COS 101 - Edited - 1029100001
COS 101 - Edited - 1029100001
COS 101 - Edited - 1029100001
COS 101
Introduction to Computing Sciences
(3 Credit Units)
Table of Content
Chapter 1
History and Ccharacteristics of Computing Sciences
1.1 History of Computing Sciences
1.1.1 Generation of Computers
1.1.2 Specific Applications Due to Rapid Advancement in Knowledge
1.2 Computer Science
1.3 Cybersecurity
1.4 Data Science
1.5 Information and Communication Technology
1.6 Information Systems,
1.7 Information Technology
1.8 Software Engineering
Chapter 2
Computer Hardware
2.1 Input Hardware
2.1.1 Keyboard
2.1.2 Pointing Devices
2.1.2.1 Mice
2.1.2.2 Trackballs
2.1.2.3 Pointing Sticks
2.1.2.4 Touchpads
2.1.2.5 Light Pens
2.1.2.6 Pen-based System
2.1.1.3 Source Data Entry Devices
2.1.3.1 Scanning Devices
2.1.3.1.1 Bar-code Reader
2.1.3.1.2 Magnetic-ink Character Recognition (MICR)
2.1.3.1.3 Optical Mark Recognition (OMR)
2.1.3.1.4 Optical Character Recognition (OCR)
2.1.3.2 Sensors
2.1.3.3 Audio-input Devices
2.1.3.4 Voice-recognition Systems
2.1.3.5 Video-input Devices
2.1.3.6 Electronic Cameras
2.2 Output Hardware
2.2.1 Softcopy
2.2.2 Hardcopy
2.2.2.1 Printers
2.2.2.2 Plotters
2.2.2.3 Microfilm
2.2.2.4 Microfiche
2.3 Storage Harware
2.3.1 Primary or Memory Storage
2.3.2 Secondary Storage
2.3.2.1 Flash Drive
2.3.2.2 Hard Disk
2.3.2.3 CD-ROM Disk
2.3.2.4 CD-R Disk
2.3.2.5 CD-RW Disk
2.3.2.6 DVD
2.3.2.7 Magnetic Tape
2.3.2 Data Access Methods
2.3.2.1 Sequential Access
2.3.2.2 Direct Access
2.3.3 Unit of Measurement of Storage Harware
2.3.3.1 Kilobyte
2.3.3.2 Megabyte
2.3.3.3 Gigabyte
2.3.3.4 Terabyte
2.3.3.5 Petabyte
2.3.3.6 Zettabyte
2.4 Central Processing Unit (CPU)
2.4.1 CPU Components
2.4.1.1 Main Memory
2.4.1.2 Control Unit
2.4.1.3 Arithmetic and Logic Unit (ALU)
2.4.2 Functions of Main Memory
Chapter 3
Computer Software
3.1 What is Software?
3.2 Functions of Software
3.3 Major Types of Software
3.3.1 System Software
3.3.2 Application Software
3.3.2.1 Advantages of Application Packages
3.3.2.2 Disadvantages of Application Packages
3.4 Criteria for Selecting Appropriate Software
3.4.1 Satisfies User Requirements
3.4.2 Cost
3.4.3 Reliability
3.4.4 Flexibility
3.4.5 Types of processing
3.4.6 Timing of processing
3.4.7 Integration with other System
3.4.8 Hardware requirements
3.4.9 Cope with volume of Data
3.4.10 Available Adequate Documentation
3.4.11 Succefully Used by Similiar Business Setup
3.4.12 Easy backup, start-of-the day and end-of-the day Procedure
3.5 Hardware and Software Selection Guidelines
3.5.1 Hardware Selection
3.5.1.1 Compatibility
3.5.1.2 Availability
3.5.1.3 Upgradability
3.5.1.4 Affordability
3.5.1.5 Reliability
3.5.1.6 Sustainability
3.5.2 Software Selection
3.5.2.1 Ease of Use
3.5.2.2 Version
3.5.2.3 Portability
3.5.2.4 Affordability
3.5.2.5 Compatibility
3.6 Generation of Programming Languages
3.6.1 Machine Language
3.6.2 Assembly Language
3.6.3 High-level Language
3.6.4 Fourth-Generation Language
3.6.4.1 Query Language
3.6.4.2 Report Generator
3.6.4.3 Graphic Language
3.6.4.4 Application Generator
3.6.4.5 Application Software Packages
3.6.4.6 PC Tools
3.7 Programming Related Terms
3.7.1 Syntax
3.7.2 Semantic
3.7.3 Syntax Error
3.7.4 Program Logic
3.7.5 Logic Error
3.7.6 Program Listing
3.7.7 Exectable Statement
3.7.8 Coding
3.7.9 Source Program
3.7.10 Object Program
3.7.11 Loop
Chapter 4
Humanware (Human Resources)
4.1 Categories of Human Resouces in Organizations
4.1.1 System Designers
4.1.1.1 Database Administrators
4.1.1.2 Network Architects
4.1.1.3 Web Architects
4.1.1.4 Graphic Artists
4.1.1.5 Security Experts
4.1.1.1 Technology Specialists
4.1.2 System Builders
4.1.2.1 Application Programmers
4.1.2.2 Systems Programmers
4.1.2.3 Database Programmers
4.1.2.4 Network Administrators
4.1.2.5 Security Administrators
4.1.2.6 Webmasters
4.1.2.7 Software Integrators
4.1.3 System Analyst
4.1.3.1 Programmer/Analyst
4.1.3.2 Business Analyst
4.1.3.3 Requirement Analyst
4.1.3.4 Infrastructure Analyst
4.1.3.5 Change Management Analyst
4.1.3.6 Project Manager
4.2 Skills Set Needed by System Analyst
Chapter 5
Roles of Computer in Business and Society
5.1 Roles of Computer in Business Organizations
5.2 Roles of Computer in the Modern Society
5.3 Roles of Computer in Economic Growth and Develoment
Chapter 6
Information Systems
6.1 What is an Information System
6.2 Roles of Information Systems in Business Enterprise
6.3 Trends in Information Systems
6.4 Types of Information Systems
6.5 Perspectives of Information Systems
6.5.1 The Business Drivers Influencing the Information System
6.5.2 The Technology Drivers used by Information System
6.5.3 The Process for developing the information System
6.6 Business Value of Information System
Chapter 7
Information Processing
7.1 What is Data processing?
7.2 Methods of Data Processing
7.2.1 Manual Method
7.2.2 Mechanical Method
7.2.3 Computer Method
7.3 Types of Data Processing
7.3.1 Batch Processing
7.3.2 Online Processing
7.3.3 Centralised System
7.3.4 Discentralised System
7.3.5 Distributed System
7.4 Functions of Information Systems Department
7.4.1 System Development
7.4.2 Database Administration
7.4.3 Telecomminication
7.4.4 End-User Computing
7.4.5 Computer Operations
Chapter 8
Computer Network
8.1 What is Computer Network?
8.2 Types of Computer Network
8.2.1 Server-based Network
8.2.2 Peer-to- Peer Network
8.3 Data Transmission
8.3.1 Local Area Network (LAN)
8.3.2 Metropolitan Area Network (MAN)
8.3.3 Wide Area Network (WAN)
8.4 Multiplex
8.4.1 Frequency Division Multiplexing (FDM)
8.4.2 Time Division Multiplexing (TDM)
8.4.3 Statistical Time Division Multiplexing (STDM)
8.4.3 Wavelenght Division Multiplexing (WDM)
8.5 Open System Interconnection (OSI)- 7 Layers Model
8.5.1 Physical Layer
8.5.2 Data-link Layer
8.5.3 Network Layer
8.5.4 Transport Layer
8.5.5 Session Layer
8.5.6 Presentation Layer
8.5.7 Application layer
Chapter 9
Intranet, Extranet, Internet
9.1 Intranet
9.2 Extranet
9.3 Internet
Chapter 10
Word-processing, Spreadsheet, Graphic (Presentation)
10.1 Word-processing
10.2 Spreadsheet
10.3 Graphics (Presentation)
10.4 Hands-on Pratical
10.4.1 Microsoft Word or Latex
10.4.2 Microsoft Excel
10.4.3 Microsoft PowerPoint
Chapter 11
Browsers, Search Engines and Online Resources
11.1 Importance of Online Resources
11.2 Types of Browsers
11.3 Type of Search Engines
Chapter 1
History and Characteristics of Computing Sciences
Overview
This chapter introduces the student to the history and characteristics of computing sciences,
which are some of the topics for beginners in computing. It also explains the key concepts
in the areas of Computer Science, Cybersecurity, Data Science, Information and
Communication Technology, Information Systems, Information Technology, and Software
Engineering. The chapter presents the importance of these various branches of computing
to society. At the end of this chapter are test items designed to stimulate learning and
possibly redirect the attention of readers to grey areas for proper understanding.
Objectives
By the conclusion of this chapter, students should possess the capability to:
2. Point out the development of computer science together with the major
breakthroughs and vital developments in the history
The history of computing dates back as far as the dawn of human civilization itself. Men
in ancient times used their fingers and toes as a rudimentary computing machine for
counting. They also used stones and sticks as primitive calculating tools. Most African
countries, most especially West African countries traditionally used cowrie shells to perform
mathematical calculations. Cowrie shells were used as a type of abacus with the shells
representing different numbers. For instance, a single cowrie shell might signify the number
one, while a group of four cowrie shells might signify the number four. By operating the
cowrie shells and moving them around, people could compute addition, subtraction,
multiplication, and division of numbers.
In Nigeria, the Yoruba people developed the "ifa Odun," which is a binary number system
that was used for divination, computation, and other purposes. The abacus, which was
developed in Asia between 2700 and 2300 before common era (BCE) in Sumer, is a prime
example of a computing tool that was widely used in ancient times. John Napier, a Scottish
mathematician, developed the logarithm in 1614 for the easy computation of numbers.
Fourteen significant digits table was developed by him in 1624 for the logarithms of
numbers from 1 to 20,000. In 1632, William Oughtred, a clergyman and a mathematician
invented the slide rules based on John Napier’s ideas. Blaise Pascal, a French
Mathematician, and Philosopher built the first calculating machine which later became
commercially viable between 1642 and 1644. The machine is named the Pascaline, Adding
Machine, or Arithmetic machine. Pascaline was good in addition and addition but
elementary in multiplication and division. Gottfried Wilhelm von Leibniz, a German
mathematician, and philosopher studied the work of Blaise Pascal in 1671 and came up
with the discovery of the Step Reckoner calculating machine in 1673. The work improved
on Pascal’s invention with the addition of multiplication by repeated addition and shifting.
Herman Hollerith, an American inventor who was employed in the United States (US)
Census Bureau in the year 1880, as a statistician developed the first electromechanical
tabulating machine displayed for the US Census Bureau in the year 1890. The census of
1890 could be counted within a year, as against counting it several years previously. The
breakthrough of census computation led to the establishment of Tabulating Machine
Company (TMC), which was renamed International Business Machine (IBM); the
beginning of developing business machines. In 1930, Alan Turing, a British mathematician
proposed a computational model that can simulate any computer algorithm or
computational process. Turing proposed the concept of a universal machine in his 1936
paper which laid the foundations of modern computer science. The first electronic digital
computer was manufactured in the late 1930s and early 1940s by John Atanasoff, a
physicist, and mathematician, and his graduate student, Clifford Berry, at Iowa State
College (now Iowa State University). The name of the computer was Atanasoff-Berry
Computer (ABC). It was developed to find solutions to systems of simultaneous linear
equations
During the Second World War, there was a need for a calculating machine, especially in
the area of ballistic missile trajectory calculation, where trajectory tables and other essential
data were produced. Different groups all over Europe and America started independent
efforts to design computers. There was no awareness among these groups as to what others
were doing. Between the Second World War and now, several computers have been
designed and manufactured. They have very great capacities in speed, memory, and
versatility. They are however grouped into generations. The generation to which a
computer belongs depends on the technology upon which it was fabricated.
Computers first emerged in the 1940s and their first generation spanned until the 1950s.
These sets of computers were big, costly, and used vacuum tubes for their operations. This
era of computing brought about the invention of the first digital electronic computers
which were used for scientific and military purposes. Machine and assembly languages were
introduced during the first generation of computers, which were characterized by their
large size, high cost, limited performance, and slow operational speed. The first generation
of computers, which included the Electronic Numerical Integrator and Computer (ENIAC),
Universal Automatic Computer I (UNIVAC I), International Business Machines (IBM), and
Ferranti Mark I, is exemplified in Figure 1.1.
1. Vacuum tube
The first generation of computers was made up of glass tubes called vacuum tubes that
could be used as electronic switches. The vacuum tubes are very big and needed a lot
of energy to function and are used for computations and switching operations. They
are often prone to failure due to the intensity of temperatures produced.
2. Machine Language:
The storage of data was done by the first generation of computers through the use of
magnetic drum memory which is a non-volatile memory that used magnetic fields to
keep output information. Magnetic drums, while slow, have limited storage capacity.
4. Punch Cards
Punch cards were used to input data and instruction into the first generation of
computer systems. A punch card was a piece of rigid paper that had holes perforated
in precise places to signify data or instructions. The punch cards were input into the
computer, and the computer would read the holes to control the data or
instructions.
5. Limited Applications
6. Batch Processing
In the first generation of computing, all the input data are collected and then
processed together. The process of collecting and then processing input together is
called batch processing.
The second generation of computers is defined by a distinct set of features, which include:
1. Use of Transistors
The most significant development of the second generation of computers was the
replacement of vacuum tubes with transistors. Transistors were well reduced in size, faster,
and more dependable than vacuum tubes, and they gave room for computers to be made
much smaller than earlier generations
3. Batch Processing
During the second generation of computers, Batch Processing was utilized as a means of
running programs. This involved processing assignments of data together in a single batch,
as opposed to processing them individually or in real time. The method is used when
dealing with large assignments of data that can be automatically executed such as
processing large-scale scientific and engineering simulations, besides commercial
applications such as payroll processing.
Operating systems such as IBM's OS/360 that permit many users to run programs on the
same computer at the same time were developed when computer technology shifted from
vacuum tube-based to transistor-based systems.
The third phase or era in the evolution of computing technology began from the
early 1960s to the 1970s. It is generally believed that the introduction of the IBM
System/360 mainframe computer in 1964 marked the beginning of the third phase
in the evolution of computing technology while the commencement of the use of
the Intel 4004 microprocessor which was released in 1971 marked the end of the
third era in the evolution of computing technology. The third phase in the evolution
of technology brought in the development of integrated circuits, which gives an
avenue for greater reduction and the formation of smaller and more powerful
computers. Thus, the use of transistors was replaced with the use of integrated
circuits (ICs) which permits the development of smaller and more powerful
computers. The idea of time-sharing which permits many users to access a single
computer at the same time was introduced by the computers of the third era. There
were lots of improvements in hardware and software technology which led to more
powerful, accessible, and user-friendly computers. The first personal computer (PC)
Altair 8800, based on the Intel 8080 microprocessor and came with 256 bytes of
memory designed by Micro Instrumentation and Telemetry Systems (MITS) was
introduced in 1975. Examples of third-era of computers are IBM System/360, Digital
Equipment Corporation Programmed Data Processor-11 (DEC PDP-11), Cray-1, HP
3000, and Virtual Address eXtension (VAX-11). Figure 1.3 displays an example of
the third generation of computers.
The third-generation languages (3GL) were the first to be used for structured programming.
They were developed in the 1960s and were closer to natural language than the previous
generations and made programming easier for non-experts. The C Programming Language
was created at Bell Labs in 1972 by Dennis Ritchie, while Pascal was invented in 1970 by
Niklaus Wirth. COBOL, FORTRAN, and BASIC are other programming languages that
played a significant role in advancing the development of third-generation computers.
Many advances in the field of programming were linked to 3GL. Some of them are
structured programming, the ability to handle large data sets, and improved error checking.
Third-generation languages (3GLs) have paved the way for the emergence of more
advanced programming languages like Python, Ruby, and Java.
1. Integrated circuits
Third-generation computers were characterized by their use of integrated circuits, which
revolutionized computing by allowing multiple transistors and other components to be
combined on a single silicon chip. This breakthrough greatly reduced the size and
complexity of computers, while simultaneously improving their reliability and
performance.
2. Operating systems
During the advent of 3rd generation programming languages (3GL), several high-level
programming languages like COBOL, FORTRAN, and BASIC were developed. These
languages enabled programmers to write more expressive and concise code, thus making
programming easier and more accessible to a wider range of people. In addition, the
development of software, and maintenance is very easy. It also assisted to widen the user
base of computers.
4. Time-sharing
1. Microprocessors
Microprocessors give room for better processing power and speed, much smaller
and more effective computers than the large, bulky vacuum tubes and transistors
used in earlier generations of computers
3. Operating systems
4. User-friendly interfaces
The graphical user interface which was first developed by Xerox in the 1970s and
became popular in the 1980s made fourth-generation computer usage easier for
average individuals. Windows, Icons, Menus, and Pointers (WIMP) interface was
introduced in the 1980s, gained general acceptance among Windows OS users, and
featured a desktop with icons representing programs, files, and folders, as well as
drop-down menus and pointers to navigate. Command Line Interface (CLI), though,
is not as user-friendly as the GUI was still in use in the 4GL. Touchscreens were
developed in the 1980s, though not used until later. In all, GUI permits users to
relate with the computer using icons, windows, and menus, rather than having to
type in complex commands.
6. Networking
The idea of starting the fifth generation of computing called the “Fifth Generation
Computer Project” was started by the Japanese government with the Japanese Ministry
of International Trade and Industry, and some important Japanese technology
companies, such as Fujitsu, NEC, and Hitachi, taking part in the development in the
1980s. The goal was to develop a novel generation of computers that could use cutting-
edge artificial intelligence, natural language processing (NLP) capabilities, and logic
programming techniques. The project that was expected to be on, for ten years was
terminated in the 1990s due to their inability to achieve their goals. They were not able
to achieve their goals because of the increasing cost of the project and the helplessness of
the researchers to develop practical and useful applications for the technology they were
researching on. The stoppage of the project notwithstanding, it was able to promote the
development of computer science and artificial intelligence research, most especially in
the area of logic programming and knowledge representation. Furthermore, it inspired
research in parallel processing and distributed systems, which became a field in computer
science later. Some of the fifth generations of computer Languages (5GLs) are not so
distinct. The Languages were advancements in the fourth generation of computer
languages. Some examples of programming languages of the fifth generation of
computers are Prolog, Concurrent Prolog, Mercury, Official Production System 5 (OPS5),
LISt Processing (LISP), Miranda, Structured Query Language (SQL), Statistical Analysis
System (SAS), Adaptive Design Automation (ADA) and VHSIC Hardware Description
Language (VHDL) where VHSIC stands for Very High-Speed Integrated Circuit.
NLP is a specialized study in artificial intelligence and part of the goals of fifth-
generation computers but was not achieved, though the research on it stimulates
future development in the field. The study area gives the capability to
comprehend and give answer to human language in a manner that is similar to
human-to-human interaction.
4. Parallel Processing
5. Distributed Computing
This is a vital goal of the fifth generation of computers to produce machines that
are highly intelligent, flexible, and interactive. In distributed computing, machines
are aimed to accomplish a wide variety of jobs that need a large amount of
computing power, memory, and speed. It gives room for a large number of
computers to be linked together to form a single, powerful system, working
together to find a solution to a problem. In all, the fifth generation of computers
gives the opportunity to connect and utilize the processing power of multiple
computers, allowing for large-scale computations and data analysis.
6. Expert Systems
7. User-Friendly Interfaces
It is pertinent to note that the first to the fifth generations of computers are discussed in
the previous sections, however, the question that comes to mind is that “Are there sixth-
generation computers”. The answer is that since the fifth generation of computers with a
focus on AI, the emphasis started shifting from the generation of computers or a total
refurbishment of computing technology to specific applications due to rapid advancement
in knowledge.
However, some experts suggested that the sixth generation of computers consists of
computers with the ability to perform advanced forms of artificial intelligence (AI), such as
deep learning and neural networks. It should also be able to possibly exhibit human-like
cognitive abilities, like reasoning, the ability to analyze problems and take actions.
There are suggestions in some quarters to also have the seventh generation of computers
be computers that relate well with their environment in a more sophisticated way than
present AI systems. These types of computers should be able to perceive and respond to
the world around them using a variety of sensors, together with visual, auditory, and tactile
sensors.
Furthermore, there are suggestions for having a classification called Quantum computers.
These are computers that use ideologies of quantum mechanics for computation. They
have the impetus to give solutions to glitches that are presently obstinate for traditional
devices, like large-scale optimization problems and cryptography.
There is also Neuromorphic computing (NC) which uses the structure and functions of the
human brain for modeling. It uses the idea of artificial neural networks that can learn and
adapt to new information just like the way that biological neurons work in the brain. NC
offers enhanced efficiency in data processing and facilitates a wide range of applications,
including but not limited to image recognition, natural language processing, and robotics.
NC has the capability to undertake jobs that are difficult for traditional computers, such as
recognizing patterns in complex data sets or processing sensory information in real time.
Neuromorphic systems can also be highly energy-efficient, consuming much less power
than traditional computers.
The field of Computer Science encompasses a vast array of subjects, including but not
limited to artificial intelligence, computer architecture, databases, graphics, human-
computer interaction, networking, operating systems, programming languages, security,
software engineering, and theory of computation. This breadth of topics highlights the
interdisciplinary nature of Computer Science and the wide range of applications it has in
various industries. With its ever-evolving advancements and innovations, Computer
Science continues to push the boundaries of what is possible in the realm of computing
technology.
The study of computer and computational systems has an important influence on virtually
every part of modern life, from communication and entertainment to healthcare and
transportation. It is also a sporadically developing field, with new technologies and
applications evolving every now and then.
1. Abstraction: this is the s capability to take complex systems and break them down
into simpler components or abstractions that can be operated more easily. These
abstractions can be used to design, analyze and optimize computer programs,
systems, and algorithms.
2. Algorithmic thinking: Computer scientists use analytical and problem-solving skills
to break down complex problems into smaller parts and design algorithms to solve
them (i.e., algorithmic thinking). This ability allows them to create powerful and
effective software systems that have applications across various industries. Through
their training, they approach problems in a structured and logical way, which is
important for programming and software development
3. Computational thinking: this is the ability to use a set of mental tools and ideas to
approach problems in a way that a computer can solve them. This involves
understanding algorithms, data structures, and programming languages to find
solutions to problems efficiently and effectively.
4. Creativity: the study of computer science comprises creative ways of finding
solutions to problems. It involves the ability of Programmers to think in a creative
way and come out with new solutions to solving complex problems. These ideas
and solutions ought to be communicated efficiently and effectively to others
The area of study of cybersecurity is enormous and continuously developing, with new
threats and vulnerabilities evolving day by day. Key areas of cybersecurity include network,
application, endpoint, and data security, cloud security, identity and access management,
threat intelligence, incident response, and Cyber security in governance, risk and
compliance (CRC).
4. Authentication: this is the procedure for authenticating the identity of users and
having the assurance of the certainty of the identity. This is accomplished with
procedures such as passwords, biometric verification, and multi-factor
authentication.
The study of how to extract insights from data encompasses a variety of procedures and
approaches for collecting, organizing, and analyzing data. This comprises statistical analysis,
machine learning, data visualization, and data mining. It also includes the use of dedicated
software and programming languages such as Python, R, and SQL.
Several stages are involved in data science processes. Such stages are Data Collection, Data
Preparation, Data Analysis, Data Visualization, and Communication.
Several employment opportunities are opened to Data scientists. Some of them are
Machine Learning Engineers, Business Intelligence analysts, Data Analysts, Data Scientists,
statisticians, Quantitative analysts, Data engineers, Data architects, Artificial Intelligence
Researchers, and Predictive modelers. The demand for Data Scientists is on the increase in
diverse industries such as healthcare, finance, and marketing to improve decision-making
processes and gain a competitive advantage. The characteristics of Data Science are:
ICT is made-up of three components: Information; which is the use of computers systems
to transform data into information, Communications; this is the transmission of
information through networks, Technology; the the technique applied for the transmission.
Information and communication technology (ICT) has a number of important roles in
various aspects of society, including:
1. Communication: ICT enables communication among people regardless of location,
through technologies such as email, messaging apps, and video conferencing.
2. Access to information: ICT provides means to access to a large volume of information,
through sources such as the internet and databases.
3. Education: ICT is applied in education to facilitate distance learning and provide access
to a wide range of educational resources.
4. Healthcare: ICT is used in healthcare to improve patient care and support telemedicine,
which allows patients to receive care remotely.
5. Economic development: ICT can contribute to economic development by enabling
businesses to increase efficiency and productivity, and by creating new job opportunities
in the tech sector.
Information Systems (IS) is a branch of computing science that focuses on the use of a
combination of software, hardware, and telecommunication networks to collect, process,
store, distribute information to support decision-making, control and coordination in an
organization for increased productivity through best practices and professional standards.
The basic components of information systems are:
1. Hardware; These are the physical devices that work together to accept, process, show
data, and information. Examples are monitor, processor, printer, and keyboard.
2. Software: These are the computer programs (instructions) that allow the hardware to
process the data.
3. Databases: These are the collections of associated files or tables containing related data
and information.
4. Networks: These are interconnected computer systems that allow diverse computers
to distribute resources.
5. Procedures are the commands for combining the components above to process
information and produce the preferred output.
Some of the benefits of an information system include:
1. Information Storage and Analysis
Information systems store, update, and even analyze information, which can then be
used to obtain solutions to current or future problems. Furthermore, information
systems have the ability to integrate data from various sources, in order to keep an
organization up to date with internal performance and external opportunities and
threats.
2. Easier Decision Making
Information systems assist organizations in the decision-making process. However, with
the use of IS, it’s easier to deliver all the necessary information and model the results to
make better decisions
3. Behavioural Change
Information systems assist employers and employees to communicate rapidly and more
effectively. While emails are quick and effective, the use of Information Systems is more
efficient, since documents are stored in folders that can be shared and accessed by
employees.
4. Assist With Business Processes
Information systems help businesses in developing a great amount of value added-
systems in an organisation. For example, an organisation can integrate
information systems with the manufacturing cycle to ensure that the output it produces
complies with the requirements of the various quality management standards.
Information technology (IT) is a branch of computing science that deals with the use of
computers, networks, computer software and other electronic or digital devices to create,
process, store, retrieve and exchange all kinds of data and information. Information
technology is responsible for such a large portion of our workforce, business operations
and personal access to information that it comprises much of our daily activities.
Software engineering is a branch of computing science that deals with the design,
development, testing, deploying and maintenance of software products to solve
real-world problems using well-defined scientific principles, methods, and procedures
Software Engineering is the combination of two words, Software, and engineering.
The Software consists of integrated programs designed carefully with organized
instructions and codes. And engineering, which means inventing, designing, building,
maintaining, and improving devices and processes using scientific and practical
knowledge
Software engineering is important to society because of:
1. Meeting User Needs: Software engineering enables the creation of software that
meets the needs of users. By following established software development
processes, engineers can gather requirements, design solutions, and test software
to ensure it meets the needs of its users. This results in software that is user-
friendly and valuable to its users.
2. Quality Assurance: The software engineering process emphasizes the
importance of quality assurance. This includes designing software that is easy to
maintain, testing software thoroughly to ensure it functions as intended and
providing support to users when they encounter issues. Quality assurance
ensures that the software is reliable, efficient, and effective.
3. Efficiency and Productivity: Software engineering can help organizations
increase their efficiency and productivity. By using software to automate routine
tasks, companies can save time and reduce costs. Software engineering also
enables the creation of custom software solutions that meet the specific needs
of an organization, further increasing efficiency.
4. Security: Cybersecurity is an increasingly important concern for businesses and
individuals alike. Software engineering can help create secure software solutions
that protect sensitive data and prevent unauthorized access. By building security
measures into the software development process, engineers can ensure that
software is secure from the start.
5. Scalability: As organizations grow, they need software solutions that can scale
with their needs. Software engineering can help create scalable software
solutions that can adapt to changing needs and growing user bases. This allows
organizations to continue using the software even as their needs change.
1.9 Summary
This chapter has introduced the student to history and characteristics of computing sciences
with a view to appreciating computer system and computing science. The the key concepts
in the areas of Computer Science, Cybersecurity, Data Science, Information and
Communication Technology, Information Systems, Information Technology and Software
Engineering were also presented. To this end, the importance of these various branches of
computing to the society were clearly explained.
Exercises
a) computer science
b) Cybersecurity
c) Data Science
d) Information systems
e) Software Engineering
f) Information and Communication Technology
References
Brinkman, B. A. (2021). Soft machines: The future of interactive computing. MIT Press.
Dessalegn Mequanint (ND) Introduction To Computer Science,
https://ebooks.aiu.ac.ke/show/703/pdf, accessed 10 April 2023
th
Gitelman, L. (2021). A cultural history of data practices. Routledge, accessed 12th April 2023
Pradeep K. and Priti S. (2004). Computer Fundamentals - 8th Edition Concepts, Systems &
Applications BPB Publications, ISBN 978817656752.
Overview
This chapter provides general knowledge about the Computer Hardware. It also describes
the physical components required for a computer system to function efficiently; the input
and output devices. The chapter presents and explain the different storage hardware and
their functions. It also highlights the different unit of measurement for storage. This chapter
clearly illustrates the different components of Central Processing Unit (CPU) and their
functions.
Objectives
This chapter focuses on providing students with the basic knowledge of Computer
Hardware. Specifically, students should be able to:
1. define Computer Hardware clearly.
2. describe different types of Input Hardware.
3. describe different types of Output Hardware.
4. illustrate the primary components of the CPU and describe their functions.
5. explain the uses of different disks, other storage media and their functions.
The term "computer hardware" is described as the external and internal tools you need to
do important tasks including input, output, storage, communication, processing and more.
2.1.1Keyboards: The most frequent input devices are keyboards, which resemble
typewriters. They are made up of keys that stand in for letters, numbers, and unique
symbols. They also contain function keys, which vary in use based on the program being
used, from F1 to F12.
2.1.2.1 Mouse: With the invention of the mouse, the movement restriction of older input
devices was eliminated. The necessity for an input device that can assist with data entry by
picking an option on the desktop comes with the introduction of GUI. A computer user
may now rotate their screen 360 degrees, something that was previously impossible, with
the aid of a mouse. One type of mouse has a tracking ball that sends the signal to move
the pointer on the screen, while the other type is an optical mouse that detects movement
and moves the pointer on the screen.
2.1.2.2 Trackballs
Using a trackball, you can input motion information into computers and other electronics.
Its top has a rolling, moving ball that can move in any direction, acting as a mouse-like
device. Instead of moving the complete gadget, simply roll the movable ball on top of the
trackball unit with your hand to provide motion input. The main function of computer
trackballs, which are often used in place of mice, is to move the cursor around the screen.
Similar to mice, computer trackballs have buttons that can be used as left- and right-click
buttons as well as for other commands. Trackballs can be found in various electronic
devices outside computers, such as arcade games, mixing boards, and self-service kiosks,
however they are most frequently used with computers. The trackballs on these gadgets
are frequently bigger than those seen on computer input devices.
2.1.2.4 Touchpads
The development of the touch screen is thought to have revolutionized the world of input
devices. Smartphones, ATMs, railway inquiry systems, and many other devices use touch
screens widely. They are very simple to use. To choose an option, users only need to touch
it. When the choice is touched, the light beam is broken, the position of the option is
registered, and the program that controls that option is run.
football broadcasts, light pens are frequently utilized by the commentators to draw free-
hand lines on the TV screen.
Figure 2.8: Light Pens
Optical input devices enable computers to use light as an input source. A scanner is an
example of an optical input device. Barcode readers, optical mark readers, magnetic ink
character readers for magnetic ink character recognition (MICR), optical character readers
for optical character recognition (OCR), and optical mark readers are some other common
optical input devices.
Barcodes are machine-readable vertical lines that are adjacent and have a varied width.
Books, groceries, and other items can be identified by barcode. Barcode scanners make use
of reflected light to read barcodes. The computer receives this data and uses the bars'
spacing and thickness to decipher the code. In order to read labels on books and in
department shops, handheld barcode readers are frequently utilized.
Fast and precise barcode readers are available. They help provide customers with faster
service and can also be used to count the number of each item sold or to retrieve an item's
price.
Banks utilize MICR to process a lot of checks at once. The magnetic encoding numbers
printed at the bottom of a check are recognized using it. The numbers on the check are
printed with iron-containing ink and are legible to humans. These figures have magnets in
them. For character recognition, MICR uses a magnetic ink character reader. The magnetic
field causes the read head to detect the characters or numbers on the check when it is
passed through a magnetic ink character reader. In banks, readers are typically used to
process checks. The bank, branch, and check numbers are all located at the bottom of the
check. OCR cannot read documents as quickly as MICR.
OMR is employed to find marks on paper. By their blackness, the marks can be identified.
OMR reads the marks using an optical mark reader. The information is passed when the
OMR scanner scans the forms and recognizes the mark that is correctly positioned on the
paper and darker than the surrounding paper, it sends the information to the computer
for processing by application software. In order to do this, a light beam is used to capture
the presence and absence of marks on the paper that has been marked. By measuring the
reflected light, the optical mark reader locates the mark. The computer interprets and stores
the mark pattern
OCR is a technique for scanning documents, converting it, and then identifying the image
as modifiable ASCII text using OCR software. OCR uses an optical character reader to
recognize characters. The optical character reader stores the scanned image as a bitmap
image, which is a grid of dots. As a result, the text that has been scanned cannot be edited.
OCR software is required in order to alter the scanned text. OCR software converts the
array of dots into text that the computer can read as words and letters. In order to
recognize the words and letters of text, OCR software compares the pattern on the scanned
image with the ones that are stored in the computer. Different file formats can be used to
store the text files produced by OCR. OMR is widely used to read the responses in
objective type tests, where students indicate their responses by darkening a particular circle
with a pencil. OMR is used to read a variety of forms, especially orders and questionnaires.
Figure 2.13: Optical Character Recognition (OCR)
2.1.3.2 Sensors
Speech or human voice can be used to give the computer with audio input. The computer's
audio input can serve a variety of functions. A sensor is a tool that detects variations in
electrical, among other things, it can be used to make phone conversations, have audio
and video conferences online, record voice, create audio files, include those files in emails,
or translate spoken words into text. Speak data into a computer using a microphone or
another audio input device. The sound card transforms the analog audio signals from the
microphone into digital codes so that the computer can store and use them. The sound
card additionally transforms the digital sound into analog signals that can be sent to the
speakers. cal, physical, or other characteristics and produces an output to signal the change.
Speech recognition, often known as voice recognition, is the process of turning spoken
words into written ones. The speech recognition system or voice recognition system is
made up of the audio input and voice recognition software. Examples MIDI keyboards,
microphones, or another type of digital musical instrument.
Speech Synthesizer: With the aid of a microphone, data is input into a speech synthesizer
in the form of a human voice. This data is transformed into electronic signals by the system.
Following that, these signals are compared to patterns that are already stored in a
computer system. The speech synthesizer has the issue that if a person changes the way
they talk, the computer might not be able to recognize their voice pattern.
The computer receives video input from a video camera and a digital camera. Full-motion
video images can be captured with a video camera. Images can be compressed and saved
on a computer disk after being converted to digital form. A typical type of video camera
is the webcam. To take pictures of the user using the computer, it is mounted on top of
the screen of the device. The user can connect video equipment, such as camcorders, to
the computer using a video capture card.
Still photos can be captured with a digital camera. You can move your photographs to an
external storage device and use it with your computer after its memory (RAM) is full. As
an alternative, you can use a port on your computer—typically FireWire or USB—to
download the images, which you can then edit for use in your own publications.
2.2.1 Softcopy
A digital document file kept on a computer or drive is known as a "soft copy." It is not a
printed version of any document; rather, it is an electronic version. Depending on the type
of document, you can open and edit a soft copy using software programs including
database programs, processing programs, presentation software, and many more. A
temporary copy is the output of a soft copy, which is stored in computers, USB devices,
etc. The soft copy cannot be touched because it is a virtual object. This makes it another
name for a virtual copy of a file or document. Soft copies are easily shared and sent over
a network connection, such as social media, email, etc. Compared to hard copies, they are
a more affordable and practical form of communication. E-books, E-News, papers, scanned
notes, PDF notes, etc. are a few examples. Compared to hard copies, soft copies are more
resilient and long-lasting. Hard copies are very simple to fold, twist, burn, rip, or destroy.
When a user makes numerous backups and stores the soft copy in a suitable hardware
setup, it remains resistant to destruction.
2.2.2 Hardcopy
A hard copy is a printed version of a computer-generated digital document file on paper
or another transparent material. The output is physically printed on paper and is
consequently occasionally referred to as a permanent copy. It could be a picture, some
text, a drawing, or another printable file. They are called "hard copies" because they are
tangible physical objects that humans can touch. So, it qualifies as a physical copy as well.
Books, newspapers, printed document files, notebooks, and other materials are a few
examples.
Hard copies still matter for a variety of reasons, even in the digital age. When someone
loses or mistakenly destroys their digital data, the hard copies in some situations may serve
as a backup. In addition, some people find it quite simple to manage and distribute hard
copies. In some cases, people can also utilize these copies as templates or schemas that
have been scribbled up with a pencil or pen.
2.2.2.1 Printers
Printers are used to produce hard copy of output and are divided into two categories; one
is an impact printer and second is a nonimpact printer:
Impact Printers: Similar to a typewriter, impact printers operate. Similar to how characters
on paper are created on typewriters when an arm with an embossed character strikes the
ribbon and leaves an impression, impact printers use a head made up of several pins
(typically nine or twenty-four) that strike the ribbon to create an impression of a character
on the paper. Dot matrix printers are another name for impact printers. The following
categories can be used to categorize dot matrix printers: Character printers print individual
characters one at a time, first from right to left and then from left to right.
Nonimpact Printers: The paper is never touched by these printers. With the aid of heat or
a laser, they create a character's picture on the paper. The following categories can be used
to categorize nonimpact printers:
A thermal printer: They are focusing on the idea of heat. The use of heat-sensitive sheets
allows for the formation of dotted-form characters. This printer's limitations include the
need for a unique type of paper and the inability to print numerous copies at once.
Laser Printers: These printers make use of laser technology in order to print. The ink
powder (also known as toner) is poured onto the drum and deposits itself on the characters
that have been generated there after being charged by the laser beam. These characters are
printed on the paper as it revolves on the drum. Although a laser printer has a high initial
cost, the cost per page of printing is relatively low.
Inkjet Printer: Compared to laser printers, inkjet printers are less expensive, but printing
costs are higher. Utilizing an electric field, this printer sprays ink onto the paper through its
nozzles. The characters are created by the paper absorbing the ink.
Plotters: Plotters have a printing arm that can revolve 360 degrees. Plotters are mostly
used for printing technical designs that are used in CAD or CAM (computer-aided design
or manufacturing).
2.2.2.2 Plotters
A plotter is a type of printer that receives computer orders and uses a variety of pens to
create drawings on paper. Large graphs and designs, such as construction maps,
engineering drawings, architectural blueprints, and business charts, are printed out on
paper using this method. It can either be a standalone device with an inbuilt processor
or a peripheral component you add to your computer system. When compared to a
printer, it produces the data in hardcopy at a comparatively slower rate. It is simple to
draw parallel, continuous lines between points. It is primarily employed in specialized
fields like engineering, architecture, and drawing.
2.2.2.3 Monitor (Visual Display Unit): A monitor resembles a TV screen and is used for
showing output.
Figure 2.20: Monitor
2.2.2.4 Microfilm
Documents are compressed and stored on photographic film as part of the microform
storage technique. Microfiche and microfilm are the two types of microforms. Microfiche
is a flat sheet of microfilm, whereas microfilm is a roll of images that resembles a movie
reel. Microform storage can readily store thousands of documents without taking up much
space because the papers are typically shrunk to roughly 1/25 of their normal size. A roll
of photographic film is used in microfilm storage, a type of microform storage, to hold
images of your papers. Depending on the kind of documents you need to keep, a typical
roll of microfilm is either 16mm or 35mm in size.
2.2.2.5 Microfiche
Instead of being a roll, microfiche is a flat sheet of microfilm. A typical microfilm is 4 inches
by 5 inches and holds roughly 98 letter-sized pages. Microfiche sheets may be simpler to
organize due to their structure and shape, although having a much lesser storage capacity.
DRAM (Dynamic RAM): It needs to be refreshed periodically by the CPU so that the data
contained in them is not lost.
SRAM (Static RAM): In it, data contained remains stored properly; therefore, it does not
need to be refreshed by the CPU. This type of RAM has a higher speed than DRAM and is
costly, too.
2.3.2 Secondary Storage: Secondary memory is a form of external, permanent storage for
computers. Data is kept in this memory on hard drives, floppy disks, magnetic tape, and
optical disks as magnetic particles, pits, and pits.
2. CD-R (Writable Discs, also known as CD Recordable): A user can only burn (store) data
on a CD-R once, or numerous times when utilizing multisession mode, until the disk's
storage capacity is reached. Data cannot be altered or erased after it has been written.
3. Rewritable Discs/CD Rewritable, or CD-RW. This implies that a user has the ability to
not only write data but also to remove existing data from the disc and replace it with new
data.
4. Digital Versatile Disc/DVD Read-Only Memory (DVD/DVD-ROM). offers the same
functionality as a CD-ROM, but a DVD typically has six times more storage space than a
CD.
4. (Writable DVD or DVD Recordable; DVD-R/DVD+R). bigger capacity with the same
features as CD-R.
6. Double or dual layer DVD. The disc space on double-layer discs is double that of a
typical DVD. Blu-ray disc recordable, or BD-R. It is a Blu-ray disc that can only have data
written on it once.
8. BD-RE (Blu-ray Disc Rewritable). It is a Blu-ray disc that is recordable and erasable (BD-
RE), meaning that it can be recorded on and erased as many times as necessary. The Blu-
ray format for digital optical disc data storage replaces the DVD format in terms of data
storage. Hours of high-definition and ultra-high-definition footage can be stored on Blu-
ray discs.
A memory location with the names X and Y will open in the RAM of the system as soon
as the variables X and Y are given the values 35 and 45, respectively. The next directive is
Z = X + Y. The ALU will now process the data from the RAM, and the result (which is 35
+ 45 = 80) will be saved in another position "Z" in the system's RAM. When the control
unit receives the order to "print Z," it will read the value stored at location Z in the RAM
and show it on the computer system's monitor. The command “End” will tell the computer
that program is over.
Central Processing Unit: A computer system's central processing unit (CPU) is frequently
referred to as its brain. Similar to how the brain in humans directs all activity, in a computer
system the CPU directs all processing activities. The following are its primary components:
Arithmetic and Logic Unit: All of the operations take place in the arithmetic and logic unit
(ALU). The ALU performs logical analysis and decision-making in addition to doing
mathematical calculations. The capabilities that set a computer system apart from a
calculator are logical comparison and decision-making.
Control Unit: The control unit (CU) serves as the system's supervisor. The CU is in charge
of coordinating and synchronizing all tasks carried out by a computer system. The CU
controls the movement of data from one area of the CPU to another and vice versa, acting
as a traffic cop. The management of the process of loading and unloading programs and
data from memory falls under the purview of the control unit. It is also in charge of
sequentially carrying out (executing) program instructions. The concept of a "register" to
store interim computational values is included in this.
Memory: A primary memory is memory that is located inside a central processing unit.
The device is shaped like a silicon chip, and data is stored there as electronic pulses. The
numbers "1" and "0" represent the existence and absence of current, respectively. This
memory stores information as binary 0s and 1s.
2.4.3 Summary
This chapter has introduced the student to all the computer system's physical components
referred to as computer hardware. This consists of the input processing units; keyboards,
microphones, mice, output processing units; printers, plotters, speakers, and storage units;
floppy disks, hard disks optical disks etc.
Exercises:
1. Discuss the various types of computer hardware.
2. Describe the basic components of CPU and its functions.
3. Discuss the block diagram of a computer system.
4. What do you understand about input devices? What are the various input devices?
5. What do you understand about output devices? What are the various output devices?
6. What is meant by secondary storage or secondary memory? Discuss the various
storage devices used in a computer system.
7. What do you understand about memory? How many types of memory are there?
References
1. Paul B., Andrew G and Simon H (2015); Business Information Systems Technology,
Development and Management for the E-Business, ISBN 978-0-273-73646-2, 5th edition,
2015, Pg 1-704.
2. Gupta. C. P & Goyal. k (2020); Computer Concepts and Management Information
Systems Mercury Learning and Information, ISBN: 978-1-68392-586-6 2020. Pg 1-245.
3.Subhash V (2021); PC Hardware Explained, ISBN 978-93-5457-183-1. 26 December
2021, Pg 1-89.
4. Kevin W. (2017); Elluminet Press Essential Computer Hardware, 2017, Pg 1-167.
5.www.techterms.com accessed 15th April 2023
6.www.tehopedia.com accessed 15th April 2023
Chapter 3
Computer Software
Overview
This chapter introduces the students to software, its functions, types, criteria for selecting
appropriate software, the guidelines for selecting hardware and software, programming
languages generations and terms related to programming.
Objectives
This chapter focuses on providing students with the essential knowledge of software.
Specifically, students should be able to:
a) define software;
b) list and explain the types and functions of software;
c) list the criteria and guidelines for choosing appropriate software and hardware;
d) list and describe the generations of programming languages with examples; and
e) list programming related terms and explain them.
Computer Software
3.1 What is Software?
In defining software, it is necessary to know what a program is. A program can be defined
as a set of instructions coded in a particular programming language for a computer or any
other digital device to follow in order to accomplish a task. Software is then defined as a
combination of programs and the documentation (description of the software to the user
in text, video or illustration form) of the programs. It should be noted that software is a
plural noun and thus, there is nothing like softwares.
Looking at the funtions of software based on its type, basically, any software can either be
a system software or an application software. Esentially, a system software carries out
functions related to the hardware and it consists of the operating system, the translator
and the utility software.
Specifically, an operating system as a type of system software provides the following
general functions:
i. It manages the different hardware components of the computer system.
ii. Provision of an interface for interacting with the computer system.
iii. Controlling the execution of programs.
iv. Management of input/otput devices.
v. Management of files.
vi. Detection of hardare and software errors.
vii. It allocates computer resources like the CPU, the RAM, storage, etc.
viii. It carries out accounting task of who used what computer resources and when.
ix. Provision of protection and security for system resources.
x. Provision of support services to application software. For example, the opening
of a file for processing by a word processor.
3.4.2 Cost
This entails software development cost or the cost of purchasing the software and
maintainance cost. Cost can also be in terms of the computing resources used by the
software which can be in terms of memory space, disk store, CPU usage and GPU usage.
Software that uses the least cost is preferred.
3.4.3 Reliability
A piece pf software is said to be reliable if under all kinds of conditions, it is able to perform
its specified tasks.
3.4.4 Flexibility
Software fexibility concens itself with how easy the software can be adapted or changed
to meet the user’s and environmental needs.
3.5.1.1 Compatibility
Hardware compatibility means different hardware components work together seamlessly.
For example, to upgrade or replace your system’s RAM or hard drive (HDD), you need
to ensure that they are compatible with your system’s CPU, bus, motherboard and the
operating system. Generally, a hardware component comes with detailed documetnation
of its specification and compatibility description.
3.5.1.2 Availability
Availability involves ensuring that the hardware components are availabile in the market.
This is necessary in case of the need for the replacement of any malfuntioning part.
3.5.1.3 Upgradability
Hardware upgrades are sometimes necessary to improve or enhance the performance of
computing systems. Three essential hardware upgrades to improve PC performance can be
done on the RAM, the hard drive or SSD (Solid State Disk) storage and CPU cooling system.
The higher the capacities of these components, the better the performance of the system.
3.5.1.4 Affordability
Affordability has to do with determining if an organization/individual has the finacial
strength to acquire a particular hardware. It is not advisable to opt for a piece of hardware
that one cannot afford.
3.5.1.5 Reliability
Hardware reliability is the probability of hardware components to function within the
specified conditions for a specific period without failure. Reliability is also considered as an
important part of dependability. Hardware may pass a reliability test from the
manufacturer, but may fail after purchase. The easiest way to evaluate a hardware
component for reliability is to see the warranty policies provided by a component
manufacturer. In case of a failure, it can be returned to a vendor for replacement or repair.
The warranty period is usually between 1 to 3 years. But the general perception is that a
longer warranty period indicates a better reliability.
3.5.1.6 Sustainability
Hardware sustainability relates to its compatibility, availability, upgradability and
reliability. Among the hardware sustainability concerns nowadays is its environmental
friendliness; hence the term “green IT hardware” is applied. When purchasing hardware,
sustainability considerations should include the following:
i. Low power consumption;
ii. Use of recycling materials;
iii. A holistic concept in packaging for waste avoidance;
iv. Resource-saving components;
v. Focus on long life cycles; and
vi. Low possible maintenance requirements and high reliability.
3.5.2.2 Version
Software product usually comes in versions. Each subsequent version usually comes with
improvements over the previous versions. When selecting software, the latest version is
always preferred. However, installation requirements need to be properly checked to
ensure the computing system meets the installation specification as provided by a software
product vendor.
3.5.2.3 Portability
Software portability refers to the ease of using the same software in different computing
environments. The computing environment here refers to different operating systems. E.g.
Windows, Mac OS, Linux, Unix, etc. So, when selecting a software product, consideration
in terms of how easy it is to make it run on different operating systems is important.
3.5.2.4 Affordability
Software affordability refers to the cost associated with acquiring a software product for a
computing system. This cost is not limited to the cost of licensing the technology, but also
includes the cost of operation and maintenance throughout the entire lifetime of the
software product. Depending on whether a software product is of the type COTS
(commercial off-the-shelf ) or customized software built in-house or by a software
company, the cost of technology over its whole life needs to be calculated. Another
software product acquisition option is a subscription-based software – software as a service
(SaaS) model. The following rule-of-thumb guidelines are used to assess whether the terms
quoted by a software vendor are right: cost of licensing the software product, standard
maintenance costs, premium customer support costs and professional services costs.
3.5.2.5 Compatibility
Software compatibility means a software product is able to operate properly together with
other components of a computing system. When selecting a software product or upgrading
existing software to a higher version, issues of compatibility and backward compatibility
need to be considered.
3.6.4.6 PC Tools
Programming tools are tools or utilities that programmers/developers use when
developing software to enhance their work. They are also used in maintaining software.
3.7 Programming-Related Terms
In this section are presented, computer programming related terms to help students get
familiar with them.
3.7.1 Syntax
Syntax is one of the two main components of a language that a programmer needs to be
familiar with. It comprises the rules that define the structure of a language. Violation of
any rule of a language results in a type of error called syntax error.
3.7.2 Semantics
Semantics is the second of the two main components of a language. It is the meaning of
every well-formed statement (sentence) of a language. For a well-formed sentence in a
language, in addition to the correctness of syntax, a sentence must make sense semantically.
3.7.8 Coding
Coding is an act of writing computer programs in a particular language in solving
computational problems.
3.7.11 Loop
A loop refers to the repetition of a sequence of instructions until a certain condition is
reached.
Summary
Software has been described as the instructions written in a specific programming language
for execution by the computer. It generally directs the computer to carry out specific
actions towards accomplishing a task and it controls the hardware. Software could
generally be categorized into system software or application software. For organizations
and individuals to obtain maximum benefits from software, they must follow certain
criteria in selecting appropriate software for themselves. They must also follow certain
guidelines for selecting both hardware and software they require and all have been
discussed in this chapter.
Exercises
1. Differentiate between software and program.
2. What functions do software perform generally?
3. What benefits do you think should accrue to an organization seeking to purchase an
application software?
4. What are the things to consider when purchasing or upgrading a computer?
5. Explain why it is so difficult to make a clear distinction between 3rd-generation and
4th-genration programming languages.
6. What functions are performed by the operating system?
7. Differentiate between sytem software and application software.
8. Why would you discourage an organization from purchasing an application package?
9. Why is successful usage of a package by an organization whose operations are similar
to the one that wants a piece of software an important criterion in selecting the
usage/purcahse of an applicationpackage?
10. What is the distinction between the syntax and semantics of a programming
language?
References
Asetek Liquid Cooling Home (n.d.). Liquid Cooling vs Air Cooling – What is the better
cooling solution for PC enthusiasts and gamers?. Liquid Cooling Home.
https://www.asetek.com/liquid-cooling/gaming-enthusiasts/air-vs-liquid/ .
Eusgeld I., Freiling, F.C., & Reussner, R. (2008). Hardware Reliability. In LNCS 4909 (Eds.),
Dependability Metrics (pp. 59–103). Springer-Verlag.
James P. (2022, March 10). Three Essential Hardware Upgrades to Improve PC
Performance. Asteck. https://www.asetek.com/blogs/three-essential-hardware-
upgrades-to-improve-pc-performance/
Paul, M. (2015, January 29). 5 Affordable Hardware Upgrades for a More Efficient New
Year. CIO. https://www.cio.com/article/251163/5-affordable-hardware-upgrades-for-
a-more-efficient-new-year.html
Rehman, J. (2023). Advantages and disadvantages of application software.
https://www.itrelease.com/2022/09/advantages-and-disadvantages-of-application-
software/
Ruben S. (2021, December 8). Sustainable IT: Hardware: Why, How & What. Linkedin.
https://www.linkedin.com/pulse/sustainable-hardware-why-how-what-ruben-scholtz/
Sebesta, R. W. (2015). Concepts of Programming Languages (11th Edition). Pearson Inc.
Tanenbaum, S. A. & Bos, H. (2015). Modern Operating Systems (Fourth Edition). Pearson
Education, Inc.
Chapter 4
Humanware (Human Resources)
Overview
This chapter provides sufficient knowledge about Human ware. It sheds light on the
importance of human resources in computer ware and computing generally. Key concepts
and definitions of terms were broadly covered.
Objectives
This chapter focus on providing students with the basic knowledge of humanware.
Specifically, students should be able to:
i. Database Administrators
ii. Network Architects
iii. Graphic Artists
iv. Security Experts
v. Technology Specialists
d) Understand the concept of System Builders
i. Application Programmers
ii. Systems Programmers
iii. Database Programmers
Introduction
Hardware Human
Resources
The degree of interdependence between human resources and hardware, or the extent to
which certain human capabilities are essential to the efficient operation of the hardware,
and the extent to which the use of the hardware as a component of a production system
affects the performance of people, can be used to describe this interaction. The more
dependency there is between factors, the more dependent the total production system is
on human resources, and the more susceptible the system is to human variability.
The upper arrow, which implies that hardware technology influences human resource
capabilities, is less immediately obvious. We frequently explore how the employment of
hardware technology, in the context of a certain production system, can develop and
strengthen the traits that make human resources effective. Instead, we frequently think of
particular hardware technologies as requiring specific capabilities. Here, we focus on this
later, dynamic perspective of "humanware," in which the production process is seen as
opening up the possibility for continuous, continuing learning (as opposed to a one-time
"learning curve" impact).
Maybe it should be understood, but the bottom arrow in Figure 1 illustrates the impact of
human resources on hardware technology performance. For the equipment to be used
properly, safely, and effectively, machine operators must possess the requisite skills and
expertise.
The term "human resource" was first used by American institutional economist John R.
Commons in his book The Distribution of Wealth from 1893. Human Resource
departments were not, however, formally constituted until the 20th century and given the
authority to settle conflicts between employees and their employers.
Human Resources plays with the 21st century's fast evolving business environment and
rising demand for qualified people, plays a critical role in aiding firms.
The Human Resources division is an essential component of the business regardless of size.
Its obligations include boosting worker productivity and protecting the company from any
issues that might arise within the workforce. The duties of HR include overseeing salaries
and benefits, recruiting, selecting, and letting go of candidates, as well as remaining up to
date on any laws that may affect the company and its workers
A productive, functioning workers, which employees and managers are responsible for, is
the most important component of a successful business. In order to achieve this, one must
view workers as resources for the business rather than as expenses. Like any other resource,
talented employees may be effectively used to advance an organization
Today's system design methodologies appear to imply that the system design process
entails problem solving, or the fixing of an unreliable reality. These techniques also make
use of the irrationality of system designers' behavior (Stolterman, 1991).
The computer codes that power video games are created by a system designer. Early on in
the development process, they are engaged to evaluate the game's scope and design as
well as to set up the platforms that will make the game a reality. System designers do tasks
similar to those of computer hardware engineers, but they may also be expected to exercise
significant creative and problem-solving skills. In addition to establishing crafting
components, talent trees, and level tables, they might be necessary to trace character
development from conception to implementation. In the gaming industry, a systems
designer's role and duties includes, but not limited to the following:
Systems designers could require expertise in some of the following pieces of software:
C
C++
Unreal 4
Maya
Adobe Creative Cloud
Substance Painter
Other human resource personnel whose modus operands and routine of work are classified
under System designer’s role are numerous, some of such position that will be discussed in
this chapter include; Database Administrator, Web architects, graphic designers, security
specialists, network architects, and technology experts.
Database administrators, also known as DBAs, are IT professionals responsible for the
design, implementation, maintenance, and management of computer databases. They
work with database management systems (DBMS) to ensure data is stored, organized, and
accessed efficiently and securely. DBAs are responsible for ensuring that databases are
available, reliable, and scalable to meet the needs of the organization they support. They
work closely with developers, network administrators, and other IT professionals to ensure
that the database system supports the business goals and objectives of the organization.
Some of the specific tasks that database administrators perform include designing and
implementing database structures, managing and maintaining database performance,
securing data, planning for disaster recovery, troubleshooting, and problem-solving,
managing database backups and recovery, and ensuring data integrity. They are also
accountable for staying current with new developments in technology and database
management trends to make sure that the database system is efficient, effective, and secure.
1. Designing and implementing database structures: To design and implement the best
database structure for an organization's requirements, DBAs collaborate closely with
developers and other IT specialists.
2. Controlling and maintaining database performance: DBAs keep an eye on database
performance, spotting and resolving problems that could slow it down. They also
guarantee the efficient and effective operation of the database.
3. Data security: DBAs are in charge of making sure that data is safe and shielded from
theft, loss, and illegal access. They put security measures in place including backups,
access limits, and encryption.
4. Disaster recovery planning: DBAs are in charge of creating and putting into action
disaster recovery plans to make sure that vital data can be restored in the case of a
disaster.
5. Identifying and fixing database problems, such as performance problems, errors,
and data corruption, is the responsibility of DBAs.
6. Taking care of database backups and recovery: DBAs are in charge of securing data
and restoring it if it is lost or corrupted.
7. Data validation and verification techniques are used by DBAs to guarantee that data
is correct, consistent, and dependable.
DBAs also try to stay current with new technology and trends in database management in
addition to these duties. To guarantee that the database is integrated with other IT systems
and supports the aims and objectives of the firm, they work along with other IT experts,
such as network administrators and software developers.
Database administrators use a variety of programs and equipment to perform their duties.
Here are some examples:
There are several different types of database administrator (DBA) roles, each with different
responsibilities and areas of focus. Here are some of the most common types of DBAs:
1. Database Development DBA: This type of DBA focuses on the design, development,
and implementation of database systems. They work closely with software
developers and other IT professionals to ensure that the database supports the needs
of the organization and meets performance and scalability requirements.
2. Database Production DBA: This type of DBA is responsible for the ongoing
maintenance, optimization, and management of production database systems. They
ensure that the database is available, reliable, and secure, and work to resolve any
issues that arise.
3. Database Backup and Recovery DBA: This type of DBA is responsible for ensuring
that database backups are performed regularly and that data can be recovered in
case of data loss or corruption. They work to develop and test backup and recovery
strategies and procedures to ensure that data is always available and recoverable.
4. Database Security DBA: This kind of DBA is in charge of establishing and upholding
security precautions to guard the database against illegal accessibility, theft, or loss.
To protect sensitive data, they seek to create access controls, encoding, and various
other security measures.
5. Data Architect: This type of DBA focuses on the design and management of data
models and database architectures. They work to ensure that the database system is
designed to meet the organization's needs and can scale as needed.
6. Data Warehouse DBA: The design, development, and management of data are the
responsibilities of this kind of DBA warehouse systems. They work to ensure that
data is properly stored, organized, and accessible for reporting and analysis.
7. Cloud Database Administrator: This type of DBA specializes in managing database
systems that are hosted in the cloud. They are responsible for configuring and
managing cloud-based database services such as Google Cloud SQL, Microsoft Azure
SQL Database, or Amazon RDS.
4.1.1.2 Network Architects
1. Designing network architecture: Network architects plan and design the overall
network infrastructure for an organization, including the hardware and software
components required for the network to function effectively.
2. Evaluating network performance: Network architects monitor and analyze the
performance of the network, looking for areas where improvements can be made
in terms of speed, reliability, and security.
3. Recommending improvements: Based on their analysis of network performance,
network architects recommend changes and improvements to the network
infrastructure to optimize performance and address any issues.
4. Implementing network infrastructure: Once a network design has been developed
and approved, network architects oversee the implementation of the infrastructure,
working with system administrators and network engineers to ensure that the
hardware and software are properly installed and configured.
5. Managing network security: Network architects are responsible for ensuring that the
network is secure, implementing measures to protect against cyber threats and
unauthorized access.
6. Keeping up-to-date with emerging technologies: Network architects keep abreast
with new developments and ideas in network architecture, evaluating new products
and services that may be beneficial to their organization.
A web architect is a professional who designs and oversees the development and
implementation of web-based applications, systems, and websites. Web architects work
with other IT professionals, including web developers, designers, and system
administrators, to develop and maintain web-based applications that meet the needs of an
organization or business.
1. Designing web-based systems and applications: Web architects design and plan the
architecture of web-based systems and applications, including the hardware and
software components required for the system to function effectively.
2. Evaluating web application performance: Web architects monitor and analyze the
performance of web-based applications, looking for areas where improvements can
be made in terms of speed, usability, and user experience.
3. Recommending improvements: Based on their analysis of web application
performance, web architects recommend changes and improvements to optimize
the performance and user experience of the web application.
4. Implementing web applications: Once a web application design has been developed
and approved, web architects oversee the implementation of the application,
working with web developers and system administrators to ensure that the
hardware and software are properly installed and configured.
5. Managing web application security: Web architects are responsible for ensuring that
web-based applications are secure, implementing measures to protect against cyber
threats and unauthorized access.
6. Keeping up-to-date with emerging technologies: Web architects keep abreast with
new developments and ideas in web architecture, evaluating new products and
services that may be beneficial to their organization.
Types of Web architecture with Examples
Web architecture refers to the design and structure of web applications, these includes the
technologies used to build them. Here are some types of web architecture:
1. The client-server approach serves as the foundation for the world wide web's
architecture.
2. The three-tier architecture used by many web applications, The application layer is
constructed using JavaScript, HTML, and CSS, whereas the presentation layer is
constructed using a programming language like PHP or Ruby, and the data layer is
typically a database like MySQL or MongoDB.
3. The MVC architecture used by web frameworks like Ruby on Rails and Django.
4. The SOA architecture used by many enterprise applications, where individual
services are built using SOAP or RESTful web services.
5. The microservices architecture used by companies like Netflix and Amazon, where
small, independently deployable services are used to build complex applications.
4.1.1.4 Graphic Artists
A graphic artist is a professional who creates visual designs and artwork for a variety of
media, including print, digital, and multimedia platforms. Graphic artists use a range of
tools and software to create visual concepts, designs, and layouts that communicate ideas
and messages in a visually appealing way.
1. Creating visual designs and artwork: Graphic artists create visual designs and
artwork for a variety of media, including logos, illustrations, packaging,
advertisements, and websites.
2. Understanding client needs: Graphic artists work closely with clients to understand
their needs and requirements, and to develop visual designs that communicate the
desired message effectively.
3. Using design tools and software: Graphic artists use a range of design tools and
software to create visual designs and artwork, including Adobe Creative Suite,
CorelDRAW, Sketch, and Inkscape.
4. Collaborating with other professionals: Graphic artists collaborate with other
professionals, including web developers, copywriters, and marketing teams, to
develop visual designs that meet the needs of the client.
5. Keeping abreast of new design trends: Graphic designers keep abreast of new design
trends and techniques, experimenting with new tools and techniques to create
innovative and engaging visual designs.
Types of graphics artists include:
1. Traditional artists who use traditional media like pencil, pen, paint, and paper, as
well as
2. Digital artists who use software tools like Adobe Photoshop, Illustrator, and 3D
modeling software.
Graphics artists are professionals who create visual designs using digital or traditional
media. Here are some:
1. Illustrators: These artists specialize in creating drawings, paintings, and other visual
representations for books, magazines, advertisements, and other media.
2. Graphic Designers: These artists create visual designs for websites, apps, logos,
brochures, posters, and other print or digital media.
3. 3D Artists: These artists create three-dimensional models and animations for use in
video games, movies, and other media.
4. Motion Graphic Designers: These artists specialize in creating animations, videos,
and other moving visual designs for film, television, and other digital media.
5. Game Artists: These artists create the artwork, 3D models, and animations used in
video games.
6. Visual Effects Artists: These artists create digital special effects and visual
enhancements for movies, TV shows, and other media.
7. User Interface (UI) Designers: These artists create visual designs for the user interface
of software applications and websites.
8. Concept Artists: These artists create sketches, drawings, and other visual
representations to help visualize the concepts and ideas for movies, video games,
and other media.
9. Product Designers: These artists create visual designs for physical products, such as
consumer electronics, furniture, and home goods.
10. Advertising Artists: These artists create visual designs for advertisements, including
billboards, print ads, and online ads.
4.1.1.5 Security Experts
Security experts are professionals who specialize in preventing illegal access, theft,
destruction, and interruption to computer systems, networks, and digital information.
They work to identify and mitigate security threats to prevent cyber-attacks and protect
sensitive data.
The primary responsibilities of security experts include:
The organization's entire security plan must be monitored by the information security
manager to make sure it complies with the organization's objectives. They are also
responsible for managing security policies, procedures, and practices.
Identification and analysis of security risks, weaknesses, and dangers to the a company's
systems are the responsibility of the security analyst networks. They are also responsible
for developing and implementing security controls and measures to mitigate those risks.
For the organization's systems and networks, the security architect is in charge of creating
and implementing security systems and solutions. They collaborate closely with other IT
experts to make sure security is built into every component of the company's technological
architecture.
iv.) Network Security Engineer
The network security engineer is in charge of creating and putting into practice security
solutions for the organization's network infrastructure. They are responsible for ensuring
that network devices, such as routers and firewalls, are properly configured and maintained
to prevent unauthorized access.
The cybersecurity specialist is responsible for protecting the organization's systems and
networks from cyber threats, such as malware, phishing, and hacking attacks. They are in
charge of keeping an eye out for suspicious activity on the organization's networks while
reacting to security incidents when they happen.
The SOC analyst is in charge of keeping track of security threats and incidents on the
company's systems and networks. They are responsible for analyzing security alerts,
investigating security incidents, and responding to security incidents in real-time.
The compliance officer is responsible for ensuring that the organization complies with
relevant security and privacy regulations, such as HIPAA, GDPR, and PCI DSS. They are
responsible for conducting security audits, ensuring that security policies and procedures
are followed, and maintaining documentation to demonstrate compliance.
There are various types of security experts who specialize in different areas of cybersecurity.
Here are some of the most common types:
Here are some examples of security experts and their roles in cybersecurity:
1. Bruce Schneier: Cryptographer and security expert known for his work in
cryptography, privacy, and security engineering.
2. Kevin Mitnick: Former hacker turned cybersecurity consultant known for his
expertise in social engineering and penetration testing.
3. Mikko Hyppönen: Cybersecurity researcher and speaker known for his work in
malware analysis and tracking cybercrime groups.
4. Eugene Kaspersky: Founder of Kaspersky Lab, a cybersecurity company known for
its antivirus software and threat intelligence research.
5. Richard Clarke: Former national security advisor and cybersecurity expert known
for his work in cybersecurity policy and strategy.
6. Dan Kaminsky: Security researcher known for his discovery of a serious Domain
Name System (DNS) vulnerability.
7. Avivah Litan: Gartner analyst and cybersecurity expert known for her research in
fraud detection, identity and access management, and other areas of cybersecurity.
8. Troy Hunt: Security researcher and creator users can check to see whether their
personal information has been compromised in data breaches by visiting the Have
I Been Pawned website.
9. Brian Krebs: Security journalist and investigative reporter known for his coverage
of cybercrime and cybersecurity issues.
10. Joanna Rutkowska: Cybersecurity researcher known for her work in rootkit
detection and defense, as well as her development of the Qubes OS, a security-
focused operating system.
Security experts are responsible for protecting computer systems, networks, and data from
potential security breaches. They assess security vulnerabilities, develop and implement
security plans and protocols, monitor security systems, investigate security breaches, and
stay current on new security risks and trends to make sure their security solutions are
efficient and current.
System builders are professionals who specialize in building and customizing computer
systems for their clients or organization. They work to understand the needs of their clients
or organization and select the appropriate hardware and software components to build a
customized computer system that meets those needs.
1. Understanding client needs: System builders work closely with clients to understand
their needs and requirements for a customized computer system.
2. Selecting hardware components: Based on the client's needs, system builders select
the appropriate hardware components, such as processors, memory, hard drives,
and graphics cards, to build a computer system that meets those needs.
3. Selecting software components: System builders also select software components,
such as operating systems and applications, to install on the computer system to
meet the client's needs.
4. Building the computer system: Once the hardware and software components have
been selected, system builders assemble the computer system and install the
software.
5. Testing and troubleshooting: System builders test the computer system to ensure
that it is functioning properly and troubleshoot any issues that arise.
6. Providing support and maintenance: System builders ensure that the computer
system receives continuing support and upkeep so that it can continue to run
efficiently over time.
In summary, system builders are responsible for building and customizing computer
systems for their clients or organization. They work closely with clients to understand
their needs and requirements, select the appropriate hardware and software
components, assemble and install the computer system, test and troubleshoot any issues
that arise, and provide ongoing support and maintenance to ensure that the system
continues to function effectively over time.
The role of a network administrator includes a wide range of tasks and responsibilities,
such as:
The role of a security administrator may vary depending on the organization and its size,
but their general responsibilities typically include:
In some cases, software integrators may work with application programming interfaces
(APIs), which are collections of rules, resources, and guidelines that let various software
programs converse and cooperate with one another. They may use middleware, which is
software that acts as a bridge between different software applications, to facilitate
communication and data exchange between systems that may not natively support each
other.
Overall, software integrators play a crucial role in enabling different software systems to
work together seamlessly and efficiently, helping organizations achieve improved
operational efficiency, data consistency, and overall system performance.
A system analyst is a specialist in evaluating and creating information systems that are
tailored to an organization's requirements. They are essential to the development and
implementation of new systems or the improvement of existing systems.
A system analyst conducts thorough research, data analysis, and feasibility studies to
determine the technical and economic viability of proposed solutions. They may also assess
risks and make recommendations for risk mitigation strategies. They create system models,
flowcharts, and diagrams to visually represent the proposed system's functionality and
design.
In addition to their technical skills, system analysts also possess strong communication and
interpersonal skills. They need to effectively communicate complex technical concepts to
non-technical stakeholders and work collaboratively with cross-functional teams. They
may also provide training and support to end-users during system implementation and
post-implementation phases.
Overall, a system analyst plays a critical role in making certain that Information systems
are designed, developed, and used in a manner that meets the organization's needs,
improves operational efficiency, and supports strategic objectives.
A program analyst is a professional who plays a critical role in analyzing and evaluating
the effectiveness and efficiency of software programs and systems within an organization.
They typically work in the information technology (IT) department and collaborate with
various stakeholders, including software developers, business analysts, project managers,
and end-users.
A business analyst is a professional who works in various industries to analyze, assess, and
improve business processes, systems, and strategies. They typically work as a bridge
between business stakeholders, such as clients, managers, and end-users, and the technical
team, such as IT developers, to gather requirements, identify business needs, and
recommend solutions to drive business success.
The primary role of a business analyst involves conducting research, data analysis, and
process mapping to identify inefficiencies or areas for improvement in business operations.
They use their analytical skills to gather, document, prioritize requirements from
stakeholders, including business goals, user stories, and use cases. They also conduct
feasibility studies, cost-benefit analysis, and risk assessments to evaluate potential solutions
and make recommendations to optimize business performance.
In addition, a business analyst may also be responsible for creating and maintaining
documentation, such as business process models, flowcharts, and technical specifications.
They may collaborate with cross-functional teams, such as project managers, developers,
and quality assurance testers, to ensure smooth implementation of solutions and monitor
progress against business objectives.
A business analyst needs to have excellent communication skills, both verbal and written,
as they often facilitate meetings, presentations, and workshops with stakeholders to gather
and validate requirements. They should also have a solid understanding of business
concepts, processes, and technologies, as well as the ability to adapt to changing business
environments and evolving technologies.
Overall, the role of a business analyst is critical in helping organizations identify and address
business challenges, optimize processes, and achieve their strategic goals by leveraging their
analytical skills, domain knowledge, and effective communication.
Requirement analysts work closely with project managers, software developers, quality
assurance teams, and other stakeholders to ensure that the project or system meets the
desired objectives and aligns with the needs of the end-users. They may use various
techniques such as interviews, workshops, surveys, and documentation analysis to gather
and validate requirements, and may use modelling tools and techniques to create visual
representations of requirements, such as use cases, flowcharts, and data flow diagrams.
Infrastructure analysts may work in various industries, such as information technology (IT),
telecommunications, transportation, energy, or public utilities. They often collaborate with
other IT or engineering professionals, stakeholders, and business units to gather
requirements, assess needs, and implement changes to ensure the smooth operation of
infrastructure systems and support the overall business objectives of an organization.
Skills commonly associated with an infrastructure analyst role include technical expertise in
infrastructure technologies, data analysis, problem-solving, project management, risk
assessment, communication, and strategic planning. They may also need to stay updated
with the latest trends, technologies, and best practices in infrastructure management to
ensure that systems are secure, efficient, and resilient.
Change management analysts typically work closely with senior leadership, project teams,
and other stakeholders to assess the impact of proposed changes, develop change
management plans, and execute strategies to ensure smooth transitions. They may conduct
change readiness assessments, develop communication plans, create training materials, and
provide guidance on managing resistance to change. They may also monitor and evaluate
the progress of change initiatives, gather feedback, and make adjustments as needed.
A system analyst is a professional who plays a key role in analyzing, designing, and
implementing information systems to meet the needs of an organization. The skill set
needed by a system analyst typically includes:
Summary
Exercises
2. What tools and technologies are commonly used by network administrators for network
monitoring and management?
4. What are the current trends and challenges in cybersecurity, and how can a security
administrator stay updated with the latest threats and technologies?
5. What are the key responsibilities of a webmaster in managing and maintaining a website?
6. How do you ensure the website's usability, accessibility, and performance across
different browsers and devices?
7. What tools and technologies are commonly used by webmasters for website
development, testing, and maintenance?
8. What are the common challenges and considerations in integrating third-party software
or external APIs into a software system?
9. How do you conduct program assessments, performance measurement, and risk
management to ensure program success and compliance?
10. What tools and technologies are commonly used by program analysts for data analysis,
reporting, and program management?
11. What is the role of a requirement analyst in the software development life cycle (SDLC)?
12. How do you gather, document, and prioritize software requirements from stakeholders
to define the scope of a project?
13. What are the techniques and methods used by requirement analysts for requirements
elicitation, validation, and verification?
14. What are the main responsibilities of a project manager in planning, executing, and
controlling projects?
15. What tools and technologies are commonly used by project managers for project
management and collaboration?
References
Heneman, R. L., Tansky, J. W., & Camp, S. M. (2000). Human Resource [ ] p Management
Practices in Small and Medium-Sized Enterprises: Unanswered Questions and Future
Research Perspectives.
Ill[. (n.d.).
industrialrelationishim. (n.d.).
WILL KENTON, J. M. A. B.-C. (2023, April 5). Human Resources (HR) Meaning and
Responsibilities.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and
Control Your World. W. W. Norton & Company.
Journal Article:
Hyppönen, M. (2016). In Code We Trust: How to Protect Your Data in a World Full of
Hackers. Scientific American, 314(4), 46-51.
Website:
Krebs, B. (2014, December 19). Target Hackers Broke in Via HVAC Company.
KrebsOnSecurity. https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-
company/
Magazine Article:
Litan, A. (2019, May). How to Prevent Fraudulent Account Takeovers. Credit Union
Journal, 88(5), 20-22.
Newspaper Article:
Clarke, R. (2017, May 17). We Need a New Manhattan Project to Combat Cyber Threats.
The New York Times. https://www.nytimes.com/2017/05/17/opinion/cybersecurity-
manhattan-project.html
Note: The above examples are just for reference purposes. Make sure to consult the APA
manual or other relevant resources for more detailed information on formatting your
references.
Systems Designer
The role, salary, software and skills of a video game systems designer
https://www.cgspectrum.com/career-pathways/systems-designer
Barker, D. (2016). Web content management: Systems, features, and best practices. "
O'Reilly Media, Inc.".
Cassidy, A. (2016). A practical guide to information systems strategic planning. CRC press.
Dennis, A., Wixom, B., & Tegarden, D. (2015). Systems analysis and design: An object-
oriented approach with UML. John wiley & sons.
Meredith, J. R., Shafer, S. M., & Mantel Jr, S. J. (2017). Project management: a strategic
managerial approach. John Wiley & Sons.
Rainer, R. K., & Prince, B. (2021). Introduction to information systems. John Wiley & Sons
Overview
This chapter provides the basic understadning of the integral roles in which computer affect
our daily live in mordern society/world we live. Different ways that computers and other
digital technology have changed how businesses operate, including marketing, human
resources, and accounting will also be discussed, going over how technology can enhance
these aspects of productivity, accuracy, and communication.
Objectives
This chapter focus on providing students with the basic knowledge of computer software.
At the end of this chapter, students should be able to:
a) Gain familiarities of some of the most important uses of computers in business
organization.
b) Describe some various key roles of computers in modern society.
c) Understand how computers have changed the way we communicate, work, and live
in modern society.
d) Identify the effects computers had on economic development and growth
e) Identify how the deployment of computer affect economic growth in globalization
and international trade.
5.1 Role of Computer in Business Organizations
Business organizations use computers to cary out their operations in effective and efficient
manner. Modern businesses cannot function without computers, which are important to
almost every aspect of daily operations. A computer is an important device which
businesses use for product design, marketing, accounting and human resources. This makes
it imperative for business owners to acquire suitable computer hardware, software and
auxilliary devices for their organization.
Many software can be installed on computers to make business opeations easier, faster and
more efficient. Some of the main uses of computers in business organizations are in the
following as:
1. Business Communication Tools
Businness oganizations use computers to communicate both internally and externally. This
is achieved by using various software, applications and services provided by personal
computers, network servers and the Internet. Businesses can interact quickly and effectively
with customers, suppliers, and employees thanks to computers and communication
technologies.
Business organizations use computers to establish and maintain contact with clients. The
clients include customers who patronize the products and services offered by business
organizations and service providers who render services that support the operations of
businesses. Contact between business organizations and clients take place in the form of
communication using via email, instant messaging, social networks (Facebook, Whatsapp,
Instagram and Skype), video conferencing (such as Zoom and Google Meet) and
collaboration software. Businesses who maintain reliable communication channel with
clients are more reachable when clients have one problem or the other to resolve. They
are also more responsive to the concerns of their clients. Clients can easily enquire about
the details of products and services offered the organization as well as the terms and
conditions of service. They are also able to highlight grey areas and seek for more
explanation and better clarification. An good communication channel also makes it easier
for clients to enjoy timely, effective and efficient customer support services. Clients have
access to regular updates about new products and services, changes in terms and conditions
of service and other new developments concerning the business.
In addition to aiding communication between a business and its clients, computers also
supports communication between a business and its employees. Managers can easily give
instructions or pass information to their staff by sending email or using any other approved
communication platform instead of wasting time, effort and logistics on in-person
meetings. This saves time, effort, resources and improves internal communication within
the organization.
3. Accounting
Business organizations deploy accounting software to quickly and accurately have a narrow
and broad view of their financial situations. Accounting software provide managers with
information on an organization's financial status. Managers request financial information
from the software by simply providing few inputs related to the desired information and
clicking relevant buttons. Computers are also used to create invoices; keep track of debtors
and creditors; managing employee payroll, as well as processing tax related matters. The
use of computers relieves accountants of rudimentary or low-level tasks and enables them
to focus on higher level picture of an organizations financial transactions.
4. Managing Records
Prior to the advent of computers, businesses organizations store their record in filing
cabinets, which occupy large space and can store a relatively small amount of information.
Computers occupy significantly less space compared to filing cabinets and can store large
amount of information several times the volume that filing cabinets can contain. Businesses
use computer workstations and servers to store, organize and process huge amounts of
information which they can easily access or share at any time.
Computers also provide business organizations with the liberty to decide the way in which
they want to store data. Data may be stored in a central location using a dedicated server
which other computers (known as clients or workstations) can access whenever there is a
need to do that. Access and manipulation of information on servers by clients computers
or workstations depends on the permissions set by system administrators. In other words,
users on workstations must be assigned access rights and privileges before they can obtain
information from or manipulate the contents of servers. On the other hand, business
organizations may implement record management using peer-to-peer approach whereby
enterprise data is stored locally on individual computers in the organization. A business
organization may also subscribe to cloud services whereby some of its data is store in the
cloud far away from its actual operating environment.
Digital record management provides high storage capacity, faster data access as well as
easy manipulation and efficient sorting. Storing data in a well-protected database provides
secure storage and prevents data loss.
Computers provides businesses with presentation software such as Microsoft Power Point
which is used to create slides either for internal use or external uses. Presentation slides
may be used internally to enhance interaction during meeting, seminar or training. External
use of presentation slides include proposal presentation to clients and meetings with
contractors.
6. Research
Computers provides business organizations with access to the Internet through which they
can connect to search engines and proprietary databases. This enables businesses to explore
trends in the industry trends, search for patents and trademarks as well as identify potential
clients and competitors.
7. Media Production
Businesses can use computers to produce graphics, video and audio files. These media
support training, advertising and marketing efforts of an organization. Multimedia files
have immense interactive quality and are capable of gaining human attention quickly.
8. Product Design
Prroduct designers use computers to create new products and services quickly, efficiently,
and accurately. Computers have transformed product creation by allowing designers and
engineers to work more productively, lowering costs and the time to release products into
the market. It also enhances the quality of the final product.
In today's world, computers are practically everywhere, and their influence is felt in almost
every facet of our life. Electronic computers were originally designed and built to perform
difficult and complex mathematical operations. This has changed over time as computers
have assumed broader and integral roles in the modern society. The way we live, work,
and connect with one another is greatly influenced by computers, from communication
and education to entertainment and healthcare. Computers are now used in virtually every
aspect of human endeavours ranging from business, education, healthcare and governance
to mention but a few. Nowadays, computers perform a wide array of functions while
playing critical roles in our personal lives and businesses. This is because computers offer
fast, efficient and liable processing of large amounts of data thereby enhancing the ease
and speed of operations and supporting reliable decision making. Smartphones have
transformed how we gather, use, and distribute information, making it simpler than ever
to interact with others and have access to a variety of information and resources. The
following are some of the areas where computers are widely deployed.
1. Business
Computers are critical to the operation of every modern business. Business organizations
deploy computers for employee record management, account operations, payroll,
inventory control, advertising, creation of business documents, presentation and report
generation. Other business applications of computers include marketing, sales and product
development. Computers also support effective communication within and outside an
organization leveraging on technologies such as e-mail, instant messaging, social networks
(Facebook, Whatsapp, Instagram and Skype), video conferencing (such as Zoom and
Google Meet) and collaboration software. They help business operators to promote their
products and services and enable them to interact directly direct with customers.
Computers aid tourism by enabling travelers to study travel schedules, compare route
information, and purchase travel tickets. They are also used to search and book rooms in
hotels or via unconventional means such as Air BnB. Computers can be used to plan and
manage activities such as trips, excusions, tours and events.
2. Education
Computers also enable learners to access educational resources in text, audio and video
formats from online databases and repositories. Resources such as e-books, journals,
conference and instructional videos can be downloaded from intranet and internet sources.
This supports regimented learning as students can go through the same material several
times and at their convenience. It is also important to mention that a significant amount
of these resources are available free of charge.
Computers are useful tools for managing students and personnel records in educational
institutions. They are used for evaluating students performance through online
examinations, assignments and projects. Computers are also used to record, process and
disseminate information on the academic performance of students.
3. Healthcare
Computers are playing revolutionary roles in healthcare operations and management. The
evolution of electronic medical information systems makes storage, processing and
dissemination of medical records easier, faster and efficient. It also provides easy access,
manipulation and organization of large and complex medical data. Computer software
can be used to aggregate and analyzed diverse and complex patient data to generate
information that assist physicians in diagnosing illnesses and predict a patient's susceptibility
to diseases.
Computer-based medical systems are used extensively in the laboratory, theatre and
treatment rooms to control equipment, monitor heart rate and blood pressure. High-tech
medical equipment are critical components of intensive care units in hospitals. Doctors and
other medical personnel can easily monitor patients on admission 24/7 via computer-based
systems even if they are not physically present with the patients.
Modern medicine production also rely extensively on computers. Computers and software
are used to analyze data and other parameters during drug production. They are also used
to analyze information obtained during trials for detecting the safety and efficacy of new
drugs. Doctors leverage on computers and particularly the Internet to obtain information
on new medicines and novel treatment procedures. They are also able share information
on diseases, pattern of spread and treatment procedures with other medical professionals.
Computer is the major driver of electronic commerce, which is a system of trade whereby
exchange of goods and services take place without any physical contact between buyers
and sellers. Sellers display their products and services on websites hosted on the Internet.
Prospective buyers visit the websites to view the products and services displayed as well as
the prices, terms and conditions of service. A buyer makes his choice of product or service
and pays online. The purchased items will be delivered after the seller confirms payment.
Electronic commerce enables sellers to reach a wider audience without the need for
physical stores, payment of large number of staff or expensive advertisement via traditional
media. Buyers ae also able to compare products and prices, read reviews of previous
buyers, and choose their preferred mode of delivery. Popular electronic commerce
platforms include Jumia, Konga, eBay and Amazon. Internet-based websites such as
Craigslist, eBay, and social media platforms support trade and advertisment, enabling third-
party entities to advertise their products and services. This provides businesses with a cost
effective method to reach a global audience of prospective buyers.
5. Government
Government agencies use computers for collection, storage, processing and dissemination
of data and information. The use of computers enhances the quality, effectiveness and
efficiency of services rendered by these agencies. For example, computers are used in urban
planning to design and plan new townships and resident locations. Law enforcement
agencies use computers to store, process and disseminate information on criminals and
their activities. They also use computers to track and screen suspects based on previously
collected information. Computers can be used to collect traffic related data, analyze the
data and disseminate information on traffic flow at any time of the day. Government
revenue agencies use computers for effective, efficient and transparent revenue collection.
Individuals and corporate entities can pay taxies and levies directly to government coffers
using various online payment platforms. Other uses of computers in government
operations include internal and external communication, routine administrative purposes
and access control in sensitive government establishments.
6. Science and Technology
Scientists and mathematicians were the first set of professionals to use computers as a
working tool. Mathematicians use computers to solve difficult, complex and mentally
intensive calculations, while scientists deploy computers for research and disseminating
information with colleagues around the world. Computers are used in product design,
testing and simulation that would otherwise be expensive and dangerous if carried out in
real life directly by humans. Statistical and data analysis software installed on computers
aid collection, categorization, analysis, and storage of large amounts of data. This will be
highly time consuming, expensive or almost impossible if carried out manually.
Global and regional weather forecasting is complex activity which depending on a large
number of factors that change from time to time. Computers are used to collect and process
information received from satellite and other sources. They are also used to perform
complex calculations for predicting future weather conditions. The processing of large
amounts of meteorological information is beyond the capacity of the human brain.
7. Publishing
Graphic design applications, publishing software and word processors are available on
computers to aid the production of leaflets for marketing campaigns, newsletters,
magazines, newspapers and books. These publications may be in hard-copy or electronic
versions. These result in faster and effective dissemination of information.
Nowadays computers are widely deployed in media and entertainment industry. Software
such as Corel Draw, Poster Maker and Adobe Express are used for graphic designs, paintings
and drawings. Computers are also used to edit, copy, send, and print photographs.
Computers aid the production of music and videos. They are used by music and video
producers to create and edit content. Audience use computers to listen to music and watch
videos. Digital games consoles such as the PS series (PS3, PS4 or PS5) are used for playing
games by connecting them to computers.
9. Communication
Computers software and video conferencing services provide simplified, easy and cost
effective communication over the Internet Platforms such as WhatsApp, Skype and Zoom
enable families and friends to connect and communicate with audio and video. Computers
are equipped with in-built microphones and webcams that enhance the quality of
interaction among the communicating parties. Businesses, professionals and social groups
can hold meetings among participants who are dispersed in different locations. Radio and
television stations can interview guests without the physical presence of the anchor and
crew with the guests. Older technologies such as email and instant messaging are also
widely used for communication nowadays.
11. Transport
There is an increase in automation of road rail, air and water transportation. Computers
are widely used to control and manage safety and navigation systems. Driving, flying and
steering have become semi or fully automated thanks to the availability of computers.
Monitoring systems in cars, trains, aircraft and ships use computers to detect and report
problems related to fuel, oil or mechanical components.
12. Navigation
The integration of computers with Global Positioning System (GPS) technology and
satellites makes it easy to identify an object's location and track its movement using a
digitized map. Digitized maps make it easy to identify amenities and interesting places
within a geographical location.
Professionals use computers to work remotely from any location without any need to
report at the actual business or work environment. Many organizations adopted remote
work culture during Covid-19 epidemic to fulfill the social distance requirement imposed
by governments around the world. This enables many businesses and organizations to stay
afloat as workers were able to perform their tasks as well as collaborate with colleagues
via computers and Internet. Remote working offers flexibility and convenience as workers
can do their jobs and interact with colleagues at any time of the day and without going
to a traditional office. Computers and specialized software also enable managers to
monitor productivity without having physical access to workers.
14. Military
The armed forces (army, navy and air force) engage in extensive use of computers for
training and analysis of intelligence data. Military training software and applications are
available to simulate battle field scenarios and enable officers to learn new tactics without
actually engagement in any physical activities. Strategies and tactics that have been learned
and perfected using computer software can now be demonstrated in actual practical or
real life scenarios. This reduces the finances and other logistics required for training.
Intelligence data are usually voluminous and come from diverse sources. Analysis software
enables intelligence officers to aggregate and analyze large amounts of vital and sensitive
data to generate useful information for reliable decision making.
Computers are integral components of smart defence technologies such as guided missiles
and drones as well as defence systems for tracking and destruction of projectiles from
enemy forces. Computer-based defence systems also integrate with other technologies,
such as satellites, to capture and analyze information on a geographocal area. They also
provide communications and support necessary for tanks and fighter jets to target enemy
forces with high accuracy and precision.
Computers have revolutionized the way people meet and socialize with each other. The
evolution of social media platforms allows people to meet and interact irrespective of
geographical. People who are in different locations around the world and who have never
met physically can connect with one another online, exchange text, audio and video
communications in real time. They can share videos, memes and photographs with one
another. Dating sites and apps help interested persons to meet other people in order to
find love and romance.
The Internet enable people who share similar interests to connect via online groups. Group
members use Internet-enabled computers and mobile devices to interact and exchange
information. People use Blogs to share a wide array of of views, updates, and experiences.
Professionals and expert groups use online forums to discuss specific or general issues.
16. Security and Surveillance
Computers are critical components of surveillance technologies used for monitoring people
and goods. Biometric recognition software installed on computers are used in border
control posts to prevent entry of unauthorized persons into a country on a sensitive
physical environment. The use of biometric passports easily detect entry of illegitimate
people into a country or passenger airplane. Border patrol officials and other security
personnel use face recognition technology to easily identify criminals.
Speed cameras or police cars perform automated scanning of vehicle number plates to
detect traffic offenders and violators of other regulations. Computer and Internet
technologies have also increased the sophistication of private security systems. CCTV
systems and other home security appliances have become more effective than before.
Nowadays, people can keep track of events in their homes real time via computer and
mobile devices.
Technology plays important roles in economic development of many regions, cities, and
countries. Advances in technology lead to higher productivity, efficiency and improved
quality of goods and services.
The use of computers has also transformed (some) manufacturing floors and the inventory-
management procedures used by many businesses. ATMs, voicemail, and websites are
notable examples of organizations that today provide customer service by automated
technology rather than human interaction. Of course, a lot of new items and some whole
new sectors have also been developed, such as Internet access. Businesses can analyze and
communicate much more quickly today than they could, say, ten or two decades ago. In
fact, the advances have been enormous. For instance, if computer economy had improved
as substantially over the past thirty years as it has in some other areas, you could currently
drive your car cross-country on approximately four milliliters of gas.
Computer have a long list of benefits to the economy so I’ll list just a few of the top ones:
The growth of new industries that boost the nation's economy and provide millions
of people with high-paying jobs (such as digital media, software development,
hardware manufacturing, and IT support services).
Businesses can increase efficiency by automating processes with computers, saving
time and money compared to doing manual procedures. Increased efficiency and
productivity result from this, which can spur economic growth.
Increased worker productivity as a result of improved and more reliable
communications (the internet). The internet also opens up new sales channels that
let you sell your goods globally over the internet.
Lower costs for commerce ( e-commerce removes the need for large warehouses
and physical stores)
Reduced costs in manufacturing due to automation (industrial robots)
Greater efficiency and lower costs for research and development (computer aided
design software). For instance, you may model the stresses that an airplane would
encounter during flight using a computer instead of an expensive wind tunnel.
Lowering the price of creating a plane.
Many tasks can be completed more effectively by algorithm than by guesswork; these
tasks call for the use of computers. There will be less trouble introducing these
technologies as they get cheaper, faster, easier, and more intuitive, and everyone will
benefit more as a result.
Computers have benefited the economy in many ways, but they have also presented
significant difficulties in their transformational role.
Exercises
1. What are some of the most important uses of computers in business organization?
2. How did computers changed the way we interact, work, and live?
3. What are some emerging computer technology trends and advances that might
have an impact on business organizations?
4. What are some key roles of computers in modern society?
5. What are some of the cultural and social effects of computers in modern society?
6. How have computers changed the way we communicate, work, and live in modern
society?
7. What are some emerging computer technology trends and advancements that might
have an effect on modern society?
8. What effects have computers had on economic development and growth?
9. What are some risks and difficulties brought on by the growing reliance on
technology and computers for economic growth?
10. How does the deployment of computers in globalization and international trade
affect economic growth?
References
Eszter Hargittai (2005), The Digital Divide: Current and Future Research Directions,
New Media & Society, Vol. 7, No. 1, pp. 15-28.
Idris Adjerid and Alessandro Acquisti (2016), Privacy Concerns in the Digital Economy,
Journal of Economic Perspectives, Vol. 30, No. 2 Spring, pp. 171-194.
Overview
This chapter provides adequate knowledge on information systems and as its relates to
business enterprise. It highlights the technology drivers of information systems and the
process of developing information systems. It presents business value of information
systems and how it affects organisation’ s operations and processes for productivity. Key
concepts and definitions of terms were discussed.
Objectives
This chapter focuses on providing students with the basic knowledge of the state-of-the-art
in developing information systems to support organisation’s business operation and
processes. Specifically, students should be able to:
a) define information systems clearly.
b) list and explain the roles of information systems in relation to business enterprise.
c) list and explain the various types of information systems.
d) understand how the choice of information systems should align with managerial level
processes in decision making within an organisation.
e) list and discuss the technology drivers that give rise to business prospect within the
organisation
f) get familiarise with process of developing information systems.
• Physical or abstract;
• Open and closed;
• Subsystem and supersystem; and
• Natural and man-made.
The physical system consists of actual objects that can be static or dynamic in character
while abstract system is the concept or model of physical system. While a closed system is
shielded from environmental influences, an open system interacts with the environment
continuously. While the supersystem is thought of as a large and complex system, the
subsystem is a component of the overall system. There are systems that exist in their natural
habitat or environment made by nature and is referred to as natural systems (ecosystems),
and there are systems made by people and are referred to as man-made systems. Examples
include transportation systems, network and communication systems, and other systems.
Information is the processing of raw facts or data into a form that is meaningful and useful
to take actions or decisions. For example, assume there is a set of data which is inventory
of product items in supermarkets for sales and the information that may relate to the data
is the sales of that product items on daily, week, monthly and yearly basis.
An organisation or business operates as a system, and each of its components can be divided
into smaller systems. The business can be broken down into the following systems:
operations, personnel, financial, commercial or marketing and information, in accordance
with organisational theory. Information has value only on the basis of using it for the
organisation’s objectives and purpose. The information flow must be well coordinated
within the organisational processes for good organisational performance.
Processes
IT
Information Comp
Systems uter
People Comp
uter
Netw
Datab
Support of
Strategies
Support for
Decision Making
a. Support for the Business Process: As a result, the information system is crucial to ensure
that interactions between different value chain activities, such as:
i. Input logistics concentrates on acquiring supplies and raw materials from vendors.
ii. Appropriate operations related to the conversion of raw materials into final goods
under the conditions of quality, time, and cost.
iii. Output logistics, which focuses on getting goods to customers.
iv. Use of marketing to identify client wants and obtain orders.
v. Service: actions taken to keep the terms of use for the sold product in place.
In the simplest terms, information systems manage company activities in the form of
requests made to customers and services provided to those customers in response to those
requests. Requests are made to customers as inputs, and services are provided to customers
as outputs.
b. A Support for Operation of a Business Enterprise: To provide quicker and more reliable
information, information systems are hosted in a computerised environment. By
providing timely and accurate information, maintaining and improving them, and
allowing for flexibility in how an organisation operates, information systems assist
business operations.
c. A Support for Decision Making: Information systems assist employees in making
decisions for their daily tasks. Additionally, it helps managers make decisions that will
help the company achieve its goals and objectives. Different mathematical models and
information technology tools are employed in order to adapt strategies to meet the
demands of competition.
d. Strategies for a Business Enterprise: Every company in the modern world operates in
a market that is competitive. To compete favourably in the global economy, businesses
must be able to use information technology tools to their fullest potential. Information
systems aid in the development of effective business plans that will help it compete in
the market.
A top-level executive of an organisation can plan and manage workflow and make business
decisions with the aid of an executive information system (EIS), often referred to as an
executive support system (ESS). It gives bosses better computational power and useful
display options. They can access information through static reports, graphs, and on-
demand textual content. Among other things, it aids in performance monitoring, rival
strategy tracking, and trend forecasting
The organisation's management uses a decision support system (DSS) to analyse the data
before making a decision. The sources of the data can be internal or external. For instance,
management may use information from external sources, such as market prices, when
determining the prices of a product. It aids decision-makers in their decision-making
process. Complex databases and spreadsheets may also be used to create models in
challenging and crucial circumstances. Decision support systems are very interactive and
use complex mathematical models and statistical techniques to deliver solutions.
c. Management Information System
The management uses the management information system (MIS) to offer routine summary
information so they can make choices. Different types of data are processed, including
those related to sales, purchases, and production that are consolidated in MIS. Typically,
internal sources are used to obtain this information. Managers and decision-makers create
summaries based on this data. Additionally, this system assists the organisation's marketing
and revenue departments in increasing operational effectiveness and monitoring the
organisation's progress.
d. Transaction Processing System
The transaction collection, update, and retrieval procedure are automated by the
Transaction Processing System (TPS). It successfully handles ordinary transactions. It makes
it easier for enterprises to carry out their everyday tasks without difficulties. Its data is
utilised to create reports. Depending on the demands of the organisation, the report may
be based on monthly, quarterly, yearly, or any other on-demand reports. This type of
information system's particular characteristic is that it improves the efficiency,
dependability, and consistency of commercial transactions. It manages an organisation's
record keeping. Payroll systems, billing systems, purchasing systems, and shipment of
records are some examples.
b. Enhanced decision-making
Information system provides real-time access to critical data and analytics, enabling
managers to make informed decisions quickly. By providing accurate and timely
information, IS can help managers identify trends, anticipate problems, and make more
effective decisions.
c. Increased competitiveness
Information system helps organisations gain a competitive advantage by providing insights
into customer preferences and behaviour, identifying market trends and opportunities, and
enabling faster and more effective responses to changes in the market.
d. Improved customer service
IS can help organisations improve customer service by providing real-time access to
customer information, enabling faster response times, and improving the quality and
consistency of customer interactions.
e. Better collaboration
By offering a platform for information exchange, communication, and teamwork on
projects, information systems improve collaboration among staff members, departments,
and business partners.
d. Reduced costs
Information system can help organisations reduce costs by automating routine tasks,
reducing errors and waste, and optimizing processes. By improving operational efficiency,
IS can also reduce labour costs and increase profitability.
The business value of an IS is significant, and organisations that leverage IS effectively can
achieve better operational efficiency, decision-making, and customer service. By optimizing
processes, automating tasks, and providing real-time access to critical data, IS can help
organisations compete effectively, grow, and achieve their strategic goals.
Summary
Exercises
References
Alter, S. (2017). Work system theory: Overview of core concepts, extensions, and
challenges for the future. Journal of the Association for Information Systems, 18(10), 698-
722.
Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the
Digital Firm. 16th Edition. Pearson.
McNurlin, B. C., Sprague Jr, R. H., & Bui, T. (2009). Information systems management in
practice. Prentice Hall.
O'Brien, J. A., & Marakas, G. M. (2018). Management Information Systems. 13th Edition.
McGraw-Hill Education.
Pernici, B. (2004). Mobile Information Systems: Infrastructure and Design for Adaptivity
and Flexibility, Springer-Verlag Berlin Heidelberg, Printed in Germany.
Stair, R. M., Reynolds, G. W., & Reynolds, G. (2019). Principles of Information Systems.
13th Edition. Cengage Learning. USA.
Chapter 7
Information Processing
Overview
This chapter provides a clear explanation of technology concept of data processing and
the various methods and types of data processing. It also shed light on relevance and
functions of an information systems department. Key concepts and definitions of terms
were discussed.
Objectives
This chapter focus on providing students with the basic understanding of the concepts of
processing data with an understanding of what an information systems department looks
like. Specifically, students should be able to:
i. define data processing clearly.
ii. list and explain the various methods of data processing.
iii. understand the different types of data processing.
iv. define clearly an information systems department.
v. list and explain the various functions of an information systems department.
The term data processing refers to the collection, the manipulation, and the
processing of data that has been collected so it can be used. It is a technique better
performed by a computer; the process includes retrieving, transforming, or
classification of information. Data processing can also be called information
processing in some organizations. This is because, the data that has been processed
becomes information and this information can also be processed further. Figure 7.1
shows the data processing and its stages.
Figure 7.1 Data Processing and its stages
Data in its raw form would not be useful to any organization until it is processed.
Take for instance students data like their names, scores in different courses or subjects.
Such data might not be useful until the scores are collected from the various teachers
or lecturers, sorted and arranged for each student and the necessary calculations like
cummulative grade point average (CGPA) are done. Only then would the result of
such data processing become useful and valuable to the student.
In the same vein, data about customers like their card details, expiration date and
amount of individual purchases made would not be useful until the total purchases is
calculated for the customer and the total sales for that day is calculated for the shop
owner.
For data to be processed, it must be sourced for or collected from its different sources,
after which the collected data is now prepared in the proper format and then sent
into the processing system (input). The next stage is the manipulation of the data
which we call processing and data that has been processed is called information and
getting this information out is referred to as output. Finally, the data or processed
information can be kept somewhere until when they are needed and this is called
storage.
The woman that sells bean cake or akara at the junction would always use her brain
to collect individual amount of sales she makes, sort out the balance for each
customer and returns it to them.
Figure 7.4: Supermarket Cash Register used for mechanical data processing
It contains fewer errors than the manual data processing method, but the increase
of data to be processed has made this method more complex and difficult.
Figure 7.5: A Computer and an ATM are used to process data electronically
A good example would be our commercial banks that handle large numbers of
customers and due to the nature of customers requests, it would not be posible
using manual or mechanical means to process their data since it has to be stored
for future reference and more customers have to be attended to.
The method used by a network printer to schedule jobs and then print them is batch
processing. Such jobs are batched or grouped as they arrive and are handled in the
order in which they arrived. Figure 7.6 shows batch processing in an operating
system environment. Batch Processing can be defined as the concurrent,
simultaneous, or sequential execution of an activity.
a. Simultaneous Batch processing occurs when all the jobs or data are
executed by the same resource like printer, processor, etc. for all the cases
at the same time.
b. Sequential Batch processing takes place when they are processed by the
same resource for different cases either at once or immediately after one
another.
c. Concurrent Batch processing means when they are processed by the same
resources but partially overlapping in time. It is used mostly in financial
applications like sales transaction processing or point-of-sales terminals or
at places where additional levels of security are required. In this
processing, the computational time is relatively less because applying a
function to the whole data altogether extracts the output. It is able to
execute the task with less amount of human intervention.
You can measure the efficiency of batch processing in terms of its throughput
which is the amount of data processed per unit of time.
In most Online Analytical Processing systems, the answer to each point and click is
computed long before the user even starts the application. In fact, many Online
processing systems do that computation relatively inefficiently, but since the
processing is done in advance, the end-user does not see the performance problem.
This type of processing is used when data is to be processed continuously, and it is
fed into the system automatically.
Benefits of decentralization
a. Provides a trustless environment. In a decentralized blockchain
network, no one has to know or trust anyone else.
b. Improves data reconciliation. Companies often exchange data with their
partners.
c. Reduces points of weakness.
d. Optimizes resource distribution.
Disadvantages of decentralization are listed below:
ii. Systems analysts: the principal liaisons between the information systems
groups and the rest of the organization
Other closely related tasks and roles are database security, database monitoring
and troubleshooting, and planning for future growth.
7.4.3 Telecomminication
Telecommunications, also known as telecom, is the exchange of information over
significant distances by electronic means and refers to all types of voice, data and
video transmission.
Examples of telecommunications systems are the telephone network, the radio
broadcasting system, computer networks and the Internet. Figure 7.12 shows a
sample Telecommunication Mast..
Figure7.12: Example of a Telecommunication mast
Summary
References
Overview
Computers are electromechanical devices used to take inputs, process the input and out
information using some stored computer programs. However, computers are not as useful
standing alone as when they are connected together to share resources or share tasks to
come up with better results and have greater efficiency. Connecting several computers and
other technological devices together is called a computer network. Computer Network is
an important aspect of the computer field. It deals specifically with the connection of two
or more computing devices or equipment for communication or interaction. There are a
number of ways computers can communicate when connected together. It can be server-
based, peer-to-peer, and other communication strategies. Computers can be connected to
form a network or connected to be a system of interconnected networks. The network
connections may be Local Area Networks, Metropolitan Area Networks, or Wide Area
Networks. Data and information can travel through connection mediums in different forms
and different methods. The movement of data and information is carried out using a
stipulated model call the OSI model: which is a layered transmission method, arranged in
layers.
Objectives
This chapter focuses on providing students of computing with the requisite knowledge in
Networking and related communication-related concepts of interconnected computers. At
the end of this chapter, students are expected to
In computer networking, topology refers to the layout of connected devices, i.e. how the
computers, cables, and other components within a data communications network are
interconnected, both physically and logically. The physical topology describes how the
network is actually laid out, and the logical topology describes how the data actually flow
through the network. Two most basic topologies are point-to-point and multipoint. A
point-to-point topology usually connects two mainframe computers for high-speed digital
information. A multipoint topology connects three or more stations through a single
transmission medium and some examples are star, bus, ring, mesh and hybrid.
The Local Area Network (LAN) is considered to be the most basic and compact form of
network that is commonly utilised. The network is predominantly comprised of individual
computing devices that are linked together within a specific physical location such as an
office or a building. Local area networks (LANs) are capable of accommodating a minimum
of three to five users, although the majority of networks are designed to connect between
10 and several thousand users.
A company may utilise small Local Area Networks (LANs) to establish interconnectivity
between multiple offices situated within the same building. This may involve the
installation of wiring between different floors of the building to facilitate the connection.
It is possible for larger Local Area Networks (LANs) to establish interconnections among
multiple buildings within a complex. This can be observed in various settings such as large
corporations with multiple buildings, military installations, and college campuses as
illustrated in Figure 8.7.
Certain Local Area Networks (LANs) are comprised of numerous Personal Computers (PCs)
that are interconnected with one another as well as with a minicomputer or mainframe.
The present system enables every user within the Local Area Network (LAN) to gain entry
to the mainframe computer while retaining their autonomy.
Home networks consisting of two or more personal computers (PCs) can be classified as
local area networks (LANs). Presently, the majority of home LANs are either completely
wireless or contain wireless components.
Each node within the system has the capability to establish communication with any other
node. Telephone systems utilise various transmission media, including fiber-optic cabling,
microwave relay networks, twisted-pair wire, satellites, and coaxial cable.
In addition to public telephone networks, there exist wide area networks (WANs) that are
privately owned by corporations. These LANs are established to facilitate inter-company
communication, irrespective of the geographical location of the subsidiaries, company
divisions, sales offices, and manufacturing plants. The military has established wide area
networks (WANs) that serve as specialised communication, command, and control
networks.
The fiber-optic networks established on a national and global scale since the mid-1990s for
the purpose of facilitating Internet connectivity can be classified as Wide Area Networks
(WANs). These high-speed interconnections, commonly referred to as the Internet core or
backbone, are structured as direct point-to-point links or extensive rings with multiple
access points. Wide Area Networks (WANs) facilitate the accessibility of the World Wide
Web and any other Internet-connected entity to personal computers and other Internet-
enabled devices, including cell phones. An illustration is seen in Figure 8.9
8.5 Multiplex
The establishment of a communication channel, or a connection between two points,
occurs through the connection of a cable or the setup of a radio transmitter and receiver.
In cases where a singular link is present, it is only possible to execute a single function,
regardless of whether it pertains to signal transmission or control operations. A half-duplex
process is established for bidirectional communication, wherein both endpoints of the
communication link possess the capability to transmit and receive data, albeit not
simultaneously.
The concurrent transmission of multiple signals can be achieved through the utilisation of
multiple cables or the establishment of a transmitter/receiver pair for each channel,
however at a considerable cost. Multiplexing is a technique that enables the transmission
of numerous signals over a single medium using a single cable or radio link. This technique
allows for the combination of hundreds or even thousands of signals, resulting in increased
efficiency and capacity. The utilisation of multiplexing has facilitated the practicality and
economic feasibility of concurrent communication, conserved spectrum space, and enabled
the implementation of advanced applications.
An FDM system's general block diagram is shown in Figure 8.10. A modulator circuit
receives input from each signal being delivered. Each modulator's (fc) carrier frequency is
distinct. Over a certain frequency range, the carrier frequencies are typically similarly
spaced apart. These companies are known as subcarriers. The bandwidth is divided among
the input signals.
Time Division Multiplexing (TDM) is a technique that can be applied to both digital and
analogue signals. If the information is comprised of sequential bytes, it is feasible to transmit
one byte of data from each source within the designated time interval for a given channel.
It is possible that each of the time slots depicted in Figure 8.11 may comprise a byte
originating from each of the four distinct sources.
One communication channel would transmit a sequence of 8 bits and subsequently cease,
followed by the next channel transmitting another sequence of 8 bits. Subsequently, the
third channel would proceed to transmit its respective data word, and this process would
continue in a similar manner. The process would iterate rapidly. Through the utilisation of
this methodology, it becomes possible to interleave the data bytes of discrete channels.
The digital bit stream generated as a result of this process is subsequently decoded and
reconstructed at the receiving terminal.
The process of transmitting digital data through Time Division Multiplexing (TDM) is
uncomplicated as the digital data is already fragmented into discrete units, which can be
conveniently allocated to distinct temporal intervals. Time-division multiplexing (TDM)
can transmit uninterrupted analog signals, encompassing voice, video, or telemetry-derived
signals. The process involves the acquisition of the analog signal at a high frequency,
followed by the conversion of the acquired samples into binary numbers that are
proportional to the original signal. These binary numbers are then transmitted in a serial
manner.
It is important to note that the correlation between wavelength, measured in meters, and
frequency, denoted as f, can be expressed as f = c/ λ, where c represents the speed of light
in a vacuum, which is equivalent to 2.998 3 108 m/s. The velocity of light propagation
within a fiber optic cable is slightly lower, approximately 2.99 x 10^8 meters per second.
The measurement of optical wavelength is commonly denoted in units of nanometers or
micrometers. The measurement of optical frequencies is denoted in terahertz (THz), which
is equivalent to 10 to the power of 12 hertz (Hz).
The majority of networks are set up as a hierarchy of layers or levels, each of which builds
on the one below it in order to reduce the design complexity. A layered architecture's
fundamental concept is to separate the design into manageable chunks. The model divides
the flow of data in a communication system into seven abstraction levels, starting with the
physical implementation of transferring bits through a communications media and ending
with the highest-level representation of data in a distributed application. Each intermediate
layer assists the layer above it and is assisted by the layer below it in providing a class of
functionality. The functions of each layer in the OSI model are clearly defined, and each
layer communicates and interacts with the layers immediately above and below it unless
there are no layers above or below the layer in question. The model's creators reduced the
data transmission process to its most basic components when creating it. The networking
functions that had related uses were gathered into distinct groups, which eventually
became the layers. A family of functions unique from those of the other layers is defined
by each layer. In this way, the designers defined and localized functionality to produce a
comprehensive and adaptable architecture.
In order to reduce the design complexity, most of the networks are organized as a series
of layers or levels, each one builds upon one below it. The basic idea of a layered
architecture is to divide the design into small pieces. Each of the layers adds to the services
provided by the lower layers in such a manner that the highest layer is provided a full set
of services to manage communications and run the applications. The benefits of the layered
models are modularity and clear interfaces, i.e. open architecture and comparability
between the different providers' components. A basic principle is to ensure the
independence of layers by defining services provided by each layer to the next higher layer
without defining how the services are to be performed. This permits changes in a layer
without affecting other layers.
Application Layer
Presentation layer
Session Layer
Transport Layer
Network Layer
Physical layer
(1) The physical layer defines the properties of the interface between the devices and
the transmission medium. Physical characteristics of interfaces and media.
Additionally, it specifies the kind of transmission medium.
(2) The physical layer data is represented as a stream of bits (a sequence of O's or 1's)
with no meaning. Bits must be encoded into electrical or optical signals before they
can be transmitted. The type of encoding (how O’s and 1’s are converted to signals)
is determined by the physical layer.
(3) The physical layer also determines the transmission rate or the number of bits sent
each second.
(4) Connecting devices to the media is the responsibility of the physical layer. A
dedicated link connects two devices in a point-to-point configuration. Several
devices share a link in a multipoint configuration.
(5) The physical topology describes how components of a network are linked together.
Devices can be linked together using a bus topology, a star topology, a ring
topology, a mesh topology, or a hybrid topology.
(6) The physical layer also specifies the transmission mode, such as simplex, half-duplex,
or full-duplex, between two devices
(7) Bit synchronization is another responsibility of the physical layer. Both the sender
and the receiver must operate at the same bit rate and be in sync with one another.
In other words, the clocks of the sender and the receiver must be in sync.
Node-to-node data transfer—a link between two nodes that are physically connected—is
provided by the data link layer. It recognizes potential faults in the physical layer and may
even fix them. It specifies the protocol used to connect and disconnect two devices that
are physically close to one another. It also specifies the flow control protocol that will be
used between them.
The following are some of the additional duties of the data link layer:
(1) The data link layer frames the stream of bits it receives from the network layer to
make them more manageable.
(2) It manages the physical addressing. The data link layer adds a header to the frame
to specify the sender and/or receiver of the frame if frames need to be distributed
among various systems on the network. The receiver address is the address of the
device that connects the sender's network to the system for which the frame is
intended.
(3) Flow management is coordinated by the data link layer. The data link layer imposes
a flow control mechanism to prevent overloading the receiver if the rate at which
data are produced by the sender is slower than the rate at which data are consumed
by the receiver.
(4) It also carries out Error management. By introducing systems to detect and
retransmit broken or lost frames, the data link layer increases the reliability of the
physical layer. Additionally, it employs a system to detect duplicate frames.
Typically, a trailer is added to the end of the frame to achieve error control.
(5) It can also restrict Access. Data link layer protocols are required when two or more
devices are connected to the same link in order to determine which device is in
charge of the link at any given moment.
The functional and procedural mechanisms of sending packets from one node to another
connected in "different networks" are provided by the network layer. A network is a
medium that allows several nodes to be connected, where each node has an address, and
where nodes can communicate with each other and can be connected to transmit messages
to other nodes linked to it by only supplying the content of a message and the target node's
address and letting the network figure out the best path to take the message, including
routing it through intermediary nodes, to the destination node. A network layer is typically
not required if two systems are connected to the same link.
The following are some of the additional duties of the network layer:
(1) Logical addressing is carried out by the Network layer. The data link layer's physical
addressing solution addresses the addressing issue locally. Another addressing system
is required to help distinguish the source and destination systems if a packet crosses
the network boundary. The network layer adds a header, which among other things
contains the logical addresses of the sender and receiver, to the packet that comes
from the upper layer.
(2) The routing devices, known as routers or switches, route or switch the packets to
their destination when independent networks or links are connected to form inter-
networks (a network of networks) or a large network. This mechanism is one of the
tasks performed by the network layer.
It offers user interfaces and support for distributed information services like electronic mail,
remote file access and transfer, shared database management, and others. The user's
services are provided by the application layer.
Summary
Exercises
References
Adebiyi A.A. (2023). Computer System and Application. Journal of computer science, 4(3),
40-45.
Meyers, Mike (2021). CompTIA Network+ exam guide : (Exam N10-005) (5th ed.). New
York: McGraw-Hill.
Wood, Jessica (2020). "The Darknet: A Digital Copyright Revolution" (PDF). Richmond
Journal of Law and Technology. 16 (4).
Chapter 9
Intranet, Extranet, Internet
Overview
This chapter provides a good knowledge of Intranet, Extranet and the Internet. It gives an
overview of the uses, advantages, disadvantages, similarities and differences of Intranet
and Extranet. It gives an insight into the Internet. It discusses a brief histroy of the internet
and how it has evolved over the years, and in Africa in particular. Some protocols that
operate on the internet and examples of some areas where the Internet has impacted on
the lives of its users, were also discussed.. Key concepts and definitions of terms were
discussed in the chapter.
Objectives
This chapter focuses on providing students with a good knowledge of Intranet, Extranet
and the Internet. Specifically, students should be able to:
a) define intranet and explain how it operates;
b) list the advantages, disadvantages and applications of the Intranet;
c) define extranet and state its uses, advantages and disadvantages;
d) differenciate between intranet and extranet;
e) define the Internet and explain how it works;
f) give a brief histrory of the Internet and some protocols and standards that
operate on it;
g) list the advantages, disadvantages and applications of the Internet;
h) distinguish between the Extranet and Internet; and
i) compare and contract between the Intranet, Extranet and Internet.
9.1 Intranet
An Intranet is a network that is built mainly for internal use by an organization, and it
works based on internet technologies and concepts. An intranet, is used by organization,
to keep their internal information like contacts, calendars, and some other documents that
are private to them.
Intranet is defined as private network of computers within an organization with its own
server and firewall. Intranet is system in which multiple PCs are networked to be connected
to each other. PCs in intranet are not available to the world outside of the intranet.
It is important to note that the major aim of an intranet is company information sharing
and also for sharing of computing resources among the employees. Also, it can be used to
enable employees to work in groups and for teleconferences.
Figure 9.1 is the illustration of an intranet.
Management concerns: These borders on the issues of loss of control, hidden complexity,
and potential for chaos.
Security concerns: Some of these concerns are on unauthorized access, denial of service
and packet sniffing.
Productivity concerns: The issues that create concern on intranet productivity are
information overload which lowers productivity, users setting up their own web pages,
and overabundance of information.
Extranet can be described, as a private network that uses Internet protocols, network
connectivity and public telecommunication system to share part of an organization's
information and resources, securely, with vendors, suppliers, partners, customers and/or
other businesses. It can be viewed as part of an organization’s Intranet that is extended to
users outside the organization. This is usually done over the internet.
Extranet differs from Intranets in the sense that, while intranet is generally restricted to
employees of the organization, Extranets on the other hand can be accessed by customers,
suppliers, or other parties that are approved by the organization. Figure 9.5 shows the
Extranet.
Figure 9.5: Extranet
Following are some of the major fields that are using Extranet service on a large scale are
corporate houses, government offices, and education centers. This is because Extranet
covers a wider area, as outsiders (such as partner, vendor, or even customer) have the
authorized accessibility.
VPN uses Internet Protocol Security Architecture (IPSEC) Protocol to provide secure
transactions by adding an additional security layer to TCP/IP protocol. This layer is created
by encapsulating the IP packet to a new IP packet as shown in Figure 9.7.
Some of the advantages of extranet for employees, suppliers, business partners, and
customers are shown in Figure 9.8.
9.3 Internet
The Internet which is sometimes referred to as “The NET”, can be referred to as a network
of networks that operate around the world as if it were one network, thereby granting
users unrestricted access to global computer networks. Technically, the coordination of the
Internet is open, independent and run by non-profit membership organizations that work
together to meet the internet needs of the people. The Internet makes it possible for
anyone to create content, offer services, and sell products without requiring any permission
from a central authority. It can even be said that no one, but everyone, is in charge of the
internet. This means that anyone can create his own content and upload to the internet.
Also, the global Internet consists of tens of thousands of interconnected networks run by
service providers, individual companies, universities, governments, and others. This has
been a major key to the successful growth of the Internet.
Furthermore, it is important to note that the Internet has availed users the opportunity to
access the World Wide Web in quest for access to news, weather and sports reports, to
plan and book vacations and to pursue other personal interests. People use chat, messaging
and email to make contacts and stay in touch with friends. The internet was what gave
birth to Social networking, which has become a very vital tool in communication and
information exchange. Websites such as Facebook, Instagram, Tumblr, Twitter, Myspace
etc have created new ways to socialize and interact. Users of these sites are able to add a
wide variety of information to pages, to pursue common interests, and to connect with
others. It is also possible to find existing acquaintances and to allow communication among
existing groups of people. Sites like Linkedln foster commercial and business connections.
YouTube and Flicker specialize in users' videos and photographs.
In 1969, the ARPANET became a reality. It had four nodes which were located at four
different Universities, and they were connected via IMPs to form a network. Software was
used to provide communication between the hosts and this software was known as the
Network control Protocol (NCP).
To improve the ARPANET, an Internetting Project was proposed to introduce a protocol.
that could be used to achieve end-to-end delivery of packets. This protocol is the
Transmission Control Protocol (TCP). it included some concepts like encapsulation, the
datagram and also gateway and its functions. Later on, TCP was split into two protocols
which are Transmission Control Protocol (TCP) and Internet Protocol (IP). IP was to handle
datagram routing while TCP was to be responsible for other higher level functions like
error detection, segmentation and reassembly. Therefore, the internetworking protocol
became known as TCP/IP
The Internet today has greatly evolved and is made up of several WANs and LANs which
are interconnected by different networking devices and switching stations. Since then, the
Internet has grown and evolved over time to facilitate services like:
i. Email.
ii. Web-enabled audio/video conferencing services.
iii. Online movies and gaming.
iv. Data transfer/file-sharing, often through File Transfer Protocol (FTP).
v. Instant messaging.
vi. Internet forums.
vii. Social networking.
viii. Online shopping.
ix. Financial services.
The Internet makes use of the TCP/IP suite. Every device on Internet is identified by a
unique address called the Internet Protocol (IP) Address. An IP Address is a unique number
(like 10.21.20.144), which identifies a devices on the internet. Domain Name Server (DNS),
is used to give a name to the IP Address to enable a user to locate a device by a name. For
example, a DNS server will assign a name https://www.nuc.org to a particular IP address
to uniquely identify the computer on which this website is hosted. Figure 9.9 is the
illustration of the Internet.
In Africa, the Internet has taken a centre stage, and it has successfully penetrated the daily
lives of the people due to the ease with which it is usually accessed. The use of the internet
has so risen in Africa that it is recorded that as at 2022, the continent has over 570 million
internet users. According to reports, Nigeria currently has the largest number of users of
the Internet, with over 100 million in 2022, followed by Egypt with 76 million users, and
then South Africa with 41 million users. This continous rise Internet usage can be easily
traced to the improved telecommunication infrastructure and the very rising adoption of
mobile technologies and devices. This has greatly increased internet access in Africa.
Furthermore, the continous growth in internet accessibility has enhanced digital activities
and online services, like social media, online shopping, E-learning and mobile payments.
Today, any individual that needs an internet connection, can easily use the services of
Internet Service Providers (ISPs). Some of the major Internet and telecommunications
Service providers in Africa are:
i. MTN - a South-African company. Its operation covers over 21 countries in Africa
and as at 2021, it had over 221 million subscribers across Africa.
ii. Orange Africa & Middle-East with over 130 million subscribers across Africa,
iii. Vodacom group Ltd with over 123 milliion subscribers across Africa
iv. Airtel Africa - provides Telecomms and mobile money services to over 14 countries
across Africa. it has over 78 million subscribers other providers include; Safaricom,
Ethio Telecom, Maroc Telecom, Etisalat, GLobacomm, etc. a mobile company
based in Lagos, 9mobile also based in Nigeria.
The process of transferring information from one device to another, uses a technnology
known as packet switching. Each device that is connected to the Internet is assigned a
unique IP address, which allows it to be recognized across the network. Whenever a device
tries to send a message to another device, the data is sent over the Internet in form of
packets. Each packet is assigned a port number that connects it to its endpoint. Figure 9.10
shows the Internet operation.
Summary
The Internet, Intranet and Extranet all make use of the internet protocols to carry out their
operations.
An intranet is a private connection (private network) that is used by an organization, to
keep their internal information like contacts, calendars, and some other documents private.
Intranets can be a collection of an organization’s internal websites or a portion of its IT
infrastructure that can house several private websites. Intranets are an essential tool for
companies to facilitate internal communication among its employees.
Extranet is a private network service that is controlled by an organization and they give
access to only their clients, customers and partners. Extranet refers to network within an
organization, using internet to connect to the outsiders in controlled manner. It helps to
connect businesses with their customers and suppliers and therefore allows working in a
collaborative manner.
The Internet is a worldwide network system (public network) that connects a broad
collection of private, public, business, academic, and government networks to enable
global communication and access to data resources. It is the global system of
interconnected computer networks that use the Internet protocol suite (TCP/IP) to link
devices worldwide. The Internet operations are governed by some protocols and have
greatly evolved. The Internet differs from the intranet based on the area of security, scope,
coverage, affordability, reach, usage, and number of users.
1. A network that is part of your intranet but is extended to users outside of your
organization and is accessible from the Internet is a private network.
A. Intranet B. Extranet C. Internet D. Public network
2. The network has 12 desktop computers and two servers that host a web-based
inventory application that the entire employee connected to the same network
switch A firewall protects all computers and servers from external networks. Which
type of network are you configuring?
A. Intranet B. Extranet C. Internet D. Public network
3. VPN is a method that allows a secure and encrypted connection to be created across
a less secure system, such as the Internet. It extends a private network by using a
public network, such as the Internet.
A. True B. False
4. Internet is a globally connected network, so it can have multiple more users as
compare to the number of users on Intranet.
A. True B. False
5. Intranet has limited network range, so users on Intranet are also limited and less as
compared to that on Internet.
A. True B. False
6. The extranet is an element of an intranet, categorized as private network type,
controlled and handled by an organization, to offer secure access to the intranet of
the external world.
A. True B. False
7. Internal network which is only available inside an organisation or company is called
A. Network B. Web Browser C. HTTPS D. Intranet
8. Which of the following can you do on the Internet?
A. Online shopping B. Video calling C. Streaming music D. All of
them
9. A network of computer networks which operates world-wide using a common set
of communications protocols.
A. Network B. Intranet C. Application D. Intranet
10. The protocols that guide the operations on the internet and presents the set of rules
that govern how devices carry out their tasks is known as
A. TCP/IP suite B. Application protocol C. FTP D. HTTPS
Exercises
1. What is Intranet?
2. Mention three advantages and disadvantages of Intranet.
3. State two applications of Intranet
4. What is Extranet?
5. List two advantages and disadvantages of Extranet
6. How is Extranet implemented?
7. Mention four issues associated with Extranet.
8. State four features of Extranet Services
9. List the advantages of Extranet services
10. Mention two disadvantages of Extranet services
11. List three applications of Extranet
12. List three major fields that are using Extranet service on a large scale
13. What is Internet?
14. The Internet has grown and evolved over time to facilitate services. Mention four.
15. Give a brief histrory of the Internet stating how it has evolved over the years.
16. Briefly describe how the Internet operates.
17. State four advantages and disadvantages of Internet
18. Compare and contrast between the Intranet, Extranet and Internet.
19. Define the following terms
a. Protocols
b. Internet Standards
c. VPN
d. ISPs
e. Interface Message Processor (IMP),
f. Network Control Protocol (NCP)
20. State four applications of the Internet
References
https://www.tutorialspoint.com
https://www.techopedia.com
https://www.geeksforgeeks.org
Chapter 10
Wordprocessing, Spreadsheet and Graphic (Presentation)
Overview
This chapter provides sufficient knowledge about Word-processing, Spreadsheet and
Graphic Presentation application software with specific reference to Microsoft Word,
Microsoft Excel and Microsoft Power Point. Detailed hands-on practicals of these
application spftwares were also given in this chapter.
Objectives
This chapter focuses on providing students with the basic knowledge of Word-processing,
Spreadsheet and Graphical Presentation application using Microsoft Word, Excel and
Power Point. Specifically, students should be able to:
a) define Word-processing, Spreadsheet and Graphical Presentation application software,
clearly;
b) list and explain basic features of each; of Word-processing, Spreadsheet and Graphical
Presentation application software;
c) understand the use of each application software;
d) list and explain generations of programming languages;
e) practice each application software well; and
f) apply each application software in day-to-day activities.
10.2 Spreadsheet
A spreadsheet is a large sheet having data and information arranged in rows and columns.
Rows are horizontal vectors while columns are vertical vectors. Spreadsheet is quite useful
in entering, editing, analysing and storing data. Arithmetic operations with numerical data
such as addition, subtraction, multiplication and division can be done using Spreadsheet.
Sorting numbers/characters according to some given criteria (like ascending, descending
etc.) and use of simple financial, mathematical and statistical formulas. A spreadsheet is
also. known as a worksheet. It is used to record, calculate and compare numerical or
financial data.
Each value on a worksheet can either be an independent (i.e. basic) value or it may
be derived on the basis of values of other variables. The derived value is the outcome of
an arithmetic expression and/or a function (i.e. a formula).
Spreadsheet applications (sometimes referred to simply as spreadsheet) is a
computer program that allows us to add and process data. Some examples of spreadsheet
are Lotus 123, Microsoft Excel or simply, Excel, which is one of the Microsoft Office Suite
of software.
To start Word, click on the Windows Start button, and then select Microsoft Word from
the options panel. Or The Microsoft Word Icon can be pinned to the start bar
for quick access.
The screen shot below displays the primary components of a typical Word Version
interface.
File tab
Ribbon
Ribbon Collapse
Horizontal ruler
Document window
Vertical ruler
The File tab provides you with the Backstage that provides information pertaining to your
document and options to help setup your window defaults. The Backstage also contains
standard commands such as, Home, Save, Save As, New, Print, etc.
1. To add your most used commands to the Quick Access Toolbar, click on the
drop-down arrow next to the Quick Access Toolbar.
2. The Customize Quick Access Toolbar option panel will appear.
3. Click on your desired command option to be placed on the Quick Access
Toolbar.
X. Save a Document
A. Save
1. Click on the File tab, then select the Save As option to save a document
permanently to your hard drive or other storage device.
(The instructor will demonstrate where to save the document).
2. The Save As window will appear.
3. In the Directory sections on the left side of the window, click on the icon where
you wish to save your document. In this exercise click on the Desktop.
4. In the File Name box, type your desired document name, and then click on the
Save button.
The table below consists of definitions for the Microsoft Office features.
Term Description
4 File Tab The File tab has replaced the Office button in 2007. This area is called
the Backstage which helps you to manage the Microsoft application and
provides access to its options such as Open, New, Save As, Print, etc.
3 Ribbon Displays groups of related commands within tabs. Each tab provides
buttons for commands.
Select Action
any text Click at the beginning of the area and press the Shift key as
you click at the end of the area. You can also drag across
the text you want to select.
a line Place the mouse pointer in the left margin. Position the
mouse pointer next to the desired line and click once.
multiple lines Place the mouse pointer in the left margin next to the first
desired line and click once. Then press the Ctrl key and click
additional lines to select them.
a sentence Press the Ctrl key and click anywhere in the sentence.
a paragraph Place the mouse pointer in the left margin and double click
next to any line in the paragraph.
multiple Click at the beginning of the first paragraph then hold the
paragraphs mouse button down while dragging through your desired
paragraphs.
a document Press the Ctrl key then place the mouse pointer anywhere
in the left margin and click once.
XII. Margins
Microsoft Word margins are defaulted to 1 inch for the top and bottom, and 1 inch for the
left and right. To change your margins, use the Margin button found on the Layout ribbon.
A. Create Margins
1. Select the entire document text, by pressing the Ctrl key, then place the mouse
pointer anywhere on the left margin, and then click once on the right mouse
button.
2. Select the Layout tab.
3. In the Page Setup group, click on the Margins button.
4. The predesigned margins panel will appear.
5. Change the margin by selecting the top margin button (top and bottom 0.5” –
Left and Right 0.5”).
Note: If you prefer a margin not listed, then click on Custom Margins at the bottom of
the panel to customize your margin. The Page Setup window will appear, and then make
your desired margin choices from the window options.
XIII. Line Spacing
Microsoft Word 2019 defaults the line spacing to double space (2.0). Line spacing affects
an entire paragraph or document. Use the Line Spacing button on the Home Ribbon to
change line spacing.
A. Add Spacing
1. Make sure the entire document is still selected.
2. Click on the Home tab. On the Paragraph group, click on the Line Spacing
button, and then select 1.5.
A. Apply Format
1. Select text, and then click on your desired format from the Home ribbon.
Note: Microsoft Word Mini Toolbar feature gives you quick access to common
formatting commands. The mini toolbar appears faintly when you select text in
your document. If you want to use this mini toolbar, you can activate it by hovering
the mouse pointer on the toolbar and making your selections. If you prefer not to
use the toolbar, you can continue working within the
document and the toolbar will disappear.
1. Select the title text, ROOF TOP GARDENS, and then click on the Center button.
XVII. View Modes
Read Mode The best way to read a document, including some tools
designed for reading instead of writing.
Print Layout Check out how your document will look when it’s printed.
Web Layout See how your document will look as a webpage. This layout
is also great if you have wide tables in your document.
Draft Switch your view to see just the text in your document. This is
useful for quick editing because headers/footers and certain
objects won’t show up, allowing you to focus on your text.
Page Breaks and Section Breaks can be inserted anywhere within a document.
A. Create a Table
The Table Tools tab only appears when a table is selected.
To create a table in Microsoft Word, click on the Insert ribbon. The Table button is the
only one option on the Tables group.
1. Click on the Insert ribbon, and then click on the Table button.
2. The Table panel will appear.
3. Select two rows and two columns as seen above. To insert a table onto your
document, move the mouse pointer over the number of rows and columns
you desire. The cell selection will be highlighted as you move the mouse.
When the desired rows and columns are highlighted, click on the last cell.
Seminar Time
4. Type the information in the table shown above. The insertion point will
appear in the first cell of the table. Type text in the first cell, and then use
the Tab key on the keyboard to move from one cell to the next.
5. After you type the information in the last cell, press the Tab key. Word
automatically inserts a new blank row.
Procedure Description
Tab and (Shift + Tab) Use the Tab key to move from left to right; use Shift+Tab to
move from right to left.
Keyboard Arrow Keys The up and down arrows will move up and down rows.
Move the insertion point Use the Mouse to position the cursor as needed.
To select a single cell Click three times inside the cell or drag over the cell's contents.
To select an entire row Place the mouse pointer on the left margin, pointing to the row
than click once or drag over row cell’s contents.
To select an entire Click the column’s top gridline/border or drag over column cell’s
contents.
column
To select the entire table Single click on the table move handle on the top left corner
of table or press the Alt key and double click in any cell of the
table.
One can adjust columns and rows accordingly, add columns and rows also merge cells of
table are desired and delete cells, rows and tables and format tables to one desire
Click on the File tab and select the Print option to print your current document. This will
display the Print window options, along with a preview of the document to the right, such
as the range of pages to print and the number of copies to print.
The default printer is the printer that your applications will use unless you specify
otherwise. To change printers, click on the drop-down arrow next to Printer Name. This
will display a list of installed printers and allow you to select another printer.
1. Select your desired options in the Print window.
Window Features
The purpose of the window features is to enable the user to perform routine tasks related
to the Microsoft applications. All the Office applications share a common appearance and
similar features. The window features provide a quick means to execute commands. Here
are some pertinent Excel features:
Figure 10.4: Excel features
C. Spreadsheet Terms
Term Description
2 Search Bar Advance search will help you find and perform tasks.
4 File Tab The File tab has replaced the Office button. It helps you to
manage the Microsoft application and provide access to its
options such as Open, New, Save, As Print, etc.
6 Cell The intersection of a row and column; cells are always named
with the column letter followed by the row number (e.g. A1 and
AB209); cells may contain text, numbers and formulas.
7 Range One or more adjacent cells. A range is identified by its first and
last cell address, separated by a colon. Example ranges are
B5:B8, A1:B1 and A1:G240.
12 Worksheet A grid of cells that are more than 16,000 columns wide (A-Z,
AA-AZ, BA-BZ…IV) and more than 1,000,000 rows long.
Method Description
scroll bars Use the horizontal and vertical scroll bars to move around the spreadsheet to
view columns and rows not currently visible. Click the mouse pointer once the
desired cell is visible.
arrow keys Use the left , right →, up , and down arrows to move accordingly among
cells.
Enter Press the Enter key to move down one cell at a time.
Tab Press the Tab key to move one cell to the right.
Ctrl+End Moves the cursor to the last cell of used space on the worksheet, which is the
cell at the intersection of the right-most used column and the bottom-most used
row (in the lower-right corner).
End + arrow key Moves the cursor to the next or last cell in the current column or row which
contains information.
Research 20 20 10 50
Correspondence/Communication 30 30 15 75
Publicity 50 50 25 125
1. Open Excel Practice File.xlsx , and then click on the Budget sheet tab.
a. Select cell A1, and then type Budget for Guest Speakers.
b. Select cell A3, type Item, and then press the Tab key.
c. Select cell B3, type Fall, and then press the Tab key.
d. Select cell C3, type Spring, and then press the Tab key.
e. Select cell D3, type Summer, and then press the Tab key.
f. Select cell E3, type Annual, and then press the Tab key.
Initially all columns/rows have the same width in a spreadsheet. Often you will need to
make columns/row wider/heigh or narrower. By see the table below
method Description
dragging method Move the cursor up to the column heading area and point to
the vertical line to the right of the column that you want to
change. When the cursor becomes a "plus sign" with horizontal
arrows, press the mouse button and drag in either direction to
resize the column. Release the mouse button to accept the
new size.
double click to auto fit Move the cursor up to the column heading area and point to
the vertical line to the right of the column that you want to
change. When the cursor becomes a "plus sign" with horizontal
arrows, double click to AutoFit this one column.
AutoFit a range Use the mouse to select the range of cells that needs to be
adjusted and on the Home ribbon in the Cells group, choose
Format, and the select the AutoFit Column Width option.
1. Increase the width of column A via the dragging method so that all text
entries are visible.
2. Decrease the width of column C via the dragging method until pound
symbols ### appear.
3. Increase the width of column C to return to its original size.
Procedure Description
Add Row Select any cell of the row where you desire to add a new row
above. On the Home ribbon in the Cell group, click on the Insert
button, and then select Insert Sheet Rows. A new roll will appear
above your selected cell row.
Add Column Select any cell of the column letter where you desire to add a
new column to the left. On the Home ribbon in the Cell group,
click on the Insert button, and then select Insert Sheet Columns.
A new column will appear to the left of your selected column.
Delete Row or Column Select any cell where you desire to delete a row or column. On
the Home ribbon in the Cell group, click on the Delete button,
and then selected Delete Sheet Rows or Delete Sheet Columns.
The row or column where the cell was selected will be deleted.
The following image depicts various formulas in an Excel spreadsheet which will be created
in a following exercise:
C. AutoSum
Adding is the most common math operation performed in Excel. The Home ribbon
includes an AutoSum button for adding. This button provides a shortcut to typing
formulas.
1. Select cell B12, click on the AutoSum button, and then press the Enter key.
2. Repeat the AutoSum process for cells C12, D12, E12.
Note: You can copy formulas that refer to empty cells. After you type numbers in the
empty cells, the formulas will be updated.
3. Click in cell B4 and change the amount $20 to $50, and then press Enter key.
Note: Formula results are updated automatically in Excel. As you change any values that
are referred to in a formula, the formula will reflect these changes.
D. Charts
Microsoft Excel can display data graphically in a chart. Excel displays values from worksheet
cells as bars, lines, columns, pie slices, or other shapes in a chart. When you create a chart,
the values from the worksheet are automatically represented in the chart. Presenting data
in a chart can make it easier to read and more interesting to interpret. Charts can also help
you evaluate your data and make comparisons between different values.
A. Sort Data
The sorting feature in Excel allows you to place records in order alphabetically or
numerically. You may specify up to three sort levels (e.g. sort first by state, then by city,
then by last name). Sorts may be ascending (A-Z or 0-9) or descending (Z-A or 9-0). You
should always save the workbook before you sort.
Use the Sort A to Z (ascending) or Sort Z to A (descending) buttons to sort the records, so
that the highest or lowest values are at the top of the column.
Click on the Invoice sheet tab.
1. Click on any cell within the Department column, and then click on the Sort
& Filter button located on the Home ribbon in the Editing group.
B. AutoFilter
The spreadsheet AutoFilter allows you to view and quickly locate data that meet specific
criteria. This feature is faster and more productive than scroll through your entire
spreadsheet to find specific data criteria. Once the information is filtered, you can printout
the displayed data. Once filtering is turned on, click arrows in the column header to choose
a filter for the column.
2. Click on the Sort & Filter button, located on the Home ribbon in the Editing
group, and then select the Filter from the options window.
5. Click on the OK button. Now, only records from the Biology department
are listed. Two records should display.
6. Click on the Filter button next to Department, then deselect Biology and
select Law. Four records should display.
7. Turn off Filter, click on the Filter button next to Department again,
and select the Select All option. All records in the database display.
9. Click on the OK button. Now, only records from the 521 Subcode are listed.
Three records should display.
10. Turn off Filter, click on the Filter button next to Subcode, then
deselect 521 and select the Select All option. All records in the spreadsheet database
display.
You can choose one item from many different fields to narrow down a search. For
example, to display all of the Smiths who work in the Law department, filter both of these
fields set to the desired criteria.
Print a Spreadsheet
Click on the File tab and select the Print option. Preview your spreadsheet on the righthand
side of the File screen. If you are satisfied with the preview, click the Print button, otherwise
click on the Home tab to return to the document and edited document. (Page Setup
options are covered in the Additional Features section on page 47.)
L. Exit Excel
When you are finished using Excel, use click on the File tab, and select the Exit option or
click on the Close button in the upper right-hand corner of the Excel window. If your
file has recently been saved, Excel will exit promptly. However, if the file needs to be saved
before quitting, Excel will prompt you to do so.
Windows Features
The purpose of Windows Features is to enable the user to perform routine tasks related to
the Microsoft applications. All Office applications share a common appearance and similar
features. Windows Features provide a quick means to execute commands. Below are some
pertinent PowerPoint features:
3. File Tab
8. Ribbon
4. Thumbnail Slide
9. Collapse
5. Title Placeholder
6. Subtitle Placeholder
10. Work Area
Term Description
1 Quick Access Toolbar Displays quick access to commonly used commands.
2 Title Bar Displays the name of the open file.
3 File Tab The File tab has replaced the Office 2007 button. It helps you to
manage the Microsoft application and provides access to options
such as Open, New, Save As, Print, etc.
4 Thumbnail Slide Displays a snapshot of each slide.
5 Title Placeholder Section where text is entered.
7 Status Bar Displays information about the slide presentation, such as page
numbers.
8 Ribbon Displays groups of related commands within tabs. Each tab provides
buttons for commands.
9 Collapse Collapses the ribbon so only the tab names show.
10 Work Area Each slide has an area where text and graphics are entered for a
presentation. There are various slide layouts to work from.
11 View Option Displays several View modes for slides.
The Ribbon
The Ribbon replaces the menu bar seen in previous versions of PowerPoint. The Ribbon
groups items that are most likely to be used together. There are several frequently used
tabs, such as File, Home, Insert, Design and View. Clicking on each tab activates a group
of relative commands, menus, and buttons. There are also contextual tabs that only show
up only when needed, such as Text Box Tools, Picture Tools, Drawing Tools and Chart
Tools. To activate those tools, click on the associated object.
Presentation Slides
Slides in a presentation are similar to pages in a word processing document. All slides and
graphics are saved in one file (example: keys.xppt). Use the PowerPoint file to present the
information in the following ways:
Opening PowerPoint
To open a PowerPoint 2016 presentation, click on the File tab in the upper left corner.
PowerPoint Slides
When you choose to create a blank presentation, PowerPoint will open a presentation
with a Title Slide. Once the Title Slide is open, you’ll see a slide with two placeholder text
boxes for a title and a subtitle. Click inside the placeholder box and type to add the title.
If you want a subtitle, click and type inside the smaller placeholder. If you don’t want a
subtitle, you can just ignore its placeholder box.
To add a New Slide, make sure you’re on the Home tab. The New Slide button will add
slides to your presentation.
Clicking on the bottom will give you a choice of layouts. You can choose which
layout you want for your next slide. Select a slide layout by clicking on its image
in the Office Theme gallery.
Slide Layouts
There are several standard slide layouts to
choose from when adding new slides.
A unique layout can be chosen by clicking on the bottom half of the New Slide button in
the Home tab. When the layout gallery opens, click on the style you want and a new slide
with that layout will appear in your presentation.
Each layout caption describes the layout type. Content can be text, tables, charts,
graphics, pictures, clip art, or video.
If you decide later that the layout you chose doesn’t work well for a particular slide, select
the slide by clicking on it in the Thumbnail pane. Next, click on the Layout button in the
Slides group of the Home tab. Click on a new layout and it will change the
layout of the slide.
Saving a Presentation
You can save a file by clicking the File tab, choosing Save, typing a descriptive name into
the File Name window, and then clicking the Save button.
PowerPoint, use the Save As option and select PowerPoint 97 – 2003 Presentation from
the Save as type menu.
You also have the option to Package Presentation for CD. This allows you to add other
files or to add a PowerPoint Viewer so that the presentation can be run on a computer
that does not have the PowerPoint program. You can also add any linked files such as
video or audio.
Applying a Theme (Styles)
Once a new presentation has been created, a design or color scheme can be added.
Remember to use color carefully to enhance your presentation, not detract from it. You
will want to maintain good contrast between the background color and the text color.
Consider using a light colored background and dark text (or vice versa), but avoid busy
backgrounds and primary colors. Use sans serif fonts like Arial, Calibri, and Helvetica for
titles and size them between 44 – 60 points. Sub‐headings should be between 32 – 40
points, and body text between 18 – 32 points. Try not to use more than two fonts.
PowerPoint has many pre‐set designs and themes that include complimentary colors and
fonts. To add a theme to a presentation, go to the Design tab in the ribbon. There are
several themes immediately available. To use one of the built‐in themes, just click on its
thumbnail.
On the right side of the Theme thumbnails, there’s a scroll bar and an Arrow Down button,
which will offer more designs, as seen below. If you’re online, you can get more themes
from Microsoft Office Online. (Your office program must be a genuine Office product to
get online templates).
If you don’t want to use a theme, you can add Background Styles. From this selection,
you can add some preset background styles that change according to the colors you’ve
chosen.
When you have the desired background fill effect, select Close to apply
it to the selected slide or choose Apply to All to add the background
to all of the slides in the presentation.
Adding Content
Text is the default content of the slide below. The format for the default text is a bulleted
list. To add text, click and begin typing. To add other content, click on the icon within the
content group on the new slide. Each icon will open the appropriate dialog box or task
pane in the Drawing Tool
s contextual tab.
Drawing Tools
The icons represent the six standard graphical elements that you might want to insert.
Clicking on an icon will open the associated dialog box. Note that these icons, as well as
several other insertion options, are also displayed in the Insert tab on the Ribbon.
Tables
Set the number of columns and rows as needed in the Insert Table dialog box and click
OK. Methods for editing and the design and layout of your table are located on the Table
Tools contextual tab.
Table Tools
Charts
Select the type of chart you want and click OK. Once inserted into the slide, you can click
on the chart to activate the Chart Tools contextual tab, where you’ll find tools for editing
chart data and changing layouts and styles.
Header and Footer
When printing slides or handouts, it is often nice to be able to add a title or an author
into the Header and Footer section of the printout.
1. In the Slides printing options, let’s choose the printing option 3 slides per page in the
Handout section, and change the Orientation back to Portrait.
2. Note in the preview pane that the date and page number can be seen. These items
are not part of the header or footer, but rather they are options that can be defined
in the Handout Master View.
3. Click on the Edit Header & Footer link at the bottom of the Settings. A dialogue box
opens.
4. Click the Notes and Handouts tab.
5. Note the small preview area where sections of the print areas are called out. Note
that the page number is checked on by default and it is called out in the Preview in
the lower right corner.
6. Click in the Header checkbox and note where that section of the print area is called
out in the Preview.
7. In the Header field type our presentation title, which is Band Boosters Meeting.
8. Click in the Footer check box and type your name in the field below it.
9. Click the Apply to All button.
Viewing Presentations
There are four different ways to view your presentation in PowerPoint. The views can be
accessed using the buttons in the status bar, or by using the View Tab on the Ribbon.
Normal View displays a single slide as it appears in the presentation, as well as thumbnails
and an outline tab, where you can organize the structure. Speaker notes can be added in
the bottom section of this window. This view is used to create and edit slides.
Slide Sorter View shows thumbnails of your slides. From this view you can reorder slides
by dragging and dropping them, or you can set the timing for the slide show. You can
also hide slides in this view. Hiding a slide will keep it in the file, but it will not show
when you view the presentation.
Notes Page View allows the speaker to create notes to use during a presentation. Each
page corresponds to one slide. These can be printed to assist the presenter during the
presentation. Use this view when you’re composing speaking topics.
Reading View/Slide Show View displays the slides as an audience will see them. Use the
arrows and icons on the lower right side of the Status Bar to advance slides or switch Slide
Show Tab
The Slide Show Tab allows you to review the slide show from beginning to end or from
the current (active) slide. You can also control how the show will be presented and
rehearse timings in the Set Up Slide Show drop down box.
Transitions
If you've ever seen a PowerPoint presentation that had "special effects" between each
slide, then you've seen slide transitions. A transition can be as simple as fading to the next
slide, or it can be a flashy, eye-catching effect. That means you can choose transitions to
fit the style of any presentation. Applying a Transition
1. Open FlashCards.pptx from your flash drive.
2. Select Slide 1 .
3. Click the Transitions tab and locate the Transition to This Slide group.
4. Notice how the None option has a gray background. This means that the currently
selected slide does not have a transition. This is the default setting for all slides.
a. Note that transitions are grouped into three categories; Subtle, Exciting, and
Dynamic Content.
b. The categories are self-explanatory except for Dynamic Content. In that
category, the transitions affect the content of a slide such as text boxes or
images instead of the entire slide.
6. Click on the Dissolve transition in the Exciting category to apply it to Slide 1 . This
will automatically preview the transition as well.
Summary
This chapter presented a comprehensive understanding of wordprocessing, spreadsheet
and graphic presentation application software, with regard to Microfsoft Office, Word,
Excel and Power Point. It features wordprocessing, spreadsheet and graphic presentation
with hands on practice on how to use them.A handfull of exercses were given for the
students to work on.
Exercises
1. What is wordprocessing?
2. Mention the features of a wordprocessing application?
3. Give some examples of wordprocessing application software?
4. What is a spreadsheet?
5. Mention the basic features of a named spreadsheet?
6. Give some examples of spreadsheet application software.
7. What is Graphic presentation?
8. Mention the features of Graphic presentations?
9. Give some examples Graphic presentation application software.
10. Create a word document and save.
11. Create a Spreadsheet book and save.
12. Create Presentation slide and save.
13. Define the following terms:
i. Ribbon
ii. Quick Access
iii. Tabs
iv. Transition
v. Function
vi. Mail Merge
References
https://www.technology.pitt.edu/sites/default/files/Microsoft%20Word%202019%20Fu
ndametals%20Manual.pdf
https://www.technology.pitt.edu/sites/default/files/Microsoft%20Excel%202019%20Fun
dametals%20Manual.pdf
https://www.technology.pitt.edu/sites/default/files/Microsoft%20Powerpoint%202019
%20Fundametals%20Manual.pdf
Chapter 11
Browsers, Search Engines and Online Resources
Overview
This chapter provides sufficient knowledge about browsers, search engines, and online
resources. It sheds light on the definitions, types, and importance of the applications in
modern-day information retrieval systems, such as major concepts on search engines,
browsers and the importance of online resources are discussed. The chapter is summarized
and selected exercises are provided for the readers.
Objectives
This chapter provides students with basic knowledge of browsers, search engines, and
online resources. Specifically, students should be able to:
a) Define browsers, search engines, and online resources.
b) Describe types of browsers and search engines
c) List the examples of search engines
d) Explain formulation of typical queries for retrieving text documents using
BOOLEAN logic
e) List the steps required to send and receive requests from the Internet through the
browser.
f) Illustrate the components of the search engine with a diagram
g) Explain the available online resources and their usefulness in society.
1. Research and learning: There are available online resources used for research. Examples
of online resources used for research, teaching, and learning are online libraries, eLearning
platforms, and online tools.
Online libraries: These are resources that offer access to a vast digital collection of books,
articles, journals, and other documents for reading and downloading by users. The libraries
are accessed through browsers or specific apps developed for the libraries. These resources
are accessed conveniently, making them an alternative to traditional libraries in terms the
ability to read and listen to materials on various mobile gadgets. Specific contents offered
by the libraries include ebooks, audiobooks, images, videos, multimedia, and scholarly
articles. Services offered by online libraries are summarized as follows:
a) Subscription: Some online libraries may require a subscription or membership fee,
while others are entirely free to use.
b) Search: Resources of various categories and collections in the libraries can be
accessed through queries submitted to the search engines via devices, such as
smartphones, tablets, and e-readers.
c) Recommendation: There are provisions for recommendation services based on the
profile and reading history or preferences of users.
Other services include the ability to highlight salient points on pages, take notes, bookmark
pages, and download materials for offline use.
eLearning platforms: These are application software that provides educational resources in
the form of video lectures, interactive modules, quizzes, and assignments, online courses,
training programs, and educational resources for learners of all ages and backgrounds, and
so on. It offers a flexible and accessible approach to learning and development of skills.
Examples of eLearning platforms are Moodle, Blackboards, Coursera, Udemy, Khan
Academy, and more. Services offered by online libraries are summarized as follows:
a) Online learning: Support for live virtual classrooms enhances online delivery
of educational content, where learners can interact with instructors and other
students in real-time.
b) Remote access to online courses and educational contents: eLearning
platforms utilize technology to deliver educational content, enabling learners
to access courses and materials remotely.
c) Development of new skills: It offers opportunity to students at all levels of
education, from nursery to higher education, as well as professionals seeking
to develop new skills or enhance existing ones. Also, it provides training to
employees or offer professional development opportunities to governments,
organizations, institutions and agencies.
Online tools: These are applications or web-based programs that provide various
functionalities and features to help users perform tasks, create content, manage projects
through collaboration. These tools offer opportunities to create and collaborate on
documents, store and share files, and manage projects in real-time at desired location.
Online tools are typically accessed through browser without any need for download or
installation. They are highly customizable, allowing users to tailor the application to specific
needs and preferences. There are numerous types of online tools available, including
productivity tools, design tools, collaboration tools, communication tools, and educational
tools. Online tools offer several benefits, such as accessibility, ease of use, and cost-
effectiveness. Users can access online tools from any device with internet connectivity via
browser. These are convenient and flexible resources are available to a wide range of users
at free or low-cost. However, online tools can also have limitations, such as limited
functionality, security concerns, and potential reliability issues. It's important for users to
choose online tools that meet their specific needs and requirements and to take appropriate
precautions to protect their data and privacy. Some examples of online tools include,
Google Drive for document creation and sharing, Canva for graphic design, Trello for
project management, Slack for team communication, and Khan Academy for online
learning.
2. Communication and social networking: The online resource used to create, share, and
interact with the Web contents and connect with other users is social media.
Social media: This is an application that is designed to facilitate social networking and
communication. It allows users to share information, opinions, and experiences with others
to meet specific needs. Users can also interact with content by liking, commenting, and
sharing it with the network of friends and followers on issues bothering on marketing,
advertising, learning, banking, healthcare and more. These interactions and other activities
can extend the reach and engagements to the target audience on a large scale, thereby
expanding the business. However, social media can also have negative effects on mental
health, privacy, and personal relationships. Examples of social media applications are:
Facebook, Twitter, Instagram, LinkedIn, YouTube and more.
3. Commerce: Online marketplaces are facilitated applications the support transactions
between buyers and sellers on a commission or fee basis. Example of online resource for
facilitating commerce is eCommerce platform.
eCommerce platform: This is an application used to access large customer base and a
variety of marketing and advertising tools to promote products sales and services. It is
capable of processing fast and accurate transactions, including payments as well as performs
price comparisons among different sellers. Also, product reviews and ratings from other
buyers are readily available for buyers to make informed purchasing decisions. Examples
of eCommerce platforms are: Jumia, Konga, JiJi, Amazon, eBay, Etsy, Alibaba and more.
A browser (otherwise called a Web browser) is an application for accessing the Web. It
provides an interface for the Web user (i.e. client) to communicate with the database (i.e.
Server). The browser initiates HyperText Transfer Protocol (HTTP) request to the server
through the information provided by the client via Uniform Resource Locator (URL).
Examples of URLs are: http://www.nuc.edu.ng; http://www.uniuyo.edu.ng,
http://cbn.org, and more. HTTP is the protocol for transmitting data and nuc.edu.ng is the
domain name.
The following steps are defined for a Web page to be displayed on a browser:
ii) Provides the interface for users to send requests to the Web
iii) Rendering of markup codes for Web pages
iv) Delivers interactiveness in terms of full-motion videos, and animations.
v) Displays Web pages of unstructured data of documents.
There are different types of web browsers available for use on the Web; such as:
Microsoft Edge: It is a high-speed and secure browser, developed by Microsoft and pre-
installed on Windows 10 devices.
Apple Safari: The browser is fast and compatible with Apple devices. It is developed by
Apple.
Opera: This browser has built-in Virtual Private Network (VPN) and ad blocker features.
It is developed by Opera Software.
Brave: The browser has privacy features and a reward program for users. It is developed
by Brave Software,
Vivaldi: The browser is known for its customization options and power user features. It is
developed by Vivaldi Technologies.
Konqueror: This browser is HTML 4.01 compliant and provides support for Java Applets,
JavaScript, CSS 1, CSS 2.1, as well as Netscape plugins.
Lynx: This browser is specifically developed for users on Unix, VMS, and other platforms
running cursor-addressable, character-cell terminals, or emulators.
Search engine is an application program that facilitates search and retrieval of stored
information from database. To retrieve the content of Web pages stored in large database,
request (i.e. query) is submitted to the search engine, through the user’s interface. Query is
a combination of terms using keywords and/or phrases (or terms) that represent the
attributes of the stored document. Query term(s) is used by search engine to match against
the indexed document in the database and display a list of ranked results based on the
order of relevance. Search engine comprises different components that work together to
achieve the purpose of retrieving relevant information (or feedback to users’ queries) to
meet the information needs of its users. These components are: indexer, database, web
crawler and user interface. These components are illustrated in Figure 8.1. Examples of
Search engines are: Google, Yahoo and more.
Crawler
INDEXER
Database
Indexes
1. User interface: The interface provides a platform for interaction between the user
and database of indexed Web pages. It is implemented on Web browser, e.g.
Chrome, Edge, Firefox and more.
2. Web crawler: This is an application that continuously searches, identifies and collects
information regarding new or Web pages with updated information to be indexed.
The Web pages are downloaded automatically from the seed set and links on the
pages are extracted. This process continues recursively using a set of predefined
rules. A seed set is the starting set of URLs that forms the input to the crawler.
3. Indexer is an application program that generates indexes for stored resources on the
Web.
4. Database provides storage for information on the Web pages, such as textual, audio,
video and multimedia.
11.3.2 Functions of search engine
Queries are formulated with a view to improving the relevance of the retrieved
documents. There are various options to formulate or modify queries to meet the users’
information needs of users of the search engine. These options include: Boolean operators,
phrase searching, title searching, language specification, and exact match of URL, links or
titles.
Boolean operators: The operators include: AND, OR, NOT. “AND” operator sugests a
particular group of terms mentioned in the query are present in result. Example, a query
“student AND lecturer” indicates that all the retrieved documents is acceptable if it contains
“student” and “lecturer”. “OR” operator signifies that any of the group of terms mentioned
in the query is present in the search result. Example, a query “student OR lecturer” signifies
that all the retrieved documents is acceptable if it contains any of “student” or “lecturer”.
“NOT” indicates that if a particular term is present, the item is rejected. Example: “NOT
student” indicates that any document with “student” in the content is rejected.
Phrase searching: It is one of the most useful ways of improving precision in document
retrieval from the Web by using quotation marks around the phrase. Example: “School
Teacher” (with the quotation marks) retrieves only the Web pages that contain the word
“school” immediately in front of the word “teacher.”
Search engines are considered to fall into one of following four categories based on their
functions, such as:
General Search Engines: These engines search for large portions of all pages that exist on
the Web on wide range of topics. It matches the user’s query with the indexed content on
the Web to provide relevant feedback to the users. Examples are: Google, Bing, Yahoo,
GigaBlast, Ask, MSN Live, AOL, Exalead and more.
Specialty search Engine: It focuses on searching kind of information specific to user’s niche,
file type, or sources from a particular subject or geographic region. This valuable to tool
for users whose information needs focus on specific domains or industry. These are search
engines specifically developed for; News, commercial, medical travels, legal information
and so on. Some examples are: Lexis/Nexis, Factiva, and DIALOG, Technorati, IceRocket,
Bloglines, Google Blog Search, Podcastdirectory.com, Podcast.com, pipl Search, Infobel,
Yahoo People Search, Intelius, PeopleFinders and more.
Visualization search Engine: It performs the function of showing relationship in sets of the
retrieved items, such as: diagrams, images, or other “visuals”. The search engine is a
valuable tool for users who need information in fields that involves complex visual data,
such as science, engineering and design. There are different types of visualization search
engines, namely: concept maps, image, video and 3D (three-dimensional) search engines.
Examples are: Kartoo, TouchGraph, and Grokker, and Quintura and more.
Meta search Engine: It gathers together the search results on a specific topic from multiple
search engines, simultaneously. It is useful for users who are interested in multiple searches
from multiple search engines so that results could be compared for different search engines.
Some examples of Meta search engines are: Dogpile, MetaCrawler, DuckDuckGo, Clusty,
Ixquick, Mamma. Search.com and more.
11.3.5 Criteria for measurement of effectiveness of search engine
The following criteria can be used as measures to determine the effectiveness of the
performance of search engine.
Relevance: It measures the degree of similarity between results returned to the user’s query
and the actual query submitted by the user.
Speed: it measures the time lagged between the submission of query and the expected
results (or feedback) to the user.
Coverage: it measures the total number of websites and the Web pages indexed by the
search engine.
User interface: It measures the user-friendliness bothering intuitiveness, easy to navigate
and ability to refine search queries and filter results effectively.
Personalization: This is the measure of ability to adapt search results to specific users’
information needs and preferences.
Security: It measures the level of privacy of users’ data and protection from malicious Web
contents.
Accessibility: this measures the level of accessibility to users with varied information needs.
Summary
Exercises
2. List the functions each of the following (i) browser (ii) search engine (iii) online
resources.
3. Explain the types of each of the following (i) browser (ii) search engine
7. Explain suitable online resources in (i) Education (ii) Research (iii) Commerce
References
Chang, Y., & Deng, H. (2021). Query Understanding for Search Engines (1st ed.). Springer.
Croft, W., Metzler, D., & Strohman, T. (2009). Search engines: Information retrieval in
practice (1st ed.). Addison-Wesley.
Goker, A., & Davies, J. (2009). Information retrieval: Searching in the 21st century (1st
ed.). Wiley.
Levene, M. (2010). An Introduction to Search Engines and Web Navigation (2nd ed.).
Pearson Education Canada.
Patel, J. M. (2020). Getting Structured Data from the Internet: Running Web
Crawlers/Scrapers on a Big Data Production Scale (1st ed., pp. 3-12). Apress.