Basic computer skills
Basic computer skills
Basic computer skills
1. INTRODUTION
We are currently living in a time of technological revolution, a revolution which is affecting our
daily lives in many different areas. The major contributing factor to this revolution is the
phenomenal development in the computer field. This leads to a new area where more emphasis is
placed on mental labour than on physical labour. It is therefore becoming increasingly important
that people from different walks of life should be aware of computer uses and computer literacy
should be an important issue. Industries/schools and firms cannot afford to ignore many
advantages which comes with the developments in information technology have made possible
in the efficient and effective operation of their business. Today, almost all organizations,
institutes, many households and individuals use computers on a dally bases. The dramatic
development in IT (Information Technology) is the use of the INTERNET (cyber). We are
currently getting towards the digital world were each and every transaction needs to be
computerized.
What is ICT?
The integration of computers and telecommunication facilities for the purpose of communication is
what is referred to as information & communication technology (ICT)
Information Technology
Communications Technology
• These are financial savings that are attributed to the use of computers, e.g.
CLASSIFICATION OF COMPUTERS
• It is important to understand the various classes of computers for a number of reasons, e.g.
Cost
Speed of processing
Amount of storage ®Operating environment
Types of computers:
• Retrieves data
1. Computer can be used as a great educational tool. Students can have access to all sort of
information on the internet.
2. Computer processing eliminates the human errors of computing and information processing.
3. Computers combined with communication technology offer very fast speed and rich
communication facility at low cost.
4. Computer now offer sophisticated and powerful software for representing information in rich
formats with visual and video facilities.
5. Computer processing eliminates the human errors of computing and information processing.
6. Increases speed of computing and processing information in any other way.
7. Computers can store large volumes of information without occupying too much space, as is in
the case of information stored in form of books and paper documents.
8. People are using computers for paying their bills, managing their home budgets or simply having
some break and watching a movie, listening to songs or playing computer games.
1. Unemployment: Different tasks are performed automatically by using computers. It reduces the
need of people and increases unemployment in society.
2. Wastage of time and energy: Many people use computers without positive purpose. They play
games and chat for a long period of time. It causes wastage of time and energy. Young
generation is now spending more times on the social media websites like Facebook, Twitter etc.
or texting their friends all night through smart-phones which is bad for both studies and their
health. And it also has adverse effects on the social life.
3. Data Security: The data stored on a computer can be accessed by unauthorized persons through
networks. It has created serious problems for the data security.
4. Computer Crimes: People use the computer for negative activities. They hack the credit card
numbers of the people and misuse them or they can steal important data from big
organizations.
5. Privacy violation: The computers are used to store personal data of the people. The privacy of a
person can be violated if the personal and confidential records are not protected properly.
6. Health risks: The improper and prolonged use of computer can results in injuries or disorders of
hands, wrists, elbows, eyes, necks and back. The users can avoid health risks by using the
computer in proper position. They must also take regular breaks while using the computer for
longer period of time. It is recommended to take a couple of minutes break after 30 minutes of
computer usage.
7. Computer viruses .Computers are prone to mistakes and errors they can easily be crushed or
affected by viruses hence losing all essential data.
There are two parts that makes up a computer system and these are:
What is hardware?
Hardware is the physical or tangible components of a computer system that is seen and can be touched.
E.g. keyboard, mouse, cables, monitor, etc. To use a computer we must have the means of inputting the
data we work with and somewhere to store or output data/ information.
What is software?
Software is simply a set of instructions (or programs) written in a mean the computer can understand.
Software sits on top of hardware, mean that, it is installed on the hardware and takes control of it. There
two types of software which is system software (operating system) and Application software. Both
software’s as to be present in the computer to carry out a specific application.
The mother of all software’s, is the system software. It is this software which is installed first, because it
is the one which knows the composition hardware and can talk or control it. Application software’s
different and are many, they perform specific factions what there designed to do. Application software sit
on top of the system software to carry out their operations
Computer software is in three types – Systems software, Utility software, and Applications
software
OPERATING SYSTEM
• It is the one that tells the hardware what to do and how to do it.
• It acts as an interface, i.e. as a link, between applications software and the hardware.
An operating system basically consists two main parts namely: shell and kernel: shell is outer
part of an operating system used to interact with operating system. Kernel is the core of the
operating system regarded as the operating system. It is the kernel that is responsible for
managing, controlling computer resources such as the processor, main memory, storage
devices, input devices, output devices and communication devices. Os functions include the
following:
1. Single program operating system : allows processing of one application program in the
main memory at a time
2. Multitasking operating system: allows a single CPU to execute what appears to be
more than one application programs apparently at the same time.
1. Single-user operating system: is designed for use by only one person. It cannot support
more than one person and runs only one user application program at a time.
2. Multi-user operating system or multi-access operating systems allows more than one
user to interactively use a computer.
The user-interface is the part of the OS with which we interact, or the part the OS presents
itself to the computer user.
The term user interface: refers to the interaction between the user and a computer.
Menu driven interface: provide the user with a list of options to choose from: the interface is
suitable for beginners who may have difficulties recalling commands
Command driven interface: also called command line interface. These are interfaces that
provide a platform for communication with the users through the use of instructions called
commands. Users have to enter a command using a keyboard.
The following are some of the details about the user interface:
1. Theuser interface is how the computer's operating system presents information to the user,
and how the user gives instructions (commands) to the computer.
2. There are two kinds of User Interface: text user-Interface and graphical user-interface (GUI).
The text user-interface presents information to the user in the form of text. Because the user
has to type in commands, it is hard to use since he/she has to master the commands. Look at
the picture insert of a text user-interface given below. The user has to type and enter
commands at an insertion point called the Command Prompt
3. Examples of operating systems with text user-interface are MS-DOS and PC-DOS.
4. Unlike the text user-Interface, the GUI presents information to the user in the form of pull-
down menus and icons.(See a screenshot of a window below.)
5. The user clicks on pull-down menus to display the menu commands. Icons are small pictures
that represent something such as a file, a folder or a computer program.
6. With a GUI, the user gives commands to the computer by selecting items from a menu or by
clicking on an icon when using a pointing device such as a mouse.
UTILITY PROGRAMS
• Utility programs are those programs used for certain purposes to extend the capability
of the Operating System.
– Antivirus software, e.g. Norton, Dr. Solomon, McAfee, AVG, Panda, Avast - for
checking and protecting a computer against viruses.
APPLICATIONS SOFTWARE
• Applications software interacts with users directly – it is the one which knows how to
manipulate data the way the user wants it to be.
• It does not have the capacity to control or interact with the hardware directly.
Databases, e.g. Microsoft Access, Paradox, dBase 7.Financial analysis software, e.g. Pastel.
Authennticity: the term refers to genuineness, validity and or legitimacy of an item. When you
acquire software from the vendor, make sure it is an original copy that is accompanied by the
developer’s license and certificate of authenticity. This is because some people illegally
procedure pirated copies which is an offence.
Reliability and security: data security is paramount. A good software especially the operating
system should have security mechanisms that protect data and information from illegal access
Cold booting a computer: Once you turn the computer, it automatically goes through a process
of self-test and preparation for use. This process is called cold booting or boot up. Once you turn
on the computer. You may hear the sound of the cooler fan running. After a few seconds, lines of
text start scrolling up on the screen. This process is referred to as power-on-self test (POST).
POST checks on the existing drives, basic input and output devices such as the keyboard,
monitor and the mouse. If a problem is encountered, the process is halted and an error message is
displayed on the screen. POST is accomplished by a special firmware program called the basic
input/output system (BIOS) which is held in a ROM Chip mounted on the mother board.
Compatibility and system configuration: a software product should be compatible with the
existing hardware, operating system or application programs and should be readily upgradable.
Multimedia capability: refers to the ability for a computer to process and output text, sound,
video and pictures. A multimedia system consists of speakers,CD/DVD
The term troubleshooting refers to the process of diagnosing and trying to fix hardware or
software or software related problems. When using windows, you may experience some
problems such as:
What is CMOS?
CMOS-related error messages could be caused by a faulty or discharged battery. The battery can
become discharged if your computer has been turned off for a very long time. To resolve CMOS-
related errors, check the information that came with your computer or contact your computer
manufacturer. Because your CMOS settings are specific to your computer's hardware, Microsoft
can't provide specific instructions for changing them.
Whether you are already familiar with or new to this operating system, you are going to find Windows
XP easy to use right away, it’s a user friendly. It uses graphics and icons to symbolize items.
Function of Icons
The function of Icons is to represent a particular software or application. There different icons and each
represent different items.
Windows Desktop is the workspace of your screen on which icons, desktop components, application
windows, and dialog boxes appear.
A mouse: is a hand held device that controls the movement of a pointer on your screen. You use your
mouse to perform tasks on your computer.
As you move the mouse, a mouse pointer moves on your screen. When you position the pointer over an
object, you can press (click or double-click) the mouse button to perform different actions on the object.
For example you can click to select files, double-click to open and work in files, click-and-drag to move
files. In fact, you’ll probably use your mouse for most of the tasks. The pointer usually appears as an
arrow, but it can change shape.
Keyboard keys
Alphanumeric keys: also known as typing keys are labeled with alphabetic letters A to Z also special
symbols , also keys like caps lock, enter, tab key, space bar and backspace.
Function keys: are usually located along the top of the keyboard. They are labeled F1, F12. They are
used for tasks that occur frequently in various programs. E.g. pressing F1 key in most programs starts
the help menu.
Special purpose keys: are used in combination with other keys to give certain commands to a computer.
E.g. Ctrl + Esc are used to display the start the start menu. Special purpose keys are SHIFT, CTRL, ALT&
ESC
Numeric keypad keys: these consists of a set of numbers 0 to 9 and the arithmetic signs like + (addition),
_ (Minus), × (multiplication) and / (Division). They help the user to rapidly enter numeric data.
Function keys
The Function keys or F1 through F12 keys are used in programs as shortcut keys to perform frequently
performed tasks. For example, the F1 key is the key to open the online help for most programs.
Control Keys
The Control keys give the user additional control over text manipulation and cursor placement. They
may also be used as shortcut keys in many programs
REVIEW QUESTIOS.
1. What is booting? explain what happens in the computer during the booting process
2. Differentiate between cold booting and warm booting
3. What is the difference between function keys and special PC keys?
DEVICE. It’s an Internal or external computer peripheral or any piece of computer hardware that can be
connected to a computer e.g. printers, USB, disk drives, mouse, keyboard etc.
INPUT DEVICES
Input devices
Scanner
Mouse
Microphone
These are devices used to send or transmit data from a computer to another device or
user
• This is the most important part of computer hardware. It’s the brain of the computer
which does all different forms of data processing and manipulation
The processor is connected to memory by wires called buses. The processor is made from
many logic circuits. Logic circuits contain components called logic gates.
• The CU, the ALU and the RAM coordinate very closely during program execution
Control Unit – CU
The CU and the ALU are made on the same computer chip called the Central Processing
Unit (CPU) or the microprocessor.
MEMORY: is where data and program instructions are stored. It is divided into millions of
boxes called locations. All memory locations are the samesize. They each hold one byte of
data. One byte is made from eight bits. Note that all data entering and leaving a computer
must pass through memory.
Receiving raw data from input. Receiving processed data from the ALU.
Storing instructions required by the CU.Holding data awaiting output.
Holding data awaiting storage.
THE BIOS
• Every computer has specifications such as hard disk size, memory size, and processor
speed.
• Bios is a unit (usually part of the ROM) which keeps these specifications.
• During booting, the computer uses instructions in the ROM to check that these
parameters are correct.
IT SECURITY
• Security refers to the defence necessary to ward off threats imposed on IT resources.
• Security is ensuring that resources are free from unauthorised internal and external
manipulation.
• There are two types of security: physical security and data security.
• Data security ensures that data, information and software are safe from internal and
external threats.
Physical security ensures that all the various types of hardware are safe.
• Keeping all doors to computer rooms locked so that access is upon permission granted.
• Locking computers so that only personnel with computer keys can unlock and use them.
• Installing Firewalls to scrutinize all signals that enter or leave the computer or the
network
Firewalls: these are combinations of hardware and software that control access to a
network or computer from outsiders.
COMPUTER VIRUSES
• A computer virus is a program that is meant to cause some kind of damage or
discomfort when it is activated on an infected computer.
• Virusesare those malicious codes that are capable of replicating themselves and attack
computer programs in memory.
• A Trojan horse is a program disguised as something useful, which when run does
damage to the computer system while appearing to do something else.
• A virus that propagates itself across computer networks, usually via e-mail, is referred to
as a worm.A worm is a program which spreads (usually) over network Connections. It
does not attach itself to a host program
• The increase in transactions over the Internet has greatly increased the chance of virus
infection.
File viruses: File viruses infect program files. When you run an infected Program the virus runs first,
and then passes control to the original program. While it has control, the virus code copies itself to
another file or to another disk, replicating itself.
Boot sector: The boot sector is the pan of every hard disk and diskette which is viruses read by the
computer when it starts up. If the boot sector is infected, the virus runs when the machine starts.
Macro viruses: A macro virus is a piece of self-replicating code written in an application’s 'macro'
language. Many applications have macro
Encryptionaims to ensure the security of data during transmission. It involves the Translation of data into
secret code. To read an encrypted file, you must have access to asecret key or password that enables you
to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
Encryption:is the process of encoding a message or information in such a way that only authorized
parties can access it.
Authentication is a technique of making sure that a message has come from an authorized sender.
Authentication involves adding an extra field to a record with the contents of this field derived from the
remainder of the record by applying an algorithm that has previously been agreed between the senders
and recipients of data.
Dial-back securityoperates by requiring the person wanting access to the network to dial into it and
identify themselves first. The system then dials the person back on their authorized number before
allowing them access.
All attempted violations of security should be automatically logged and the log checked regularly. In a
multi-user system, the terminal attempting the violation may be automatically disconnected.
Some programs claim to be doing something destructive to your computer, but are actually 'harmless'
jokes. For example, a message may appear suggesting that your hard disk is about to be reformatted.
Unfortunately, it is easy to over-react to the joke and cause more damage by trying to eradicate
something that is not a virus.
Any system that requires computers to communicate with each other will need specialized hardware
and software such as:
Modems – Modems transmission speeds are quartet in band rates, which correspond to bite per
second
Communication programs – certain standard protocols ensure that systems can signed to each other
the start and finish of transmission and reception and any problems experienced with data
Network circuits and software
TYPES OF NETWORKS
LAN: are networks of computer and peripherals linked together on a single geographical Site.
A WAN is a collection of LANs, joined together over large geographical area. Devices on each LAN
communication over the WAN using direct network connects or modems where direct connections are
not available.
The workstations that connect to the servers are called clients. Peer-to peer networks have nor saver.
Topology; Most networks are either bus, star or ring. Star networks are the most reliable.
Star topology
In this topology, there is a central node called the server to which all other computers are linked. The
computers connected to the server are called terminals or workstations or slaves. The terminal
computers are also commonly known as clients. Thus a star network is also known as a client-server
network.
1. It is relatively cheaper because computer resources, e.g. printers and software are
concentrated on the server.
2. There is better or improved security and control for data and other resources because these
are located on the server computer where access can be monitored and controlled easily.
5. One faulty node of link does not affect the whole network.
1. Communication is somehow slow due to the presence of the intervening computer (the
server computer).
2. During the down-time of the server computer, the whole network is affected.
Ring topology
In this topology, there is no server and no client; all the computers are peers. The computers
are connected to a cable that runs round forming a ring as illustrated below.
PEER
PEER
PEER
PEER
Because there is no server computer to control communication, a special signal called a token is
sent round the network. The computer with the token is the one that is able to send while the
other computers are able to receive only. This ensures that only one computer can transmit at a
time.
1. Theoretically, this type of LAN is faster than the star network due to the absence of the
intervening server.
2. There are no signal collisions during transmission due to the use of a token which goes round
the network in one direction only.
4. Because each station on the ring acts as a repeater, ring networks can span longer distances
than star networks.
2. It is the most expensive topology because it requires two sets of cabling – one in each
direction- so that should the cables on one side get cut, the signals can be sent through the
other side.
Bus topology
What is a bus network?
In this network, a cable called a bus runs through. All the computers in the network are linked
to this cable.
Theoretically, this is a very fast network because computers are allowed to transmit their signals
simultaneously. One major drawback of this type of network is the possibility of collision of data
signals. Another problem is that if the bus is cut at some point, no signals travel along as the
circuit becomes open. Special software is used to ensure that collision of signals is avoided. A
technique or a protocol known as Carrier Sense Multiple Access/Collision Detection
(CSMA/CD) is used to control transmission of signals on this type of network.
In order to set up any computer network you need three things. What are they? You need
transport media, you need protocol, and you need a naming system. Why are these things
required? You will discover in this chapter. So, continue reading, but do it carefully so you don't
miss vital points.
Ethernet
The most common transport media used to convey network signals is called Ethernet. Ethernet
technology consists of communications channels such as UTP or fibre optic and network
repeaters such as hubs and switches
Communications Channels
A communications channel is a route through which signals travel from one point to another
point on a computer network. It is like a road through which traffic flows from one place to
another
There are two types of communications channels. These are wired and wireless.
Communications channels differ from each other mainly in the amount of data signals which
they can transmit at a time. This is known as the bandwidth. A channel with a greater bandwidth
carries more signals, and therefore transmits data faster than a channel with a lower bandwidth.
The bandwidth of a communications channel is given in bits per second (i.e. bps). Data is sent in
form of bits. A bit is a short-cut for binary digits. Binary digits are 0 and 1. Therefore, data
consists of strings of 0s and 1s, e.g. 01000001 which stands for A in a coding scheme called
American Standard Code for Information Interchange (ASCII). For example, the bandwidth of a
communications channel could be 100Mbps. This means that the channel can transmit
100million bits in one second. This is clearly faster than one which is rated 10Mbps.
Having looked briefly at few details about communications channels in general, let us now learn
about the wired channels.
Wired channels form physical links between computers or other devices. Examples are UTP,
Coaxial cable and Optical fibre.
UTP stands for Unshielded Twisted Pair. This is a pair of copper wires that are twisted around
each other and are not protected from environmental interference.
Advantages of UTP
3. Modern UTP (e.g. Cat 6) has higher data transfer rates or bandwidth.
Disadvantages of UTP
Coaxial Cable
A coaxial cable consists of a central copper wire as one conductor surrounded by a mesh of
wire as an outer conductor. Coaxial cables transmit data faster than UTP. The drawing below
shows the structure of a coaxial cable.
1. Coaxial cables transmit data faster than UTP because their bandwidth is larger.
4. For these reasons, coaxial cables are not very commonly used in computer networks
nowadays.
This is a very thin rod of extremely pure glass the size of your hair. Signals are transmitted in
form of light instead of in form of an electric current like in UTP and coaxial cable. Each fibre is
bent at a special angle to allow for total-internal reflection of light. (Do you recall total-internal
reflection from your Physics lessons at school?) Several glass fibres are bundled together to
form the optical fibre.
1. Fibre optic cables carry more data because they have a much greater bandwidth than metal
cables.
2. Fibre optic cables are less susceptible (i.e. vulnerable) than metal cables to interference.
3. Fibre optic cables are much thinner and lighter than metal wires.
1.The main disadvantage of fiber optics is that the cables are expensive to buy and install.
3. The glass can be affected by various chemicals including hydrogen sulphide gas.
5. Optical fibres cannot be joined together as easily as copper cable and require additional
training of personnel to handle them.
Wireless Channels
These are communications links that allow for the sending of data as electromagnetic waves.
Examples are infrared, radio, microwaves, and satellite.
Satellite Dish
The advantage of some of these Channels is that data can be sent over very long distances by
remote. (Remote means with no physical connection between sending and receiving systems.)
The bandwidth is also large. The picture below shows a satellite dish.
A satellite dish transmits and receives signals to and from a satellite which is positioned in
space above the earth. (See illustration below.)
Communications
satellite
Satellite Dish
Using satellite communication, messages can be sent round the globe in just a fraction of a
second. A common type of dish is the VSAT such as the one at TVTC. VSAT stands for Very Small
Aperture Terminal.
2. Fast setup – one can easily or automatically connect to wireless networks within range.
3. Cost - Setting up a wireless network is much less costly than buying and installing cables.
2.Interference - wireless networks are more susceptible to interference from lights and
electronic devices.
Having learnt about communications channels, we now turn attention to repeaters. What are
they?
Repeaters
When a signal is sent along any communications channel, it becomes weaker as the distance
from the source increases. It is the same with sound and light. This is called attenuation
One approach used to go round this problem is by including devices called repeaters at
certain points along the network
The repeaters are located at convenient points. They receive the transmitted TV signal, boost it
(or amplify it) and then re-transmit it towards its destination to the next repeater. This is
repeated until a strong signal gets to the final destination.
This technique is used to convey computer network signals. The repeaters used are hubs and
switches. However, hubs and switches do not only work as repeaters; they perform other
functions such as distributing signals to the correct destination.
Switch
Hub
A hub differs from a switch in certain respects. A switch is more “intelligent” than a hub. When
a hub receives data meant for one device, it broadcasts the signal to all the devices on the
network. Unlike a hub, a switch first identifies the owner of the data and then sends only to
that destination. A switch also works faster than a hub. Since switches are more efficient than
hubs, they are also more expensive. See pictures of switch and hub below
A switch or a hub can be used to interconnect network resources directly as shown below.
Network resources such as printers are often shared using this approach. Given below is an
example of a network of three computers sharing a printer.
To summarise, we see that to set up a computer network you need transport resources (e.g.
UTP and switches), protocols (e.g. TCP/IP) and a naming system (e.g. DNS). NIC and modem are
a part of the transport resources.
What is a firewall?
A firewall:is software or hardware that checks information coming from the Internet or a
network, and then either blocks it or allows it to pass through to your computer, depending on
your firewall settings.
A firewall can help prevent hackers or malicious software (such as worms) from gaining access
to your computer through a network or the Internet. A firewall can also help stop your
computer from sending malicious software to other computers.
• There are many ways in which a computer may become infected by a virus.
• Transfer of removable storage media, e.g. floppies, CDs and flash disks, from one
computer to another.
• Through e-mail; when you receive and open an infected e-mail, your computer gets
infected.
• Through downloads, e.g. of music, pictures, videos, documents and software on the
Internet
HOW TO MINIMISE VIRUS ATTACKS
To minimise the possibility of your computer getting infected by viruses, observe the following
guidelines:
• Don’t read e-mail from people you know but from whom you do not expect e-mail.
• Avoid the temptation to download anything you find interesting on the Internet.
• Don’t click on pop ups and other adverts that flash on your screen as you browse the
Internet.
• A hacker is a person who gains remote access to a computer or network not necessarily
for bad motives.
• A cracker is a person who also gains remote access to someone’s computer or network
but with the intension to cause havoc.
• To protect yourself against hackers, you should use very secure passwords and encrypt
your data during transmission.
• Secure passwords are those that do not use any names of people, organisations and
things like dates which a cracker can easily decode.
Did you know that the Internet is ranked one of the greatest inventions of all time? Other great
inventions were the wheel and the telephone. (In what way were the wheel and the telephone great
inventions?) The Internet is a global interconnection of computer networks. Nobody owns it, but
anybody can connect to it.
The Internet is a great achievement for mankind. Connecting to the Internet has three benefits in
general.
1. Communication. One can communicate with other people globally at much reduced cost through
use of many communication features, e.g. e-mail.
2. Retrieval of information. From the Internet, you can retrieve almost any information you want and
on any subject.
3. Commerce. If you do business, you can advertise your products and services to global customers.
You can also buy goods and services through the Internet.
Computer software can be downloaded on the Internet. Finding and buying software without the use of
the Internet is extremely difficult. Sometimes it is impossible, especially in a developing country like
Zambia. Most software requires regular updating once installed in a computer. Updating computer
software, e.g. operating system and antivirus software is impossible without internet connection.
(Computer experts, unlike average users, find this, i.e. point number 5, to be the most important use of
the Internet.)
Browsing the Internet means searching it for whatever you want. To browse the Internet is simple. You
simply start the Internet browser software, e.g. Internet Explorer, Opera, Google Chrome or Mozilla
Firefox. Once in the browser you can navigate in so many ways. If you already know the address of what
you want, you simply type it in the address box in the browser and then click on a button to get to the
destination, or you can simply click your mouse pointer on any of the numerous hyperlinks to take you
to the destination of your choice.
This question sounds silly! It is really like asking someone the difference between a book and a book
page. So you see, a Website consists of Web pages. The information you access on a Website is actually
located in Web pages within that Website, just as the information you access in a book is located on a
particular page within that book. A Web page is actually a document of information that you access from
a Website. A website has an address like this: www.something.com. You will learn details of web
addresses later in this module.
Due to the advantages of the Internet as stated earlier, having Internet access is very useful. It is not
difficult to connect to the Internet. You can connect to the Internet by means of many devices such as
cell phones, computers, e-readers, and IPad. To connect to the Internet by means of a computer, one
requires some resources as listed below.
A communications channel, e.g. UTP or fibre optic
A router or a modem
An Internet service provider (ISP)
Protocols: are rules that govern how data is transimitted. These rules for the different types of
communication, but most come under the heading of TCP/IP (Transmission control protocol) (internet
protocol)
HTTP: stands for hypertext transfer or transimission protocol.The set of rules for transmitting web
pages. Hypertext is text that contains hyperlinks- the words or images that can be clicked on to take the
user to another page or part of a page. Links are those underlined words on the internet that when
clicked can take you to another web page.
FTP: stands for file transfer protocol: the rules for transimitting data files over the internet. FTP is used
for downloading music or publications as well as for sending we pages to a service provider.Web pages
are constructed with HTML (Hypertext markup language). This is a system of tags and other instructions
that determine how a web page will look when viewed in a browser.
A browser: is a software that interprets and displays web pages.
URL: Stands for universal or uniform resource locator. This is the address of a website or other resource.
Domain name system: this is the way that an internet resource is located. Each website or other
resource has a unique domain name. This is looked up on a domain name server, which translates it into
an IP address. An IP address is a set of four numbers that uniquely identifies a device on the internet.
Bandwidth: refers to the number of signals that can be sent along a medium at the same time.it affects
transmission speeds. Fast digital connections are called broadband. Broadband is necessary for
transmitting big files. Compression.Images, music, and other large files are often compressed before
transmission to make them download faster. JPEG, GIF & MPEG are common compression standards.
SSL: (Secure Socket layer): is the standard security technology for establishing encrypted link between
a web server and a browser. This link ensures that all data passed between the webserver and web
browsers remain private and integral. SSL is an industry standard and is used by millions of websites in
the protections of their online transactions with their customers. To enable to create an SSL conncection
a web server requires a SSL Certificate. Typically an SSL certificate will contain your domain name, your
company name, address, city and country.
The Internet service provider (ISP) is an institution or organization with facilities to connect computers
to the Internet. It is an ISP which allocates a domain name and the IP address. In Zambia, examples of
ISPs are Zamtel, Zamnet, CopperNET, Microlink, MTN and Airtel. ISP is important because connecting to
the Internet uses very expensive resources in terms of hardware and software. Individuals cannot afford
the costs. In addition, it may not be economical to provide your own resources to connect to the
Internet. ISPs acquire these resources but charge fees for providing Internet services in order to gain
from their investment.
(a) An intranet is like a mini version of the Internet. Organization members use networked computers
to access information held on a Server. The user interface is a browser -similar to those used on the
Internet. The intranet offers access to information on a wide variety of topics, and often includes access
to the Internet.
(B) An extranet is an intranet that is:' accessible to authorized outsiders, using a valid Username and
password. The user name will have access rights attached. Determining which parts of the extranet can
be viewed. Extranets are becoming a very popular means for business partners to exchange information.
As was mentioned, signals must be prepared and must be able to find their correct destinations on the
Internet. The router performs these functions. It is the router which identifies the destination of a signal
on the Internet. It uses the IP address which the user has specified when making a service request.
Another important function of the router is to prepare signals for more efficient transmission. Before
your signal or message can be sent, the router splits it into smaller chunks or slices called packets. It is
easier to send information in packets rather than in big chunks. This is just like we cut Nshima into
smaller lumps as we eat. Once the message has been split into packets, the router then identifies the
most convenient route for each packet. Packets don't usually travel along the same route to their
destination. Each packet is given, by the router, some accompanying information to ensure that it
reaches its destination. The receiving computer re-assembles the packets to form the original message.
Another equally important use of the router is to ensure that only signals meant for a particular network
are allowed to enter the network. The router acts in the same way as immigration officials at border
posts to scrutinize documents of travellers. Without routers, networks would soon be flooded by many
unwanted signals. See illustration below which shows how a LAN can be connected to the Internet.
EXERCISE
1. What is Internet?
2. Mention the three functions of the Internet.
3. What is a web browser?
4. What are examples of web browsers?
5. What is a search engine?
6. Mention examples of search engines.
7. What is a website?
8. What is a web page?
9. What is email?
10. How does email make mail efficient?
11. How does a website address differ from an email address?
12. Explain the role of ISP.
13. State three roles of the router.
The Workbook
Most of the Excel screen is devoted to the display of the workbook. The workbook consists of grids and
columns. The intersection of a row and column is a rectangular area called a cell.
Cells
The workbook is made up of cells. There is a cell at the intersection of each row and column. A cell can
contain a value, a formula, or a text entry. A text entry is used to label or explain the contents of the
workbook. A value entry can either be a constant or the value of a formula. The value of a formula will
change when the components (arguments) of the formula change. The appeal of spreadsheet programs
is the ability to change one value and watch all other values that depend on that first value
automatically change when the spreadsheet is recalculated.
The Excel worksheet contains 16,384 rows that extend down the worksheet, numbered 1 through
16384.
The Excel worksheet contains 256 columns that extend across the worksheet, lettered A through Z, AA
through AZ, BA through BZ, and continuing to IA through IZ.
The Excel worksheet can contain as many as 256 sheets, labeled Sheet1 through Sheet256. The initial
number of sheets in a workbook, which can be changed by the user, is 16.
Cell References
Cell references are identifiers for cells. They are like house numbers in a town so that when we
enter data in the cells we must know where the data is located. A cell reference is formed by
combining the letter for the column and the number for the row which intersect to make up
the cell. For example, where column C and row 5 intersect there is a cell whose cell reference is
C5. Notice that the cell reference starts with the column letter and ends with the row number
Cell references are the combination of column letter and row number. For example, the upper-
left cell of a worksheet is A1.
Entering Formulas
All formulas in Excel must begin with an equal sign (=). When a formula is entered into a cell, the
formula itself is displayed in the formula bar when that cell is highlighted, and the result of the formula
is displayed in the actual cell. When you are typing in formulas, do not type spaces; Excel will delete
them.
##### Error: Excel displays this error when a column is not wide enough to display all the characters in
a cell, or a cell contains negative date or time values. For example, a formula that subtracts a date in the
future from a date in the past, such as =06/15/2008-07/01/2008, results in a negative date value.
#DIV/0! Error: Excel displays this error when a number is divided either by zero (0) or by a cell that
contains no value
#N/A error: Excel displays this error when a value is not available to a function or formula.
#NAME?error: This error is displayed when Excel does not recognize text in a formula. For example, a
range name or the name of a function may be spelled incorrectly.
#NULL! Error: Excel displays this error when you specify an intersection of two areas that do not
intersect (cross). The intersection operator is a space character that separates references in a formula.
For example, the areas A1:A2 and C3:C5 do not intersect, so entering the formula =SUM(A1:A2 C3:C5)
returns the #NULL! error.
#NUM! Error: Excel displays this error when a formula or function contains invalid numeric values.
#REF! error: Excel displays this error when a cell reference is not valid. For example, you may have
deleted cells that were referred to by other formulas, or you may have pasted cells that you moved on
top of cells that were referred to by other formulas
#VALUE! Error: Excel can display this error if your formula includes cells that contain different data
types. If error checking for formulas is enabled, the ScreenTip displays "A value used in the formula is of
the wrong data type." You can typically fix this problem by making minor changes to your formula.
Word processors
We will start by asking these questions which should give you direction.
Obviously you understand what is meant by ‘word’ and what is meant by ‘to process’. In general,
therefore, word processors are computer programs for processing words. For example, this document
which you are reading now is in words, and was word processed. A word processor is a program which
you can use to produce a document such as this one. It also processes paragraphs, pages and entire
paper. This program allows the user to create letters, reports, memos, assignment, business documents
etc.
What kind of work or activity would necessitate the use of word processor?
Word processors are the most commonly used applications because every computer user does some
word processing operations at one time or another. For other people, it is because word processors are
very easy to learn or use. Word processors are used for
This means applying some quality improving features onto the document.
Multimedia files
Multimedia is a term that is used to describe the combination of text, sound, animation, video
and pictures. Multimedia can be used for entertainment purposes, as well as for use in the
classroom as learning tools. PowerPoint presentations, which use text, graphics and even
sound, is a form of multimedia which can be used for fun, in school, and even on the job.
Spreadsheets and graphs are also another type of multimedia. Websites which use a
combination of these elements is also considered a type of a multimedia.
Multimedia capability: refers to the ability for a computer to process and output text, sound,
video and pictures. A multimedia system consists of speakers,CD/DVD
Types of multimedia:
These are several types of multimedia applications. Text, graphics, animation, and audio all
make up a component of multimedia. The computer has to be the biggest conduit for
multimedia applications. Computers provided PowerPoint presentations that can include all the
components of multimedia. In PowerPoint you can show animated slides that contains text and
audio. Other forms of multimedia include talking storybooks, CD ROMS, and computer
simulation software. Cell phones now have many features as the computer so they provide
multimedia applications as well.
Simulations: refers to computer representations of reality. Examples are virtual reality, flight
simulations and computer games.
Printers
Printers are primarily used to produce information on a piece of paper or it’s a device used to
convert soft copy into hardcopy. The quality of a hardcopy depends on the printer’s printing
mechanism. Printers are classified according to different printing mechanism. The two
categories are impact and non-impact printers..
i. Laser printer
ii. Thermal printers
iii. Inkjet printers
iv. photo printters
Impact
In impact printers, the print head mechansim strikes an inked ribbon located between
the print head and the paper. The general features of impact printers are
o uses force by applying hammer pins to strike the paper
o slow speed in characters per second
o prints on most paper types
o transperancies not supported
o multiple copies may be printed at once
The two main types of impact printers are Dot-Matrix and Daisy-Wheel.
Non-Impact
With non-impact printers, the print head does not make contact with the paper, and no
inked ribbon is necessary. The general features of non-impact printers are
o print head does not make contact with the paper
o higher speed in characters per second is possible
o prints on most paper types but better quality obtained with better paper
o transperancies usually supported
o The three main types of non-impact printers are laserjet, ink-jet and thermal.
Dot-MatrixPrinters
Dot matrix printers are suitable for draft copies and home use, where quality of the finished
type is not critical. Dot matrix printers have tended to become cheap, but now are being quickly
overtaken by cheap laserjet and inkjet printers, which offer higher printing speeds and superior
quality, as well as good color
Ink-JetPrinters
Ink-Jet printers have become the defector standard for home computers and low
cost printing. They offer good quality at an affordable price.
conductive ink is forced through a small nozzle producing a small droplet of ink, which is
propelled towards the screen surface
the size and spacing of the ink drops is kept constant by vibrating the nozzle at a high
frequency (100KHz)
each drop of ink, after leaving the nozzle, is charged as it passes an electrode
the drops are deflected using another electrode
characters are formed from a dot-matrix, typically there are 10^3 drops per character
print quality is high, speed is slow, typically about 100cps
LaserJet printers are very common today. Most LaserJet printers have been based
on the Canon Print Engine, which originally ran at 4ppm (pages per minute), with
a resolution of 300dpi (dots per inch).
1. print quality: dot matrix printers are good for bulk printing of draft documents, laser is
good for printing official documents while thermal printers are good for check-out
counter receipts
2. Initial cost: though the prices of printers have come down, laser and thermal printers
are still expensive compared to inkjet printers.
3. Running cost: the cost of maintaining an inkjet printer is higher than that of maintaining
laser printers
4. Speed: the speed of printer is measured in pages per minute
5. Coluourprinting: most printers support black and colour printing, however, colour
printers, especially laser are relatively more expensive.
Exercise 1
1. Explain what a computer is.
2. List the two most commonly used input devices.
3. Differentiate between hardware and software.
4. Explain what is meant by the resolution of a monitor.
5. What is the function of a UPS device?
6. List any two software programs that come with the Windows operating system.
7. Differentiate between data and information by using a real-life problem.
Exercise 2
1. List the main components of a computer and briefly explain the purpose of each component.
2. Name two input devices and two output devices found in your computer room in school.
3. Name any two types of storage media.
4. List the different types of communication media over which communication can take place.
5. List two advantages and two disadvantages of using a computer.
Exercise 3
1. Fill in the blanks:
a) The capacity of a hard disk is measured in ______________.
b) A CD/DVD drive is an example of a storage ___________.
A CD is an example of storage _______________.
2. Briefly explain the advantages of using a USB memory stick.
3. State whether these statements are true or false:
a) Dirt could cause the hard disk to crash.
b) Portable hard disks are faster than internal hard disks.
4. “Users are the main cause of data loss on flash storage media rather than technical problems.”
Briefly explain this statement.
5. What does it mean to 'burn a CD'?
6. What are advantages and disadvantages of memory cards?
7. Nikki’s uncle bought a LightScribe CD/DVD writer. How does a LightScribe CD/DVD work?
8. What are the advantages of using Blu-ray DVDs?
Exercise 4
1. Name the three basic operations of a computer system.
Exercise
1. State three factors of computer use that can contribute to health problems.
2. wezi B: has his computer monitor angled to the right. Explain to him why this is not advisable.
3. List three reasons why it is not advisable for computer system’s power cables to hang loose.
4. How does dust affect your computer system?
5. XYZ Company has advertised a position for a clerk who has touch-typing skills. Explain why a
clerk with touch-typing skills will be an advantage to the company.
Exercise
1. Briefly explain how you can extend the lifespan of CD/DVDs.
2. Explain to your friend why it is not advisable to use a desktop computer during a storm.
3. Why is it important to clean a scanner's glass regularly?
Exercise
1. What is the difference between a warm boot and a cold boot?
2. “There is no need to save your work before you shut down your computer.” Do you agree with this
statement? Motivate your answer.
3. Briefly explain what vampire power is.
4. Indicate two ways in which you can conserve the battery life of your cellphone.
5. Indicate how a mouse is used to interact with objects on the screen.
Exercise
1. Briefly explain what hardware theft is.
2. Give any two consequences of hardware theft.
3. Some laptops use passwords, possessed objects or biometric devices to gain access to a system.
Briefly explain what passwords, possessed objects and biometric devices are.
4. Indicate three ways in which you can prevent virus infections.
5. Explain what is meant by data encryption.
Data processing
Either the preparation of data for processing by a computer, or the storage and processing of raw data by
the computer itself.
Data processing
(1) Processing information by machines. Data processing was the first name used for the information
technology business, and it is still used as an umbrella title. In the early days, it meant feeding punch
cards into tabulating machines. Then computers followed. See information processing cycle. See also
preprocessing.
(2) Processing data/information. In this context, it refers specifically to processing the actual data of the
business (raw number crunching) in contrast to the processing overhead of the operating system and
networks. In many instances, the computer does very little data processing compared to the processing
required by the operating system, graphical interface and other infrastructure components.
Data Processing
It’s a Process that involves transformation of data into information through classifying, sorting, merging,
recording, retrieving, transmitting, or reporting. Data processing can be manual or computer based. Data
processing starts with the actual collection of data, manipulation, storage and dissemination of
information
Data verification and validation are two methods of making sure no errors occur in the data
before processing takes place.
Data verification
Typing data into a computer from data capture form is called transcribing. If an error is made it
is transcription error. Verification is done to eliminate transcription errors .
Data validation
In computer science, data validation is the process of ensuring that a program operates on
clean, correct and useful data. It uses routines, often called validation rules, that check for
correctness or meaningfulness of data that are input to the system. The rules may be
implemented through the automated facilities of a data dictionary, or by the inclusion of
explicit application program validation logic.
The simplest data validation verifies that the characters provided come from a valid set. For
example, telephone numbers should include the digits and possibly the characters +, -, ( and)
(plus, minus and the parentheses). A more sophisticated data validation routine would check to
see the user has entered a valid country code; the number of digits entered matches the
convention for the country or area specified, etc.
Incorrect data validation can lead to data corruption or a security vulnerability. Data validation
checks that the data are valid and sensible/reasonable before they are processed .
EXERCISE
1. What is a modem?
2. How does a modem differ from a NIC?
3. In what way is a modem similar to a NIC?
4. Why does a computer require a modem or a NIC?
5. Mention the three wired channels.
6. Which wired channel is the cheapest, the most expensive?
7. What is bandwidth?
8. Which wired channel has the least bandwidth, the largest bandwidth?
9. Why is UTP common on LANs?
10. What are the advantages of satellite communication?
11. Mention three things that are required for networking.
12. What do you understand by IP address, and what is its importance?
13. In what way is a switch similar to a hub? In what way is it different?
14. Explain the meaning of the URL http://www.assist.com.
15. Explain why protocols are useful in computer networks.
Exercise
1. What is meant by LAN topology?
2. Draw diagrams for each LAN topology.
3. Explain why the star topology is the most common LAN topology.
4. How are signal collisions avoided on star topology, ring topology and bus topology?
5. What do the letters CSMA/CD stand for?
6. Ring topology is not common anymore nowadays. What are the reasons?
7. In what kind of situation would you not want to implement a bus network? Explain.
Exercise
1. What is a stand-alone computer?
2. What is a computer network?
3. What advantages can you think of for networking computers?
4. In what way do computer networks reduce operational costs?
Exercise 3.0
1. Why does a computer require operating system?
2. Mention at least two functions of operating system. (see page )
3. Name four operating system programs.
4. An operating system is associated with a user-interface. What is a user-
interface?
5. Mention the two types of user-interface.
6. What do the letters WIMP stand for?
7. Which user-interface is associated with the command prompt?
COMPUTER BUSES
Buses are routes through which data and instructions travel from one point to another in the
computer.
The processor has many buses that convey different signals.
The capacity of a computer is also determined by the size of its buses.
The greater the bus, the faster the computer because many signals can be transferred at the
same time.
Data Bus which carries data signals between the CPU and RAM.
Address Bus which carries addresses of data between the CPU and RAM.
Control Bus which carries control signals from the CPU to all other units.
STORAGE CAPACITY
EXERCISE
Hard Disk
Flash Disk
STORAGE DEVICES
Storage devices are used to store user data and computer software.
There are three types of storage devices.
The three types are magnetic devices, optical devices and semiconductor devices.
SEMICONDUCTOR STORAGE
A semiconductor storage device does not use magnetism or light to store data.
Semiconductor storage devices use electronic chips to store data.
An example of a semiconductor storage device is a flash disk.
Flash disks store more data than floppy disks, and they are easier to carry.
Some flash disks store
More data than CD-ROMs and DVD-ROMs.
OPTICAL DISKS
The use of computers has its own special set of risks and difficulties
Repetitive strain injuries RSI: Joints Get Worn and Muscles Strained If They are used over and over to
do the same activities. Extensive typing is a good example of this and can result in RSI
Remedy: take frequent breaks, use ergonomics keyboard, use voice activated software, use wrist rests.
Backache.Can be caused by long periods of sitting, especially in uncomfortable chairs. Remedy: get up
frequently, choose a well-designed chair, and adjust the chair to the correct and comfortable height.
Eye strain: eye strain can be caused by long periods of looking at a screen, with back lighting behind the
screen. Remedy: use larger screens, don’t position screens in front of windows, and use ant-glare filters.
Stress: can be caused by frequent changes in work patterns, new software and procedures to learn and
typing to keep up to date. Remedy: retrain when possible, say no to extra work, don’t work long hours,
don’t take work home.
Ergonomics is an applied science concerned with designing and arranging things people use so that the
people and things interact most efficiently and safely —called also biotechnology, human engineering,
human factors. Ergonomics is the scientific study of people at work. The goal of ergonomics is to reduce
stress and eliminate injuries and disorders associated with the overuse of muscles, bad posture, and
repeated tasks. This is accomplished by designing tasks, work spaces, controls, displays, tools, lighting,
and equipment to fit the employee´s physical capabilities and limitations.
Ergonomics is about making things better. The better the ergonomics the more efficient the tool, task
or system is. That makes for a happier, healthier user, a streamlined system and a lower bottom line.
Who doesn't want some of that? There are so many benefits that ergonomics offers to the employees
and some of them are listed or highlighted below
Better Comfort: A core benefit of ergonomics is an increase in the user's comfort. Most often user
comfort is seen as the focus of ergonomics but it is actually a result of improving the ergonomics
through a more intuitive design that supports natural body mechanics.
Improve Communication Clear communication between the user and whatever is being used is another
benefit of ergonomics.
Reduce Skill Level: Another benefit of ergonomics is that with better ergonomics the amount of training
needed for proper operation is reduced. If you never need to read the owner's manual then it has good
ergonomics.
Save Time :Ergonomics is about making things more efficient. And one of the benefits of ergonomics is
that by increasing the efficiency of a tool or a task, you tend to shorten the length of time it takes to
accomplish your goal.
Reduce Fatigue: With increased comfort and easier to understand usage come reduction in fatigue,
another benefit of ergonomics.
Increase Accuracy: Ergonomics also benefit your accuracy by lessoning the chance of errors. From a
system perspective this is one of the greatest benefits from ergonomics.
Lessen Chance of Injury: A great benefit of ergonomics if that there is less of a chance to injure yourself
or someone else. When you spend less time performing a task with tools that are intuitive to use, don't
require special mental or physical skill, and do not fatigue you then a lot of causes of injuries are
removed.
Lower Cost: The cost of an individual tool may not be lowered. In the case of most specially designed
"Ergonomic" tools they are actually much higher. But the overall cost in terms of time, labor and other
inputs (blood, sweat and tears) come down.
General Outcomes
Demonstrate an understanding of the concept of safety and misuse when using technology
Operate and take care of a computer and its common peripherals
Use a computer to accomplish given tasks
Appreciate the role computers play in everyday life.
demonstrate understanding and operating skills required for a variety of ICTS
Communicate using appropriate multimedia to interact with others.
Enable learners attain Entrepreneurship skills for survival
Key Competences