ICT THEORY NOTES 2022editted
ICT THEORY NOTES 2022editted
ICT THEORY NOTES 2022editted
SUB-ICT SIMPLIFIED
Information and Communications Technology
FIRST EDITION BY
BATWAWULA HENRY
1
CHAPTER ONE
INTRODUCTION TO COMPUTER
STUDIES
Definition of a computer
A computer can be defined as an electronic device manipulates information or data.
OR
Is an automatic machine made up of electronic and electromechanical devices which manipulates and
process data.
OR
A computer is an electronic device which can input data, process, store and output meaningful
information.
Accuracy. Computers are capable of detecting and correcting any misstates made. And they are
capable of performing calculations to the extent of 24 decimal accuracy.
Storage. Computers are capable of storing large volumes of data and information for future use.
Diligence. Computers have the ability of performing the same task ‘over and over’ for a long period of
time without getting tired or bored.
Artificial Intelligence. Computers can respond to requests given to them and provide solutions due
to there programmability.
Automatic. Computers work automatically hence they don’t need any supervision to perform
programmed routines.
1
2
SUB ICT SIMPLIFIED
Information is the processed data which makes meaning to the user. Examples of Information
include: Words, songs, comments etc.
3
It is an interface between hardware and its user. E.g. System software and Application software.
(iii) Human ware (User): This refers to the skilled personnel available to perform the operation on
the computer, such as secretaries, network administrators, programmers, system administrators,
computer architects, etc
(iv) Data and Communication: This involves the use of computer networks hence enabling the
sharing of information from all around the world.
(v) Procedure: These refer to documentation materials which contain the guide for using the
hardware and software.
(ii) Health
The use of ICTs in health has enabled many procedures such as liver, throat surgeries.
ICT high end machines such as CT scan, Ultra sound devices, Magnetic Imaging have enabled
the diagnosis and cure of many diseases.
ICTs have enabled online consultations by medical professionals.
The security of the hospital, property and the patients is ensured by high end ICT devices such as
CCTV cameras, sensors, etc.
(iii) Education
Enables research by students. The internet is a huge resource of information with online libraries
and dictionaries such as Wikipedia, Google answers.
Online universities enable distance learning(cyber classes)
ICT aided facilities like Audio-visual ways ease the students’ understanding on complex topics.
The use of storage devices such as CD-RW/DVD-RW & flash memory, online storage have eased
the storage of data and also offering online backups.
Enables edutainment that combines education with entertainment such as chess and titans.
4
(iv) Security
Use of street CCTVs, figure print detection technology, scan equipments are used by
security operators.
Use of phone and internet tapping technique enable the tracking down of crime by authorities.
Use of ICT gadgets in modernizing the army such as rader system, warning systems, military
lasers, etc.
Use of sophisticated technology such as use of Drones in spying on enemies and analyzing possible
targets.
(b)Economy
Infrastructural development
Capital deepening through ICT investment development is important for economic growth. It
establishes infrastructure for the use of ICT networks and provide productive equipment and
software to business.
5
There is growth of labor productivity With the continued sue of ICTs, many workers in firms have
improved on their personal skills and productivity. A work force which has been trained or has ICT skills
may bring about innovative skills to the company.
Enhancement of advertisement of goods and services
Many sectors, industries and individuals use internet for advertising their services and products.
There is reduction in transport and communication cost
With the use of internet facilities such as E-commerce, E-banking(use of credit cards),
there is reduction to barriers to international trade.
(c)Environment
ICTs help to improve the environment through use of improved practices in agriculture and forestry.
That aid in research on better farming techniques, mechanizaition.
Environmental agencies are able to monitor state of air and water pollution by use of remote sensors.
Government agencies responsible for the environment use ICTs to signal disaster warnings and
relief supplies.
The continuous manufacture of less pollutant manufacture of hardware tools has eased the
conservation of the environment.
(d)Politics
ICTs are a means by which the public is informed or educated about democratic matters(civic
education) e.g. by use of SMS platform, the internet( social sites such as twitter, Facebook, my
space)
ICTs are a means of promoting communications(strong democracy) e.g. by use of opinion polls
pre to the real election exercise.
There is high computerization on referendum on all maters of public importance
(e)Security
ICTs have eased the security mechanism of nations by use of high technology in defense system.
Such as use of remote controlled missiles, radars, satellite.
With computerized registration of details about every citizen, the police can now easily track
down crime.
ICTs have proved to be a basis towards modernizing the army by employing ICT skills in its
defensive mechanism.
NEGATIVE IMPLICATIONS OF ICT IN DIFFERENT AREAS IN THE
WORLD TODAY
(i) Social/ethical field
Social isolation: With the continued use of ICTs such as the internet based way of
communication, social interaction with peers has been reduced. So face to face interaction
has greatly been degraded.
Pornographic and unwanted material: The internet has a large amount of information
in the form of pornography and other unwanted material like pornographic pictures and videos.
Stealing of money online is now rampant: Thieves are always active in obtaining
stolen credit and details to purchase goods and services over the internet.
6
(ii) Economy
There’s rise in unemployment in firms: The use of ICTs kills labor intensive sectors
of the economy e.g. the use of mobile telephones, email systems has killed the postal
system.
There is high cost of living because of use of ICTs: With the use of ICTs such
as Mobile phones, internet services, digital TV series. Users have to keep on paying or
subscribe monthly for these services which greatly hinder individual/family finances and
incomes.
(iii) Environment
The continuous disposal of worn out or unwanted ICT gadgets like computer
hardware components may lead to the pollution of the environment.
Some of the ICT gadgets contain many hazardous chemicals which when exposed to
humans may be harmful to their health, e.g. CRT monitors, CT Scan contain emissions
which risk to human health.
Many of ICT gadgets use a lot of energy in their functionality.
(iv) Politics
The use of ICTs as a means of communication to masses of people has sometimes been
used as a means of inciting violence e.g. In the incidence when the former president of
Egypt(Hossin Mubarak) was topped, his opponents used sites such as face book, twitter
to mobilize resistance against his government.
(v) Security
The use of High end ICTs such as drones, satellite in spying on other nations may bring
about a serious security concern.
7
Use of notes(money) counting devices
Use of CCTV cameras & sensors in ensuring security in the bank environment.
(c)In a school
Teachers can use computers to prepare and store records about their students, such
as attendance, record of progressive assessment.
The work of school accountant / bursar in storage of financial records about
students and prepare staff pay roll is made easy.
Can be used to set students examinations as well as preparing mark sheets, grading
and positioning.
(d)By a farmer
Keeping record of his farm, i.e. customer details, sales etc.
Use of internet services for research about new technology in farming.
Use of mobile money services in paying and receiving payments for goods and services.
Automatically regulating the environment conditions in green houses using sensors.
(e)In a factory
In inventory control off goods stock and sales
Use of bar code readers in reading serial numbers on packaged products.
Creating data base and keeping customer records
Used during automatic control of running machines
In maintaining the security of the premises of the factory.
GREEN COMPUTING
Green computing refers to the environmentally responsible usage of computers and related
resources. It may involve use of energy efficient hardware equipments, reduced energy
consumption and proper disposal of E-waste.
CLOUD COMPUTING
What is meant by Cloud computing?
This is a technological advancement where software applications, processing power, data and
even artificial intelligence are accessed over the internet.
OR
Cloud computing refers to outsourcing of services such as those of computer hardware,
software and other platforms over the internet.
10
CHAPTER TWO
Computer Management, Lab Care
and Maintenance
COMPUTER MANAGEMENT
Booting: This refers to the process of turning (powering) the computer and loading
the operating system into memory.
OR
Booting is the process of switching on the computer.
FOLDERS
Define the term a folder.
A folder (directory) is a storage location for related files and sub-folders.
FILES
Define the term a file.
A file is a collection of related data.
EXAMPLES OF FILES
Alliance.doc
Fees structure.xls
13
Dog.jpg
Letter.txt
CMD.exe
Sembera.mpg/.mp4
I can’t stop loving you.mp3
Students Database.accdb/.acc/.db
FILE EXTENSION
What is meant by file extension?
This is a part (suffix) at the end of a filename which identifies the type of file it is.
EXAMPLES OF FILE EXTENSION AND THE FILE TYPES THEY REPRESENT
Give any two details about a file that is stored by an Operating System.
File name
File size
File type
Date and time of creation
14
Storage location or path
Attributes
FEATURE OF A FILE NAME
A file name is made up of two parts: the file name which relates to the contents and the
file extension which identifies the file type.
The file name should be associated with the content
Special characters such as “/”, “&” must be avoided in file names
FILE ATTRIBUTES
Define the term file attribute as used in operating system.
A file attribute is a feature of a file that defines how it can be accessed and the
operation which can be performed on it.
15
Outline any five ways a file is kept secure in a computer
By setting passwords to the files
By installing an updated antivirus software
By limiting physical access or usage of computers by un authorized users
BY encrypting the files
By avoiding usage of old storage devices
By using the audit log mechanism to monitor each activity by user
16
COMPUTER LAB CARE & MAINTENANCE
Computer literacy
What is meant by Computer literacy
This refers to the comfort level someone has with using computers and programs
associated with computers.
COMPUTER LABORATORY
Define a computer
Laboratory.
This is a room/building equipped with computer facilities to enable the teaching and learning
process to take place.
21
CHAPTER THREE
Computer Hardware
COMPUTER HARDWARE
These are physical components/parts of a computer that can be
seen, touched and felt.
State four ways of inputting data into the computer system, giving an example for
each.
Using the keying-in device such as keyboard.
Using a pointing device such as mouse, joystick, light pen, and track ball.
Using data capture devices such as scanners, digital cameras, and barcode readers.
Using Voice/speech recognition equipment such as microphones.
MONITORS
They are two types of monitors namely:
23
LCD monitors (Liquid Crystal Display)
CRT monitors (Cathode Ray Tube)
The LCD technology is replacing the CRT technology in display devices. State the
advantages of LCDs over CRTs.
LCDs require less desk space
LCDs are more energy saving
The radiation emitted by LCDs is negiligeble
LCDs have a good resolutions
LCDs are more portable
Liquid Crystal Display (LCD) projectors are projectors that use liquid crystal display
technology to produce lower quality images only.
While
Digital Light Processing (DLP) projectors are projectors that use tiny mirrors to reflect
light.
PRINTERS
A printer is an output device that converts softcopy into hard copy.
TYPES OF PRINTERS
They are two major types of printers, and these include:
24
1. Impact printers
2. Non impact printers
IMPACT PRINTERS
Impact printers are printers where the printing mechanism physically touches the printing
medium e.g. a paper while printing. So they make some noise while printing.
25
AUDIO OUTPUT DEVICES
State two audio output devices
Speakers
Headsets (headphones)
3. Barcode reader
They are used mostly in supermarkets, departmental stores, sales outlets to read
barcodes(serial numbers) on packaged products.
Complete each sentence below (a)-(e) using one item from the list.
A USB
A register
A cache memory
A serial port
An Arithmetic Logic Unit
a) Cache memory is a high speed memory built into the CPU that temporarily stores
data during processing.
b) Control unit is a part of the CPU that coordinates its operations
c) Register is a fast memory chip located on or near the CPU to help speed up processing.
PERIPHERAL DEVICES
Explain what is meant by the term “Peripheral device”.
This is an external device attached to the system unit.
3. Parallel ports
These are sockets on the computer that are used to connect newer versions of printers or
other peripheral devices such as a portable hard disk, tape backup, scanners, CD- ROM
that need a faster data transfer than a serial port.
4. PS/2 ports
These are ports used to connect the PC to its keyboard and mouse.
5. USB port
This is an external port that can allow the user to connect up to 127 external PC
peripheral devices such as USB keyboards, mice, printers, modems, scanners and
external disk drives.
What is meant by Peripheral device interface (ports)?
These are sockets or slots that peripheral devices connect to on the motherboard.
Distinguish between a USB port and SCSI port.
Universal Serial Bus (USB) port uses a serial method of data transfer
(one bit of data at a time in a single wire)
While
Small Computer System Interface (SCSI) port uses the parallel method of data
transfer (eight bits of data at a time, each in its own wire.
USB is an emerging technology which is becoming common today. State three
advantages that make USB more superior to other technologies.
They are quite faster in data transfer compared to PS/2 ports
They can be used to connect up to 127 external PC peripheral devices since they are
universal
At least eight other peripheral devices can be chained and connected
to the same port.
What is meant by a storage device?
This is a hardware component that writes and reads data to and from storage media.
Distinguish between Primary memory and secondary storage. Give an example of each.
Primary memory/ RAM (Random Access Memory), is where both data and
instructions are temporarily held for immediate access and use by the computer’s
microprocessor e.g. RAM, Cache memory and Buffer.
While
Secondary storage is any storage device designed to retain data and instructions
(programs) in a relatively permanent form e.g. hard disks, CD-ROM, flash memory.
28
Distinguish between writing data and reading data as used in storage devices.
Writing data means recording data from memory to a storage medium.
While
Reading (retrieving) data means transferring data from storage medium into the
computer’s memory for use by the operating system or application program.
2. Firmware
These are ROM chips that contain data, instructions and information which is recorded
permanently by the manufacturer of hardware.
3. Buffer
This is a region of memory that is used to temporarily hold data while it is being moved
from place to place.
4. CMOS
CMOS (Complementary Metal Oxide Semi-conductor) is memory used to store
configuration information about the computer which includes amount of memory, types of
drives current date, time, etc.
5. Virtual memory
This is a kind of memory were the operating system allocates a portion of storage
(usually on the hard disk) to function as additional RAM or in the absence of RAM.
In the space provided below, fill in the correct answer of hardware device
1. Enters instructions in the command line user interface
Keyboard
2. It is used to input text and graphics from hard copies into electronic format
Scanner
3. Used to ease in the processing of cheques by reading magnetized ink
MICR (Magnetic Ink Character Recognition reader)
4. Is used to move a pointer in GUI
Mouse
5. Used to make multiple choice questions in an examination
OCR (Optical Character Recognition Reader)
State the difference between Data Bus and Address Bus
Data (memory) Bus is used to transfer data and instructions from memory to the CPU
for execution.
While
Address Bus consists of all signals necessary to define any possible memory address
locations within the CPU.
29
Explain the meaning of the following features in computer interfaces
1. Plug and play
This is an interface that allows devices to be installed, configured and immediately
removed from the computer while it is still working e.g. USB
2. Hot swappable
This is a peripheral device feature that allows devices that can be plugged and removed
from computers while the computer is running e.g. USB devices.
State one function of a ROM chip
To store permanent data (firmware) required by the computer.
MICROPROCESSOR
This is an integrated circuit (chip) that does all the processing of a full scale computer.
3. Motherboard
This is a surface used for mounting computer components such as CPU, memory
cards, expansion slots.
What is meant by machine cycle?
This is a series of operations needed to execute a single instruction.
Briefly describe each of the operations of the machine cycle.
1. Fetching
The process of obtaining data items from memory.
2. Decoding
This is the process of translating instructions into commands that the computer
understands.
3. Executing
This is the process of carrying out commands.
4. Storing
This is the process of writing the results into memory.
Explain the following terms as used with computers
1. Parallel processing
This is the use of multiple processors to execute a program at the same time
2. Multi-processing
This is the execution of more than one program by the same processor.
3. Multi-programming
This is the processing of two or more programs by the same processor at the same
time.
VERSIONS OF MICROPROCESSORS ON THE MARKET TODAY
Pentium duo-core
Pentium i-3 core
AMD Duron
AMD Sempron
AMD Duo Core
31
CHAPTER FOUR
COMPUTER SOFTWARE
Computer Software:
This is a collection of computer programs and related data that provides
instructions to the computer hardware.
OR
Computer software is an interface between hardware and its users.
32
2. In-house developed software
These are customized programs written by a programmer or software developer under
contract.
3. Software release
Is the public or private distribution of a new or upgraded version of software product.
4. Software version
Software version also known as software upgrade is the major upgrade in a current
software leading to even changes in software interface and some procedures.
5. Software suit
This is a collection of individual application software packages sold as a single package.
E.g. Database software, spreadsheet, presentation, word processor, publisher software
are all sold under Microsoft Office suit.
SYSTEM SOFTWARE
System software is set of programs that manage and control the operations of a
computer and other types of software that run on it.
CLASSIFICATIONS OF SYSTEM SOFTWARE
There are three classification of system software namely:
1 Operating systems
This is a set of programs containing instructions that coordinate all the activities among
computer hardware devices. E.g. Windows, MS DOS, Linux.
2 Utility programs
This is software designed to help analyze, configure or maintain a computer system.
E.g. Antivirus, back up, screen saver, debugger, file compression, etc.
3. Programming languages
These are artificial languages designed to communicate instructions to a machine,
particularly a computer. E.g. BASIC, COBOL, FORTRAN, PASCAL, etc.
33
OPERATING SYSTEM
What is meant by Operating system?
This is a set of programs containing instructions that coordinate all the activities
among computer hardware devices.
34
By downloading open source copies of the software from internet.
By purchasing a licensed copy from authorized software vendors.
A University student on internship has just bought a new laptop for his
computing work, suggest any three software programs he will need installed
on his computer before using it.
Operating system such as Windows 7, Windows 8
Antivirus software
Software suit such as MS office
Device driver software.
35
2. File compression
This adjusts or reduces the size of a file with programs such as winZip to improve
system performance.
3. Diagnostic utility
This compiles technical information showing identified problems in the system.
4. Network utility
These analyse the computer network connectivity, configures network settings, checks
data transfer or log events
5. Antivirus
This is a utility that scans a computer system for the possibility of malware and viruses.
6. Backup software
These are utilities that make copies of all information on a disk and restores either the
entire disk (e.g. in the event of disk failure) or accidental deletion of information.
7. File viewer
This is a program that enables the viewing of the location and access to contents of a
file.
8. Cryptography utility
This enables data to be transmitted over a communication channel without it being
hacked.
9. Memory testers
Checks for failures in the storage of the system.
10. Disk cleaners
This enables the computer user to decide on what to delete in case the hard disk is full.
11. Screen savers
Prevents phosphor burn out in most CRTs and LCDs
PROGRAMING LANGUAGES
What are programming languages?
These are artificial languages designed to communicate instructions to a computer
system.
CLASSIFICATIONS OF PROGRAMMING LANGUAGES
There are four major classifications of programming languages.
Machine languages
Assembler languages
High level languages
Fourth generation languages
Distinguish between machine language and high level language
Machine languages are languages written in binary form in the computer and
are extremely hard for humans to read and write.
While
High level languages are languages consisting of statements or sequences of text
including words, numbers and punctuations much written like natural languages.
36
EXAMPLE OF HIGH LEVEL LANGUAGES
BASIC (Beginners All Purpose Symbolic Instruction Code)
COBOL (Common Business Oriented Language)
FORTRAN (Formula Transition)
Pascal
ADVANTAGES OF HIGH LEVEL LANGUAGES
They are machine independent
They are user friendly.
They are problem oriented
They are easier to learn, write, correct and revise than assembler and machine languages.
Distinguish between Command Line Interface and Graphical User Interface
Command Line Interface is an action that prompts a computer user to type in
commands or instructions e.g. Log in details such as user name and password.
While
Graphical User Interface is an action where a user clicks on any command
especially graphics e.g. copy and paste or moving an item.
ADVANTAGES OF USING GUI
Give two advantages of using a GUI in operating systems
It is easy to learn and use unlike command line interface
It is user friendly since it offers guidelines on how to navigate programs
It is easy to transfer data from one window to another by the drag and
drop method
One does not need to master the commands in order to use it unlike the command line
interface
Mention one similarity between GUI and menu driven interfaces
Both interfaces have a list of options to choose from
DIFFERENCES BETWEEN GUI AND MENU DRIVEN INTERFACES
The menu driven interface has no icons unlike GUI that has icons
The menu driven interface does not allow the use of pointing devices unlike GUI
APPLICATION SOFTWARE
Application software are programs designed to help a user perform a specific task.
Examples of application software
Word processor e.g. MS Office Word, K-Word, Apple pages, King soft Word, etc
Database software e.g. MS Office Access, Dbase, Paradox, Oracle
Spreadsheet e.g. MS Office Excel, apple numbers, MS Visi Calc, etc
Presentation software e.g. MS Office Power Point, Harvard Graphics, Corel presentation
Browsing software e.g. Mozilla Fire Fox, Internet Explorer, Opera, Netscape, etc
Multimedia software e.g. Windows media player, VLC player, Real player for playing audio
and video files.
Educational software such as Encarta, Matlab, Google earth, etc
Web design software such as Java, HTML, MS Front Page, etc
37
Desktop publishing software such as MS publisher, Adobe photo shop, etc
CATEGORIES OF APPLICATION SOFTWARE
Licensed software
This is where a user purchases only the license of the software and not the software
itself. The vendor allows for the installation of this software on a specific number of
machines.
Commercial/ sold
This is where the user purchases a legitimate copy of the software itself from the vendor
and is free to resale it.
Freeware
This is the application software that can be downloaded, used and copied without any
restrictions. E.g. internet software such as web browsers, file converters, etc.
Shareware
This is an application software that can be downloaded but you need to pay some
amount of money for using them.
Open source
This is software made available with their source code that a user is free to modify its
code and use it
Needs to be installed
This is software that has to be installed before you use your computer, such as device
driver software, MS office suit
Run online
This is software that runs online and you do not necessarily need to download it e.g.
Antivirus, Internet games
Distinguish between Custom made software and off the shelf software.
Custom made (special purpose/ tailor made software) is software written to
meet the needs of an organization that cannot be usually satisfied by other sources of
software.
While
Off-the-shelf ( general purpose/ packaged software) is software which may be
used for a wide variety of purposes, e.g. Word processors, spreadsheets, databases,
presentations, etc
Distinguish between single user license and site license.
Single user license is a license agreement that gives a software buyer the right to
install and use software on a single computer at a time.
While
Site license is a license that gives a software buyer the right to use and install the
software on multiple computers at a single site.
38
WORD PROCESSORS
What is meant be Word processing?
This refers to the process of entering and manipulating a document using a computer
and computer programs.
What is a word processing application?
Word processing applications are computer programs that are used for of creating,
saving, editing, formatting and printing text documents.
EXAMPLES OF WORD PROCESSORS/ WORD PROCESSING APPLICATIONS
Microsoft Office Word,
Corel WordPerfect,
Lotus WordPro,
Apple Pages,
OpenOffice.org Writer,
LibreOffice Writer,
KWord
Celframe Write
Kingsoft Writer etc.
41
2. Freezing and unfreezing panes
This is a feature that enables headings of a large worksheet to be viewed as you scroll
through a work sheet. In this case these headings do not disappear as you scroll
through.
SPREADSHEET CELL ERROR MESSAGES
1. #VALUE. An argument or operand used is of wrong type
2. #NAME. It means that Microsoft Excel does not recognize the name used in the formula
3. ######. The cell width needs to be adjusted such that the values are all seen.
ERROR VALUES IN MS EXCEL
1. #DIV/0!. The formula is trying to divide by 0
2. #N/A!. No value is available
3. #NULL!. You specified an intersection of two areas that do not intersect
4. #NUM. There is a problem with a number used in the formula
5. #REF. The formula refers to a cell that is not valid e.g. 6E instead of E6.
Distinguish between a formula and a function as used in spread sheets
A formula is a sequence of instructions for performing calculations and displaying
result in a cell.
While
A function is a predefined formula that provides shortcuts for commonly used
calculations.
FUNCTIONS USED IN SPREAD SHEETS
Sum
Average
Maximum
Minimum
Count
Mode
If
Median
Rank
Explain the meaning of these terms as used in chats & graphs in spreadsheets
1. Data series
These are related data points or data markers that are plotted in a chart usually
distinguished by a unique colour or pattern.
2. Legends
These are small boxes that identify the pattern or colour assigned to data series in a
chart.
3. Embedded Chat
This is a chart which is created within the same worksheet having the table.
42
UB ICT SIMPLIFIED
4. Chart sheet
This is a chart displayed on a separate worksheet from the real sheet onto which a
table is formed.
Mention one data management tool used in spread sheet.
Sorting
Filtering
Creating charts/ graphs
44
SUB ICT SIMPLIFIED
A B C D E F G H
1
2 S850/1 S850/2
NAME S850/ S850/ OUT OF OUT OF TOTAL GRADE POSITION
1 2 40% 60%
3
4 Ann 55 80 22 48 70 D1 2
5 Fred 57 59
6 James 43 50
7 Kezia 73 80
8 David 59 59
9 Maria 66 70
m
1 Suzan 49 40
0
1 Oliver 50 57
1
ELECTRONIC PUBLISHING
Define the term electronic publishing?
This is the production, distribution and user interaction of
computer based production of text, graphics and other interactive media.
OR
It is the type of publishing that is used to create and
disseminate information by electronic means including email and via web.
46
Journals
Magazines
Flyers
Posters
Calendars
Brochures
Certificates
Banners
Business cards
News letters
Greeting cards
48
council department.
“Security” or “Council”
The table below shows part of a database. Use it to answer the questions that
follow.
49
number field can be formatted with an input mask to accept ten digits that are automatically
formatted as
“(555) 123-4567. And the blank field will look like ( )
CHAPTER FIVE
INTERNET &
WWW
Introduction to Internet
Internet Services
Electronic Mail (E-mail)
World Wide Web (WWW)
INTRODUCTION TO INTERNET
Internet is the global connection of computers linked together sharing information and other resources.
OR
This is a worldwide network with more than 100 million users that are linked for the
exchange of data, news, conversation and commerce.
OR
It is an arrangement of connected computers which allows the computer users all over
the globe to exchange information.
50
SUB ICT SIMPLIFIED
It is based on the networking technologies of the Internet Protocol Suite. It is the successor of
the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S
Department of Defense. The internet is also the communications backbone underlying the
World Wide Web (WWW).
COMMUNICATION PROTOCOLS
The term protocol or internet protocol refers to the set of rules that govern transmission of
data across all computers on a network
OR
These are rules that govern how communication over the internet is carried out.
PROTOCOLS (i) IP
Internet Protocol (IP) is an address that uniquely identifies each computer on
the internet.
(a)
TCP/IP
Transmission Control Protocol/ Internet Protocol (TCP/IP) is a protocol suite that
determines how computers connect, send and receive information on the
internet.
(b)
HTML
Hyper Text Markup Language (HTML) refers to the Hypertext authority system which
transmit text, data, images, sound and multimedia file types across a network.
(c)
HTTP
Hyper Text Transfer Protocol (HTTP) is a set of rules by which an HTML document is
transferred over the web.
(d) FTP
File Transfer Protocol (FTP) enables file sharing between hosts.
OR
FTP is an internet standard that allows users to upload and download files with
computers
(g) SMTP
Simple Mail Transfer Protocol (SMTP) is a protocol designed to transfer electronic mail
reliably and efficiently. SMTP is a mail service modeled o the FTP file transfer server.
SMTP transfers mail messages between systems and provides notification regarding
incoming mail.
(h) TCP/IP
Transmission Control Protocol/ Internet Protocol (TCP/IP) is a protocol also used in data
transfer on a network
(i) TELNET
Is an Internet protocol that enables a computer to function as a terminal working from
a remote computer.
POSITIVE EFFECTS
NEGATIVE EFFECTS
INTERNET SERVICES
REQUIREMENTS NEEDED FOR AN INTERNET CONNECTION
E-banking
E-Learning
E-publishing
Is the process of sending and receiving messages across the internet or other computer
networks.
This is any technology ranging from real-time online chat over instant messaging and
online forums to fully immersive graphical social environment.
This is a group of subscribers to an organization, thus the organization uses this list to send
material to multiple recipients.
These are discussion groups/ forums within the Usenet system for messages posted from
different locations.
These are online discussion sites where people hold conversations in the forms of posted
messages. In this case messages are temporarily archived.
This is a set of communication technology used for text-based communication between two
or more participants over the internet or other types of networks.
54
(vii) VoIP
VoIP (Voice Over Internet Protocol) refers to the communication protocols, technologies,
methodologies and transmission techniques involved in the delivery of voice
communications and multimedia sessions over the Internet Protocol network (IP)
OR
VoIP (Voice Over Internet Protocol) is a method for taking analog audio signals and
converts them into digital data that can be transmitted over the internet.
1. URL
This is an acronym for Uniform Resource Locator. It is the global address of a website and
other resources on the World Wide Web (WWW).
2. Uploading
This is the process of transferring files (Text, Audio, Video, Graphics and Sound) from one
computer system to another or to a storage device or the internet.
3. Downloading
This is the process of retrieving or bringing copies of files (Text, Audio, Video, Graphics and
Sound) over to your computer or storage device from another location such as the internet.
4. Surfing
5. Online meetings
This is where people who are far away can chat virtually using services such as video
conferences, Skyping, etc
This is a company that supplies connections to the internet, including offering services related
to the internet.
Internet access
Domain name registration
56
Web hosting
Providing customized e-mail addresses
Access to software tools
Provide fire walls
Manage internet traffic e.g. By use of dedicated lines
Provide backup storage of data.
Authenticity
Additional value services such as web hosting, firewalls, backup
storage of data
Experience in the internet field
OR
This is a method of exchanging digital messages from one or more recipients across the
internet or other computer networks.
Gmail
Yahoo mail
Hotmail
Ovimail
1) Compose
This is the process of creating a new mail
2) Inbox
This is the storage location of incoming mails
3) Sign out
This is the process of exiting an email account
4) Forward
This feature allows one to pass on a received mail to other recipients
5) Check mail
This feature enables a user to view all the details of a received mail.
1) To:
This specifies to whom the message was sent. This is a field where you type in the
recipients email address.
2) Subject:
This provides a hint as to what the message is about.
3) Carbon Copy (CC):
This tells us that the message was “carbon copied” to another user. In other words this
field is often used when one wants to send a copy of the email to other recipients.
Recipient’s address
The subject
Attachment
Usenet
SPAM is known to be unsolicited mail inbox. State any three potential harm that
such mail can bring.
Separator
Dot
59
Sign in is used to access content of an already existing email
account by use of a user name and password.
While
Sign up is used to create a new email account.
60
ADVANTAGES OF USING MOBILE PHONES FOR INTERNET ACCESS
Advertisers pay for the search service and customers can be targeted for specific types
of Ads on the basics of their search results.
iii. Online banking:
This involves the Electronic transfer of funds using credit card applications
i.
GSM
Global System for Mobiles
ii. GPRS
General Packet Radio Service
Webcam
Microphone
Speaker
61
DOMAIN NAME
This is a unique name that denotes a company, an organization, society or group on the internet.
i.
Com
Commercial business e.g. www.microsoft.com or www.mountofolivescollege.sc.ug
ii. Org
Nonprofit Organization e.g. www.ngo.org
iii. Edu
Education e.g. www.ncsu.edu or www.duke.edu
iv. Net
Networking organization e.g. www.earthlink.net
v. Gov
Government agency e.g. www.epa.gove or www.whitehouse.gov
vi. Mil
Military e.g. www.army.mil or www.navy.mil
.com
.org
.net
.gov
.edu
.mil
This is an internationally complex system of servers or web servers that communicate with each other
over the internet with client machines running browser software.
i. Web
browser
This is an application software or program designed to enable users access, retrieve, view
documents and other resources on the internet. E.g. Internet Explorer, Mozilla fire fox, Google
chrome, Opera, Netscape, etc
WEB BROWSERS
A web browser is a application software or program that enable users to access, retrieve,
view documents and other resources on the internet.
Google chrome
Mozilla fire fox
Internet explorer
Opera
Netscape
Mosaic
Lobo
Kmeleon
Safari
Sea Monkey
Abaco
Camino
Epiphany
Flock
63
WEBSITES AND WEB PAGES
While
A web page is a file (document) that can be accessed and read over the World Wide Web.
TYPES OF WEBSITES
Select an item
64
TERMS USED IN THE WORL WIDE WEB
Surfer
This is a person who spends time exploring the world wide web.
Web portal
This is a website that provides specialized services such as email, searching, news updates
financial updates, weather and links to selected websites.
Browsing
This is the process of navigating through web pages and websites over the internet.
Newsgroups
These are organized groups of internet users sharing ideas and interests.
VoIP
VoIP (Voice Over Internet Protocol) refers to the communication protocols, technologies,
methodologies and transmission techniques involved in the delivery of voice communications
and multimedia sessions over the internet protocol network (IP)
Or
VoIP (Voice Over Internet Protocol) is a method for taking analog audio signals and turning
them into digital data that can be transmitted over the internet.
This refers to a string of characters that specify the address of a web page.
There are three main parts of the URL and these include;
Protocol
Web server’s domain name
File name
Example. http://www.mutocorperation.com/systemsecurity.pdf
65
Study the URL below and answer the questions that follow:
http://www.muto.org/countries/uganda
MULTIMEDIA SITES
These are websites for entertainment and news mainly containing videos, music, radio broadcasts, Live
TV
You Tube
Tube mate
Fan fridge
Free Book search
FindSounds
Meta Café
Musgle
PDAs
Portable Digital Assistants
HTML
Hyper Text Markup Language
IBM
International Business Machine
Wi-Fi
Wireless Fidelity
ATA
66
INTERNET TELEPHONY
This refers to a broad range of services over the internet such as transmitting voice, video and even fax
that were traditionally performed over the telephone line.
OR
Internet telephony also known as VoIP (Voice Over Internet Protocol) refers to the communication
protocols, technologies, methodologies and transmission techniques involved in the delivery of voice
communications and multimedia sessions over the internet protocol network (IP).
PC to PC
Users can connect to anyone else using the same program for real time video chatting over an
existing internet connection.
PC to Phone
Some programs such as Skype allow a computer user to dial an actual phone number, so that
one user is using their computer microphone and the other user is using telephone.
PC to fax
Internet telephony can be used to send fax transmissions to a physical fax machine.
Phone to Phone services
This is where a user needs to purchase a device (such as Casio PAP2T) and plug it into an
internet router, thus allowing any phone to be plugged into it.
Mobile phone to PC or Phone
Skype provides free applications for smart phones to enable Skype users to make free phone
calls or at a small fee.
The emerging usage of the ICTs has seen the Electronic form of payment (e-payment)
used by most service sectors and organizations. Mention any three companies/
government entities in Uganda using e-payment system.
UMEME
Uganda Revenue Authority (URA)-e-tax
Kampala Capital City Authority (KCCA)
National Water and Sewerage Cooperation
State any four advantages of using the e-payment method rather than the traditional
way of money payment.
67
SUB ICT SIMPLIFIED
Skype
Yahoo messenger
AOL instant messenger
Whatsapp
Palm Chat. etc
Voice (VoIP)
Video e.g. Video phone calls
Transmitting fax
Low cost
Some internet telephony companies allow free PC to PC calls for its software users. PC to
phone connections are cheaper than traditional phone calls.
Support conference calling
Some Internet telephony companies offer a conference calling features as part of the
service package for no additional fee
Portability
Internet telephony services work anywhere thus the user finds available broadband access.
Support video
Internet telephony features has the ability to enable users to transmit and watch video, thus
one with a laptop and internet connection can use internet telephony from anywhere.
Area Code
A subscriber to VoIP/ internet telephony service is able to assign any area code to his
phone number for incoming calls.
68
SUB ICT SIMPLIFIED
TELECOMMUTING
This is a work arrangement in which an employee works at a location that is remote from the
actual business facility at which he is employed.
Teleconferencing
Video conferencing
Internet telephony
Mobile telecommunication technology
Telecommuters may miss out on information sharing and new corporate strategy and at
high projects at their companies.
Co-worker jealousy
Other employees miss out on telecommuting may imagine that one who telecommutes
receives more privileges thus jealousy may come up.
70
SUB ICT SIMPLIFIED
CHAPTER
SIX
DATA COMMUNICATION
& NETWORKING
Introduction to the data communication
Elements of data communication
Transmission media
Networking
INTRODUCTION TO DATA COMMUNICATION
This refers to the high speed data exchange between computers and or other electronic devices
via network media such as cables or wireless.
1. Sender:
This refers to a device that initiates an instruction to transmit data and instructions e.g. a
source computer.
2. Receiver:
This is a device that accepts the data signals from the source device.
3. Transmission medium:
This is a communication channel or path over which the data signals are sent e.g. Cables or
wireless.
4. Protocol:
This is set of rules and procedures for exchanging information among computer devices on
a network. E.g. Ethernet, TCP/IP.
5. Messages:
The data/content/information to be relayed or transmitted over a transmission medium.
71
6. Communication device/ signal converter:
Is a device that converts data or instructions from the sending device into signals that can
be carried out by a transmission medium to a receiver.
These are tools that enable you to emulate and test networks.
1. Email
This is a method of exchanging digital messages from the author to one or more
recipients across a computer network or the internet.
2. Skype
This is a service that allows users to communicate with peers by voice using a microphone or
by video using a webcam and instant messaging using internet.
3. Instant messaging (IM)
This is a set of communication technologies used for text based messaging between two
or more participants over the internet or other types of networks.
4. News groups
These are forums or discussion groups usually within the Usenet system for messages
posted from many users in different locations.
1. Bandwidth
This is the maximum amount of data that can be transmitted by a communication medium in
a fixed amount of time.
72
2. Network topology
This is the physical or logical arrangement / organization of computers, communication
media and other peripherals to facilitate data flow in a network.
3. Duplex
This refers to a transmission of data signals in both directions simultaneously.
4. Simplex
This is transmission of signals in only one direction.
5. Half duplex
This is where transmission of signals is possible in both directions but one direction at a time.
TRANSMISSION MEDIA
It has greater capacity in terms of bandwidth. Thus hundreds of GBps over tens of kilometers
have been demonstrated.
Are highly secure, as they are resistant to tapping, eaves dropping.
Enable faster data transmission since they use light to transmit data,
They are immune to electromagnetic and electrical interference which bring about noise.
It is cheap when transmitting for longer distances.
Has lower attenuation which is constant over a wide range.
They are smaller in size and lighter in weight hence offering an easier way to use along public
ways and reducing structural support requirements.
73
Distinguish between Digital and analog data
WIRELESS TECHNOLOGY
Wireless technology is a kind of data signal transmission from one point to another without
using physical connections.
Microwaves
Infrared
Wi-Fi (Wireless Fidelity)
Blue tooth
Satellite (broadcasting) communication
. Wi-Fi networks have a limited range making it difficult to communicate with distant devices.
Wi-Fi has a high power consumption compared to other standards such Bluetooth. This
makes the battery life in Wi-Fi mobile devices a concern.
Mobile use of Wi-Fi over wide ranges is limited, for instance in automobile moving
from one hotspot to another.
Wi-Fi is less secure than wired connections (Ethernet) since the intruder does not need physical
connection. Unencrypted internet access can easily be detected by intruders.
Wi-Fi possess a high data security risk especially for open wireless access to a LAN (un
encrypted Wi-Fi networks)
74
There is always interference. Wi-Fi connections can be disrupted or
the internet speed lowered by having other devices in the same devices. There is Wi-Fi
pollution due to the excessive number of access points in the same area which can lead to
interference/ overlapping of signals.
1. Blue tooth
This is a technology standard of exchanging data over shot distances using shot wavelength
radio transmission over mobile devices.
2. Satellite
This is a broadcasting transmission in effect from a microwave relay station where two or
more ground based microwave transmitters/ receivers are linked together
3. Wi-Fi
This is a popular technology that allows an electronic device to exchange data wirelessly (using
radio waves) over a computer network, including high speed internet connection.
4. Infrared
This is a technology standard of electromagnetic radiation used for data transfer in
industrial, scientific and medical applications.
5. Microwaves
This is a technology of radio waves which is extensively used for point to
point telecommunication
ADVANTAGES AND DISADVANTAGES OF USING MOBILE PHONES
Advantages
Disadvantages
75
They are expensive in terms of usage and maintenance
Can easily be stolen
When they develop mechanical faults, they ruin communication
They cannot be used in areas where there is no network coverage
Sometimes they are susceptible to tapping or eaves dropping by security agencies of the
government hence depriving privacy of an individual.
Over exposure to radiation from these phones leads to health problems.
76
Used in Video game consoles to connect a network resource.
Used in digital audio player to connect a network resource.
5. Microwaves
They are used in broadcasting and telecommunication transmissions such as televisions
broadcasts, in Metropolitan Area Network (MAN) such as WiMAX.
In Radars(found in air traffic control, whether forecasting, navigation of ships and
speed limit enforcement) when detecting the range, speed and other characteristics of
remote objects.
They are used in Radio astronomy e.g. when determining the distance to the moon or
mapping the invisible surface of Venus through cloud cover,
They are used in navigation such as the Global Position System(GPS)
They are used in micro ovens during the heating process in industrial process
(drying and curing of products)
They are used to transmit power over long distances e.g. in Solar power satellite with
systems with large solar arrays that would beam power down to the earth’s surface
via microwaves
TOPIC:
COMPUTER NETWORK
This is a collection of computers and other hardware devices linked together using a
communication media for purpose of communication and resource sharing.
To enable resource sharing like printers, storage devices, modems, application programs, data,
etc
To enable remote communication between devices using services such as Emails, chat rooms,
instant messaging, teleconferencing, etc
To enable distributed processing facilities e.g. data can be processed from many terminals and
then stored on a common server.
To enable data security and management. A network administrator can easily monitor and
manage a company’s sensitive data with high security.
To ensure cost effectiveness and reliability in an organization.
Reduces chances of data loss in an organization.
77
Cost of installation. An organization hast to choose a network basing on cost effectiveness and
within their budget.
Number of computers and other hardware devices to be connected.
The communication medium to be used such as cabling system or wireless technology.
The architecture of the building to be used.
The number of users to access the network. A bigger number of users require a large network.
The bandwidth to be used on the network. This will determine the speed of the network.
Expansion of the network. The future expansion of a network will depend on the topology
used i.e. a star topology easily enables future expansion
The technicalities involved in setting the network.
The safety provisions of the network.
Clients/ workstations
Server
Transmission media (either physical or wireless)
Network interface card (NIC)
Router/ bridges/ gateways
Protocols
Network software like Networking Operating System.
Costly and Complicated: It is expensive to install cables and other network devices, and also to
maintain the network.
Unreliability/ Downtime: A fault in the network server, switches, routers can prevent the
whole network from working.
Security concerns: Networks are prone to hackers and crackers.
Harmful content: The internet is full of harmful/ inappropriate content such as porn. The
internet may also expose one to scams.
Virus issue: Computer networks are prone to virus attacks which may eventually spread and
corrupt the data.
NETWORK DEVICES
1. Terminal
This is the work station/ client/ computer from where data is sent or received
2. Server
This is the main computer that facilitates data communication
78
It is the computer running software that enables it to serve specific requests from
other computers/ clients
3. Transmission media
This is a communication channel or path over which data signals are sent from source
to destination. This can either be physical or wireless
Distinguish between Peer to Peer and Client server models in computer networks.
A Peer to Peer network model allows any user to share files and other resources with any other
user and does not require a central dedicated server computer. In this model each computer acts
as a server and a client.
While
In a server client network model environment, files are stored on a centralized high speed file server
PC that is made available to client PCs. All other networking devices such as printers and internet
connections are routed through the server.
Mention five advantages of a client server model over Peer to Peer client model network.
Centralization: Resources and data security are controlled through the server.
Scalability: Any or all other elements can be replaced individually as the needs increase.
Flexibility: New technologies can easily be integrated into the system.
Interoperability: All components (client, servers & network) work together.
Accessibility: Servers can be accessed remotely and across multiple platforms.
79
underground
coaxial cables, and satellite and microwave communication. WAN usually consist of many LANs
and MANs connected together to form a large network.
4. Wireless Local Area Network (WLAN)
This is a kind of local area network that uses non-physical network connection to
communicate to nodes. Usually this does not involve use of cabling medium for data
transmission.
5. Wireless Fidelity (Wi-Fi)
This is a popular technology that allows an electronic device to exchange data wirelessly (using
radio waves) over a computer network, including high speed internet connection.
Give three reasons why the school should not use blue tooth technology to create a
network.
NETWORK TOPOLOGIES
A network topology is the layout in which computers are arranged for communication with
other devices.
1. STAR TOPOLOGY
In this topology all devices/ nodes are connected to a central hub. Nodes communicate
across the network by passing data through the hub. The hub does the broadcasting to other
nodes.
80
only one device can send data at a time.
3. RING TOPOLOGY
In this topology, all devices and computers are connected to one another in a circle. Each
station/ node is responsible for regenerating and retransmitting signals across the network to
its neighbours.
4. TREE TOPOLOGY
This topology consists characteristics of bus and star topology. It consists of star-configured
work stations connected to a linear bus backbone cable. It allows the expansion of an
existing network.
This is a technology standard of electromagnetic radiation with longer wavelengths than those of
81
visible spectrum used for data transfer in industrial, scientific and medical applications.
APPLICATIONS OF INFRARED
They are used in night vision, using infrared illuminations to observe people and
animations without being detected.
Are used in Astronomy by using sensor equipped telescopes to penetrate dusty regions of
space; to detect objects such as planets.
Infrared imaging cameras are used to detect heat loss in insulated systems, observing changing
blood flow in the skin, etc.
Infrared imaging is used extensively for military and civilian purposes such as target
acquisition, surveillance, night vision, environment monitoring, etc
Whether forecasting
Logical topology deals with the way data flows on one device to another on a network e.g.
Ethernet, token Ring.
While
Physical topology refers to the physical layout or arrangement of computers on a network e.g.
Star, bus, ring, tree and mesh topology.
UNIX/ Linux
Macintosh Operating System (Mac OS)
Novell Netware
Cisco Internetwork Operating System
Microsoft windows server
82
State true or false for each of these networking concepts
1. Router
This is a device that connects multiple computers to a single Digital Subscriber Line (DSL)
for internet access.
2. Bridge
This reduces the amount of traffic on a LAN by dividing it into segments and address filtering.
3. Gateway
This is network device that allows access from one network to another e.g. from one LAN
to another WAN.
4. Repeater
This is a device that receives a data signal from one point of a network, then amplifies it
and then retransmits it to other parts of the network.
5. Network software
This is software that is designed to help set up, manage and monitor computer networks.
Coaxial cables are the most commonly used networking cable medium sometimes
in the absence of twisted cables.
While
A switch forwards data packets directly to the address node using the point to point method.
83
CHAPTER SEVEN
COMPUTER SECURITY, ICT ETHICAL ISSUES
& EMMERGING TECHNOLOGY
Computer Security
Privacy and ethical issues
Emerging Technologies
ICT industry
COMPUTER SECURITY
Computer security refers to all processes and mechanisms by which Computer-based equipment,
information and services are protected from unintended or unauthorized access, change or
destruction.
There are two basic forms of computer security and these namely;
1. Data security
This is a means of protecting a database from destructive forces or unauthorized users.
Data security can be in form of backup, data masking, disk encryption.
2. Physical security
This is the protection of personnel, hardware, programs, networks and data from physical
circumstances and events leading to serious losses or damage to an organization. This security
can be in form of use of Fire extinguishers, use of sensors and CCTV to guard against intrusion
by burglars.
This is a situation where a person can maliciously, forcefully gain access to hardware with intent
to steal or destroy data saved on them.
SOME POSSIBLE THREATS TO DATA SECURITY
84
Computer viruses
Hacking
Cracking
Phishing
Fraud
Eaves dropping
Sabotage
Surveillance
USED IN COMPUTER SECURITY
1. Hacking
This is the act of breaking into a computer system to gain unauthorized access. This may
also involve defeating security capabilities, use of unauthorized revelation of passwords.
2. Denial of service Attack
This is an attempt to make a machine or network resources unavailable to its intended users.
It may also involve efforts of one or more people to temporarily or indefinitely interrupt or
suspend services of a host connected to the internet such as those of banks, credit card
payments gateways.
3. Spam
This is the unsolicited sending of bulk email to users of internet such as email accounts
4. Data masking
This is the process of obscuring or masking of specific data within a data base table or cell to
ensure that data security is maintained and sensitive information is not exposed to
unauthorized personnel.
5. Data erasure
This is a method of software based overwriting that completely destroys all electronic data
residing on a hard drive or other digital media to ensure that no sensitive data os leaked
when an asset is retired or reused.
WAYS OF ENSURING THAT DATA AND PROGRAMS ARE NOT LOST IN CASE OF A DISASTER.
We can protect against Hardware security threats by use of a locking mechanism for desktop
or use of chain mechanisms for laptops
We can protect against Denial of service attacks by use of fire walls
Sniffing can be protected against by use of fire walls
Virus and worms can be protected against by use of Genuine Antivirus software.
OR
This is a mini program that duplicates itself and attaches its replica to other programs and documents.
By use of a removable storage device such as flash disk, memory card which Hs been
contaminated.
Through an email attachment.
Through downloading content on the internet from un trusted sites/ sources.
As part of another program
From pirated software (Demo/ trial version software i.e. software without a product key/
86
license key)
Through infected proprietary software
In any country, security agencies usually employee the mechanisms of Trapping and
Eaves dropping in case of tracking down crime.
Eavesdropping is the act of secretly listening to the private conversation of others without
their consent.
While
Backup refers to the making of copies of data so that additional copies may be used to restore
the original after a data loss event.
87
Set up automatic backup intervals
1. Spoofing:
Is a situation in which a person or program successfully masquerades as another by
falsifying data and there by gaining an illegitimate advantage.
2. Fraud:
Is the use of a computer system to create fake documents, hide information or
cheat unsuspecting public with intention of gaining monetary benefits.
3. Logic Bomb:
This is a malicious software that is triggered with time.
4. Denial of service:
Is a attempt to make a machine or network resources unavailable to its intended users.
5. Sniffing:
Is the act of intercepting TCP/IP packets while they are transferred on a network
HACKING
This is the act of seeking and exploiting weaknesses in a computer system or computer network. A
hacker may be motivated by multitude of reasons such as profit, protest or challenge.
FORMS OF HACKING
Jenifer the school secretary has lost all her data in the computer. She suspects that
either someone hacked into her computer system or it was due to a hardware
failure.
88
Mention four ways she should have to protect her data.
COMPUTER CRIME
This refers to any criminal activities which involve the use of ICTs to gain illegal or unauthorized
access to a computer system with intent of damaging, deleting or altering computer data.
This is the form of access control measure that takes the user’s attributes such as finger prints
and facial
recognition.
Data encryption
This is the use of unreadable data (cipher) during data transmission which is later decrypted
by the recipient. In most cases it is only the sender and the receiver who is able to understand
90
the encrypted data.
Security patch
This is a piece of code that is added to software so as to enhance its security
feature.
Firewalls
This is a security mechanism installed at the network gateway to block any
unauthorized access to the system resources.
Use of Guinean and updated antivirus software.
COMPUTER FRAUD
This is the use of computer systems to create fake documents, hide information or cheat unsuspecting
public with the intention of monetary benefits.
FORMS OF COMPUTER FRAUD
Hacking
Online identity theft
Salami attack
1. Data security
91
This involves protecting data against unauthorized access, alteration and destruction.
2. Privacy
This involves securing personal data so that only the owner can access it
Mention four precautions a financial institution such as a bank can take to prevent illegal
data alteration.
Use of authentication method where the bank staff will be required to log into system whenever
they are to gain access.
Use of Audit trails
Setup log files in the system
Limit the level of access to data
Financial Identity theft involves use of false identity to obtain goods and services.
While
Identity Cloning is the use of another user’s information to pose as a false user.
Illegal migration
Black mail
Terrorism
CYBER STALKING
This is the use of ICTs mainly the internet to torture other individuals through false accusation,
transmission of threats, damage to data and equipment.
False accusations
Obscene emails
Abusive phone calls.
1. Spyware
This is an intelligent program that is able to secretly track and collect information about
users and their computers e.g. cookies
2. Password
This is a code that must be keyed in so as to gain access to a file or system resource.
3. Authentication
This is the process of verifying the log on credentials of a user requesting access to a computer
system resource.
4. Log files
These are system files installed in a computer system to maintain a record of how the system
92
is being used
5. Fire wall
This is a security mechanism installed at the network gateway to block any unauthorized access
to the system resource.
A hacker is a person who illegally accesses computer resources without prior knowledge from the
owner with an aim of archiving wrong endings
While
A cracker is a malicious intruder who breaks into a computer system for illegal purpose. This person
usually knows the codes and passwords of the system.
Copying of information
Altering the passwords and user names on the system.
Deleting the files
Modifying information in the system
Infecting systems with computer viruses
This is a security mechanism installed at the network gateway to block any unauthorized access to
the system resources.
FUNCTIONS OF A FIREWALL
A Cyber terrorist is someone who intimidates or coerces a government or organization to advance his
or her political or social objectives by launching computer based attacks against Computers, Network
and Information stored on them.
While
Cyber extortion is a form of cyber terrorism in which a website, email server or computer system is
subjected to repeated denial of service or other malicious attacks by demanding money in return
for promising to stop the attacks.
Online blackmail
Denial of service
Identity theft
93
The industry is faced with several ICT ethical issues that affect the moral values and
1. Plagiarism
This is the wrongful appropriation, purloining and publication of another author’s
language, thoughts, ideas or expression and the representation of them as one’s own
original work.
2. Software Piracy
This refers to the act of duplicating and installing of a copy of software into your
computer without authorization.
OR
It refers to the un authorized use or distribution of
software
3. Copyright Infringement
This refers to the copying of intellectual property without written permission from the
copyright holder, which is typically a publisher or other business representing or assigned by
the work’s creator.
4. Misuse
This refers to the use of harmful content such as porn, spam, stolen ID, hacking,
etc
5. Issue of Libel
This is the publication of false statement that injures one’s business or personal reputation.
1. Intellectual Property
This means that a company or person owns the rights to some kind of technology or
innovation.
2. Information Privacy
This is about understanding how information technologies impact the privacy of individuals and
developing new privacy preserving and secure technologies to protect them.
Copyright
Trademarks
Patient rights
1. TM
This is a symbol which signifies an unregistered trade mark. Is a recognition, sign, design or
expression which identifies products or services of a particular source from those of others
2. ®
This is a symbol which signifies a registered trade mark.
3. ISBN
94
International Standard Book Number (ISBN) is a unique numeric commercial book identifier
based upon the 9 digit Standard Book Numbering (SBN) code.
To enable electronic distribution and allow extensive evaluation of a product before purchase.
To distinguish a product from one another
A patent is a legal instrument (intellectual property law) declaring that a company or a person
has ownership over an idea/ technology.
While
A trade mark is a recognizable sign, design or expression which identifies products or services of a
particular source from those of others.
This refers to the unauthorized usage of trade marks by producing and trading counterfeit
consumer goods.
Owner of trade mark may pursue legal action against trade mark infringement
A company formally register their trademarks with the government
1. 4G cellular communication
This is a system that provides mobile ultra-broadband internet access. For example use of
laptops with USB wireless modems to smart phones, and to other mobile devices.
95
2. Artificial intelligence
This refers to the intelligence of machines, robots and the branch of computer science used
to create it.
3. 4G optical disks, hologram data storage
Any form of optical data storage in which information can be recorded or read with
3dimensional resolution one that has the ability to enable DVD sized disks to store data to a
level of petabytre
4. General Purpose computing on graphics processing units(GPGPU or GPU)
This is the utilization of graphics processing unit to typically handle computation for
only computer graphics.
5. Radio Frequency Identification(RFDI)
The use of a wireless noncontact system that uses radio frequency electromagnetic fields to
transfer data from a tag attached to an object, for purpose of automatic tracking and
identification.
1. Artificial Intelligence
This refers to the simulation or creating of intelligence similar to humans
2. Digital Forensics
This is a branch of science encompassing the recovery and investigation of material found in
digital devices, often related to computer crime.
SUB ICT SIMPLIFIED
3. Simulation
This is a science of representing behavior of real life situations using a computerized model
4. Virtual reality
This is a condition in which a person becomes psychologically submerged in an artificial setting
generated by a computer system
This is a computer controlled device that mimics a human being in carrying out routine tasks.
APPLICATION AREAS OF ROBOTICS
State any five application areas of robotic technology
Car assembling
Bomb detonation
Inside dangerous chemical areas
In military operations which may seem to be risky
Fire fighting
In repetitive and monotonous tasks in which human performance might depreciate with
time such as in packaging of goods.
97
This one also designs and maintains the databases of the organization, prepares and enforces
standards for the use and security of information in databases.
9. Webmaster:
This is a job which requires one to create / completely design a website and maintain it.
10. Network/ System administrator:
This is a professional responsible for designing, setting up and maintaining a network, including
monitoring of network resources.
11. Graphical designer:
This is a professional who designs and creates either graphics or #D animations for software,
games, movies, web pages, etc.
12. Information Systems manager:
He/ she plans and directs the activities of the entire information services organizations.
13. Secretary:
Uses computers to keep all the necessary information instead of keeping paper files
14. Systems development manager:
98
SUB ICT SIMPLIFIED
FUNCTIONAL COMPUTING
Subsidiary Subject ICT
Paper
1
2 hours 30
minutes
INSTRUCTIONS TO CANDIDATES:
99
SUB ICT SIMPLIFIED
Section C contains three essay type questions. Answer only one. Answers to section
C must be written in the answer booklet provided.
SECTION A:(30
MARKS)
B. Text.
C.
Works.
D. A
byte.
11. How many binary digits are required to store a file with 300 bytes?
A. 300 bits.
D
B.
800bits.
C.
1200bits.
D. 2400 bits.
12. Which of the following key combinations below is used to change case between
uppercase, lower case and sentence case?
A. Ctrl+Z.
B
B.
Shift+F3.
C. Ctrl+A.
D. Ctrl+U.
13. What is the correct sequence of launching Microsoft Office Word Processing
Application?
>Start>Microsoft Office.
B. Hardware.
B
C.
Peripherals.
D.
Equipment.
15. Zooming.
A. Increases the font size.
font size.
D
D. Increases or reduces the magnification.
L S
1 L
4U N D 5O C
103
E
R
6 P
7 L A C E 8Fcommand? (7).
9. Alt+F4 is equivalent to which command?
I A P I(5).
10. What will pressing the F7 key check?
C
9 L O S E 10 SP E L L I N G
(8).
O N T 11.DCtrl+S is equivalent to which command?
(4).
P T E 13 Ctrl+P is equivalent to which command?
Y A (5).
17. The process of combining letters with
T S
11 A V E addresses to produce mass mailing
letters is referred to as mail: (5).
I U 19. Formatting used to display a character
O B above the 12line.
E (11).
21. Ctrl+O is equivalent to which command?
P R
13 I N
14 15 T S (4). N 16P
22. Under which drop down menu will
A T E C you find pageT setup options?
A (4).
23. An alternative name for a graph. (5).
I A 17 M E R G 18E 19S U P E R S C R I P 20T
24. Under which drop down menu will
21 O P E N L P I D Tyou find theR word count option?
A (5). E
25. Under which drop down menu will
F T I L P I Yyou find paragraph formatting
G options?X
(6).
22 F I L E C H A R
23 T 24T O O L S 25F O R M A T
26. Ctrl+X is equivalent to which command?
I R T E(3). A
27. Ctrl+U is equivalent to which command?
26 C U T U N D E R
27 L I N E (9). P
E H
1
1
3
CLUES ACROSS
2. Area at the top of the page which can
display information on every page.
(6).
4. Ctrl+Z is equivalent to which command?
(4).
6. Ctrl+H is equivalent to which
104
CLUES DOWN: called the Format: (7).
1. Pages can be formatted as portrait or: 14. Ctrl+I is equivalent to which
(9). command? (6).
3. Ctrl+B is equivalent to which 15. A special type of Word document, which
command? (4). can be recycled and used to create new
5. Portrait and Landscape are types of documents. (8).
page: (11). 16. When typing, pressing ENTER key
7. Ctrl+V is equivalent to which inserts a ….… break (9)
command? (5). 18. Under which drop down menu will
8. Ctrl+F is equivalent to which command? you find the Cut, Copy and Paste
(4). commands? (4).
9. Ctrl+C is equivalent to which 19. A set combination of formats that has
command? (4). a name and can be applied to text with
11. Formatting used to display a a single click. (5).
character below the line. (9). 20. What does 'T' stand for in RTF? (4).
12. To insert a manual page break, 21. Microsoft Word is often used within a
press the Ctrl key and which other suite of programs, called Microsoft:
key? (5). (6).
13. The tool used to copy formatting
from one item of text to another is
105
SUB ICT SIMPLIFIED
17. Crossword Puzzle 2: Basic concepts of IT. Use the Clues given below to solve this
puzzle.
1 D I 2 R E C T O R Y 3 D
I A 4 M I
G N 5 S 6 O 7 U P S
8 W I N D O W 9S 10 C P U C L C
T O P A 11 M I C R O S O F T A
A M E N 12 I N T E L
L 13 M A I N F R A 14 M E T T
K E I 15 S O F T W A R E
E R C H S
16 L A S E R 17 H A11 R D W A R E K
5
A O R I
18 P R 19 I N T E R 20 T 21 P O W E R P O I N T
T N O H W G
O T 22 I N F O R M A T I O N
P 23 R E A D N E N R
A K R 24 E X 25 C E L 26 V I R 27 U S
N J O 28 E N
29 F R E E 30 W A R E P M I
T O T 31 K E Y B O A R 32 D V 33 C
34 R A 35 M R I O E E
D O 36 E 37 U N I X L 38 S C R E E N
106
SUB ICT SIMPLIFIED
U I G S T
39 A C C E S S 40 G R A P H I C A L A R
E H T L A
T L
39. An application program from Microsoft used for
producing databases. (6).
CLUES ACROSS 40. What does the 'G' in GUI stand for? (9).
1. Alternative name for a folder. (9).
7. A device that protects your computer in the event of a CLUES DOWN
loss of power. (3)
8. Operating system found on most personal computers. 1. Personal computers are not analogue, they are: (7).
(7) 2. W hat does the 'R', in RAM stand for? (6).
10. The brain of the computer. (3). 3. Another name for a floppy disk is: (8).
11. The company that manufactures Windows Operating 4. The ability to run more than one program at a time is
Systems. (9). called. (12)
12. A well-known CPU manufacturer. (5). 5. A device that allows you to digitize a picture or printed
13. A very large, powerful computer used by large page and import the data into your computer. (7).
organizations. (9). 6. Optical Character Recognition acronym (3).
15. Electronic Instructions that tell a computer how to 9. An audio output device. (7).
perform tasks: (8). 14. An audio input device. (10).
16. A common, high speed nonimpact printer, used in 15. Software that can be used for a limited trial period.
offices. (5). (9).
17. Tangible parts of the computer system such as the 16. Small popular portable computer. (6).
Monitor: (8). 19. Small private version of Internet, used only within an
18. An output device that produces a hard copy output organization. (8).
on a physical material like paper. (7). 20. Powdered ink, which is packaged in a print cartridge.
21. Application program from Microsoft used for creating (5).
presentations. (10). 22. Common type of nonimpact printers, which use liquid
22. What is the 'I' in IT short for? (4). ink.(6).
23. What does the 'R' in ROM stand for? (4). 25. A term referring to the legal protection given to text
24. An application program form Microsoft for producing and images that have been placed on the WWW. (9).
spreadsheets. (5). 27. What does the 'U' in USB stand for? (9).
26. Malicious software that can infect a computer. (5). 28. Term used to describe sending messages between
29. A type of software that can be freely copied and computers. (5).
distributed. (8). 30. An application program from Microsoft used for
31. Main input device, consisting of a set of buttons used word-processing. (4).
to operate a computer (8). 32. Operating system widely used before Microsoft
34. When a program loads from disk, it is copied into: Windows. (3)
(3). 33. What does the 'C' in CPU stand for? (7).
37. An operating system developed in the early 1970s 35. A pointing input device commonly used with desktop
by scientists at Bell Laboratories. (4). computers. (5).
38. A display output device that visually conveys text, 36 Number of bits in byte. (5)
graphics, and video information. (6).
107
SUB-ICT SIMPLIFIED
SECTION C (40
marks)
Answer any two questions from this section. Answers must be written in the
answer booklet provided.
18. (a) Discuss any six areas where computers are applied and used in today’s
society.
(12 marks)
Computers are applied in the areas of
1) Education, - for Computer Aided Learning (C.A.L), Computer Aided Assessment
(C.A.A.), for calculating mathematical arithmetic by students, for creating electronic
report cards, creating student databases etc.
2) Research, - for searching literature and references through use of electronic
databases on the World Wide
Web, Research Data Storage, Research publishing etc.
3) Business, - for electronic commerce, business advertising, electronic money
transfers, Telecommuting, etc.
4) Health, - for managing and storing health Records, printing labels,
monitoring/Diagnosis of patients, etc.
5) Communication, through Video Conferencing, E-mail, social networking, faxing, etc.
6) Military/security, for monitoring security through cameras, coordinating the
personnel, capturing data for
Police National Computer Databases, operating dangerous weapons, etc.
7) Homes – for managing household finances, accessing internet and running
Programs for Children at home, playback of Digital Media such as Video/ Music,
Family Pictures at home, etc.
8) Entertainment / leisure. For Computer games, for faster instant audio and video
playback in cinema halls and during functions, in the entertainment industry to
produce Music, Edit Video, etc.
1 mark for mentioning area of application, 1 mark for
explanation
(b) Explain any four demerits associated with computer usage in today’s
society. (08 marks)
1. Risk of addiction. Many people don't care about anything else because they spend
many hours in front of
computer.
2. Eye Strain. Using computer for long can be very harmful to the eyes.
3. Expensive. Computers are still costly because The initial costing and maintenance
cost of a computer are very high.
4. Need for Extra Training. Use of computers require additional training before use
108
of computers and their programs.
5. Computers have led to unemployment of people such as Tellers, shop workers,
postal workers; since many manual/repetitive jobs have been replaced by
computers like ATMs
6. Electronic fraud: Stealing money electronically through practices like Credit card
cloning
7. Impact on Environment: Computer manufacturing processes and computer
waste are depleting natural resources and polluting the environment.
8. Hacking: Unauthorized access into computers possibly to access information,
compromising privacy. E.g.
Wikileaks
9. Software Piracy: Stealing software, not paying for licenses through cracking.
SUB ICT SIMPLIFIED
10. Presence of Viruses: You may lose all your programs, files, documents folders
and other data on your computer because of virus infection on the computer.
11. Moral Decay: The internet has websites with content such as pornography, which
have a bad impact on the users especially the young children.
12. Computers are delicate and they must be given a great care.
13. Over dependence. Our creativity, skills and reasoning can decrease when we are
too dependent to the computer. For instance, with email replacing the hand-written
letter, Onscreen Art designing instead of Hand drawing Art etc.
14. There is dehumanizing of people. Excessive use of computer for communication
with others threatens to reduce the intensity of personal bond that often develops
between people. For instance, the telephone calls
Any four x 2 marks = 8 marks.
1. Never use your computer during a storm. The computer is connected to electricity
and that means that lightning could be conducted to the computer.
2. Proper shut down of computers should be followed to avoid disk and system failure
(avoid abrupt switching off)
3. Be careful when using the internet.
Do not accept downloads from Internet
sites that you don't know and trust. And
never open an email attachment unless
you know and trust the person who sent
109
it.
4. Handle delicate storage devices
with care. Don’t touch the inner
surface of Compact disks and Floppy
disks. Safely remove Flash disks from
the system.
5. Always Sit upright to avoid muscle
pains and back aches caused by poor
sitting posture. (see figure)
6. Always use surge protectors,
Uninterruptible Power supply (UPS) or
voltage stabilizers to ensure steady
power supply to safeguard their
system.
7. Proper cable installation and placement. Cables should be preferably along
walls, avoiding danger of exposing the use to electric shock
8. Always install lightening conductors to the computer laboratory to protect
the machines and the users of the computers.
9. Ventilation should be good. Good aeration enables the computer to cool and
hence avoids overheating
10. Minimize Electrical noise / interferences in the computer environment.
ELECTRICAL NOISE refers to externally radiated signals or electrical that cause
undesirable additions to the current voltage. Electrical noise is commonly generated by
devices like Fluorescent lights of high frequency, Motors, Battery Chargers, Inverters,
Radios, television, and Cell phones.
11. A computer room should have enough light avoid eyestrain, and headaches, and
Radiation filter screens can be fitted to reduce the light that reaches the
eye.
12. Standard furniture: The table on which a computer is placed must be strong and
wide enough to bear the weight and accommodate all the peripheral devices
13. Regular servicing should be done for hardware and software updates to ensure
proper working conditions of the computers
14. Always use and regularly updated antivirus software. Viruses and worms are
horrible computer-unfriendly programs that can crash your system and cause
damage.
15. Carry out Disk Defragmentation when necessary. Disk Defragmentation is the
process in which scattered pieces of individual files and free space are reorganized and
stored in an adjacent manner (next to each other) on the disk.
Any four x 2 marks = 8
marks
(c) State any five activities and/or items that are prohibited in your school’s computer
laboratory. (10 marks)
11. Bulky items such as bags should not be brought into the computer laboratory to
avoid possible theft of hardware components.
Any five x 2 marks = 10
marks
20. (a) What is a word processing application? (02 marks)
Word processing applications are computer programs that are used for of creating, saving,
editing, formatting and printing text documents.
(b) Outline any four examples of word processing applications you know. (08 marks)
Examples of word processors include:
Microsoft Office Word,
Corel WordPerfect,
Lotus WordPro,
Apple Pages,
OpenOffice.org Writer,
LibreOffice Writer,
KWord
Celframe Write
Kingsoft Writer etc.
(c) State any seven features common to most word processing applications. (14 marks)
111
to check and even correct the spelling of individual words as they are typed (Autocorrect)
5. Grammar checker: this reports grammatical errors, usually by a wavy green line,
and suggests ways to correct them.
6. Thesaurus: suggests alternative words with the same meaning (synonyms) for use in
the document.
7. Mail Merge: This is feature used to create similar letters to be sent to several people.
The names and addresses of each person can be merged with one single main document.
8. Automatic page numbering: numbers the pages automatically in a document
9. Tables: allow users to organize information into rows and columns.
10. Multi-columns: arranges text into two or more columns that look similar to newspaper
or magazine
11. Drop cap – Formats the first letter in paragraph to be dropped across two or more lines.
12. Clipart: , refers to pre-made images about various subjects used to illustrate concepts
in documents.
13. Templates: establish the initial document layouts and formats for various document types.
14. Printing: allows a user to obtain a hard copy of a document from the printer.
15. Word Count: Establishes the number of words, characters, paragraphs, etc. in
a document.
16. Headers and Footers: Used to insert text in the top and bottom margin through
the document.
17. Footnotes and Endnotes are used as references that provide additional information
about a word or phrase within a document.
18. Insert and Delete allows a user to add and remove portions of text while editing
document.
19. Bold, Underline, Italic – These and other formatting features that allow a user to
improve on the appearance of text.
20. Cut, Copy, Paste, Insert, Delete – These and other editing features that enable a
user to make changes to the text in a document.
112