Introduction To Computers

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 9

INTRODUCTION TO COMPUTERS

DEFINITIONS
DATA
This refers to the facts and figures which do not make complete meaning on their own, examples
include: NAME, PAYROLL NUMBERS, AGE etc. They describe the entities or transactions
that occur in the organization.

INFORMATION
Refers to the processed data which can be used for making decisions, examples of information
include balance sheet, installments etc.

COMPUTER
This refers to an electronic machine which is capable of accepting input data, store and
manipulate them under stored programs at high speed.

HARDWARE
Refers to the physical or touchable parts of a computer system

SOFTWARE
These are programs that run in the computer system together with related documentation.

PROGRAMS
A set of instructions which are coded in a computer language

SYSTEM
Refers to the related components that operate together to achieve a common goal.

PERIPHERALS
The devices that are attached to the computers

LIVE WARE
Refers to the personnel that work on computer. It is also known as orgware.

NETWORK
This is the interconnection of two or more computers
1
INPUT/OUTPUT INTERFACE
This refers to conversion of data from human language to machine code and vice versa. It takes
place when one is keying in information to the computer.

PARTS OF A COMPUTER
A. THE INPUT UNIT
Data is entered into the computers through the input unit. This input has the media/device which
converts the data into a form which is suitable for computer storage and processing.
Examples of input devices are:
(i) Keyboard
Has the character and special keys which are used for performing useful operations on data. The
characters are alphabetic, numeric and special keys. Computer keyboards are professional which
implies they are used for more complex operations as compared to typewriter keyboard.
(ii) Mouse
This is a more recent development which is faster than the keyboard. It is a pointing device
which is used with special software.
MOUSE OPERATIONS
A mouse can perform four main operations. Pointing, clicking, double clicking and dragging.
1. POINTING
It involves moving the mouse pointer on a flat surface until the mouse pointer rests on the item or
position of your choice on the desktop. It is mostly done for the purpose of clicking, double
clicking or right clicking operations.
2. CLICKING
This is pointing at an object and pressing and releasing the normal (primary) button only once.
Mostly you point to an item and click on it to select it e.g. selecting a menu, icon etc. A selected
item is always highlighted. To unselect a selected item click outside it.
3. DOUBLE CLICKING
This means pointing at an object and pressing and releasing the normal (primary) button twice
without moving the mouse.
4. DRAGGING
It involves pointing to an item holding down the left hand button moving the item and releasing
it in the desired location. Mainly used to move objects in windows operating system.
THE RIGHT BUTTON CLICK
Clicking on the right button when on an icon displays a pop up menu containing all the possible
commands which can be used to the object or point clicked at. It provides a shortcut to executing
some command than going through the procedures of selecting an object, opening a menu and
selecting a command.
2
B. THE CENTRAL PROCESSING UNIT (CPU)
This is considered as the brain/head of the computer as it is where all the processing talkes place.
The CPU is divided into three subcomponents each with special function to perform.
The components are:
(I) Main memory
It is made up of:
(a) R.A.M – random access memory
- It is also known as volatile memory/primary storage or immediate access memory.
- It is the unit that holds information which is currently running
- Information put there can be read, modified and erased/deleted
- The computer user puts in information there.
(b) R.O.M Read Only Memory
- It is a microchip
- Holds information from the manufacturer
- Information in R.O.M can be read but cannot be modified or deleted/erased
- Information in R.O.M cannot be lost in case of power failure
NB During execution, the instructions are in the computer R.A.M from the memory instructions
are decoded (interpreted) in the control unit in the C.P.U.
A signal is generated (Control and timing signal) to provide control over the other peripherals or
cause the computer act accordingly. This whole process is known as FETCH EXECUTE
CYCLE.
(II) Arithmetic and logic unit (A.L.U)
This subunit performs all the arithmetic and logic operations in the computer. It has the
necessary circuit which performs these operations.
(III)Control unit
It is the unit that coordinates the entire operation in a computer system. It generates the
necessary signals for the parts of the computer and synchronizes (times) the sequence of their
operations.
C. BACKING STORAGE UNIT
It is also known as the auxiliary storage or secondary storage. As opposed to the main memory,
backing storage offers storage which is rather permanent so long as the data is still required. The
capacity of backing storage will vary according to the requirements.
D. OUTPUT UNIT
Information is presented from a computer through the output unit. The output devices present the
information in human sensible form.
Examples of output devices are:
3
Printers – For hard copy output i.e. in printed form
Screen – For soft copy output i.e. Display output
SUMMARY OF THE PARTS OF A COMPUTER.

COMPUTER HARDWARE

C.P.U PERIPHERALS

CONTROL A.L.U MAIN INPUT OUTPUT BACKING


UNIT MEMORY DEVICES DEVICES STORAGE
DEVICES

NB. Peripheral devices are usually the electromechanical devices that are connected to the
C.P.U. They transfer data and programs to and from the C.P.U.

CLASSIFICATION OF COMPUTERS
Computers can be classified into THREE major classes:
(i) By size
(ii) By function
- General purpose
- Special purpose
(ii) Type of data they process
- Digital
- Analogue
- Hybrid
BY SIZE
This brings about the following computer class:
(i) SUPERCOMPUTERS
- They are the largest and most powerful kind of computers.
- They are the most expensive
- They are generally owned by large organizations
- They are used principally for research, oil exploration, weapon development or weather
forecasting.
- They are maintained in special rooms or environment.
- It is about 50,000 times faster than the microcomputers
4
(ii) MAINFRAME COMPUTERS
- They are large computers that are expensive.
- Can process billions of characters of data
- They are used by banks, airlines, universities, government agencies and other large
organizations.
- They require rooms with air conditioning
- It was the backbone of the computer industry for many years
- They consume a lot of power
- They allow multitasking
- Can support many devices e.g. Other terminals, Tape units, magnetic tapes, disk packs etc
(iii) MINICOMPUTERS
- They are smaller than the mainframes, i.e. they are medium sized
- They have medium processing power.
- They are used in medium sized companies or large companies to perform special taks like
accounting, or certain manufacturing activities.
(iv) MICRO COMPUTERS
- They are the smallest in size
- They can support only one terminal
- They have a microprocessor and not a CPU
- They have a smaller backing storage unit and RAM capacity as compared to mainframe
and minicomputers
- They are widely used.
BY FUNCTION
A. GENERAL PURPOSE COMPUTER
These are computers built to be used in many application areas ie processing office letters,
processing accounts clerk work, downloading information from the internet, games etc
Examples of general purpose computers include the computers used in:
Business communication
Education
Research
B. SPECIAL PURPOSE COMPUTERS
These are computers made to solve only one specific problem. They are very specific and cannot
perform any other functions eg Missile control computers, Games computers etc

TYPE OF DATA THEY PROCESS


ANALOGUE COMPUTERS
5
These are computers that process data in form of continuous valid form. Data such as voltage,
speed and temperature are represented in the computer in a continuous and unbroken flow.
Examples: The life supporting machines used in hospital intensive care unit, the car tracking
systems etc
DIGITAL COMPUTERS
They are computers that process data in form of discrete digital pulses (regular intervals). They
are popular in business applications and operate under the control of stored programs. Most of
general purpose computers are digital.
HYBRID COMPUTERS
They are integrated system that can perform both digital and analogue tasks. A hybrid computer
can be achieved by direct interconnection of a digital computer and an analogue computer
(Interfacing).

ADVANTAGES OF COMPUTERS
1. SPEED – It can process data at a high electronic speed (microseconds)
2. ACCURACY – Computers are accurate in data processing so long as the data is correctly
keyed in the computer and the program controlling is accurate.
3. STORAGE AND RETRIEVAL ABILITY – They are capable of storing large amounts of
data in a very small space electronically, which can be retrieved within a very short time.
4. JOB COMPLEXITY – Can handle very complex jobs easily especially that involving
mathematical problems with figures.
5. SECURITY – Information held in computer files is safer since they can only be accessed by
authorized users especially where a password (security) is required. A password is a secret
code only known to the user and if the correct one is not provided no information can be
retrieved.
6. REPETITIVE ABILITY – The computer is able to repeat the same jobs uncountable
number of times depending on the loop in the program.
7. VERSABILITY – Can be used in many application areas as long as correct application is
provided.
8. RELIABILITY – Computer can be brought and installed to be used at any time as long as it
is taken care of.

COMPUTER VIRUSES
A computer virus is a program designed to damage other programs or cause irregular behavior.
RISKS POSED BY VIRUSES
Risks posed by viruses come in various forms:
(i) DESTRUCTIVE VIRUSES
6
MASSIVE DESTRUCTION – Attacks the formats of disks whereby any program or data will
be unrecoverable.
PARTIAL DESTRUCTION – Erasure or malfunction of a specific portion of disk affecting any
files stored in that location.
SELECTIVE DESTRUCTION – Erasure and modification of specific files or file group.
RANDOM HAVOC – Randomly changing data on disk in memory during normal program
execution or changing key stroke values or data from other input/output devices.
NETWORK SATURATION – Systematically using up computer memory space impeding
performance or cause the system to crash.
NON – DESTRUCTIVE VIRUSES – These do not cause any destruction but are annoying.
They usually display messages, change display colours, change key stroke values and delete
characters displayed on a visual display.
SOURCES OF VIRUSES
1. Contact with contaminated systems
2. Pirated software
3. Infected proprietary software
4. Fake games
5. Freeware and shareware
6. Updates of software distributed via networks
VIRUS SYMPTOMS
1. Unfamiliar graphics or messages appearing on screens
2. Programs taking longer than usual to load
3. Disks accesses seeming excessive for simple tasks
4. Unusual error messages occurring more frequently
5. Less memory available than usual
6. Executable files changing size for no obvious reason
7. Programs/files mysteriously disappearing
8. Changes to disk volume
PREVENTION OF VIRUS ATTACKS
1. Write protect disk once their use has been completed.
2. Restrict disk movement
3. All software and data files should have backups taken at regular intervals.
4. Great care should be taken when PC’s are booted from disks which have not been
shown to be free from viruses.
5. Procedures for evaluating new software should be included tests for the presence of
virus code.

7
6. Programs downloaded from bulletin boards and those obtained from computer clubs
should be carefully evaluated and examined fro destructive code.
7. Users should be informed of the need for data security and of the potential threats to
the integrity of their data.
8. All purchased software should be carefully examined before use. Load new software
onto an isolated PC which contains no crucial or sensitive files.
SWITCHING ON THE COMPUTER
First make sure your power source(Sockets) is ON. Switch ON the CPU and the monitor. If
your computer starts up correctly you can expect to see a screen having the following features.
THE TASK BAR AND THE START BUTTON
THE TASK BAR
It is located at the bottom of your screen. It does not only show the start button but it also shows
the programs that are running in your computer.
THE START MENU
When you click on the start button you will see a menu that contains everything you need to use
ie a list of programs which you can open.
You can see optios which include:
Programs
Documents
Settings
Run
Shutdown/Turn off computer etc
SHUTTING DOWN WINDOWS
This is done when you when you want to switch off your computer. For safety reasons,
it is wise to shut down windows before you switch off your computer. This ensures that
all your files are saved and programs are closed. Otherwise if you don’t follow the
necessary procedure you might crush down some important files. To shut down
windows:
 Click on the start menu
 Click on Shut down or Turn off computer depending on the operating system you
are using.
 Click on Turn off or Shut down
 The dialog box below appears (Windows xp) asking you whether you want to turn
off the computer or restart or stand by.

 Click on Turn off the computer if you wish to switch off


8
 The shut down process begins
 Wait for the message “It is now safe to turn off your computer” to appear before
you switch off the computer.
 In some machine models you only need to click turn off then the computer
processor is automatically turned off.

You might also like