Computer Form 1 Notes
Computer Form 1 Notes
INTRODUCTION TO COMPUTERS
1
Information is result from processed data. For
example adding some numerical values like the
numbers 14 and 17 into the computer will give you
the result of 31. The later is information you required.
Information can be defined as data computed into a
more useful form than raw form.
3
(iv) Output Function – the data stored is processed
and then output into files, printed as hard copies
or displayed on the screen for the user.
d) Microcomputers
Of the types of computers, microcomputers are the
slowest. However, they counteract this disadvantage
5
because they are easy to use and the cost of purchase
is also low.
A microcomputer gets its name from the fact that
its main computing component, the microprocessor
(to be introduced later) is located in one integrated
circuit (IC) or what we call a Chip. Microcomputers fit
nicely on desktops, for that reason they are
sometimes known as Desktop Computers. They are
also referred to as Personal Computers since many
individuals purchase them for personal use.
1.2.3 By Purpose
Classification by purpose falls into 2 categories:
a) Special Purpose Computers
These are computers that are single task
oriented. In other words, they are designed to solve
only a particular type of problem. Examples include
embedded computers in our common digital watches.
b) General Purpose Computers
These are computers that can perform a vast
number of operations or solve problems of different
varieties. Most of the computers in use today are
general purpose. However, it is wise to note that
general-purpose computers can always be adapted
with special programs to do a job specified hence
becoming special purpose computer.
c) Embedded Computers
These are computers attached to other computers
that help in operating them. E.g. computers
embedded in lifts, petrol pumps, digital watches and
so on.
1.2.4 By Use
It is worthy noting that we categorize these
computers according to what it is used for and when
it is used. Under this category, the list is endless. For
this reason we will limit ourselves to only five main
types.
7
(i) Personal Computers or Desktop Computers
These are also known as Microcomputers. They get
their name from the fact that they fit nicely on the
desktop. They can also be used on the desk in the
office environment or for personal use at home.
(ii) Home based Computers
These computers are those designed to be used at
home. An individual may install only games program
in it or a word processor to enable them write letters,
still some would install accounting packages to enable
them budget and control their finances at home.
(iii) Lap top Computers
These computers get their name from the fact that
you can place them on your laps while using. They
are very small computers that have the structure of a
briefcase i.e. you open and close the same way. These
have a keyboard attached to them and a flat screen
together with a mouse ball and chargeable batteries.
This means that you can use them in the rural areas
where the is no electricity.
Laptop computers also have ports (small slots)
through which you can attach an external keyboard,
mouse or external drive like drive A:.
9
Like the control keys, the escape key is used to
cause other keys to perform special functions. Unlike
the control keys, however, it is not held down while
pressing another key. Once sending a signal to the
computer system, for that purpose. If you press
another key following Escape, it will cause the
computer to execute a function established by the
program in use.
10
1.3.2 SUMMARY
11
1.3.3 QUESTIONS:
i. Define a Computer.
12
CHAPTER 2
COMPUTER COMPONENTS
Fig.2.12.1
Fig.
13
2.1 DIAGRAMMATIC REPRESENTATION OF
DIVISIONS OF A COMPUTER
The following diagram shows the basic physical
computer breakdown that will serve as a reference
throughout the chapter.
Fig. 2.1
14
KEY:
C.P.U - Central Processing Unit
A.L.U - Arithmetic Logic Unit
DOS - Disk Operating System
ROM - Read Only Memory
RAM - Random Access Memory
DBMS- Data Base Management System
16
APPLICATION
INPUT SOFTWARE OUTPUT
OPERATING
SYSTEM
HARDWARE
FEEDBACK
Fig. 2.3
17
Processor
Control Arithmetic/Logic
Unit Unit
Input Input
Devices Devices
memory
C.P.U
Fig. 2.5: Components of a Computer Hardware System
18
2.5 Functional Organization of the Elements of a
Computer System
Monitor
C.P.U.
Disk Drive
Mouse
Keyboard
Fig. 2.6
19
Arithmetic Logic Unit forms the second part of
the CPU. The ALU performs the calculations and
makes comparisons between units of data. The last
component is the Control Unit (CU), the work of which
C.P.U.
is to control the operations of the hardware for
example by issuing commands to all elements of the
computer as per the dictations of memory. (e.g from
the input devices to memory, from memory to output
devices, etc).
The Central Processing Unit determines the
power of a computer hardware system which is
described in terms of :
(i) Size of Memory, which is measured by the
number of characters of data it can store
(ii) Speed of the Control and Arithmetic Logic Unit,
Disk Drive
which is measured in millions of instructions per
second (MIPS).
The work of the various input devices such as
terminal keyboard, disk storage units and tape
storage units is to send data into the CPU, whereas
the work of the output devices such as printers,
visual display units, disk and tape units is to give out
the results from the processing operations.
20
The Central Processing Unit also “houses”
Registers. The latter is a small part in the CPU that
holds data before processing or probably after. They
store data to be processed and thereafter partial
results. Registers are of different kinds performing
different functions:
(i) Ordinary Counter Register (OC) – This
register addresses the next instruction to be
expected or we could say it contains the
addresses of the next instruction to be executed.
(ii) Instruction Register (IR) – This register
contains the actual instruction under execution.
(iii) Accumulator Register – This register stores
data to be processed or the results of a partial
execution.
The processor communicates with the main
memory through 2 registers:
(a) Memory Address Register (MAR)
(b) Data Address Register (DAR)
When reading a word from the memory, the CPU
stores the address of that word in MAR and sends a
read signal to a main memory. After one memory
cycle, the value of the word is in DAR from where the
CPU will search for it.
When reading a word, the CPU stores in MAR the
address of where the write operation will take place.
The value to be written will be stored in the DAR and
then it sends the write signal to the memory.
Execution of an Instruction
The execution of an instruction of the central
processing unit is performed through the following
steps:
(i) Storage of the next instruction to be executed
from the main memory to the instruction register
(IR);
21
(ii) Modification of the contents of the OC registers
the address of the next instruction;
(iii) Recording of the instruction recently stored;
(iv) Localization of the data needed by the
instructions in the memory;
(v) Storage of data if necessary into the internal
registers of the CPU generally the accumulator;
(vi) Execution of the instruction;
(vii) Storage of the results in the appropriate place;
(viii) Return to step (i) for the execution of the next
instruction.
The Processor
The Control and Arithmetic/Logic Units are
usually considered as a hardware device separate
from the memory. This is because the size of the
memory may vary independently from the Control and
Arithmetic/Logic Units. As separate devices they are
known as Processor.
Processors used in microcomputers are known as
microprocessors (refer to chapter 1), but conceptually
they are the same processors found in larger
computer systems.
Memory
A computer’s memory stores data before, during
and after processing as well as the application
program in use at the time. These data are stored in
cells of the memory. Each memory cell contains one
byte of data (a byte = 8 characters: a character is say
a letter of the alphabet, or a number). Therefore, one
cell will contain eight characters called a byte.
The size of the computer memory is measured in
terms of “Kilobytes” or “Megabytes” or “Gigabytes”.
Since “Kilo” stands for 1,000 and “Mega” for
1,000,000, computer memory is measured by the
22
thousands or millions of bytes that can be stored in
memory at one time.
In computer usage, the prefix “Kilo” actually
stands for 1024 bytes and “Mega” for 1,048,576 bytes
(explanation later in form 2 – Number systems).
Computer memory is sometimes known as
Primary memory Storage, Main Memory and RAM
(Random Access Memory).
Primary Memory
Primary storage or RAM is the computer’s
working bench. All data to be processed must first be
recorded in it and all output of results draws data
from it. Primary storage has 2 crucial characteristics.
The first is that data can only be stored temporarily,
and two, it cannot store a great deal of data.
Secondary Storage
These characteristics of primary storage give rise
to the requirements to store large quantities of data in
machine readable form that can be fed into RAM in
small segments for processing. Units that do this are
called secondary storage devices also referred to as
Auxiliary Storage or Backing Storage. (Description
of these devices latter in the chapter).
The two most prevalent of these are disks and
magnetic tapes. These media offer the ability to store
data off line, meaning that data can be processed
from time to time by the computer system and are not
stored permanently as part of the hardware
configuration. When needed, they are mounted on
data reading and writing device, called drops, as
required by their application programs.
(i) The processor receives data from main storage,
performs operations on them, then the result is
given back to the same.
23
(ii) Data then goes to the main memory comes from
input devices or secondary devices, and data
from the main memory goes to backing storage or
output devices.
(iii) The ALU and CU combine to form the processor
as discussed.
2.7.1 Keyboard
Please refer to 1.4 for full keyboard
explanations. Using the keyboard is a matter of
knowing which command you want to issue to the
machine or what entries in the form of characters you
want to make; then simply type in the right
characters from the keys of the keyboard.
2.7.2 Mouse
This is another type of input device but as
opposed to the keyboard, it doesn’t have keys. A
mouse has usually two buttons (but not always).
When installed in your machine, a pointer is always
seen on the screen. Underneath the mouse is a
rotating ball which with the slight movement of the
device on a pad, the pointer will correspondingly move
on the screen by the same distance and to the right
direction. To issue an instruction to the system, the
user simply needs to click (press the mouse button
once – usually the left) a menu and choose a
command he wishes to issue or click a command he
24
would want to use. You can use a mouse also to draw
different shapes of your style apart from simply
clicking commands. A mouse (mice – plural) is usually
employed in Windows Applications without which the
Windows Operating System become incomplete.
25
2.7.4 Joy Stick
This is a device that permits you to move a
picture, line, word, or cursor from point to point in a
display screen. Used normally in playing computer
games.
26
2.7.6 Laser Scanner
This input device is used to scan a picture or
other documents from print onto the screen and
hence can be available for storage in the computer
memory for processing or future reference. Some
printers come with inbuilt scanners. However, we
have small scanners (manual) that are held in the
hand while scanning an object to the monitor into the
memory. You can scan for example your photograph,
signature, and logo on other documents. Another
scanner is known as flat bed which is used by placing
the document to be scanned on it.
27
Voice input systems require that the user
pronounce the vocabulary of voice command several
times while the system does the “listening” and
analyses the voice patterns of the various words. After
this, using an airplay of the voice patterns, the system
will respond to the commands as dictated. Once the
computer has been initialized with the voice pattern of
the person, such system will always not respond to
anyone else. Example is voice dialing in a mobile
phone.
29
2.7.13 Key to Disk Operation
Each operator loads the program usually employed to
enable data entry of batches., then keys in the data
from the original documents usually source
documents. The program in use will validate the data
entry and incase of any error; this will be given on the
screen and then will enable the operator to correct.
Once this is corrected, the data is stored on disk and
the second operator is given the same source
document to verify using the same process to the
terminal and program. Once a batch is verified as
compact, the data is transferred from the disk to the
tape drive and finally physically transferred to the
server (minicomputer) for processing.
2.8.1 Printers
Printers are necessary when hard copies of
displayed work on the monitor have to be sent to
customers, report prepared by the Management and
the Board of Directors and so on must be printed. It’s
not disputable the fact that other electronic means of
transmitting information are now available. Printed-
paper, however, still remains the most popular means
of communicating the same information. Printers fall
into three main categories classified by the amount
of printed work the device is able to produce in
one operation.
30
a) Page Printers
These printers print a whole page at once. They
are sometimes known as image printers. They
produce the images by laser or electrostatic means.
The quality of output from such printers is sufficiently
high for business correspondence. They use toners
b) Line Printers
These type of printers produce a whole line of a
text at ago. They are very fast but the quality of the
output is always low.
It is important to note that the length of a line is
not standard Fig.
as2.8.1
it differs
(a) with the requirement of the
application in use. However, most of the printers will
print between 120 and 144characters per line. This
will require approximately paper width of about 14
inches so as to accommodate the said character scale.
132 characters are often the most common width.
These use cartridges.
c) Character Printers
Form or print one character as a time on the
paper. This rate of printing varies between 20 and 600
characters per second depending on the mechanism
or use in the different makes employed. These
printers make use of ribbons.
31
There are many different types of character
printers. The first is called Daisy Wheel Printer,
which creates fully formed letters much like a
typewriter sometimes called Letter Quality Printer.
The output is often good enough for business
correspondence.
32
The second is Dot Matrix Printer, which creates
characters as spools of dots in a rectangular matrix.
The speed of the dot matrix printer is much higher
than that of a daisy wheel but the quality of the
former is not sufficient enough for business
correspondence. A dot matrix printer has a print head
consisting of a number of small pins between 9 and
24 depending on the make. A printer with a 9 pin
print will give a poor quality print compared to that of
a 24 pin print head since the dots in the former are
widely spaced apart. If a dot matrix is to produce a
better quality output, sometimes referred to as Near
Letter Quality (NLQ), then a line is printed twice with
the print head being moved along very slightly in the
second printing so that those moved spaces between
the dots are filled into ensure continuity. One
advantage with the dot matrix printers is that they
can print from either side, meaning the print head
does not have to move say to the left side of the paper
in order to begin printing but begin from the right as
well. With the dot matrix printer you simply need to
change the ribbon of different colour to get a colored
output.
33
Fig. 2.8.1(c) (ii) Dot Matrix Printer
How Character printer operates:
A paper is passed through a printer that has a moving
belt or a chain containing a complete character set –
as seen from the keyboard. A paper is then hit from
behind by a set of hammers, which are aligned for
each printing position on the line. This will then pass
a paper against an inked ribbon behind which is the
character to be printed.
34
Thermal Printer
b) Electrostatic Printers
They form characters by charging the paper
electrically. The paper is then passed through a toner
solution. Particles of the toner solution (ink) stick to
the electrically charged areas of the paper. When the
paper is heated, the particles melt thus producing the
characters. They are quite fast; some print about 300
pages per minute.
c) Ink Jet Printers
These printers “spit” streams of ink to the surface of
the paper. The ink then drips almost immediately.
They are fairly slow. They produce from about 50 to
100 characters per second. These printers offset their
relative disadvantage of slowness by their low cost
and multiple colour printing.
35
2.8.2 Voice Output
Computer voice output is common place. For
example a computer could be programmed to offer
telephone information service, like directory help.
Others let you know if you dialed a wrong number or
if the number you are calling is out of order or busy
and the like.
2.8.3 Plotter
This is an output device used to produce graphical
output like drawing graphs, charts, maps or electric
circuits. The design of the graph, circuit is done on
the computer then the output is sent to the plotter.
Plotters are of two types: one that has a single sheet
sometimes called Flat Set Plotter and the second uses
a continuous sheet which rolls continuously on drum
like cylinders: also known as Drum Plotters.
2.8.4 Microfiche/Microfilm
Microfiche and Microfilm are both better known
collectively as microform. The later is a document
photographed and hence stored in a film. Microfiche
is a sheet of film that measures 105mm x 148mm
whereas a microfilm is actually a 16mm roll film. A
typical 16mm will hold the equivalent of 3,000 A4
Pages. One typical microfiche will hold the equivalent
of about 98 A4 Pages.
Usually this technique of giving output to a
microfilm/microfiche or microform is usually referred
to as COM (Computer Output to a Microform). The
technique is simple, a machine called a microfilm
Recorder reads output that is relayed onto a magnetic
tape for the computer, once read, the output is copied
out on microfilm/microfiche. The application of COM
is suitable where an organization has to store data
36
over a long period of time or where backup copies
need to be made. Records that need to be out a long
time would include: receipts and invoices of an
organization or say catalogues in a library or a
bookstore.
37
In processing data is read from the tape into
main memory (or RAM) where processing takes place.
The results are given out only as a written report or as
another tape file written on another drive. Because
RAM capacity is limited, only a small amount of data
is used for the input tape or written to the output
device at one time.
Data that is stored on magnetic tape as well as
other auxiliary storage devices are usually organized
into records. A record for now should be understood
as a unit of data consisting of characters about
someone or something. How data processing uses
records is a matter of loading one or more records into
RAM for an output device. Processing those records
and sending the result to an output device.
This technique of sorting records on tape in the
form of groups that are read into or written from RAM
all at once giving rise to a number of technical terms
that are used in all types of secondary storage media.
See fig. 2.9.1 below.
Physical Record
40
Read/Write
Head
Track Disk
Access
Rotation Arm
Spindle
Fig. 2.9.2(a)
Address Data
41
Fig. 2.9.2(b)
Disk storage media take different forms. Hard
disks are rigid in nature. They contain the most data.
Hard disks may be fixed in their devices or may be
removed. They are usually 14” in diameter, although
it is unusual to the smaller had disks in
microcomputers. One such system is known as
Winchester, so named because its prototype makes
use of two drops of thirty million bytes each has
effectively the “30-30”. It uses a 14” plotter. Later
versions called Mini-Winchester or Mini-winns” used
8” or 6” and one-quarter inch plotters, which are
stored in the drives and can store up to 85,000,000
bytes.
44
2.10.2 Application Software
This is a program that is usually applied on one
area of operation only – not as all encompassing as
system software. Application software is usually
divided into 2 categories:
(i) Standard Packages or Application Packages
(General Application Software)
These are packages that are designed to be used to
solve a particular type of problem for example Lotus
123, Ms Excel are all spreadsheet packages meant to
be applied in accounting operation only. Word perfect,
Ms-Word are all word processors. D-base 4, Ms
Access are database packages and so on.
(ii) User Developed Software (or Specialist Application
Packages)
These are suites of programs with their associated
documentation that are tailor made to solve specific
tasks only. Usually, a user will give a specification to
a programmer of the suite he wants to be developed to
meet his business or individual needs. This kind of
software is only restricted to solving problems to
which it is programmed to solve. Tailor made software
is sometimes known as Bespoke Packages.
45
2.11 SUMMARY
46
Output devices include: Printers – which could be
line, page or character printers, they are also
categorized by whether the print head strikes the
paper while printing – impact and non-impact
printers, visual display Unit, (or monitor) –
displays the text/graphics for the user to see and
plotters for plotting graphical output, electric
circuits, charts etc.
47
2.11 QUESTIONS
48
CHAPTER 3
52
harmful to the environment should be transmitted
through properly located ducts.
3.6.1 Cabling
Cables in the lab should be properly located
either on false floor or ceiling or along the walls so as
to avoid interference for example with communication
coolers in the lab. Cables put haphazardly may result
in possible power disconnection if stepped on or
pushed around.
3.6.4 Ventilation
It is a good practice to include ventilation in a
computer room but the same should not provide an
entrance to hackers to tamper with data.
VDU LEGISLATION
This is a legislation (British) that was passed in
1990 for frequent users of computer screens in the
lab. It states as follows:
1. One should not use a computer for more than one
hour continuously.
2. While using the VDU, the eyes should not look at
the screen directly but at an angle of 30-60.
3. The distance from the screen should be between
300mm-480mm.
4. While using the keyboard, the arms and elbows
should be at right angles and parallel to the
ground.
5. The seats and desks in the lab should be
adjustable to the users height this is to aid (iv) and
54
avoid Repetitive Strains Injuries (RSI) of the fingers
and wrists. The seats should have backrests!
6. All seats in the lab should be fitted with castors –
to make them mobile and less noisy.
Air Conditioning
Air conditioning is very essential in the
computer room where main frames are housed or
some minicomputers together with their associated
peripherals. Most devices however, usually contain
their own environmental controls that are automatic
for example fans, filters and sealed units.
Air conditioning is done to enable control the
following:
(i) Temperature – for equipment should be between
18C and 24C.
(ii) Humidity – this helps to avoid moisture
precipitation and build up of electrostatic
55
charges. Recommended humility should be 45% -
55%.
(iii) Dust control – disk media require high level of
cleanliness. Processors with highly packed
electronics require high levels of cleanliness. To
help keep high level of cleanliness, the lab should
have positive pressure, air lock and sticking nuts
on the floors.
Accessibility
While installing equipment in the lab, there
must be a provision for a through route, which is also
important for emergency exit. Only for security
purposes should such a route be closed.
Corridors of the lab must be high enough with
double doors and floors, stairs or lifts must be strong
enough t bear the load of equipment. It is often
recommended that ground floor should be used but
this again has many security risks.
Reception should always be spacious enough to
allow for storage of trolleys (used for moving
equipment around the lab).
56
Equipment Sitting
Design of the sitting equipment should always
be such that it ensures the workflow of the operator
and minimizes the walking distance from one
equipment to another. This means for example that
the location of a stand-alone computer and the printer
should be close enough to ease the work!
57
e) Fire
Alarms should be in place as discussed earlier.
Automatic detection of smoke and electrocuting
system should be provided for. In the computer room,
there should be hand held Co 2 and BCF
extinguishers. The personnel should be given
evacuation training in the event of the fire break out.
f) Flooding
Computer labs should never be sited in basements
where they are vulnerable to floods. No water pipes
should be placed under, over or in the computer
rooms. This is because water is likely to destroy
equipment, programs and data in the lab.
g) Power
The computer room should have independent
power supply, stable and adequate with shrouded
panic off button. Problems with power supply come in
three main forms:
(i) Supply interruption – is caused by a number of
factors that include transformer failure, cutting
of supply lines by accident, by people, lightening
and so on.
58
are power supply units that are designed to
adequately cope with any small fluctuations
Problems caused by voltage frequency variations
is generally loss of users in the sense that
terminal links get broken in those parts of a
network whose power is interrupted or destroyed.
So this problem is normally experienced when
computers are networked.
When designing a computer lab, it is important to
have a stand by generator, large batteries or
other uninterrupted power supply (UPS) units so
that in the event of power failure, the data is not
lost, or users disconnected or disk media
damaged etc.
3.6.7 Lighting
The computer lab should have adequate
lighting. This lighting should be large enough to
minimize reflections and glare on the part of the user.
There should also be a provision for emergency
lighting.
60
All these forms of power problems especially supply
interruption and spikes result in damage to disk
heads which often crush when power is suddenly
removed. This will mean loss of data since it will be
hard to read or write to such a disk. Spikes often
result in serious loss of data since RAM being volatile
losses data immediately power supply is cut off.
Disk files also get crumpled when stores are
interrupted by removal of power.
3.7.2 Virus
A virus is a peace of software (program) that
replicates itself without the user intending it or
noticing it. Viruses often affect our computers having
been brought about by hardware/software engineers
who move from one computer to another carrying out
demonstrations or through external infected disks,
which are brought into the lab. Such disks are often
infected with boot sector virus (boot sector is the first
partition of the hard disk/floppy). When it (infected
disk) is put into the drive, it will be loaded into
memory. The disk is now infected since the memory to
which it must be loaded first is now infected.
A virus usually has many effects for example
replication where a virus divides itself repeatedly thus
spoiling the data on the screen/memory/or disk.
Viruses have so many effects they cause to
data/information and to the user. What we need to
note here is simply the fact that viruses will change or
modify the data that was stored to take a different
format that is never useful to the operator.
64
d) Anti Virus Software
Software are available in the market today that
help to disinfect diskettes (disks) and of course the
main memory from the virus infection. Since new
viruses come up often, it is always recommended that
such software installed into your system should be
regularly updated or a newer more powerful one
installed. Such software is often easy to use once
installed.
Examples of such software include: Norton Anti-
virus, Dr. Solomon Anti-virus Tool Kit, F-Prot
Professional etc. Such software will scan and ask the
user to “repair” hard disks and floppies as well as the
boot sector from viruses.
66
this sequence could be altered. This will of course
destroy the data stored in the disk.
3.9 SUMMARY
68
Possible causes of data loss and programs are
the following: power failure, viruses, accidental
erasure, erasing of disks, poor storage and
handling of disks and unauthorized access by
hackers and other intruders.
69
3.10 QUESTIONS
70
CHAPTER 4
OPERATING SYSTEMS
This chapter will introduce the student to what
operating terms are, the functions and types. It will
also serve to explain how disk Operating System (DOS)
organizes information. The student is expected to use
some DOS commands for file and disk management
and be able to list external and internal DOS
commands at the end of the chapter.
71
standardizes the way a computer’s resources are
made available to the user and to applications
software.
KENYA
Fig. 4.4.2
80
(i) /P (Pause) Switch
To see the files with all the relevant information
i.e. filename, filename extension, size and date and
time, then /P switch does the work. The files will be
shown one screen at a time and tests the user to see
the files with instructions to “press any key to
continue…” The format is DIR/P <ENTER>
81
Directory of files with similar names and different
extensions
Suppose your filenames are the same but have
different extensions, all that you need to do is:
DIR Same.*
All files called “Same” will be displayed.
Suppose you decided to identify your files as
Same 1, Same 2 and so on, and therefore you wanted
to only display a filename Same but with specific
extension DBF, you would enter:
DIR Same*.DBF
To see all same files you would enter:
DIR Same*.*
83
To effect the command to remove a directory like
NYALI, ensure you place yourself in MOMBASA
directory first, thus:
CD MOMBASA <ENTER>
RD NYALI <ENTER>
4.6.6 Copying a File
It is often necessary to make a copy of a file. All
important files should always be copied so as to guard
yourself against the loss of data. Data loss often
occurs if you accidentally erase a file, Power goes off
before you save your files, store data under an
incorrect name, do physical damages to a diskette.
When you copy a file to protect against loss of
data we say you are backing up a file. The copy
command requires 2 parameters/arguments to
accomplish the task. It is a resident command.
(i) The first argument is the name of the file to
be copied.
(ii) The second argument is the filename for the
copy. If the file is not on the logged drive,
then drive identification must be included.
84
New file name is not necessary on the target drive
(B:) since it is the same as that of the source drive.
85
This will change all the filename extensions of
all the SAME files to Word Processing Files (WPF). To
rename a file on a different drive, you would do this:
RENAME B: SAME.DBF ZAME.DBF to rename
a file in B:
86
N/B: You could also use the command PRESS CTRL +
P which will sent everything on the CRT to the printer.
To stop printing pre CTRL + P again.
Procedure:
(i) To Format a non system or data disk
Simply enter FORMAT followed by a drive
identification if the new disk is not to be in the logged
drive i.e.
87
FORMAT or FORMAT B:
This command will prompt Dos to load format
program and display the following message:
INSERT NEW DISKETTE FOR DRIVE A: and
strike any key when ready. In the file case or
INSERT NEW DISKETTE FOR DRIVE B: and
strike any key when ready in the second case.
Simply put the new diskette in the indicated
drive and press any key. Dos will display:
Formatting …
After a few minutes, Dos repeats
Formatting……Format Complete
362496 bytes total disk space
362496 bytes available on disk
Format another (Y/N)
Procedure:
The format for DISKCOPY includes two parameters:
(a) Source Drive and
(b) Destination Drive.
To be able to execute the command, enter the
following:
DISKCOPY A:B:
4.8 SUMMARY
91
Disk Management commands are: Copying disks,
labeling disks and formatting disks.
4.9 QUESTIONS
93
BIBLIOGRAPHY
Computing - by Heathcate
IMIS IT 1 Manual
94
95