tailor made / custom / in-house developed software (Special Purpose) 2) Off-the-shelf / packaged software.(General Purpose) 1) Tailor made / custom / in-house developed software. These are applications software developed at a user’s request and to perform a specific purpose. Advantages of tailor made software They are easy to manipulate. They increase productivity. They cater the needs of a firm by providing all the necessary details. They improve image Disadvantages of tailor made software They are very expensive to design and develop They are very rigid since they can only be used by one customer They are time consuming to develop They need a lot of specialized skills which require expensive special training. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 77 Basic Computing Simplified 2) Off-the-shelf / packaged software / commercially developed software. These are applications software developed and sold out to users to solve different problems of the users. The above types of software can also be classified as: Special purpose application software. Software designed to be used by specific industries or markets. E.g. medical practice management tools, educational tools, legal software, etc. General purpose application software. Software designed to be used by a wide range of organizations and home users for various purposes. Examples include Microsoft Office Applications (Office suites) ranging from Microsoft Office 97, Microsoft Office 2000, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, etc. which includes Word Processing using Microsoft Word, Spreadsheet using Microsoft Excel, Database Management System using Microsoft Access, Presentation using Microsoft PowerPoint, etc. besides Microsoft Office Applications, there are also Open Office Applications with a combination of Linux and Unix Operating Systems. E.g. Internet and e-mail applications, multimedia, graphics applications, communication software, speech recognition software, workgroup software, middleware, enterprise software, component software, schematic software, etc. Advantages of off-the-shelf software They are readily available in software shops. They are cheap to obtain. They are flexible since they can be used by and organization. They are entertainment and leisure tools. They do not need specialized skills. They have educational value. Disadvantages of off-the-shelf software They are very easy to manipulate since they are almost known by everyone They are not very secure They may not handle some problems with ease (i) Word Processing. These programs are used to create, edit, format, save and print documents that contain text, and graphics such as letters, newsletters, brochures, reports, advertisements, books, etc. Examples include: Microsoft word, Lotus WordPro, Word Perfect, etc. 1) Advantages of using Word Processing Software over the use of an ordinary typewriter. Easy and fast to make changes. 2) Has many features to create documents that look professional and visually appealing. 3) Documents can be reviewed before printing them. 4) Documents can be saved for future use and editing. 5) It is convenient to create formal letters and mailing labels. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 78 Basic Computing Simplified 6) It is possible to move blocks of text to different positions in the same document. 7) Lines of text can be inserted and deleted. 8) It is possible to alter the layout of the document before printing. 9) Mistakes can be corrected. 10) Typed documents can be stored in the computer 11) Other text can be merged into a document without having to type it again. 12) The document can be printed many times. (ii) Spreadsheet. They are general purpose programs used to perform calculations. Spreadsheets comprise a grid of numbered rows (1, 2, 3 …) and lettered columns (A, B, C ...). The location where a row intersects with a column is called a cell. The cell may contain text or numeric values. Each cell in within a spreadsheet is given an address. For example, A4 is Column A and Row 4. Examples include: Microsoft Excel, Lotus 123, Quattro Pro, Pegasus, Ms Works and VisiCalc, SuperCalc, etc. Facilities offered by spreadsheets include: Storing formulae enabling them to be recalled, amended and re-used. Copy formulae from one cell to other cells. Formatting numbers to the required number of decimal places, etc. Creating graphs from given data. Storing information Making use of special functions such as average, standard deviations, square roots, etc. 1) Advantages of spreadsheet software over manual worksheet. Easy to make changes and correction of data on the worksheet. 2) When a formula is used, the result from the calculation will automatically be adjusted whenever related data is changed. 3) Operation is fast with the help of built-in functions 4) Calculation is always accurate, provided that the data and formula entered is correct 5) It is easy to create different kind of charts or change the chart types using a spreadsheet. 6) Information on charts is updated automatically whenever related data on the worksheet changes. 7) Electronic spreadsheets are much larger than manual spreadsheets. This allows the user to keep related information together and to produce large reports. 8) Cells in electronic spreadsheets can use information from other cells such as formula or values. 9) Electronic spreadsheets can be stored and retrieved for repeated use, editing, updating and printing. Spreadsheets can be used in a number of applications such as in analyzing statistics, creating business plans, creating business budgets, calculating profits and losses, sales forecasting, etc. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 79 Basic Computing Simplified 3. Data management software. These are used to create, access and manage large amount of information related to a particular subject. E.g. product details, telephone directory, phone book, etc. There are two types of data management software:Simple Filling programs patterned after the traditional manual data filling techniques Database Management Systems (DBMS). Is a collection of files serving as the data resource for computer based information systems. Examples of database software include: Microsoft Access, Lotus Approach, Dbase I, II, III, IV, Paradox, Oracle, File Maker Pro, etc. 4. Presentation Software. These are used to create computer-based slide show. They are mostly used to communicate ideas and information to an audience. E.g. during meetings or seminars to enhance a speaker’s or presenter’s ideas graphically. Examples of presentation software include: Microsoft PowerPoint Lotus Freelance, Harvard Graphics, Macromedia Director, etc. Functions of presentation software It helps users to organize and present information to an audience. It provides tools that help to outline your thoughts and build a presentation quickly using professionally designed templates It is used to enhance your presentation with pictures, charts, sound and video 5. Desktop Publishing software. These are used to combine text and graphics to create a professional publication. Examples include: Adobe PageMaker, Aldus PageMaker, Microsoft Publisher, etc. 6. Graphics software. These are programs used to create, edit and print graphics ranging from charts, paints, drawings and images. Examples include: Adobe Photoshop, Adobe Illustrator, Paint shop, etc. 7. Communication software. These are programs that help to create a connection among computers on a network. These connections can be through cables, telephone lines or satellite systems. They include software browsers like Eudora, Netscape, Microsoft Navigator, etc. 8. Speech recognition software. These are programs that translate voice patterns into text. There are two types of speech recognition software: Discrete speech recognition. This can interpret only one word at a time, so users must place distinct pause between words. Continuous speech recognition. This can interpret a continuing stream of words. 9. Workgroup software. These are programs that help groups and teams to work together by sharing information and by controlling workflow within the group. Products are designed to support tasks such as Project management Scheduling Workflow Retrieval of data from shared database, etc. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 80 Basic Computing Simplified 10. Middleware. This is a software designed to link application modules developed in different computer languages and running on various platforms. Enterprise software. These are programs that manage the vital operations of an organization such as Supply chain management Inventory renewal Ordering Human Resource Management Operation accounting and financial management 11. Component ware. These are application software in which programs manage one type of operation. 12. Schematic software. These are programs that can create schematics, space plans, layouts, etc. Software suites. These are collections of application software packages bundled together. Characteristics of application software i. They are menu driven. I.e. the user takes a choice out of a number of options. ii. They are user friendly. Many of them have Graphical User Interface which makes it easy to learn and use. iii. They are targeted to a wide range of users iv. They are designed for power and flexibility so that their capabilities are addressed irrespective of the hardware v. The packages are designed to work on a range of computer systems and data can be transferred from one computer to another. vi. vii. viii. ix. x. xi. xii. xiii. Close to user Easy to design More interactive Slow in speed Generally written in high-level language Easy to understand Easy to manipulate and use Bigger in size and requires large storage space Review Questions 1. Differentiate between system software and application software 2. What are the advantages of packaged software over the in-housed software? 3. Outline the advantages of a word processing program over the use of an ordinary typewriter 4. What advantages do spreadsheet applications have over manual spreadsheets? 5. Describe four functions of the operating system 6. What is an interrupt? 7. What are the advantages of GUI based operating system over the command line? Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 81 Basic Computing Simplified 8. Differentiate between multitasking and multi-user operating systems 9. Outline the factors you would consider when buying an operating system. Relationship between Hardware and Software Hardware and software are mutually dependent on each other. Both of them must work together to make a computer produce a useful output. Software cannot be utilized without supporting hardware. Hardware without set of programs to operate upon cannot be utilized and is useless. To get a particular job done on the computer, relevant software should be loaded into the hardware Hardware is a one-time expense. Software development is very expensive and is a continuing expense. Different software applications can be loaded on hardware to run different jobs. A software acts as an interface between the user and the hardware If hardware is the 'heart' of a computer system, then software is its 'soul'. Both are complimentary to each other. SYSTEM START – UP AND CONFIGURATION Starting a computer The booting system. Booting is the process of powering on a computer and starting the operating system. Booting takes two forms: Cold booting. The actual starting of a computer which has been initially off. Procedures for booting up a computer When you turn on the computer, you may hear the sound of the cooler fan running. After a few seconds, lines of text start scrolling up on the screen. This process is known as Power-On-Self-Test (POST). POST checks on the existing drives, basic input and output devices such as keyboard, monitor and mouse. If a problem is encountered, the POST is halted and an error message is displayed on the screen. POST is accomplished by a special firmware program called Basic Input Output System (BIOS) which is held in a ROM chip mounted on the motherboard. After POST, the computer reads some instructions such as the current date and time from a special memory known as the Complementary Metal Oxide Semiconductor (CMOS). CMOS is powered by a dry cell that mostly resemble that of a digital watch. If the cell is down, the computer requires the user to enter the current date and time. Lastly, a special type of computer program used to manage computers called an Operating System (OS) is loaded to the computer memory. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 82 Basic Computing Simplified Microsoft Windows desktop Warm booting. The process of restarting a working computer To restart; Click the start button On the start menu, click the shutdown Then click Restart Or, Press Ctrl + Alt + Del Reasons for restarting a computer To recover from errors that cannot be recovered When a computer freezes or locks After installing certain new software programs After uninstalling a hardware device After installing a new hardware device like a flash disk After uninstalling a software program When the computer slows down After changing CMOS or BIOS setup When a computer has a virus, it can constantly restart itself Shutting down a computer It is important that the user follows the correct procedure of shutting down a computer at all times. If the procedure is not followed, then loss of data, damage of programs and computer components may occur. To shut down, follow the procedures below: Ensure that all the work has been properly saved. This process is called saving. Close all programs that may be currently running If your computer is running on Microsoft Windows XP or Vista, a) Click on the Start button b) On the start menu, click Shut Down c) On the message box that appears, Click Turn Off 83 The Basic Input Output System (BIOS) Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified These are software instructions that ensure that all the components of a motherboard work together. When a computer is switched on, an electronic charge activates the BIOS instructions to execute the Power-On-Self-Test instructions known as the POST routine. The BIOS POST routine performs functions like: Interfacing between the hardware and the Operating System Interfacing between the processor and the Operating System Activating additional hardware BIOS The Power-On-Self-Test (POST) routine The POST routine is the sole responsibility of the BIOS in a computer. In this routine, a set of activities is carried out such as; Loading custom settings. During POST routine, the BIOS checks the RAM storage area known as the Complementary Metal Oxide Semiconductor (CMOS) for custom system settings. Theses settings may include the type and size of the various storage devices available on the system, the system data and time, Input/Output (I/O) ports on the system, etc. Loading interrupt handlers. The POST also loads the interrupt handlers and special drivers into memory. Interrupt handlers are the software instructions that interface between the processor and hardware components. For example, a key press signal on a keyboard is passed onto the keyboard interrupt handler that informs the processor the character it represents and eventually the processor sends it to the Operating System Loading special settings. For common special drivers like the display drivers, if the display adapter has its own BIOS, then it is activated at this stage. Otherwise, the default display driver is loaded. Reboot checking. At this stage, the POST routine checks whether the current process is a warm boot or cold boot. This is done by checking the memory address 0000 0472 for a specific value. If the value stored here is 1234h, then it is considered as a warm boot and the rest of the POST routine is ignored; it instead loads the Operating System. In case it is a cold boot, each memory address is checked for consistency and size. Checking for auxiliary devices. The POST routine the checks and records any additional external devices attached to the computer through plug in slots. These devices include the keyboard, printers and other devices Displaying summary information. The BIOS then displays information on the screen about what has been checked on the computer. This information includes the BIOS manufacturer’s name and the interrupt handler, etc. Passing control to the Operating System. At this stage, it checks for a drive that contain the boot information as indicated in the CMOS. When the boot information is found, it is executed and BIOS now passes control to the Operating System otherwise it halts. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 84 Basic Computing Simplified The type of BIOS on a motherboard depends on the manufacturer and usually all motherboards come with at least a BIOS chip installed. Among the common BIOS manufacturers are American Megatrends Inc., IBM, Intel, Phoenix technologies, etc. How an Operating System organizes information Most operating systems organize information in a three-tree hierarchy as shown below. Information organization tree Files. A file is a collection of related data given in a unique name for ease of access, manipulation and storage on a backing storage. A file icon Every file has the following: 1. A unique name and an optional extension. The name and extension are separated by a period (.). E.g. June. Doc. In this case, the file name is June and the extension is Doc. Extensions are used to identify to the type of file, for example: .doc is as word processor file .txt is a plain text file .sys is a system file. 2. The size, date, and time the file was created or modified Types of files There are three types of files, namely: system, application and data files. System files contain information that is critical for the operation of the computer Application files hold programs and are executable. Data files contain user specific data Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 85 Basic Computing Simplified The table below shows some file extensions and whether it is a system, application or data file Extension File type Description .doc Data A Microsoft word document file .txt Data A plain text file created using note pad or DOS editor .tif Data A graphic file created using applications such as Adobe Photoshop .exe Application file The file that launches a particular application. E.g. Winword.exe, PM.70.exe, etc .bat System files File containing a series of commands loaded during boot up .sys System files System files that perform fundamental operations in a computer Folders. This is also known as a directory in some operating systems. It is a named storage location where related files can be stored. All folders or directories originate from a special directory called root directory or folder. The root directory is represented by a back slash (\). A folder or directory may be created inside another folder or directory. Such a folder is called a subfolder or a subdirectory. Factors that affect a computer’s performance 1. CPU clock speed. The CPU clock speed determines how fast a CPU operates. The higher the CPU clock speed, the faster the computer. CPU clock speed is measured in Hertz (1 MHz = 1million cycles per second) or Gigahertz (1 GHz = 1,000 Megahertz = 1 billion cycles per second). Modern PC clocks already have CPU clock speed of several GHz. 2. RAM size. The more RAM a computer has, the faster it can operate. The reason is that if the RAM is not sufficient, the computer has to use the hard disk to store data temporarily which when compared to RAM, has a slower access time. 3. Graphic cards. The quality of a graphic card is another key factor which affects a computer’s performance. Graphic cards are essential hardware units fixed within a PC. The role is to convert digital signals from the CPU to the signals that can be displays on the monitor. The lower the quality, the slower the process. 4. Free hard disk space. The larger the free space on a hard disk, the faster the computer’s speed; the smaller the free space, the slower he computer processes data. The hard disk should have enough free space to store temporary data. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 86 Basic Computing Simplified CRITERIA FOR SELECTING A COMPUTER SYSTEM a. Hardware considerations. There are a number of factors to be considered before acquiring a computer or hardware accessories. These include: 2. Microprocessor type and speed. The user should consider the microprocessor and an acceptable speed that meets the user requirements at a fair price. The processing power, speed and cost of a computer mainly depends on the type of processor and its clock speed. Some of the microprocessors available today include: Pentium IV, Intel Celeron, etc. 3. Warranty. The user should consider whether the seller is ready to provide after sales services. A warranty is an agreement between the buyer and the seller that spells out the terms and conditions of repairing or replacing a sold product in case of failure or malfunctions. 4. Cost. The cost of a computer depends on its processing capability, size, whether it is branded or duplicate. Branded computer are more expensive than the duplicate ones. 5. Upgradability and compatibility. The hardware bought must be compatible and easy to upgrade 6. Portability. Portable computers such as laptops are ideal for people who do not take most of their time in office. 7. Special user needs. When selecting a computer hardware, consider the unique user needs. E.g. if a user has a physical challenge, consider buying voice input devices. 8. Monitor. The choice of a monitor depends on the size, resolution and the technology used on it. Currently, flat panel displays are replacing CRT monitors. 9. Multimedia capability. This refers to the ability of the computer to process and output text, sound, video and pictures. A multimedia system consists of speakers, CD/DVD drive, sound card and a SVGA monitor. b. Software considerations: 1. Authenticity. This refers to the validity of an item. The user should make sure the software is an original copy accompanied with the developer’s license and certificate of authenticity. 2. Documentation. These are the manuals prepared by the developer having details on how to install, use and maintain the software. 3. User needs. It should be able to meet the needs of the user. For example, if a user needs to type only documents, then he/she would go for a word processor. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 87 Basic Computing Simplified 4. Reliability and security. A good software should be reliable and have security that protects data from illegal access. 5. User friendliness. A good software should be easy to be operated on computers by users. 6. Cost. The cost of software must be carefully considered before acquiring them against the benefits they are likely to bring. Software tends to be more expensive than hardware. It is not advisable to always go for freeware because some of them may contain malicious programs. 7. Compatibility and system configuration. A software product should be compatible with the existing hardware, operating system or application programs and should be upgradable. 8. Portability. The user should consider whether a given program can be copied or installed in more than one computer. Review Questions 1. Highlight hardware and software factors that you would consider when purchasing a computer 2. Define the term booting a computer 3. Briefly explain the steps needed for a complete cold boot 4. Differentiate between cold booting and warm booting 5. Outline seven reasons for carrying out a warm boot. Revision Questions 1. Write the following abbreviations in full: a) CPU b) ALU c) CU d) ROM e) RAM 2. Give examples of special memories found in the CPU 3. What do the following abbreviations in relation to storage capacity stand for? a) KB b) MB c) GB d) TB 4. Differentiate between MICR and OCR 88 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified COMPUTER SECURITY Computer security refers to the safeguards required to control access to information and protect computer-based systems against the hazards to which computer systems are exposed. Security controls help to ensure high system standards and performance by protecting against hardware, software and people failure. Computer systems and data in storage are vulnerable to several hazards which include: Computer virus Fire Natural disasters Environmental problems Disruption THREATS TO SECURITY Computer Viruses: A computer virus is a deviant program that attaches itself to the computer system and destroys its operations or corrupts data. NB: a virus burrows in the computer memory and keeps consuming or occupying successively the idle parts of the memory until the system crashes. How are viruses developed? Through infected diskettes from infected computer systems Through sales demonstration applications Through networks Through software updates Through free computer games on the net, etc Through pirated software. These are software that have been copied without the permission of the owner. From software laboratories. Programs can be infected without the manufacturer’s knowledge Through the use of the network (internet) An employee of an organization can also introduce such viruses knowingly. Symptoms of viruses Annoying messages Adding garbage to files A computer system switches on and off Unnecessary variations in computer processing speeds Deletion of saved files or destructive functioning of the computer system The computer system fails to start (boot failure) Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 89 Basic Computing Simplified Unprecedented screen color changes Crashing of the hard disk Reformatting of the hard disk Corrupted files and applications Types of viruses Virus classifications can be based on the following: Environment Operating system Different algorithms of work Destructive capabilities 1. Boot sector viruses (BSV) These are viruses which attach themselves and reside in programs containing instructions for booting or powering up the computer system. E.g. anti-CMOS virus, Anti-EXE, etc. 2. File viruses These are viruses which attach themselves to files which loads a program. I.e. executable files. E.g. in DOS, files with extensions “com” or “exe” 3. Multipartite viruses These viruses combine the traits of both the file and boot sector viruses. E.g. junkie virus, parity boot viruses, etc. 4. Macro viruses These viruses are found inside common data files such as those created by e-mails, spreadsheets, and word documents. They are routine viruses or syntax viruses. E.g. Concept virus in word documents. 5. Logic bomb. These are viruses set to cause danger at a set date or time. 6. Trojan horse. This is a virus that places an illegal and destructive instruction in the middle of a genuine program or file. Once the program is run, the Trojan horse is also activated to begin destruction. E.g. Format C virus. Malware – Malware is a short form for malicious software. It refers to a software that is intended to damage or disable computers and computer systems. It can appear in the form of executable cod, scripts, active content and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software. The term badware is sometimes used and applied to both malicious malware and unintentionally harmful software Malware includes the following: Spyware/adware - refers to a category of software that, when installed on your computer, may send you pop up ads, redirect your browser to certain websites that you visit 90 How to protect a computer system against viruses 1. Buy software from legal vendors Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified 2. 3. 4. 5. Avoid running unchecked or scanned files. Avoid running files with an attachment from an unknown source on the network. Backup your files and folders regularly Use Netware with strong validation checks and in-built firewalls. e.g. Linux (i.e. Hardware and software which can limit unauthorized data through networks to reach your workstation) 6. Disable auto micros functions for macro viruses 7. Use antivirus programs. These are utility programs used to scan files and programs in order to detect, destroy or quarantine files infected with viruses. E.g. Avast antivirus, MacAfee, Kaspersky, AVG, etc. Routines to enhance or boost computer security of a company or organization. Computer users must recognize their role in security. If a high level priority is assigned to security, employees must be made aware of it and the security measures that must be taken. A company must recognize the need for a well-trained security force maintain the premises. People who will have access to computer rooms, terminals and storage facilities should be screened. Safeguard computers with strong doors and padlocks or use security guards to guarantee its safety Employees who stay beyond legal and ethical boundaries must be discharged. Whenever an incident occurs, people involved must be disciplined accordingly There must be only one entrance into the building with a guard stationed there all the time Packaged good getting in and out of the building should be inspected Access to computer facility should be limited to only those whose presence is needed. Visitors must be kept out. Record on visitors who enter the computer room must be kept. Tapes and diskettes must be locked, if possible in fireproof safes. Backup copies should be made and kept safely elsewhere under the control of a responsible person like a librarian, chief programmer, etc. Backup files are copies of important files that should be regularly saved on separate disks or tapes and clearly labelled. Uninterruptible Power Supply (UPS) units should be installed from power backup to provide continuous processing in case of power blackout. Operators must be rotated such that they do not handle the same work always. Passwords must be used to gain entrance into computer programs. All equipment should be covered with plastic covers when not in use. The premises, personnel and computer systems must be insured. Note that this does not replace information in case of damages. Two similar computer systems can be run side by side in different geographical locations to give cover to each other. Strict control must be on every input and output to check whether the storage devices are infected or free form viruses. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 91 Basic Computing Simplified Establish an emergency procedure in case of fire outbreak. Guards should be placed at strategic points of the computer facility. All visitors who are given permission to tour the premise must be escorted by a security guard. All persons entering the computer room must sign a register indicating time of entry and departure respectively. Sensitive reports must never be disposed of by simply throwing them in waste containers. The building should be constructed from concrete slab. 92 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified COMPUTER/COMMUNICATION NETWORKS A Computer network is the interconnection of two or more computers and other devices for purposes of sharing information and resources The computers on a network must be linked by a medium such as cables, a wireless device or a telecommunications system in order to exchange data The network may be limited to a group of users in a local area local area network, or to a wide area network covering several cities or regions, or the entire world in case of the Internet Reasons for Computer networks instead of standalone computers? To Allow users to share information, To enable sharing of software, To enable sharing of hardware To enable communication between computer users through tools like e-mail To enable data communication ie transmission of electronic content over a given medium To ensure security of data by putting in place administrative controls over the network To share databases Factors to consider for a network choice Size of the organization. A peer-to-peer network is ideal for a small organization Needs of the network. E.g. network administrator, hardware and software, etc. Level of data security needed. A peer-to-peer network is not very secure Amount of network traffic expected. (band width) Network budget for the network system development and servicing. A linear bus network may be the least expensive one to install. You do not need to buy concentrators. Level of administrative support available Type of business or organization. Length of cable needed. The linear bus network uses shorter length of cable Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topology. Future growth. With a star topology, expanding the network is easily done by adding another concentrator. Advantages of a computer network It Facilitates easy communications e.g. through Electronic mail It Reduces on cost by sharing hardware like printers and sharing software among network users since one device is jointly used on the network instead of installing devices to each computer it allows for tight control over who has access to data in the system It enables sharing of data and information stored on any other computer on the network It enables online learning and collaborative research Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 93 Basic Computing Simplified It allows access to free common databases and databanks like free software and ATM services Software is easily upgraded on the network since it is done at ago on the server Computer networks enable centralized administration, control and monitoring of individual users on the network Computer networks enable workgroup Computing Workgroup software allows many users to work on a document or project concurrently Networks provide a very rapid method for sharing and transferring files instead of using time consuming method of using movable disks to transfer data from one computer to the other It enables flexible access Users can log on and access their work from any workstation on the network The disadvantages of Networks High Initial cost of installing a network on Cables, network cards, network equipment and software, and the installation may require the services of a technician High costs on network administration and maintenance of a network Time can be wasted on social networks instead of doing meaningful work The entire network fails if the server crashes, when this happens, the entire organization loses access to necessary programs and files High risk of data corruption, since many users will be using the system to access the same documents, some of whom may be careless or deliberately tamper with it Increased exposure to hackers which puts private data at risk There is a greater risk from viruses, because they are easily spread between the computers share a network A break in the communication channel can stop the entire network Information theft Change of file names by hackers and crackers Abuse of data e.g. malicious deletion of Data The Components of a computer network These are elements that make up a computer network: Network interface card Terminal nodes e.g. Computers and Printers Communication (Network) media/Channels e.g. Ethernet cables and access point Network software e.g. network operating system Switches or hubs The Network hardware devices include: Hubs/concentrators MODEM Switches Repeaters Bridges Routers Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 94 Basic Computing Simplified Network Interface Cards (NICs).etc Network Interface Cards (NICs)/network adaptor A network interface card is an electronic communication device that connects a computer to a local area network Some NICs are built on the motherboard while others built on a circuit board fitting into an expansion slot inside the computer The Type of NIC determines the speed and performance of a network There are three common NICs: Ethernet cards, Local Talk connectors, Token Ring cards MAC address A Media Access Control address (MAC address or physical address) is a unique identifier assigned to network interfaces Hubs/Concentrators A hub is a device that connects multiple devices to the network and its function is to send and receive signals along the network between the devices connected to it by broadcasting the data to all the devices/computers It serves as a central meeting place for cables from computers, servers and peripherals on the network The entire network shuts down if there is a problem on a hub Repeaters A repeater is a device that is used to regenerate and amplifies signals along a communication channel to create long-distance networks by placing it between two segments of the network channel to overcome distance limitations Bridges A bridge is a device that links two local area networks that use the same address method or protocol It accepts all packets from each network addressed to devices on the other, buffers them, and retransmits them to the other network Switches A switch is a high-speed device that sends the data packets only to the destined computer keeping track of which hardware addresses are located on which network segment Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 95 Basic Computing Simplified It maps the IP address with the MAC address of the LAN card Switches are used in the LAN, MAN and WAN Router A router is a device that links one network to other physically and logically separate networks The main function of the router is to sort and send data packets to their destinations based on their IP addresses Gateway A gateway is a device that connects the LAN with the internet A gateway interconnects networks with different network protocol technologies by performing the required protocol conversions MODEM A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device Fax modem A fax modem is a device that enables a computer to transmit and receive documents as faxes Communication media/channels Also known as communication links or Data links A communication channel is a medium over which Data travels/is transmitted from one computer (device) to another Forms of Data communication Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint communication channel Examples of such channels are copper wires, optical fibers, wireless communication channels, and computer buses The data is represented as an electromagnetic signal, such as an electrical voltage, radio wave, microwave, or infrared signal Data is transmitted over networks using signals, which are transformed, or encoded, by computers into the voice, video, graphics, and/or the print we see on our computer screens The signals used by computers to transmit data are either digital or analog Analog signals are continuous signals that vary in strength Sound is an example of an analog signal Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 96 Basic Computing Simplified Digital signals are discrete/discontinuous Either there is a signal or there isn't a signal, therefore they are represented by on (1) and off (0) pulses Modulation and Demodulation of Signal Modulation refers to the process of converting digital signals into analog form so that data can be sent over the phone line Demodulation is the process of converting the analog signals back into digital form so that they can be processed by the receiving computer The hardware that performs modulation and demodulation processes is called a MODEM Serial transmission Serial transmission is the sequential transmission of one bit of signal at a time sent over a single wire Low data transfer rates are possible, but can be used to transfer data over longer distances Parallel transmission Parallel transmission is the simultaneous transmission of the signal elements of a character or other entity of data over two or more separate paths Multiple electrical wires are used which can transmit multiple bits simultaneously, which allows for higher data transfer rates than can be achieved with serial transmission Asynchronous Data transmission Transmission where each group of digital or analog signals making up the code for one character is separated and individually wrapped with a start BIT and a stop BIT and an error check BIT Asynchronous transmission is relatively slow because of the extra bits that must be sent with the data bits for each character Synchronous Data transmission This is the transmission where characters are sent as blocks of signals with header and trailer bytes at the beginning and end of the block Synchronous transmission is faster because characters are sent as blocks; it is therefore used to transmit large volume of data at high speed Duplex transmission A duplex communication system is a point-to-point system composed of two connected parties or devices that can communicate with one another in both directions An example of a duplex device is a telephone Full-Duplex (FDX) transmission Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 97 Basic Computing Simplified A full-duplex (FDX) system, sometimes called double-duplex, allows communication in both directions simultaneously e.g. Land-line and Cell telephone networks are full-duplex, since they allow both callers to speak and be heard at the same time Half-Duplex (HDX) transmission A half-duplex (HDX) system provides communication in both directions, but only one direction at a time (not simultaneously) An example of a half-duplex system is a two-party system such as a walkie-talkie Simplex Simplex is a communication that occurs in only one direction For example, Radio and Television broadcast, communication between a mouse and computer Point to point transmission A point-to-point connection refers to a communications connection between two nodes or endpoints Multi-Drop transmission A transmission bus in which all components are connected to the electrical circuit A process of arbitration determines which device sends information at any point The other devices listen for the data they are intended to receive There are both physical (cable or wired) media, and wireless media Transmission media Common transmission media include the following: Twisted pair cables Coaxial cables Fiber optic cables Terrestrial Microwave Radio Satellite Twisted pair cables A twisted pair cable consists of eight insulated copper wires twisted in pairs and arranged in a regular spiral pattern to minimize the electromagnetic interference between adjacent pairs There are two types of twisted pair cables; Shielded twisted pair (STP) and unshielded twisted pair (UTP) Each pair is twisted to decrease interference Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 98 Basic Computing Simplified Advantages of twisted pair cables They are relatively cheap to use because its cost per unit length is low They are convenient to use because they are small in size They are easy to install because of their flexibility it is easily strung around the room or wall Shielded twisted pair has a foil shielding to help provide a more reliable data communication Because UTP is small, it does not quickly fill up wiring ducts TP is easy to terminate The Disadvantages of twisted pair cables Used over a short distance, usually less than 100 meters Twisted pair’s susceptibility (prone) to the electromagnetic interference which leads to signal loss They are easily damaged Especial the UTP They are low frequency cables So they are not suitable for transmission of very high frequency signals like cable TV, TV antenna and radio antenna signals Coaxial cables A coaxial cable is one that consists of two conductors that share a common axis hence the name “co-axial” The inner conductor is a straight wire, and the outer conductor is a shield that might be braided or a foil.The two conductors are separated by a nonconductive element Features of coaxial cable (Advantages) Both conductors share a common center axial, hence the term "co-axial" It has a high bandwidth It is highly resistant to signal interference It is used for long distance (300-600 meters) Disadvantages of Coaxial cables It is quite bulky and sometimes difficult to install the most common type of connector used with coaxial cables is the BNC connector It has higher installation costs Coaxial is prone to lightning strikes which damage the cables or equipment on which it is connected It is more expensive than twisted pair cables It is not flexible The Fiber Optic cables Fiber Optic Cable is a transmission medium, which is made up of hundreds to thousands of fine, light-conducting filaments made up of glass or plastic Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 99 Basic Computing Simplified Data is changed into pulses of light, which are sent down these glass or plastic fibers at very high speed over long distances. Fiber optic cable consists of a center glass core surrounded by several layers of protective materials Advantages It has protection against environmental interference It has high data carrying capacity (bandwidth of up to 2 Gbps) It can be used over greater distances due to the low loss, high bandwidth properties It can be used for 2km without the use of a repeater Fiber optic networks operate at high speeds -up into the gigabits Greater resistance to electromagnetic noise such as radios, motors or other nearby cables Fiber optic cables cost much less to maintain They are light weight and small in size, which makes them ideal for applications where running copper wires would be impractical It is difficult to tap data over a fiber optic without being noticed due to difficulty of connecting new nodes when others are switched on They are poor conductors of electricity which eliminates the possibility of electrical shocks Disadvantges Fiber optics are expensive compared to the other types of cables They are difficult to install and modify, therefore require skilled installers It is difficult to add additional nodes on the network It is much more costly than other cables to install Wireless media Wireless communication technology, is one where the transfer of information over a distance is done without the use of cables (wires) as a medium Wireless technology is applied in Local area networks (WLANs), extended local area network, and connecting a network to another network Wireless technology overcomes the inconvenience of using too many wires for communication Wireless is appropriate to use in places where cabling is practically impossible Wireless increases flexibility and mobility at the work place because workers can sit anywhere with their computers without being limited by the extent of cable connections Types of wireless media Radio Microwave Infrared Blue tooth Microwave transmission Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 100 Basic Computing Simplified Microwave transmission refers to the technology of conveying information or energy by the use of radio waves whose wavelengths between one meter and one millimeter Microwave transmission requires line of sight in order to work properly because it is a point-to-point connection This means microwave must be transmitted in a straight line (with no obstacles such as buildings or hills in the line of sight between the microwave stations) The distance covered by microwave signals is based upon the height of the antenna Microwave communication can take two forms: terrestrial (ground) links and satellite links Terrestrial microwaves use Earth-based transmitters and receivers, sending data from one microwave station to another Earth-based transmitters Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks to avoid obstructions Microwave transmissions use parabolic antenna and dishes that produce a narrow, highly directional signal Limitations of Microwave Microwave signals are highly subjected to atmospheric interference Microwave can be exposed to electronic eavesdropping Communications Satellites Satellites are communication devices stationed in space and use microwave radio as their telecommunications medium to communicate with the earth based communication facilities Satellites are capable of receiving and relaying voice, data, and TV signals to and from earth based communication facilities (earth stations) that use parabolic antennas (satellite dishes) to communicate with the satellites Satellite microwave communication is flexible and possible with most remote sites and with mobile devices, because no cables are required, which enables transmission with ships at sea and motor vehicles Radio transmission Radio is the transmission of signals, by converting them into electromagnetic waves The electromagnetic waves are transmitted in space towards the destination Electromagnetic waves are intercepted by the receiving Antenna The signal power is collected at the receiving antenna Radio waves are not a line of sight transmission, therefore not affected by presence of objects between the transmitter and receiver Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 101 Basic Computing Simplified Infrared transmission Infrared (IR) light is electromagnetic radiation with longer wavelengths than those of visible light Infrared signal is usually transmitted across relatively short distances to transmit data between personal devices for example, between a computer and a cell phone Infrared can be either beamed between two points or broadcast from one point to many receivers Bluetooth Bluetooth is a short range wireless technology which Operates at approximately 1Mbps with range from 10 to 100 meters Bluetooth is an open wireless protocol for data exchange over short distances Wireless Local Area Network (WLAN) A WLAN is a network that provides wireless network communication in a small geographical area using high frequency radio signals or infrared light beams or microwave or Bluetooth to communicate between the workstations and other devices Clients communicate with the access point using a wireless network adapter similar in function to a traditional Ethernet adapter A wireless local area network (WLAN) links two or more devices using a wireless distribution method (spread-spectrum) Most modern WLANs are based on IEEE 80211 standards, marketed under the WiFi brand name The WAP usually connects to a wired network, and can relay data between wireless devices and wired devices Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. An example of open-standards wireless radiowave technology is IEEE 80211b. The wireless LAN network devices Wireless network adaptors, wireless access points, wireless bridges, wireless routers, and antennae Wireless Access Point A wireless access point (WAP or AP) is a device that connects wireless communication devices together to form a wireless network To be able to communicate with a wireless device, the computer must have a wireless network adaptor WLAN adaptor/card This is a device that provides an interface between the network operating system and an antenna to create a wireless connection to the network Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 102 Basic Computing Simplified Access point (AP) AP is the wireless equivalent of a LAN hub. It receives buffers, and transmits data by means of a wireless antenna between WLAN and a wired network An outdoor LAN bridge is a device used to connect LANS in different buildings WLAN can be built with either of the following topologies: Peer-to –Peer (Ad hoc) topology Access Point –based topology Point –to–Multipoint bridge topology Peer –to-Peer (ad hoc) topology In the ad hoc topology devices are configured to communicate directly to each other Access point –based topology This is where access point(s) are used to enable a wireless device to communicate with any other wired or wireless device on the network Access points are used to bridge traffic onto a wired or wireless backbone, or where network devices are interconnected using access points Point –to –multipoint bridge topology This is where a wireless bridge is configured to connect a LAN in one building to a LAN in another building even if the buildings are not close together but within a clear line of sight Wireless Wide Area Network (WWAN) This is a wireless network over a wide area in which separate areas of coverage are connected wirelessly Wireless Wide Area Networks equipment Long distance wireless equipment include: Satellite Microwave dishes Microwave antennae The Wireless Web The wireless web refers to the use of the World Wide Web through equipment like cellular phones, Pagers, PDAs, and other portable communications devices that offer anytime/anywhere connection Wireless Application Protocol (WAP) The Wireless Application Protocol (WAP) refers to a group of related technologies and protocols widely used as a standard protocol in providing Internet access to mobile phones or other small mobile devices Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 103 Basic Computing Simplified WAP protocol involves a website transmitting scaled-down versions of normal web pages specifically optimized for use by wireless telecommunications devices such as smart phones Advantages of a wireless network Cost reduces because there is no need to buy and lay cables Work is reduced for setting up the network because there are no cables involved It enables usage of a variety of devices on network such as personal digital assistants (PDA), blackberry devices, and other cell phones It enhances mobility and flexibility of a network due to ability to move devices without the restriction of cables for example, mobile phones and laptops Fast data transfer rates are possible where there are no environmental obstacles It also allows an organization to offer visitors Wireless technology makes it easy to set up temporary network installations These situations include any temporary department set up for a specific purpose that soon will be torn down or relocated Wireless technology is becoming cheaper and affordable over time Disadvantages of a wireless network Poor security of data on a wireless network, outsiders can easily log on an unsecured wireless network They are slower than LANs using cabling They are prone to electrical interference from lights and radios They are Subject to obstructions such as walls Wireless access points and WI-FI technology in general have a limited spectrum/range Signal strength decreases as the range increases Network software Network software are Communication programs that are used in combination with network devices to enable transmission of data between network terminals They have features such as Dialing, file transfer, internet access and others Categories of network software Network operating system (NOS) Network protocols A network operating system is a supervisory software program that resides on the server and controls a network by; (i) Defining who can use the network (ii) Determining how information is shared (iii) Controlling access by multiple users to network resources such as files and hard ware, Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 104 Basic Computing Simplified (iv) Providing for certain administrative functions, including security Examples of common NOS; Novell Netware, Microsoft Windows NT, windows server*, AppleShare, UNIX, Linux NOS carries out administration activities which include: Managing the Security of the network by providing Security features such as authentication, authorization, logon restrictions and access control File management Providing basic operating system features such as support for processors, protocols, and automatic hardware detection and supporting multi-processing of applications Providing name and directory services Coordinates the activities of multiple computers across a network Providing file, print, web services, back-up and replication services Network protocols A protocol is a set of rules and procedure (standard) for connection and data transfer between devices on a network Protocols control all aspects of data exchange, which include the following: How How How How How the physical network is built devices connect to the network the data is formatted for transmission that data is sent/transmitted to deal with errors in data transfer The Protocols are created and maintained by a number of different organizations and Committees including: Institute of Electrical and Electronic Engineers (IEEE), American National Standards Institute (ANSI), Telecommunications Industry Association (TIA), Electronic Industries Alliance (EIA) International Telecommunications Union (ITU) Commonly used protocols TCP/IP-transmission control protocol/Internet protocol HTTP-Hypertext transfer protocol FTP-file transfer protocol POP-post office protocol SMTP-Simple mail transfer protocol IPX/SPX-stands for Internetwork Packet Exchange/Sequenced Packet Exchange IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems 105 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified NETBEUI-(NetBIOS Extended User Interface) is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network it does not support the routing of messages to other networks, Telnet (TELecommunication NETwork) for Remote access between computers IMAP; Internet Message Access Protocol The Point-to-Point Protocol (PPP) which is a data link protocol commonly used in establishing a direct connection between two networking nodes TCP/IP configuration TCP/IP configuration is the setting involves assigning of IP addresses. This Configuration is either Static or dynamic Static IP configuration Static networks are setup such that each node always has the same IP address Static IP addresses are fixed addresses that only change manually Dynamic configuration Dynamic networks are setup in such a way that the IP addresses for the computer are controlled by the DHCP server DHCP (or Dynamic Host Configuration Protocol), is a means by which an IP address may be assigned to a computer on boot When the DHCP client boots, it puts out a request on the Local Area Network for a DHCP server to assign it an IP address Domain Name system The Domain Name System (DNS) translates the easily memorized domain names (e.g. www.google.com) to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide The Domain Name System is an essential component of the functionality of the Internet TYPES OF NETWORKS Local Area Networks (LANs) Wide Area Networks (WANs) Metropolitan Area Networks (MAN) International network (Internet) Local Area Network (LAN) A LAN is a group of computers, printers and other devices interconnected within a small geographical area such as a room or a building The devices must be interconnected using a medium such as cables or a wireless medium Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 106 Basic Computing Simplified LANs allow individual users to locally share computer files and hardware such as printers and disks Metropolitan Area Networks (MAN) A MAN is a computer network larger than a LAN but smaller than a WAN connecting Computers and LANs which are geographically separated but in same city Wide Area Networks (WANs) A WAN is a number of computers and peripherals connected together over a large geographical distance such as across districts, cities or re.g.ions (10 km and more) WANs make use of a wider variety of communication media compared to LANs including Telephone lines, Microwave links (wireless), Satellite connections and fiber optic cables Components of a LAN A LAN is made up of the following components: Workstations Network interface cards Peripheral devices Networking media Networking devices Network server Types of LANs Peer to Peer network Client-server Peer to Peer This is an interconnected group of equal computers where there is no hierarchy among them, each computer acts as both a client and a server to others on the network. Each computer has resources it shares with others on the network Merits of Peer-to-Peer Network It’s very easy to set up It’s appropriate in case of a small network (few computers) Inexpensive to set up and maintain Enables easy sharing of devices such as CDs and printer It’s flexible Demerits of Peer-to-peer Network It lacks security due to absence of a server There is no central administration It’s not appropriate for big networks (cannot be used for big networks) Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 107 Basic Computing Simplified Client server network A network that consists of a central computer (the server) on which other computers (clients) are connected. The central computer providing services to client computers NETWORK SERVER A server (Network server) is a computer on a network that controls and manages the network resources, making them available to its clients (computers connected to it) Client Computer Client computer is one that is connected to the Network server to receive services from the server Advantages of Client-server network It offers a reliable centralized storage and sharing of files It ensures high security of the network through access controls installed on the server It is easy to monitor the network performance on the server It is easy to solve network problems It’s cheap to install software which can be done on the server alone instead of all computers on the network Disadvantages of client-server network It’s expensive to setup Extra expenses on buying a server computer Extra expenses on hiring a network administrator The server is one point of failure In case the server fails to work, the whole network comes to a standstill Types of Network Servers File server: One that stores various files and making them available to network users Application servers: stores application software packages run directly on it and made for users on the network Printer server: a central computer that manages a networked printer from a single location Web server: It allows users to access outside networks, also providing web content/web pages to users Mail server: Manages mail by receiving, moving and storing mail on the network Proxy server: A computer placed between a LAN and an external server or networks (Internet), to filter requests and restrict access to data Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 108 Basic Computing Simplified A proxy server receives a request for an Internet service from a user If the request passes filtering requirements, looks in its local cache of previously downloaded Web pages If it finds the page, it returns it to the user without needing to forward the request to the Internet If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses its own IP addresses to request the page from the server out on the Internet When the page is returned, the proxy server forwards it on to the user Network Topology Topology is the physical and logical arrangement of a local area network, hence physical topology and logical topology The physical topology of a network refers to the physical arrangement of cables, computers, and other peripheral devices in relation to each other on a network. Logical topology is the method used to pass information between workstations on a network Types of physical Network topologies Bus network topology Ring network topology Star network topology Hierarchical network topology Mesh network topology Hybrid topology Tree topology Point-to-Point Bus topology or linear bus topology Bus network topology is one that consists of a main, central cable known as the backbone with a terminator at each end of it, on cable all devices on the network are connected to the main/central cable Advantages of Bus topology It is less expensive than a star topology due to less footage of cabling, only needs one main cable and no network hubs It is good for smaller networks not requiring higher speeds It has a high transmission speed if coaxial cable is used It is easy to add new workstations on the network Multiple servers can be used Easy to connect a computer or peripheral to a bus Requires less cable length than a star topology Disadvantages of Bus network It is Limited in size and speed The Entire network shuts down if there is a break in the main cable Difficult to troubleshoot It is difficult to identify the problem if the entire network shuts down It is less secure since all data is transmitted down one main cable Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 109 Basic Computing Simplified Transmission slows down as more work stations are added If the main cable fails, then all workstations are affected Ring topology This is an arrangement where each device on the network is directly connected to one another in the shape of a closed loop or ring Each data packet is sent around the ring until it reaches its final destination Advantages of ring topology It is Cheaper to install since there is less equipment required High speed can be achieved as each workstation can boast the signal Signal flow is one direction which avoids the danger of data collision Where a double ring is involved data flow is continuous even in cases where one ring brakes down Disadvantages of a Ring network Moves, additions and changes of devices affect the entire network High expense since it requires fixing two network cards on a single computer If a connection in a single ring is broken the entire network stops working Having no central server makes data very insecure Fairly slow as data pass through a number of workstations before reaching its destination Star topology A star is a topology designed with each device on the network connected directly to a central network hub or switch such that Data from a device passes through the hub or switch before continuing to its destination Extended Star topology This is a network where more than one star network topology are connected together to form a big/extended local area network At the center of the star is a hub or a switch Advantages of Star topology It is suited for large networks It is easy to expand the network without ne.g.atively affecting it If one cable or station fails, the entire network is not affected It is easy to install, maintain and troubleshoot because the problem usually isolates itself That is, it’s easy to detect faults and to remove parts Cabling types can be mixed to maximize efficiency High speed transmission is possible since each station has a dedicated cable Greater security as connection from one station to server is unique No disruptions to the network when connecting or removing devices Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 110 Basic Computing Simplified Disadvantages of Star topology Breakdown of the switch/Hub becomes a single point of network failure It’s expensive to set up due to increased cabling costs and the need for a switch or hub Mass of cables around in case of a large network If the cable fails the workstation cannot receive data via any other route The server can get congested as all communication must pass through it Requires more cable length than a bus topology If the hub or switch fails, nodes attached are disabled Hierarchical topology It is like the extended star topology, except a computer controls traffic instead of a hub or a switch Hybrid Topology Hybrid Topology is a network that has two or more different types of physical topologies connected to each other to form a complete network. There are many different combinations that can be created such as bus plus Star (tree) A hybrid topology is easier to connect to other computers than some other topologies The hybrid topology has a faster connection Tree topology This is a network that combines characteristics of bus and star topologies; It consists of groups of star connected workstations connected to a bus backbone cable Tree topologies allow for the expansion of an existing network, and enable organizations configure a network to meet their needs Advantages of Tree topology Allows for Point-to-point wiring for individual segments Supported by (compatible with) several hardware and software Disadvantages Tree topology Overall length of each segment is limited by the type of cabling used If the backbone line breaks, the entire segment goes down More difficult to configure and wire than other topologies Mesh topology This is a network where each device has its own direct link to each of all the other devices on the network It provides each device with a point-to-point connection to every other device in the network A mesh topology is implemented to provide as much protection as possible from interruption of service Damage of one or a few cables or computers may not have vital impact except the involved Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 111 Basic Computing Simplified Computers Data can be routed through any other computer connected to the network It is the most expensive and difficult to maintain topology because each device has a Point-to-point connection to every other device Point-to-Point Topology Point-to-point (PTP) topology connects two nodes directly together. The following examples are pure point to point links: Two computers communicating via modems A mainframe terminal communicating with a front end processor A workstation communicating along a parallel cable to a printer Considerations When Choosing a Topology/network to have: Cost of installation. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators Number of computers and other devices to connect/size of the organization The architecture of the building to be used The purpose of the network Distance of connectivity Safety provisions of the network Personnel provisions/technicalities involved Ease in accessing the network Length of cable needed. The linear bus network uses shorter lengths of cable Future growth With a star topology, expanding a network is easily done by adding another concentrator Cable type to use. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies Logical topology (Media Access Method) Logical topology is how computing devices access the network and send data over the network. The logical topology of a network determines how the devices communicate across the medium There are four commonly used media access methods: Ethernet, Token Ring, Local Talk, and FDDI 1. Ethernet (Physical/Data Link layers) Ethernet is a type of local area network technology that uses coaxial cable or special grades of twisted pair wires. Ethernet is also used in wireless LANs Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 112 Basic Computing Simplified The most commonly installed Ethernet systems are called 10BASE-T; (Baseband transmission) Technology of speeds up to 10 Mbps and more using twisted pair cables 2. Token Ring A network topology in which computers access the network through token-passing A Token is a special packet that contains data and acts as a messenger/carrier between each computer and device on a ring topology Each computer must wait for the token to stop at its node before it can send data over the network so as to avoid collision of data packets on the network 3. FDDI (Fiber Distributed Data Interface) FDDI is a network topology that is used primarily to interconnect two or more local area networks, often over large distances It uses fiber optics for speeds of up to 100 Mbps Packet switching This is a data transmission technique which involves transmitting and routing of messages by dividing the electronic message/data into packet segments and sending them sequentially over a network channel which are then reassembled into the original message at their destination Circuit switching A method of communicating in which a dedicated communications path referred to as a circuit or channel is established between two devices through one or more intermediate switching nodes before communication between the devices takes place Digital data is sent as a continuous stream of bits on a circuit Each circuit that is dedicated cannot be used by others on the network until the circuit is released and a new connection is set up The telephone system uses circuit switching NETWORK AND DATA SECURITY Network and data security consists of the provisions made on computer network and policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access to data, as well as guarding against Data loss and the effectiveness (or lack) of these measures combined together Solutions to network security problems Backing up of all important data Lock and Key to ensure physical security Combination Locking Mechanisms Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 113 Basic Computing Simplified Card Readers and Proximity Readers They work by reading a magnetic signature off an access card or token File encryption-Encryption involves converting data into a form that cannot be easily understood by others Biometrics This is a form of identity access management and access control which uses measurable physical and behavioral characteristics of individuals as a way of identifying them as the authentic users Examples of biometrics that might be used to authenticate a user include fingerprints, retinal patterns, or speech/voice Install a firewall-The key defense against Internet attackers is an Internet firewall A firewall is specialized software, hardware, or a combination of the two The purpose of an Internet firewall is to prevent unwanted or malicious IP packets from reaching a secure network Install an Anti-virus and other malware software programs to detect, report and (sometimes) disinfect viruses making backups of all software on a re.g.ular basis to avoid data loss And create a recovery disk for the operating system Update the Anti-Virus Software on a Re.g.ular Basis -Keep your anti-virus software up to date Do this at least weekly and more often if there are news reports of a new virus threat Beware of E-Mail Attachments from Unknown Sources Do not open them Avoid booting computers from infected storage medium Avoid downloading programs from unknown/unlicensed sources Common computer Network problems and troubleshooting IP address conflicts. Two computers are assigned the same IP address erroneously Solution: Change the IP address for one of the computers Absence of connectivity Solution: checking the physical connections and connection devices And the distance between devices in case of wireless network Check the router or hub to see if some machine is disconnected, or if it a case of is a faulty cable In this case: a good connection is shown by a green light o o o Ensure that TCP/IP is configured Ensure all the computers on the network are within the same subnet with individual IP addresses Check if the file and printer sharing option is installed and functioning, and also define network shares on each computer Slow connectivity This can be due to: Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 114 Basic Computing Simplified i) Collisions, which the network is incapable of handling ii) Heavy file transfers bring down the speed tremendously iii) The network card may also be overloaded Solution: i) zip bulky files while transferring, which lowers the pressure on the network Firewall settings can interfere with file sharing on connected computers. It is true that disabling security features can make your system vulnerable to attacks, but lowering security levels should not cause too much trouble Solution: Rigid Firewall settings need to be adjusted to allow networked computers to share data. You may consider disabling the security settings temporarily, after having thoroughly considered all security related threats INTERNET Internet is an International/global interconnection of computer networks It is described as a network of networks; it is a global network where all LANs (both big and small) worldwide are connected together in many different ways to form the Internet History of the Internet The Internet was originally developed in the late 1960’s by the US government department of defense to improve secure communication between its military computers and enhance the sharing of information and collaboration on military and scientific projects in four locations; universities of California, Los Angeles, Santa Barbara, Utah and Stanford research institute This internet was known as ARPANET (Advanced Research Projects agency Network) Characteristics of the Internet It is made up of numerous networks worldwide There is No organization that has a direct control over the Internet It is dynamic; ever changing It offers very many services The Internet size and technology grow at a very fast rate It is not owned by any single organization(has no central control) Requirements/infrastructure for Internet connection Host computer Communication hardware such as Modem and router Communication Software such as a Web browser and internet protocols Communication media such as VSAT, wireless antenna or telephone line Internet Service provider (ISP) 115 The Internet Service providers (ISP) Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified ISP is a company which provides services for accessing and using the Internet at a fee Task: Give some examples of ISPs in Uganda There are many ISPs on the market in Uganda to choose from such as AFSAT, UTL, MTN, etc. Which services do ISPs offer? The services offered by the ISP Offer connection to the Internet They do system analysis and consultancy Network servicing and maintenance Provide network security Domain name registration Website hosting Hiring storage space to small organizations Electronic mail services The Factors to consider when choosing an ISP Setup costs Experience for both ISP and client Auxiliary/additional services offered by the ISP e.g. E –Mail/telephone SMS facility Availability of online help Compatibility of ISP software with yours e.g. windows Vs Linux Vs Wang Efficiency/Effectiveness of ISP devices e.g. speeds of ISP modem, Bandwidth etc cabling architecture, Bit–Bus architecture for devices, etc Available technology For example, In case you intend to hire a dial-up service, you need to consider the availability of a local phone number or toll-free number for access, This would help to reduce cost of acquiring totally new technology or equipment the Technology offered by the ISP Some technologies are older and less efficient than others The ISP should be able to offer the latest and most efficient technology Technical support. What kinds of support services can the ISP provide? Are there any additional charges for support? The terms of service. Whether they meet your expectations or not Other services offered by the ISP that you can have on top of internet connection. E.g. web hosting and domain services The fee charged for the services The size of the ISP’s Client base ISP capacity is usually limited, the bigger the client base the less reliable is the ISP Coverage. Does the ISP coverage reach your location or not? 116 Internet connection technologies Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Dial-up (DUN) This is a connection method where the client must request for a connection to the ISP server each time he wishes to access the Internet This method requires the use of a MODEM and a telephone line and the fee depends on the amount of time spend online Leased line This is where there is a permanent connection between the user and the ISP at a fixed fee Bandwidth Bandwidth is the amount of Data (bits) that can be transmitted along a communication channel in a given time (per second) which is measured in bits per second or bps e.g. 32 bps The larger the range of frequencies the greater the amount of data that can be transmitted Bit rate Bit rate is the speed at which a particular transmission is taking place It is measured in bits per second (bit/s or bps) and represents the actual speed of transfer of data Determinants of internet access speed The amount of bandwidth allocated by ones ISP Connection technology used; telephone lines are much slower than newer technology such as ISDN and ADSL The volume of traffic the more the number of people logged on the internet the slower the internet speed Adapter or modem speed used The processing speed and amount of RAM of the host computer Type of data/files being downloaded or uploaded Internet services E-commerce Provision of information e.g., on weather, and finance E-banking Research On-line training Downloading and uploading files Sending or receiving messages Real-time communication e.g. video conferencing and chat On-line news On-line booking/reservation Virtual classes Entertainment services such as online games Advantages/benefits/positive implications of the Internet to society Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 117 Basic Computing Simplified The internet eases sharing and transfer of large amount of data using different file transfer services Encourages collaborative work Easy access to databases on remote computers The internet promotes internet-based education via virtual classes and elearning Different skills such as typing, use of web browsers, problem solving, and email are developed through the use of the Internet Shopping for item such as books is made easy and less expensive Instant or timely communication is done over the internet using different systems such as the E-mail system Companies are able to promote their businesses over the internet Social media such as face book is popularized over the Internet Eases publication of information to a very large audience at minimal cost The Internet is a rich source of information for researchers and students and any one on all kinds of topics and subjects The internet provides a number of entertainment options It promotes medical care through online health care and medication It promotes and eases banking and finance through online banking Advantages of the internet in schools A lot of information is obtained which is not available in a single textbook Updated or current information is obtained since internet is dynamic Learning is fun and easy as internet is exciting due to the multimedia content used It offers different sources of information hence a variety of opinions on a topic It is a quick way of getting information where internet connection is good Disadvantages of the Internet No Information control over the Internet such that all sorts of bad information is accessed There is no privacy of information and information piracy is common Indecent material is published on the Internet It’s not readily available to most people High costs due to costs on connectivity Time is lost where Internet speed is low due to poor links, hardware and congestion. 118 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Time wasting occurs when workers easily stray into non-essential materials Computer viruses are easily spread over the Internet High possibility of hacking Cybercrime is easily committed over the internet Examples of such crimes include fraud, phishing, impersonation, child pornography and cyber bullying Possible solutions to Internet issues Use of firewalls against ille.g.al access to networks Use of updated antivirus software against viruses Use of anti-spyware against hackers Carefully choosing an ISP who will provide the best service within your means Installing filters against pornographic and other undesirable content Use of encryption software to protect sensitive information and prevent fraud Use of complicated passwords to restrict access to Use of digital certificates This is a means of authenticating that an organization is genuine and that any transaction undertaken with it will be honored The certificate contains the name of the organization and a serial number registered with a Certification authority who issues the certificate Use of the Internet as a learning tool Used to search for information using search engines and directories E-mail system is used in collaborative learning Enables distance learning for those who are unable to attend collage/school physically Discussions over educational chat rooms Enables downloading of relevant documents Using computer assisted assessments (CAA) for online exams Use of electronic libraries and textbooks Development of skills of research and communication by the students Assignment are received, done and sent across the network by the students Video conferencing is used to share views and ideas among students and teachers The World Wide Web (WWW) This is the global collection of web sites and web pages which are hyperlinked containing text, and multimedia content There are virtually no regulations regarding the content of the WWW, so any one with appropriate software and hardware can create a web site on any topic Consequently there are millions and millions of pages of information covering every conceivable topic Multimedia The integration of text, graphics, animations, audio and video, normally using a computer application Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 119 Basic Computing Simplified A website (or Web site) is a collection of related hyperlinked web pages hosted on a particular web Server on the World Wide Web Web pages are HTML documents Hyperlinks are built-in links to other related documents, allowing users to quickly navigate from one document to another when clicked Each Web site may contain one or more web pages Each site has a home page, this is the first Document/page users see when they enter a site The site might also contain additional documents and files which must be hyperlinked Each site is owned and managed by an individual, company or organization A Web page is a document, typically written in HTML, which is accessible via HTTP, a protocol that transfers information from the Web server to display in the user's Web browser A Webpage contains hyperlinks to other pages or sites A hyperlink, is a reference or navigation element in a document to another section of the same document or to another document that may be on a different website Web pages are written in HTML (Hypertext Markup Language) The web server This is a dedicated computer which accepts file uploads, downloads, distribution and storage of these files over the Internet upon the requests of the World Wide Web users Characteristics of the web server Very high storage plus memory capabilities Very strong multiprocessor e.g. Motorola G4, G3 High capacity RAM –DIMMs Improved Network through-put (Enhanced NIC) Expansion capabilities for upgrades to be effected Website publishing Web publishing is the process involved in making information available on the World-Wide Web Web publishing process This involves; Web designing Web site hosting Web site content management Web designing This is the initial process of web publishing through which a web page is created Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 120 Basic Computing Simplified It’s about organizing web content so that it can be easily found and easily read and is attractive to visitors Web authoring Web authoring refers to designing and creation of a Web site, ranging from writing the site's underlying code to writing the text to managing the site's upkeep This can be done directly by writing the html code, or using html tools that operate in the background to create the code while the author is using a WYSIWYG interface Webmasters A webmaster is a person who creates and manages the information content (words and pictures) and organization of a website, or manages the computer server and technical programming aspects of a website, or does both Website hosting Website hosting is a service that allows individuals and organizations to have their own websites accommodated on a particular web server from which they are accessed by others on the World Wide Web Website hosts are companies that provide space (web hosting) on a server they own for use by their clients Some web hosts provide free services while others charge a fee Uses of web sites To Share of knowledge or information To Present information of interest To Enhance communication and collaborator To provide Skills building e.g. writing, editing etcdesigning For Trade purposes It give the owner Pride/improved image For storage of Data and information To enable Research For Entertainment and leisure in cases of E-Zoos plus E-museums, etc Communication software requirements for WWW Web browser TCP/IP protocol HTTP Hypertext Transfer Protocol (HTTP) HTTP is the set of rules that govern how web pages and multimedia files are transmitted over the Internet The content of the WWW contains text, sound, video so HTTP ensures that they are all transmitted as a webpage in a common format Examples of plug-ins include Shockwave and Quick time, Adobe acrobat reader, flash player, Real time player and DirectX, must be installed and configured to run on the computer Web browsers/Web client Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 121 Basic Computing Simplified A Web browser is communication software designed to allow the user to access and view web pages on the Internet’s World Wide Web The browser is designed to interpret hypertext Markup (HTML) language HTML is a code in which web pages are written, therefore it requires a web browser which is specialized software to able to retrieve and display text, and multi-media in HTML . Commonly used web browsers include; Internet Explorer, Opera, AOL Mozilla Fire fox Google chrome, etc Web browsers also use Plug-in applications to display other content, such as videos and animations that the browser is unable to directly display; A plug in is a small application that is installed to add special capability to a major application such as a web browser Modern Web browsers are also referred to as internet suites because of their ability to display a variety of applications, multimedia, and files created with other programming languages such as Java and ActiveX, scripting languages such as JavaScript, and techniques such as AJAX, and the like which have other file The Functions of a Web browser It is used to request for WebPages from a web server when the user types in the uniform resource locator The web browser accesses information from the web server using the HTTP protocol over a network to communicate with the web server It displays web pages on the screen The coding in the HTML files tells the browser how to display the text, graphics, links, and multimedia files It is used for streaming video content over the internet Displays multimedia content Features of a web browser (Web browser Interface) A menu bar that has items like file, edit, View, History, bookmarks or favorites, tools, help and others depending on the browser type and version A standard tool bar An address bar to type in the desired Uniform Resource Locator (URL) Navigation buttons to move forwards or backwards between pages and a home button to go to a start-up page A print button. This enables you to print a webpage or a section of it A favourites section where you can bookmark (store) the URLs that you wish to revisit A history folder containing a list of previously visited sites A built in search engine A link to e-mail A link to one or more search engines Using a browser, you can do some or all of the following; View hundreds of millions of web pages Use mail clients to Send and receive e-mail Download games, music and computer software Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 122 Basic Computing Simplified Chat Shop on line See and hear recorded broadcasts Participate in virtual conferences View channels, a channel is a website that automatically transmits information to your computer at the time you specify Common web browser error messages (Study) You may request the browser to fetch and display a web page, but instead of doing that, it displays an error message or HTTP status code. Some of the browser error messages are; Request Timeout (error 408) The server was unable to process the browser request within the allotted timeframe. This may necessitate refreshing the page File Not Found (error 400) The browser may have failed to properly load the page file, or the page does not exist anymore, or the server containing the page is currently down Internal Error (error 500) This error comes about when the web form malfunctions Unable to Connect to Remote Host This implies that the web browser is unable to connect to a remote host on which the page is hosted This may mean that the server is down, or there is no Internet connection, or the web address was misspelt firstly, 401 Unauthorized or 403 Forbidden In case the browser displays either of these error messages, it implies that you are attempting to access a website that allows only subscribed members who must use usernames and passwords, and it site has blocked you from accessing it Domain Name A domain name is the representation an IP address of a computer on the network It identifies the name of the organization or group that owns the site and type of web site An example; www.bbc.co.uk The domain is separated into parts just like the IP address A user normally finds it easier to use a domain name instead of an IP address to access the a web page/web site Task: Write at least five domain names you know Parts of the domain name The hierarchy of domains descends from the right to the left label in the domain Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 123 Basic Computing Simplified Each label specifies a sub domain of the domain to the right For example, given the domain name .bbc.co.uk bbc is the sub domain of co.uk, while co is the sub domain of uk Top-level domain (TLD), is the last part of an Internet domain name, that is, the group of letters that follow the final/last dot of a domain name Examples of top level domains: org, gov, com, net Commonly used Top level domain names .com indicates that the organization is a commercial one i.e. business .gov indicates that it is for a government department .ac is for an academic organization .org is for a noncommercial or non-business organization .sc is for a school organization .net is for a company that provides internet services Each country has been assigned a two letter code Such as; .au for Australia .de for German(Deutschland) .it for Italy .es for Spain (espania) .ug for Uganda Second Level Domain (SLD) The second-level domain is the label directly to the left of the top level domain e.g. www.cnn.com cnn is the second level domain Third Level Domain (TLD) This is the part of the domain name that is immediately to the left of the second level Domain For example;www.bbc.co.uk bbc is the third level domain Uniform Resource Locator (URL) Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 124 Basic Computing Simplified A URL is the full address used to find particular files or web pages on the World Wide Web For example http://www.awebsite.co.uk/index.html http://www.nypl.org/sitemap/index.html Parts of a URL i. The protocol being used, which could be http or ftp ii. The domain name which is the location that contains the file of web page iii. The path to a web page which may contain a folder name and document file name both of these separated by forward slashes iv. The query string, or parameters These are optional but show information about the page/file URLs don’t contain capital letters or spaces, but contains dots and forward slashes The Forward slashes specify the path to the location of the file needed Types of web sites Personal websites Affiliate websites Search websites Portals Blogs Wikis Commercial Company websites Etc Search engines A search engine is a software system that is designed to search for web pages on the WWW Using a search query provided by the user A search query is a request for information in form of a word or phrase or sentence For example, you might specify that you want to search for information about "Polar Bears", in which case the search engine would return all the URL's where the search query words appear The search engine ranks the search results based on a computer algorithm (specification) not by subject category It ranks first those URLs that register most occurrence of the key word(s) in the search query Usually more accurate pages are listed before those that include unreliable and erroneous material How to evaluate search results Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 125 Basic Computing Simplified Not all that is published over the internet is good or accurate So the need to evaluate what one finds The following are the guidelines; The author’s authority on the subject Accuracy of information Objectivity or intention of the author How current is the information presented The extent of coverage of the topic Who the publisher is The publisher’s reputation Do the authors properly list their sources, references or citations with dates, page numbers or web addresses, etc? The search content of result pages is not evaluated The objective of the site Whether the information up to date or valid When was the site was last updated The relevance of the information to the research topic the intended audience of the site Is the material presented at an appropriate level? How to effectively use a search engine Link more than one keyword and linking them with AND, OR or NOT (Boolean’s logic) in case of complex searches Use specific queries Avoid redundant words e.g. if one wants to search about Ugandan wildlife, the search query should be “Ugandan wildlife” not just “wildlife” Using the symbols + or -the plus symbol lets you find pages that have all the words in the query e.g.to get pages that refer to both john and Tom on the same page, use +john+Tom Example 2 +computer +studies+schools gives pages on computer studies in schools Use the –symbol to eliminate characters from the search Use parentheses to sequence operators and group words Example; always group words joined by OR with parentheses Narrow the search query to avoid irrelevant results Subject Directories A subject directory is a software that contains a lists of links to different subjects or topics already sorted by subject or topic category Examples include; dir.yahoo.com, info.mineucr.edu, academic.infonet, about.com’ lii.org, howstuffworks.com, etc Characteristics of Subject Directories They are built by human selection not based on automated systems The sites/pages are organized into subject categories The sites/pages are evaluated Only most relevant web pages are availed Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 126 Basic Computing Simplified Web Portals A portal is a web site which brings information together from various sources in a uniform way. Usually, each information source gets its dedicated area on the page for displaying information, it also offers a variety of services like search, e-mail, online shopping and others Examples Yahoo, MSN, AOL etc File transfer Internet enables transfer of files over the internet by use of FTP FTP sites contain books, articles, software games images sound multimedia etc all of which can be transferred with or without the use of special download software Usenet This is a service on the Internet on which one can post and read electronic messages The messages are stored on usenet servers and organized by topic into newsgroups Electronic commerce sites E-commerce is business that is done over a communication network where the buying and selling of products or services is conducted over electronic systems such as the Internet and other computer networks, involving the exchange of data to facilitate the financing and payment of business transactions An electronic commerce website is one that is managed by the business to display what the business deals in to give an opportunity to potential buyers to make their choices and makes orders Example of e-commerce site addresses include; http://www.shopsonthenet.co.uk http://www.ukshops.co.uk/enters.html http://bookshop.co.uk http://www.amazon.com Merits of e-commerce Reduced expenses since there is no need for retail premises and fewer employees Customers/clients for the business are attracted through the Internet Customers have access to information all the time increasing the chances of making sales Safety is increased since payment is done through electronic fund transfer (EFT) Market research is easily done over the internet, because information about potential buyers Ecommerce reduces travel time and costs for the customers since they do not need to visit the shops Prices are reduced as the business can offer lower prices due to lower overheads Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 127 Basic Computing Simplified The customer is able to sample the products on-line, for example view movie clips or listen to music before buying Disadvantages of on-line businesses Businesses incur costs of Internet operation Sales may be reduced if customers are unable to try products before they can buy The e-commerce may be hacked leading to loss of money fraudulently Conmen can easily trick unsuspecting customers leading to loss of money when they get access to customer’s credit card numbers WIKIS A Wiki is a collaborative work website that allows individuals to add, modify, or delete content in collaboration with others Blogs (web log) A blog is a web site maintained by an individual who makes regular posts such as descriptions of events, or other material such as graphics or video on an ongoing basis, allowing visitors to the site to make their comments or link to it or email you or not Podcasts (Net casts) Podcasts are digital media files consisting of an episodic series of audio, video, PDF, or e-Pub files subscribed to and downloaded or streamed online onto a computer or mobile device Podcasting means making digital audio or video files available on the internet in such a way that others can set their computers to automatically download new episodes in a series as you post them Webcasts A Webcast is the delivery of live or delayed sound or video broadcasts over the internet using streaming media technology The sound or video is captured by the conventional video or audio systems, then digitized and streamed E.g. News broadcast, Radio and TV programs Webinars (Web conferencing/online workshops) A Webinars is short for web based seminar It refers to conducting a seminar or lecture via the internet using graphics, text and live sound, unlike web casting, the audience is able to interact with the presenter such as asking questions by sending an instant message A webinar allows real-time point-to-point communications as well as multicast communications from one sender to many receivers It offers data streams of text-based messages, voice and video chat to be shared simultaneously, across geographically dispersed locations Applications for web conferencing include meetings, training events, lectures, or short presentations from any computer Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 128 Basic Computing Simplified Cloud computing This is Internet-based computing that relies on sharing computing resources over the Internet where remote servers are networked to allow centralized data storage rather than having local servers or personal devices to handle applications The word cloud is used in reference to internet Cloud computing allocate individual users a specific storage capacity on the virtual server It provides all needed Application programs interfaces for users that enable users to migrate their work to the virtual server Intranets An Intranet is a private internal network of an organization using internet protocols and accessible using a web browser. It contains information specific to that organization and only accessible to authorized users within the organization or members of the organization It is therefore closed to outsiders It is hosted on the server of the organization Intranet is used to avail information to members of an organization Intranet may have an e-mail system with a mail server to route the mail to the members’ mail boxes It only contains relevant information to the users so they don’t suffer with or waste time on irrelevant information Access to information is faster than an internet connection Information is much more secure than on the Internet because outsiders don’t have access to it However the scale of information is limited as compared to the internet It is costly to build and maintain and keep up-to-date Extranets An extranet is a private network that uses internet protocols to share data of a particular organization with selected outside users such as the clients of the company or subsidiaries of a company Differences between an Intranet and Internet Intranet is private while Internet is public Intranet has geographical boundaries while internet has no boundaries Intranet only shares company information while Internet has all sorts of information Intranet is a single source information while Internet is a multisource information Intranet is controlled by an organization while there is no control over the Internet Terminal emulation This is an Internet resource/service that allows remote access to computers connected on the internet using a virtual terminal connection. Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 129 Basic Computing Simplified This means that using one computer, one can access another computer on the LAN or Internet and all the information and resources on that computer as if one was sitting at that other computer E-mail E-mail or electronic mail is primarily text-based electronic message that is sent from one computer or other ICT devices to others In order to send or receive an email, one must have a computer connected to the Internet, E-mail software, and an e-mail account When mail is received on a computer system, it is usually stored in an electronic mailbox for the recipient to read later Messages can be replied to or forwarded with speed and ease E-mail software (e-mail client) E-mail software is an application software which allows individuals to create an email accounts and be able create, send and receive, store, and forward e-mail using SMTP and POP Examples Microsoft outlook express, Yahoo, Eudora light, Gmail, Opera mail, etc Mail servers A mail server is a dedicated computer on the Internet that receives incoming messages, stores them and delivers outgoing messages It allocates a certain amount of storage space referred to as mail box to hold mail to registered users. The user can receive mail by supplying the username and password through the mail client The Features of an E-mail software Email address All email software require the user to have an email address, username and Password which are unique to ensure security of the users emails An email address has two parts separated with the @ sign for example yourname@yahoo.co.uk The first part of the of the address is the e-mail name made up of the username of the email account while the second/last part indicates domain name of the company that provides the email facility. From: Indicates the address of the one sending the message To: This is where the address of the mail recipient is typed Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 130 Basic Computing Simplified Cc: (carbon copy). This is where other addresses to receive copies of the same message are indicated in addition to the main recipient Bcc: (blind carbon copy) this enables copies of the e-mail message to be sent to a third party without acknowledging/showing any other recipients (if any) Subject: refers to the theme/topic of the email It is where the theme of the message is indicated Compose: This is where one types the actual message Attachments: an attachment is the added file or files that are sent with the message Such files are usually too large to be sent as a simple message Such files are known as MIME (Multimedia Internet Mail Extension) attachments One advantage of this is that large files are conveniently sent Address book: is an area that stores email addresses for future use or mailing lists Inbox: this where all incoming messages are stored and can be viewed, it shows the name of the sender of the message, the date it was sent and the subject of the message Outbox/sent messages: Stores copies of any messages that have been sent at stated dates. This is useful for future reference Handling one’s mails Creating document folders in which to store mails Checking and reading mail in the inbox Transfer messages from the inbox to a specific folder or storage file either by the drag and drop facility or right click and move Deleting a message. This can be done by right click then delete or delete on the tool bar Sorting messages Drafting or composing a new message Inserting an attachment/file to your message To insert and attachment, click on insert file attachment or attach file, then browse the hard disk or any other disks to find the file you want Repeat the operation as many times as you need Adding new contacts in your address book Filtering messages received to avoid spam in your mail box Sending messages Sending an Email to Multiple Use Cc and Bcc to send an email to more than one person easily and fast "Cc" is short for "carbon copy” Enables one to send the same e-mail to two (or more) people without the task of having to write it more than once The message you compose is sent to the person in the To: field, but a copy of exactly the same message is also sent to all the addresses listed in the Cc: field To enter more than one address in the Cc: field, separate them with commas The Shortcomings of Cc: Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 131 Basic Computing Simplified All recipient of the message get to know the email addresses of all the persons that received your message. This is usually not desirable Nobody likes their email address exposed in public Full Cc: fields also don't look all that good They can become quite long and grow big on the screen There will be lots of email addresses and little message text BCC Bcc is stands for "blind carbon copy" The Bcc: field helps you deal with the problems created by Cc: a copy of the message goes to every single email address appearing in the Bcc: field The difference is that neither the Bcc: field itself nor the email addresses in it appear in any of the copies The only recipient address that will be visible to all recipients is the one in the To: field What to consider when using email Email can be junk mail So avoid unnecessary proliferation of messages Email takes up computer space, so delete messages you no longer need The integrity of an email message cannot be guaranteed If a received message seems out of character for the sender, double-check before taking it seriously Take care opening attachments Treat any attachment you receive with suspicion unless you expect Benefits/advantages of using email It’s quick; e mail takes seconds to send compared to snail mail It’s cheap Compared to posting or faxing messages The same message can easily be sent to many recipients at once by use of a mailing list Messages can be replied to or forwarded with speed and ease because the software automatically inputs the address of the sender Other files can be sent as attachments which has increased the popularity of email in business it is convenient because a message can be sent anywhere in the world without having to leave one’s desk E-mail can be used by businessmen to send advertisements to potential customers It is possible to send multimedia content as e-mail The sender is informed in case the email is not send so that is able to find other ways of delivering the message A copy of the message is kept Disadvantages of e-mail The sender and receiver both need internet access and e-mail accounts-most people in Uganda do not have access to e-mail The hardware needed is expensive Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 132 Basic Computing Simplified Email will not be delivered if there is a small error in the address Some people are not keen on checking their mail boxes So an urgent message may not be read in time There is a large volume of unsolicited e-mail known as ‘spam’ that tends to fill up mailboxes E-mail tends to take peoples valuable time at the expense of work or study Parcels cannot be delivered via e-mail which limits its usability Most viruses are spread via email The privacy of an email message cannot be guaranteed So confidential messages ought not sent via e-mail Mailing lists This is an e-mailing facility which distributes the same messages to the electronic mailboxes of all subscribers to the mailing list The automated list manager assembles all the messages and sends them to the subscribers which enables email discussion among the subscribers of a particular mailing list One can subscribe to or unsubscribe from a mailing list An example of a mailing list are list servers To find mailing lists, use your web browser to visit; http://www.liszt.com http://www.paml.net Internet Relay Chat (IRC) IRC is a text based communication system that allows the user to “enter” virtual chat rooms in which there many participants at the same time. Within these rooms one sends and receives instant messages to and from anyone else in the same chat room Instant Messaging (IM service) This is a one-to-one chat service that requires an instant messaging software (messenger) which must be installed on the computer that allows the user to build a list of internet-connected friends from which one selects who to chat with at a particular time in case they are on-line Video conferencing Videoconferencing is the conduct of a session/discussion using a set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way real time video and audio transmissions Videoconferencing is mostly used in business, education, medicine and media It reduces the need to travel to bring people together Netiquette This is the etiquette guidelines that govern behavior when communicating over the Internet i.e.The do’s and don'ts of online communication The Netiquette rules Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 133 Basic Computing Simplified Identify your self Include a subject line Avoid sarcasm so that you are not misinterpreted Respect other user’s privacy Acknowledge and return messages promptly Copy with caution No spam/junk mail Be concise Use appropriate language Avoid flaming (online screaming) Only use common acronym E.g. LOL for laugh Use words in brackets, such as (grin) to express your mind Use asterisks surrounding words to indicate italics used for emphasis (*at last*) Web designing This is the initial process of web publishing through which a web page is created It’s about organizing web content so that it can be easily found and easily read and is attractive to visitors Web authoring Web authoring refers to designing and creation of a Web site, ranging from writing the site's underlying code to writing the text to managing the site's upkeep This can be done directly by writing the html code, or using html tools that operate in the background to create the code while the author is using a WYSIWYG interface Web authoring software A category of software that is used to design web pages, it may not require one to have any knowledge of HTML coding because it offers Web page design wizards and different web page design templates for the user to pick from and simply insert content The software will generate the required HTML coding for the layout of the Web pages in the background based on what the user designs Examples of commonly used authoring software include Dreamweaver, and Microsoft desktop publisher Content management system A content management system (CMS) is a system that provides a WYSIWYG interface to manage the content of a website Which involves adding new content, editing, or modifying existing content and removal of unwanted or expired content It allows the content manager or author, who may not know Hypertext Markup Language (HTML), to manage the creation, modification or removal of content from a website without needing the expertise of a webmaster Examples of CMS include Joomla, Drupal and Wordpress HTML codes, also referred to as HTML tags, are enclosed by the lesser than (<) and greater than (>) brackets and may be written in capital or lower case letters Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 134 Basic Computing Simplified The opening bracket is followed by an element, which is a browser command, and ends with the closing bracket<font size=2> An element may also be followed by attributes, which are words describing the properties of the element, and further instruct the browser<font size=2> Attributes are only contained in the opening HTML tags to the right of the element and are separated by a space and followed by an equal (=) sign The value follows the equal sign and is enclosed in quotes<font size=2> Examples of Basic HTML tags For each attribute, there is an opening and a closing tag; Example of basic document structure: <HTML> <HEAD> <TITLE>your document title goes here</TITLE> </HEAD> <BODY> Your document text goes here </BODY> </HTML> The very first tag in your document: <HTML>and the very last: </HTML> HEAD The second tag in your document Enclosed within the be.g.inning tag: <HEAD> and the ending tag: </HEAD> is information about the document that will not display in the body of the document TITLE The document title, which is enclosed with a be.g.in title tag: <TITLE> and an end title tag: </TITLE>, all of which is enclosed with the HEAD tags above The title does not display as part of the document itself, but appears in the browser window title. It is also what is used to name your document in a bookmark list BODY The complete text of your document is wrapped by a be.g.in body tag: <BODY> and an end body tag: </BODY> HTML EDITORS There are many HTML Editors for purchase or download Recent versions of Word and WordPerfect have HTML Editors, or you can choose to use a dedicated HTML editor such as FrontPage or Dreamweaver Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 135 Basic Computing Simplified When using a word processing application to create an HTML file, open the word processed document, then select the menu option FILE : Save As HTML or choose to use the Ms Word webpage wizard What to consider when designing a web page The target or primary audience of the web site The impression you wish the site to create to your visitors The purpose of the website. Whether personal, commercial or educational This helps to determine the design for it The browser types or version likely to be used by your primary audience to determine the nature of materials to use in the website How to organize the site links and web pages to enable easy navigation through the site by visitors To obtain the relevant content to include in your page Obtaining permission to use other people’s copyrighted content or to link to other people’s sites this protects you from any possible le.g.al problems concerning copyright violation Characteristics of a good web site It should be easy to navigate with well arranged, easy to see navigation buttons Simple and clear layout of sections and content which makes it user friendly ie find content easily It must be pleasing to the eye to encourage visitors to the site It should load quickly to avoid disappointing potential visitors to the site It should have readable font web safe eye pleasing colours so that visitors can read the content easily It should be interactive with contact information, possibility of e-mail, online communication forum and chats Message boards etc Should have active links which enable visitors to access other references Should be frequently updated and must have a dated of last update The web pages must have web page titles and brief summaries about the page or site Uses/functions of a Web site It Enables Publicity or exposure to the public of a business or school Businesses consider their website to be their most important face to the public It is a Communication tool for information exchange between an organization and the public or a group of people Provides a convenient and cheap base of operation for individuals and businesses Useful in Marketing of products explaining the products and services offered, providing background and general contact information and online transactions They are a source of income to advertisers and web site developers Space can also be hired for advertisements Relevance of websites to schools in Uganda Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 136 Basic Computing Simplified It is used for communication purposes. The school can reach out to a wider audience worldwide, for example, in school recruitment Used for mobilization of resources. The website can be used for resource mobilization as it can reach out to a wide supporting audience For advertising purposes. The website can provide general information about the school The website can provide a forum for discussion of issues concerning the school using blogs It can be used for teaching and learning in the following ways: The website can provide subject content notes to students The website can present an opportunity for developing web designing technology skills for students directly involved The school community can collaborate with other students worldwide for project based learning The website can provide a forum for students and teachers to collaborate with others elsewhere The site can provide a forum for parents and alumni feedback It can work as a depository (store) where students’ achievement data is posted for easy access by the stakeholders It can help teachers to collaborate with other teachers worldwide The site can be used to publish students and teachers work Web site hosting Web hosting is a service of storing a website on a particular server that is connected to the WWW such that the site is accessible on the World Wide Web Web hosting is necessary to enable individual access the website at any time Web hosts are companies that provide space (web hosting) on a server they own for use by their clients Some webhosts provide free services while others charge a fee Free web hosting is advertisement-supported web hosting, and is often limited when compared to paid hosting A web site can also be hosted on a home or private server in a home or local area network HTML EDITORS An HTML editor is a software application for creating web pages Although the HTML markup of a web page can be written with any text editor such as word pad, specialized HTML editors can offer convenience and added functionality For example, many HTML editors work not only with HTML, but also with related technologies such as CSS, XML and JavaScript or ECMA Script In some cases they also manage communication with remote web servers via FTP and WebDAV, and version management systems such as CVS or Subversion Project work on web designing Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 137 Basic Computing Simplified You are required to design five web pages (use any web publishing software) for your school taking into considerations the properties of a good web site Page one is the Home page which must include (i) A welcome note and information on the schools location and motto (ii) The schools email address (iii) The web links to the other pages (iv) The navigation bars (v) Company logo Page two should show bullet list of departments available in the school Add a link to the school website for further information Page three should contain other facilities offered in the school e.g.swimming, school bus, internet services Page four should have a brief information on your dormitory/house and a simple definitions list stating the chorus of your house A table indicating 5 names of your dormmates showing their Biodata(age, sex, home town/district Insert a relevant form control Page five should have photo gallery of at least five images Network Security concerns Hacking/trespassing-secretly finding a way of looking or changing information of someone else’s computer without their permission a hacker may break into a system in order to explore it and expand their knowledge Data loss through malice or human error Information theft Illegal access to the network ie computer intrusion where someone or program gains unauthorized access to a computer system Virus and worm attack A worm is a code that uses computer networks and security weakness to repeatedly copy itself into a computer memory until no more space is left While a computer virus is a malicious and destructive program written to activate itself (executable) the moment it is introduced to a computer system and cause the system to malfunction. Phishing. This is an attempt to steal Passwords and other private account information Phishers can set up fake web sites that look like those of trusted companies like Yahoo! to trick individuals into disclosing their user name and password Cracking. This is breaking into computer systems or networks by bypassing passwords or licenses Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 138 Basic Computing Simplified Hardware malfunction Solutions to network security problems Install an up to date antivirus software Separate the networks Use network password Putting in place a code of conduct. This is an acceptable use policy which tells the users what is acceptable and allowed on the company network. This can include things like acceptable websites to visit as well as what times are acceptable for browsing the Internet Computer malware risks Malware is software designed to infiltrate or damage a computer system without the owner's informed consent It is a portmanteau/combination of the words malicious and software Malware is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software/code Malware includes computer viruses, worms, Trojan horses, most root kits, spyware, dishonest Adware, and other malicious and unwanted software A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user Viruses attach themselves to executable files that may be part of legitimate programs If a user tries to start an infected program, the virus' code is executed first How computer viruses spread In order to infect a computer, a virus has to have the chance to execute its code. This occurs in any of the following ways; (i) Booting a PC from an infected medium such as a floppy (ii) Executing an infected program (iii) Opening an infected file A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive Viruses can spread to other computers over a network by infecting files on a network file system or a file system that is accessed by other computers Viruses often travel via e-mail attachments E-mail messages by themselves do not carry viruses. Only exe, com or other types of executable files can carry a virus In summary, viruses are spread in the following ways: 139 Through infected diskettes from infected computer systems Through sales demonstration applications Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. Basic Computing Simplified Through networks Through software updates Through free computer games on the net, etc Through pirated software. These are software that have been copied without the permission of the owner. From software laboratories. Programs can be infected without the manufacturer’s knowledge Through the use of the network (internet) An employee of an organization can also introduce such viruses knowingly. Through executing an infected program Through opening an infected file Effects of computer viruses Some viruses are programmed to damage the computer by damaging programs, deleting files, or Reformatting the hard disk. Others simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages They take up computer memory used by legitimate programs They can result in system crashes and data loss They can prevent a computer from booting Symptoms of a computer virus attack The computer runs slower than usual The computer stops responding, or it locks up frequently The computer restarts on its own Applications on the computer do not work correctly Disks or disk drives are inaccessible You see unusual or strange error messages There is a double extension on an attachment that you recently opened, such as a jpg, vbs, gif, or exe extension An antivirus program is disabled for no reason Additionally, the antivirus program cannot be restarted An antivirus program cannot be installed on the computer, or the antivirus program will not run New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs Strange sounds or music plays from the speakers unexpectedly A program disappears from the computer even though you did not intentionally uninstall it It shuts down unexpectedly or crashes frequently It experiences memory problems or runs out of disc space Unusual files or directories appear on your system Virus types Viruses can be divided into two types, on the basis of their behavior when they are executed; Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 140 Basic Computing Simplified The Nonresident viruses which immediately search for other hosts that can be infected, infect these targets, non-memory-resident viruses only are activated when an infected application runs The Resident viruses which do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution It stays in memory after it executes and after its host program is terminated The Resident virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself Boot Virus This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk Macro Virus. Macro viruses infect files that are created using certain applications or programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one FAT Virus The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer This type of virus attack can be especially dangerous; by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories Logic Bombs They are not considered viruses because they do not replicate They are not even programs in their own right but rather camouflaged segments of other programs Their objective is to destroy data on the computer once certain condition(s) is met File Infectors This type of virus infects programs or executable files (files with an EXE or COM extension) When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out Companion Viruses Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they "accompany" the other files that already exist In other words, in Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 141 Basic Computing Simplified order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses) Directory Virus Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension EXE or COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus Once infected it becomes impossible to locate the original files Polymorphic Virus Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves Resident Viruses This type of virus is a permanent which dwells in the RAM memory From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc Direct Action Viruses The main purpose of this virus is to replicate and take action when it is executed When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted Computer worms A computer worm is a self-replicating computer program It uses a network to send copies of itself to other nodes (computer terminals on the network) without any user intervention Unlike a virus, it does not need to attach itself to an existing program Worms always cause harm to the network by consuming bandwidth and memory A root kit is a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms "Administrator" access) of a computer system, without authorization by the system's owners and legitimate managers Trojan horses A Trojan horse, or simply Trojan, is a piece of software which appears to perform a certain legitimate action but in fact performs a malicious act Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail. 142 Basic Computing Simplified Spyware Spyware is computer software that is installed stealthily on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. Spyware programs can collect various types of a user’s personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs Adware Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used Some types of adware are also spyware and can be classified as privacy-invasive software How to protect a computer system against viruses Buy software from legal vendors Avoid running unchecked or scanned files. Avoid running files with an attachment from an unknown source on the network. Backup your files and folders regularly Use Netware with strong validation checks and in-built firewalls. e.g. Linux (i.e. Hardware and software which can limit unauthorized data through networks to reach your workstation) Disable auto micros functions for macro viruses Use antivirus programs. These are utility programs used to scan files and programs in order to detect, destroy or 143 Basic Computing Simplified. Oscar O. Osaka; Tel: +256 779 020 985. Email: oscarosaka25@gmail.