Theory Notes PDF
Theory Notes PDF
Theory Notes PDF
THEORY
Computers affect our lives in many different ways, and will increasingly do so in future. Most
people believe that knowing how to use a computer is a basic skill necessary to succeed in
business or to function effectively in society. But just knowing how to use the computer is not
enough. Any person using a computer needs to have some operational background
knowledge of the components that form part of today’s information and communications
technology systems. This chapter aims to give a brief overview of the most important aspects
that a computer end-user should know about.
The following diagram shows some of the most important components found in a typical
computer system.
___________
Theory - 1
Output device: printer
Output device: Screen
___________
Theory - 2
5.1.6 What is an information system?
A computer system, as described in paragraph 5.1.5, forms only one part of an information
system. Obtaining useful and timely information from computer processing requires all of the
following elements working together :
Hardware equipment has to be reliable and capable of handling the workload.
Software (programmes) must be carefully developed and tested to comply with the needs
of the information required.
Data should be entered correctly and be accurate
Trained information systems personnel are necessary to mange the system.
Knowledgeable users, that know how to use the system will contribute to the efficiency
of the system.
All information processing applications should have documented procedures covering
computer and related operations.
Data travels at close the speed of light and processing is accomplished in billionths of a
second. The speed at which a processor executes instructions is expressed in megahertz
(MHz) or gigahertz (GHz): 1MHz = 1 million electronic pulses per second and 1GHz = 1 billion
electronic pulses per second. A computer with a 1.2 GHz processor will thus be more
powerful and faster than a 600 MHz computer.
Keyboard devices
The keyboard is the most commonly used input device. Users enter data by pressing keys
(refer to 1.1). Keyboards come in a wide variety of shapes and sizes.
Pointing devices
Pointing devices control the movement of an on-screen symbol.
The standard mouse is a palm-sized pointing device. A mechanism, usually a ball, on
the bottom of the mouse senses its movement. Electronic circuits translate the mouse’s
movement into signals that are sent to the computer and used to direct the pointer.
Various actions can be performed by moving the pointer and then pressing one of the
buttons on top of the mouse (refer to 2.2).
A trackball is a pointing device similar to a mouse, but the ball appears on top of the
mouse.
A touch pad is a flat surface that controls the movements of the pointer by sensing the
motion of a finger on its exterior. It is mainly used in laptop computers.
A joystick uses the movement of a vertical stem to direct the pointer, and is mainly used
to play games.
A touch screen allows users to touch areas of the screen to enter data. These screens
have become popular for displaying information in big shopping malls.
A digitizer converts shapes from a drawing or photograph to digital impulses and
transmits them to a computer.
Terminals
Terminals consist of a keyboard and a screen and are connected to a network server (refer to
5.6).
Dumb terminals can only be used to transmit data to or receive data from a connected
computer, and have no independent processing capability.
___________
Theory - 4
Intelligent terminals have built-in processing capabilities.
Special-purpose terminals perform specific jobs and contain features uniquely designed
for use in a particular industry.
Primary memory
The primary memory is also known as internal memory, internal storage, main memory or
primary storage. A computer’s memory is used to store data temporarily while the computer is
switched on. The memory chip on the circuit board in the system unit performs this function.
Primary memory is classified as volatile memory, as everything in primary memory will be lost
when the computer is switched off.
___________
Theory - 5
Secondary memory
Secondary memory (storage) is used because of the fact that information is only being stored
temporarily in the primary storage unit. Secondary storage devices provide a means of
permanently storing information contained in temporary memory. This means information
remains intact even if the computer is switched off. The most common type of secondary
storage is the magnetic disk. The disk can be an internal hard disk that is housed within the
system unit, or an external diskette (stiffy). There are other modern secondary storage
devices available, e.g. CDs and flash memory sticks. The amount of data a storage unit can
hold is called the disk capacity. Disk capacity, like main memory, is measured in kilobytes
(KB), megabytes (MB) or gigabytes (GB).
Computer screens
Computer screens, also called monitors, are the display devices most often used to convey
text, graphics and video information. Information shown on a monitor is called a soft copy,
because the information exists electronically and is displayed temporarily while the device is
functioning. Monitors can be classified in the following categories:
Desktop monitors are the screens used with personal computers or terminals. These
are the CRT screens. An important feature of CRT screen is the way in which the image
is composed on the screen. Interlaced screens create images by the beams moving from
top to bottom on the screen and skipping every second row. This method can cause
flickering on the screen and may cause eyestrain. Non-interlaced screens create images
without skipping rows. This hardly causes any flickering, with very little eyestrain.
A portable monitor is known as a flat-panel monitor or liquid crystal display (LCD). Flat-
panel monitors are used for laptop computers, watches, calculators and electronic
devices. They are able to display both text and graphics. Passive-matrix monitors require
very little power, but the clarity of the images is not as sharp. Active-matrix monitors can
display more colours and images are displayed clearer. Active-matrix monitors are more
expensive and require more power than passive-matrix monitors.
Printers
The printout made by a printer is called a hard copy. The following are some of the most
important printers used with PCs.
A dot-matrix printer is an impact printer. Impact printers transfer characters to paper by
tapping the character with a little hammer against an ink ribbon. These printers can be
quite noisy. The speed of a dot-matrix printer is measured by the number of characters
per second (cps) it can print. The printer can print graphics but this is of a poorer quality
compared to that of laser printers.
___________
Theory - 6
Inkjet printers are known as non-impact printers because there is never any physical
contact between the typing element and the paper. Ink is sprayed from jet nozzles at a
high speed onto paper to form the characters. It has a high letter quality with the
advantage of printing in colour. The printer is reliable, noiseless and relatively cheap. An
Inkjet printer is slower than a laser printer with the printing quality slightly poorer.
A laser printer is a high-speed, high-quality non-impact printer. A laser printer creates
images using a laser beam and powdered ink, called toner, that is packed in a cartridge.
Laser printers can print text and graphics in a very high quality. Laser printers come in
different sizes and vary in printing quality and prices, e.g. Personal laser printers that are
relative cheap and are used in a small businesses and homes, shared laser printers that
are more larger and faster and used in larger businesses, and high-capacity laser printers
that are used with mainframe computers. These printers are very big and have an
outstanding print quality.
With the increasing use of portable computers there was a need for portable printers.
Portable printers are available that operate with batteries and weigh less than 3 kg.
In addition to the printers discussed, other printers have been developed for special
purposes, e.g. Photo printers that are designed to produce professional looking photo
quality pictures directly from a digital camera, and label printers that print on adhesive
labels.
Audio output
Audio output devices are those components of the computer that produces music, speech
and other sounds such as beeps. The computer speakers and headset are the most
commonly used output devices. By using a CD-Rom any music CD can be played on a
computer. In addition to playing music, there are Voice-output units that imitate the human
voice. Sounds are pre-recorded and saved in digital format. Voice-output applications can be
found in lifts, bus and airline terminals, warning systems and automatic tellers or banks. The
sound input and output of a typical multimedia computer consists of a sound card,
microphone and speakers. By using the correct software the user can “train” the computer to
recognise his voice and communicate certain words to him.
___________
Theory - 7
A very important aspect of system software, is the user interface, which determines how the
user interacts with the computer. A graphical user interface (GUI), one of the more common
user interfaces, combines text and graphics.
___________
Theory - 8
5.5 Application Software
___________
Theory - 9
Computer-Aided Design (CAD) software assists a user in creating a design for a
product or structure. Changes can be made to all or part of the design and the results
viewed instantly.
Multimedia authoring software allows you to create a presentation that can include text,
graphics, video, sound, and animation.
In a software suite, individual applications are packaged in the same box and sold for a
price that is significantly less than buying the applications individually. The packages are
modified to work better together and offer the same command and menu structures.
5.6 Connectivity
5.6.1 What is connectivity?
Communications, sometimes called data communications or telecommunications, refers to
the transmission of data and information between two or more computers using a
communications channel. Connectivity refers to the ability to connect a computer to other
computers, either temporarily of permanently. A computer’s ability to communicate with other
computers increases its input, processing, output, and storage capabilities. Communications
technology is necessary for electronic mail (e-mail), voice mail, facsimile (fax),
videoconferencing, groupware, electronic data interchange (EDI), global positioning systems
(GPSs) and Internet access.
Communication software
Communication software is used to transmit data from one computer to another.
A Web browser is a type of communications software designed to access and display
information that is organized into Web pages at Internet Web sites.
Electronic mail software, also called e-mail, allows users to send messages to and
receive messages from other computer users.
Transmission Media
Transmission media are the physical materials or other means used to establish a
communications channel. Two types of transmission media are physical cabling media and
wireless media.
Physical cabling includes twisted-pair, coaxial cable and fiber-optic cable. Twisted pair
cable consists of pairs of plastic-coated copper wires that are twisted together. Coaxial
cable is a high-quality communications line that consists of a copper wire conductor
surrounded by three layers: a nonconducting insulator, w woven metal outer conductor,
and a plastic outer coating. Fiber-optic cable uses smooth, hair-thin strands of glass or
plastic to transmit data as pulses of light.
Wireless media includes microwaves (high-frequency radio signals that are transmitted
over short distances from one microwave stations to another), and communications
satellites. Satellites orbit thousands of miles above the earth in space and are used to
relay microwaves between different microwave stations on earth that are far apart. Via
satellites it is possible to make communication possible any place on earth and the
transmission of large quantities of data is simplified. Many wireless devices that access
the Internet now use the WAP (Wireless Application Protocol), which is a standard set of
communications specifications for wireless media. Another modern wireless media is
Bluetooth. This is a radio frequency that is used by many portable devices short-range.
With Bluetooth, devices such as laptops, handheld computers, cellular phones, fax
___________
Theory - 10
machines and printers, can wirelessly communicate with each other, desktop computers,
a network and the Internet. To be able to use Bluetooth, each device must include a
transceiver chip. (There are many way s of connecting to the Internet – you should
investigate this field of possibilities further on your own.)
___________
Theory - 11
A Web search engine is a software programme that finds Web sites, Web pages, and
Internet files that match one or more keywords entered.
http://www.google.com
The domain code is usually an indication of the type of site you are about to access:
.com indicates that it is commercial;
.org indicates that it is an organisation;
.gov indicates that it is a government site;
.ac indicates that it is an academic institution;
.co indicates that it is a company.
Once the browser has connected and displayed the web site with information, you will
probably find hyperlinks on that site. When you click on a hyperlink (or link), it connects to
another web site (or document) that is stored on the very same computer or on a web server
somewhere in the world where it is connected to the Internet.
With more than 2 billion web pages and still more being added daily, the Internet is an
incredible collection of data. With so much information available, it can be extremely difficult
to locate the precise information you need. Fortunately there are search engines to help
overcome this problem.
Search engines are specialised programmes that assist you in locating information on the
Internet. To find information, you go to a search engine's web site and use it to locate
information. The most popular way to search information is to type in keywords and request
the search engine to find a list of web sites that contain the keywords.
Believe it or not - one of the biggest problems people have with search engines is that they
are so good! You can type in a word and within a fraction of a second you may have 20000
pages to scrutinize! Since most of those pages will not be exactly what you are looking for,
you may have to spend a load of time going through them one by one untill you find the
desired information.
Here are some tips to locate the information you need fast:
Start with the right approach. For general information (e.g. information about
entertainment, sport, etc.), use a direct search, i.e. search according to that particular
category. For specific information, use a key word search.
Be as precise as possible, i.e. use specific key words directly related to the topic.
Use multiple key words in one search.
Use Boolean operators such as "and", "not", "or". Use the Help-function to find out how
they should be applied in the specific search engine you are using.
Check your spelling!
Do not ‘surf’ too long before trying another approach. Look at the first page of search
results only. Then, if necessary, conduct another search using different key words.
Some search engines also has an advanced search option, such as the following one from
Google:
Using this advanced search option will definitely help narrow down the search.
Think of all the words that would always appear on the ‘perfect’ page. Add them to the
"with all of the words" field.
Consider all the possible distracting pages that might also turn up because one or more
of your search terms (key words) has multiple meanings. Which words may help you to
eliminate those pages? Add those words in the "without the words" field.
___________
Theory - 13
If you type a phrase into the "with the exact phrase" field, you'll be able to locate pages
in which those words appear in that specific order.
meridith@gmail.com
User name Domain name
When you receive an e-mail message, the message is placed in your “mailbox”, which is
actually a memory location on the computer of the ISP. The moment you log onto the
Internet and insert your password, the e-mail is transferred to your computer. (NB: It is
assumed that you have probably been familiarised with the use of e-mail during your
practical classes. The process is therefore not described step-by-step.)
Mailing lists allow members to communicate by sending messages to a list addres.
Each message is then copied and sent via e-mail to every member of the mailing list. To
participate in a mailing list, you must first subscribe by sending an e-mail request to the
mailing list subscription address.
Unlike mailing lists, newsgroups use a special network of computers called UseNet.
Each of these computers maintains the newsgroup listing. There are more than 10000
different newsgroups organised into major topic areas. You can send contributions to a
particular newsgroup, but unlike mailing lists, the message is not sent to all the
subscribers. Subscribers check contributions to a particular newsgroup, reading only
those of interest. One way of accessing newsgroups is through Google Groups.
___________
Theory - 14
Chatgroups (chatrooms) allow you to have real-time, online (typed) conversations with
people connected to the same chatroom that you are. The message you type is
immediately displayed to everyone in the chatroom and anyone can respond to it.
Instant Messaging (IM) is an extension of e-mail that allows people to contact each other
via direct, live communication – more in the style of chatting, and better than waiting for
an e-mail to arrive. You specify a list of friends and register with an instant messaging
server. Whenever you connect to the Internet, the software notifies your friends (already
online) and you can start communicating. IM can be used on desktop or laptop computers
as well as on wireless devices such as handheld computers and cell phones.
Webcams are cameras installed at a certain position from where it transmits live images
to a web server. A webcam is a digital camera that transmits the images to a computer,
while software downloads the images from the camera at fixed intervals. People can then
access the web site and view the current or latest images. You are in fact "visiting" a
destination on-line. In South Africa, webcams have, for example, been installed in zoos,
some city centres, the top of Table Mountain, and others. (See
http://www.kapstadt.de/livecam.htm)
Video conferencing involves using video and computer technology to conduct an on-line
meeting between participants at two or more geographically separate locations.
Participants can both see and hear one another. A videoconference can
be set up in different ways. The ideal set-up is where each participant (or point of
communication) has a computer with microphones and speakers, a video camera and
software and communications devices. Videoconferencing is particularly popular with and
suitable for firms lending technical support to clients, distance learning institutions, job
recruiting interviews and telecommuting.
Internet broadcasts (or webcast) is similar to a television programme broadcast,
although it is specifically designed for Internet transmission. To be effective, it demands a
very fast Internet connection with high bandwidth.
Podcasting refers to the practice of publishing audio or video files on the Internet for
downloading by Internet-users. The initial idea was for these files to be downloaded onto
the iPod only. However, some sound files are now saved in .mp3 or.aac format, and video
files in .mpg format, making it possible to use them on almost any computer.
VoIP stands for Voice over Internet Protocol. This technology enables people to make
telephone calls via the Internet by transmitting voice in the same way data is transmitted.
You can speak to anyone anywhere in the world at a very low cost, while still using your
Internet connection for accessing web sites or sending e-mails. You may even be
connected to a number of people at the same time, using conference call technology.
Most VoIP applications can be used with a simple microphone and computer speakers,
but to provide an experience identical to normal calling, IP telephones or Bluetooth
headsets can be used. You also need a high speed broadband Internet connection and
software. Skype is one of the most popular software packages that facilitates VoIP.
Skype even allows you to make a video call if you have a webcam attached to your
computer.
A blog (web log) is a web site where entries are written in chronological order and
commonly displayed in reverse chronological order Many blogs provide commentary or
news on a particular subject; others function as more personal on-line diaries. A typical
blog combines text, images and links to other blogs, web pages as well as other media
related to its topic. An important part of many blogs is readers’ ability to leave comments
in an interactive format. Technorati is a search engine tracking blogs. You can have a
hands-on experience of blogs by visiting http://www.Technorati.com.
Fax to e-mail is a communication method where you send a fax to someone's e-mail
address. It is made possible by an Internet connection.
___________
Theory - 15
The Internet used for e-commerce
E-commerce refers to business transactions taking place via the Internet. The most popular
applications of e-commerce are the following:
Online shopping includes the buying and selling of a wide range of consumer goods
over the Internet. There are literally thousands of sites where you can shop on-line. These
web sites serve as "virtual stores" for shoppers to visit, inspect the merchandise and
make a purchase.
Online stock trading (e-trading) allows investors to research, buy and sell stocks and
bonds over the Internet.
Online banking is becoming a standard feature of banking institutions. Customers are
able to do a variety of banking transactions on-line via the Internet.
Auction house sites sell a wide range of merchandise directly to bidders. These sites
operate similar to a traditional auction, and bargain prices are not uncommon.
Person-to-person auction sites resemble flea markets. The owner of the site provides a
forum for numerous buyers and sellers to meet. While the owners of these sites typically
facilitate the bidding process, they are not involved in completing transactions or in
clarifying the authenticity of the goods.
NB: Netiquette
Netiquette (short for Internet etiquette) is not a security matter, but a matter of ethics. It is the
code of conduct expected of individuals when working on the Internet. The most important
netiquette rules are:
Treat others as you would like them to treat you.
Keep your messages brief.
Use good grammar and correct spelling.
Do not be sarcastic.
Be polite and do not use offensive language.
Avoid sending Spam (Internet junk mail).
Do not use all capital letters, as this is seen as SHOUTING.
___________
Theory - 16
5.7 Safety and health issues
5.7.1 What is computer security?
Security indicates the protection of software, hardware and information.
Physical security
Physical security has to do with protecting hardware against any form of human or natural
disasters.
One way of enforcing computer security is by restricting access, i.e. ensuring that only
authorised people enter the computer rooms or by using passwords to limit access to
certain data in a computer.
Large organisations should be aware that the functioning of the computer systems could
be interrupted by a number of disasters. A disaster recovery plan that can be followed in
such circumstances, should be in place.
Making backups is the process of duplicating computer information on alternative
secondary memory and keeping it safe in case the original information is damaged or lost.
Data security
Data security has to do with protecting data and software against possible damage. Computer
viruses have become a serious problem and threat to data security. A virus programme is
developed with the aim to destroy data and make a computer non-functional. It is mainly
introduced into executable programmes. All .COM and .EXE programmes and application
programme files, are targets for viruses. The increased use of networks, the Internet and e-
mail has accelerated the spread of computer viruses. A dangerous feature of viruses is that
they can replicate themselves and copy themselves from one disk to another disk. The
computer virus reproduces itself, as does a normal disease virus. A virus can be malicious
and very harmful in its action. It can delete files containing valuable data. However, it can also
be non-malicious and simply display irritating messages or signs on the computer screen,
which are harmless. No loss of data will occur. There are literally thousands of viruses and
unfortunately no completely effective methods exist to ensure that a computer or network is
safe from computer viruses. The following are just a few hints to prevent virus infection:
Install an anti-virus programme on the hard disk and obtain regular updates for all the new
viruses. The anti-virus software checks the memory and every possible source of
information on the hard disk. It stays memory resident and keeps searching for viruses as
new disks are inserted. It destroys viruses found. The programmes are constantly revised
and updated to keep up with the latest viruses.
Avoid downloading software from bulletin board systems, computer games, various new
utility programmes, and the use of illegitimate copies of software from friends.
Never open an e-mail from a strange, unknown source.
Where possible, write-protect all diskettes and before using a diskette, use an anti-virus
scan programme.
Never start your computer with a diskette in drive A (it is very easy to forget a diskette in
your disk drive). During the start-up process the computer attempts to execute the boot
sector on the disk in drive A. Even if the attempt is unsuccessful, any virus on the diskette
can infect the computer.
Avoid sharing diskettes on computers and networks, for example a diskette that has been
used at home and then at work.
Compare diskettes after identical copies have been made and compare files after copying.
The differences in file capacity must be checked.
Make regular backups from the hard disk and diskettes and keep them in a safe place.
Check all software for viruses before installation on the hard disk.
___________
Theory - 17
5.7.2 What is information privacy
Ethics are standards for moral conduct. Computer ethics provide guidelines for the moral use
of computers. The most important aspect of computer ethics today is concerned with the
privacy of data.
Computer-based record keeping can offer a great opportunity for the invasion of an
individual’s privacy. For example credit-card users unknowingly leave a “trail” of activities
and interests that, when examined and evaluated, can provide a quite accurate profile of
the person. It is known that telephone companies keep records of every phone call made,
doctors keep medical records of patients, credit organisations have their own records and
even supermarkets keep record of who buys what.
Personal information has become the product of a growing industry. Companies have
been formed that do nothing else but sell information about people. The people involved
are not asked for permission to use their data, they are not even informed that their
personal information has been sold. These days “information hawkers” collect data and
sell it to organisations for market research, charity organisations (who use it for fund
raising projects), state institutions or anyone who requires certain information. The use of
personal information for profit has grown so rapidly that the government has not been
able to keep up with the abuses. Antiquated laws, combined with judicial unfamiliarity with
computers make policing and prosecuting abuses of privacy of personal information
difficult and in some cases impossible. The privacy laws are not enough to ensure privacy
and therefore it is mainly a matter of ethics.
___________
Theory - 18
access to the wider Internet, a firewall is installed to prevent outsiders from accessing
the private data resources on the intranet.
A firewall is often installed in a specially designated computer separate from the rest
of the network so as to ensure that no incoming request can get directly to the
network resources. The firewall basically checks every request from outside, decides
whether to grant access, and alerts the user to any suspicious requests.
If you are an employee and have rights to access the network from outside, the
firewall allows remote access to the private network by making use of secure logon
procedures and authentication certificates.
A personal firewall is a software application used to protect a single Internet-
connected computer from intruders. Personal firewall protection is especially useful
for users with "always-on" connections such as ADSL. Often compared to anti-virus
applications, personal firewalls work in the background to protect the integrity of the
system by controlling Internet connections to and from a user's computer, filtering
inbound and outbound traffic and alerting the user to attempted intrusions.
Pop-up windows are not perceived to be such a high security risk, but they can be
irritating. These are windows from unwanted sites that keep on opening (popping up)
while you are busy working on a specific site. To prevent pop-ups from spoiling your
Internet-experience, you can set your browser to block pop-ups.
Unfortunately there are many Internet sites that contain harmful information/
graphics/video material. To help protect yourself and children from viewing
inappropriate material, consider the following suggestions:
Place the computer in a general area where children can be easily supervised.
Discuss browsing with young children to explain what types of content you consider
to be appropriate. Create a specific agreement and limit the amount of time the child
spends on the Internet.
Spend time with children on the Internet. Visit sites with interesting facts and create a
shared e-mail account.
Use a filter program and/or investigate your browser’s filtering capabilities. Recent
versions of Internet Explorer, for example, include a Content Advisor programme.
Check up on young children’s Web activities evaluating the Web pages they visited.
The following are general tips to protect your privacy while working on the Internet:
Encrypt or code sensitive e-mail using special encryption programmes.
Shield your identity by using an anonymous remailer or special web site that forwards
your e-mail without disclosing your identity.
Use your browser or cookie-cutter programme to block unwanted cookies.
Use spy removal programs to check for web bugs and computer monitoring software.
Instruct your service provider not to sell your personal information.
Be careful! Never disclose your telephone number, password, or other private
information to strangers.
On-line banking is also a major concern with regard to Internet security. Different banks
use a combination of methods to ensure that their customers are safe. An example of
such a method is the following notice that appeared on ABSA's log-in web page:
___________
Theory - 20
Important Notice
What is “spoofing”?
“Spoofing” is a practice that fraudsters undertake to lure you to a look-alike website, with the express purpose
of defrauding you. With a few checks, it is easy to establish whether you are on the correct website.
Before you proceed with the logon verify that the SurePhrase you captured is displayed. It is always good
Information
practiceon security
to change is SurePhrase
your constantlyoften.
updated and customers should familiarise themselves
with all the security tips provided by the bank.
___________
Theory - 21
5.7.4 Do computers have an impact on our physical health?
Ergonomics is the study of the human factor in a computer environment. The latest trend is to
change the working conditions to suit the worker rather than forcing the worker to adapt to a
certain environment. Spending long hours in front of a computer, using inappropriate furniture
can lead to headache, backaches, eyestrain and other physical problems. Specialists in the
field of ergonomics suggest the following:
Eyestrain and headache can be avoided by having a 15 minute break every one to two
hours, avoiding flickering monitors, keeping computers away from windows that can
cause a reflection on the monitor or by using screen filters. All focus areas such as the
screen, keyboard and source document must be the same distance away from the user’s
eyes.
Back and neck aches can be avoided by using equipment that is adjustable. Chairs
must support the back, the screen must be able to tilt and the height of the table and
document stands must be adjustable.
The effects of electromagnetic fields generated by computers can harm the human
body. Some experts even indicated that there is a connection between the emissions and
certain types of cancer. It is suggested that users do not work closer than 0.75m from the
screen. Users should also not work within a 1m span from another computer because the
strongest fields are emitted from the sides and backs of computers. The use of low
radiation monitors can limit the exposure of users to radiation.
Repetitive strain injury is experienced by data typists who sometimes strike up to 23
000 keystrokes per day. Repetitive strain injury is the name given to a number of injuries
such as neck, wrist and arm pains that result from fast, repetitive actions in the same
position. New keyboards were designed with the aim of preventing pain caused by strain.
As a computer end-user, you are encouraged to do investigate how computers are used in
different walks of life. This information can be found by merely observing the world around
you, enquiring about, searching the Internet, etc.
Make this your goal, not only to use the computer in your own little world, but to explore how
this mighty tool is used in all walks of life.
___________
Theory - 22
Index to Chapter 5: Theory
Application software .........................1, 7, 9 Mini-computers ........................................ 3
Blog ......................................................... 15 Monitors ................................... 6, 8, 18, 22
Cad ......................................................... 10 Mouse ................................................ 4, 18
Chatgroups ............................................. 15 Netiquette ............................................... 16
Communication .................7, 10, 14, 15, 19 On-line ....................................... 15, 16, 20
Communication .................................10, 14 Operating system ................................. 7, 8
Cpu ...................................................1, 5, 8 Output .................................... 1, 6, 7, 8, 10
Data .......................................................... 3 Personal computers ................................. 3
Digitizer ..................................................... 4 Printers ..................................................... 6
E-commerce .....................................16, 20 Ram ......................................................... 6
E-mail ...................................................... 14 Rom ......................................................... 6
Fax .......................................................... 15 Safety ..................................................... 17
Firewall .............................................18, 19 Scanner .................................................... 4
General concepts...................................... 1 Screens .................................................... 6
Gigabyte ................................................... 3 Search engine ............................ 12, 13, 15
Hardware .................................................. 3 Security ................ 8, 16, 17, 18, 19, 20, 21
Health ...............................................17, 22 Security ................................ 17, 18, 19, 20
Input devices......................................... 4, 5 Software ........................................... 1, 3, 9
Internet10, 11, 12, 14, 15, 16, 17, 18, 19, Super-computers ..................................... 3
20, 22 System software .............................. 1, 7, 8
Intranet .................................................... 18 Terminals ................................................. 4
Joystick ..................................................... 4 Touch screen ........................................... 4
Keyboard .................................................. 4 Transmission media ............................... 10
Kilobyte ..................................................... 3 Wan ........................................................ 11
Lan .......................................................... 11 Website .................................................. 11
Mainframe computers ............................... 3 Www ...................................................... 11
Megabyte .................................................. 3
Memory ........................ 1, 5, 6, 7, 8, 14, 17
___________
Theory - 23