Bit Full Course Notes
Bit Full Course Notes
Bit Full Course Notes
TECHNOLOGY
Welcome message
Welcome to BIT 113: Fundamentals of Information Technology. This is a first year first Semester
introductory course to fundamentals of Information Technology for Undergraduate students. It has
five major topics with every lesson having several sub topics. Ensure that you have read and
understood every lesson before you proceed to the next one. In every lesson you will find given
instructions on what is expected of you; At the end of every topic there will be a self-check
activities where you are expected to assess your understanding.
Course description* (expected proficiencies required for course)
BIT 113: Fundamentals of Information Technology intends to provide a comprehensive
understanding of the key components of the computer, how it works, present the basic concepts of
various computing environments and give a broad view of how technology is improving
communications.
Course Aims
The aims to introduce different parts of the computer and its applications to computing and demystify
the way a computer system works and understanding its underlying theories and concepts, history and
basic data communication of a computer
Course Objectives
At the end of this course the participant should be able to;
1. Explain the characteristics and purposes of all the sub-units in a computer system
2. Categorize the different types of computers
3. Explain the applications of computers to different fields and explain the impacts of
computers to the society.
4. Explain the numbers systems ; perform binary arithmetic and the conversions to different
basis
5. Demonstrate the use of networks and other data communication facilities.
6. Apply the concepts of operating systems and learn the features of Ms DOS and Windows
Operating System.
Course Delivery (response time on opening topics, response time on answering questions)
Technology (information on support services)
General Forums:
1. News Forum
2. Social Forum
3. Question & Answer Forum
Course Chat (Regularly scheduled office hours to chat with learners)
Course texts
1. Stallings Hutchinson Sawyer: Computers –The user perspective (1988), Times mirror
2. Wang, W and Parker R C.(2002) office 2000 for windows, New York, Microsoft
3. Relevant internet materials
Other references
Other resources:
http://www.daileyint.com/hmdpc/manual.htm
http://www.internet4classrooms.com/support.htm
1. http://www.pcguide.com/ts/index.htm
COURSE OVERVIEW
1.1 Introduction
Today, virtually everything is managed or controlled by computers. For better or worse, computers have infiltrated
every aspect of our society. Today computers do much more than simply compute: supermarket scanners
calculate our grocery bill while keeping store inventory; computerized telephone switching centers play traffic cop
to millions of calls and keep lines of communication untangled; and automatic teller machines let us conduct
banking transactions from virtually anywhere in the world..
1.2 Objectives
By the end of this topic, you should be able to:
Learning Outcome
The student is able to:
I can now define the concept of computer system
I can explain the evolution of computing technology and the technical advancement in computer architecture
I can explain the different types of computer categories based on size, capabilities & prizes
I can describe the current trends in computer applications
Learning Activities
Activity 1.1
Based on the resources you have read, participate in the discussion on what is computer in your own words?
Post your discussion in the topic discussion forum
Activity 1.2
In your surroundings, identify the types of computers in use. Are they mainframe computers, mini-computers,
workstations or personal computers?.
Activity 1.3
Write a brief description of the types of computers in place and their main uses. If your office or surrounding has
more than one type of computer, find out why? What different tasks are the different computers intended to do?.
Upload a summary of your findings in the assignment for grading.
Activity1.4
1. In your own words, explain what a computer (2 Marks) is.
2. State different generations of computers (5 Marks).
3. Describe different types of computers based on SIZE, TECHNOLOGY & PURPOSE (7 Marks).
4. Describe at least four different applications of computers in a learning institution (6 Marks).
Content
1. Introduction
Computer - Overview
Computer is an advanced electronic device that takes raw data as an input from the user and
processes it under the control of a set of instructions (called program), produces a result (output),
and saves it for future use.
Functionalities of a Computer
If we look at it in a very broad sense, any digital computer carries out the following five functions
−
Step 1 − Takes data as input.
Step 2 − Stores the data/instructions in its memory and uses them as required.
Step 3 − Processes the data and converts it into useful information.
Step 4 − Generates the output.
Step 5 − Controls all the above four steps.
Advantages of Computers
Following are certain advantages of computers.
High Speed
Computer is a very fast device.
It is capable of performing calculation of very large amount of data.
The computer has units of speed in microsecond, nanosecond, and even the picosecond.
It can perform millions of calculations in a few seconds as compared to man who will spend
many months to perform the same task.
Accuracy
In addition to being very fast, computers are very accurate.
The calculations are 100% error free.
Computers perform all jobs with 100% accuracy provided that the input is correct.
Storage Capability
Memory is a very important characteristic of computers.
A computer has much more storage capacity than human beings.
It can store large amount of data.
It can store any type of data such as images, videos, text, audio, etc.
Diligence
Unlike human beings, a computer is free from monotony, tiredness, and lack of
concentration.
It can work continuously without any error and boredom.
It can perform repeated tasks with the same speed and accuracy.
Versatility
A computer is a very versatile machine.
A computer is very flexible in performing the jobs to be done.
This machine can be used to solve the problems related to various fields.
At one instance, it may be solving a complex scientific problem and the very next moment
it may be playing a card game.
Reliability
A computer is a reliable machine.
Modern electronic components have long lives.
Computers are designed to make maintenance easy.
Automation
Computer is an automatic machine.
Automation is the ability to perform a given task automatically. Once the computer
receives a program i.e., the program is stored in the computer memory, then the program
and instruction can control the program execution without human interaction.
Reduction in Paper Work and Cost
The use of computers for data processing in an organization leads to reduction in paper
work and results in speeding up the process.
As data in electronic files can be retrieved as and when required, the problem of
maintenance of large number of paper files gets reduced.
Though the initial investment for installing a computer is high, it substantially reduces the
cost of each of its transaction.
Disadvantages of Computers
Following are certain disadvantages of computers.
No I.Q.
A computer is a machine that has no intelligence to perform any task.
Each instruction has to be given to the computer.
A computer cannot take any decision on its own.
Dependency
It functions as per the user’s instruction, thus it is fully dependent on humans.
Environment
The operating environment of the computer should be dust free and suitable.
No Feeling
Computers have no feelings or emotions.
It cannot make judgment based on feeling, taste, experience, and knowledge unlike
humans.
Use large scale integration circuits which housed hundreds of transistors and very large IC which
are between 200,000 to 400, 000 in one IC. Memory used includes magnetic disc and optical disc.
Memory size expanded up to several MB and speed was 10 times faster. This generation marked
the origin of mini computers in use today.
The design of these computers was based on VLSI (very large scale integration) technology, the
microchip technology that gave rise to the smaller computers known as the micro computers in
use today. These computers are used in networking.
Examples of microcomputers are IBM PCs BBC micro etc. the micro computers are usually
described as PCs or stand alone or desktop computers because they were designed primarily to
serve single person at a time. The fifth generation is still a state of the art technology that relies on
predictions and further technological refinements.
Research shows that the trend in computer technology revolution is that there is;
Continual decrease in computer size
Improved speed and power processing
Decrease in computers and the related facilities cost
Number of components in computer per circuit (IC) greatly increased over 500,000
physical elements e.g. transistors, capacities, diodes etc per chip(IC).
b) Mini- Computers
o Mini- Computers are Medium Sized Computers
o Mini- Computers can serve Two or more users at ago
o Mini- Computers have Two Micro-Processors in its Central Processing Unit
o Mini- Computers can support Telecommunication hence facilitate Sharing of Information
o Through computers which are Networked together.
o Mini- Computers are commonly in Banks and Super- Markets.
c) Main-frame Computers
Main-frame Computers used in large organization
Main-frame Computers can serve several users at ago
Main-frame Computers Several Micro-Processors in its Central Processing Unit
Main – frame Computers can support Telecommunication hence facilitate Sharing of
Information through computers which are networked together.
Main – frame Computers are commonly used in Large Organization such as International
Monetary Fund and World Bank, Insurance Companies etc.
d) Super-Computers
Super-Computers Computers used in Large organization
Super-Computers can serve several users at ago
Super-Computers Uncountable Micro-Processors in its Central Processing Unit
Super-Computers can support Telecommunication hence facilitate Sharing of Information
through computers which are Networked together.
Super-Computers are commonly used in Large Organization such as International
Monetary Fund and World Bank, Insurance Companies etc.
ii. By purpose
a) Specific Purpose Computers
Specific Purpose Computers is a Computer Classification that performs a Specific Task at ago or
Time for example Computers designed to calculate wages and Salaries, Control Stocks of goods
etc
b) General Purpose Computers
General Purpose Computers is a Computer Classification that performs a General task at ago or at
a time example Computer that can perform arithmetic and Logical Operations at the same Time
iii. By Technology
a) Analog Computers
Analog Computer use continuous data. The common available Analog Computers are:
1. Car Speedometer - Measures Speed of the Approaching Bodies e.g. Cars
2. Hygrometer - Measures Humidity
3. Wind Anemometer - Measures Speed of the Wind.
4. Thermometer - Measures the Temperatures of a place.
5. Barometer - Measures Atmospheric pressure of a place
6. Voltmeter - Measures Voltage of the Electronic device
b) Digital Computers
Digital Computers a Computer Classification works on discrete/non-continuous data. The Digital
Computers have the capability of adding, subtracting, multiplying, dividing and rearranges the
data in predefined order they are commonly applied in Scientific and Engineering World.
c) Hybrid Computer
Hybrid Computer is a Computer Classification by type that performs Arithmetic and
Logical operations and at the same time measures data in waveform.
i. Schools
Keep Record of School Fees
Keep Record of Number of Students in the School
Keep Record of Number of Parents
Keep Record of Number of Staff in the School
Keep Record of Rules and Regulations that govern the Schools.
iii. Telecommunication.
Computers can be networked to facilitate between Government departments
Keep Record of Civil Servant, Terms of Service and Terminal Benefits
Keep Record of Rules and Regulations that govern the Government Institutions.
iv. Police Station
Keep Record of Criminal Finger Prints in the Society
Keep Record of Police Force Staff
Calculation of Staff Salaries
Telecommunication - Computers can be Networked to facilitate between Police
Force departments
Keep Record of Police Abstracts
Keep Record of Rules and Regulations that govern the Police Staff.
v. Weather Station
vii. Banks
xi. Hospital
Further reading
2 White R., How Computers Work (Millennium edition).
3 Capron H.L., Computers: Tools for information age (5th Edition).
Lesson 2: COMPUTER HARDWARE
Duration: 2 Hours
2.1 Introduction
In the previous lesson we discussed about the evolution of computer. In this lesson we will
provide you with an overview of the basic design of a computer. You will know how different
parts of a computer are organized and how various operations are performed between different
parts to do a specific task. As you know from the previous lesson the internal architecture of
computer may differ from system to system, but the basic organization remains the same for
all computer systems.
2.2 Objectives
By the end of this topic, you should be able to:
Learning Outcome
The student is able to:
Learning Activities
Activity 1.1
In the computer lab, look at the manuals that come with the computers. Review the manuals to
find out what type of microprocessor is in the computer. Look also at the computer screen when
the computer is turned on to see if information about the computer is shown there.
Activity 1.2
In the computer lab/your surroundings, identify the various Input and Output devices in use.
Activity 1.3
Identify the processing speed, size of RAM and the capacity of a hard disk of any of the
computers you have used.
Activity1.4
1 1. Identify any two input and output devices (2 Marks).
2. Identify the components of a computer system (5 Marks)
3. Describe the functions of the Central Processing Unit (3 Marks)
4. Describe the different types of memory giving advantages and disadvantages of each (10
Marks).
3. Processing: The task of performing operations like arithmetic and logical operations is
called processing. The Central Processing Unit (CPU) takes data and instructions from the
storage unit and makes all sorts of calculations based on the instructions given and the type of
data provided. It is then sent back to the storage unit.
4. Output: This is the process of producing results from the data for getting useful information.
Similarly the output produced by the computer after processing must also be kept somewhere
inside the computer before being given to you in human readable form. Again the output is
also stored inside the computer for further processing.
5. Control: The manner how instructions are executed and the above operations are performed.
Controlling of all operations like input, processing and output are performed by control unit.
It takes care of step by step processing of all operations inside the computer.
No Operation Description
1 Take input The process of entering data and instructions into the computer
system.
2 Store Data Saving data and instructions so that they are available for
processing as and when required.
3 Processing Data Performing arithmetic, logical operations on data in order to
convert them into useful information.
4 Output The process of producing useful information or results for the
Information user, such as a printed report or visual display.
5 Control the Direct the manner and sequence in which all of the above
workflow operations are performed.
Table 2.1: Five basic operations for converting raw input data into information
Keyboard
Most common and very popular input device is keyboard. The keyboard helps in inputting the data
to the computer. The layout of the keyboard is like that of traditional typewriter, although there
are some additional keys provided for performing some additional functions. Keyboards are of two
sizes 84 keys or 101/102 keys, but now 104 keys or 108 keys keyboard is also available for
Windows and Internet.
The keys are following
No. Keys Description
1 Numeric Keypad It is used to enter numeric data or cursor movement.
Generally, it consists of a set of 17 keys that are laid out in
the same configuration used by most adding machine and
calculators.
2 Function Keys The twelve functions keys are present on the keyboard.
These are arranged in a row along the top of the keyboard.
Each function key has unique meaning and is used for some
specific purpose.
3 Control keys These keys provide cursor and screen control. It includes
four directional arrow key. Control keys also include Home,
End,Insert, Delete, Page Up, Page Down, Control(Ctrl),
Alternate(Alt),Escape(Esc).
4 Typing Keys These keys include the letter keys (A-Z) and digits keys (0-
9) which generally give same layout as that of typewriters.
5 Special Purpose Keys Keyboard also contains some special purpose keys such as
Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and
Print Screen.
Table 2.2: Description of keys on a keyboard
Joystick
Joystick is also a pointing device, which is used to move cursor position on a monitor screen. It is
a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in
a socket. The joystick can be moved in all four directions. The function of joystick is similar to
that of a mouse. It is mainly used in Computer Aided Designing (CAD) and playing computer
games. Commonly used for video games, flight simulators, training simulators, and for controlling
industrial robots
Figure 2.5: Joystick
Light Pen
Light pen is a pointing device, which is similar to a pen. It is used to select a displayed menu item
or draw pictures on the monitor screen. It consists of a photocell and an optical system placed in a
small tube.
When light pen's tip is moved over the monitor screen and pen button is pressed, its photocell
sensing element, detects the screen location and sends the corresponding signal to the CPU.
Monitors
Monitor commonly called as Visual Display Unit (VDU) is the main output device of a computer.
It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness
of the image depends upon the number of the pixels.
There are two kinds of viewing screen used for monitors:
Cathode-Ray Tube (CRT)
Flat-Panel Display
a) Cathode-Ray Tube (CRT) Monitor
In the CRT, display is made up of small picture elements called pixels for short. The smaller the
pixels, the better the image clarity or resolution. It takes more than one illuminated pixel to form
whole character, such as the letter 'e' in the word help.
A finite number of characters can be displayed on a screen at once. The screen can be divided into
a seriesof character boxes - fixed location on the screen where a standard character can be placed.
Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically.
There are some disadvantages of CRT:
Large in Size
High power consumption
Figure 2.17: Cathode-Ray Tube (CRT) Monitor
Printer
Printer is the most important output device, which is used to print information on paper.
There are two types of printers:
Impact Printers
Non-Impact Printers
a) Impact Printers
The printers that print the characters by striking against the ribbon and onto the paper, are called
impact printers.
Characteristics of Impact Printers are the following:
Very low consumable costs
Impact printers are very noisy
Useful for bulk printing due to low cost
There is physical contact with the paper to produce an image
i. Character Printers
Character Printers are printers, which print one character at a time.
These are of further two types:
Dot Matrix Printer (DMP)
Daisy Wheel
Dot Matrix Printer
In the market, one of the most popular printers is Dot Matrix Printer because of their ease of
printing features and economical price. Each character printed is in form of pattern of Dot's and
head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which comes out to form a character
that is why it is called Dot Matrix Printer.
Advantages
Inexpensive
Widely Used
Other language characters can be printed
Disadvantages
Slow Speed
Poor Quality
Advantages
More reliable than DMP's
Better quality
The fonts of character can be easily changed.
Disadvantages
Slower than DMP's
Noisy
More expensive than DMP's
Advantages
Very high speed
Disadvantages
Very expensive
Characters fonts cannot be changed
Chain Printer
In this printer, chains of character sets are used so it called Chain Printers. A standard character
set may have 48, 64, 96 characters.
Advantages
Character fonts can easily be changed.
Different languages can be used with the same printer.
Disadvantages
Noisy
Do not have the ability to print any shape of characters.
b) Non-impact Printers
The printers that print the characters without striking against the ribbon and onto the paper are
called Non-impact Printers. These printers print a complete page at a time, also called as Page
Printers.
i. Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to form the
characters to be printed on a page.
Advantages
Very high speed.
Very high quality output.
Gives good graphics quality.
Supports many fonts and different character sizes.
Disadvantage
Expensive.
Cannot be used to produce multiple copies of a document in a single printing.
Figure 2.22: Laser Jet Printer
Advantages
High quality printing
More reliable
Disadvantages
Expensive as cost per page is high
Slow as compared to laser printer
Types of Memory
Cache Memory
Primary Memory/Main Memory
Secondary Memory
a) Cache Memory
Cache memory is a very high speed semiconductor memory, which can speed up CPU. It acts as a
buffer between the CPU and main memory. It is used to hold those parts of data and program
which are most frequently used by CPU. The parts of data and programs are transferred from disk
to cache memory by operating system, from where CPU can access them.
Advantage
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantage
Cache memory has limited capacity.
It is very expensive.
Types of ROM
i. MROM (Masked ROM)
The very first ROMs were hard-wired devices that contained a pre-programmed set of data or
instructions. These kinds of ROMs are known as masked ROMs. It is inexpensive ROM.
ii. PROM (Programmable Read only Memory)
PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM programmer. Inside the PROM chip, there
are small fuses, which are burnt open during programming. It can be programmed only once and
is not erasable.
iii. EPROM (Erasable and Programmable Read Only Memory)
The EPROM can be erased by exposing it to ultra-violet light for a duration of up to 40 minutes.
Usually, an EPROM eraser achieves this function. During programming, an electrical charge is
trapped in an insulated gate region. The charge is retained for more than ten years because the
charge has no leakage path. For erasing this charge, ultra-violet light is passed through a quartz
crystal window (lid). This exposure to ultra-violet light dissipates the charge. During normal use
the quartz lid is sealed with a sticker.
iv. EEPROM (Electrically Erasable and Programmable Read Only Memory)
The EEPROM is programmed and erased electrically. It can be erased and reprogrammed about
ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In
EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased one
byte at a time, rather than erasing the entire chip. Hence, the process of re-programming is flexible
but slow.
Advantages of ROM
Non-volatile in nature
These cannot be accidentally changed
Cheaper than RAMs
Easy to test
More Reliable than RAMs
These are static and do not require refreshing
c) Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than main
memory. These are used for storing Data/Information permanently. There are several limitations
with primary storage:
- Limited capacity because the cost per bit of storage is high
- Volatile- data stored is lost is lost when electric power is turned off or interrupted
CPU directly does not access these memories; instead they are accessed via input-output routines.
Contents of secondary memories are first transferred to main memory and then CPU can access it.
For example, disk, CD-ROM, DVD, etc.
3.1 Introduction
When we type some letters or words, the computer translates them in numbers as computers
can understand only numbers. A computer can understand positional number system where
there are only a few symbols called digits and these symbols represent different values
depending on the position they occupy in the number.
A value of each digit in a number can be determined using:
a) The digit
b) The position of the digit in the number
c) The base of the number system (where base is defined as the total number of digits
available in the number system).
.
3.2 Objectives
By the end of this topic, you should be able to:
Learning Activities
Activity 1.1
Content
3.3 Coding Schemes
3.2.1 Basic Concepts
To understand how a bit pattern can convey information, consider someone who wants to give a
signal (or send a code) to another person, but has only a single light bulb at his disposal. How
many different messages (codes) can he send? Two, one for light ON and the other for light OFF.
What if he had two bulbs? At first thought one might say he can now send three signals
corresponding to:
1. both OFF;
2. both ON;
3. One ON.
This would be fine if he only wanted to send three signals. But what if he wanted to send four
signals? Would he need another bulb? The answer is no, he can send four signals with two light
bulbs, but the sender and receiver (of the signals) would have to come to an agreement concerning
case (3), above; that is, when one light is ON, it must be distinguished from the case where the
other light is ON. For instance, if the bulbs are A and B, then ‘A ON’ and ‘B OFF’ is a different
code to ‘A OFF’ and ‘B ON’.
3.2.2 Bits, Bytes and Nibbles
4 bits = 1 nibble
8 bits = 1 byte
2 bytes = 1 word
2 words = 1 long word
1 kilobyte = 210 bytes = 1024 bytes
1 megabyte = 220 bytes = 1024 kb
1 gigabyte = 230 bytes = 1024 MB
1 terabyte = 240 bytes = 1024 GB
The coding schemes use by the computer determines the character set of the computer and the
ability of the computer to display graphics and other information. The table above illustrates the
character set depending on the amount of bits in the coding scheme. The ASCII coding scheme
can represent 27 or 128 different characters. This includes all the letters of the alphabet, lower and
upper case, the digit, special symbols and other graphics and control characters.
Other Schemes that can be discussed include: UNICODE
UNICODE:- provides a systematic way of coding multilingual plain text; Defines codes for
special characters, mathematical symbols, technical symbols, and diacritics; uses 16-bits to
represent characters in the system; has capacity to encode/ represent as many millions of characters
as possible
Problem
It is difficult to perform arithmetic with such a number system.
b) Positional Number system
a) Uses only few symbols called digits
b) These symbols represent different values depending on the position they occupy in the number
c) The value of each digit is determined by:
d) The maximum value of a single digit is always equal to one less than the value of the base A
number system defines a set of values used to represent quantity. Computer uses the binary
system. There many number systems used but of concern to computer professionals are
Decimal number system
Binary number system
Octal number system
Hexadecimal number system
All the above number systems use the same kind of positional notation except that
Decimal system uses powers of 10
Octal system uses powers of 8
Binary system uses powers of 2
Hexadecimal uses powers of 16
Example
Binary Number: 101012
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1
101012 ((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10
Step 2
101012 (16 + 0 + 4 + 0 + 1)10
Step 3
101012 2110
Note: 101012 is normally written as 10101.
Converting a –ve decimal number to binary using sign & magnitude method
1. Convert the decimal number to its binary value, ignoring the negative sign.
2. Extend the bits to the appropriate length (i.e. one less than the size of the bit-string), by
attaching 0s to the leftmost part of the bit string.
3. Attach a 1 to the leftmost part of the bit string. The 1 is the sign bit it indicates that the number
is negative. Alternatively, a 0 indicates that the number is positive.
Convert a sign & magnitude number to its decimal equivalent
1. Convert the binary number to its decimal value ignoring the leftmost it in your calculations.
2. If the leftmost bit is a 1 then the number is negative otherwise it is positive.
Ones Complement
To convert a binary number to its ones complement representation you change all the ones (1) to
zeroes (0) and the zeroes (0) to one (1)
Twos Complement
The twos complement of a binary number is formed by finding its ones complement and adding a
one.
Converting a Negative decimal number to binary using the Twos Complement
1. Convert the number to its binary value ignoring the sign
2. Extend the bit string to the appropriate length (i.e. one less than the size of the
bit-string), by attaching 0s to the leftmost part of the bit string
3. Find the ones complement
4. Find the twos complement
5. Attach a 1 to the leftmost part of the bit string. The 1 is the sign it indicates that the number is
negative
Converting a Positive decimal number to binary using the Twos Complement
To convert a positive binary number to its twos complement representation, we execute the
following steps:
1. Extend the bit string to the appropriate length (i.e. one less than the size of the
bit-string), by attaching 0s to the leftmost part of the bit string.
2. Attach a 0 to the leftmost part of the bit string, the 0 indicates that the binary number is positive
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,
and 1 in the thousands position, and its value can be written as
Characteristics
Uses eight digits: 0, 1, 2, 3, 4, 5, 6, 7.
Also called base 8 number system
Each position in a octal number represents a 0 power of the base (8). Example, 80.
Last position in a octal number represents a x power of the base (8). Example, 8x where x
represents the last position - 1.
Example
Example
Hexadecimal Number: 19FDE16
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1
19FDE16 ((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10
Step 2
19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 3
19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
Step 4
19FDE16 10646210
Note: 19FDE16 is normally written as 19FDE.
Example
Binary Number: 111012
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1 111012
((1 x 24) + (1 x 23) + (1 x 22) + (0 x 21) + (1 x20))10
Step 2 111012 (16 + 8 + 4 + 0 + 1)10
Step 3 111012 2910
Binary Number: 111012 = Decimal Number: 2910
Example
Octal Number: 258
Calculating Binary Equivalent:
Step 1: Convert to Decimal
Step Octal Number Decimal Number
Step 1 258 ((2 x 81) + (5 x 80))10
Step 2 258 (16 + 5 )10
Step 3 258 2110
Octal Number: 258 = Decimal Number: 2110
Example
Binary Number: 101012
Calculating Octal Equivalent:
Step Binary Number Octal Number
Step 1 101012 010 101
Step 2 101012 28 58
Step 3 101012 258
Binary Number: 101012 = Octal Number: 258
Example
Octal Number: 258
Calculating Binary Equivalent:
Step Octal Number Binary Number
Step 1 258 210 510
Step 2 258 0102 1012
Step 3 258 0101012
Octal Number: 258 = Binary Number: 101012
Example
Binary Number: 101012
Calculating hexadecimal Equivalent:
Step Binary Number Hexadecimal Number
Step 1 101012 0001 0101
Step 2 101012 110 510
Step 3 101012 1516
Binary Number: 101012 = Hexadecimal Number: 1516
Summary
In this topic, you have learnt the following:
1. Data representation and computer language
2. Number systems including binary, octal, decimal and hexadecimal
3. Data conversion and related concepts
Further reading
1. Essinger, James (2004). Jacquard's Web, How a hand loom led to the birth of the information
age. Oxford University Press. ISBN 0-19-280577-0.
2. Hyman, Anthony (1985). Charles Babbage: Pioneer of the Computer. Princeton University
Press. ISBN 978-0-6910237-7-9.
3. Cohen, Bernard (2000). Howard Aiken, Portrait of a computer pioneer. Cambridge,
Massachusetts: The MIT Press. ISBN 978-0-2625317-9-5.
4. Bowden, B. V. (1953). Faster than thought. New York, Toronto, London: Pitman publishing
corporation.
TOPIC 4: COMPUTER SOFTWARE
Duration: 4 Hours
4.1Introduction
Computer Instructions or data, anything that can be stored electronically is Software.
Hardware is one that is tangible. The storage devices (Hard disk, CD’s etc.,), mouse,keyboard
CPU and display devices (Monitor) are Hardware. For example: There is a problem in the
Software implies – Problem with program or data. Computer software is a series of instructions
or a special program that performs a particular task and is recorded in some form on a computer
disk. Simply, the software is an abstract collection of instructions for computers to perform
specific tasks. It is called differently a program or software program. Computer software has
two major categories. It is typically classified into system software and application software.
4.2Objectives
By the end of this topic, you should be able to:
Examine two types of software used by your institution. What system software is running in your
computer? Identify application software installed in your system/computer
Activity1.4
Operating systems are crucial to the performance of the entire computer system. State and explain
three ways in which operating systems can be classified
How are stand-alone operating systems different from embedded operating systems?
Discuss the functions of any five system utilities
Describe various ways in which users of computer systems can be able to interact with the
hardware using operating systems
Content
Computer programs include documentation, which is a written description of the functions of the
program. Documentation helps the user operate the computer system and helps other programmers
understand what the program does and how it accomplishes its purpose. Documentation is vital to
the business organization. Without it, if a key programmer or user leaves, the knowledge of how
to use the program or how it is designed may be lost. The computer is able to do nothing until it is
instructed by software. Although computer hardware is, by design, general purpose, software
enables the user to instruct a computer system to perform specific functions that provide business
value.
i. Operating Systems
An operating system is a collection of integrated computer programs that provide recurring
services to other programs or to the user of a computer. These services consist of disk and file
management, memory management, and device management. In other words, it manages CPU
operations, input/output activities, storage resources, diverse support services, and controls various
devices.
Operating system is the most important program for computer system. Without an operating
system, every computer program would have to contain instructions telling the hardware each step
the hardware should take to do its job, such as storing a file on a disk. Because the operating system
contains these instructions, any program can call on the operating system when a service is needed.
Operating System Functions
An operating system executes many functions to operate computer system efficiently. Among
them, four essential functions are the followings.
Resource Management: An operating system manages a collection of computer hardware
resources by using a variety of programs. It manages computer system resources, including its
CPU, primary memory, virtual memory, secondary storage devices, input/output peripherals, and
other devices.
Viewing the operation system as a resource manager, each manager must do the following:
- Keep track of the resources.
- Enforce policy that determine who, gets what, when and how much.
- Allocate the resources.
- Reclaim the resources.
Task Management: The function of the operating system that controls the running of many
tasks. It manages one program or many programs within a computer system simultaneously. That
is, this function of operating system manages the completion of users' tasks. A task management
program in an operating system provides each task and interrupts the CPU operations to manage
tasks efficiently. Task management may involve a multitasking capability.
File management: This is a function that manages data files. An operating system contains file
management programs that provide the ability to create, delete, enter, change, ask, and access of
files of data. They also produce reports on a file.
User Interface: It is a function of an operating system that allows users to interact with a
computer. A user interface program may include a combination of menus, screen design, keyboard
commands. A well-designed user interface is essential for an operating system to be popular.
Because of the function, users can load programs, access files, and accomplish other tasks.
Data security and management: These involve these main activities: Preventing illegal access
or amendments to user or system files; ‘Dumping’ the contents of files from time in case of future
loss, e.g. disk files may be transferred to tape and then stored off-line; Keeping track of file
descriptions and locations.
Real time systems must therefore be fast and reliable. They have complex and expensive operating
system, usually involves multi-processor to share the work load.
Computer spreadsheet packages can be used for financial information, such as income statements
or cash flow analysis. They are also used for forecasting sales, analyzing insurance programs,
summarizing income tax data, and analyzing investments. They are relevant for many other types
of data that can be organized into rows and columns. Although spreadsheet packages such as
Microsoft’s Excel and Lotus 1–2-3are thought of primarily as spreadsheets, they also offer data
management and graphical capabilities.
b) Data management.
Data management software supports the storage, retrieval, and manipulation of related data.There
are two basic types of data management software: simple filing programs patterned after
traditional, manual data-filing techniques and database management programs that take advantage
of a computer’s extremely fast and accurate ability to store and retrieve data in primary and
secondary storage. File based management software is typically very simple to use and is often
very fast, but it offers limited flexibility in how the data can be searched. Database management
software has the opposite strengths and weaknesses. Microsoft’s Access is an example of popular
database management software.
c) Word processing.
Word processing software allows the user to manipulate text rather than just numbers. Modern
word processors contain many productive writing and editing features. A typical word processing
software package consists of an integrated set of programs including an editor program, a
formatting program, a print program, a dictionary, a thesaurus, a grammar checker, a mailing list
program, and integrated graphics, charting, and drawing programs. WYSIWYG (an acronym for
What You See Is What You Get, pronounced “wiz-e-wig”) word processors have the added
advantage of displaying the text material on the screen exactly—or almost exactly—as it will look
on the final printed page (based on the type of printer connected to the computer). Word processing
software enables users to be much more productive because the software makes it possible to create
and modify the document electronically in memory.
d) Desktop publishing.
Desktop publishing software represents a level of sophistication beyond regular word processing.
In the past, newsletters, announcements, advertising copy, and other specialized documents had to
be laid out by hand and then typeset. Desktop software allows microcomputers to perform these
tasks directly. Photographs, diagrams, and other images can be combined with text, including
several different fonts, to produce a finished, camera-ready document.
e) Graphics.
Graphics software allows the user to create, store, and display or print charts, graphs, maps, and
drawings. Graphics software enables users to absorb more information more quickly and to spot
relationships and trends in data more easily. There are three basic categories of graphics software
packages: presentation graphics, analysis graphics, and computer-aided design software.
f) Presentation
Presentation graphics software allows users to create graphically rich presentations. Many
packages have extensive libraries of clip art—pictures that can be electronically “clipped out” and
“pasted” into the finished image.
g) Computer-aided design (CAD) software
Are used for designing items for manufacturing, allows designers to design and “build” production
prototypes in software, test them as a computer object under given parameters (sometimes called
computer-aided engineering, or CAE), compile parts and quantity lists, outline production and
assembly procedures, and then transmit the final design directly to machines. Manufacturers of all
sorts are finding uses for CAD software. Computer-aided manufacturing (CAM) software uses
digital design output, such as that from a CAD system, to directly control production machinery.
Computer-integrated manufacturing (CIM) software is embedded within each automated
production machine to produce a product. Overall, a design from CAD software is used by CAM
software to control individual CIM programs in individual machines. Used effectively,
CAD/CAM/CIM software can dramatically shorten development time and give firms the
advantage of economies of scope.
h) Multimedia
Multimedia software combines at least two media for input or output of data. These media include
audio (sound), voice, animation, video, text, graphics, and images. Multimedia can also be thought
of as the combination of spatial-based media (text and images) with time-based media (sound and
video).
i) Communications
Computers are often interconnected in order to share or relate information. To exchange
information, computers utilize communications software. This software allows computers,
whether they are located close together or far apart, to exchange data over dedicated or public
cables, telephone lines, satellite relay systems, or microwave circuits. When communications
software exists in both the sending and receiving computers, they are able to establish and
relinquish electronic links, code and decode data transmissions, verify transmission errors (and
correct them automatically), and check for and handle transmission interruptions or conflicting
transmission priorities. E-mail and desktop videoconferencing rely on communications software.
Summary
In this topic, you have been introduced to various types of computer software, including
classification, and expanded description of the two key types of software: systems software and
applications software. Systems software and applications software has been discussed with keen
interest on their functionally. The next chapter explores data communication and networking
concepts.
5.1 Introduction
Information society dominated by computers and communications is in front of us. In this
society, the strategic resource is knowledge and information, and the value of that resource
will be increased by the movement through the information pathway. A communication
network is the pathway that allows information, data, and knowledge to be spread. Thus, the
mainstream of the information age is communication. Computer users who work in this society
need to know technology incorporated into the communication networks. Although they use
only applications involved in the communication networks, they still need to know how the
communication networks work to improve their performance by using networks more
efficiently and effectively. This Chapter thus is very fundamental.
5.2 Objectives
By the end of this topic, you should be able to:
Learning Activities
Activity 1.1
Explain the importance of networking.
Post your discussion in the topic discussion forum
Activity 1.2
“Networking allows sharing of information and resources”. Explain.
Activity 1.3
Content
5.2.1 Basic Data communication concepts
Computer-based communication refers to the movement of data and information generated by
computers from one location to another via various types of communication lines. Computer based
communication systems often are called communication networks. The networks allow users to
collect data and information from and transmit these to powerful central computers or terminals.
i. Resource Sharing — in an organization, resources such as printers, fax machines and scanners
are generally not required by each person at all times. Moreover, for small organizations it may
not be feasible to provide such resources to each individual. Such resources can be made available
to different users of the organization on the network. It results in availability of the resource to
different users regardless of the physical location of the resource or the user, enhances optimal use
of the resource, leads to easy maintenance, and saves cost too (Figure 5.1).
iv. For Back-up and Support— Networked computers can be used to take back-up of critical
data. In situations where there is a requirement of always-on computer, another computer on the
network can take over in case of failure of one computer.
i. Star Topology
A star topology is one in which a central unit provides a link through which a group of smaller
computers and devices is connected. In the star network, all interactions between different
computers in the network travel through the host computer. The central unit will poll each to decide
whether a unit has a message to send. If so, the central computer will carry the message to the
receiving computer.
Star networks represent a very popular form of configuration for timesharing systems in which a
central computer makes available resources and databases for several "client" computers to share.
As such, the star network is appropriate for systems that demand centralized control. The
disadvantage of the star network is that a processing problem in the central computer can be
paralyzing to the entire system. In a star network, the central unit may be a host computer or a file
server. The host computer is a large centralized computer, usually a minicomputer or a mainframe.
In contrast, the file server is a large-capacity hard-disk storage device. It stores data and programs
files shared by the users on the network.
ii. Bus Topology
In a bus configuration, each computer in the network is responsible for carrying out its own
communications without the aid of a central unit. A common communications cable (the bus)
connects all of the computers in the network. As data travels along the path of the cable, each unit
performs a query to determine if it is the intended recipient of the message. The bus network is
less expensive than the star configuration and is thus widely in use for systems that connect only
a few microcomputers and systems that do not emphasize the sharing of common resources.
v. Mesh Topology
This is a net-like communications network in which there are at least two pathways to each node.
In a mesh topology, computers are connected to each other by point-to point circuits. In the
topology, one or more computers usually become switching centers, interlinking computers with
others. Although a computer or cable is lost, if there are other possible routes through the network,
the damage of one or several cables or computers may not have vital impact except the involved
computers. However, if there are only few cables in the network, the loss of even one cable or
device may damage the network seriously.
5.3.1 Network Types
Communications networks differ in geographical size. Networks may be constructed within a
building or across several buildings. Networks may also be citywide and even international, using
both cable and air connections. There are three major network types: LAN (local area networks),
MAN (metropolitan area networks), and WAN (wide area networks).
i. Local Area Networks
ii. Metropolitan Area Networks (MANs)/
iii. Wide Area Networks (WANs).
Summary
In this lesson we have learned the following
Networking of computers facilitates resource sharing, sharing of information, and, can be used as
a communication medium, and for backup and support. The transmission of data can be via guided
media like twisted pair, coaxial pair, optical fibers or as radio transmission, microwave
transmission, and satellite transmission. Throughput is the amount of data that is actually
transmitted between two computers. It is specified in bps. Modem is a device that has both a
modulator and a demodulator. Computer Network is interconnection of two or more computers
that can exchange data. Bus, Star, and Ring are the three common LAN topologies. LAN, MAN,
and WAN are the network types classified on the basis of the size of network, the transmission
technology, and the network topology.
Further reading
1. Berkeley, Edmund (1949). Giant Brains, or Machines That Think. John Wiley &
Sons.
2. Cohen, Bernard (2000). Howard Aiken, Portrait of a computer pioneer. Cambridge,
Massachusetts: The MIT Press. ISBN 978-0-2625317-9-5.
3. Ligonnière, Robert (1987). Préhistoire et Histoire des ordinateurs. Paris: Robert Laffont. ISBN
9-782221-052617.