ICT and COMPUTERS Updated Notes PDF
ICT and COMPUTERS Updated Notes PDF
AN INTRODUCTORY COURSE
FOR JUNIOR SECONDARY
SCHOOL.
KAMPAMBA NSOFU
COMPUTER STUDIES GRADE 8
ACKNOWLEDGEMENTS
DEDICATION
PREFACE
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
1
COMPUTER STUDIES GRADE 8
TABLE OF CONTENTS
LESSON TOPIC PAGE TERM
LESSON 1 INTRODUCTION TO ICT…………………………………... 1 1
LESSON 2 DEFINITION OF A COMPUTER…………………………… 2 1
LESSON 3 HISTORY AND EVOLUTION OF COMPUTERS………….. 3 1
LESSON 4 CLASSIFICATION OF COMPUTERS……………………….. 4 1
LESSON 5 PARTS OF A COMPUTER…………………………………… 5 1
LESSON 6 BASIC OPERATIONS OF A COMPUTER………………….. 6 1
LESSON 7 INPUT DEVICES OF A COMPUTER……………………….. 7 1
LESSON 8 OUTPUT DEVICES OF A COMPUTER…………………….. 10 1
LESSON 9 THE MICROPROCESSOR AND PROCESSING……………. 11 1
LESSON 10 COMPUTER MEMORY……………………………………… 12 1
LESSON 11 COMPUTER STORAGE DEVICES AND MEDIA…………… 13 1
LESSON 12 COMUPTER USER HEALTH AND SAFETY………………... 14 2
LESSON 13 CARE OF THE COMPUTER AND DEVICES………………. 15 2
LESSON 14 COMPUTER VIRUSES AND SECURITY……………………. 16 2
LESSON 15 ADVANTAGES, DISADVANTAGES OF A COMPUTER…... 17 2
LESSON 16 EVERYDAY USES OF COMPUTERS AND ICT…………….. 18 2
LESSON 17 COMPUTER NETWORKS…………………………………… 19 2
LESSON 18 THE INTERNET………………………………………………. 20 2
LESSON 19 PUTTING AND CONNECTING A COMPUTER………….. 21 2
LESSON 20 BOOTING AND SHUTTING DOWN A COMPUTER……. 22 2
LESSON 21 COMPUTER KEYBOARD AND MOUSE BASICS………….. 23 2
LESSON 22 COMPUTER USER INTERFACES…………………………… 24 2
LESSON 23 STARTING A COMPUTER PROGRAM……………………. 25 3
LESSON 24 FILE MANAGEMENT AND ORGANISATION…………….. 26 3
LESSON 25 INTRODUCTION TO MICROSOFT OFFICE SUITE……… 27 3
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
2
COMPUTER STUDIES GRADE 8
LESSON ONE
ICT
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what ICT stands for.
2. Identify the different types of ICT devices.
3. Explain the everyday uses of ICT devices.
4. Outline and explain the importance of ICT devices in society.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
3
COMPUTER STUDIES GRADE 8
ICT
1. ICT
ICT stands for:
Information Communication Technology
a. Information
This is knowledge that is sent or received which deals with a particular fact or
circumstance.
b. Communication
This is the sending and receiving of information which can be in the form of words,
symbols or signals through speaking, writing or any other method.
c. Technology
This is the use or manipulation of tools, including machines, modifications,
arrangement or procedures that make work easy.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
4
COMPUTER STUDIES GRADE 8
IMPORTANCE OF ICTs
ICTs are important to modern man because
They make life easier and comfortable.
They enable for faster communication.
They enable huge tasks to be done quicker.
They allow for work to be done collaboratively.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
5
COMPUTER STUDIES GRADE 8
LESSON TWO
DEFINITION OF A COMPUTER
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what a computer is.
2. Understand the keywords found in the definition of a computer.
3. Explain in your own words what a computer is.
4. Explain why it is called a computer.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
6
COMPUTER STUDIES GRADE 8
COMPUTERS
a. INTRODUCTION
From the beginning of time when man first appeared on the earth, the computer has been
in existence. Believe it or not! Every person on the face of this planet has a computer – yes
even you own a personal computer.
The computer that you have and own is called:
The brain/body
With time the word ‘computer’ has been given to and associated with an ICT device, which
we either see or use daily.
The word computer’’ comes from the word
‘Compute’
The word ‘compute’ means
To work out
To work on
To calculate
To solve
To put together
To analyse
b. WHAT IS A COMPUTER?
A computer is
An electronic device which is capable of receiving data as input in a particular
form and it processes the data using a set of particular instructions to produce
information or data as output in a particular form and can also store the data,
information and instructions for future use.
KEYWORDS IN THE DEFINITION:
a. Electronic device
A computer is a set of different devices that use electricity in order to do something. In
addition, by being electronic means the computer is mostly a digital machine that
understands instructions and data in strings or combinations of 1s and 0s.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
7
COMPUTER STUDIES GRADE 8
b. Data
Data is raw information that does not make any sense or meaning to the user. It is
simply a collection of facts.
c. Input
Input refers to the act of placing into the computer data or instructions. This is done
through the use of input devices
d. Processes
Processes means to work on, calculate, solve, analyse or put together data into a
particular form so that it becomes either information or data.
e. Set of particular instructions
A computer uses a set of instructions to perform a task. These are directives that tell the
computer what to do to given data.
f. Information
Information is data that has been processed or worked on. Information refers to data
that has been given some form of meaning from the act of processing.
g. Output
Output refers to the giving out of information or data. This is done through the use of
output devices.
h. Store
A computer has the ability to store or keep data, instructions and information for later
use as it can be retrieved. This is made possible by the use of storage devices and
storage media.
c. WHY IS IT CALLED A COMPUTER?
The modern machine that man invented was given the name ‘computer’ because it is able
to:
Solve
Compute
Put together
Analyse
Work out
Work on
Huge or large amounts of data in a very short time. In fact today’s machine can do more
than just this.
Now the ‘computer’ can be looked at and discussed it in detail.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
8
COMPUTER STUDIES GRADE 8
LESSON THREE
HISTORY OF COMPUTERS
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know the beginnings of the computer.
2. Identify and outline the major technological developments for each
generation
3. Explain the advantages and disadvantages of each technological
development
4. Appreciate the advances made in the development of the computer.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
9
COMPUTER STUDIES GRADE 8
Modern computers can trace their history back to the 19th century when Charles Babbage,
who is considered to be the father of the modern day computer. He built the first digital
computer which was known as:
important invention in the field computers and ICT. The first IC was invented and used in
1961. The size of the IC is about ¼ square inch. A single IC chip may contain thousands of
transistors. Examples of such computers are:
IBM 370,
IBM system/360,
UNIVAC 1108
UNIVAC AC 9000
i. Advantages
Smaller in size
More reliable
Used less energy
Produced less heat
Better speed could calculate data in nanoseconds
Used fan for heat discharge to prevent damage
Maintenance costs was low
Totally general purpose
Could use high-level languages
Good storage capacity
Versatile to an extent
Less expensive
Better accuracy
Commercial production increased
Used mouse and keyboard for input
ii. Disadvantages
Air conditioning was required
Highly sophisticated technology required for the manufacture of the IC chips
d. Fourth Generation (1975 – to present)
The fourth generation computers started with the invention on the microprocessor. The
microprocessor contains thousands of ICs. The first microprocessor was produced by Ted
Hoff for Intel in 1971. It was known as the Intel 4004.
Later Large Scale Integration (LSI) and Very Large Scale Integration (VLSI) circuits were
designed.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
12
COMPUTER STUDIES GRADE 8
The modern microprocessor contains millions of electronic circuits and is usually about 1
square inch. Examples of fourth generation computers are:
Apple Macintosh Personal Computer
IBM (now Lenovo) Personal Computer
i. Advantages
More powerful and reliable than the previous generations
Small in size
Fast processing power
Fan for heat discharge thus kept cold
No air conditioning required
Totally general purpose
Commercial production
All types of high level languages can be used
ii. Disadvantages
The latest technology is needed in manufacturing of microprocessors
e. Fifth Generation (present and beyond)
Scientists have been working on the fifth generation computers with quite a few
breakthroughs. It is based on the technique of Artificial Intelligence (AI). Computers can
understand spoken words and imitate human reasoning. It can also respond to its
surroundings using different sensors. Scientists are trying to create a computer with real
intelligence (IQ). Examples of such computers are:
Computers have undergone a lot of technological changes in the recent past and are still being
innovated and improved upon in many ways.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
14
COMPUTER STUDIES GRADE 8
LESSON FOUR
CLASSIFICATION OF
COMPUTERS
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know the different ways of classifying computers.
2. Differentiate an analogue and digital computer
3. Explain the four types of computers
4. Demonstrate how computers are classified by purpose
5. Explain how performance influences the classification of computers
6. Know the difference between a standalone and networked computer
7. Outline and explain how computers can be classified according to user.
8. Identify and explain how computers can be classified by function.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
15
COMPUTER STUDIES GRADE 8
4. CLASSIFICACTION OF COMPUTERS
Classification refers to
Putting things in groups according to some characteristics.
Therefore, computers can be placed into a particular type of group depending on a
particular characteristic.
There are several ways of classifying computers. Computers can be classified according to:
Performance
Technology
Connection
Type
User
Purpose
A. Technology
Computers can be divided into three broad technologies:
a. Analogue computers:
An analogue computer is one that can perform multiple calculations at once and
can cope with infinite fractions of numbers. Analogue computers go back
thousands of years and differ from digital computers in two ways:
i. It works in parallel, therefore capable of carrying out multiple tasks at the
same time
ii. It handles continuous variables which can include every conceivable
number, even irrational numbers
An analogue computer can work both mechanically and electronically.
Mechanical computers have existed for thousands of years,
The oldest known being as the:
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
16
COMPUTER STUDIES GRADE 8
Antikythera,
It was a Greek machine thought to have been made around 100BC. It was
designed for calculating astronomical positions. A more recent and common
version is the slide rule. An electronic analogue computer works on the same
principles.
b. Digital computers:
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
17
COMPUTER STUDIES GRADE 8
Mainframes are not as powerful as supercomputers but they are just as expensive.
They are also kept in an air conditioned room. Mainframes are mainly used by large
business companies, government and institutions such as universities, colleges and
school. They are mostly used to store business data. Examples of mainframe
computers are:
Fujitsu’s ICL VME
Hitachi’s Z800
3. Minicomputer
Minicomputers are also known as ‘Midrange computers’. Minicomputers are
slightly smaller in terms of processing power and storage capacity than the
mainframe. They are mainly multi user computers which mean many users can
access the computer at the same time. Minicomputers are mostly used for specific
tasks. A network server is a good example of a minicomputer. Examples of
minicomputers are:
K – 202
Texas instrument TI – 990
SDS – 92
IBM midrange computers
4. Microcomputer
Microcomputer is the smallest of the four types. They are also known as the
personal computer or ‘PC’. These are the cheapest computers available on the
market. They are designed for single user and for general usage like entertainment,
education, work and communication. Microcomputers include:
Desktop computers Gaming consoles (Sony play station,
Laptops Microsoft Xbox)
Personal digital assistant Sound and navigation systems in cars
(PDA) Net books
Tablets Notebooks
Smart phones Calculators
Examples of microcomputers by manufacturer are
Dell Hewett Packard (HP)
Lenovo Sony
Toshiba Apple
C. Purpose
Computers can also be classified by purpose. There are two purposes:
1. General purpose
Most computers today are ‘general purpose’ computers; they are also as ‘multi-
task computers’. This means that they are built and designed for a great variety of
processing tasks. Simply by using a general purpose computer and different
software various tasks can be achieved. The functionality of a general purpose
computer lies in the stored program being run on it and requires large amounts of
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
19
COMPUTER STUDIES GRADE 8
memory. Due to this they are versatile. Unfortunately having this ability is often
achieved at the expense of speed and efficiency.
2. Special purpose
As the name states, this type of computer is designed to do a specific task. They are
also known as ‘dedicated computers’, ‘embedded computers’ or ‘specific task
computers’ because they are dedicated to performing one particular task over and
over again. Good examples of such are:
Traffic light system
Aircraft simulator
Communication satellite
Car or aircraft navigation system.
The ability or functionality of special purpose computer lies rather in its design than
stored program. The programs are built right into the computer making it efficient
and effective. In addition, since they perform only one task, a special purpose does
not need a lot of memory making them less versatile since they cannot be used for
a variety of tasks.
D. Performance
Today, computers are classified by its performance. Most modern computers have the
performance of a mainframe computer built in the 1960s. The determining factors for
computer performance are:
Processing power and speed.
Storage capacity.
Memory size.
Data transfer architecture (32bits or 64bits)
E. Connection
Computers can also be classified according to connection. There are two ways:
1. Standalone: A standalone computer is one that is not connected to any other
computer. This type cannot directly and easily share data and information with
other computers.
2. Networked: A networked computer is one that is connected to other computers
via either wired or wireless connectivity. These form a network and are easily and
directly able to share data and information.
F. User
Computers can either be grouped according to users. There are two groups of users:
1. Single-user computers: This means only one person can use the computer at any
given time. These are commonly known as personal computers or simply ‘PCs’.
Good examples are:
Desktop computer Tablet
Laptop Personal digital assistant
Notebook Smart wrist watch
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
20
COMPUTER STUDIES GRADE 8
2. Multi-user computers: These are computers that can be accessed by two or more
people at the same time or simultaneously. An Example of this type is a
Computer server
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
21
COMPUTER STUDIES GRADE 8
LESSON FIVE
PARTS OF A COMPUTER
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know and explain the two main parts of a computer
2. Differentiate between hardware and software
3. Explain what hardware is
4. Know and explain the two types of hardware
5. Give examples of hardware
6. Explain what software is
7. Know and explain the two general types of software
8. Give examples of software
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
22
COMPUTER STUDIES GRADE 8
5. PARTS OF A COMPUTER
A computer is divided into two main parts which are:
Hardware
Software
A. HARDWARE
This refers to those physical parts of a computer that can be seen and touched.
Hardware can be further divided into two groups; these being
External hardware
Internal hardware
i. External hardware:
The word external means:
Outside
The external hardware is those parts of a computer that are found outside. The
external hardware of a computer may differ from one computer to the next
depending on:
The purpose and use of the computer.
Preferences of the user.
Needs of the individual or organisation.
External hardware includes some of the following:
Systems unit
Monitor
Keyboard
Mouse or any other
pointing devices
Printer
Scanner
Uninterruptible Power Supply (UPS)
Speakers
Digital camera
Digital video camera (camcorder/
webcam)
Microphone
External Modem
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
23
COMPUTER STUDIES GRADE 8
The external hardware that connect to the systems unit are known as ‘peripheral
devices’ because they are added on.
The term ‘peripheral’ means:
Add on
Additional
Extra
ii. Internal hardware:
The word Internal means:
inside
The internal hardware is those parts of a computer that are found inside. The
internal hardware of a computer may also differ from one computer to the next
depending on:
The purpose and use of the computer.
Preferences of the user.
Needs of the individual or organisation.
Internal hardware includes some of the following:
Main circuit board or parent board
Power unit
Central Processing Unit
Memory Chips or modules
Hard Disk Drive
Compact disk Drive
Floppy Disk Drive (no longer on the most modern computer systems)
Tape Drive (very common on main frame and mini computers)
Data cables
Power cables
Expansion cards
Internal modem
Sound card
B. SOFTWARE
This refers to those virtual parts of a computer that can be seen but not touched. There
are various types of software depending upon the purpose and use.
Software refers to
A set of instructions
A set of algorithms
Programs
Software enables the computer or users perform certain tasks such as:
Working on input data
Maintaining computer functionality
Managing hardware resources
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
24
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
25
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
26
COMPUTER STUDIES GRADE 8
Proprietary: They are licensed by the maker and need to be bought. Very little
changes can be made to them. Most often they need a password called ‘product
key’ to activate (make it work permanently) it.
Open-source: These are not licensed by the maker and usually free. Changes
can be made to them. Most often they do not need a password called ‘product
key’ to activate (make it work permanently) it. These are commonly known as
‘freeware’.
University projects: These are application software that are designed and used
by students to perform a particular activity.
In addition, application software can either be:
Horizontal applications: are more popular and widespread, because they are
general purpose, examples:
Word processors
Databases
Spread sheets
Vertical applications: are niche products, designed for a particular type of
industry or business, or department within an organisation, examples:
MTN Mobile Money
Examination Council of Zambia results
AirTel ‘SoChe’
Cell-Z ‘Real Mahala.’
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
27
COMPUTER STUDIES GRADE 8
LESSON SIX
BASIC OPERATIONS
OF A COMPUTER
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know the four basic operations of a computer
2. Illustrate the basic operations of a computer
3. Identify and explain each operation of the computer
4. Identify and explain which devices are used for each of the four basic
operations.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
28
COMPUTER STUDIES GRADE 8
These components are connected together using cables or connectors known as:
Bus
The diagram below shows:
Divided into:
System or local (Internal) buses
Peripheral (External) buses
These allow the computer carry out the basic operations or functions.
A. Input
To input is:
To place inside the computer system data and instructions
The purpose of the input components of a computer system is:
i. To accept data and instructions in the required form.
ii. To convert data and instructions to a machine readable form.
iii. To transmit data and instruction to the Central Processing Unit.
Forms of Input
Some forms of input are:
Text: Consists of characters (letters, numbers, punctuation marks, or any other
symbol requiring one byte of computer storage space) that are used to create
words, sentences, and paragraphs.
Graphics: Are digital representations of non-text information such as drawings,
charts, photographs, and animation (a series of still images in rapid sequence that
gives the illusion of motion).
Audio: Is music, speech, or any other sound.
Video: Consists of images played back at speeds to provide the appearance of full
motion.
B. Processing
Processing means that the computer uses a set of instructions or program to work on
some data given to it in order to produce information that is useful to the computer
user.
This is done by a very small, yet very important piece of hardware called:
The Micro-processor
Processor
Central Processing Unit
CPU
Without the processor (CPU) the computer will simply not function.
C. Output
To output is:
To take out of the computer system.
Forms of output
Some forms of output are:
Text
Graphics
Tactile: These are raised symbols for example Braille
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
30
COMPUTER STUDIES GRADE 8
Audio
Video
D. Storage
Storage Devices and media are used in the computers to keep, preserve, save and
maintain the data, instruction and information placed inside it. The computer has many
types of data storage devices and media.
Storage can be classified as:
Removable Storage Devices and Media
Non-removable or Fixed Storage Devices.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
31
COMPUTER STUDIES GRADE 8
LESSON SEVEN
INPUT DEVICES
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what Input devices are
2. Identify the different types of Input devices
3. Explain the purpose of Input devices
4. Know and state the use of each type of Input device
5. Give the advantages and disadvantages of each type of Input device
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
32
COMPUTER STUDIES GRADE 8
7. INPUT DEVICES
To input is
To place inside the computer system data and instructions
INPUT DEVICES
These are devices that are used to input data and instructions into the computer
Types of Input devices
There are many types of input devices:
A. Keyboard
These are the most common input devices. Of the many different designs the ‘QWERTY’
layout is the mostly used layout. It is so called ‘QWERTY’ because of the arrangement of
the first six letter keys on the top left of the keyboard. Ergonomic keyboards have also been
developed in advanced countries. These are designed to reduce health related problems
associated with the standard keyboards
Uses
a. To input data into application software
b. For typing commands to the computer
Advantages
1) Enable fast entry of new data into a document
2) Are a well tried technology and a well-known method of entry
3) Are easy to use
4) Easy to do verification checks as data is entered, as it appears on the screen
simultaneously.
Disadvantages
1) Limited arm or wrist use can make keyboards difficult to use
2) Entering data can be slow when compared to direct data entry
3) They are fairly large devices that take up valuable desk space
The concept keyboard uses icons or phrases instead of standard letters. These are often
used in for example fast food restaurants, offices and shops, where a single key
represents an item. The person using the keyboard only needs to touch the key of the
item wanted.
B. Numeric Keypads
This input device is used to input numbers only; although some have a function key to
allow for input of alphabetic characters.
Use
a. Are used in Automatic Teller Machines (ATMs)
b. Telephones
c. Electronic Point of Sale (EPOS) in case the barcode reader fails
d. Chip and (Personal Identification Number) PIN devices
e. Enable fast entry of numeric data into a spread sheet
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
33
COMPUTER STUDIES GRADE 8
Advantages
1) Are faster than standard keyboards for entry of numeric data
2) Are very easy to carry around
Disadvantages
1) Can be difficult to use because of the very small keys
2) Difficult to use for entry of text
3) Sometimes the order of the numbers is not intuitive
C. Mouse
The mouse is an example of a point device. A ball is used underneath the mouse to
detect movement, so by moving the mouse around the user can control the position of
the mouse pointer on the screen. There are usually two buttons, which have different
functions: most often the left button is used for selecting something by single clicking,
double clicking and triple clicking while the right button (known as the shortcut button)
brings up drop-down menus. Many mice also have a scroll button, which speeds up the
process of moving up or down through large documents. Recent developments have
produced the optical mouse where movement is detected by reflected light rather than
the position of the moving ball and the cordless mouse which is a wireless device.
Uses
a. For opening, closing maximising and minimising software
b. For grouping, moving or deleting files
c. Useful for editing images
d. Controlling the position of a pointer on the screen to allow for selection from a
menu or icon and for scrolling up, down, left or right
Advantages
1) Faster to select an option using a mouse rather than keyboard
2) Enable rapid navigation through applications and the internet
3) Are small and take up less desk space
For the optical mouse:
1) It has no moving parts
2) Does pick up any dust
3) Is more robust
4) Improves performance, since older types can ‘skid’ on certain surfaces.
Disadvantages
1) People with restricted hand or wrist movement can find it difficult to operate
2) Are easily damaged and older types quickly become clogged with dirt
3) Difficult to use on uneven or non-flat surfaces
4) Can be difficult to learn how to handle it
D. Touchpad
These are used in many laptop computers as a pointing device. The pointer is controlled
by the user moving their finger on the touchpad and then gently tapping it to simulate
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
34
COMPUTER STUDIES GRADE 8
the left button of a mouse. They also have buttons under the touchpad which serve the
same function as the left and right buttons on a mouse
Uses
The use of the touchpad is the same as those of a mouse (refer to uses of a mouse)
Advantages
1) Faster to select an option than a keyboard
2) Enable rapid navigation through applications and the internet
3) Since they are integrated into the laptop computer, there is no need for a
separate mouse, aiding portability
4) Since they are integrated into the laptop computer, they do not take up any desk
space
5) They are not affected by the type of surface.
Disadvantages
1) People with limited hand or wrist movement find touchpad difficult to use
2) Can be more difficult to control the pointer when compared to a mouse
3) More difficult to use when doing certain operations such as drag and drop,
drawing and highlighting
E. Tracker Balls
This kind of device is similar to a mouse, except that the ball is on top of the device and
the user controls the pointer on the screen by rotating the ball with the hand. Some
tracker balls have two buttons which have the same function as those on a mouse. If
they have a third button, this is equivalent to a double click
Uses
a. Have the same pointing cursor control capability as a mouse
b. In applications where the user has a disability
c. In a control room environment, where it is faster than a mouse to navigate
through process screens and is more robust than a mouse
Advantages
1) Do not need the same fine control as a mouse
2) People with limited hand or wrist movement find it easier to use than a mouse
3) Can be positioned more accurately on the screen than a mouse
4) Takes up less desk space than a mouse since they are stationary
Disadvantages
1) Not supplied with a computer as a standard
2) They are expensive to acquire
3) User needs some training in its use since it is not standard equipment
F. Remote Control
It is mainly used to control operations of other devices remotely by using infra-red
signals. The buttons on the keypad are used to select options.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
35
COMPUTER STUDIES GRADE 8
Uses
a. Most home entertainment devices
b. To control multimedia systems
c. In industrial applications to remotely control processes, stop and start machinery
Advantages
1) Enables devices to be operated from a distance, which is useful for people with
disabilities
2) Make certain hazardous processes safer to operate as this is done from a distance
Disadvantages
1) People with limited hand or wrist movement can find hard to use
2) The signal between the device and the remote control can be blocked
3) Can only operate effectively within a limited distance
G. Joystick
Have a similar function to a mouse and tracker ball. By gripping the stick, a pointer on
the screen can be controlled and the buttons are used to make selection. Often they
have another button on the top of the stick that is used for gaming purposes
Uses
a. Video and computer games
b. In simulators to mimic actual controls
c. In industrial equipment to control movement
Advantages
1) Easier to navigate round a screen using a joystick rather than a keyboard
2) Control is in three dimensions
Disadvantages
1) More difficult to control the on-screen pointer with a joystick than other devices
H. Touch Screen
This system allows the user to choose an option by simply touching the button or icon
on the screen. The selection is automatically made without the need for any pointing
device.
Uses
a. For self-service tills
b. Where selections are made on screen
c. Personal Digital Assistants (PDAs), mobile phones and satellite navigation systems
d. Interactive whiteboards used for education
e. In Computer Based Training (CBT) where selection are made by answering on
screen testing
Advantages
1) Enable faster entry of options than keyboard or mouse
2) Very easy to choose option
3) Enables direct interaction with the options
4) A user friendly method for inputting data and instructions, so no training needed
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
36
COMPUTER STUDIES GRADE 8
5) Are tamper proof, preventing people from keying in information that could
potentially corrupt the computer system
Disadvantages
1) Has limited number of options available
2) Frequent use can lead to health problems
3) Screen can get very dirty quickly by constant touching
I. Magnetic Stripe Reader
These are used to read information on a magnetic stripe for example on the back of a
debit card (ATM card) the stripe contains useful information such as bank account
number, sort code, expiry date and start date.
Uses
a. Credit and debit cards have magnetic stripes that are used at ATMs (Automated
Teller Machine)
b. EFTPOS (Electronic Funds Transfer Point of Sale) terminals in shops
c. Security cards used for entry into buildings, hotel rooms systems.
d. Travel systems.
Advantages
1) Data entry is faster compared with keying in using a keyboard or keypad.
2) The system is error free, since no typing is involved.
3) The information held on the magnetic stripe is secure, because it cannot be read
directly by a person and since there is no typing there is no risk of someone
observing one’s key strokes.
4) They can prevent access to restricted or secure areas.
5) Magnetic stripes are unaffected by oil, water, moisture to mention but a few.
6) There are no moving parts, so they are physically very robust (strong)
Disadvantages
1) If the magnetic stripe gets damaged, then there is loss of data
2) The card needs to be in close contact with the reader, so magnetic stripe readers
do not work at a distance
3) Since the information is not human readable, this can be a disadvantage in some
applications.
4) The information on the magnetic stripe can be copied.
J. Smart Card Reader
Contains a chip and are similar to magnetic stripe cards. The information is stored on a
chip. The data stored can be updated. The storage capacity of the chip is greater than a
magnetic stripe, so more information can be stored.
Uses
a) Loyalty cards, Identification cards and public transport passes
b) To track customer or passenger movements
c) They are used with satellite systems to decode program signals. (DSTV)
d) In electronic passports and drivers’ licenses
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
37
COMPUTER STUDIES GRADE 8
Advantages
1) Some smart cards are used in place of money, reducing the need to carry cash
2) The chip does not need to be in contact with the reader, so there is less damage
to the ship
3) Data is more secure since it is difficult to copy the information on the chip
Disadvantages
1) If the card is lost or stolen, the information can be used for identity theft.
K. Chip and PIN Reader
Are similar to smart card readers but are used at EFTPOS (Electronic Funds Transfer
Point of Sale) terminals. The device has a slot into which the card is placed and the chip
is read. The PIN is entered using the keypad. It has a small screen which displays
instructions to the user.
Uses
a) Used where payments are made using magnetic stripe or smart cards
Advantages
1) Provides more a secure payment system, since the PIN typed must match the PIN
stored of the card.
2) Provide more robust system since it does not need direct contact with the reader.
Disadvantages
1) PIN needs to be typed in which can be seen by others thereby giving an
opportunity for fraud.
L. Scanner
Scanners are used to enter information on hard copy into a computer. There are various
types or designs:
(i) Flatbed scanner
(ii) Hand-held scanner or Wand
The hard copy is scanned used a light source and produces a computer readable image
Uses
a) used to scan documents and convert them into a format for use in different
software packages
b) Old and valuable documents and books can be scanned and protected or
reproduced if the original hardcopy is lost or damaged.
c) Non-digital photographs can be scanned if they are to be stored on a computer.
Advantages
1) Images can be stored for editing at a later time
2) They are much faster and more accurate.
3) It is possible to recover damaged documents and photographs
Disadvantages
1) Quality can be limited, depending on scanner resolution
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
38
COMPUTER STUDIES GRADE 8
M. Barcode Reader
This is a type of specialised scanner. It can be hand-held of fixed. These are used to read
information in the form of a bar code (a series of black and white stripes). They are often
built into a POS (Point of Sale) terminal
Uses
a) Used in supermarkets and shops where goods are marked with a bar code.
b) Used in libraries in order to keep track of books on loan.
c) Used as a safety function in many companies to ensure that electrical equipment
is checked on a regular basis.
Advantages
1) It is much faster to enter data and fewer mistakes are made
2) Improves safety
3) Enable automatic stock control
4) Is a tried and trusted technology
5) There is no need to physically change information details of every item. This can
be done from a central database.
Disadvantages
1) Relatively expensive to administer and maintain
2) It is not fool-proof
N. Optical Mark Reader [OMR]
This is a system which can read marks written in pen or pencil.
Uses
a) Used to read questionnaires, multiple-choice examinations papers and many
other forms
Advantages
1) Very fast way of inputting the results.
2) there is no typing and is accurate
Disadvantages
1) Forms to be used for OMR need to be carefully designed to make sure that the
marks are properly positioned
2) Problems can occur if forms not properly filled in and need to be manually
checked; thereby this becomes time consuming and expensive.
O. Optical Character Recognition [OCR]
This is the name given to software which takes scanned text and converts it to computer
readable form.
Uses
a) Used in processing passports and identity cards
b) Used when scanning document so that they can be modified.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
39
COMPUTER STUDIES GRADE 8
Advantages
1) It is a much faster data entry system
2) The number of errors is reduced.
Disadvantages
1) System still has difficulty reading handwriting.
2) it is still not a very accurate technique
P. Magnetic Ink Character Recognition Device [MICR]
This is a system that can read characters written in special ink. These characters are
converted into machine readable form.
Uses
a) Mainly used to process cheques in banks.
Advantages
1) Offers a greater security since printed characters cannot be changed
2) There is manual input therefore, errors are reduced
3) Even if the characters are written over, they can still be read.
Disadvantages
1) Certain characters can be read and the number of different characters is limited
2) It is a more expensive method in direct data entry.
Q. Digital Camera
Are rapidly replacing traditional film based cameras. Digital cameras use a memory card
to store photographs. Some are even capable of capturing video. Photographs stored in
memory and can easily be transferred to a computer using a USB (Universal Serial Bus)
connection.
Uses
a) Used to produce photographs to directly transfer to a computer or print out
b) Used to produce short video clips
c) Used to upload photographs for editing.
Advantages
1) Easier to produce photographs
2) Easier and faster to upload photographs to a computer
3) Does not use film which has to be developed
4) It is easy to delete unwanted photographs from memory
5) It is cheap and environmentally friendly
6) Memory cards can store several hundreds of photographs
Disadvantages
1) The user needs a computer or printer to produce hardcopies
2) Some artistry is lost since clever software now corrects errors in the photographs
3) The resolution is not yet very good. the quality depends on the number of pixels
4) images need to be compressed to save on memory space
5) It is possible to fill memory fairly quickly.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
40
COMPUTER STUDIES GRADE 8
R. Webcam
These are very similar to digital video cameras. They are connected directly to a
computer through USB. They do not have memory. Many computers today have built in
webcams at the top of the monitor.
Uses
a) Used for online chats
b) Used for video conferencing
c) Used for online learning
Advantages
1) They can be left on constantly
2) Allow people to keep visual contact with each other.
Disadvantages
1) They have very limited features and picture quality is mostly poor
2) They need to be connected to a computer since they cannot store images.
S. Microphone
Microphones can be connected directly to a computer. Sounds can be inputted and then
manipulated. The input sound is converted into analogue signal and then to digital
signal. This is done automatically by the computer’s sound card; it acts as an ADC
(Analogue to Digital Converter).
Uses
a) Used to input sound or speech.
b) Used in voice recognition software.
Advantages
1) It is faster to read in text than type it in.
2) It is possible to manipulate sound in real time.
3) Improves safety and security.
Disadvantages
1) Sound files use up a lot of computer memory
2) Voice recognition software is not very accurate.
T. Sensor
A sensor is an input device which inputs data to a computer, where data is a
measurement of some physical quantity which is continuously changing. Therefore, a
sensor is an analogue input device and work together with an ADC since computers only
understand digital signals. There are different types of sensors as the table below shows:
Type of sensor Application
Temperature Automatic washing machines, central heating systems…
Pressure Burglar alarm systems, washing machines…
Light Automatic greenhouses, automatic doors, street lighting…
Sound Burglar alarms, monitoring flow of liquid or powder…
Humidity/ Moisture Automatic greenhouses, grain storage…
pH Automatic greenhouses, environmental monitoring…
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
41
COMPUTER STUDIES GRADE 8
Uses
a) Mostly used in monitoring and control of different processes.
Advantages
1) Readings are more accurate
2) Readings are continuous, so there is no break in monitoring
3) Necessary actions can be taken immediately
4) Systems can be made to be automatic.
Disadvantages
1) If the sensor becomes faulty, it can give wrong or inaccurate readings.
U. Graphic Tablet
A graphic tablet uses a stylus to produce freehand input such as images and writing.
Uses
a) Used to produce drawings, computer graphics and many others
b) Used to quickly input complex characters than typing them in
c) They used in CAD (Computer Aided Design) work.
Advantages
1) It is possible modify (make changes) drawings before they are input.
2) Offer very accurate method of drawing.
Disadvantages
1) They are expensive.
V. Light Pen
Light pens contain a light sensor that send a signal to a computer whenever light
changes are detected. At the moment this technology only works with CRT (Cathode Ray
Tube) monitors.
Uses
a) Light pens are used for selecting objects on CRT screens
b) They are used for drawing on screen
Advantages
1) Light pens are more accurate than touch screens
2) They are small, so they can be used where space is an issue
3) They are easy to use.
Disadvantages
1) There are problems with lag when drawing on the screen
2) At the moment only work with CRT monitors
3) they are not very accurate when drawing
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
42
COMPUTER STUDIES GRADE 8
LESSON EIGHT
OUTPUT DEVICES
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what Output devices are
2. Identify the different types of Output devices
3. Explain the purpose of Output devices
4. Know and state the use of each type of Output device
5. Give the advantages and disadvantages of each type of Output device
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
43
COMPUTER STUDIES GRADE 8
8. OUTPUT DEVICES
To output is:
To take out of the computer system.
As the name states, these are hardware devices that allow data or information to be output
from a computer.
OUTPUT DEVICES
These are devices that are used to output information or data from a computer.
Types of Output devices
There are many types of output devices:
A. Monitors
Monitors give output in the form of softcopy. The computer user is sees what is
happening inside a computer system. There are basically two types of monitors:
CRT (Cathode Ray Tube) monitor
TFT (Thin Film Transistor) monitor
(i) CRT monitors
These are the least expensive type of monitor. They come various sizes. They use
an electron gun to fire against a phosphor screen, which creates an image made
up of tiny dots. Each dot is coloured red, green or blue.
Uses
a) Used as the primary output device for computers
b) Used with light pens to allow designs to be created on the screen
Advantages
1) Produce a high quality image
2) The angle of viewing is better
3) They work with light pens in CAD
Disadvantages
1) Are heavy.
2) They become very hot and can cause fires
3) Use up a lot of power
4) They can flicker, which can lead to headaches and eyesight problems
(ii) TFT monitors
They are becoming more popular than CRT monitors as the main output device.
The screen is made up of thousands of tiny pixels, which are made up of
transistors controlled by a microprocessor. Each pixel has three transistors
coloured red, green or blue. There are various technologies under this type:
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
44
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
45
COMPUTER STUDIES GRADE 8
The print rate per page is very quick if a large number of pages are being
printed. They rely on large buffer memories where information for the whole
document is stored before printing.
Uses
a) Used where noise levels need to be kept low
b) To produce fast high quality high volume printing.
Advantages
1) Printing is fast for high volumes
2) handle very large print jobs
3) The quality is consistently high
4) Toner cartridges last for a long time
Disadvantages
1) They are expensive to buy
2) They are only really fast when several copies are being made
3) Colour laser printers are expensive to run
4) They produce ozone and violate organic compounds because of their
method of printing.
2. Inkjet Printer
These produce good quality hardcopies. They do not have large buffer
memories, so printing is done one bit at a time. This is why at times printing is
paused, because the whole page cannot be stored in memory.
Uses
a) Used to produce low output volumes when required
b) When high quality printing is needed for single pages
Advantages
1) Output quality is very high
2) They are cheap to buy
3) They are lightweight and take up less space
4) Do not produce ozone or violate organic compounds
Disadvantages
1) Output is slow if large volumes are needed
2) Ink cartridges run out quickly because they are of small quantity
3) Printing can ‘smudge’ when they come in contact with moisture
4) They can be expensive to run if used a lot.
3. 3DInkjet Printer
This new type of inkjet printer produces 3D (3 Dimension) models using
modified inkjet technology. This type of technology is known as ‘tomography’,
thin layers of powder are bonded together as a 3D model known as ‘prototype’
is slowly built up.
Uses
a) Used to produce prototypes
b) Used to produce coloured scaled models
c) To ultimately produce organic objects using layering technology
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
46
COMPUTER STUDIES GRADE 8
Advantages
1) Save a lot of money through directly producing prototypes
2) Physical models are produced with working parts
3) The powders used can often be ground up and re-used
Disadvantages
1) They are expensive to buy
2) They are slow at producing their output
3) The end product can at times be rough and often needs further work to be
done on it.
4. Thermal Printer
This printer uses heat to produce a hardcopy. It uses a special paper which has
one surface which is sensitive to heat. It does not have a buffer memory.
Uses
a) Used to print out receipts in supermarkets and shops
b) Used for small prints outs
Advantages
1) Fast at producing small print outs
2) It is Cheap to buy and run
3) Does not need ink pots or cartridges to print.
4) It does not take up a lot of space
Disadvantages
1) Quality of print is not very good
2) It cannot be used to print out large documents
3) Needs heat sensitive paper which is expensive to buy.
(ii) Impact Printers
1. Dot Matrix Printer
This is an impact printer where the print-head, which is made up of a matrix of
small pins, press against an inked ribbon and strikes onto the paper. They are
slow, noisy and the quality is not very good.
Uses
a) Used to print on multi-part (continuous stationery) is being used.
b) Used in noisy environments.
c) Used where print quality is not very important.
Advantages
1) Can be used in environments which might be a problem for laser or inkjet
printers.
2) Carbon copies or multi-part outputs can be produced.
3) They are easy to use if continuous stationery is used.
Disadvantages
1) They are noisy.
2) They are costly to buy as compared to inkjet printers.
3) They are very slow.
4) They quality is not very good.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
47
COMPUTER STUDIES GRADE 8
2. Plotter Printer
These are also known as graph plotters. They operate in a different way from
printers and they are not limited to normal print paper size. They are capable of
producing highly accurate, very large drawings and posters. There are basically
three types of plotters; pen plotters which uses coloured pens. The pens are
controlled by a computer and the paper can move backwards and forward to
allow accurate shapes to be drawn. The electrostatic plotter is similar to a laser
printer and inkjet plotters.
Uses
a) Used to produce large drawings.
b) Used to produce large pictures such as billboards and giant posters.
c) Used to print on plastic coated paper.
d) When cutting tools are used, it can produce large signs.
Advantages
1) They can produce very large printouts.
2) The print quality is extremely high.
Disadvantages
1) They are slow in operation.
2) They are very expensive both to buy and maintain.
3. Braille embosser
Uses
Advantage
Disadvantages
C. Speakers
Speakers are either connected directly to a computer or built into the monitor or system
unit. Digital signal is converted into analogue signal using a DAC (Digital to Analogue
Converter). The signal is hen amplified through the speakers.
Uses
a) Used to output sound from multimedia presentations.
b) Used in home entertainment.
c) To assist the visually challenged (blind) through audio output.
d) Used to play downloaded sound files.
D. Multimedia Projectors
These signals which can either be analogue or digital although most modern ones mainly
work with digital inputs. They can be connected to a computer, DVD player, or television
set. The image from the source is magnified and projected onto a large screen. Most
multimedia projectors take in various videos formats such as NTSC, PAL or SECAM.
Uses
a) Used for training presentations
b) Used for advertising presentations
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
48
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
49
COMPUTER STUDIES GRADE 8
LESSON NINE
COMPUTER PROCESSING AND
THE MICROPROCESSOR
TOPICOBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what computer processing is
2. know what a microprocessor is
3. Identify the different types of types of microprocessors
4. Explain the different parts that make up a microprocessor
5. Explain how a microprocessor works
6. Know and explain how speed of a microprocessor in measured
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
50
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
51
COMPUTER STUDIES GRADE 8
AMD entered the scene of microprocessor devices in the 1975 with the AM 2900 series.
AMD has the following brands:
Opteron Processor
Athlon 64, Athlon 64 X2
Turion Processors, Turion 64 X2 families.
The Phenom processors, Phenom X3 and Phenom II series
D. PARTS OF A MICROPROCESSOR
The microprocessor is made up of two parts; these being the:
Control Unit (CU)
Arithmetic and Logic Unit (ALU)
The diagram below shows the two parts of the Central Processing Unit:
measured in Hertz (Hz). It takes one clock cycle for a processor to complete an internal
operation. Therefore, the number of cycles a processor completes in one second
determines its speed; the more cycles completed in one second the faster the processor.
Note that one cycle per second equals one hertz. The table below shows this:
Speed in
Measure Term Measurement Symbol Speed in Hertz
Cycles Per Second (CPS)
- - Hertz Hz 1 1Hz
Thousand Kilo Kilohertz KHz 1,000 1KHz
Million Mega Megahertz MHz 1,000,000 1MHz
Billion Giga Gigahertz GHz 1,000,000,000 1GHz
Trillion Tera Terahertz THz 1,000,000,000,000 1THz
Hence, the faster the clock speed, the more instructions a processor can execute (run) in
one second.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
54
COMPUTER STUDIES GRADE 8
LESSON TEN
COMPUTER MEMORY
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what computer memory is
2. Identify the two main types of main memory
3. Explain what Random Access Memory is
4. Know the two types of Random Access Memory
5. State the difference between Static Random Access Memory and Dynamic
Random Access Memory
6. Know how Random Access Memory is measured
7. Explain what Read Only Memory is
8. Know the different types of Read Only Memory
9. Explain the difference between Random Access Memory and Random Only
Memory
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
55
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
57
COMPUTER STUDIES GRADE 8
A byte is made up of bits which are a combination of 0s and 1s usually 8 of them or 8 bits.
Each memory cell which is made up of 8 bits can keep, hold or store a combination of 8 0s
and 1s or 8 bits which is one byte. As a result, each memory cell can keep, hold or store one
byte. The diagram below explains this:
One byte of computer memory represents one character. A character is a letter, digit,
punctuation mark or mathematical symbol and also includes space. e.g.
D 3 , : 1 E * ^ $ ~
Therefore, it must be understood and remembered that:
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
58
COMPUTER STUDIES GRADE 8
The most common measuring unit of computer storage or memory is the ‘byte’. The table
below shows measurement of memory:
Storag
Number of e
Measur Ter Measurem Symb Actual Number of characters
characters in capaci
e m ent ol in bytes
bytes ty in
bytes
- - Byte B 1 1 1B
Thousa Kilo 1,000 1,024
Kilobyte Kb 1KB
nd
Million Meg 1,000,000 1,048,576
Megabyte Mb 1MB
a
Billion Giga Gigabyte Gb 1,000,000,000 1,099,511,627,776 1GB
Trillion Tera 1,000,000,000, 1,208,925,819,614,629,174,7
Terabyte Tb 1TB
000 06,176
So computer memory of 512MB will be:
512MB = 512,000,000 bytes = 512,000,000 characters
READ ONLY MEMORY
ROM is an acronym for Read Only Memory. Read Only Memory is also known as
Non-volatile memory
ROM is a type of "built-in" computer internal memory. The data and instructions in ROM
are stored by the manufacturer at the time of a computer’s manufacture.
This memory is non-volatile, in the sense, that ROM retains its programs even when the
computer is turned off. Once data has been written onto a ROM chip, it cannot be removed
and can only be read. ROM is used to store permanent programs, which are very essential
for hardware to perform correctly. A typical example of ROM is Basic Input Output System
(BIOS) chip.
It's used to store the start-up instructions for a computer, also known as the firmware.
Most modern computers use flash-based ROM. It is part of the BIOS chip, which is located
on the motherboard.
ROM on a computer contains a small start-up program called BIOS is used to bootstrap the
computer, that is, to read a larger program from non-volatile secondary storage to RAM and
start to execute it.
TYPES OF READ ONLY MEMORY
There are five basic types of Read Only Memory:
i. ROM - Read Only Memory.
ii. PROM - Programmable Read Only Memory.
iii. EPROM - Erasable Programmable Read Only Memory.
iv. EEPROM - Electrically Erasable Programmable Read Only Memory.
v. Flash EEPROM memory.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
59
COMPUTER STUDIES GRADE 8
Each type has unique characteristics, but all types of ROM memory have two things in
common:
a. Data stored in these chips is non-volatile; it is not lost when power is removed.
b. Data stored in these chips is either unchangeable or requires a special operation to
change.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
60
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
61
COMPUTER STUDIES GRADE 8
LESSON ELEVEN
COMPUTER STORAGE
DEVICES AND MEDIA
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what computer storage is.
2. Know and state the two groups of storage devices and media.
3. Identify the different types of storage devices and media.
4. Explain the function of each storage device and media.
5. Outline the advantages and disadvantages of each storage device and media.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
62
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
65
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
66
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
67
COMPUTER STUDIES GRADE 8
portable. Most operating systems recognise these storage media which means that no
additional software is needed to recognise them.
Use
a) Used for transporting files between computers.
b) Used as a security device to prevent software piracy.
Advantages
1) They are a very compact and portable media.
2) They are very robust.
Disadvantages
1) It is not possible to write protect the data and files.
2) Their small physical size means that they are easy to lose.
I. Flash Memory Cards
These are a form of Electricity Erasable Programmable Read Only Memory (EEPROM)
and another example of solid state memories.
Use
a) Used to store photos on digital cameras.
b) Used as memory cards in mobile phones.
c) Used in MP3 players to store music files.
d) Used as a backup store in handheld computer devices.
e) Used for transferring data directly to a computer or printer.
Advantages
1) They are very compact; therefore, they can be easily removed and used in another
device.
2) They are very robust.
Disadvantages
1) They are expensive per gigabyte of memory
2) They have finite life in terms of the number of times they can be read from or
written to.
3) They have a lower storage capacity as compared to hard disks.
DIFFERENCES.
There are differences between primary memory and secondary memory as the table below
shows
PRIMARY MEMORY (MEMORY) SECONDARY MEMORY (STORAGE)
Stores data, instructions and Stores data, instructions and
information being currently information permanently for
executed by the CPU. future use.
It is volatile. When computer is It is non-volatile. When computer
switched off, the contents are lost. is switched off, the contents are
not lost.
Smaller storage capacity usually Larger storage capacity usually
2GB to 8GB. 500GB to 2TB.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
68
COMPUTER STUDIES GRADE 8
It is faster and usually more cost It is slower and cheaper per unit
effective. of memory.
Directly accessible by the CPU. Not directly accessible by the CPU.
It is not very robust. It is very robust.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
69
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
70
COMPUTER STUDIES GRADE 8
LESSON TWELVE
COMPUTER USER
HEALTH AND SAFETY
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what health is.
2. Know what safety is.
3. Identify and explain computer user health risks.
4. Identify and explain computer user safety risks.
5. Apply computer user health and safety measures to avoid risks.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
71
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
73
COMPUTER STUDIES GRADE 8
LESSON THIRTEEN
CARE OF COMPUTER
AND OTHER DEVICES
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1. Know what to care means
2. Understand the importance of caring for a computer and other devices.
3. Explain the ways of caring for a computer
4. Explain how a scanner is taken care of
5. Identify ways of caring for a printer
6. Explain how a cellular phone is cared for
7. Outline how a television set is cared for
8. Put into action the identified set for caring for a computer and other
devices.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
74
COMPUTER STUDIES GRADE 8
Taking care of your computer is just as important as taking care of your books. Both the
internal and the external parts of the computer have to be cared for. Some of the activities
performed to clean up the hard drives are:
a. Scanning:
b. Defragmenting:
c. Reformatting:
These activities are best left to a grown up and such you should not attempt them.
However, there are certain tasks you can perform to ensure your computer is clean; here
are a few:
a. Keep Dust Away: Dust your computer to keep it free of dust and dirt. Also use a non-
static cloth to cover your computer when it is not in use.
b. Keep Food Away: Do not eat or drink while working on the computer.
c. Use Clean Hands: Make sure your hands are clean before you type on the keyboard or
make use of the mouse.
d. Treat with Respect: If you are having problems with your computer, ask for help. Do not
bang or hit the computer.
e. Keep it Switched Off: Seeing that the computer is connected to electricity, this means
that lightning could be conducted to your computer through the electrical connection.
For this reason it is best not to use your computer during a storm. Another way of
protecting your computer is connecting a surge protector between the electricity socket
and your computer.
f. Stop Virus Attack: A computer virus is a program written by a person on purpose to
harm other peoples’ computers. A computer virus is passed from one computer o
another when you share and download files without the protection of antivirus
software.
For this reason you should get permission before downloading files. Most importantly
make sure that a good, reliable, trusted and up to date antivirus is installed on your
computer.
In addition ensure that the computer’s firewall is setup and running if the computer is
to be connected to a network.
g. Keep Up to Date: Always keep your software up to date by making regular updates to
improve the efficiency and functionality of your computer.
h. Keep Well Ventilated: Make sure that there is plenty of air circulation in area where
your computer is placed. This prevents it from overheating and is kept cool.
STORAGE DEVICES AND MEDIA
Storage is an important component of any computer. A computer has devices that help in
storing or enable storage to be done
2. Storage devices
i. Hard disk drive
It is common to see hard drives die at some point in time, but they all don't die at
the same rate. On an average, a hard drive has a lifespan of six years that is almost
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
76
COMPUTER STUDIES GRADE 8
50 percent of the hard drives will last up to six years. The Hard Disk is very
important because it serves as a place to store the data, information and software
in our systems unit. Therefore we need to take care of the hard disk so that
important data, information and software are not lost and the CPU can work
optimally. These are some tips:
1. Install an antivirus just in case if there is a virus that will attack and destroy
your data. Routinely updated the antivirus.
2. Try to always make backups for critical data.
3. Use Scandisk to check whether there is bad sector on the hard disk.
4. Always do Defragment once every two weeks so the data are arranged neatly
inside the hard disk.
5. Use third-party software to clean junk files, duplicate files and the recycle bin.
You can use the System Cleaner.
6. Do not remove and put back your hard disk into the system unit too often
because hard disks are very sensitive. If exposed to shocks, then the data on
the hard disk endangered missing.
7. Do not store too much data. Do not use hard disk until a few kilobytes free. But
give little space to the hard disk so it is not too congested. At least reserving
approximately 20 MB. If you use Windows Operating System, it will usually
appear a warning if your hard disk is too full.
8. Uninstall unnecessary programs in order not to burden the hard disk.
9. Use a UPS (Uninterruptible Power Supply) or Stavolt. If power suddenly goes
out, the computer will not properly turn off. A computer that suddenly turns
off without going through the shutdown process first will make your hard disk
quickly break down. So a UPS is used to provide limited power so that the
computer may be shutdown properly.
10. Adequate ventilation. Do not put the system unit in a crowded or cramped
place because it can make the air cannot get out so that the hard disk becomes
hot fast. So better choose the system unit that has many fans and place them
in a rather broad.
11. Every time you shut down and boot the computer, the hard drive works quite
hard and frequent power on and off will add to the wear and tear it faces on
regular use. You can follow the rule of shutting down the system if you are
away for over a day. If it is just a few hours, you can put the computer in
hibernation or standby mode. For durations less than that, you can leave the
computer in sleep mode.
ii. Computer ports
Over time, ports on your electronic equipment can become clogged with dust and
other debris. If you're having trouble getting USB or other devices to work with
your computer, cleaning any grime from the connecting ports is a good first step.
Turn off the hardware first. If you can see that the port is severely clogged say, with
peanut butter or another thick, child-friendly substance gently dig the gunk out
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
77
COMPUTER STUDIES GRADE 8
with toothpicks. But remember: Ethernet, serial, and other jacks rely on fragile
pins, so try to move in and out on the same path instead of swirling around the
sides.
a. Spray air to clean. For less sticky situations; use a can of compressed air
(actually pressurized gases) to blast out loose bits. Fire at the target in short
bursts.
b. Swab to clean. Finish cleaning with a cotton swab dipped in rubbing alcohol or
electronics cleaner. Leave the device turned off for a couple hours to dry.
iii. Memory Sticks/Pen drives
Don’t put them in the pockets of your pants or shirt
Many things can happen:
The heat from your body can create moisture, which may condense into the
drive and cause corrosion and damage of electronic components therein.
Small bits of dust, dirt and fluff that find their way into pockets can make their
way into the connector and cause a short circuit that would damage the
electronic components next time it is connected to power.
You could bump into something very hard, causing the connecter to get bent of
break off completely.
Don’t place the drive on your keychain either for similar reasons. If you need to
transport it, carry it around in a clean dry place and ensure the protective
connector cover is on at all times it’s not in use.
Avoid plugging it into the computer indefinitely
There are cases where users of broken flash drives come to recover data from flash
drives, claiming that they used it, left it plugged into the computer and working fine
only to return and find that the computer could no longer recognize the device.
While this is uncommon, a power surge onto the USB port can cause malfunction
and damage to the electronic components on the drive. On the other hand,
perhaps someone inadvertently bumped into it spoiling the connector. To be safe,
safely remove your flash drive from the computer when you are not using it and
put it somewhere safe.
Avoid running software from the flash drive
Each flash drive comes with a predetermined number of read and write cycles, and
once you’ve exhausted them the flash drive can no longer be used. When you save
and retrieve documents, you use single cycles per retrieval or write function, but
running software applications from the flash drive will use multiple read/write
cycles. This means that you reduce your available cycles faster by running software.
If you have to run software applications from your flash drive, for
example password recovery application for Windows, use an inexpensive drive, and
ensure that you also do not have important documents saved to it. Back up all the
files that are in the flash drive regularly just to be safe.
Create a backup
The truth of the matter is that flash drives are electronically produced components
with a limited lifespan; no matter how well maintained they are. You should
therefore have some scheme of regular backup for your flash drive on your
computer.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
78
COMPUTER STUDIES GRADE 8
Scanners use a bright light source to illuminate the material they digitize. Accessing the lamp to replace it when it burns
out requires partially disassembling the device, which may void your warranty. Paying for the repair after your warranty
ends may cost more than buying a new scanner. Although most of these devices enter a lights-off standby mode when
they're left turned on but not in use, you should see better performance and longer life if you shut yours off when you
finish scanning.
Keep it Clean
Dust can accumulate on the scanner's case and migrate inside, producing spots and specks on your scans. Even if you
use the device only to digitize invoices or other documents for your records, dirt can obscure information, so you want
the best-quality scans you can achieve. Keeping dirt at bay saves the time you'd need to digitally remove the artifacts it
introduces in your files. Check your hardware documentation for its manufacturer's notes about the cleaning supplies to
use or avoid, and rely on microfiber cloths so you don't introduce lint particles from paper towels or other forms of
fabric.
Your scanner relies on a data connection to receive instructions and send back digitized data. Whether your device uses
USB, Firewire, SCSI or another interface type, keep its cabling tidy and free of unnecessary bends or kinks that can
damage wiring. If you're tempted to connect the device through a hub to free up ports on your computer, check the user
guide and setup instructions to verify that your scanner tolerates a hub-based connection.
Drivers and other support software serve as the intermediary between your computer, operating system and applications
on the input side of the digitizing equation, and your scanner hardware on the other end. Your device should include
either an installation disc with driver software or a link to the manufacturer's website so you can download it. To
maximize performance, check the website periodically for updates that squash bugs or improve compatibility.
Moving Safely
When you unpack and install a scanner, one of your setup tasks involves freeing up the locks and latches that
immobilize the scanner's transport mechanism so it avoids damage in transit. Those same safety provisions become
necessary if you relocate your office, even if it's an elevator move within the same building. To assure that you'll be
able to remember the lock-down procedure, keep your user documentation where you can find it quickly.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
81
COMPUTER STUDIES GRADE 8
PRINTERS
CELLULAR PHONE
TELEVISION SET
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
82
COMPUTER STUDIES GRADE 8
LESSON FOURTEEN
COMPUTER MALWARE
AND SECURITY
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
1 Know what a computer malware is.
2 Identify and explain the different types of computer malware.
3 Identify and explain Trojan horse.
4 Identify and explain a computer worm.
5 Understand how a malware enters a computer
6 Know, protect and prevent computer infection.
7 Know what computer security is.
8 Explain how computer security can be breached or comprised.
9 Identify the different types of computer security threats.
10 Enhance computer security by applying various methods of security.
11 Appreciate the need for computer security.
14. COMPUTER MALWARE AND SECURITY
MALWARE
Trojan horses, viruses, and worms and collectively called malware
SECURITY
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
83
COMPUTER STUDIES GRADE 8
LESSON FIFTEEN
ADVANTAGES AND
DISADVANTAGES OF
A COMPUTER.
TOPIC OBJECTIVES
AT THE END OF THIS TOPIC, YOU SHOULD…
4. Know and explain the advantages of a computer.
5. Know and explain the disadvantages of a computer.
6. Appreciate the place computers hold in people’s lives
7. Appreciate the impact of computers on people’s lives.
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
84
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
85
COMPUTER STUDIES GRADE 8
One of the biggest breakthroughs on the Internet is probably e-commerce. You can
actually shop in the convenience of your home and have the items delivered to your
doorstep.
6. Consistency
You always get the same result for the same process when using a computer. For
example, if you created a document on one computer, you can open it on another
without making any special adjustments. This consistency makes it possible to save
and edit a document from different computers in different parts of the world.
Collaboration is therefore easier.
Whatever job you need done, you can always be rest assured that the computer will
get it just right. There will be no variations in results achieved from the same process.
This makes computers ideal for doing tedious and repetitive work.
B. Disadvantages (Demerits, Cons, Downside)
1. Health Risk
Improper and prolonged use of a computer might lead to disorders or injuries of the
elbows, wrist, neck, back, and eyes. Technology overload and computer addiction are
the major behavioural health risks. Addiction comes when you are obsessed with a
computer. Technology overload comes when you are over loaded with computer and
mobile phones.
2. Violation of Privacy
When using the Internet on your computer, you run the risk of leaking your private
information. This is especially so if you happen to download malicious software into
your computer. Trojans and Malware can infiltrate your system and give identity
thieves access to your personal information. Of particular interest to identity thieves
are your bank and credit card details.
3. Impact on Labour Force
Computers have replaced human labour in many areas. Jobs that were done by
people are now being done by computers. As a result this has led to layoffs,
redundancies and unemployment. For example a job that needed about twenty
people can be done by one, two or more computers all controlled by one person.
4. Impact on Environment
Manufacturing process of computers and computer waste are harmful to the
environment. When computer junk is discarded in open grounds, they release
harmful chemicals like lead and mercury to the environment. Mercury can result in
cancer and lead can cause radiation diseases when exposed to the environment.
Disposed computers could also cause fire.
5. Data Security
This is one of the most controversial aspects of computers today. The safety and
integrity of data is important for any business. However, data stored in a computer
can be lost or compromised in a number of ways. There are instances where the
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
86
COMPUTER STUDIES GRADE 8
computer could crash, wiping out all data that had been stored therein. Hackers
could also gain access into your computer and compromise the integrity of your data.
the network and allow multiple users to simultaneously share the same resources
irrespective of physical location. UNIX/Linux and the Microsoft family of Windows
Servers are examples of client/server network operating systems.
Advantages of a Client-Server Network:
Centralised - Resources and data security are controlled through the server.
Scalability - Any or all elements can be replaced individually as needs increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components (client/network/server) work together.
Accessibility - Server can be accessed remotely and across multiple platforms.
Disadvantages of a Client-Server Network:
Expense - Requires initial investment in dedicated servers.
Maintenance - Large networks will require a staff to ensure efficient operation.
Dependence - When server goes down, operations will cease across the network.
TYPES OF CONNECTIONS
A network can be connected in three ways. These are:
1. Wired: Twisted Pair - Network cabling that consists of four pairs of wires that are
manufactured with the wires twisted to certain specifications. Available in shielded and
unshielded versions.
2. Wireless: there various wireless technologies that can be used:
a. Bluetooth
b. Infrared
c. Radio frequency (RF)
d. Wi-Fi
3. Optic cable: A cable, consisting of a centre glass core surrounded by layers of plastic,
that transmits data using light rather than electricity. It has the ability to carry more
information over much longer distances.
TYPES OF NETWORKS
There are many different types of networks that are in use today. Below are some of the
following:
A. Local Area Network
A local area network is usually within one building or certainly not over a large
geographical area. A typical LAN will consist of a number of computers and devices such
printers which will be connected to hub or switches. One of the hubs or switches will
usually be connected to a router and modem to allow the LAN to connect to an outside
network such as the internet; in doing so, it becomes part of a Wide Area Network.
Advantages:
- Sharing of resources such as printers, scanners, servers, software
- Easy communication between users
- A network administrator can control and monitor all aspects of the network
- Saves money on acquiring many expensive devices and software
Disadvantages:
- Easy to spread viruses throughout the network
- The development of printer queues can be frustrating
- Slower access to external networks such as the internet
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
89
COMPUTER STUDIES GRADE 8
N. Sneaker Network
Refers to a manual method of sharing files in which a file is copied from a computer to a
floppy disk, transported to a second computer by a person physically walking
(apparently wearing sneakers) to the second computer, and manually transferring the
file from floppy disk to the second computer.
O. International Network
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
90
COMPUTER STUDIES GRADE 8
c. Advantages
Easy to connect a computer or peripheral to a linear bus.
Requires less cable length than a star topology.
d. Disadvantages
Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.
5. Star network topology
n. Advantages
Easy to install and wire.
No disruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.
o. Disadvantages
Requires more cable length than a linear topology.
If the hub, switch, or concentrator fails, nodes attached are disabled.
More expensive than linear bus topologies because of the cost of the hubs, etc.
6. Token-Ring network topology
a. Advantages
b. Disadvantages
a. Advantages
b. Disadvantages
a. Advantages
Point-to-point wiring for individual segments.
Supported by several hardware and software venders.
b. Disadvantages
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
91
COMPUTER STUDIES GRADE 8
a. Advantages
b. Disadvantages
a. Advantages
b. Disadvantages
a. Advantages
b. Disadvantages
a. Advantages
b. Disadvantages
a. Advantages
b. Disadvantages
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
92
COMPUTER STUDIES GRADE 8
Kampamba Nsofu
+260 966 291 668, +260 955 088 551
[email protected]
93