Ict Notes
Ict Notes
Ict Notes
iii) Data
This refers to a collection of disorganized figures, facts, statistics, opinions or predictions that
are not useful for decision making.
-Also refers to the raw facts which have not been processed
iv) Information
This is processed data which is in a form that is meaningful for decision making
b) Functions of ICT
i) Functions of ICT in an organization
- It increases operational efficiency
- Enhances employee productivity
- Improves customer service
- Increases customer satisfaction
- Promote effective decision making
- Enables development of competitive products
- Enables Strategic Planning for future expansion
- Remote processing
c) Classification of computers
i) Classification by purpose
Analog Computers
These are computers that perform logical operations by measuring changes in physical
magnitudes and convert them to numeric values. These computers process data that is in a
continuous form or measurable quantities/units. Analog data includes physical variables like
temperature, pressure, length, weight, electrical voltages and resistance.
-Analog computers include thermometers, weighing scales, voltmeters and speedometers.
-These computers are used mainly for scientific and engineering purposes because they deal
with quantities that vary constantly.
-They give approximate results and are applied in industries, post office and weather stations
-Handles small volume of data.
Digital Computers
. These computers process data that is represented in the form of discrete or individually
distinct form usually in a binary or two state formats/digits 0 and 1. In the binary system,
each 0 and 1 is called a bit and a group of 8 bits is 1 byte.
Example of these devices include digital clock.
-handles high volume of data and gives accurate information
Hybrid Computers
These are computers that have the combined features of both the digital and analog
computers. Example is where patient’s vital signs like temperature, heart functions etc are
measured and converted to numbers and supplied to the digital components that monitor the
patient’s vital signs. A fluctuation can thus be noticed immediately.
- Main frames
These are large, general purpose computers which can serve 100 or more end users.
They are fast with large storage capacities.
Application
Processing of high-volume batch applications eg in banks
Management of very large centralized databases
To control access, interpret queries and retrieve & update records
Ideal for transaction processing, financial applications, payroll calculations and
airline reservations.
- Mini computers
These are computers which are neither too big nor too small in size
They are designed to accommodate more than one user
The are a bit costly than micro computers
Their processing speed is a bit faster than micro computers
They have a large storage capacity than microcomputers and lesser than
mainframe computer
- Micro computers
These are computers that are small in size
They are designed for single user
They have low processing speed
They are less costly compared to others
They have small processors
They have small storage capacity
- Desktops
These are a type of microcomputers also called Personal Computers (PCs).
They are compact, powerful and versatile machines
They generally serve a single user
The desktop type may be one integral unit having monitor and CPU or may be
separate ( Tower units)
-Laptops
These are powerful portable computers
They are designed for single user
They have low processing speed
Computer Generations
COMPILED BY MR. MISOI
The history of computer development is often referred to in reference to the different generations of
computing devices. A generation refers to the state of improvement in the product development process.
This term is also used in the different advancements of new computer technology. With each new
generation, the circuitry has gotten smaller and more advanced than the previous generation before it. As a
result of the miniaturization, speed, power, and computer memory has proportionally increased. New
discoveries are constantly being developed that affect the way we live, work and play.
Each generation of computers is characterized by major technological development that fundamentally
changed the way computers operate, resulting in increasingly smaller, cheaper, and more powerful and more
efficient and reliable devices.
Computer chips, both for CPU and memory, are composed of semiconductor materials. Semiconductors
make it possible to miniaturize electronic components, such as transistors. Not only does miniaturization
mean that the components take up less space, it also means that they are faster and require less energy.
Instead of punched cards and printouts, users interacted with third generation computers through keyboards
and monitors and interfaced with an operating system, which allowed the device to run many different
applications at one time with a central program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were smaller and cheaper
than their predecessors.
High reliability
Smaller size
Use parallel processing
Introduction of simpler programming language eg BASIC
Instruction Set: The set of instructions that the microprocessor can execute.
Clock Speed: Given in megahertz (MHz), the clock speed determines how many instructions per second the
processor can execute.
As these small computers became more powerful, they could be linked together to form networks,
which eventually led to the development of the Internet.
Fourth generation computers also saw the development of GUI's, the mouse and handheld devices
Introduction of a wide variety of software
They became cheap enough for schools and homes to purchase them
Games Playing: programming computers to play games such as chess and checkers
Expert Systems: programming computers to make decisions in real-life situations (for example,
some expert systems help doctors diagnose diseases based on symptoms)
Natural Language: programming computers to understand natural human languages
Neural Networks: Systems that simulate intelligence by attempting to reproduce the types of
physical connections that occur in animal brains
Robotics: programming computers to see and hear and react to other sensory stimuli
Currently, no computers exhibit full artificial intelligence (that is, are able to simulate human behavior). The
greatest advances have occurred in the field of games playing. In the area of robotics, computers are now
widely used in assembly plants, but they are capable only of very limited tasks. Robots have great difficulty
identifying objects based on appearance or feel, and they still move and handle objects clumsily.
Natural-language processing offers the greatest potential rewards because it would allow people to interact
with computers without needing any specialized knowledge. You could simply walk up to a computer and
talk to it. Unfortunately, programming computers to understand natural languages has proved to be more
difficult than originally thought. Some rudimentary translation systems that translate from one human
language to another are in existence, but they are not nearly as good as human translators.
There are also voice recognition systems that can convert spoken sounds into written words, but they do not
understand what they are writing; they simply take dictation. Even these systems are quite limited -- you
must speak slowly and distinctly.
In the early 1980s, expert systems were believed to represent the future of artificial intelligence and of
computers in general. To date, however, they have not lived up to expectations. Many expert systems help
human experts in such fields as medicine and engineering, but they are very expensive to produce and are
helpful only in special situations.
Today, the hottest area of artificial intelligence is neural networks, which are proving successful in a number
of disciplines such as voice recognition and natural-language processing.
COMPUTER HARDWARE
a) Input devices
i) Keyboard - Keyboard layout
A standard QWERTY keyboard has about 102 keys grouped into categories;
- Functional keys
COMPILED BY MR. MISOI
-
Alphabetic keys
-
Special keys
-
Cursor movement keys
-
Numeric keypad
The following are some functions of important keys on the keyboard
1) The Function Keys (F1- F12)
These keys are used to perform specific tasks eg F1 to activate help menu in MS-Word
2) Alphabetic keys
These are keys with alphabetical letters used for typing letters and words.
3) Special keys
These are keys used either alone or in combination with others to perform a function. Eg
i) Control Keys (Ctrl)
Used as a shortcut to activate task when held down while taping another key eg
Ctrl + C = Copy
Ctrl + S = Save Ctrl + U = Underline
Ctrl + V = paste Ctrl + X = cut
Ctrl + A = Select all Ctrl + B = Bold
Ctrl + P = Print Ctrl + I = italic
Ctrl + Z = Undo Ctrl + N = New window
Ctrl + Y = Redo
5) Numeric keypad
Enter numbers 0-9
ii) Mouse
It is an input device which lets user move the cursor around the screen. It has at least two buttons. The left
button select icons and commands. The right button brings up a menu.
A mechanical mouse has a rubber or metal ball on it’s under side. When the ball rolls in a certain
direction, electronic circuits in the mouse translated the movement of the mouse into signals that the
computer can process. A mouse pad is a rectangular rubber or a foam pad that provides a better traction
than the top of a desk.
10
An optical mouse, by contrast, has no moving mechanical parts inside. Instead, it uses devices that emit
and sense light to detect the mouse movement.
A mouse contacts the computer in several ways. Many are attached to a serial port, mouse port or USB
port and system.
– Terminologies
- Clicking
This is pressing the mouse button once to activate a button.
- Double clicking
This is pressing the mouse button twice in rapid succession to open a file or folder.
- Right clicking
This is pressing the right mouse
- Left clicking
This is pressing the left mouse
- Scrolling
This is the process of moving the open window content either upward or downward using vertical scroll
bar or to the left or right using horizontal scroll bar.
iii) Scanner
It an input device that can create a digital representation of a printed image.
b) Output devices
i) Monitor (Visual display unit)
The display screen are also called monitors which serve as a one way window between the computer user
and the machine. Most displays fold into one of the two classes: television –style cathode-ray tube (CRT)
monitors and flat-panel liquid crystal display (LCD) displays. Overhead projection panels and video
projectors also use LCDs to project computer screen images for meetings and classes.
11
ii) Printer
A printer can produce a hard copy on paper of any static information that can be displayed on the
computer screen. Printer come in several varieties, but they all fit into two basic groups: impact printers
and nonimpact printers.
i) Arithmetic unit – this performs the calculations such as addition, multiplication, division and
subtraction.
ii) The logic unit – this performs the comparisons such as true or false, greater than, equal to, less
than, etc.
c) Control unit
It processes the instructions and data stored in the computer and transfers them to the arithmetic logic unit.
12
CPU
MAIN MEMORY
CPU Operation
The fundamental operation of most CPUs, regardless of the physical form they take, is to execute
a sequence of stored instructions called a program. The program is represented by a series of numbers that
are kept in some kind of computer memory. There are four steps that nearly all CPUs use in their
operation: fetch, decode, execute, and write back.
i) The first step, fetch, involves retrieving an instruction (which is represented by a number
or sequence of numbers) from program memory. The location in program memory is determined by a
program counter (PC), which stores a number that identifies the current position in the program. In other
words, the program counter keeps track of the CPU's place in the program.
The instruction that the CPU fetches from memory is used to determine what the CPU is to do.
ii) In the decode step, the instruction is broken up into parts that have significance to other portions of
the CPU. The way in which the numerical instruction value is interpreted is defined by the CPU's
instruction set architecture (ISA).
However, in more abstract and complicated CPUs and ISAs, a micro-program is often used to assist in
translating instructions into various configuration signals for the CPU. This micro-program is sometimes
rewritable so that it can be modified to change the way the CPU decodes instructions even after it has been
manufactured.
iii) After the fetch and decode steps, the execute step is performed. During this step, various portions
of the CPU are connected so they can perform the desired operation. If, for instance, an addition operation
was requested, an arithmetic logic unit (ALU) will be connected to a set of inputs and a set of outputs. The
inputs provide the numbers to be added, and the outputs will contain the final sum. The ALU contains the
circuitry to perform simple arithmetic and logical operations on the inputs.
iv) The final step, write back, simply "writes back" the results of the execute step to some
form of memory. Very often the results are written to some internal CPU register for quick access by
subsequent instructions. In other cases results may be written to slower, but cheaper and larger, main
memory. Some types of instructions manipulate the program counter rather than directly produce result
data. These are generally called "jumps" and facilitate behavior like loops, conditional program execution
(through the use of a conditional jump), and functions in programs.
After the execution of the instruction and writeback of the resulting data, the entire process repeats, with
the next instruction cycle normally fetching the next-in-sequence instruction because of the incremented
value in the program counter. If the completed instruction was a jump, the program counter will be
modified to contain the address of the instruction that was jumped to, and program execution continues
normally. In more complex CPUs than the one described here, multiple instructions can be fetched,
decoded, and executed simultaneously.
i) Computer buses
13
A bus is a path between components of a computer. There are two main buses in a computer; the internal
(or system) bus and the external (or expansion) bus. The system bus connects all the internal computer
components to the CPU and main memory.
When a word or data is transferred between units, all the bits are transferred in parallel over a set of lines
called bus. In addition to the lines that carry the data, the bus must have lines for address and control
progress.
All buses consist of two parts; an address bus and a data bus.
The data bus transfers information about the data whereas the address bus transfers information about
where the data should go. The size of a bus determines how much data can be transmitted at a time.
Every bus has a clock speed measured in Mhz. A fast bus allows the data to be transferred faster. This
makes applications run faster on PCs.
Characteristics of a bus
A bus is characterized by the amount of information that can be transmitted at once. This amount,
expressed in bits, corresponds to the number of physical lines over which data is sent simultaneously. A
32-wire ribbon cable can transmit 32 bits in parallel. The term “width” is used to refer to the number of
bits that a bus can transmit at once.
Additionally, the bus speed is also defined by its frequency (ranging from 100-133 Hertz), the number of
data packets sent or received per second. Each time that data is sent or received is called a cycle. This
way, it is possible to find the maximum transfer speed of the bus.
Bus Categories
In reality, each bus is generally constituted of 50 to 100 distinct physical lines, divided into three
subcategories.
i). Address bus
The address bus (sometimes called the memory bus) transports memory addresses which the processor
wants to access in order to read or write data. It is a unidirectional bus. It connects only the CPU and
RAM and carries only memory address (Note- each byte in RAM is associated with a number which is its
memory address.
ii). Data bus
The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.
Actually it is a group of parallel wires.
iii). Control bus
The control bus or (command bus) transfers orders and synchronization signals coming from the control
unit and travelling to all other hardware components. It is a bidirectional bus, as it also transmits response
signals from the hardware.
The primary buses
There are generally two buses within a computer;
i). System (internal) bus – sometimes called the front-side bus, or FSB for short. Cables from disc
drives and other internal devices are plugged into the bus. The internal bus allows the processor to
communicate with the system’s central memory the RAM. It enables various motherboard components
(USB, serial and parallel ports, cards inserted in PCI connectors, hard drives, CD-ROM and CD- RW
drive etc) to communicate with one another.
ii) External (Expansion) bus
This connects external devices such as keyboard, mouse, modem, printer and so on to the CPU.
However, it is mainly used to add new devices using what are called expansion slots connected to the
Central Processing Unit.
14
These buses incorporate a special architecture that allows the video card to access the system RAM
directly, greatly increasing the speed of graphic performance.
d) Local Bus
It is an internal system bus that runs between components on the motherboard and is mostly coupled with
one or more kinds of expansion buses.
e) The Periphery Component Interconnect(PCI) bus
It is a type of local bus designed for easier integration of new data types such as video, audio and graphics.
Advantages of using buses
a) Reduce computer weight due to fewer wires
b) Easy to install
c) Cost effective(only single cable is required)
d) Easy identification of cable faults
e) Well suited for temporary or small networks not requiring high speed (quick set up), resulting in faster
network.
f) Cheaper than other topologies
d) Peripherals
These are attachments to the system unit and include keyboard, mouse, speakers etc
e) Storage Media
i) Primary (Main memory)
The memory unit stores information inform of instruction and data. Computer memory is contained on
memory chips mounted on the motherboard.
There are two types of main memory in use today: Random Access Memory (RAM) and the Read Only
Memory (ROM).
The RAM is the place in a computer where the operating system, application programs, and data in
current use are kept so that they can be quickly reached by the computer’s processor. RAM is much
faster to read from and write to than the other kinds of storage in a computer, the hard disc, floppy disc,
and CD-ROM. However, the data in RAM stays there only as long as your computer is running. When
you turn off your computer, RAM loses its data. When you turn on your computer again, your operating
system and other files are once again loaded into RAM usually from the hard disc.
There are two technologies used for RAM memories; static and dynamic.
STATIC RAM
It stores a bit of information with a flip-flop i.e. the contents of a static RAM remains stable forever, as
long as power is available.
DYNAMIC RAM
It stores a bit of information as a charge. Due to the way in which the information is stored here, the
packing density is much higher than for static RAM.
15
One important reason a computer needs ROM is that it must know what to do when the power is first
turned on. Among other things, ROM stores a set of start-up instructions, which ensures that the rest of
memory is functioning properly, checks for hardware devices and checks for an operating system on the
computer hard disc.
ii) Cache
Hard Discs
A hard disc is a metal platter coated with magnetic oxide that can be magnetized to represent data. Hard
discs come in a variety of sizes.
- Hard disc for mainframes and minicomputers may be as large as 14 inches in diameter. Several discs can
be assembled into a disc pack. There are different types of disc packs, with the number of platters
varying by model. Each disc in the pack has top and bottom surfaces on which to record data. Many disc
devices, however, do not record data on the top of the top platter or on the bottom of the bottom platter.
The mechanism for reading or writing data on a disc is an access arm; it moves a read/write head into
position over a particular track. The read/write head on the end of the access arm hovers just above the
track but does not actually touch the surface. When a read/write head does accidentally touch the disc
surface, this is called a head crash and all data is destroyed. Data can also be destroyed if a read/write
head encounters even minuscule foreign matter on the disc surface.
- Tapes
- The amount of data on a tape is expressed in terms of density, which is the number of characters per
inch (CPI) or bytes per inch (bpi) that can be stored on the tape.
The highest-capacity tape is the digital audio tape, or DAT, which uses a different method of recording
data. Using a method called helical scan recording, DAT wraps around a rotating read/write head that
spins vertically as it moves. This places the data in diagonal bands that run across the tape rather than
down its length. This method produces high density and faster access to data.
Two reels are used, a supply reel and a take-up reel. The supply reel, which has the tape with data on it
or on which data will be recorded, is the reel that is changed. The take-up reel always stays with the
magnetic tape unit. Many cartridges and cassettes have the supply and take-up reels built into the same
case.
Tape now has a limited role because disc has proved the superior storage medium. Disc data is quite
reliable, especially within a sealed module. Furthermore, as we will see, disc data can be accessed
directly, as opposed to data on tape, which can be accessed only by passing by all the data ahead of it on
the tape. Consequently, the primary role of tape today is as an inexpensive backup medium.
- Diskettes
Made of flexible Mylar, a diskette can record data as magnetized spots on tracks on its surface. Diskettes
became popular along with the personal computer.
The older diskette, 5-1/4 inches in diameter, is still in use, but newer computers use the 3-1/2 inch diskette
(Figure 1). The 3-1/2 inch diskette has the protection of a hard plastic jacket, a size to fit conveniently in
a shirt pocket or purse, and the capacity to hold significantly more data than a 5-1/4 inch diskette.
- Flash discs
Personal computer users, who never seem to have enough hard disc storage space, may turn to a
removable hard disc cartridge. Once full, a removable hard disc cartridge can be replaced with a fresh
one. In effect, a removable cartridge is as portable as a diskette, but the disc cartridge holds much more
data. Removable units also are important to businesses concerned with security, because the units can be
used during business hours but hidden away during off hours. A disadvantage of a removable hard disc
is that it takes longer to access data than a built-in hard drive. Also it can be infected with viruses which
16
delete files.
Optical storage technology is categorized according to its read/write capability. Read-only media are
recorded on by the manufacturer and can be read from but not written to by the user. Such a disc cannot,
obviously, be used for your files, but manufacturers can use it to supply software. Applications software
packages sometimes include a dozen diskettes or more; all these could fit on one optical disc with plenty
of room to spare. The most prominent optical technology is the CD-ROM, for compact disc read-only
memory.
The Compact Disc Read-Only Memory (CD-ROM)
The most prominent optical technology is the CD-ROM, for CD-ROM has a major advantage over other
optical disc designs: The disc format is identical to that of audio compact discs, so the same dust-free
manufacturing plants that are now stamping out digital versions of Mozart or Mary Chapin Carpenter
can easily convert to producing anything from software to an encyclopedia. Furthermore, CD-ROM
storage is large -up to 660 megabytes per disc, the equivalent of over 400 3-1/2 inch diskettes.
A 4.7 GB side of a DVD can hold 135 minutes top quality video with 6 track stereo. This requires a
transmission rate of 4692 bits per second. The 17 GB disc holds 200 hours top quality music recording.
a) Point. Moving the mouse pointer to a desired spot on the screen such as over a particular word or
object.
b) Click. Used to select or highlight an object or icon on the screen. Also click is used to position the
cursor for instance in a word processor to indicate where to start inserting text, numbers, pictures or
images. This is done by pressing and releasing quickly, the left mouse button once.
c) Double click is used to
open icons on the desktop. This is done by, pressing the left mouse button in two quick successive clicks.
d) Drag & drop is used to
change the position of icons on the desktop. It’s also used to move an icon from one location to another.
This is done by pressing and holding down the left mouse button over an icon; the mouse pointer is used
to move the object to a new location or position and then release it.
e) Right click is used to
access shortcut menu. This is done by, pressing the right mouse button once, and then a pop-up menu
appears.
1. Trackball is a movable ball on top of a stationary device that is rotated with fingers or palm of the
hand. It’s like an upside down mouse with a protruding ball on top.
Trackball
17
2. Pointing stick looks like a pencil eraser protruding from the keyboard between letters G, H and B. It
is commonly found in laptops.
3. Joystick is a pointing device that consists of a vertical handle like gearshift lever mounted on a base
with one or two buttons. Joysticks are used in video and computer games.
4. Touch pad is a small, flat surface which you slide your finger to move the cursor. Touch pads have
sensors used to detect finger movement. They’re also found in laptops.
5. Light pen contains a light sensitive cell on its tip. Light pen is a light-sensitive stylus, or pen like
device connected by a wire to the computer terminal. The user brings the pen to a desired point on the
display screen and presses the pen button, which identifies that screen location to the computer.
Engineers and illustrators use light pens.
18
Advantages. Devices. Disadvantages.
ii). Magnetic ink character recognition (MICR) used by banks for handling cheques. Some
of the characters are printed in special magnetic ink.
A barcode & barcode number
A sample cheque
iii). Optical mark reader (OMR) works on the principle that a beam light is used to read and
detect marks on specially prepared documents e.g. answer sheets for multiple choice in an
examination.
iv). Optical character reader (OCR). This is a device used to read printed characters (letters
& figures) in a particular font and concerts them into a digital code. It is used in preparation of gas
and electricity bills.
v). Scanner is a device that translates photos, images, drawings and text into digital form.
19
A flatbed scanner
Processing hardware.
The data processing hardware here is the CPU; which stands for central processing unit. It is also referred
to as the “brain” of the computer. It follows the instructions of the software to perform calculations,
manipulates data into information and manages the flow of the same information through
the computer.
Microprocessor architecture.
There are four major functional elements or units in a microprocessor system, namely: -
i). The control unit. It directs the movement of electronic signals between main memory and the
arithmetic logic unit. It also directs these electronic signals between main memory and the
input/output devices. For every instruction, the control unit carries out four basic operations known
as the- machine cycle. In the machine cycle the CPU (i). Fetches an instruction (ii). Decodes the
instruction (iii). Executes the instruction (iv). Stores the results.
ii). Arithmetic and logic unit (ALU). The ALU performs arithmetic and logical operations
and controls the speed of those operations. Arithmetic operations are the fundamental math
operations such as addition, subtraction, division and multiplication.
Logical operations are comparisons. That is, the ALU compares two pieces of data to see whether
one is equal to, greater than or less than logical operation.
iii). Registers are special high-speed storage areas. The control unit and the ALU also use registers,
special areas that enhance the computer’s performance. Therefore, registers are high-speed storage
areas that temporarily store data during processing.
They may store program instructions while it is being decoded; stores data while it is being
processed by the ALU or store the results of a calculation.
iv). Computer bus. A bus is a set of parallel wires or electronic pathway used to transmit data,
commands/instructions and power between the CPU and other components of the motherboard.
A bus resembles a multilane highway. The more bus lines it has, the faster the data bits can be
transferred.
Output hardware/Devices.
These are devices that translate information processed by the computers into a form that humans can
understand.
The two types of outputs are soft copy such as the one shown on the display screen, and the hard copy,
which is a printout from a printer.
Soft copy refers to data that is shown on the monitor, audio or voice form. This kind of output is not
tangible.
Hard copy is a printout from a printer and these are tangible output.
Display screens.
Display systems convert computer signals into text and pictures and display them on a television like
screen. Display screens use either cathode ray tube (CRT), liquid crystal display (LCD), plasma or flat
panel display.
20
An example of CRT is a monitor. A monitor is a specialized high-resolution screen similar to high quality
television set. The video card sends the contents of the system memory via the video RAM on the VGA
card into the monitor.
Speakers.
Speakers are output devices that communicate sound to the user. Speakers produce soft copy output.
Printers.
A printer is an output device that prints characters, symbols and graphics on a paper or any other hard
copy medium.
There are two classes of printers: -
1. Impact printers.
2. Non-impact printers.
1. Impact printer forms characters or images by striking on the paper with “hammers” when printing
against an inked ribbon. Therefore the printing head comes into contact with the printing media.
Impact printers can be further subdivided into: -
i). Line printers.
ii).Character printers.
i). Line printers print one line of characters at a time. It prints at a rate of 300 to 3000 lines per
minute.
Examples of line printers are drum printers and chain printers.
ii). Character printers. They print one character at a time. They are much slower than the line
printers.
Examples of character printers include daisy wheel and dot matrix printers.
2. Non-impact printers don’t have “hammers”. The printing head does not come into contact with the
printing media. Instead it uses laser beam to produce a printout. Non-impact printers print a page at a time.
Examples of non-impact printers are laser and inkjet printers.
a) Laser printers use a laser beam to create a page printout. It is a high quality printer, which operates at
a high speed.
b) Ink jet printers use the concept of spraying ink onto the paper. Ink is sprayed from tiny holes on the
ink cartridge onto the paper. Print quality is better than impact printers but not as good as laser
printers.
Advantages and disadvantages of both laser and ink jet printers.
Laser printers. Ink jet printers.
Advantages. Advantages.
They are quiet and fast when printing. They are also quiet & fast when printing.
Less expensive to buy compared to laser
Produces excellent quality printout. printers.
21
Comparison between impact & non-impact printers.
Impact printers. Non-impact printers.
Cheap to buy. Expensive to buy.
Slow when printing. Fast when printing.
Relatively poor quality printout. Produces high quality printout.
Plotters are used for producing technical drawings or even marketing materials such as posters. They can
print on architectural size paper.
22
rage device reads and records information on storage media. The computer uses information stored on the
storage media to perform tasks. Popular examples of storage devices includes a hard disk, floppy drive,
CD-Recordable drive and tape drive.
Most computer systems use digital or binary system where two voltages low & high are used, 0volts &
+5volts. This voltages are denoted as “0” & “1” respectively.
A computer system’ data/information storage capacity is represented by bytes, kilobytes (KB), megabytes
(MB), gigabytes (GB), and terabytes (TB).
Roughly a byte = 1 character of data, Kilobyte = 1000 bytes, megabyte = 1 million bytes, gigabyte = 1
billion bytes and terabyte = 1 trillion bytes.
Letters, numbers and special characters are represented within a computer by means of binary coding
schemes. That is, the off and on or “0” and “1” are arranged in such a way that they can be made to
represent characters, digits or other values.
Byte. A group of eight bits forms one byte or one byte consists of eight bits. Bytes are used to measure the
amounts of information a device can store.
A character can be a number, letter or symbol. Therefore, a bit is the smallest unit of information a
computer can process.
Kilobyte (K). This is approximately equal to one page of a double spaced text.
Gigabyte (GB) is approximately equal to 1000 books or a study lined with bookshelves.
1. ASCII. It is pronounced “Ask-ee”. ASCII stands for American Standard Code for Information
Interchange and is the binary code most widely used with microcomputers. Besides more conventional
characters, ASCII includes such characters as math symbols and Greek letters.
2. EBCDIC. It is pronounced “Eb-see-dick”. EBCDIC stands for Extended Binary Code Decimal
Interchange Code and is a binary code used with large computers such as mainframes.
23
Computers do not use a decimal numbers system which humans are used to. There are other number
systems apart from decimal number system namely: -
Decimal-binary equivalence.
Decimal. Binary. NB:
0 0
The subscript (2) is used for the binary system.
1 1
The subscript (10) is used for the decimal system.
2 10
3 11
4 100 Binary operations.
5 101
6 110 To perform binary operations, the following sets of rules are used.
7 111
8 1000 i). 0+0=0
9 ii). 0+1=1
1001 iii). 1+0=1
iv). 1+1=0 carry 1
Conversion of decimal to binary & vice versa. Therefore, 910 = 10012
The binary number system is a weighted code where the value of a digit depends on its position.
The most significant bit is at the left while the least significant bit is at the right. The decimal value of a
binary digit “1” is given by 2k-1 where “K” is the position of the bit counting from right to left.
Example 1.
32 + 16 + 0 + 0 + 2 + 0 = 5010
When converting from decimal to binary, the decimal number is continuously divided by two (2). The
remainder of each subsequent division is written down sequentially. Therefore, the reverse order of
this sequence gives the binary equivalent.
Example 1.
24
i). Convert decimal number 1910 to binary.
Subscript. Decimal Remainder.
number.
2 19 1
2 9 1
2 4 0
2 2 0
2 1 1
0
Example 1.
Decimal Remainder
fraction.
0.356*2=0.71 0
2
0.712*2=1.42 1
4
0.424*2=0.84 0
Therefore, 548.35610 = 8
1000100100.0102
25
COMPUTER SOFTWARE
a) Software concept
Computer software is a set of programs, documents, step-by-step instructions (procedures) and
routines associated with the operation of a computer system that makes the hardware capable of its
various activities.
b) Software classification
i) System software
a) Operating Software
b) System Utilities
ii) Application software
a) Application packages ( offshelf)
b) User programs ( Tailor made)
iii) Programming Languages
a) Machine language
b) Assembly language
c) High level language
d) Very-High level language
e) Natural language
SYSTEM SOFTWARE
These are programs that start up the computer and function as the principal coordinator of all
hardware components and applications software programs. This is first loaded into the RAM of
the computer before loading the application software. It is developed and installed in the
computer system for the purpose of developing other programs. The software is developed and
installed by the manufacturer of the system hardware.
Functions of system software
1. Booting the computer and ensuring that all the hardware elements are working properly.
2. Performing operations such as retrieving, loading, executing and storing application
programs.
3. Storing and retrieving files
4. Performing a variety of system utility programs
System software is divided into:-
i) Operating system-programs used start up a computer. Examples include MSDOS,
windows, Linux.
ii) Utility software
iii) Firmware
iv) Networking software
Firmware (Stored logic)
This is a combination of both the software and hardware recorded permanently on
electronic (memory) chips that is mounted/plugged into the motherboard.
Utility software
This is a special program that makes certain aspects of the computer to go on more
smoothly and support the development of the application programs and render services
by performing the common processing requirements.
Such services include sorting, copying, file handling and disc management.
These utility programs are usually available on separate diskettes.
Examples
i) Virus protection – the anti-virus utility program scans hard discs, diskettes,
and memory to detect and delete viruses. Example – Norton, NOD32,
Kaspersky, McAfee, Avira etc
ii) Backup – this utility make automatic backup or duplicate copy of
information on the hard disc
iii) Data recovery – it is used to restore data that has been physically damaged
or corrupted.
Common service programs
a) Text editors
26
b) Language translators
c) Linker
d) Loader
e) Sort utility
f) Merge utility
g) Copy utility
h) Dump utility
i) Database Management System (DBMS)
APPLICATION SOFTWARE
Application packages are programs that are designed to help the user accomplish specific tasks.
27
Advantages of in-house software
1. Handles specific needs of the user
2. They can easily be modified to suit the needs of the user
Disadvantages of in-house software
1. Expensive to develop
2. Cannot be used to solve several tasks
c) Installation of basic computer software
When a program is to be installed in the computer, the program CD is inserted in the CD drive and
further systematic instructions will be displayed on the desktop. Once all the steps have been
completed, a dialog box indicating that the program has been successfully installed will be
displayed. Usually it is recommended to restart the computer for the new program to function.
Additional hardware such as printers usually comes with installation software for that particular
printer.
iv) Programming languages
A programming language is a set of rules that provide a way of telling the computer what
operations to perform.
Levels of languages
v) Lower Level language – are close or similar to the language computer itself uses
or understand or machine understandable language ie 0s &1s
vi) Higher level language- are closer or similar to language people use or human
understandable language like English
GENERATION OF LAGUAGES
There are five levels of language corresponding to generations.
1) Machine languages
Represents data and program instructions as 0s and 1s ie binary digits that correspond to the
on/off electrical states in the computer. It is composed of numbers.
2) Assembly languages
To replace the 0s and 1s in machine language, assembly language use mnemonic codes,
which are abbreviations that are easy to remember eg A for Add, C for Compare, MP for
Multiply etc?
Since machine language is the only language that the computer can actually execute, a
translator called Assembly Program is required to convert the assembly language program
into machine language
3) High-level languages
Programs were written in an English-like manner, thus making them more easy and a
programmer could accomplish more with less effort.
A translator is needed to translate the symbolic statements of a high-level language into
computer executable machine language and this translator is a compiler. There are many
compilers for each language and at least one for each type of computer eg FORTRAN
FORmula TRANslator.
4) Very High-level languages
These are shorthand programming languages. They are often known by their generation
number ie fourth generation languages or 4GLs.
An operation that requires hundreds of lines in the 3rd GL typically requires only 5-10
lines in 4GL. These are difficult to describe because there are so many types eg COBOL
& Query Language for database.
5) Natural languages
These resemble the ‘natural’ spoken English language ie they are similar to human
understandable language. They are the latest 5th GL and most ill-defined than 4th GLs. A
user of one of these languages can say the same thing in a number of ways.
The compiler translate this natural language to machine language and when it is not sure
what the user has in mind, it politely as for further explanation.
28
OPERATING SYSTEMS
a) Operating Systems
Definition: An operating system refers to the computer software that provides the interface
between the hardware, the user and the application software. It governs and manages the computer
resources and activities.
Categories of operating systems
i) Resident components
ii) Non-resident
Resident component
These are programs of OS that must remain in the RAM at all times. Such programs are loaded
from the disk as soon as the computer is switched on. These include:
a) Task manager
b) Device drivers
c) File manager
The process of loading the OS from the disc into main memory is called booting the computer.
Booting refers to the process of starting up a computer.
There are two ways of booting up a computer;
a) Cold booting – done using the power button on the computer’s system unit.
Normally done when the computer is initially off.
b) Warm booting – this is done when the computer hangs (it temporarily stops to
receive instructions). It is done by use of the reset/restart button on system unit or
by a combination of the following keys from the keyboard; CTRL + ALT +DEL.
1. During booting, a small program known as bootstrap which is stored in ROM is executed.
2. During execution, the program checks:-
i) Mouse, keyboard and monitor, discs are functioning well
ii) Carries out diagnostic check of the CPU, RAM, ROM to confirm that none of them is has a
fault.
iii) If all items are working well, the bootstrap loads program of the memory resident portion
of the OS from the disk into the memory.
iv) The bootstrap then passes control to the OS by causing the first instruction of OS to be
executed.
v) The OS then display on the screen an interface through which one can interact with the
computer.
Non-resident
They are only loaded into a RAM as and when it is needed. These include:-
i) Program development tools
ii) House-keeping utilities
iii) Sorting programs that manage data into some required order
iv) Special maths programs
TYPES OF OPERATING SYSTEMS
a) OS is classified into;-
i) Number of tasks handled concurrently
ii) Number of users
iii) Human-computer Interface (HCI)
b) Classification according to tasks handled concurrently
i) Single program OS
ii) Multitasking OS
Single program
It allows processing of only one user program in the main memory at a time. User can only run one
interface program at a time. The user must exit from the program before loading and running another
program. Example Ms-DOS
Multitasking OS
It allows single CPU to execute what appears to be more than one program at the same time. The CPU
switches its attention between programs as it receives requests for processing, executing instructions from
one program and then from another using the concept of giving a time slices to each application.
29
c) Classification according to the number of users.
i) Single user
ii) Multi-user/multi access
Single user
Supports only one person and runs only one user application at a time.
Multi-user/multi access
It allows more than one user to interactively use the computer. It can be installed on a computer that is
accessed by many people at the same time.
Examples – UNIX, Novell, Windows NT/2000, Linux
d) Classification according to the interface
i) Command line user interface(CLUI)
ii) Menu driven interface
iii) Graphical user interface(GUI) eg windows operating systems
The Windows Operating System
This is operating system software developed and marketed by Microsoft Inc. It a Graphic User
Interface (GUI) OS and has the WIMP (Window Icon Menu and Pointing device) features that
make it more user friendly.
The are different version of Ms – windows e.g. Window 95, 98, 2000, NT, ME, 2003, XP, and
Vista
b) Booting a Computer
Shut Down Procedure
Click on the start button from task bar
Click on shut down or turn off computer from the pull up menu
Click on shut down or turn off from the dialog box that appears
Wait as the computer goes off or prompts you to safely turn it off. This depends on
the type of the computer’s processor.
30
Drive – refers to secondary storage locations in the computer normally labelled by letters of
alphabet e.g. C: / for hard disk, A: / for floppy disk etc. store information organised in files and
folders.
d) Operating systems commands
Directories/folders/files management
i) Creating folders/files
Creating a file or folder on the desktop
a) Right click an empty location on the desktop
b) Point at New from the pop - up menu
c) To create a file, select the name of the program to create the file by e.g. Microsoft
Word. To create a folder, click on folder from the side kick menu
d) Type the name of the file or the folder
e) Press enter
Creating a file or folder in another folder window
a) Click on the file menu
b) Point at New from the pop - up menu
c) To create a file, select the name of the program to create the file by e.g. Microsoft
Word. To create a folder, click on folder from the side kick menu
d) Type the name of the file or the folder
e) Press enter
NB: A folder in another folder is called a subfolder.
ii) Copying files and folders
Duplicating the file or the folder in the same storage location or another.
Steps
a) Select the file/folder to copy
b) Click on the edit menu
c) Click on copy from the pull down menu
d) Open the new location to copy the folder to
e) Click on edit menu again
f) Click on paste from the pull down menu
Assignment
Locate the shortcut commands from the standard toolbar used for copying and
pasting files and folders.
iii) Moving/copying folders/files
Relocating the file or the folder to same storage location or another location.
Steps
a) Select the file/folder to move
b) Click on the edit menu
c) Click on cut from the pull down menu
d) Open the new location to move the folder to
e) Click on edit menu again
f) Click on paste from the pull down menu
Assignment
Locate the shortcut commands from the standard toolbar used for moving and
pasting files and folders.
iv) Renaming files/folders
File and folder names can be changed
Steps
a) Select the file/folder to rename
b) Click on the file menu
c) Click on rename from the pull down menu
d) Type the new name and then press enter from the keyboard
Or
Right click the file or the folder to rename
Click on rename from the popup menu
31
Type the name then press enter key from the keyboard
v) Deleting files/folders
Folders stored in drive c: / are temporary send to the recycle bin when deleted and
can be later deleted permanently or restored to their original locations.
Those stored in removable media like floppy disks and flash disks are not sent to
the recycle bin and may not be recovered.
Steps
a) Select the file/folder to delete
b) Click on the file menu
c) Click on delete and confirm deletion
OR
Select the file/folder, press delete key form keyboard the confirm deletion
vi) Searching and sorting files
vii) File security and protection
There are different methods used to ensure that files and folders are free from
unauthorized access. This may include
a) Assigning passwords to open and write files
b) Assigning log-in user names and password for the computers containing the
files
c) Applying the read-only attributes to ensure that new data cannot be
accidentally written in the file
d) Write protecting storage media like the floppy disks
e) Applying hide attributes to ensure that the files are not visible to the
unauthorised access
f) Encrypting data/information in the file
viii) Drive/file/folder properties
Relocating the file or the folder to same storage location or another location.
Steps
a) Select the drive/file/folder to view its properties
b) Click on the file menu
c) Click on properties from the pull down menu. The properties dialog box appears.
d) Properties window appears. Using the properties you be able to ascertain the size and
attributes of the drive/file/folder etc
e) Managing discs
i) Assigning a volume label
ii) Checking disc storage status
iii) Formatting a disc
iv) Scanning a disc
32
WORD PROCESSING
1. Word processing: This is the process of manipulating text, characters, words, and sentences in
such a manners as to make the final document free of errors and attractive to look at.
2.Word processor: An application software that enables the user to create, save, edit, format and
print text-rich documents. Microsoft word is one of the products in the Microsoft office programs
suit. There several versions of Microsoft word determined by every release of the Microsoft office
programs suite e.g. Ms Word 97, 2000, XP, 2003, 2007.
Advantages of Electronic Word Processor programs
Easier to use due to automated features such as Word-wrap, autocorrect and auto
complete.
They have superior editing tools such as spelling checker, the Thesaurus etc. hence
making editing easier.
Can store documents for future retrieval
They have superior formatting features that make a document more appealing to the
reader.
The user can produce multiple copies more easily
Copy and move (cut) operation make it easier to manipulate a document.
33
2. Press the Delete or the backspace key.
NB: Delete key erases characters to the right of the cursor while the backspace deletes
characters to the left of the cursor.
NB: Use the type over mode to replace characters to the right of text or insert mode to
insert a character(s) by pushing the rest of the characters to the right.
Document Views
• Microsoft word provides different views for viewing the document that include;
a) Normal
b) Web layout
c) Print layout
d) Outline
To change from one view to another, follow the steps below;
1) Click on view menu
2) Click on the type of view that you want to display
QS: What is the difference between the different views of the Microsoft word document?
a. Fonts
To format text font:
1. Highlight the text
2. From the Format menu, click Font
3. In the font dialog box, select the font type, style, size and colour and any other
attribute.
34
4. Click OK.
Paragraph formatting
A paragraph is a separate block of text dealing with a single theme and starting on a new
line or indent. Some of the formatting features you can apply onto a paragraph include
Alignment
Alignment is the arrangement of text relative to the left margin, centre of page or the right
margin. The five major alignment options available are the left, centre, right and justified
and force justified.
To align text:
1. Highlight the text
2. From the Format menu, click Paragraph.
3. In the paragraph dialog box, select the alignment option from the alignment list box
then click the OK.
NB: You can apply alignment by simply clicking any of the five alignment buttons on the
formatting toolbar
Spacing
You can set the space between lines, paragraphs or blocks text.
To space lines:
1) Highlight the lines of text
2) From the Format menu, click Paragraph
3) In the paragraph dialog box, select the line spacing option from the line spacing list
box
4) Click the OK button.
35
Superscript and Subscript
•A superscript appears just above the rest of the characters as in cm2 while a subscript
appears just below other characters as in H2O.
a) To make text superscript or subscript:
b) Highlight the character(s)
c) From the Format menu, click font
d) From the font dialog box check superscript or subscript
e) Click Ok to close the font dialog box
Drop caps
•A drop cap is a large character in a paragraph that occupies more than one line down.
•To create a dropped cap:
1) Highlight the paragraph you want to begin with drop cap
2) Click on format menu
3) Click Drop Cap. Drop cap dialog box appears
4) Click Dropped or In Margin.
5) Specify the number of lines and other options
6) Click OK.
Page breaks
•Page, section and column breaks are used to force the cursor to move from a new page,
section or column even before the end of the current.
•To insert a break:
1. Position the insertion pointer where you want to break
2. Click on the insert menu
3. Click on Break from the pull down menu
4. In the break dialog box, set the break type
E.g. page break, column break etc
5. Click OK.
36
Creating multi-columns and column widths
a) Inserting columns
•Columns subdivide a page into several vertical sections.
•To set columns:
a) Highlight the text or click at the point from where to set the columns
b) Click on format menu
c) Click columns from the pull down menu. The columns dialog box appears
d) In the columns dialog box enter the number of columns, set the column width, a line
between if need be and any other option to apply
e) Specify where to apply the columns e.g. the whole document, this section, selected
text or this point forward
f) Click OK.
Change case
The cases applied to text are; lowercase, UPPERCASE, Sentence case, Title Case and
tOGGLE cASE. To change case:
1. Highlight the text
2. From the Format menu, click Change Case
3. From change case dialog box, select the case option you want to apply.
4. Click OK.
NB: The use of case in this sentence is deliberate.
Page numbering
i) Page numbers are used to organize a large document for ease of reference.
ii) To insert page numbers:
iii) Click Insert menu
iv) Click on page numbers the insert page numbers dialog box appears
v) In the position box, specify whether to place the page numbers at the top of page
(header) or at the bottom of the page (footer).
vi) In the Alignment box, specify whether to align page numbers to the left, centre or right
of page.
vii) If you don’t want a number on the first page, clear the “Show number on first page”
check box
viii) Click OK.
Headers and footers
• Headers are lines of text that appears at the top margin of every page or selected pages
while footers appears at the bottom margin.
• To insert a header or footer:
a) Click on the View menu
b) Click Header and Footer from the pull down menu
c) To create a header, enter text or pictorial object in the header area.
d) Click on switch between header and footer command button from the header and
footer toolbar to create footer.
e) Click inside the footer area and enter the text or pictorial object.
f) Click Close on the header and footer toolbar.
37
d) Tables creation and manipulation
i) Tables – insert rows and columns
• A table is made up of rows and columns of cells that you can fill with text and
graphics. Tables are often used to organize and present information.
• Columns are the vertical divisions while rows are the horizontal divisions of the
table.
• Intersections between columns and rows form cells which are the units for holding
data.
Creating a table
a) Click where you want to create a table.
b) On the Table menu, point to Insert, and then click Table.
c) Under Table size, select the number of columns and rows.
d) Under AutoFit behaviour, choose options to adjust table size.
e) To use a built-in table format, click AutoFormat.
f) Click ok
38
In Print Layout view, rest the pointer on the table until the table resize
handle appears on the lower-right corner of the table.
Rest the pointer on the table resize handle until a double-headed arrow
appears.
Drag the table boundary until the table is the size you want.
Merge cells into one cell in a table
• You can combine two or more cells in the same row or column into a single
cell. For example, you can merge several cells horizontally to create a table heading
that spans several columns.
Steps:
a) Select the cells you want to merge.
b) On the Table menu, click Merge Cells.
2) Split a cell into multiple cells in a table
a) Click in a cell, or select multiple cells that you want to split.
b) On the Table menu, click Split Cells.
c) Select the number of columns or rows you want to split the selected cells
into.
39
e) Mail merging
i) Creating a main document
• A feature that enables one to create a standard document e.g. forms letters to be received b
many recipients.
• One can use the Mail Merge Wizard to create form letters, mailing labels, envelopes,
directories, and mass e-mail and fax distributions.
• This is done in four basic steps:
a) Open or create a main document
• Main document: In a mail-merge operation in Word, the document that contains the text
and graphics that are the same for each version of the merged document, for example, the return
address or salutation in a form letter.
40
Autocorrect and Auto text:
• Autocorrect and AutoText make are used to automatically correct a commonly
misspelled word and insert a predefined text when creating a document.
To create an autocorrect or auto text:
a) Click on the insert menu
b) Point to auto text, then click auto text from the side
c) Click the Auto text or Autocorrect tab and type the autocorrect or Auto text
d) Click OK to apply and close the dialog box.
d) Auto complete
• This is a feature that displays a complete word when the user types the first few
characters of the word. This enables the user to type faster by simply accepting the
suggested word if he/she intends to type it by pressing enter.
Printing a document
Print individualized document – printer set up, selecting a printer, print settings, printer
connection, print preview print options, printer status, print range, copies, close
• To print a document:
a) First preview it by clicking Print preview on the File menu.
b) To print, On the File menu click Print
c) Select the printer, range, number of copies and other options from the dialog box.
d) Click OK.
Troubleshooting Printing Problems
• Some of the printing problems you may encounter are:
a) Lack of two-way communication due to poor installation of the printer software (drivers), if
the printer is off or not connected.
b) Paper jams due to use of poor quality of paper or paper folds.
c) Poor quality print due to poor quality ink or toner used.
41
SPREAD SHEETS
a) Meaning of spread sheets
Spreadsheet is software used to organize and present data in easy-to understand forms like tables,
graphs and charts for easy analysis. Ms-Excel is one such software-tool designed and developed by
Microsoft Corporation of USA.
Workbook software comprises of multiple worksheets with data editing facilities and inbuilt
calculation abilities. When formulae are defined in a worksheet, automatic calculations are done
and results are generated.
Step-by-Step.
1. Click the mouse on “start ‘button
2. Selet “all programs’
3. Select” Microsoft Excel” and Ms-Excel window will appear
4. Decide on the items to be included in the worksheet.
5. Decide on the layout of the worksheet. (That is, which items should appear in which
columns, etc.)
Name Description
i Active cell indicator
This dark outline indicates the currently active cell (one of the 17,179,869,184 cells on
each worksheet).
ii Application Close button - Clicking this button closes Excel.
iii Application Minimize button - Clicking this button minimizes the Excel window.
iv Column letters - Letters range from A to XFD — one for each of the 16,384 columns in the
worksheet. You can click a column heading to select an entire column of cells, or drag a column
border to change its width.
v File button - Click this button to open Back Stage view, which contains many options for
working with your document (including printing), and setting Excel options.
vi Formula bar - When you enter information or formulas into a cell, it appears in this line.
vii Help button - Clicking this button displays the Excel Help system window.
viii Horizontal scrollbar - Use this tool to scroll the sheet horizontally.
ix Minimize Ribbon button - Clicking this button hides the Ribbon, giving you a bit more space
onscreen. When you click a tab, the Ribbon reappears.
x Name box - This field displays the active cell address or the name of the selected cell, range, or
object.
xi Page View buttons - Change the way the worksheet is displayed by clicking one of these buttons.
xii Quick Access toolbar - This customizable toolbar holds commonly used commands. The Quick
Access toolbar is always visible, regardless of which tab is selected.
xiii Ribbon - This is the main location for Excel commands. Clicking an item in the tab list changes the
Ribbon that displays.
xiv Row numbers - Numbers range from 1 to 1,048,576 — one for each row in the worksheet. You can
click a row number to select an entire row of cells.
42
xv Sheet tabs - Each of these notebook-like tabs represents a different sheet in the workbook. A
workbook can have any number of sheets, and each sheet has its name displayed in a sheet tab.
xvi Insert Sheet button - By default, each new workbook that you create contains three sheets.
Add a new sheet by clicking the Insert Worksheet button (which is displayed after the last sheet
tab).
xvii Sheet tab scroll buttons - Use these buttons to scroll the sheet tabs to display tabs that aren’t
visible.
xviii Status bar - This bar displays various messages as well as the status of the Num Lock, Caps
Lock, and Scroll Lock keys on your keyboard. It also shows summary information about the range of
cells that is selected. Right-click the status bar to change the information that’s displayed.
xix Tab list - Use these commands to display a different Ribbon, similar to a menu.
xx Title bar - This displays the name of the program and the name of the current workbook, and
also holds some control buttons that you can use to modify the window.
xxi Vertical scrollbar - Use this to scroll the sheet vertically.
xxii Window Close button - Clicking this button closes the active workbook window.
xxiii Window Maximize/Restore button - Clicking this button increases the workbook window’s
size to fill Excel’s complete workspace. If the window is already maximized, clicking this button
“unmaximizes” Excel’s window so that it no longer fills the entire screen.
xxiv Window Minimize button - Clicking this button minimizes the workbook window, and it
displays as an icon.
xxv Zoom control - Use this scroller to zoom your worksheet in and out.
Ribbon tabs
The commands available in the Ribbon vary, depending upon which tab is selected. The Ribbon is
arranged into groups of related commands. Here’s a quick overview of Excel’s tabs.
i) Home: You’ll probably spend most of your time with the Home tab selected. This tab contains the
basic Clipboard commands, formatting commands, style commands, and commands to insert and
delete rows or columns, plus an assortment of worksheet editing commands.
ii) Insert: Select this tab when you need to insert something in a worksheet — a table, a diagram, a
chart, a symbol, and so on.
iii) Page Layout: This tab contains commands that affect the overall appearance of your worksheet,
including some settings that deal with printing.
iv) Formulas: Use this tab to insert a formula, name a cell or a range, access the formula auditing
tools, or control how Excel performs calculations.
v) Data: Excel’s data-related commands are on this tab.
vi) Review: This tab contains tools to check spelling, translate words, add comments, or protect
sheets.
43
vii) View: The View tab contains commands that control various aspects of how a sheet is viewed.
Some commands on this tab are also available in the status bar.
viii) Developer: This tab isn’t visible by default. It contains commands that are useful for
programmers. To display the Developer tab, choose File ➪ Options and then select Customize
Ribbon. In the Customize the Ribbon section on the right, place a check mark next to Developer
and then click OK.
ix) Add-Ins: This tab is visible only if you loaded an older workbook or add-in that
customizes the menu or toolbars
Step-by-Step.
To Enter Data in a Worksheet1. Point the mouse pointer at the cell (intersection of a row and
column) and click the left mouse button. The cell pointer moves to the cell in which you want to
enter data.
2. Type in the data using the keyboard.
3. Press the Enter key.
Filling in the month names
In this step, you enter the month names in column A.
1. Move the cell pointer to A2 and type Jan (an abbreviation for January). At this point, you
can enter the other month name abbreviations manually, but you can let Excel do some of the work
by taking advantage of the AutoFill feature.
2. Make sure that cell A2 is selected. Notice that the active cell is displayed with a heavy outline.
At the bottom-right corner of the outline, you’ll see a small square known as the fill handle. Move
your mouse pointer over the fill handle, click, and drag down until you’ve highlighted from A2
down to A13.
3. Release the mouse button, and Excel automatically fill in the month names.
Your worksheet should resemble the one shown in Figure 1.16.
44
d) Building worksheet
At this point, your worksheet should resemble the one shown in below. Keep in mind that
except for cell B2, the values in column B are calculated with formulas. To demonstrate, try
changing
the projected sales value for the initial month, January (in cell B2). You’ll find that the formulas
recalculate and return different values. These formulas all depend on the initial value in cell B2,
though.
45
2. Choose Insert ➪ Tables ➪ Table. Excel displays its Create Table dialog box to make
sure that it guessed the range properly.
3. Click OK to close the Create Table dialog box. Excel applies its default table formatting
and also displays its Table Tools ➪ Design contextual tab. Your worksheet should
look like Figure 1.18.
4. If you don’t like the default table style, just select another one from the Table
Tools ➪ Design ➪ Table Styles group. Notice that you can get a preview of different
table styles by moving your mouse over the Ribbon. When you find one you like, click it, and
style will be applied to your table.
An Excel workbook can hold any number of worksheets, and each worksheet is made up of more
than 17 billion cells. A cell can hold any of three basic types of data:
A numeric value
Text
A formula
A worksheet can also hold charts, diagrams, pictures, buttons, and other objects. These objects
aren’t contained in cells. Rather, they reside on the worksheet’s draw layer, which is an invisible
layer on top of each worksheet.
47
i) =150*.05 - Multiplies 150 times 0.05. This formula uses only values, and it
always returns the same result. You could just enter the value 7.5 into the cell.
h) Charts
Creating a chart
How about a chart that shows the projected sales for each month?
1. Activate any cell in the table.
2. Choose Insert ➪ Charts ➪ Column and then select one of the 2-D column charts
types. Excel inserts the chart in the center of your screen.
Freezing panes keeps the headings visible while you’re scrolling through the worksheet.
To freeze panes, start by moving the cell pointer to the cell below the row that you want to
remain
visible while you scroll vertically, and to the right of the column that you want to remain visible
while you scroll horizontally. Then, choose View ➪ Window ➪ Freeze Panes and select the
Freeze Panes option from the drop-down list. Excel inserts dark lines to indicate the frozen rows
and columns. The frozen row and column remain visible while you scroll throughout the
worksheet.
To remove the frozen panes, choose View ➪ Window ➪ Freeze Panes, and select the
Unfreeze Panes option from the drop-down list.
Figure 3.8 shows a worksheet with frozen panes. In this case, rows 1:4 and column A are frozen
in
place. This technique allows you to scroll down and to the right to locate some information while
keeping the column titles and the column A entries visible.
The figure below shows a worksheet with frozen panes. In this case, rows 1:4 and column A are
frozen in
48
place. This technique allows you to scroll down and to the right to locate some information while
keeping the column titles and the column A entries visible.
49
47_ _ _36_
_45_ _ _ _2
3_ _ _
36 71 37 36 14
_CMS_ _IM
PP_ _,MA_
_ _ _DR_ _
AGD 11 TPUT/ IMP
P EP MES T ES
_ _ _ _ _ _
_ _ _ _ _ _
47_ _ _34_
_67_ _ _ _3
2_ _ _
20 43 53 68 35
_CMS_ _ _
EMFD_ _PS
_ _ _ _SOL_
_ELD 11 IC
LS EIT ANE MA T
_ _ _ _ _ _
_ _ _ _ _ _
47_ _ _54_
_72_ _ _ _3
5_ _ _
20 71 72 71 69
_CMS_ _ _
SC_ _CP_ _
_ _IMPT/P_
_GAD 11
LS EP CP MA AP
_ _ _ _ _ _
_ _ _ _ _ _
The vast majority of the time, you’ll want to freeze either the first row or the first column. The
View ➪ Window ➪ Freeze Panes drop-down list has two additional options: Freeze Top Row and
Freeze First Column. Using these commands eliminates the need to position the cell pointer before
freezing panes.
To insert a new row or rows, you can use any of these techniques:
Select an entire row or multiple rows by clicking the row numbers in the worksheet border.
Right-click and choose Insert from the shortcut menu.
Move the cell pointer to the row that you want to insert and then choose Home ➪Cells ➪
Insert ➪ Insert Sheet Rows.
50
If you select multiple cells in the column, Excel inserts additional rows that correspond to the
number of cells selected in the column and moves the rows below the insertion down.
Creating a Table
Most of the time, you’ll create a table from an existing range of data. However, Excel also allows
you to create a table from an empty range so that you can fill in the details later. The following
instructions assume that you already have a range of data that’s suitable for a table.
1. Make sure that the range doesn’t contain any completely blank rows or columns;
otherwise, Excel will not guess the table range correctly.
2. Select any cell within the range.
3. Choose Insert ➪ Tables ➪ Table (or press Ctrl+T). Excel responds with its Create
Table dialog box, shown in Figure 5.4. Excel tries to guess the range as well as whether
the table has a header row. Most of the time, it guesses correctly. If not, make your corrections
before you click OK.
51
When the mouse pointer turns into a diagonal arrow, click to select the data area of the
table. Click a second time to select the entire table (including the Header Row and the Total
Row). You can also press Ctrl+A (once or twice) to select the entire table.
Moving a table
To move a table to a new location in the same worksheet, move the mouse pointer to any of its
borders. When the mouse pointer turns into a cross with four arrows, click and drag the table to
its new location.
To move a table to a different worksheet (which could be in a different workbook), you can drag
and drop it as well — as long as the destination worksheet is visible onscreen.
Filtering a table
Filtering a table refers to displaying only the rows that meet certain conditions. (The other rows
are
hidden.)
Using the real estate table, assume that you’re only interested in the data for the N. County area.
Click the drop-down arrow in the Area Row Header and remove the check mark from Select All,
which unselects everything. Then, place a check mark next to N. County and click OK. The table,
shown in Figure 5.12, is now filtered to display only the listings in the N. County area. Notice that
some of the row numbers are missing; these rows contain the filtered (hidden) data.
52
Also notice that the drop-down arrow in the Area column now shows a different graphic — an icon
that indicates the column is filtered.
FORMATING WORKSHEET
The Home tab of the Ribbon provides quick access to the most commonly used formatting options.
Start by selecting the cell or range; then use the appropriate tool in the Font, Alignment, or
Number groups.
Using these tools is very intuitive, and the best way to familiarize yourself with them is to
experiment.
Enter some data, select some cells, and then click the controls to change the appearance.
Note that some of these controls are actually drop-down lists. Click the small arrow on the button,
and the button expands to display your choices.
On the Mini toolbar that appears when you right-click a range or a cell
When you right-click a cell or a range selection, you get a shortcut menu. In addition, the Mini
toolbar appears above the shortcut menu.
l From the Format Cells dialog box
The formatting controls available on the Home tab of the Ribbon are sufficient most of the time,
but some types of formatting require that you use the Format Cells dialog box. This tabbed dialog
box lets you apply nearly any type of stylistic formatting, as well as number formatting. The
formats
that you choose in the Format Cells dialog box apply to the cells that you have selected at the
time. Later sections in this chapter cover the tabs of the Format Cells dialog box.
In addition, many common formatting commands have keyboard shortcuts that you can use.
You can merge any number of cells occupying any number of rows and columns. In fact, you can
merge all 17,179,869,184 cells in a worksheet into a single cell — although I can’t think of any
good reason to do so, except maybe to play a trick on a co-worker.
The range that you intend to merge should be empty, except for the upper-left cell. If any of the
other cells that you intend to merge are not empty, Excel displays a warning. If you continue, all
the data (except in the upper-left cell) will be deleted. To avoid deleting data, click Cancel in
response to the warning.
The Home ➪ Alignment ➪ Merge & Center control contains a drop-down list with these
additional
options:
Merge Across: When a multirow range is selected, this command creates multiple merged
cells — one for each row.
Merge Cells: Merges the selected cells without applying the Center attribute.
Unmerge Cells: Unmerges the selected cells.
DESKTOP PUBLISHING
a) Functions of DP
b) Tools used
c) Manipulations
d) Enhancement of typeset work
e) Printing of documents
PRESENTATION PACKAGES
a) Types of presentation packages
b) Creating slides
c) Formatting slides
d) Running slides
e) Editing objects
f) Printing slides and handouts
TERMINOLOGIES
i Entity
-Is an object that exists and is distinguishable from other objects.
o Example: specific person, company, event, plant, student, book
ii Attribute
-Refers to the property of an entity, i.e. entities have attributes e.g. name, reg no, book no, title
iii Schema
The structure of a database is called a schema (tables, property of tables, relationships –names
iv Relationship
-Refers to the association between entities e.g. borrows, returns
v Relation
-Is a table with columns and rows
vi Tupule
-Is a row of a relation
vii Domain
-is the set of allowable values for one or more attributes
viii View
- A view is named relation corresponding to an entity in conceptual schema, whose tuples are physically
stored in database. Contents of a view are defined as a query on one or more base relations.
b) Database design
Database design has the following conceptual steps
1) Build local conceptual data model for each user view
2) Build and validate local data model for each user view
3) Build and validate global logical data model
4) Translate global data model for targets DBMS
5) Design physical representation
6) Design security mechanism
7) Monitor and tune the operational system
CHARACTERISTICS OF DBMS
c) Data manipulation
- Data is arranged in columns (fields) and rows (records)
- Each column has similar items or entries
- Each row contains information pertaining (belonging) to the single individual
d) Data sorting and indexing
This involves arranging the records into a predefined sequence or way and this requires one to
identify certain fields to be key fields so as to sort either in ascending/descending order or
alphabetically.
e) Data retrieval/searching
This involves the ability to extract information from a database- either entire content, specific
record or a set of records.
DATABASE ELEMENTS
A database consists of four elements as given,
i) Data
ii) Relationships
iii) Constraints
iv) Schema
Data items
Schema
i) Data
Data are binary computer representations of stored logical entities.
Software is divided into two general categories-data and programs.
A program is a collection of instruction for manipulating data.
Data exist is various forms- as numbers or texts on pieces of paper, as bits and bytes stored
in electronic memory or as facts stored in a person’s mind.
ii) Relationships
Relationships explain the correspondence between various data elements.
iii) Constraints
Are predicates that define correct database states.
iv) Schema
Schema describes the organization of data and relationships within the database.
Schema defines various views of the database for the use of various system components of
the database management system and for the application’s security.
A schema separates physical aspects of data storage form the logical aspects of data
representation.
Types of schema
a) Internal schema: defines how and where the data are organized in physical data storage.
b) Conceptual schema: defines the stored data structures in terms of the database model used.
c) External schema: defines a view (or) views of the database for particular uses.
In database management systems data files are the files that store the database information
whereas offer files, such as index files and data dictionaries, store administrative information
known as metadata (data about data).
Data base are organized by fields, records and files.
i) Fields: is a single piece of information.
ii) Record: is one complete set of fields.
iii) File: is a collection of records.
Advantage of Data in database
Database system provides the organization with centralized control of its data
1) Redundancy can be reduced:
In non-database systems, each application (or) department has its own private file
resulting in considerable amount of redundancy (or) the stored data. Thus storage space is
wasted. By having centralized database most of this can be avoided
Components of a DBMS
Data Catalog
Application
Management
Transaction
Management
Concurrency Control
Recovery Management
Security Management
Language Interface
61
Security refers to the protection of data against unauthorized access. Security mechanism
of a DBMS makes sure that only authorized users are given access to the data in the database
v) Language Interface
The DBMS provides support languages used for the definition and manipulation of data in
the database. The data structures are created using the data definition language commands. The
data manipulation is done using the data manipulation commands.
2) Software
These include;
i) DBMS- DBMS back end is the server to control access and DBMS front end
are the clients
ii) Operating System
63
iii) Network software
iv) Data capture s/w
v) Application s/w
3) Data
i) Operational data
j) Metadata – data about data bridging machine components and human components
4) Procedures
i) Instructions and rules applied to design & use the db and DBMS
ii) Instructions to log on the DBMS
iii) Use of particular facilities
iv) Start and stop DBMS
v) Handling h/w & s/w failures
5) People/Users
i) Data Administrator (DA)
ii) Database Administrator (DBA)
iii) Db designer (DD)
iv) Application Programmer (AP)
v) End users (naive and sophisticated)
vi) Application Developers (AD)
64
/ Inference Model
i) Hierarchical Model:
It uses a structure in which records are divided into segments. A record contains one root
segment (which also becomes a key) and a variable number of subordinate segments that
define a field within a record.
Hierarchical Model is one of the oldest database model, dating from late 1950s. First
Hierarchical database model – was Information Management system (IMS). IMS become the
world’s leaching mainframe hierarchical database system in the 1970’s and early 1980’s.
The hierarchical model represents relationships with the notion of logical adjacency or more
accurately with ‘logical proximity’ in a linearized tree.
Advantages:
i) Simplicity: The relationship b/w the various layers are logically simple. Thus the
design of a hierarchical database is simple.
ii) Data security: Hierarchical model was the first database model that offered the data
security that is provided and enforced by the DBMS.
iii) Data Integrity: Since the hierarchical model is based on the parent /child relationship,
there is always a link between the parents segment and the child segments under it.
iv) Efficiency – The hierarchical database model is a very efficient one when the database
contains a large number of 1: n relationships.
Disadvantage:
i) Implementation Complexity
Even though it is simple and Easy to design it is quite complex to implement. The
database designers should have very good knowledge of the physical date storage
characteristics.
Advantages:
i) Conceptual simplicity: It is simple and easy to design.
ii) Capability to handle more relationship types. If can handle the one-to-many (I:
n) and many to many (n: n) relationship.
iii) Ease of data access: The data access is easier than and flexible than in the
hierarchical model.
iv) Data independence – the network model is easy to isolating the programs from
the complex physical storage details.
v) Data integrity. The network model does not allow a member to exist without an
owner
Disadvantages:
i) System complexity
ii) Absence of structural independence.
3. Relation model:
Relational model stores the data is the form of a table.
A single database can be spread across several tables.
A relational model uses tables to organize data elements.
Each table corresponds to an application entity and each row represents an instance of that
entity.
Advantage:
i) Structural independence:
The relational model does not depend on the navigational data access system thus
freeing the database designers, programmers and uses form learning the details about the data
storage.
ii) Conceptual simplicity:
Since the relational data model free the designer from the physical data storage details,
the designer can concentrate on the logical view of the database.
iii) Design, implementation, maintenance and usage ease – It is easier than other two models.
Disadvantages:
i) Hardware over heads:
Relational database systems hide the implementation complexities and the physical data
storage details from the users.
ii) Ease of design can lead to bad design:
It is easy to design; the users need not know the complex details of physical data storage.
EXAMPLE
NB;
i) A record is a set of entire data items in a row. A single record represents a horizontal row in a table
ii) Field – a set of entire similar data items in a column e.g. individual names, sex, adm no, marks
iii) Field types- specify the way specific data items are stored. MS Access support up to 10
different field types e.g. text, memo, number, date/time, currency, Y/N, OLE object, auto-
number, look-up, hyperlink.
Type
Auto-number A number is automatically incrementally &
never changes again
Currency A numeric field automatically assigned with a
currency sign e.g. £
Date/Time A date or time data type & can change
appearance of each from general type
Text Any character not needed for calculation
Number Any figure needed for calculation
Yes/No A logical field that needs yes or no
Memo A whole sentence e.g. comments/remarks
OLE object Any linked object e.g. picture
Hyperlink Stores data that are internet address e.g.
[email protected]
Link-up Values from external table
Relational Keys
i) Candidate key
It is a unique identifier of each record in a table. A table can have number of candidate
keys and out of these, one candidate key is designed as the primary key and it is by this
value that records can be sorted in a table unless otherwise, e.g. admission number.
ii) Primary key
Is a field or a set of fields whose content, is unique to one record and can therefore be
used to identify that record while sorting.
iii) Foreign key
This is the attribute or set of attributes within one relation that matches candidate key of
some other relation.
5. Entity-Relationship Model
A database can be modeled as:
o a collection of entities,
o relationship among entities.
An entity is an object that exists and is distinguishable from other objects.
o Example: specific person, company, event, plant
Entities have attributes
o Example: people have names and addresses
An entity set is a set of entities of the same type that share the same properties.
o Example: set of all persons, companies, trees, holidays
CREATING DATABASE
To create and manage database, we use Database Management System (DBMS) software. This
software facilitates the creation, organization and maintenance of databases. Examples of
DBMS software are Microsoft Access (MS Access), Microsoft SQL Server, Oracle, FoxPro,
DbaseIV, Lotus Approach and MySQL.
Tables/file structure
This is a database structure that is used to hold related records. Tables are organized in
rows and columns with each row representing a record while each column represents
common fields in each record.
Queries
A query is a statement use to extract, change, analyze or request for specific data from
one or more tables. Because a query is a question posed to the database, it returns a
result for the user.
Query statements are written using a special language called Structured Query
Language (SQL). The user creates a query by writing Structure query language
statement such as;
Select student admission number,
From
Admission table
Where
Class = year of admission
Forms/Input screen
A form is a graphical interface that resembles an ordinary paper form. Enter into or
view data from database. However, a database form enables the user to view and enter
data into a table. Form interface is a more convenient and easy way of entering and
viewing records from a table.
Reports
Most database systems provide the user with a tool for generating reports from
underlying tables o queries. It is the report generator that provides the user with a
means to specify the output layout and what is to be output or printed on a report.
Macros
In most DBMS software, it is possible to automate frequently performed procedures or
tasks using database components known as a macro. For example, if you frequently use
a particular form when you start a database program, you need to create a macro that
automates the opening of the form.
45
To create a new database;( Microsoft Office 2003)
1. Click start, point to programs, Microsoft Office, then Access 2003
2. On the New File, click create New
3. On the new file pane, click blank database
4. Select the location where the database will be created, type the database
name then click create.
The new database dialog box appears. This lets you specify the name and location
where your database will be stored. Click create.
5. Microsoft Access database objects window is displayed, from which you
can choose the type of object you wish to create such as tables, forms, queries etc.
Students database
Tables Queries Forms Reports Macros Modules
Open
Design view
New
ok
Assuming the “students database is open;
5. Click on the Tables tab and click on the New button to create a new
table. Access displays a New Table dialog box with various options of creating the
table
6. Select Design view and click ok. A blank data table structure is
displayed.
7. Using the grid displayed, enter a unique name for each field in the table.
A field name must start with a letter and can be up to a maximum of 64 characters
including letters, numbers, spaces and punctuation.
8. Choose appropriate data type before adding the next field. By default,
Ms Access inserts text as a data type. To specify the data type, click on the box
besides Text and select the required data type from the drop-down menu.
9. The field size and Formats are entered automatically on the General Tab
table structure. However, you can change the field sizes and Formats accordingly.
Note that when a field is empty, information in the general tab is not visibly displayed
immediately until you click in the data type column.
10. To save the table, click the save button on the standard tool bar or save
from the file menu and save as (e.g. Students Table and click ok).
11. Access will ask you whether you want to create a Primary Key, click
yes.
12. Click on the View menu and select Datasheet View to see results of the
structure. At this point, you can enter a few records just to check that the table
structure designed will be suitable for the data.
13. Click on File and select Close to complete the table structure design. A
new table is complete and ready for the data entry.
A data table showing defined fields (complete table ready for data entry)
Information security is the process of protecting information. It protects its availability, privacy and
integrity. Access to stored information on computer databases has increased greatly. More companies
store business and individual information on computer than ever before. Much of the information
stored is highly confidential and not for public viewing.
Data/information security means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction,
disclosure or transfer, whether accidental or intentional.
Data control is the measure taken to enforce the security of the program and data. Data may be lost in
various ways such as virus, user errors, computer crushes, hacking, etc.
Many businesses are solely based on information stored in computers. Personal staff details, client lists,
salaries, bank account details, marketing and sales information may all be stored on a database. Without
this information, it would often be very hard for a business to operate. Information security systems
need to be implemented to protect this information.
Effective information security systems incorporate a range of policies, security products, technologies
and procedures. Software applications which provide firewall information security and virus scanners
are not enough on their own to protect information. A set of procedures and systems needs to be
applied to effectively deter access to information.
The terms information security, computer security and information assurance are frequently incorrectly
used interchangeably. These fields are interrelated often and share the common goals of protecting the
confidentiality, integrity and availability of information; however, there are some subtle differences
between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of
concentration. Information security is concerned with the confidentiality, integrity and availability of
data regardless of the form the data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of a computer system
without concern for the information stored or processed by the computer.
One of the biggest potential threats to information security is the people who operate the computers. A
workplace may have excellent information security systems in place, but security can be easily
compromised. If a help desk worker gives out or resets passwords without verifying who the
information is for, then anyone can easily gain access to the system. Computer operators should be
made fully aware of the importance of security.
Simple security measures can be used by everyone to keep data secure. Changing passwords on your
computer, and using combinations of letters and numbers, makes it harder for hackers to gain access.
Also, do not keep a note of your password where it can be easily accessed. This is the same idea as not
keeping your bank card and PIN number together. You would not want anyone to have access to the
information or funds in your bank account, and it is the same with your computer.
COMPUTER VIRUS
Computer Virus is a malicious software program written intentionally to enter a computer without the
user's permission or knowledge. It has the ability to replicate itself, thus continues to spread. Some
viruses do little but replicate, while others can cause severe harm or adversely affect program and
performance of the system. A virus should never be assumed harmless and left on a system.
It can be a code segment that replicates by attaching copies of itself to existing executable files. The
new copy of the virus is executed when a user executes the new host program. The virus may include
an additional code that triggers when specific conditions are met. For example, some viruses display a
text string on a particular date. There are many types of viruses, including variants, overwriting,
resident, stealth, and polymorphic.
a) TYPES OF COMPUTER VIRUSES
There are different types of computer viruses which can be classified according to their origin,
techniques, types of files they infect, where they hide, the kind of damage they cause, the type of
operating system or platform they attack as follows;
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it
infects, rendering them partially or totally useless once they have been infected. The only way to clean
a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
Examples: Way, Trj.Reboot, Trivial.88.D.
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros.
These mini-programs make it possible to automate series of operations so that they are performed as a
single action, thereby saving the user from having to carry them out one by one.
Examples: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Virus
Directory viruses change the path that indicate the location of a file. When you execute a program file
with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the
virus program, while the original file and program is previously moved by the virus. Once infected it
becomes impossible to locate the original files.
Examples: Dir-2 virus.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and
encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find
them using string or signature searches (because they are different in each encryption). The virus then
goes on creating a large number of copies.
Examples: Elkern, Marburg, Satan Bug and Tuareg.
FAT Virus
The file allocation table or FAT is the part of a disk used to store all the information about the location
of files, available space, unusable space etc. FAT virus attacks the FAT section and may damage
crucial information. It can be especially dangerous as it prevents access to certain sections of the disk
where important files are stored. Damage caused can result in information losses from individual files
or even entire directories.
Multipartite Virus
These viruses spread in multiple ways possible. It may vary in its action depending upon the operating
system installed and the presence of certain files.
Examples: Invader, Flip and Tequila
Besides, there are many other computer viruses that have a potential to infect digital data. Hence, it is
a must that data is protected by installing a genuine quality anti-virus software.
Worms
Worms are programs that replicate and spread, often opening a back door to allow hackers to gain
access to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of computers that are
connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email.
A self-replicating program that is self-contained and does not require a host program. The program
creates a copy of itself and causes it to execute; no user intervention is required. Worms commonly
use network services to propagate to other host systems. A worm is a program very similar to a virus;
it has the ability to self-replicate and can lead to negative effects on your system. But they can be
detected and eliminated by anti-viruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Stealth virus
A form of a virus that hide itself from detection by anti-virus software
Companion virus
This virus does not actually inject a program but gets a run when the program is supposed to run
Conclusion
Information security is the ongoing process of exercising due care and due diligence to protect
information, and information systems, from unauthorized access, use, disclosure, destruction,
modification, or disruption or distribution. The never ending process of information security involves
ongoing training, assessment, protection, monitoring & detection, incident response & repair,
documentation, and review. This makes information security an indispensable part of all the business
operations across different domains.
c) Computer crimes
Hacking
Hacking is when an individual gets unauthorized access into a computer where they may; -look at the
data, copy the data, modify or erase the data.
Phishing
A Phishing attack is when you are sent an email that asks you to click on a link and re-enter your bank
or credit card details. These emails can pretend to be from banks, Internet service providers, on-line
stores and so on, and both the email and the web site it links to appear genuine. When you enter your
bank or credit card details they are then used fraudulently.
Zombies
A Zombie is a dormant program that lies inactive on a computer. It can be activated remotely to aid a
collective attack on another computer. Zombies don’t normally damage the computer on which they
reside but can damage other computers.
Zombies often arrive as email attachments and when the attachment is opened they install themselves
secretly and then wait to be activated.
While your computer is connected to the Internet it can be subject to attack through your network
communications. Some of the most common attacks include:
Bonk – An attack on the Microsoft TCP/IP stack that can crash the attacked computer.
RDS_Shell – A method of exploiting the Remote Data Services component of the Microsoft
Data Access Components that lets a remote attacker run commands with system privileges.
WinNuke – An exploit that can use NetBIOS to crash older Windows computers.
Spyware, Adware and Advertising Trojans are often installed with other programs, usually without
your knowledge. They record your behaviour on the Internet, display targeted ads to you and can
even download other malicious software on to your computer. They are often included within
programs that you can download free from the Internet or that are on CDs given away free by
magazines.
Spyware doesn’t usually carry viruses but it can use your system resources and slow down your
Internet connection with the display of ads. If the Spyware contains bugs (faults) it can make your
computer unstable but the main concern is your privacy. These programs record every step that you
take on the Internet and forward it to an Ad Management Centre which reviews your searches and
downloads to determine your shopping preferences. The Ad Management Centre will build up a
detailed profile of you, without your knowledge, and can pass this on to third parties, again without
your knowledge. Some Spyware can download more serious threats on to your computer, such as
Trojan Horses.
Virus Hoaxes
Virus hoaxes are messages, usually sent by email, that amount to little more than chain letters. They
pretend to alert you to the latest "undetectable" virus and simply waste your time and Internet bandwidth.
The best course of action is to delete these hoaxes - they can cause genuine fear and alarm in the disabled,
elderly and other vulnerable groups.
Unsecured Wireless Access Points
If a wireless access point, e.g. an ADSL (Broadband) Router, hasn't been secured then anyone with a
wireless device (laptop, PDA, etc) will be able to connect to it and thereby access the Internet and all the
other computers on the wireless network.
Bluesnarfing
The act of stealing personal data, specifically calendar and contact information, from a Bluetooth enabled
device.
Social Engineering
Tricking computer users into revealing computer security or private information, e.g. passwords, email
addresses, etc, by exploiting the natural tendency of a person to trust and/or by exploiting a person's
emotional response.
Example 1: Spammers send out an email about victims of child abuse and provide a link to click in the
email for further information or to help the victims. When the link is clicked the spammers know the
email address is "live" and add it to their live list which they then use to target their spam.
Example 2: A company computer user is tricked into revealing the network password by someone on the
telephone who is impersonating the voice of an employee in authority and who has a story of distress.
Worms
Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access
to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of computers that are
connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email.
Trespass
This is when someone is able to connect to your computer and control it in some form. This can
range from being able to view or access your files, to actually running programs on your computer
Some programs have special features that allow for remote access. Others contain bugs that allow a
backdoor or hidden access, that provides some level of control of the program, and trespassers will
make use of this to gain access to your computer.
Tracking
Tracking is when someone is able to monitor what you are doing on your computer system. This
applies mainly to tracking Internet usage, where someone may monitor what sites you visited and
what links you clicked on so that they can determine your interests, and use that information for
future marketing.
Tapping
Tapping is when someone gains access to information that is being transmitted via communication
links. Any information that is transmitted across a network is at risk of being intercepted, if
appropriate security measures are not in place
Cracking
Cracking is similar to hacking, but with one major distinction. In hacking, someone feels the need
to understand how the computer or network system of an organization works, but without the intent
of causing damage. In cracking, someone uses his or her knowledge of information systems to
literally to illegally or unethically penetrate computers system for personal gain.
Sabotage
Sabotage occurs when a malicious user renders a system unusable by other users. Sabotage takes
different forms;
‘Denial of service’ is common on the internet. A hacker using his/her computer, but mimicking
different computers, sends many requests to connect to the web server. The server attempts,
unsuccessfully, to establish communication with each one of this ‘computers’. These attempts
create much activity (traffic) that slows down the server to crawl and may eventually cause it to
crash. Genuine users will then have been denied service.
Release of viruses is also another form of sabotage
Spam
By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail, called
spam to thousands of users. This is done quite often by redirecting the email through the mail
server of an unsuspecting host, making the actual sender of the spam difficult to track.
Alterations
When a system is compromised, the data stored in it can be altered. Typical examples of data
alteration are when students break into a system to alter exam results, or someone breaks into a
banking system to change account details or divert money.
Confidentiality
Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or
systems. For example, a credit card transaction on the Internet requires the credit card number to be
transmitted from the buyer to the merchant and from the merchant to a transaction processing network.
The system attempts to enforce confidentiality by encrypting the card number during transmission, by
limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on),
and by restricting access to the places where it is stored. If an unauthorized party obtains the card
number in any way, a breach of confidentiality has occurred.
Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose
personal information a system holds.
Integrity
In information security, integrity means that data cannot be modified undetectably. Integrity is violated
when a message is actively modified in transit. Information security systems typically provide
message integrity in addition to data confidentiality.
Availability
For any information system to serve its purpose, the information must be available when it is needed.
This means that the computing systems used to store and process the information, the security controls
used to protect it, and the communication channels used to access it must be functioning correctly
Authenticity
In computing, e-Business and information security it is necessary to ensure that the data, transactions,
communications or documents (electronic or physical) are genuine. It is also important for authenticity
to validate that both parties involved are who they claim they are.
Controls/Protection
Audit trail
Audit trail help to detect trespassing and alteration. It is used to keep a record of who has accessed a
computer system and what operations he/she has performed during a given period of time.. in case a
system is broken into by a hacker, an audit trail enables their activities to be tracked. Any unauthorized
alterations can be rolled back to take the system back to the state it was in before the alterations were
done.
Hacking
To prevent or stop such;
Log off correctly from the computer when leaving the machine
Chose passwords that are not obvious, with at least 6 characters and a mixture of numbers and
both upper and lower case letters
Keeping passwords confidential and not writing them down anywhere
Changing passwords regularly
Encrypting data that is transmitted using the telecommunications network or wireless
communication
Firewalls
A physical firewall keeps a fire from spreading from one area to the next. Similarly, a firewall is
a program or hardware that filters information coming through the internet and connections
into your personal computer or network. Firewalls can prevent unauthorized remote logins,
limit or stop Spam, and filter the content that is downloaded from the internet. Some firewalls
offer virus protection but it is worth the investment to install Anti-virus software on each
computer.
When Management chooses to mitigate a risk, they will do so by implementing one or more of three
different types of controls.
Administrative
Administrative controls (also called procedural controls) consist of approved written policies,
procedures, standards and guidelines. Administrative controls form the framework for running the
business and managing people. They inform people on how the business is to be run and how day to
day operations are to be conducted. Laws and regulations created by government bodies are also a type
of administrative control because they inform the business. Some industry sectors have policies,
procedures, standards and guidelines that must be followed - the Payment Card Industry (PCI) Data
Security Standard required by Visa and Master Card is such an example. Other examples of
administrative controls include the corporate security policy, password policy, hiring policies, and
disciplinary policies.
Administrative controls form the basis for the selection and implementation of logical and physical
controls. Logical and physical controls are manifestations of administrative controls. Administrative
controls are of paramount importance.
Logical
Logical controls (also called technical controls) use software and data to monitor and control access to
information and computing systems. For example: passwords, network and host based firewalls,
network intrusion detection systems, access control lists, and data encryption are logical controls.
An important logical control that is frequently overlooked is the principle of least privilege. The
principle of least privilege requires that an individual, program or system process is not granted any
more access privileges than are necessary to perform the task. A blatant example of the failure to
adhere to the principle of least privilege is logging into Windows as user Administrator to read Email
and surf the Web. Violations of this principle can also occur when an individual collects additional
access privileges over time. This happens when employees' job duties change, or they are promoted to
a new position, or they transfer to another department. The access privileges required by their new
duties are frequently added onto their already existing access privileges which may no longer be
necessary or appropriate.
Physical
i) Physical controls monitor and control the environment of the work place and computing
facilities. They also monitor and control access to and from such facilities. For example: doors, locks,
heating and air conditioning, smoke and fire alarms, fire suppression systems, cameras, barricades,
fencing, security guards, cable locks, etc. Separating the network and work place into functional areas
are also physical controls. To prevent loss of hardware (theft), computers should be kept in strong
rooms and data back-up should be done regularly. An important physical control that is frequently
overlooked is the separation of duties. Separation of duties ensures that an individual can not
complete a critical task by himself. For example: an employee who submits a request for
reimbursement should not also be able to authorize payment or print the check. An applications
programmer should not also be the server administrator or the database administrator - these roles and
responsibilities must be separated from one another.
ii) Restricting access to areas with computers, so that only authorized personnel are allowed to use
the system
iii) Keeping computer rooms locked after working hours
iv) Installing alarm systems and other security devices
An important aspect of information security and risk management is recognizing the value of
information and defining appropriate procedures and protection requirements for the information. Not
all information is equal and so not all information requires the same degree of protection. This requires
information to be assigned a security classification.
The first step in information classification is to identify a member of senior management as the owner
of the particular information to be classified. Next, develop a classification policy. The policy should
describe the different classification labels, define the criteria for information to be assigned a particular
label, and list the required security controls for each classification.
The type of information security classification labels selected and used will depend on the nature of
the organization, with examples being:
In the business sector, labels such as: Public, Sensitive, Private, Confidential.
In the government sector, labels such as: Unclassified, Sensitive But Unclassified,
Restricted, Confidential, Secret, Top Secret and their non-English equivalents.
In cross-sectoral formations, the Traffic Light Protocol, this consists of: White, Green, Amber
and Red.
All employees in the organization, as well as business partners, must be trained on the classification
schema and understand the required security controls and handling procedures for each classification.
The classification a particular information asset has been assigned should be reviewed periodically to
ensure the classification is still appropriate for the information and to ensure the security controls
required by the classification are in place.
Access control
Access to protected information must be restricted to people who are authorized to access the
information. The computer programs, and in many cases the computers that process the information,
must also be authorized. This requires that mechanisms be in place to control the access to protected
information. The sophistication of the access control mechanisms should be in parity with the value of
the information being protected - the more sensitive or valuable the information the stronger the
control mechanisms need to be. The foundation on which access control mechanisms are built start
with identification and authentication.
There are three different types of information that can be used for authentication: something you
know, something you have, or something you are. Examples of something you know include such
things as a PIN, a password, or your mother's maiden name. Examples of something you have include
a driver's license or a magnetic swipe card. Something you are refers to biometrics. Examples of
biometrics include palm prints, finger prints, voice prints and retina (eye) scans. Strong authentication
requires providing information from two of the three different types of authentication information. For
example, something you know plus something you have. This is called two factor authentication.
On computer systems in use today, the Username is the most common form of identification and the
Password is the most common form of authentication. Usernames and passwords have served their
purpose but in our modern world they are no longer adequate. Usernames and passwords are slowly
being replaced with more sophisticated authentication mechanisms.
After a person, program or computer has successfully been identified and authenticated then it must be
determined what informational resources they are permitted to access and what actions they will be
allowed to perform (run, view, create, delete, or change). This is called authorization.
Authorization to access information and other computing services begins with administrative policies
and procedures. The policies prescribe what information and computing services can be accessed, by
whom, and under what conditions. The access control mechanisms are then configured to enforce
these policies.
Different computing systems are equipped with different kinds of access control mechanisms - some
may even offer a choice of different access control mechanisms. The access control mechanism a
system offers will be based upon one of three approaches to access control or it may be derived from a
combination of the three approaches.
The non-discretionary approach consolidates all access control under a centralized administration.
The access to information and other resources is usually based on the individuals function (role) in the
organization or the tasks the individual must perform. The discretionary approach gives the creator
or owner of the information resource the ability to control access to those resources. In the Mandatory
access control approach, access is granted or denied basing upon the security classification assigned
to the information resource.
Information security uses cryptography to transform usable information into a form that renders it
unusable by anyone other than an authorized user; this process is called encryption. Information that
has been encrypted (rendered unusable) can be transformed back into its original usable form by an
authorized user, who possesses the cryptographic key, through the process of decryption.
Cryptography is used in information security to protect information from unauthorized or accidental
disclosure while the information is in transit (either electronically or physically) and while information
is in storage.
Cryptography provides information security with other useful applications as well including improved
authentication methods, message digests, digital signatures, non-repudiation, and encrypted network
communications.
Cryptography can introduce security problems when it is not implemented correctly. Cryptographic
solutions need to be implemented using industry accepted solutions that have undergone rigorous peer
review by independent experts in cryptography. The length and strength of the encryption key is also
an important consideration. A key that is weak or too short will produce weak encryption. The keys
used for encryption and decryption must be protected with the same degree of rigor as any other
confidential information. They must be protected from unauthorized disclosure and destruction and
they must be available when needed. PKI solutions address many of the problems that surround key
management.
Defense in depth
Information security must protect information throughout the life span of the information, from the
initial creation of the information on through to the final disposal of the information. The information
must be protected while in motion and while at rest. During its life time, information may pass through
many different information processing systems and through many different parts of information
processing systems. There are many different ways the information and information systems can be
threatened. To fully protect the information during its lifetime, each component of the information
processing system must have its own protection mechanisms. The building up, layering on and
overlapping of security measures is called defense in depth. The strength of any system is no greater
than its weakest link. Using a defense in depth strategy, should one defensive measure fail there are
other defensive measures in place that continue to provide protection.
Process
The terms reasonable and prudent person, due care and due diligence have been used in the fields
of Finance, Securities, and Law for many years.
In the field of Information Security, Harris offers the following definitions of due care and due
diligence:
"Due care are steps that are taken to show that a company has taken responsibility for the activities
that take place within the corporation and has taken the necessary steps to help protect the company,
its resources, and employees." And, [Due diligence are the] "continual activities that make sure the
protection mechanisms are continually maintained and operational."
Attention should be made to two important points in these definitions. First, in due care, steps are
taken to show - this means that the steps can be verified, measured, or even produce tangible artifacts.
Second, in due diligence, there are continual activities - this means that people are actually doing
things to monitor and maintain the protection mechanisms, and these activities are ongoing.
While a business continuity plan (BCP) takes a broad approach to dealing with organizational-wide
effects of a disaster, a disaster recovery plan (DRP), which is a subset of the business continuity plan,
is instead focused on taking the necessary steps to resume normal business operations as quickly as
possible. A disaster recovery plan is executed immediately after the disaster occurs and details what
steps are to be taken in order to recover critical information technology infrastructure.
Computer crime is a growing industry. Some of the issues addressed by ICT legislation are;
In Kenya, the Copyright Act was amended in 1996 to include protection for computer programs and
software copyright. In addition to copyright protection, there are other laws in force in other countries.
Some examples are listed below with a description of what the legislations entails.
Legislations Description
Privacy Laws Non-disclosure of private data to persons than
those to whom it was given
Data Protection A safeguard to protect personal data. It basically
ensures that holders of personal data do not
misuse data
Computer Misuse To prevent misuse of both hardware and software,
including computer viruses, hacking, etc
Health and Safety An explanation of what employers must do and
what the equipment must be like to safeguard the
health and safety of employees
Prohibited Publication To prevent undesirable publication being
published and distributed electronically, for
example pornography and hate mail
Below is a partial listing of European, United Kingdom, Canadian and USA governmental laws and
regulations that have, or will have, a significant effect on data processing and information security.
Important industry sector regulations have also been included when they have a significant impact on
information security.
UK Data Protection Act 1998 makes new provisions for the regulation of the processing of
information relating to individuals, including the obtaining, holding, use or disclosure of such
information. The European Union Data Protection Directive (EUDPD) requires that all EU member
must adopt national regulations to standardize the protection of data privacy for citizens throughout
the EU.
The Computer Misuse Act 1990 is an Act of the UK Parliament making computer crime (e.g.
cracking - sometimes incorrectly referred to as hacking) a criminal offence. The Act has become a
model upon which several other countries including Canada and the Republic of Ireland have drawn
inspiration when subsequently drafting their own information security laws.
EU Data Retention laws requires Internet service providers and phone companies to keep data
on every electronic message sent and phone call made for between six months and two years.
The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232 g; 34 CFR Part
99) is a USA Federal law that protects the privacy of student education records. The law applies to all
schools that receive funds under an applicable program of the U.S. Department of Education.
Generally, schools must have written permission from the parent or eligible student in order to release
any information from a student's education record.
Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires the adoption of
national standards for electronic health care transactions and national identifiers for providers, health
insurance plans, and employers. And, it requires health care providers, insurance providers and
employers to safeguard the security and privacy of health data.
Gramm-Leach-Bliley Act of 1999 (GLBA), also known as the Financial Services
Modernization Act of 1999, protects the privacy and security of private financial information that
financial institutions collect, hold, and process.
Sarbanes-Oxley Act of 2002 (SOX). Section 404 of the act requires publicly traded companies
to assess the effectiveness of their internal controls for financial reporting in annual reports they
submit at the end of each fiscal year. Chief information officers are responsible for the security,
accuracy and the reliability of the systems that manage and report the financial data. The act also
requires publicly traded companies to engage independent auditors who must attest to, and report on,
the validity of their assessments.
Payment Card Industry Data Security Standard (PCI DSS) establishes comprehensive
requirements for enhancing payment account data security. It was developed by the founding payment
brands of the PCI Security Standards Council, including American Express, Discover Financial
Services, JCB, MasterCard Worldwide and Visa International, to help facilitate the broad adoption of
consistent data security measures on a global basis. The PCI DSS is a multifaceted security standard
that includes requirements for security management, policies, procedures, network architecture,
software design and other critical protective measures.
State Security Breach Notification Laws (California and many others) require businesses,
nonprofits, and state institutions to notify consumers when unencrypted "personal information" may
have been compromised, lost, or stolen.
Personal Information Protection and Electronics Document Act (PIPEDA) - An Act to support
and promote electronic commerce by protecting personal information that is collected, used or
disclosed in certain circumstances, by providing for the use of electronic means to communicate or
record information or transactions and by amending the Canada Evidence Act, the Statutory
Instruments Act and the Statute Revision Act.
Sources of standards
The USA National Institute of Standards and Technology (NIST) is a non-regulatory federal agency
within the U.S. Department of Commerce. The NIST Computer Security Division develops standards,
metrics, tests and validation programs as well as publishes standards and guidelines to increase secure
IT planning, implementation, management and operation. NIST is also the custodian of the USA
Federal Information Processing Standard publications (FIPS).
The Internet Society is a professional membership society with more than 100 organization and over
20,000 individual members in over 180 countries. It provides leadership in addressing issues that
confront the future of the Internet, and is the organization home for the groups responsible for Internet
infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet
Architecture Board (IAB). The ISOC hosts the Requests for Comments (RFCs) which includes the
Official Internet Protocol Standards and the RFC-2196 Site Security Handbook.
The Information Security Forum is a global nonprofit organization of several hundred leading
organizations in financial services, manufacturing, telecommunications, consumer goods, government,
and other areas. It undertakes research into information security practices and offers advice in its
biannual Standard of Good Practice and more detailed advisories for members.
The IT Baseline Protection Catalogs, or IT-Grundschutz Catalogs, ("IT Baseline Protection Manual"
before 2005) are a collection of documents from the German Federal Office for Security in
Information Technology (FSI), useful for detecting and combating security-relevant weak points in the
IT environment (“IT cluster“). The collection encompasses over 3000 pages with the introduction and
catalogs.
Professionalism
Information security professionalism is the set of knowledge that people working in Information
security and similar fields (Information Assurance and Computer security) should have and eventually
demonstrate through certifications from well respected organizations. It also encompasses the
education process required to accomplish different tasks in these fields.
Information technology adoption is always increasing and spread to vital infrastructure for civil and
military organizations. Everybody can get involved in the Cyber war. It is crucial that a nation can
have skilled professional to defend its vital interests.
Conclusion
Information security is the ongoing process of exercising due care and due diligence to protect
information, and information systems, from unauthorized access, use, disclosure, destruction,
modification, or disruption or distribution. The never ending process of information security involves
ongoing training, assessment, protection, monitoring & detection, incident response & repair,
documentation, and review. This makes information security an indispensable part of all the business
operations across different domains.
• The network operating system/network software contains instructions that enable the hardware
to work as a network.
• Computer networks can be classified into different categories. E.g. according to geographical
coverage, ownership etc.
A network is a logical extension of a data communication system. In a computer network, two
or more processors or computers are linked together with carriers and data communication
devices for the purpose of communicating data and sharing resources. The term "topology" in
the context of a communications network determines the data paths that may be used between
any pair of stations of the network. A network consists of multiple computers connected using
some type of interface, each having one or more interface devices such as a Network Interface
Card (NIC) and/or a serial device for networking. Each computer is supported by network
software that provides the server or client functionality. The hardware used to transmit data
across the network is called the media. It may include copper cable, fiber optic, or wireless
transmission.
In a server based network, there are computers set up to be primary providers of services such
as file service or mail service. The computers providing the service are called servers and the
computers that request and use the service are called client computers.
b) Functions of networks
i) All users can easily share or exchange information
ii) The computers in a network can share resources such as printers and scanners
iii) Software can be shared hence using same license
iv) Data backup can be achieved easily
c) Types of networks (Classification of computer network according to geographical
coverage):
In this case, computer networks can be classified in to:
1. Local Area Network (LAN) - Defined as a communication network that provides
interconnection of a variety of data communication devices within a small area e.g. same office,
on the same floor or in the same building. LANs are typically owned by small organizations,
companies, schools etc. Limited to a small geographical area usually under one KM
2. Metropolitan Area Network (MAN)
This covers a slightly a large area e.g. an entire city.
3. Wide Area Network (WAN)
This is a network that covers a very large area e.g. at several countries, a whole country, a
continent or several continents. It involves interconnection of LANS and MANS to cover a wide
range of distance. Covers a large or greater distance e.g. nationwide or worldwide. An example of
WAN is the Internet.
d) Networks configuration/Topology
The physical topology of a network is the actual geometric layout of workstations. There are
several common physical topologies, as described below and as shown in the illustration.
In the bus network topology, every workstation is connected to a main cable called the bus.
Therefore, in effect, each workstation is directly connected to every other workstation in the
network.
In the star network topology, there is a central computer or server to which all the workstations
are directly connected. Every workstation is indirectly connected to every other through the
central computer.
In the ring network topology, the workstations are connected in a closed loop configuration.
Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly
connected, the data passing through one or more intermediate nodes.
If a Token Ring protocol is used in a star or ring topology, the signal travels in only one
direction, carried by a so-called token from node to node.
The mesh network topology employs either of two schemes, called full mesh and partial mesh.
In the full mesh topology, each workstation is connected directly to each of the others. In the
partial mesh topology, some workstations are connected to all the others, and some are
connected only to those other nodes with which they exchange the most data.
The tree network topology uses two or more star networks connected together. The central
computers of the star networks are connected to a main bus. Thus, a tree network is a bus
network of star networks.
Logical (or signal) topology refers to the nature of the paths the signals follow from node to
node. In many instances, the logical topology is the same as the physical topology. But this is
not always the case. For example, some networks are physically laid out in a star configuration,
but they operate logically as bus or ring networks.
Topology can be understood as the shape or structure of a network. This shape does not
necessarily correspond to the actual physical design of the devices on the computer network.
The computers on a home network can be arranged in a circle but it does not necessarily mean
that it represents a ring topology.
Advantages of Bus Topology
i It is easy to handle and implement.
ii It is best suited for small networks.
iii Easy to connect a computer or peripheral to a linear bus.
iv Requires less cable length than a star topology.
Disadvantages of Bus Topology
i The cable length is limited. This limits the number of stations that can be connected.
ii This network topology can perform well only for a limited number of nodes.
iii Entire network shuts down if there is a break in the main cable.
iv Terminators are required at both ends of the backbone cable.
v Difficult to identify the problem if the entire network shuts down.
vi Not meant to be used as a stand-alone solution in a large building.
Star
Advantages of a Star Topology
i Easy to install and wire.
ii No disruptions to the network when connecting or removing devices.
iii Easy to detect faults and to remove parts.
iv Due to its centralized nature, the topology offers simplicity of operation.
v It also achieves an isolation of each device in the network.
Disadvantages of a Star Topology
i Requires more cable length than a linear topology.
ii If the hub, switch, or concentrator fails, nodes attached are disabled.
iii More expensive than linear bus topologies because of the cost of the hubs, etc.
iv The network operation depends on the functioning of the central hub. Hence, the failure of the
central hub leads to the failure of the entire network.
Mesh
Advantage of Mesh Topology
The arrangement of the network nodes is such that it is possible to transmit data from
one node to many other nodes at the same time.
System provides increased redundancy and reliability as well as ease of
troubleshooting.
This type of network is very reliable, as any line breakdown will affects only
communication between the connected computers.
Communication is very fast between any two nodes.
Disadvantage of Mesh Topology
The arrangement wherein every network node is connected to every other node
of the network, many of the connections serve no major purpose. This leads
to the redundancy of many of the network connections.
System is expensive to install because it uses a lot of cabling.
It is most expensive system from the point of view of line cost. if there are (n)
nodes in the network, then n (n-1)/2 links are required. Thus the cost of
linking the system grows with the square of the numbers of the nodes.
Additions of the new nodes to the network is difficult.
i) Tree topology
Advantages of a Tree Topology
Point-to-point wiring for individual segments.
Supported by several hardware and software venders.
Disadvantages of a Tree Topology
Overall length of each segment is limited by the type of cabling used.
If the backbone line breaks, the entire segment goes down.
More difficult to configure and wire than other topologies.
e) Meaning and uses of internet
INTERNET CONNECTIVITY
The purpose of networking is to connect friends, business people, corporations, information and
research centers, entertainment and enrichment resources with the whole world. Computers can
connect to the Internet in a variety of ways; such as through a university or business LAN that can
connect directly to the internet, or directly through an ISP. In this topic (6.3) we will be looking at
some of the requirements and terms you might encounter when you want to connect to the internet.
1. DATA TERMINAL EQUIPMENT (DTE)
Data terminal equipment (DTE) is an instrument that converts user information into signals
and/or reconverts received signals back into the original data. Data terminal Equipment is on both
ends of the transmission circuit, i.e. at the senders end and at the receivers end.
Data terminal equipment (DTE) can be a computer, a terminal, a router, an access server
2. SERVER AND CLIENT
A server is a computer program or a series of computers that provides essential services to other
computers across a network. Servers provide unique capabilities that can be shared by all other
devices in a network. There are several types of servers such as;
File servers; it allows all users to share one or more large capacity disk drives
Print servers; provides access to one or more printers
Communication servers; provides access to other LAN and host computers.
Application servers; which provide processing capacity for applications that are shared by many
people/computers.
Web servers; which allows websites that can be accessed over a corporate intranet or one that
gives access to the www.
A server function can be performed by a computer that is used as a normal workstation or by a
dedicated computer that has the sole purpose of providing server functions to other users on a
network.
When a network has server(s) the other workstations are called clients. This introduces the concept
of client/server computing. In this system, a client request data from a server which then provides
the requested data or information back to the client. Therefore we can say that a client is an
application or system that accesses a remote service on another computer system, known as a
server, over a network.
The client can be a dumb terminal i.e. it has no processing capabilities, or it can be a fully
functioning terminal with processing and storage capabilities. Today there are very few dumb
terminals existing. An example of how a client server system works
PORTS
A port is a virtual/logical data connection that can be used by programs to exchange data directly.
The most common of these are TCP and UDP ports, which are used to exchange data between
computers on the Internet.
These ports allow software applications to share hardware resources without interfering with each
other. Computers and routers automatically manage network traffic traveling via their virtual ports.