It A Level CHPT 2 Hardware and Software
It A Level CHPT 2 Hardware and Software
It A Level CHPT 2 Hardware and Software
1
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Learning Objectives
• By the end of this lesson, students will be able to:
define hardware
evaluate input, storage and output devices
define software
evaluate different types of software
explain the purpose of system software
evaluate application software
describe utility soft ware
compare custom-written and off -the-shelf software
evaluate user interfaces 2
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.0 HARDWARE
3
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Hardware devices can be internal to the
computer system (such as the central processing
unit, memory or motherboard) or they can be
external to the computer system (such as the
monitor, keyboard or mouse).
4
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Hardware is categorised into input, process,
output and storage devices.
6
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Processor/Central Processing Unit (CPU): It is
the part of the computer that carries out
calculations, executes instructions and
processes data.
7
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Output devices: allow the communication of
data/information from a computer (e.g. monitor,
printer, speaker, projector, etc.).
8
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Storage devices: store data onto a storage
medium so that it can be used at a later time
(e.g. Hard disk, USB/flash drive, CD/DVD, etc.).
9
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Reasons why a user may want to save data to Secondary Storage
11
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.1 Mainframe Computers and Supercomputers
• Mainframe Computers
• A mainframe computer is larger and has more
processing power than some other classes of
computers, such as minicomputers, servers,
workstations, and personal computers
12
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Mainframe computer likes as a big centralized
machine that contains the large memory, huge
storage space, multiple high grade processors, so
it has ultra-processing power compare to
standard computer systems.
13
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Characteristics of Mainframe computers
Modern mainframes can run multiple different
instances of operating systems at the same time.
Nearly all mainframes have the ability to run (or
host) multiple operating systems
Mainframes can add or hot swap system capacity
without disrupting system function, with
specificity and granularity to a level of
sophistication not usually available with most
server solutions.
Many mainframe customers run two machines:
one in their primary data center and one in their
backup data center—fully active, partially active,
or on standby—in case there is a catastrophe
14
affecting the first building.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Characteristics of Mainframe computers(Contd.)
Mainframes are designed to handle very high
volume input and output (I/O) and emphasize
throughput computing. Mainframe designs have
included subsidiary hardware (called channels
or peripheral processors) which manage the I/O
devices.
It is common in mainframe shops to deal with
massive databases and files. Compared to a
typical PC, mainframes commonly have
hundreds to thousands of times as much data
storage online, and can access it reasonably
quickly.
A single mainframe can replace dozens or even 15
hundreds of smaller servers.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Uses of Mainframe Computers
Census
Transaction processing
Industry statistics
Consumer statistics
E-Business
Banking Sector and Finance Sector
Stock exchange
Research Center
Ticket reservation in railway and airlines
Credit card Verification Insurance Sector.
16
Telecommunication
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Applications of Mainframe Computer
Health Care Sector: Health care organizations contain the
personalized information of every patient, so they contact
them for their treatment. These companies maintain all
record of millions patients related to their disease,
medicine, and what appointment schedule they have.
Mainframe system allows privileging each single patient
for accessing his individual data along with privacy.
Defense Sector : In the defense area, mainframe
computer system is used to pass massive information in
different areas with protect such as land, ship, planes,
and home base as well. Mainframe system helps to
provide weather condition, trace accurate data to target
location, and use the GPS for doing preparation to attack.
17
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Applications of Mainframe Computer (Contd.)
Education Sector : Education is also very big sector, such
as international university where to need track lot of
persons such as employees, teachers, student, and
other. So mainframe helps to store and maintain all
information related to their employees and students,
and it allows to access information for top management.
Retail Industry : Today, retail industry is growing rapidly.
Some large retail companies have massive customer
base, so mainframe computer system is best option for
monitoring their inventory with accurate level, and it is
able to execute of massive transaction (billions) in short
duration.
18
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of Mainframe computer
Reliability, availability and serviceability: These computers are
better in performance and are reliable. As these computers are
also used for aeroplane guidance so they are 100% error free.
High-end scalability: They are scalable in the sense that more
hardware i.e. processors and memory can be added if needed.
Security: The security of these computers is very high. As these
computers are used in banks so the security is very important.
Long-lasting performance: These computers have a minimum
time limit of 10 years. So they can perform well for 10 years and
after that period companies can upgrade the mainframe
computer or replace it.
19
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of Mainframe computer ( Contd.)
Continuing compatibility: Mainframe computers have their
own operating system. These computers are highly compatible
with the processors and other hardware and software.
Huge memory storage: Due to a high number of processors
these computers have huge memory that can store and process
large amount data at a time.
Virtualization: These systems have a logical partition which can
help mainframe to overcome memory limitation.
Can run multiple OS: In mainframe computer, more than one
operating system can be run at a time to boost the
performance of the system.
Real-time monitoring and control: If any fault comes in the
system then the administrator of the system is notified
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
20
homastigbafe@gmail.com
• Disadvantages of Mainframe computer
High cost: These computers have a very high price and
they cannot be used in homes. Mainframes are only used
by big organization, banks, large websites and government
agencies.
Hardware/software is expensive: Windows and mac are
not run on mainframe computers. These computers have
custom software and hardware that are expensive for the
normal user.
A lot of space required: Mainframe computers need a
large space and also the temperature of the place should
not be hot. 21
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Disadvantages of Mainframe computer (Contd.)
High technical staff: For maintaining mainframe
computer specialized staff is needed. A normal
computer user cannot operate and debug the system.
Command drove interface: The terminal connected
to the mainframe computer have the text and a
command-based interface that is difficult to
understand.
Hardware crash: If any hardware crashed then the
whole system stops working.
22
•
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Supercomputers
• Supercomputer is a class of extremely
powerful computers. The term is
commonly applied to the fastest high-
performance systems available at any
given time. Such computers have been
used primarily for scientific and
engineering work requiring exceedingly
high-speed computations.
• A supercomputer is a computer with a
high level of performance as compared
to a general-purpose computer.
23
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Distinguishing Features of Super
computers
Supercomputers are the bodybuilders of
the computer world. They boast tens of
thousands of times the computing
power of a desktop and cost tens of
millions of dollars.
They fill enormous rooms, which are
chilled to prevent their thousands of
microprocessor cores from overheating.
And they perform trillions, or even
thousands of trillions, of calculations per
second. 24
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Distinguishing Features of Super computers
(Contd.)
Supercomputers have more than one CPU
(central processing unit). They use of several
CPUs to achieve high computational rates.
Rapid retrieval of stored data and instructions
is required to support the extremely high
computational speed of CPUs.
Supercomputers have a very large storage
capacity
Supercomputers have a very fast input/output
capability.
25
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Uses of Super Computers
Quantum mechanics
Weather forecasting
Climate research
Oil and gas exploration
Molecular modeling (computing the structures and
properties of chemical compounds, biological
macromolecules, polymers, and crystals)
Physical simulations, such as simulations of the early
moments of the universe, airplane and spacecraft
aerodynamics, the detonation of nuclear weapons, and
nuclear fusion.
National security, including nuclear weapons design, and
cryptography. 26
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of a Supercomputer
This supercomputer can easily decrypt
your password for your security
purpose.
High processing time
Cost efficiency
More organizations use this computer
part-time.
The supercomputer has the superb
power of reading the animation in an
excellent result. 27
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Advantages of a Supercomputer
(Contd.)
It can be expensive.
It requires trained staff.
Takes up a lot of space.
May only be good for specific
applications.
High power requirement. A
supercomputer requires a lot of
electricity to run.
•
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
29
homastigbafe@gmail.com
• Disadvantages of a Supercomputer
(Contd.)
They heat up quickly, due to a large
number of processors as well as the load
on devices.
Supercomputers need water cooling in
addition to an A/C system, it produces
more heat during the processing time.
It requires more maintenance.
It is not useful for broad applications.
Need massive external storage for huge
data.
•
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
30
Measuring Computer’s Performance
• 1. Clock Speed: clock speed refers to the number
of pulses per second generated by an oscillator
that sets the tempo for the processor. Clock speed
is usually measured in MHz (megahertz, or
millions of pulses per second) or GHz (gigahertz,
or billions of pulses per second).
31
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• There once was a time when choosing the best
processor came down to two significant deciding
factors: clock speed frequency and core count.
• Processors were much simpler years ago, and it
made sense for manufacturers to only focus on
higher clock speeds and more cores. By increasing
both of those factors with every new generation,
we were able to get a boost in performance and
efficiency at the same time. Due to performance
needs and processor evolution, we can no longer
use these parameters as a means of
benchmarking. We need something more. 32
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 2. MIPS: means Millions of Instructions Per
Second. MIPS measures the performance speed
of a mainframe computer’s CPU.
• MIPs (million instructions per second) is the
general measurement or benchmark of how
many instructions a processor can handle in a
single second. Despite how useful this idea might
seem, it is not commonly used anymore because
there is no proper way of measuring MIPs.
33
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• In general, a MIPs rating was only used as a basic
rule of thumb for computer performance, since a
higher number did not mean much for most real-
world situations. MIPs not take into account
input/output speeds so can be unreliable
• MIPs more often used when measuring
performance of computers involved in running
database queries, word processing or
spreadsheet software.
34
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. FLOPS: means Floating Point Operations Per
Second. FLOPS is useful in measuring
performance of computers where scientific or
complex calculations need to be carried out.
• FLOPS does not take into account CPU’s clock
speed, bus speed, and the amount of RAM
available so can be unreliable.
35
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• A floating point number is a number that has
floating decimal points, such as 0.008. A FLOPs
benchmark only measures the floating point
operations and not the integers, which means it
too cannot solely gauge computer performance
either.
36
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Fault tolerance: Used to describe the ability of
a computer system to continue to operate when
there is a failure in one part of the system.
• This ability may be provided by software,
hardware or a combination of both .The greater
the fault tolerance the lower the degree of
reduction of throughput.
• The lower the fault tolerance the greater the
increase in response time.
•
37
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.2 SYSTEM SOFTWARE
38
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
SYSTEM SOFTWARE
39
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 1. Operating system : An operating
system manages the hardware within a
computer system. Operating system sits
between or serves as interface between
hardware and application software, and
manages the any communication
between the two.
40
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• When a computer is turned on and after the Basic
Input/Output System (BIOS) has loaded, the
operating system is the first piece of software that
will load. It sits between hardware and
applications software and manages any
communication between the two.
41
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Functions of Operation System
• Operating systems manage hardware by:
Allocating memory to software
Sending data and instructions to output devices.
Responding to input devices such as when a key
is pressed.
Opening and closing files on storage devices.
Giving each running task a fair share of processor
time
Sending error/status messages to apps or users.
Dealing with user log-ins and security.
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
42
homastigbafe@gmail.com
• 2. Device drivers: software that comes with
external hardware components and sends
customized instructions to those specific
components. The operating system requires
the use of device drivers to deal with
specific makes and models of hardware.
• By using common device drivers, software
applications are able to issue generic
commands such as ‘print’ to the operating
system without having to know the
different instructions required for every
different make and model of external
hardware components.
43
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. Utility system: Programs that are used to
maintain a computer system are known as
utility system.
44
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Compiler: translates a program (source code)
written in a high level programming language into
machine code (0,1) which computer understands.
• The original high-level programming language file
is known as the source file. The file containing the
machine code is known as an executable file
because it can be executed by the processor. It
can also be referred to as the object file
45
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• When a program is compiled, the whole
source code is translated into the
executable file at once and can then be
distributed to resellers, customers and
individual computers.
• As it is in an executable format, it can only
run on operating systems for which the
compiler has translated it. For example,
programs that have been compiled for
Windows will not work on Linux unless
they are compiled again for Linux. The
same situation exists with mobile phone
and tablet operating systems.
46
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 5. Interpreter: Interpreters also translate a
program (source code) written in a high level
programming language into machine code (0s,and
1s), but use a different method, instead of
translating the whole source code at once, it is
translated one line at a time.
• This can be less efficient than a compiler because
it takes time to do the translating as the program
is being executed
47
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Differences between a Compiler and an Interpreter
Compiler Interpreter
Translates code all at once in advance Translates code one line at a time
of execution
Compiled code will only work on the Source code can be translated into
operating system it has been compiled object code for more than one
for operating system
48
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 6. Linkers: Computer programs often consist of several
modules (parts) of programming code. Each module carries
out a specified task within the program. Each module will
have been compiled into a separate object file.
• The function of a linker (also known as a link editor) is to
combine the object files together to form a single
executable file.
49
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
APPLICATION SOFTWARE
50
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of application software are : Word
processors, Spreadsheet software, Database
management software (DBMS), Graphics
manipulation software, Photo editing software,
Video editing software, Web authoring software
51
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.3 UTILITY SOFTWARE
• Utility software is system software that
performs some sort of maintenance on the
computer system. Utility software does not
include the operating system, but an operating
system may come pre-installed with some utility
software.
52
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
The Roles of different Utility Software
53
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• It has two main functions;
The first is an anti-virus monitor that is continually
monitoring the system for viruses and malware. If the
anti-virus monitor detects any unusual behaviour or tell-
tale signs of viruses or malware then it will prevent them
from being executed so they cannot cause damage to files
or programs.
The second function is to check for viruses or malware
that may already be on a system. This is usually known as
scanning the system. If anything is found then the user
will usually be given the option to disinfect the affected
area, put it into quarantine or ignore it. 54
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 2. Backup utilities: Backup utilities create a
second copy of data and programs that are in
storage. A backup utility can be executed by the
user, in which case the backup takes place when
the user asks it to, or it can be scheduled to
execute at a predetermined time so that the
backup takes place automatically. The user is
usually able to select which folders and files will
be backed up and can usually decide where the
backup will be stored.
55
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. Data compression: Data compression
utilities will reduce the original size of files so
that they use up less storage space. This can be
achieved on a file-by-file basis or for a set of
files or even a set of folders.
• It will be slower to open the compressed file,
but as it is smaller it will use up less storage and
can be transferred from one location to another
more quickly.
56
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Disc defragmentation: defragments and
reorganizes fragmented gaps of files left after
usage on a drive so that each file is contiguous. It
will do this by moving fragmented parts of files
and small files to free space on the disc and
creating space on whole cylinders or adjacent
cylinders. It will then move the defragmented
files to a place where the whole file is kept
together.
• This can significantly improve the performance
of a computer system.
57
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 5. Formatting: When a disc is prepared
for first time use, it needs to be
formatted. Formatting is the process of
organising the tracks on the disc into
sectors. Each sector is where data will be
stored.
• A used disc can also be formatted, in
which case all data will be lost and the
tracks prepared again as if the disc was
being used for the first time.
• 6. File-copying utilities: allow users to
have more control over which files are
copied and how they are copied. 58
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 7. Deleting utilities: Deleting utilities can delete files
and folders locked by the operating system. When
files are deleted using normal deletion methods, the
data is still on the disc although the user can’t see it.
Therefore another function of deleting utilities is
being able to delete files permanently so that they
cannot be restored or accessed.
• Some deletion utilities will remove temporary files
that are no longer needed by the computer system,
or files that are no longer used but haven’t been
deleted when a program has been uninstalled or a
user profile removed.
59
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.4 CUSTOM WRITTEN SOFTWARE AND OFF-THE- SHELF
SOFTWARE
62
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Proprietary software refers to the software which
is solely owned by the individual or publisher who
developed it.
• The owner or publisher of the software holds
intellectual property rights of the source code
exclusively. We call this type of software
“proprietary software” because only the original
owner(s) of the software are legally allowed to
inspect and modify the source code.
63
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of proprietary software include;
• Microsoft Windows, Adobe Flash Player, PS3 OS,
iTunes, Adobe Photoshop, Google Earth, macOS
(formerly Mac OS X and OS X), Skype, WinRAR,
Google earth, Microsoft Office , Internet Explorer,
Oracle's version of Java and some versions of
Unix.
64
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Open Source Software
• Open source software is free and openly
available to everyone. People who create open
source products publish the code and allow
others to use and modify it. Communities of
programmers often work together to develop
the software and to support users. Open source
products are usually tested in public by online
contributors.
65
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Open-source refers to the software whose
source code is available for anybody to access
and modify.
• Programmers with access to a program’s source
code are allowed to manipulate parts of code by
adding or modifying features that would not
have worked otherwise.
66
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of open source software include;
• Android, Ubuntu , LibreOffice, FressBSD, Drupal,
GNOME , Firefox, Open Office, GIMP, VLC Media
player etc.
67
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Free Software
• Free software (also called freeware) is licensed at
no cost, or for an optional fee. It is usually closed
source.
• “Free software” means software that respects
users' freedom and community. Roughly, it means
that the users have the freedom to run, copy,
distribute, study, change and improve the
software. Thus, “free software” is a matter of
liberty, not price.
68
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• Examples of Free software include;
Linux kernel: The Linux kernel is protected by the GPL.As
the kernel, it is one of the most important components
of the GNU system.
Apache: the most widely used web server in the world.
Gimp: is a powerful bitmap mode digital creation
program.
PostgreSQL: is an object-relational database.
69
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Differences between Open source Software and
Proprietary Software
70
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Differences between Open source Software and Proprietary
Software
71
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
2.5 USER INTERFACES
72
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• This communication can take many forms;
• 1. Command line interface (CLI): allows a user to enter
text commands to which the computer system will
respond. The computer system will respond by
producing results in a text format.
use very little memory
can carry out complex operations
can be difficult to learn and use
73
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 2. Graphical user interface (GUI): The most
common type of interface that we use is a
graphical user interface (GUI). GUIs are found on
desktop computers, tablet computers, mobile
phones, televisions, set-top boxes, photocopiers
and some in-car entertainment systems.
74
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• GUI includes Windows, Icons, Menus, Pointers
(abbreviated to WIMP)
Uses more memory depending on complexity of
the GUI
Intuitive, so easy to learn
Restrictive for technical users
75
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 3. Dialogue interface: A dialogue interface
refers to using the spoken word to
communicate with a computer system. A user
can give commands using their voice and the
computer system can respond by carrying out
an action or with further information using a
synthesised voice.
76
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
It is hands-free. No hands are required, which makes
them suitable for use in cars or when holding a
telephone.
Ability to recognize and understand spoken word will
vary and can be limited. Many things can make it difficult
for the computer to understand, including accents,
different voices, stammers and background noise
Require users to know what commands are understood
by the interface.
77
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• 4. Gesture-based interface: Gesture-based
interfaces will recognise human motion.
• This could include tracking eyes and lips,
identifying hand signals or monitoring whole
body movement.
• There are many applications of gesture-based
interfaces, including gaming, which have led to
the development of other gesture-based
interfaces.
78
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
• The original Nintendo will enabled gamers to move their
hands while holding a remote controller and that
movement would be mimicked in games such as ten pin
bowling and boxing.
It recognizes human motion, which may include
eyeball/lips tracking, identifying hand signals or whole-
body movement.
Provides more mobility but may be hard to control.
There are accuracy problems.
79
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design
80
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design( Contd.).
81
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design (Contd.)
82
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design (Contd.)
83
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com
Colour, layout, font size, quantity of information and
controls in User Interface Design (Contd.)
84
COURSE: A LEVEL IT , CHAPTER 2 ( Hardware and Software ) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / t
homastigbafe@gmail.com