ICT Module
ICT Module
ICT Module
MANAGEMENT BOARD
- Sharing text, photos, slides, videos, and other data electronically within the
organization resulting in reduced usage of paper.
- Locate and buy parts and materials from domestic and international suppliers
- Electronic mail enables staff to create, send and read written messages entirely on
the computer.
- News Groups
Consisting of posted messages and responses on a particular subject, usernet news
groups differ from discussion mailing lists in two ways:
1. Messages are posted at the news group site which must be accessed by using a
news reader program.
2. Messages posted to a news group can be viewed by anyone. A news group can
be thought of as a place that is visited to read posted messages whereas a
discussion mailing list delivers posted messages to a group member.
- Video Conferencing
More companies are using online videoconferencing to replace face to face
meetings with colleagues, customers and suppliers. This reduces costs that are
associated with meetings such as travel expenses, accommodation cost etc.
- Telnet
This class of internet application program allows staff to communicate with other
computers on remote network even if they are not a permanent part of that
network, e.g, staff would use telnet to access the country`s electronic library
catalogue from their computers.
- Internet Telephony
Staff can converse vocally over the web using internet telephony. Using this
facility is much cheaper than calling over the standard phone lines. It can also be
more efficient allowing an organization to accommodate more users on a single
line at once,
- File Transfers
An internet service known as file transfer protocol [ftp] enables staff to down load
files [transfer data from a server to their computers] and up load files [transfer
data from their computers to another system].
CHAPTER TWO
COMPUTER HARDWARE
These are physical components that are attached to the computer. They are also
known as peripherals. These include the following:
- Input Devices
These comprise keyboards, mouse, printers, screens or monitors, disk and tape
drives which are used to input data into computer systems.
1. Control Unit
The function of the control unit is to fetch and execute programming
instructions and loads them with associated data into the random
access memory (RAM). If a computation is required, it instructs the
ALU to perform the action and receives the results and places or
outputs them to the correct registers. All operations of the computer
are under the control of this unit.
- Mother Board
This is a circuit board which links all other chips of the computer. All chips
containing circuitry that controls the computer and computer memory chips
are found on the system board. Any expansion boards that are installed in the
computer are fitted into expansion slots which hold the boards in place. The
slots also give the boards an electronic link to the mother board. Although
chips are put together on one circuit board each IC chip performs its own
functions.
- Output Devices
These output information in hard copy and soft copy. Hardware devices that
output information in hard copy include printers, plotters and computer output
on microfilm (COM) while screens output information in soft copy. Other
output devices include speakers.
- Storage Devices
These include hard disks drives, disk drives and tape drives. These offer
permanent storage facilities and are back-ups for RAM.
Advantages of Computers
- Allows the user to create documents, edit, print and store them so that they
can be retrieved later.
Disadvantages of Computers
- Computers can make the mind lazy as they do not encourage reading
books or researching
- Staff may access sites which contain pornographic material and this may
lead to sexual harassment at work places
- Computers create unemployment as many jobs originally performed
manually are done by computers
- Spyware can access vital information and transmit it to its server resulting
in loss of confidentiality
- Computers can cause health risks such as repetitive strain injury, eye
strain, back and neck injuries, impotence due to radiation and physical
injury due to electrocution and lifting heavy loads.
CHAPTER THREE
SOFTWARE
This is a set of instructions that enables computers to carry out operations. The
two most common types of software are systems software and application
software packages.
1. Systems Software
These integrate a computer`s various capabilities but are not applied
directly in the performance of tasks that benefit the user. Operating
systems are an example of systems software.
Among the most well known systems software is the OS, device drivers,
the basic input and output system (BIOS) and system utilities like
language compilers.
Functions of the OS
1. Communication
Accepting user and operator communications. A program runs in the
background to listen for user commands such a request to load a
program into memory.
2. Program Loading
The OS can invoke loaders and linkers from program libraries which it
uses to place an application into memory.
5. Peripheral Control
A set of routines is included which provides the code for controlling
peripherals such as keyboard, screens, printers, mouse etc.
6. Multi-programming
The OS enables multiple user programs to simultaneously. It does this
by:
Preventing programs that fail from crashing the entire system. This
is achieved by ensuring that a program cannot write to memory
outside of that which it has been allocated and certainly not in the
system memory which is allocated to the OS and supervisor
programs like itself.
Windows
These are areas on the screen that hold all the information about programs
stored or running on the system. The size of the windows can be varied from
tiny to filling up the whole screen of the area. When the system is multi –
tasking, a series of windows can be opened at the same time allowing the
user to move from window to another while working on different
applications.
Icons
These are symbols or images in the WIMP system to represent different
processes or items, e.g, printer image to command the printer to print.
Menus
Software and system programs can all have drop-down or pull-down menus.
These contain options from which a user may select one appropriate to the
task such as saving or opening a file.
Pointers
When a user moves the mouse over the mouse mat or flat work surface, a
pointer on the screen moves accordingly. When an icon or menu item is
touched with the pointer, the item may be selected using the mouse. Some
have one, others have two while others have three. The choice of the button,
the number of clicks and the combination of menu and pointer location
allow a wide range of tasks to be carried out.
Utility Programs
These perform routine data processing tasks. Among the most common are:
4. Editor
A utility which allows text files to be created and maintained.
5. Translating Programs
These translate user programs into machine code. There are three types and
these are Assemblers, Compilers and Interpreters.
All application packages depend on the processing of data but can be sub-divided into
three groups:
- Commercial
The computer performs administrative data processing tasks including the
maintenance of accounting records. This involves large volumes of data and large
files. The main input peripheral is a keyboard possibly combined with some form
of data capture equipment. Large scale storage devices with rapid access are
needed for file handling.
- Scientific
For carrying out complex statistical analysis or mathematical manipulation of
data. Relatively small volumes of data may be involved.
- Process Control
The computer runs a machine or even a whole factory on the basis of data
supplied from the process itself via special sensors and data transmission systems.
Examples range from individual robots to entire steel works, including automated
decision making processes to optimize the use of raw materials or other resources.
Windows are menu driven so the user has to select menu options to use their
facilities. In contrast, DOS is command driven so the user has to learn a number
of commands to use the software.
2. They often provide on-screen context sensitive help facilities. This means that at a
press of a key (F1 function key), a screen of text appears which provides
supplementary or explanatory information on the option selected or current task.
3. When using application packages, they generally contain the necessary routines to
save, load and print files. These facilities can be invoked by either typing a
command or selecting a menu option.
4. Modern packages are heavily user oriented i.e they incorporate tools and features
designed to produce the best user interface.
Integrated Packages
Some programs or packages of programs can perform more than one task e.g office
administration packages that comprise word processing, spreadsheets, database and
business graphics. These are called integrated packages because they bring these
varied tasks together. Examples include Microsoft Office and Claris Works.
Advantages
1. Compatibility between the separate modules which enables material created in
different module to be copied to another module.
3. Use friendly – There is only one set of menus to learn as they have the same
menus in each of the modules.
Disadvantages
1. The memory size required might be more than that required by a dedicated
package.
2. The modules contain in the package may not have as many features as in
dedicated application package
3. There may be more modules contained in it than those required by the user.
4. Document Checking
A dictionary and Thesaurus are standard facilities in most word processing
packages. Documents and letters can therefore be quickly checked for typographical
errors. Word count facility is also available so that the length of the documents can be
checked to see if is on target or needs to be amended.
5. Document Printing
Word processors generally provide a number of print options, including choice of
fonts and line spacing, the ability to justify the text and the facility of headers and
footers to add chapter headings or page numbers to the document.
3. Reports used in consultancy work, which may incorporate graphs, charts etc.
DTP integrates graphics, photographs and text on the same page. The package will
consist of:
1. A graphs application which can produce a wide range of pictorial representation
including bar charts, pie carts, time series, hierarchy charts and scatter charts.
2. A page layout application which enables the user to divide the page into many
columns.
When combined, the result is a typeset quality publication which may be used for
reports, presentations or more sophisticated production of computer aided design
(CAD) drawings.
- Graphics Applications.
In graphic design for publication, art is everything other text, lines, drawings,
company logos and photographs,
2. Charting and graphing – creating bar charts, graphs and word charts
4. Desktop publishing – which brings together text and graphics for outputting to a
high quality printer.
A variety of painting tools are provided with the software. Free hand pictures can be
drawn on the screen, using lines of varying widths and colours. They can then be
fitted in or painted using selected colours and patterns from an on screen pallete.
Examples of graphics software include Ms Power point.
- Some packages allow easy links with other types of software such as spreadsheets
and word processors.
- Some packages can be used via networks with associated security procedures.
3. Spreadsheets
This is a type of software package used extensively in modeling. It is so named
after its likeness to a sheet of paper divided into rows and columns. Well known
spreadsheets include lotus 1-2-3, Ms Excel, Supercalc and Quatro.
A spreadsheet is a matrix of rows and columns. Each cell in the spreadsheet ids
identified by being given a unique row and column identification. An individual
piece of information can be entered into a specific cell. A cell entry can consists
of a number (or value), or a word (label), or formular.
During the course of the project, data in the computer is kept up to date by keying
in the date when each activity is completed. This helps management control the
project by highlighting the effects of slippage and indicating the critical activities
to watch.
Project planning software includes Ms Project 2000 and Havard Total Project
Management (HTPM).
1. Off-Shelf Packages
Organisations have a great deal in common with one another – the core data
processing activities are likely to very similar from one company to another. The
basic accounting functions, for example, apply to a large majority of business.
Many applications are served by packages which can be obtained” off-shelf.”
Advantages
- They are generally cheaper to buy than bespoke packages are to develop
- Any system bugs should have been discovered by other users and eliminated
- Packages are likely to come with good training manuals and user manuals
- New updated versions of the software are likely to be available on regular basis
- The experience of a great number of users with similar needs to those in the
organization has been incorporated into the design of the package.
Disadvantages
- They do not fit precisely the needs of the organization. Users may need to compromise
what they want with what is available
- The organization is dependent upon an outside supplier for the maintenance of the
software. Many software suppliers are larger than most of their customers and are
therefore difficult to influence
- Different packages used by the organization may have incompatible data structures.
Bespoke Software
These systems are designed to fit specific needs of the organization. They may be
produced in-house or commissioned from an outside software company.
Advantages
- They precisely fit the organization’s information needs
- The system can be integrated with other applications within the organization
- If the programmes are of interest to other organizations, they can be sold or licensed.
The information services group can thus become a profit centre.
Disadvantages
- Development takes a long time, which delays the implementation of the system.
- There is a greater probability of bugs in a bespoke system. Most of the errors in the
packages will have to be found by other users
- Support of the bespoke system will be expensive. One has to bear all the costs.
CHAPTER FOUR
These are hardware components that facilitate the capture of data into computer systems
through standard input ports.
1. Keyboard
This is used for normal manual capture of data into computer systems.
Advantages
- The person keying in data can be in a remote location away from the computer
itself. Data can be transmitted via a communication link.
- The person keying in data can check for errors on the screen
Disadvantages
- It is unsuitable for large volumes of data as keying in data manually takes
time.
2. Mouse
This can be used to highlight a block of text which can then be copied, moved,
deleted or subjected to other editing functions. When used with appropriate
software, it can be used as a drawing tool in computer aided design (CAD).
3. Barcode Readers
Electronic point of sale (EPOS) take advantage of bar codes. Data can be recorded
in binary on documents, paper or plastic using a bar code of alternating lines and
spaces. A bar code reader reads the data that is stored in the bar codes and sends
the data to the computer for processing. The computer then provides the price of
the item purchased (from the price file) and this is then output to the cashier’s
check-out point. The cost of purchases is calculated and the customer sees what is
payable on a small display screen and receives a printed receipt for the purchased
goods. Bar codes are often used in electronic point of sale devices. Data relating
to the transaction would be captured by the device and recorded on sales file and
stock file as it occurred.
Advantages
- Stationery is saved as paper and ink that was to be used for printing price tags would be
saved. The saved money can be used for other ventures that can boost business.
- Quick service because as long as the total quantity of items is known, the items can go
straight to the shelves and customers can access goods as soon as they come. Speed of
transactions is also enhanced.
- Reduction in labour since items are not priced individually. Pricing items individually
would attract a large labour force. With the use of bar codes such a large labour force
would not be necessary. This would result in savings for the store which could be
channeled back into business.
- Where prices are continually changing, this could lead to enormous use of stationer
needed top print new price tags. This would also mean employing extra labour to cope
with the job of repricing the individual items. The end result is that a lot of money will
be spent on stationer and labour.
- Easy monitoring of sales and stock levels as these are updated with every transaction.
Disadvantages
- Creates unemployment as less labour will be required
The customer inserts a card into a machine that identifies the account number and
other details. The computer in the shop will then enquire electronically from
banks account of the customer whether funds are available to pay for the goods.
The shop’s account will be credited by the same amount that the goods bought
cost. All this occurred at the point of sale where goods were sold (point of sale)
as such this is called Electronic Funds Transfer at Point of sale (EFTPOS).
When choices have been marked, the form is then fed into an optical mark reader.
This device will then sense the boxes which have been marked and translates
these into machine code. These codes are sent to computer for processing. This is
the method used for marking Grade VII examinations. OMR documents are an
example of turn-around documents.
Advantages
- Computers can produce pre-printed OCR documents which can later be read by
computers. This is cheaper since no special equipment is needed.
- OCR equipment can on-line to the computer but often data is written to magnetic tape
off-line for faster input, especially to mainframe
Disadvantages
- OCR document must treated with care so that characters still remain readable
- Print quality may be crucial since unclear documents may distort data.
Advantages
- The data can be read by human beings and so enabling visual inspections of documents
Disadvantages
- Printing MICR documents requires special equipment
- The quality of print is important and the amount of ink in a character is crucial.
6. Scanner
These can be used to input data into a computer system. Flat bed scanners have a
clear glass plate under which is a light source and the recording unit on a moving
arm. The scanning arm moves along under the glass plate and the bright light
allows the light sensitive devices on the arm to pick up colours on a line by line
basis from the image that is being scanned. The resolution of a scanner, expressed
as dots per inch (dpi), is different on some scanners. Scanners can also be
handheld or drum scanners but the resolution obtained from these is not as good.
7. Digital Camera
These are used in exactly the same way as an ordinary camera. The difference is
in how the pictures are stored. Images are stored in digital form, the same way as
data is stored in a computer. Images can transferred from the camera to computer
via a link cable. Once pictures are transferred into a computer, they can be
enlarged or a text can be added.
OUTPUT DEVICES
1. Printers
These are devices that produce printed images on paper. The image to be
printed is received in form of signals from the controlling device, usually
the central processing unit. Printers can either be impact printers or non-
impact printers.
Impact Printers
In the case of impact printers, the signals from the CPU activate print
elements which are pressed against the paper through the printer ribbon, to
produce the required image.
Advantages
They offer the advantage of producing carbon copies
They are cheaper than non-impact printers
They may not require special printing paper but just ordinary paper
Disadvantages
Since they are electromechanical, they may slow in operation
They may not offer high resolution (good quality print) offered by
non-impact printers
Owing to many moving parts, they may not be as reliable as non-
impact printers.
They make noise when in operation
Non-Impact Printer
Non-impact printers do not require any impact on paper. The inkjet
printer, for example, simply injects ink onto the paper to produce the
required image.
Advantages
Since they are not electromechanical, they are much faster than
impact printers.
Since they have fewer moving parts, they are more reliable
Disadvantages
They may be expensive
Due to lack of impact on paper, they cannot produce carbon copies
Some non-impact printers may require special printing paper
which might be expensive to acquire
They print quietly
2. Plotters
These are suitable for computer aided design (CAD) jobs since they are
designed specifically to handle sophisticated graphical output. A plotter
produces high quality drawings rather than printed output. Plotters work
on a co-ordinate principle where drawing movements are executed by pen.
All movements are control of the software.
The two types of plotters are drum plotters and flatbed plotters.
Drum Plotters
This plots on paper that is fixed to a drum. While the drum revolves back
and forth, a bar suspended above the drum and holding a drawing pen
moves from side to side and so plots the drawing.
Flatbed Plotter
This is stationary so that only the pen moves up and down the paper thus
plotting the drawing.
While the flatbed plotter can plot larger drawings, the drum plotter can
plot longer drawings because it uses continuous paper. The flatbed plotter
would be more suitable for producing the CAD drawing on an A3 paper.
3. Screens
These display information in soft copy. Information can be transmitted to
other users where it is displayed on the screen. Soft copies can easily be
edited i.e moved or copied to another section of the document or deleted.
4. Speakers
These can produce sound from computer systems. To achieve this,
computers should have speakers connected to them.
CHAPTER SIX
These are hardware devices that are used to store data and information in computer
systems. They include the following devices:
Hard Disk
These offer direct internal access to data. A business PC has an internal hard disk
which may have a capacity of over 40 Gigabytes.
Floppy Disk
This is a removable storage medium. The floppy disk provides a cost-effective means
of on-line storage for volumes of data and information. A 3.5” disk can hold up 1.44
Mb of data. The disk is covered in a jacket for protection against dust and
mishandling.
Zip Disk
This is a different type of removable disk with much larger capacity (100Mb) that
requires a special zip drive. It is suitable for back-ups or for moving files between
computers. Files are zipped so that they are compressed into a logically smaller file.
To open zipped files, these files must be unzipped using software such as Winzip or
PKzip. The extracted files will then show their file extensions and may be opened by
using the appropriate software.
Flash Disk
This is stick that can be slotted into the universal serial bus (USB) port for the storage
of large volumes of data and information. They have a higher storage capacity and are
portable. They are enclosed in a protective casing. It is suitable for moving files
between computers.
Compact Disks
These can store 650 Mb of data. They can be used to transfer data between
computers. Recorders are now available for general business use with blank CDs
(CD – R) and rewritable disks(CD = RW)
Disadvantages
- They can easily be damaged
- They are susceptible to viruses since they are used to transfer data between
computers
- Data is accessed at lower speed as they are electromechanical
- They can be stolen leading to loss of information and confidentiality
- Information can be accessed by unauthorized people leading to loss of
confidentiality.
CHAPTER SEVEN
COMPUTER NETWORKS
This is a connection of computers to enable people share information electronically.
A network is a means of linking together a series of personal computers, sharing disks
or having a communication link.
1. Bus Topology
In this topology, every device has one connection on a common link. One host or
station sends a signal in both directions on the single transmission segment. All
machines receive the communication but detect whether the message is theirs and
ignore it if not. Bus technologies suffer from collisions. To deal with this, they
must employ collision detection arbitration technology such as Carrier Sense
Multiple Access with Collision Detection
A weakness of the bus topology is that a break in the topology divides the
network into two. No communication is possible between the two segments.
2. Ring Topology
In this topology, each host is connected to the other hosts and can communicate in
each direction. Ring topologies are more reliant than bus topology because if a
host is down, the remaining hosts can reach each other in the opposite direction.
Ring networks are less popular though and are associated with older networks that
used the IBM Token ring protocol
Access protocol used by networks with ring or bus topology is based on a token
ring being passed from station to station. The token ring goes around the system
until it arrives at a station with data to transmit. The station catches the token and
holds it until its message has been sent and received then puts the token back into
circulation.
A weakness of the ring networks is that they are expensive to build. Two sets of
wiring must be installed (one in each direction) for the same number of hosts with
no particular advantage since transmission is only in one direction with the other
coming into use when there is a failure.
3. Star Topology
This is the most common in use. In this configuration, every host is connected to a
single host at the centre of the star or hub e.g every machine is connected to the
file server. All communication passes through the hub and this allows all
machines to talk at the same time. However, the hub is a weak point because if it
fails, the entire network is paralysed.
A network system will have a file server, (a separate processor or a station running a
program which manages the network and controls the use of the file store and other
peripherals. Often, file servers and file stores are combined as one unit.
The individual micros connected to the network which do not have any role in
managing the system are sometimes referred to as either work stations, client stations
or slave stations.
The wiring used for the network can be coaxial cable (screened wire as used for
television aerials), twisted pair (two insulated wires as used for non-earthed electrical
appliances, flat ribbon cable (several; strands side by side) or fibre optic cable (which
carries signals as light pulses).
Bridge and Gateway
A bridge is used to connect together, usually, similar local networks and a Gateway is
used can be used to link a network to an outside device or service, which could be
another local network, the telephone system or another service.
Advantages of Networks
- Can be used to share information electronically
- Application programs can be held by one station and accessed directly by anyn
user on the network.
- System software such as operating systems can be installed on one station and
used by the entire network.
- Enable sharing of hardware such as printers among many users
- Enables access to various information held on a network.
Disadvantages of Networks
- Expensive to implement
- Data may be accessed by unauthorized persons
- Viruses may be introduced in the network via attachments to e-mail
- Require extensive security measures
Types of Networks
1. Intranets
This is a private computer network that uses TCP/Ip as the protocol for
connectivity and the public telecommunication system to securely share part of an
organisation’s information or operations with its employees.
The same concepts and technologies of the internet such as clients and servers
running on the internet are used to build an intranet. To build an intranet, the
organization will set up the following:
- A web server or group of servers that will host the intranet applications.
- Provide access to the web using TCP/Ip network. For most firms, this means
having a LAN using Ethernet.
- Installing the user programs on all required computers (usually a browser and for
some applications JAVA or Active X capability)
- Finally, create a home page in HTML for the system and web pages for all the
applications and information that all users will access.
Uses of Intranets
- Document Sharing
So that every employee has common access to information such as expense claim
forms, holiday forms etc
- Roaming Access
Like web-based mail, so that employees can read their mail from any location in
the world.
- Data Entry
So that salesmen on the road can access the intranet to pick up useful information
such as current prices or generate new orders from whatever location so long as
they can access the intranet
Advantages Of Intranets
- Workforce Productivity
Intranets can help employees to quickly find and view information and
applications relevant to their roles and responsibilities. Through simple to use web
browser interface, users can access data held in any database any time and from
anywhere increasing employees’ ability to perform their jobs faster, more
accurately and with confidence they have the right information.
- Time
With intranets, organizations can make more information available to employees
on a “pull” basis i.e employees can link to relevant information at a time which
suits them.
- Communication
Intranets can serve as powerful tools for communication within an organization
both vertically and horizontally.
- Web Publishing
The use of intranets permits information to be published using hypermedia
technologies.
- Application Deployment
Intranets in general are a fast way of deploying a common application to the entire
organization. As users access it using a browser, changes need only to be made at
the server level not to each individual user. The same applies to hardware such as
printers which can be shared by many users resulting in cost reduction.
Disadvantages Of Intranets
- There could be security concerns with who accesses the intranet, also abuse of the
intranet by users e.g publishing company information that should not have been
placed on the intranet.
2. Extranets
This is a private network that uses internet technology and the public
telecommunication system to securely share part of the business’s information or
operations with suppliers, vendors, partners, customers or other businesses. An
extranet can be viewed as a part of a company’s intranet that is extended to users
outside the company.
An intranet requires security and privacy. These can include firwall, server
management, the issuance and use of digital certifcates or similar means of user
authentication, encryption of messages or virtual private networks (VPN) that
create a tunnel through the public network enabling secure communication over a
shared network between the organisation and its partners.
Advantages
Disadvantages
- Extranets can reduce personal contacts with customers and business partners.
This could cause a lack of connections made between people and a company
which hurts the business when it comes loyalty of its business partners and
customers.
3. Internet
An Internet is any network or collection of interconnected computer networks that
transfer data by packet switching using transmission control protocol/internet
protocol (TCP/IP).
The internet is the worldwide, publicly accessed network of all such connected
computer networks. It is a network of networks that consists of millions of
smaller domestic, academic, business and government networks which together
carry various information and services such as e-mail, online chat, file transfer
and the interlinked web pages and other documents of the world wide web.
- Hypertext
A format of information which allows one, in a computer environment to
move from one part of the document to another or from one document to
another through internal connections among these documents called
hyperlinks.
- Resource Identifiers
Unique identifiers used to locate a particular resource (computer file,
document or other resource) on the networks.
- Mark-up Language
Characters or codes embedded in text which indicate structure, semantic
meaning or advice on presentation.
On the world wide web, a client program called a web browser retrieves information
resources such as web pages and other computer files from web servers using their
uniform resource locators (URL) and displays them, typically, on a computer and
mobile phones. A user can then follow hyperlinks in each page to other resources on
the WWW whose location is provided by these hyperlinks. The act of following
hyperlinks is called browsing or surfing the web. Web pages are often arranged in
collections of related material called web sites.
Computer users may know the precise address of an internet site that is to be visited.
The format of the address is like http/www.bbc.co.uk. The address is called Uniform
Resource Locator (URL)
- Locate and buy parts and materials from domestic and international suppliers
All these uses of the internet have one thing in common. They improve
communication which is the most important benefit that executives expect from
the internet.
Advantages
- Electronic Mail
E-mail enables users to create, send and read written messages entirely on the
computer. An e-mail document may be a single text message or it might include
complex files or programs
- Newsgroups
Consisting of posted messages and responses on a particular subject, usernet
newsgroups differ from discussion mailing lists in two ways. First, messages are
posted to a newsgroup site which you must access by using a news reader
program. Second, messages posted to a newsgroup can be viewed by anyone. A
newsgroup is a place you visit to read posted messages whereas a discussion
mailing list delivers posted messages to you.
- Videoconferencing
More companies are using online videoconferencing to replace face to face
meetings with colleagues, customers and suppliers. This eliminates costs
associated with holding meetings face to face..
- Internet Telephony
Internet users can converse vocally over the web using internet telephony.
Converting traditional voice calls to digital signals and sending them over the
standard phone lines. It also be more efficient, allowing an organisation to
accommodate more users on a single line at once.
- File Transfers
An internet service known as file transfer protocol (FLP) enables you to download
files (transfer data from a server to your computer) and upload files (transfer data
from your computer to another system.
- Telnet
This class of internet application program allows a user to communicate with
other computers on remote network even if the user’s computer is not a
permanent part of that network e.g a user would use telnet to access the country’s
library, electronic card catalogue from the user’s home computer.
Disadvantages
- Since the internet has too much information, the quality of the information staff
will be producing will be compromised
- Speed is affected as data only downloads onto the user’s PC at the speed of the
slowest telecommunication link. This can be a problem especially if there are
deadlines to be met.
- The internet has too much information and entertainment available such that
employees will spend too much time browsing through no-work related sites. This
may affect productivity.
- Pornographic material can be accessed by staff and this may increase cases of
sexual harassment at work places.
- Since some organisations advertise on the internet for jobs, employees will spend
a lot of company time searching for better jobs on the net.
- Spyware
When staff visit unauthorized sites, the site visited will store the computer’s
address and then send a program to server so that it can copy important
information which will be sent back to the server. This program is called
Spyware
- System Failure
If the system fails, operations will be paralysed in the organisation leading to loss
of business.
CHAPTER EIGHT
DATA SECURITY
Security is an important aspect of database design because data has to be protected for
a number of reasons. Data that contain personal information has to be protected under
the Data Protection Act and data that could be useful to a commercial competitor has
to be guarded from theft.
There are two sources of threats to data security, namely, Physical threats and system
threats.
1. Physical Threats
Computer systems consist of a mixture of electronic and mechanical devices. The
operation of these devices can be impaired where they are subject to events such
as fire, flooding, heat, humidity, dust, magnetic fields, theft, power surges and
accidental or malicious damage caused by external parties or internal staff.
2. System Threats
(a). Fraud
Computer frauds come from disgruntled employees, organized crime and
hackers. Distributed processing, allowing many employee access to the
system, makes certain type of fraud easier. Fraud normally involves staff
removing money from the company but other methods of fraud that might
affect the data held on a computer system include:
- The creation of fictitious supplier accounts and submission of false
invoices so that payments are sent to fictitious supplier.
(b) Viruses
A virus is a program that can attach itself to other programs and modify or
destroy them. Viruses have the ability to infect a whole computer system. The
infected programmes may then act as carriers for the computer virus with the
result that the infection process can have a spiraling effect. The virus may
render the computer system inoperable.
Anti-Virus Software
This deletes or quarantines viruses on the computer, thus protecting the
computer from viruses. The software needs to be updated regularly as new
viruses are created daily.
Any anti-virus software should have a good deletion rate, be compatible with
the system, easy to use and must have the ability to update.
(c) Hacking
This is deliberate accessing of secure on-line systems by unauthorized persons
no necessarily connected with the target organization. Hacking has become
more of a threat with increasing use of micros and modems. Dial-up systems
are inherent in many systems and provide the hacker with an entrance to the
system once the telephone number has been obtained.
A skilled hacker can disable the journal or console logs of the main CPU to
suppress evidence of his/her activities. Once into the system, the hacker has
several dangerous options:
- Entry into the security files containing all the ID codes, passwords and
authorizations.
- Passwords
Passwords should be issued to authorised users only. The controls over
passwords must be enforced and their misuse should represent disciplinary
offence within an organization.
- System Logs
Every activity on a system should be logged and be subject to some
exception reporting e.g unusual times of access could be reported.
- Audit Trails
Sensitive data e.g payee codes, should be subjected to separate audit report
showing when data was read, written to or updated. It should also show
the before and after state and the data causing the change.
- Random Checks
The “constable on the beat” approach which checks who is doing what at
random intervals on the system and ensures that they are authorized for
these activities.
- Firewalls
These are hardware/software component that protect computers from
intruders. The firewall will not allow anything to enter the computer
system without the correct markings. All networks require a firewall to
keep out people and files that are hazardous to the system.
(d) Eavesdropping
Any data transmitted over a network (especially microwave wireless
network) is at some risk of being intercepted or even modified by a
malicious person. Even machines that operate as closed systems (i.e with
no contact with the outside world) can be eavesdropped upon via
monitoring the faint electromagnetic transmissions generated by the
hardware.
Data Encryption
To protect data from eavesdroppers, data should be encrypted. Data
encryption is used to protect the message from the eyes of others. It can be
done in several ways by:
1. Validation
This is check to see that the data being used is realistic. Software applications will
often contain validation checks. Some of the most common checks are:
- List Check
This is a check to see that a data item comes from a given list of items that are
acceptable
- Range Check
A check to see that the data item does not fall outside a given range e.g that a date
does not exceed the 31st of the month.
- Type Check
A type check sees that a data item is in the correct format e.g in either a character
or numeric format.
2. Verification
Where data is entered by a data entry clerk into a computer system, there are
plenty chances to make mistakes. A verification check is carried out to ensure that
data items have been entered into the database correctly. When data has been
entered, it is checked either by comparing the entries on the screen with the
original documents or by re-entering it into the system and comparing the two
versions. If the first and second entry versions are the same, then the data is most
likely to be accurate.
CHAPTER NINE
Computer operators and users like other workers are covered by the Health and Safety
Act At Work Act 1974.
To comply with the Act, employers are required to make sure that their place of work is a
safe environment.
1. Physical Injuries
Injuries may be due to:
- Lifting heavy loads such as boxes containing computers
- Electrocution due naked electrical wires
- Burns due short circuits
2. Eye Strain
The constant use of monitors can affect a user’s eyes. To prevent serious eye
damage, a number of regulations have been laid down:
- Staff have the right to free eye test before they start to work on VDU screens.
They can also ask for test if they are already working on the systems.
- Screens should not be placed where they reflect light and systems should be
matt so that they do not create glare.
- Lighting should be bright so that there is not too great contrast between the
screen and the background light.
- Users should be able to adjust the screen brightness and contrast
3. Posture
Sitting at a terminal for lengthy periods of time can lead to back, neck, and arm
injuries. To prevent these injuries:
- Chairs should be designed to swivel and move _best if they have castors)
- Chairs should be adjustable for the individual user in the angle of the chair,
back, and height of the seat.
- Operators should not work for long periods without taking a break. The
break allows for a change in posture.
5. Radiation
Although it has not been proved that screens emit dangerous amounts of radiation,
it has been suggested that some women operators might have miscarried their
babies due to radiation from VDUs. Radiation may also cause impotence as it
may cause damage to reproductive organs.
To protect operators from radiation, special shields are available for VDU
screens to protect users from radiation.
CHAPTER TEN
10. Updating software and hardware whenever need arises to ensure use of latest
softwares and hardware
2. Computer Operators
Oversee the physical day-to-day running of a computer system. They load computer
media e.g tapes, into the storage devises (tape drive), replace printer paper and
resolve user problems. They also ensure that the correct job is running on the
computer and that any job which is running has the authorization to do so.
3. Computer Librarian
Develops procedures for organising storage and access to data processing media and
the information held on it and provides services which assist and and instruct people
in the most efficient and effective ways to identify, locate, access and use
information. The Librarian is therefore the physical guardian of the data in an
information system.
The Librarian also keeps documentation such as system maintenance schedules and
files, archives and other similar information.
6. System Administrator
This is a person employed to maintain and operate a computer system or network for
a company or other organisations. The duties of a Systems Administrator include:
1. Text handling
This includes word processing, copying, desktop publishing used to produce high
quality documents which combine text with graphics.
2. Data Storage
This includes microform systems such as microfilm, vie data teletext
3. Telecommunications
This covers e-mail, video/teleconferencing, communication networks such intranets,
extranets and internet, telephones, data facsimile transmission
4. Computing
This includes Micro computers, Visual display units and disk storage