Form 1 To Form 4 Complete Computer Studies Notes
Form 1 To Form 4 Complete Computer Studies Notes
Education is a key for a country’s development, but it becomes a hindrance when it is unequally
distributed. This big problem of disparity in Education system can be solved through technology.
Hence it’s high time we embrace technology in Education sooner than later.
Teachers will therefore use the book in their laptops to teach and even give students notes to read
online after revision.
The design of this book make it lively and interesting for both teachers and students as it take us
away from the monotony of black and white books. The book is divided into two parts: Theory
and Accounting.
We have past K.CSE questions at the end of every topic for further understanding and testing.
CHAPTER ONE
INTRODUCTION TO COMPUTERS
Specific Objectives
Definition of a Computer
It is an electronic device that transforms data to information.
Data: Raw facts. Information:
Processed data.
A computer system is made up of two parts: Hardware and Software.
Hardware
These are the physical parts of the computer e.g printers, keyboard etc.
Software
These are the programs (sets of instructions) that are used to run the computer e.g.Word
processor, spreadsheet, database, presentation software etc.
Parts of hardware
Hardware consist of three parts as follows.
Input Devices
These are devices that are used to feed the computer with data for processing within.
Examples include: Keyboard, mouse, scanners, digital cameras etc.
Output Devices
These are devices that are used to give out information (processed data) from the
computer to the user. Examples include: Monitors, Plotters, speakers etc. The output
could take any of the following forms:
◦ Soft copy-this is output that is shown on the screen.
◦ Hardcopy-this is information printed on paper e.g. from a plotter, printer.
◦ Machine readable form- this is output that can only be read using the computer
e.g. information stored on disks.
The Central Processing Unit (CPU), motherboard, storage devices and other peripheral
devices.
Peripheral Devices
Devices connected directly or indirectly to the mother board.
Advantages of laptops
Portable
Ruggedness: Designed to withstand travelers
Display active color screen
Power batteries serve as ups
Disadvantages
Less expansion options
They are easily stolen
Classification according Purpose
1. General computers
This computer can do or handle a variety of tasks when loaded with appropriate programs.
2. Special computers
They are designed to serve a specific purpose or to accomplish one particular task.
3. Dedicated Computers
They can handle any task but it is a dedicated to one task.
Development of Computers
First Generation Computers (1940 - 1958)
Used thermionic valves or vacuum tubes
Advantages
Vacuum tubes technology made it possible with advent of electronic digital computers
It was the fastest calculating device that time.
Disadvantages
Too bulky
Unreliable
Had limited memory
Generated a lot of heat
Consumed a lot of power
Examples
IBM 650, UNIAC
Disadvantages
Required air condition for cooling
Required frequent maintenance
It was very expensive
Examples
IBM1401, Honeywall200, CDC1604 e.t.c.
Features of a Computer
Automation: Computers work with minimum human intervention once supplied with
data and instructions.
Accuracy: Computers are ever accurate but entirely depend on the data entered.
Speed: Performs tasks in very short period.
Storage: Computers can store large volumes of data and information.
Versatile: Ability of doing different tasks as per instructions.
Diligence: Work for a long period of time without getting bored
Disadvantages of Computers
Computers are very expensive
Cuts down on employment opportunities
Needs expertise which is expensive to hire and maintain
They create eye problems
Loss of information if not well managed
Areas where Computers are used
1. Supermarkets: Used to keep in stock control i.e. keep accounts of what is in the store,
what has been sold, what is out of stock e.t.c
2. Offices: First access and receiving information, automate faster message distribution
and document processes.
3. Banks: Special cash dispensing machines called Automated Teller Machine (ATM for
cash withdrawal and deposition service. They provide better record keeping and
document
processing.
4. Industries: Monitoring and controlling industrial processes e.g. using robots
5. Hospitals: Keeping patients records for easier access to treatment and diagnosis.
Computerized diagnosis in laboratories.
6. Communication: Sending and receiving emails, teleconferencing, telecommuting,
facsimile and e-calling.
7. Transport: Monitoring automobile traffic, aircraft navigation and making flight reservation.
8. Law enforcement
Biometric analysis- study of human biological characteristics to know fingerprints,
voice and facial features.
Video cameras e.g. in banks.
Development of strong military bases which have international coordination by use
of computer radar.
Jet fighters are computerized with connection to control centres.
9. Education: Computer Aided Learning (CAL) and Computer Aided Teaching (CAT).
10. Domestic and entertainment/ home: used at home for recreation purposes and keeping
budgets.
11. Library services: Easy access and update of books and other library materials.
Advantages of a Computer
Stores large amount of information in a limited space
Speed: performs tasks in very short periods.
Efficiency: creates an all round saving on space and time.
Consistency: gives the same results given the same data and instructions.
Secrecy: information is fairly protected if computer system is well managed.
Versatility: Can do the same thing over and over again without being worn out.
Disadvantages
Computers are very expensive
Cuts down employment opportunities
Needs expertise which is expensive to hire and maintain
They create eye problem
Loss of information if not well managed.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you understand before
going to sleep!
(ii) Program
A computer program is a set of related instructions which specify how data is to be
processed
A set of instructions used to guide a computer through a process
(iv) Information
Data which has been refined summarized & manipulated in the way you want it, or into a
more meaningful form for decision- making
4. Explain the following input/ output terms as used in computer systems. Give an
example for each
(a) Read - To transfer data from an input device to the computer, e.g. the
computer
reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output
Device e.g. the computer writes output on a printer or onto a disk.
- To move or copy data from the main storage to a backing storage
(b) List four devices located under the cover of the system unit
- Central processing Unit (CPU)
- Motherboard
- Power supply unit
- Main memory
- Hard disk
- Disk drives
- Battery
- Buses
- Input/ output ports
- Video card
- Expansion slots
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed on the floor, desktop
units lie on the desk with the monitor placed on top
- Tower style units have more space for expansion than the typical desktop units
(2 mks)
10. State the differences between desktop computers and laptop computers
- Desktop is designed to be used when placed on a desk in an office environment. A laptop
can be used comfortably when placed on the User’s lap
- A laptop is small & portable; desktop computers are not portable
(b) Give two reasons why smaller computers like Laptops tend to be more expensive
than Desktop computers
- The technology of producing smaller devices is expensive
- They are convenient because they are portable
- They have advanced power management capabilities (they consume less power since a
laptop can operate on rechargeable batteries
12. Which category of computers would you place an N- series Nokia phone
- Microcomputer/ palmtop
15. State a specific example where each of the following types of computers can
be used
(a) Supercomputer
- Weather forecasting
- Petroleum research
- Defense and weapon analysis
- Aerodynamic design and simulation
17. Explain four reasons which make microcomputers suitable for personal
computing work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe computers
- Have high processing speed
- Are small in size (occupy less office space)
- Are more energy efficient (i.e. consume less power)
- Are more reliable in doing various functions than the early mainframe computers
- Are versatile (i.e. can be used for many different tasks)
18. (a) Identify and explain five areas where computers are used to process data
( 10 mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold, and what is out of
stock
- For calculating customer’s change
- For production of receipts
- It can be used as a barcode reader
Banks
- Manage financial transactions through the use of special cash dispensing machines called
ATMs used for cash deposit & withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping & processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer games
- For storing personal information/ documents
- For calculating & keeping home budgets
Industries
- To monitor and control industries processes through the use of robots
- For management control, i.e. to keep track of elders, bills and transactions
- For advertisement purposes, which enable an industry to attack more customers
Police stations
- Matching, analyzing & keeping databases of fingerprints
- For taking photographs & other identification details
- For record keeping
- For face recognition, scene monitoring & analysis which help the police carry out
criminal investigations speedily
Transport industry
- Airports; to control the movement of aircrafts, their take off & landing using radar
equipment
- For making reservations (booking purposes)
- Storing flight information
- Automobile traffic control; to monitor vehicle traffic in busy towns
- In Railways corporations; to coordinate the movement of goods & wagons
- In shipping control, for efficient management of fleets, cargo handling & communication
Offices
- For receiving & sending of information through e- mails, fax, etc
- Production of documents
- Keeping of records
21. List down three safety precautions one should observe when entering a
computer laboratory
(3 mks)
- Avoid smoking or exposing computers to dust
- Avoid carrying foods & drinks/ beverages to the computer room
- Avoid unnecessary movements as you may accidentally knock the peripheral devices
- Only authorized people should enter the computer room
- Computers users should be trained on how to use computers frequently
- Computer illiterates should not be allowed to operate the computers
- collect any waste papers which might be lying in the computer room & put them into the
dustbin
- Shut the door of the computer room properly
23. Explain why smoke and Dust particles are harmful to a computer
- Dust and smoke particles settle on storage devices and may scratch them during read/
write operation
- It affects the cooling of the computer
24. Identify three facilities that will ensure proper ventilation in a room
- Large & enough windows and doors
- Installing fans
- Installing air conditioning system
- Avoid overcrowding of either machines or people in the room
25. Why must foods and beverages be kept out of the computer room?
- Food particles may fall into the moving parts of the computer and damage them. Liquids
may spill into the computer parts causing rusting or electrical faults
26. Why would it not be good to install Powder or Water – based fire
extinguishers in the computer room?
- Powder particles settle on storage devices and may scratch them during read/ write
operation
- Water causes rustling of metallic parts and short – circuits if used
27. (a) State one reason why a computer needs to be connected to a stable
power supply (1 mk)
- To prevent damage to the computer’s secondary storage media
- To avoid damage and loss of important data or information such as application software
stored on the media
- Prevent loss of data/ information that had not been saved before the failure
(b) List down four functions of the uninterruptible Power Supply (UPS) (4
mks)
- It prevents sudden power surges that might destroy the computer
- It supplies power to the Computer during blackouts and brownouts
- It provides stable (clean) power supply
- Alerts the user of power loss (by beeping)
- Allows the user to save his/ her work, and switch off the system using the correct
procedure
28. Mention two things that are likely to cause strain- in the computer room
- Poor lighting of the room
- Bright monitors
- Flickering monitors
- Very bright wall paints reflect too much light
29. Identify three proper sitting postures while using the computer
- Adopt relaxed and straight back position to avoid bending forward or learning far
backwards
- The feet should be firmly placed flat on the floor
- The seat must be high enough allowing the eyes to be the same level with the top
of the
Screen
- The seat must have a straight backrest that allows someone to sit upright. This prevents
muscle pains & backaches caused by poor sitting posture
- The height of the chair or working surface must be high enough such that your forearms
are parallel with the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on the
peripheral devices comfortably.
30. State two methods of minimizing dust in a computer laboratory
- Fit the computer room with special curtains to reduce entry of dust particles
- Cover the floor with carpets in order to absorb dust
- Regular cleaning of the laboratory
- Cover the computer devices with dust covers when cleaning the room
31. Name two main causes of fire in the computer laboratory and give the
precautions that should be taken to guard against them
- Inflammable chemical such as those used to clean the computer equipment
Keep the chemicals away in store after use
- Open wires/ cables
- Ensure that all electrical wires are properly insulated
- Ensure that the computer room has a gaseous fire extinguisher containing carbon dioxide
in case of any accidents
- Smocking
33. List three things that can spoil a printer if they are not of the correct
specification, and explain what damage may be caused
(i) Printer Paper: Different printers have different sensitivity to printing papers. Using the
wrong quality paper in a particular printer can make the paper get stuck
(ii) Cartridges & Ribbons: Printers are very specific to manufacture’s cartridges &
ribbons
Use of clones or imitations ( i.e., the wrong make & model) can damage the printer
mechanism
(iii) Refilling of cartridges or re- inking of ribbons: It can spoil the printer due to
leakage or use of poor quality materials
34. Explain three ways that computer technology could make office more
efficient (3 mks)
- There is easier & faster retrieval of data, i.e. they reduce the time and effort needed to
access and retrieve information
- Increased accuracy of data
- Better presentation of data
- Ensure faster processing of data
- Ensures economic use of storage space
35. (a) Explain the steps you would follow to set up a new computer
- Gently and carefully connect the interface cable of each device to the correct port and to
the device.
- Connect the computer to the source of power and switch it on.
- Observe boot up information on the screen to see whether Power-On Self Test (POST)
displays any error message. A successful boot means that the computer was properly setup.
(b) Outline three reasons why it is important to first shut down the computer before
turning it off
- To avoid damaging storage devices that may still be in use
- To avoid damaging system and application files
- To avoid loss of data and information ( 3 mks)
36. A computer must go through the process of booting/ initialization before use
(a) Briefly explain the term “computer booting”.
Booting refers to the starting up of a computer. It is the entire process that makes the
computer ready for use.
(b) Explain what happens in the computer during the booting process
When the power is switched on, internally, it first checks whether all the components are in
good working condition, i.e. the RAM, CMOS (BIOS), hard disk & floppy disk drive
controllers, and the keyboard. If no problem is found, it then loads the operating systems
(b) List four types of keys found on a computer keyboard, giving an example of each
( 4 mks)
- Function/ command keys (F1- F12)
- Alphanumeric Keys (A-Z, 0-9)
- Numeric keypad (0-9)
- Cursor control keys (PgUp, PgDn, Home, end, Arrow keys)
- Special PC keys (Ctrl, Shift, Alt, Ins, Enter, Spacebar, Caps lock,
Num lock, etc)
- Editing keys (Del, Backspace, and spacebar)
(c) Name the keyboard keys that will help you: (2 mks)
(i) Type the upper character in a key - SHIFT Key
(ii) Execute a selected command - ENTER Key
CHAPTER TWO
COMPUTER SYSTEM
Specific Objectives
Content
a.) Description of a computer system
b.) Functional organization of the elements of a computer system
• Hardware
• Software
• Live-ware
c.) Input devices e.g.
• Keying devices
• Pointing devices
• Scanning devices
• Speech recognition devices
• Other digital devices
d.) Central Processing Unit (CPU)
• Control Unit
• Arithmetic and Logic Unit (ALU)
• Memory
• Processors
(i) types
(ii) clock speeds
e.) Output Device
- Hardware considerations
Introduction
Definition of computer system
Collection of entities that work together to process and manage data to information.
Main memory
It forms an integral element of the processor. It’s tasks are;
Holds data awaiting processing
Holds data being processed
Holds data that has been processed awaiting to be output
Characteristics of ROM
The content cannot be changed unless written in a special type.
Non-volatile: data cannot be lost when the computer is switched off.
Characteristics of RAM
Information can be accessed at any time (random)
Data can be changed
Special Purpose in RAM
1. Buffers: They provide temporary storage for finished tasks so that the CPU is set free
to carry out other activities instead of waiting for all data to be entered in information to
be output.
2. Registers: They hold a piece of data at a time and they are inside the CPU. Examples
a)An accumulator: temporarily holds the result of the last step of the Arithmetic
and
Logic Unit.
b) An address register: Temporarily holds the next piece of data waiting to
be processed.
c)Instruction register: Temporarily holds an instruction just before it is
interrupted into a form that the CPU can understand.
d) Storage register: It temporary holds a piece of data that is on its way to and from
the CPU and the main memory.
Cache Memory
It helps the processor to access data and instructions faster due to incorporation of small high-
speed type of Static RAM than it would have taken to fasten it from the relatively slow
Dynamic RAM.
Input Devices
Devices that accept data from external environment and encode it into a form understandable to
the computer for processing.
Keying devices
1. Traditional Keyboard
2. Flexible keyboard: can be folded
3. Ergonomic Keyboard: designed to provide comfort and allocate wrist strain.
4. Keypad: Miniature keyboard used in PDAs, laptops and mobile phones.
5. Braille keyboard: designed for the blind.
Pointing devices
Mouse
1. Standard mouse: has a ball underneath, two buttons and optical scroll button located
between left and right buttons.
2. Optical mouse
3. Cordless/ wireless mouse: battery powered mouse that uses radio or infrared
waves instead of being physically connected to the system unit
Trackball
It’s advantage over mouse is that it neither requires an extra space nor a flat surface for
movement.
Joystic
An input device like a car gear that can be moved sideways, upwards or downwards to control
the
position of the cursor.
Speech Recognition/ Voice input: This is where microphone is used to enter data/information
or spoken words into a computer. Situations for speech recorgnition:
Where hands are busy handling documents
Due to movement
Disability e.g. blind without hands
Uses
i. Electronic fund transfer vi. Automated
ii. House/ car security i.e. voice material
activated locks handling
iii. Offer security for room access
iv. Voice activated toys and scanners
v. Quality control and automation in vii. ComputerAid
factories Design
Limitations
i. Existence of homophones
ii. Word separation is
difficult
iii. Slow recognition
iv. Speaker variability
v. It is still at the early stage
of development
vi. Limited vocabularies
Outputs Devices
Devices that accept information from internal environment and then decodes it in a form
understandable to user
Types
a) Monochrome- Display images and text in only one colour
b) Color- Display in multiple colours
Printers
How printers are classified
a) Speed
b) How the produce the print; character, line or page printers
c) How they provide prints on the stationery; impact or non-impact printers
Types
a) Impact printers: Dot matrix, daisy wheel, golf ball and chain printers.
b) Non-impact printers: Thermal, inkjet, electrostatic and laser printers
Impact Non-impact
Slow Fast
Use ink ribbon Thermal/electrostatic principle
Cheaper Costly due to technology involved
Noisy Quiet
Multiple copies produce is Multiple copies produce almost
possible impossible
Printers Consideration
1. Printers initial price, subsequent maintenance cost and cost of consumable items.
2. Volume of printing expected.
3. Nature of report to be generated.
4. Range of capability for the selected printer.
5. Interface with computer at hand on for family particular make.
Plotters
They are used to produce graphical output e.g. maps and diagrams.
1. Flatbed plotters: Has a flat surface which the stationery is placed for the pen to be
moving over it in all directions to produce graphical output.
2. Drum plotters: Has a drum onto which stationery is placed for the drawing to be
possible.
plotter: Produces big charts e.g. maps, pictures and drawings. Used for printing
geographical, architectural and engineering drawings e.g. maps, advertisements posters to
be placed on bill boards, machinery parts etc.
Computer Bus
Communication medium within a computer that allow different elements of the
computer to communicate with one another.
1. Address bus: Pathway used to locate storage position in memory for the data to
be executed.
2. Data bus: Pathway where the actual data transfer takes place.
3. Control bus: Pathway for all timings and controlling functions sent by the control
unit to the parts of the system
Auxiliary/secondary storage
Factors to consider when choosing a storage device
Volume of data to be stored
The cost
The quantity or size of data it can hold
Magnetic Tapes
These are sequential access devices. Implies that information is at the end of tape the
program will have to read almost entire tape which may take time to read. Data recorded as
series of magnetic dots across tracks on the tape cassette when characters are stored serially
down the length of the tape.
Sequential access medium: Data is stored across magnetic tape
Serial access medium: data is stored along the media
Advantages Slow since they are
Light and easy to carry sequential access media
Effective for batch Gaps between (called Inter
applications since they are Record
cheaper Gap, IRG) waste storage
Disadvantages space.
Magnetic Disks
Floppy Disks (Diskettes)
Information is recorded on number of concentric circles called tracks. Tracks are divided
into sectors. Sectors and tracks have same storage capacity because inner tracks have a
high density. Diskettes are direct access storage medium (DASM) and access time is made
up of 3 parameters.
1. Seek time: Time taken by the read/write (R/W) head to locate right track that
contains content.
2. Rotational delay time: Time taken by drive mortar to spin the diskette past R/W head.
3. Data transfer time: Time taken by the R/W head to interpret content and send it
ascomputer input.
Advantages
1. Exchangeable and easy to carry
Disadvantages
1. Slower than hard disk
2. Less storage capacity
3. Damaged by light, magnet and dirt
Zip Disks
Come with portable external drive and are slightly large and thicker in size and has a capacity of
up to 250MB
Jaz Disks
Come with portable external drive and have a capacity of 1GB to 2GB and have high access
speeds.
e.) Keep them away from dust, moisture and high humidity.
Optical Tapes
They resemble magnetic tapes but they use optical technology
Hard disk
Advantages
1. They offer cheap storage
2. They are well protected since they are housed in the CPU
3. Fast in terms of access retrieval and saving of data
Care for the Hard disk
a) Keep them away from smoke and dust.
b) Use the right procedure to switch of the computer to allow the R/W head to move
from the disk surface to avoid scratching on rotating surface
c) Exposure to magnetic property
Minimal Requirements for a multimedia computer
A Video Graphic Array (VGA)/ Super Video Graphic Array (SVGA) card and monitor.
A sound card
128MB RAM or higher
CD or DVD drive
FM/TV card
Ports
Power and Interface Cables
Power cables are used to connect the computer to main power outlet.
Interface cables connect all peripherals to the motherboard and transmit data signals.
Power supply unit supplies power to motherboard and other internal device
2. Serial ports: They transmit one bit at a time. They are slower than parallel ports but they
support two way communications. They are 25 pin and 9 pin. COM 1 and COM2. Used by the
serial printers.
4. Small Computer System Interface (SCSI) - Use parallel method but faster than parallel
cables. The port connects up to 8 peripheral devices.
-pin-D: monitors
Utility Software
A special program that performs commonly used services that make certain computing aspects
go on smoothly e.g. sorting, copying, disk management etc. There are two types:
1. System level: Help user to work with the operating system and its function. It tells
whether the command entered is wrong and give suggestion on how the error can be
corrected.
2. Application level: Make use of an application program smoother and efficiently.
Functions of utility software
Reporting of errors which occur during program execution
Control input and output devices
Protest use hardware and data from misuse
Provide program testing routines
Provides communication between computer user and each program
Memory management
Maintenance of internal time clock and log of system usage by all users.
Network software
Establish communication between two or more computers by linking them using a
communication channel like cables to create a computer network e.g. Novell Netware
Internet Software
Used in communication and perusing the internet.
Programming Software
Used to create programs that behave like software
Classification according to Acquisition
1. In-house developed programs/ Custom design programs
They are designed to meet the needs of a specific user or organization
Hardware Considerations
a) Processing speed: For faster data processing the speed of the processor
must be relatively high.
b) Memory capacity: At least 128MB RAM. There are also factors to be considered
when buying a memory module-The type of module supported by motherboard
-Whether there is an empty slot on the motherboard
-Compatibility of the module with the existing one
-Module capacity
c) Warranty: Arrangement between the buyer and the seller whereby incase the
product fails during the agreed period of time it is taken care by the seller free of
charge or for an agreed fee. Things to consider in a warranty –The scope of cover
-Call out response and liability agreement
-Regular preventive maintenance
d) Cost: The cost is determined by the processor, size, and the memory capacity.
e) Upgradability and compatibility: Whether the hardware chosen can be easily
upgraded to accommodate emergent technologies.
f) User’s needs: Can it meet the unique needs like for the disabled?
g) Monitor: Always consider the size, resolution and the technology involved.
h) Multimedia capability: It should have speakers, CD/DVD drive, sound card, VGA or
SVGA card.
Software Requirements
a) Authenticity: Always consider genuine, valid and legitimacy and developers license.
b) Documentation: Manual from the developers that guide the user on installation,
usage and maintenance. –User guides
-License
-Manual guide
-Installation process
-Quick reference
-Warranty
c) Reliability and security: Consider whether the software offers good security
to confidential and private information.
d) User friendliness: How easily the user can interact with the software.
e) Compatibility and system configuration: Consider whether the software can work
with the computer at hand.
f) Cost: Always consider the cost and whether it serves the purpose.
g) Users’ needs: The purpose of the software.
h) Portability: Consider whether it can be installed in different computers.
End of topic
(i) System
A collection of independent entities that collectively work together to achieve a desired goal
A collection of hardware software and live- ware all working together in data
inputting, processing and production of required output from a computer
2. Differentiate between a computer and a computer system
A computer is made up of both hardware and software, while a computer system integrates
hardware, software and user
3. (a) List and explain three functional elements of a computer system (6
mks)
Hardware
They are the physical & tangible devices that make up a computer systems, e.g system unit, input
devices, output devices and storage devices
Software
These are programs & data used in a computer system that enable it perform a number of
specific functions, e.g. operating systems, application programs, utility programs, programming
languages & device drives
(b) Draw a well – labeled diagram showing the functional units of computer
hardware
4.
(a)
Give two main functions of a computer input device. (2 marks)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e., machine-
Sensible/readable form)
- Scanner,
- Digital cameras,
- Barcode readers.
Keying device.
- Keyboard,
- Keypad.
Pointing device.
- Mouse.
- Trackball.
- Light pen
- Joystick.
- Microphone.
Printing device.
- Printer.
- Plotter.
- It is a faster input device because it involves just pointing on the screen and selecting options.
These are devices that enter (capture) data into the computer directly.
(i). To capture prices of goods at points of sale terminals in supermarkets and superstores.
Barcode reader
8. Mr. Otieno a French teacher used speech method to store students oral answers to
an exam into a computer
It is a type of input where a microphone connected to a computer system is used to enter data in
form of spoken words into the computer
(b) State two advantages and two disadvantages of using this method of data input
(4 mks)
Advantages
- Its suitable for people with special needs especially those with
impaired hands
Disadvantages
- Voice input does not take care speech related problems such as accents, tone etc
- Most speech input devices can recognize a limited, standard vocabulary of spoken words,
and the voice of only one speaker
- Emergency situations
- In automated materials handling e.g. in airports, a good handlers give spoken commands
that direct the luggage to the appropriate conveyor belt.
- For house/ office or car security where voice activated locks are used for access control
9. Name two examples of scanning (data capture) devices used at point of scale
terminals in supermarkets
- Barcode reader
- Light pen
- Cash registers
These are documents produced as output and which can be re-used as input by the
computer
(b) Name any two data capture techniques that make use of turnaround documents
( 2 mks)
11. List five factors one would consider when selecting a data input device (4 mks)
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the device on a day – to – day
basis.
- Accuracy required
- Availability of space
(ii) System control- it controls the sequence of operations within the computer
(iv) It controls the use of the Main Memory in storing of data & instructions
(v) Storage of data- It provides temporary storage (RAM) & permanent storage
(ROM)
13. Explain the functions performed by each of the following central processing unit
elements
- Interpreting instructions
- Issuing control instructions to the operating system
(iii) Registers
- Holds data and instructions temporarily just before and after processing
14. In reference to ALU, explain the meaning of logic operations and give an example of
this processing operation
Logic operation is the ability to compare two quantities or numbers to determine which is greater
than, less than, equal to, or not equal to the other.
It also involves the testing for existing of a condition encountered during the processing of an
application & altering the sequence of instructions accordingly.
15. Give four types of registers found in the CPU
- Accumulator
- Instruction
- Address register
- Storage register
16. (a) Name the basic unit used to measure the processing speed of a computer ( 1
mk)
Hertz (Hz)
(i) 1. Nanosecond
1 1__________
(ii) 1. Microsecond
1 = 1________
A communication path/ medium within the computer that connects the basic
computer components. It allows different elements or sections of the computer to
communicate with each other.
A parallel collection of conditions that carry data & control signals from one element
to another
b. State the functions of each of the following computer bus ( 3 mks)
Data bus- carries data from the processor to memory during the write operations and
from memory to the processor during the read operations
Address bus- it conveys addresses, i.e it carries the address of the memory location or
device to be acted on by the processor
Control bus- it carries the timing & control signals necessary to coordinate the
activities of the entire system
This is the electronic board where all electronic components such as processor, memory chips,
BIOS, bus connections etc are assembled
- Processor (CPU)
- SIMM/DDR sockets
- Memory chips
- BIOS
- Interface chips
- Buses
A drive is a computer device for reading data from or writing data into a storage media, e.g. a
tape or disk
(b) State any two types of computer drives, giving an example of a storage device used by
each ( 3 mks)
20. (a) Give two reasons why there are many forms of computer storage devices ( 2
mks)
- Permanency of storage
- Cost of implication
- Magnetic tape
- Floppy disk
- Cassette tapes
- Hard disk
- Zip disks
- Jazz disks
- Flash disks
- Punched cards
- Optical discs (e.g., Compact Disks LS- 120 super disks, optical card, optical tape)
Primary storage devices are accessed directly by the CPU, while secondary
storage is not
(ii) Fixed and removable disks
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g. floppy disk, Jazz disk,
Zip disk, flash disk, CD- R, CD – RW, DVD
A high capacity plug-in portable storage device. Usually attached at the USB port of the
computer
High capacity disk that resembles a floppy disk, but is slightly larger and thicker
in size
23. (a) Compare a floppy disk and zip disk in relation to size ( 2 mks)
A floppy disk is physically small in size and capacity, while a zip disk is slightly large in size
and has large storage capacity.
- Not reliable
24. (a) State three advantages of using hard disks as medium of storage
- Are very fast compared to other secondary storage devices in terms of data
transfer
(b) Describe three precautions you would take to avoid damaging the hard disk (
3mks)
(c) Describe the structure of a hard disk in reference to cylinders, tracks and
sectors
The surface of hard disk is divided into circles called Tracks. Parallel tracks on several platters
are called cylinders
The tracks are further subdivided into sectors. Several sectors can be grouped to form clusters.
25. State two reasons why Magnetic tapes are not commonly used as computer data
storage medium today
- Are slow when retrieving data. This is because of the linear storage of data o the
tape.
- Do not fully use their recording surface due to inter- record Gaps
A microcomputer is a computer whose Central Processing Unit (CPU) has been implemented
with a microprocessor
A microprocessor is a small computer processor, mainly a combination of the ALU & CU
manufactured on a single chip.
RAM is a temporary and rewritable memory, while ROM is a permanent and read only memory.
Hard disk is a hard metallic platter used to store data and is encased in a metallic housing
(casing)
In magnetic storage media, data is recorded using magnesium, while in optical storage media
data is recorded using a beam of light (laser)
Hardcopy is printed copy, e.g. printout on paper such as letters while softcopy is intangible
information e.g. screen display or music.
MICR uses magnetic technology to read magnetic characters, while OCR uses laser/ light
technology to read characters
- Store the media in their cases when not in use in order to protect/ safeguard their
recording surfaces against environmental influences such as dust, touch, direct sunlight,
radiations, etc
- Never bring them near moving or strong magnetic bodies. Such bodies might
demagnetize the recording surfaces making recording in terms of magnetism impossible
- When mounting the media into its reading/ writing unit, avoid brushing the recording
surfaces against the mechanical components of the drive
- Put on the power before mounting the media and off after removing the media from the
drive.
28. (a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per
surface, and 512 bytes per sectors
= 12 sectors
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided into 9
sectors of 512 bytes each. What is the total capacity of the disk in megabytes? ( 2mks)
368, 640
1,048, 576
= 0.352 MB
( 3 mks)
1. Used for holding data & 1. Used for storing backup information
instructions required immediately that is not needed immediately by the
by the CPU CPU.
6. It is volatile & therefore it is used E.g. punched cards, magnetic tapes, floppy
to store temporary programs & data disks, hard disks, etc
It stores Firmware (bootstrap instructions) - the essential files the computer uses
while booting/ starting up.
It stores the system data & instructions that are necessary for the normal
functioning of the computer hardware e.g. the Kernel / supervisor of the OS
It can only be read, but cannot be written to (i.e., the user can only read the
information in the ROM, but cannot write on it unless it is a special type of
ROM).
Forms a small proportion of the main storage (i.e. it contributes 30% of the
internal Memory).
- Masked ROM
- Stores data & programs temporarily during the times when they are needed in the Main
Memory (or during execution).
- Provides “read & write facilities” i.e. it allows instructions to be written, read out & to be
changed at will.
- The contents in RAM are user – defined, i.e. the user dictates what is to be contained in
the RAM
- It is a volatile memory
(b) Name the two types of RAM clearly starting their differences (3 mks)
- Dynamic RAM can only hold its content for a short while even when power is
on.Therefore, in order to maintain its content/ data, a DRAM must undergo the refreshing
process (i.e. it must be re- written continually)
- SRAM chips are physically large & much more expensive than DRAM chips
- Dynamic RAM has a much higher packing density than SRAM, i.e., a DRAM chip is
able to store more information than a SRAM chip of the same size.
Flash Disk
(ii) List down two advantages of this device over a floppy disk in storage ( 2 mks)
- Optical card
- Optical tape
(b) Give two advantages of a digital Versatile Disk over a normal Compact disk
- Softcopy
- Hardcopy
- Monitors
- Printers
- Plotters
- Sound cards
- Digital projectors
- Storage devices
- Convert the coded results produced by the computer to human- readable form
- Used to display the results of all the data that has been processed from the
computer
- It converts machine- coded outputs results from the processor into a form that can be
understood by people
(b) Show two differences between a CRT monitor and a flat- panel display
- CRT monitor uses a cathode ray tube to display information, while a flat panel
does
not.
- Flat panel displays are light & easily portable, while CRT’s are heavy
- CRT can display a wide range of colours, while a flat panel displays a limited
number of colours
- The screen of a flat panel is much thinner & smaller than that of a CRT
- The screen resolution of a CRT is adjustable, while that of a flat panel is often set
(c) Give there examples of flat- panel monitors available in the market today
- Gas plasma
Pixels (picture elements) are dots on the screen that form characters and images
(c) Give two advantages of the higher number of pixels per square centimeter (2
mks)
Are usually low- speed printers that print one character at a time?
- Dot matrix
- Thermal
- Daisy wheel
- Inkjet
- Golf ball
38. Distinguish between impact and non impact printers and give two examples of each
Impact printers print by striking mechanism & are noisy, e.g Dot matrix, Daisy wheel, and Golf
Ball, drum and chain printer.
Non- impact printers print either by laser, ink or thermal transfer mechanism & are silent, e.g.
Laser, Inkjet, thermal printer, electrostatic and xerographic
A page printer prints documents page by page, while a line printer prints documents line by line
- Economical in maintenance
- It is very silent
40. Highlight four factors one should consider when purchasing a printer (4 mks)
- Cost involved i.e. the printer’s buying price, cost of maintenance & cost of consumable
items like printing papers, ribbons/ cartridges
- Capability of the selected printer, i.e. multiple copy production, paper size, etc
- Ease of maintenance
- Documentation
- Availability
- Produces large graphical designs of high quality, which are east to read & use
- Can print on large sized papers, e.g. papers e.g. Al, Which a normal printer cannot
- One can receive the output even when a few meters away from the computer
- Errors are easily corrected, e.g. if used in a camera, one know when the film or
exposure is set wrongly.
43. George connected new multimedia speakers to his computer and tried to play his
favorite music CD, but no sound came out. Suggest two problems that might have occurred
( 2 mks)
- Lack of analogue cable connecting the optical drive to the motherboard or sound
card
(a) Port
A special kind of socket found at the back of a computer used to connect an external peripheral
device such as a printer, monitor, mouse, scanner, modem, flash disk, etc to the interface cards
inside the computer
These are special cables that connect all the peripheral devices to the motherboard and the CPU.
They transmit data signals and information to and from the devices
46. State the function of the power supply unit found in the system unit (1 mk)
- Converts the potentially dangerous alternating current (AC) into a steady low- voltage
direct current (DC) usable by the computer.
47. (a) Name any two peripheral devices which get their power supply through ports
- Keyboard
- Mouse
(b) State the type of port that would commonly be used to connect the following
devices
48. (a) Explain two differences between serial and parallel communication ports of a
computer
- Serial ports have 9 pins, while parallel ports have holes for 9 or 25 pins
- Parallel cables transmit several bits of data simultaneously, while serial cables
transmit
- Serial cables allow for 2 ways communication (i.e. communication to and from the
computer and the device connected to it) while parallel cables usually offer 1- way
communication.
(b) Give two major advantages of a USB interface cable over other cables in the computer
- The USB port can be used to connect a wide range of peripheral devices due to its
common universal interface
49. Outline three precautions one should take when assembling a computer
- Disconnect all diverts from the power source before starting to work on them
- Never work alone because you may need help in ease of energy
- Discharge ant static electricity that might have built up on the hands by touching an
earthed metallic object and wearing an anti- static wrist member.
50. State six factors which you would consider when selecting computer hardware for
an organization
- User needs
- Multimedia capability
51. List down any four hardware components you can add or upgrade in a computer
system
(4 mks)
- Processor (CPU)
- RAM memory
- Expansion slots
A warranty is an agreement between the buyer and the seller that spells out terms and conditions
of after selling a product in case of failure or malfunction.
A warranty is usually the duration in which your computer is supposed to work without any
problem.
(b) Why is it important to carefully study a warranty before committing yourself by signing
it?
In order to negotiate on sensitive items like duration, after sales services etc.
- How comprehensive is the warranty- good warranty should cover all the parts of
the Computer.
- Liability agreement e.g. how long should the supplier take to repair a fault or replace the
product, and if he/ she delays, who bears the cost.
53. What are clones with reference to computers and what is their disadvantage?
- They are not as reliable as their brand names like IBM, Compaq, Hewlett Packard (HP),
Dell, Gateway etc.
These are programs that are uniquely designed & written by the user or a software house under
contract, to meet the specific needs of a particular user or organization.
They are usually customized (tailored) to perform a specific job or solve only specific processing
tasks in one organization
(ii) Give two reasons that may be influencing these organizations for such a decision
( 2 mks)
- The user gets well tested program, which he/ she is able to use with confidence
- The program provides all the facilities required to solve a particular problem
- The purchaser has direct control over the package, as he/ she is involved in its
Production
- The user is able to quickly implement the results obtained from the use of the
package
- They can easily be modified to meet specific user’s needs without involving expert
programmers.
- Single – purpose software is developed for only one purpose, while integrated software is
a suite of more than one program and can be used to carry out a variety of tasks
(i) Authenticity
It is the genuineness, validity or legitimacy of software. The copy of the software you buy should
be accompanied by the license and certificate of authenticity of the developer.
(ii) Portability
It refers to whether a program can be copied or installed in more than one computer
In hardware, the computer device should be sufficiently small & light to carry
In software, portability refers to whether a program can be copied from one computer to another
or installed in more than one computer.
58. (a) Explain why documentation is necessary for any software package
It contains details on how to install use and maintain the software. It also shows the purchaser
how the program can be used to solve particular problem as well as provide the user with
assistance on using the program.
(b) A firm intends to purchase new software. List three items of documentation that should
accompany the software
- A license
- Installation guide
- Reference manual
- Warranty
- Upgrades
- Service pack
CHAPTER THREE
OPERATING SYSTEM
Specific Objectives
• Number of tasks
i) single tasking
ii) multi tasking
• Interface
i) command line
ii) menu driven interface
iii) Graphical user interface (GUI)
• Functions of files
i) storage of data
ii) organization of information
• Creating files
• Manipulating files
i) Viewing files and directories
ii) Organization of information
iii) Creating files/directories
iv) Opening
v) Editing
vi) Renaming
vii) finding/searching
viii) sorting
ix) Copying
x) Moving
xi) Deleting
f.) Disk Management using an operating system
• Formatting
• Partitioning
• Defragmentation
• Disk diagnostics/Disk compression
• Back up
Application packages
Introduction
Definition of Operating System
A set of complex programs that work together to control execution of user programs
called applications.
Examples:
MS Windows, UNIX, LINUX, Macintosh (Mac OS) and OS/2.
- Loads application programs from an external storage into the available locations in the
Main memory (RAM)
- It keeps track (monitors) of the parts of the memory that are in use, and those which are
free
It schedules & loads programs in order to provide a continuous sequence of processing. This is
necessary when more than one application program is occupying the main storage
In a multi- taking system where several user programs share the computer resources, the
processing is done according to the job priorities allocated and in a continuous process until all
the jobs in the queue within the memory are executed. This ensures that the CPU does not
remain idle at any given time.
The OS controls the allocation of I/O devices and tries to resolve any conflicts that arise. It also
monitors the state of each I/O device and signals any faults detected
OS is concerned with the logical organization of the files in the computer & provides ways for
sorting, retrieving & sharing of the files
It also provides a means of protecting the data files & programs against unauthorized access and
corruption.
It controls the selection & operation of the hardware devices used for input, output & storage
It interfaces the user to the system’s hardware, i.e. it provides a quick means of communication
between the computer user and his programs
The OS keeps records (internal logs) on how the computer resources (e.g. CPU time, memory,
peripherals) are being used
It also keeps a complete record of all what happens during processing (usually in the form of a
printed log)
Resources under the Operating System
Processor: The operating system arranges all tasks accordingly to prioritize and
decides which task to continue and which task to stop.
Main memory: The operating system determines which task to remain in memory for
execution and what to send back to backing storage to wait.
Input Output devices and ports: It controls the input of the data and output of
information.
Secondary storage device: The operating system manages the storage (saving) and the
retrieval of data and information in storage devices. It utilizes hard disk space by
holding take not need currently by the RAM.
Communication devices and ports: Operating system controls the exchange of data and
information.
Types of files
System files: files that contain information required for the operation of the computer
Application files: Files that hold programs or start an application.
File Extensions
Importance
Examples
DAT- data
TXT- text
DOC- document
XLS- excel
SYS- system files COM-
command file BAK-
back up
PPT- PowerPoint
BAT- batch file
Folder/ directory: A named storage area created for storing files for easy access.
Subfolder: divided folder
Windows desktop: This is the first screen after successful booting.
Desktop Elements
Icons: This is the graphical/ pictorial representation of items.
Taskbar: It allows the user to switch between different files and
programs. Start button: It displays the start menu.
Task manager: Display buttons of the current running tasks.
System tray: Has icons of tasks running in the background but not displayed on the screen.
Restore/ maximize: It stretches a window to cover the entire screen or return to the
original screen. Close button: Exits the document but not the application.
Menu bar: provides a list of commands inform of
buttons. Toolbar: represents shortcuts to menu
commands.
Work area/ document window: Where data is being entered.
Disk management
Formatting: Preparing a disk for use by imprinting tracks and sectors.
Scanning: -scanning for virus
-scanning for errors: SCANDISK: Check up for minor storage problems e.g. lost storage location
or damaged surface
Defragmenting: Re-arranging scattered folders to speed up access and retrieval.
Compressing: Squeezing disk contents to free space on the media.
Backing up data: Creating duplicate copies of data on separate storage device for security
purposes.
Boot up (start-up)/ system disk: System disk created to start the system in case the components
of starting up fail or when the hard disk is seriously damaged. The booting instructions are
copied on the disk.
Portioning: Subdividing a large physical disk into two or more partions called logical drives.
Reasons for disk partioning:
End of topic
2. Name the two latest operating systems from Microsoft corporation(2 mks)
- Windows XP
- Windows Vista
4. What is an interrupt?
An interrupt is break from the normal sequential flow of instructions processing in a program
6. Giving an example in each case, explain the following types of operating systems
(a) Single – user / single tasking
A system that allows only one user to run one user program at a time in an interactive, conversational
mode. E.g. Ms- DOS, PC- DOS.
7. A computer user may interact with a computer either through Graphical User
Interface (GUI) or though typed commands
(a) Give one advantage of using GUI based operating system over a command line interface
( 1 mk)
User friendliness
Easy to learn & use even by those who do not have much knowledge about them
One does not need to master any commands
It is faster to work with than a command line interface as it only relies on clicking the
icons by use of a pointing device
(b) Some computer systems still use command line interfaces. State two advantages of command
line interface
- They are more flexible than menu- driven interfaces
- There is security of data as only those who know how to use the commands will access it.
- They use cheap hardware & software facilities
- One has a better control over the system resources
(b) Window
A rectangular area on a computer screen in which text, graphical images or the contents of a folder or disk
may be displaced
(c) Icon
A little picture on the computer screen representing a program, disk file folder or any other item
(d) Sidekick menu
A submenu that appears either on the right or left of a main menu
(e) Taskbar
A long bar/ strip that runs across the desktop and displays the start button and any other active tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running program
(3 mks)
12. Identify three factors you would consider when choosing an operating system for use in
a computer ( 3 mks)
(i) Hardware configuration of the computer, e.g. RAM memory size, Hard disk capacity, type of
processor, etc
(ii) Basic design of the computer – It is an IBM compatible, or apple computer?
(iii) Hardware compatibility
(iv) User (type of work to be done), i.e. the applications intended for the computer
(v) User friendliness or human computer interface, i.e. it is command line based, Menu driven or
graphical user interface?
(vi) Availability in the Markey, e.g. Microsoft Windows based operating systems are very common
(vii) Portability
(viii) Cost- how expensive the OS is
(ix) Reliability, i.e. can it run without crashing (stop responding to commands)?
(x) The method of communicating with the computer, e.g. the number of peripherals
(xi) The method of operating the computer
13. Explain how windows organizes information in reference to files and folders
It stores related data & information records into files, and related files into folders & subfolders
14. (a) Distinguish between systems files and application files ( 2 mks)
System files hold critical system information while application files hold programs data
(b) State the extensions used signifying the following file types (2 mks)
(i) Driver or system file - DLL, SYS, INI
(ii) Batch file – BAT
15. (a) List and explain down the three parts of the windows Taskbar ( 3
mks)
Start button - Provides access to the start menu
Task Manager - Displays buttons of currently running tasks
System tray - displays icons of applications that automatically start and run in the
background
(b) Outline the procedure of renaming a file or folder using windows operating system
(3 mks)
Method 1:
In an explorer window, click the file/ folder you want to rename
Click on file, choose rename
Type the new name, then press enter
Method 2:
In an explorer window, right- click the file/ folder you want to rename
Choose Rename from the shortcut menu that appears
Type the new name, then press Enter
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write down the path of
accessing the Districts. xls file.
A:\SCHOOL\EXAMS\F2\Districts.xls (2 mks)
(ii) Explain two methods you can use in windows to back up data into a storage device
(2 mks)
- Using copy and paste commands on the Edit Menu
- Using the send to command on the file menu
- Using the backup facility to compress the data into another disk
(b) Identify two reasons why a user needs to know the space available for data storage in the hard
disk
- To know the amount of data that can be stored in the hard disk
- To know how much space is left in the hard disk in case a new programs needs to be installed
- To detect the likelihood of a virus infection
20. Name the command one would use to repair cross- linked files in graphical user
interface software ( 1mk)
Scandisk
21. (a) Explain the team Disk Defragmenter, and give two advantages of this feature ( 3
mks)
Disk defragmenter is a tool that is used to re- arrange scattered files & folders on a storage media
Advantages
- Rearranges scattered folders & files on storage media
- Reduces the time by the read / write head to locate files or folders on the storage media this speed
up access to files & folders, hence, makes files to open more quickly
- Consolidates related data close to each other, hence, frees space on the storage media
(b) Give two reasons why the hard disk may be partitioned
- To install more than one operating systems on the same disk
- For the purposes of backup on the same disk, so that if one partition fails the other will still be
working.
24. A Form four computer student is attempting to print a programming documentation. The
printer is not responding to the print command. Explain three possible causes for the anomaly. (3
marks)
- The printer may not be installed.
- The printer may not have been set as the default printer.
- The data interface cable to the printer could be loose. Make sure it is firm at the ports.
- The printer could still be off. Switch it on, and it will start printing.
- The wrong printer could have been selected. Select the right printer in the print dialog box and
send the print job again.
WORD PROCESSORS
Specific Objectives
Content
a.) definition of a word-processor
b.) Purpose of word processing eg
• Letter preparation
• Reports
• Newsletters
c.) Using a Word processing package
• Getting started
• Screen layout
• Running the program
i. Creating a document
ii. Saving
iii. Retrieving
iv. Closing
v. Exiting
d.) Editing and formatting a document
• Editing a document
• Block options
i. Selecting
ii. Moving
iii. Copying
iv. Deleting
v. Inserting and type over
• Proof-reading
i. Spelling and grammar checking
ii. Thesaurus
iii. Auto-correct
iv. Undo and redo
• Formatting a document
a) Text formatting
i) Bolding
ii) Italizing
iii) Underlining
iv) Fonts
v) Drop caps
vi) Change case
vii) Superscript/subscript
b) Paragraph formatting
i) alignment
ii) indenting
iii) spacing
iv) section breaks
v) bullets and numbering
c) Page formatting
Layout
i) columns
ii) headers/footers
Setup
i) Margins
ii) Orientations
iii) Paper size
iv) Tabs
Creating and Editing a Table
• Create a table
i) Rows
ii) Columns
• Enter data
• Editing tables
i) Resizing rows/columns
ii) Inserting rows/columns
iii) Deleting rows/columns
iv) Merging rows/columns
v) Splitting rows/columns
• Formatting tables
i) Borders
ii) shading
• Table conversions
i) Converting text to table
ii) Converting table to text
iii) Importing
• Arithmetic calculations
i) Perform calculation
ii) Insert formulae
• Sorting
e.) Sorting creating and updating a mail merge document
• Creating main document
i) Form letters
ii) Labels
iii) envelopes
• create/import data source
i) editing
ii) saving
• Merging Fields
• Main and data source to
i) Printer or
ii) New window or
iii) Fax or
iv) E-mail
• Updating merged document
f.) Printing a document
i) Printer setup
ii) Print preview
iii) Print option
- printer selection
- orientation
- page and copies
iv) Printing
• Types of graphics
i) Drawing
ii) Pictures
iii) Charts
• Inserting
i) importing
ii) drawing
Hyphenation: The way the word processor detects if the last word on a certain line will fit
if not it adds hyphenation after the first words then part of word in argument is pushed at the
beginning of the next line.
Justification: Position of line according to the centre of the page, left and the right margin.
There are for ways
Full: All lines in a paragraph start at the same point and end at the same point.
Left: All lines in a paragraph start at the same point but end at different point.
Right: All lines in a paragraph start at different points but end at the same point.
Centre: All lines in a paragraph are centered along the page.
Indentation: Way lines(s) start and end from the normal starting or ending point by the
use of Tab key indent tools from format command in the main menu. Ways of indenting;
Indenting a paragraph from the left margin
Indenting the first line of a paragraph from the left margin
Hanging indent
Indenting a paragraph from the right margin
Indenting from both margins
Bolding: Increasing the intensity of text such that when printed it appears darker than normal
text.
Blocking: Separating part of text by highlighting so that any issued command affects the
highlighted text.
Orphan: The last line in the last paragraph of a page that becomes the first line on the next
page after the first page is filled up.
Widow: First line in the last paragraph of a page that becomes the last line on that page
while the other part is moved to the next page after the first page is filled up.
Softcopy: Document that is in computer memory or the screen where changes are applicable.
Soft return: Situation where the cursor automatically moves to the next line before it reaches the
end of the current line.
Hard return: Situation where the user forces the cursor to move to the beginning of the next
new line by pressing the enter key on the keyboard before it reaches the end of the current line.
Soft page: Automatic page ending as per the settings that comes when one page is filled up.
Hard page: Forced page ending before the current page is filled up.
Continuous stationery: Situation where the printer uses rolls of papers therefore one does not
need to keep on inserting a paper after the other.
Preprinted stationery: One needs to insert a paper after the other is printed.
Toggle switch: How word processor behaves depending whether certain keys are on or off like
Insert and the Caps Lock keys.
Paper Orientation
Portrait
Landscape
Editing a Document
Deleting text
There are many ways to accomplish this operation
highlighting the text then right click the highlighted text and choose delete or
press delete key.
Backspace Key: Deletes text on the left side of the cursor position.
Delete key: Deletes text on the right side of the cursor position.
Find and replace: Fast way to search for a word in the document and if necessary
replacing it with another word.
Spelling and grammar: Press F7 or go to Spell checker to correct wrongly spelled words
and incorrect grammar
Thesaurus: Used to search for words with similar meaning (synonyms) or with opposite
meaning (antonyms).
Autocorrect and autotext: Autocorrect automatically corrects wrongly spelled word
during data entry while autotext completes words when the user types in the first letters of
a word.
Undo and Redo: Undo (CTRL+Z) automatically cancels the last action done by the user
while
Redo (CTRL+Y) automatically reverses the last command or action undone by the user.
Formatting Document
Text Formatting
Changing the font type, size and colour
Changing the case
Uppercase: automatically changes the highlighted text into capital letters.
Lowercase: automatically changes the highlighted text into small letters.
Sentence case: automatically makes the fast letter of a sentence to a capital letter.
Toggle case: automatically changes capitalized letters to small letters and vice versa.
Superscript and subscript
Press (CTRL+SHIFT++) for superscript option or (CTRL+=) for subscript option.
Paragraph Formatting
Alignment or Justification
Full: All lines in a paragraph start at the same point and end at the same point.
Left: All lines in a paragraph start at the same point but end at different point.
Right: All lines in a paragraph start at different points but end at the same point.
Centres: All lines in a paragraph are centered along the page.
Line spacing
Tab setting and Indents
Indenting a paragraph from the left margin
Indenting the first line of a paragraph from the left margin
Hanging indent
Indenting a paragraph from the right margin
Indenting from both margins
Drop cap
Formatting the first letter of a paragraph to appear bigger and occupy several lines.
Bullet and numbering column page and column breaks.
The Word 2013 program window, displaying a document and the standard program window
elements.
The Backstage view, where you can manage files and customize the program.
End of topic
4. Explain the difference between overtypes and insert mode in word processing
(2mks)
Type over deletes the current text at cursor position and inserts new text.
Inserting pushes the old text away as new text is inserted at cursor position.
5. Veronica tried to retrieve a document file following all the steps correctly. The
filename did not appear in file list box. State three causes for this.
(3mks)
- The file may not have been saved
- The file may have been deleted
- The file may be located in a different folder from the one she was trying to
retrieve from (or may have been moved).
- The file may have been destroyed by a computer virus.
6. Mwikali selected a paragraph in word processing. Explain what happened after
pressing the following keys on the keyboard: (3mks)
7. Precisely explain the role of the following editing features of a word processor;
(3mks)
i) Find and replace -To find words that you want replaced by others
ii) Undo and redo- Undo reverses the previous/latest action, while redo does
the undone action
iii) Thesaurus -It gives suggestion of words or phrases with similar meaning
(synonyms), and sometimes antonyms to the selected word.
iv) Autocorrect-It checks for wrongly spelled words, and automatically replaces them with
the correct ones as set by the user.
8. Give the steps you would use to find and replace the occurrence of a particular word
in Microsoft Word. (4mks)
- Click on edit, select find (or replace)
- Type the word you want to replace with in the replace with box
- Click replaces or Replace all if you want to replace all the occurrences of that word in
your document at once.
9. Name and explain the use of any three buttons found in a spell-check dialog box
(6mks)
Change: Accepts the current selection in the suggestions box
Ignore Once: Leaves the highlighted error unchanged (if the highlighted
word is a valid word) & finds the next spelling or grammar error
Ignore all: retains all the occurrences of the same word or phrase in the document from
another language, e.g. a Kiswahili.
Add: Adds the highlighted word in the Suggestions box to the Custom dictionary.
10. Clearly explain the meaning of the following terms as used in word processing:
(7mks)
19. Give a reason why it may be necessary to merge cells in a table. (1mk)
To create larger cells in a table without increasing the height or width of the existing cells.
23. Outline any three main features that make word processors popular
programs.
(3mks)
Saving of documents for future reference
Printing of multiple documents after editing
formatting of documents into required form
Mailing features such as mail merging of standard document with another saved
file.
Spreadsheet
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define a spreadsheet;
b) Describe the components of a spreadsheet;
c) State the application areas of a spreadsheet;
d) Create and edit a worksheet;
e) Explain different cell data types;
f) Apply cell referencing;
g) Apply functions and formulae;
h) Apply worksheet formatting;
i) Apply data management skills;
j ) Apply charting and graphing skills;
k) Print worksheet and graph.
Content
a.) Definition of a Spreadsheet
b.) Components of a spreadsheet
i. Worksheet
ii. Database
iii. graphs
c.) Application areas of a spreadsheet
• Statistical analysis
• Accounting
• Data management
• Forecasting (what i f analysis)
• Scientific application
d.) Creating a worksheet/workbook
• Getting started
• Worksheet layout
• Running the program
i. Creating a worksheet
ii. Editing a cell entity
iii. Saving
iv. Retrieving
v. Closing a worksheet
vi. Exiting from spreadsheet
e.) Cell Data Types
• Labels
• Values
• Formulae
• Functions
f.) Cell referencing
• Cell addressing
• Absolute referencing
• Relative referencing
g.) Basic functions and formulae
• Functions
i. Statistical (average, count, max, min)
ii. logical (if, count-if sum-if)
iii. mathematical (sum, product, div)
• Arithmetic formulae (using operators +,-,/,*,
h.) Worksheet formatting
• Text
• Numbers
• Rows and columns
• Global
i.) Data management
• Sorting
• Filtering
• Total/subtotals function
• Forms
j.) Charts/graphs
• Types
• Data ranges
• Labels
• Headings and titles
• Legends
k.) Printing
i. page set-up
ii. print preview
iii. print options
• select printer
• selection
• worksheet/workbook
• orientation
• pages and copies
v) Printing
Introduction
Definition
An essentially large sheet that lets you enter, edit and manipulate numerical data.
Types of Spreadsheet
Manual
Electronic
Examples of Spreadsheet
Lotus 123
VisiCalc MS-Excel VP Planner
Components of a Spreadsheet
1. Worksheet: where data is entered. It consists of cells, columns and rows.
2. Database: Does the actual management of data e.g. filtering records, using forms, calculating
subtotals, data validation, pivot tables, pivot charts and reports.
3. Graph and charts: Pictorial representation of the base data in a worksheet.
Types of charts
Line, bar, column, pie, scattered, histogram,
Legend: A key that explain what each colour or pattern of data representation in a chart means.
Worksheet Layout
Cell: Intersection between a row and column.
Rows: Horizontal arrangement of cells.
Columns: Vertical arrangement of cells.
Range: A group of rectangular cells that can be manipulated as a block.
Cell Referencing
Identifies a cell or range of cells on the worksheet and shows MS-Excel where to look for the
values or data needed to be used in a formula.
1. Relative cell referencing: The formula keeps on changing automatically depending on the
position on the worksheet.
2. Absolute: Cell reference that is always referring to a cell in a specified location of the
worksheet even if they are copied from one cell to another.
number.
A1 style R1C1
B2 R2C2
C2 R10C3
E20 R20C5
Data Management
1. Sorting
2. Filtering data: Quick and efficient method of finding and working with a subset of data in
a list.
3. Auto filter: Uses simple criteria and include filter by selection
4. Advanced filter: Uses more complex criteria.
5. Subtotal
6. Total function
7. Forms: Special prepared templates that the user can use to make data entry fast.
Mathematical Functions
1. Sum: Adds values in a range of cells as specified and returns the result in a specified cell.
2. Product: Multiplies values in a range of cells as specifies and returns result in a specified
cell.
Order of execution
End of topic
An electronic spreadsheet;
- Has a large worksheet for data entry & manipulation as compared to manual
worksheet
- Has inbuilt formulae (called functions) that are non-existent in manual worksheets
- Uses the power of the computer to quickly carry out operations
- Has better document formatting & editing qualities than a manual worksheet
- Utilizes the large storage space available on computer storage devices to save &
retrieve documents.
- Can easily be modified, while manual spreadsheets involve a lot of manual
calculations & are very difficult to amend
- The user can very quickly & efficiently perform complicated computations using
the information stored in an electronic spreadsheet.
- Enables the user to produce neat work
- Offers graphical representation of data leading to comprehensive decisions.
- It is accurate in its calculations & allows automatic recalculation on formulae.
For a manual worksheet, changing one value means rubbing the result & writing
the correct one again.
4. Explain five application areas where spreadsheet software can be used.
(5mks)
i) Accounting: - spreadsheet software can be used by accountants to record
their daily transactions & also keep financial records, e.g. they can record
sales & purchases, produce invoices, compile financial statements, calculate profits, prepare
budgets, etc.
ii) Data management: - a spreadsheet enables data & information to be
arranged neatly in tables, produced easily and also kept up-to-date, e.g. one can edit, save , sort,
filter, use forms to enter and view records, and worksheet data.
iii) Scientific applications: - spreadsheets can be used by scientists &
researchers to compile and analyze their results.
iv) Statistical analysis: - spreadsheets provide a set of statistical
Functions/tools that can be used to develop complex statistical or engineering analyses, e.g.,
teachers can compile their students’ marks and
produce results.
v) Forecasting: - using the ‘what if’ analysis technique, spreadsheets can be used to
find out the effect of changing certain values in a worksheet on the other cells. This helps in
financial forecasting, budgeting, etc.
5. State five features of spreadsheets that are useful in financial modeling. (5mks)
Have inbuilt functions & formulae which can be used to perform most
mathematical statistical, trigonometric or financial calculations
Allows automatic recalculation on formulae
#have ability to perform ‘what if’ analysis, which can be used to find out the
effect of changing certain values in a worksheet on the other cells
Have the ability to sort & filter data
Have a data validation facility, which ensures that the correct data is entered into
the spreadsheet.
Have a chart facility that can be used to draw Line graphs, Bar charts, Pie charts,
Histograms, etc.
Some spreadsheets have a SOLVER facility that is used to uncover the best uses
of scarce resources so that desired goals such as profit can be maximized, or
undesired goals such as cost can be minimized.
They enabled printing of entire worksheets, portions of a worksheet or several
worksheets within the shortest time possible
Have the ability to summarize data using Consolidation and Pivot tables.
iii) Cell
A box formed when a row & a column intersect in a worksheet where the data is entered
7. Explain the following concepts as used in spreadsheets: (4mks)
i) Automatic recalculation
This is whereby an electronic spreadsheet will adjust the result of a formula automatically when
the values are changed, so that they correspond with the different input.
(6mks)
A B C D
1 AGROVET COMPANY
2 NAMES AGE DEPARTMENT STATUS
3 Mary Anne 23 Research Single
4 Francis 45 Personnel Married
Kihara
5 Lena Achieng 90 Research Married
6 Hellen 45 Computer Single
Wanjiku
7 Mwangi Peter 34 Computer Married
8
10. a) What is a cell reference? (1mk)
A cell reference is the identity of a cell in a worksheet. A cell is identified by use of the column
letter and the row number headings.
b) For each of the following, state the type of cell reference. (4 mks)
i) A5 Relative reference
ii) $F$5 Absolute row reference (only the row reference is absolute)
iii) H$21 Absolute column reference (only the column reference is absolute)
Database
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define a database;
b) Explain the concepts of a database,
c) Explain data organization in a database;
d) Create a database;
e) Edit a database;
f) Design a form;
g) Apply basic concepts of queries;
h) Create report and labels;
i) Print queries, forms and reports.
Content
a.) Definition of Database
b.) Database concepts
• Traditional filing methods (manual flat files)
• Functions of databases
• Types of database models
• Database software
• Features of a database (e.g. data structures,
report generating, querry language,modules)
Introduction
Definition of Database
Collection of structured and related data items organized to produce a consistent and
controlled access to the items.
NB: Database Management Software (DBMS) facilitates the creation, organizing and
management of databases.
3. Data can be shared- data requirement can be satisfied even without necessary
creation of a new file.
4. Offers security by restricting unauthorized access.
5. Data integrity is maintained- the accuracy of data.
6. Data independence: the immunity of the application to changes in storage and access
strategy.
Database Models
1. Flat files: They hold only one set of data and is not any different from the manual files.
Example is the library catalog.
2. Hierarchical models: Arranged in hierarchical (text) form i.e. To access level two data one
has to first access level one data items.
3. Networking models: Links or paths are used to express the relation between different
data items forming a network of items.
4. Relational model: Related data items are stored together in structures called relations or
tables.
Relationships created between records of different tables.
5. Object Oriented Model: Database is a complete program built to hold a collection of
objects which have both properties and behavior.
Query Criteria
Relational operations: >, <, <=, >=, <>, and =.
Wildcards: *(asterisk) and #.
Logical operators: AND, OR and NOT.
LIKE and BETWEEN: relate or display values within a range.
End of topic
8. Differentiate between:
i) Primary key and relationship (2mks)
Primary key is a field or a set of fields that can be used to uniquely identify each individual
record in a table. It is used to relate a table to the foreign keys in other tables.
12. The following car details are to be entered in a database: Make, Date-of-
manufacture, colour, and cost.
a) Prepare a suitable database structure showing field names and their field data types
(5 mks)
Field name Data type
ID (Primary key) Auto Number
Make text
Date of manufacture Date/time
Colour Text
Cost Currency
b) Explain how you index the data such that cars of the same make and colour are
together. (2mks)
Create a query to show same make and colour
c) Write a statement that can be used to select cars of colour green. (2mks)
Create a query. In the colour field, and in the Criteria row, write “green”
d) Give an instruction that would:
i) Select cars whose cost is between 500,000/= and 1,000,000/= (3mks)
Create a query. In the cost field, and in the criteria row, write “.>500000 and
<1000000”
ii) Determine the average cost of all cars. (3mks)
Create a query. Choose average of costs “Avg” option in the total section.
Desktop publishing DTP
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define desktop publishing;
b) State the purpose of DTP;
c) Identify types of DTP software;
d) Design a publication;
e) Edit a publication;
f) Format a publication;
g) Print a publication.
Content
a.) Definition of Desktop publishing
b.) Purposes of DTP
• Graphic design
• Page layout design
• Printing
c.) Types of DTP software
• Graphical based
• Layout based
d.) Designing a publication
• Types of publications e.g. newsletters, cards, brochures, posters etc
• Running the program
• Screen layout
• Setting up a publication
• Manipulating text and graphics
e.) Editing a publication
• Editing tools
f.) Formatting a Publication
• Text
• Graphics
g.) Printing
• Page set up
• Print options
Introduction
Definition
This is the production of publication work within the computer framework of art and design
Layering
The process of placing objects, text and graphical objects on one another.
Importance of Layering
To have presentable levels
publication
End of topic
b) Give any three examples of desktop publishing software available in the market
today. (3mks)
- Adobe PageMaker
- Adobe Photoshop
- Adobe illustrator
- Ventura
- Microsoft Publisher
- CorelDraw
- Harvard graphics
2. Identify four different types of publications that can be produced using desktop
publishing software. (4mks)
- Newsletters
- Newspapers
- Calendars
- Advertisements/Posters
- Magazines
- Certificates
- Notices
- Catalogues
- Pamphlets
- Books
- Brochures
3. Differentiate between the following:
Pasteboard is where text & objects are placed for editing before transferring them to the printable
area; Printable page refers to the area enclosed in margin guides.
(2mks)
Margins mark text areas on the page along the edges, while column guides divide
the page into several fields. They are used to define the printable area.
Change case is changing text from upper to lower case, sentence, title, or toggle case, while drop
cap refer to making the first character in a line bigger and drops down to occupy the space in the
lines that follow.
Tracking refers to changing the visual denseness or openness of characters in aline, while
Kerning is fixing particular pairs of letters that are too close or too far apart from each other.
A stroke refers to a line style, while a fill refers to applying background pattern such as shading
to a graphical object.
5. What commands are used in place of portrait and landscape page orientation in
PageMaker? (1mk)
i. Portrait-tall;
ii. Landscape-wide
6. Give three methods that are used to transform an object. (3mks)
i. Rotating
ii. Skewing
iii. Reflecting
Text wrap is controlling the flow of text over or around a graphical object.
Make the text jump the object to the next page or column
Allow to text to jump over the object and continue on the same page
Create a rectangular text wrap around all the sides of the object.
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define internet;
b) Explain the importance of internet;
c) Describe internet connectivity;
d) Identify internet services;
e) Access internet;
f) Use e-mail facilities;
g) State the moral, social and spiritual issues that may emerge through access to the internet.
Content
a.) Definition of internet
b.) Development of internet
c.) Importance of internet
d.) Internet connectivity
• Telecommunication facilities
• Modems
• Internet services providers (ISP)
• Internet software
e.) Internet services e.g.
• World Wide Web (www)
• Electronic mail (e-mail)
• Electronic Commerce (e-commerce)
• Electronic Learning (e-learning)
Importance of Internet
Research activities
News and information dissemination
Leisure
Communication
Business transactions
Protocols
A set of rules that governs how two computers can send and receive data on the network.
Types of protocols are:
Transmission Control Protocol (TCP): Governs how data is transferred from one
computer to the next.
Internet Protocol (IP): Determines the addressing system on the internet.
Internet Architecture
Internet Services
Website: Group of related web pages or other resources located on a web server.
Web portal: It offers specialized services like search, email, sports updates,
financial news and links to selected websites.
Blog: Website containing information that can be easily updated. It acts as resume
diary and may be used for business, advocacy and campaigns.
Multimedia: contains photos, movies, music, web TV, and internet radio.
E-mail Facilities
1. Mails
2. File attachment
3. Online meeting
4. Telephone messaging
5. Contact management
End of topic
1. The first computer Network was set up by ARPA in the United States of
America. What is the full meaning of the acronym ARPA (1mk)
Advanced Research Projects Agency
b) Name the two most common protocols for the Internet, and state their functions.
(3mks)
Transmission control Protocol (TCP); - It governs how data is transferred from one place to
another
Internet Protocol (IP); - It is used to provide routing from one network to another (i.e. it
enable data to be sent& received by the different computers on a network)
4. a) Explain the following terms as used in internet:
i) Website ( ½ mk)
A collection /group of related Web pages belonging to an organization or
individual
ii) Browse/Surf the web. ( ½ mk)
Moving around and between the Web pages
5. a) What is meant by the term e-learning? (1mk)
This is learning through interaction with special programs on the
computer.
b) A school intends to set-up an e-learning system. List three problems that are
likely to be encountered. (3mks)
- Lack of capital
- Lack of skilled manpower (required technology to run & support the e-learning
system)
- Spread of computer viruses
- Availability of pornographic material & literature to the students from the
internet.
A B C D
7. Discuss four advantages and two disadvantages that electronic mails have over
regular mails. (6mks)
Advantages
i) Cheap & economical: -It costs almost nothing to transmit and e-mail
message over the network. There is no need for stamps, envelopes, etc
ii) Secure;-Access to a user’s mailbox can be restricted by use of a password
iii) Faster: - The delivery of an e-mail message normally takes seconds or minutes
depending on the distance to the receiver.
iv) Efficient:- A message prepared only once can be sent to several people
v) Convenient: - with e-mail, one can send his/her messages when it is
convenient for him/her & the recipients can respond at their convenient times.
vi) Cheaper in preparing the message: - Most e-mail users accept less well-formatted
messages and slight typing errors are overlooked, unlike in business letters which are
expected to be error-free and formatted according to certain standards.
Disadvantages
- the initial installation cost is higher
- Messages may be lost before they can be read due to virus infection
- Messages may not be kept for future reference due to the high cost of storage
(2mks)
Specific Objectives
Content
• Threats e.g.
i) virus
iv) theft
i) anti-virus software
ii) password
iv) backups
c.) Computer crimes e.g.
i) trespass
ii) hacking
iii) tapping
iv) cracking
v) piracy
vi) fraud
v i i ) sabotage
viii) alteration
i) audit trail
iv) firewalls
2. Unauthorized Access
Types
1. Eavesdropping: Tapping into communication channels to get information.
2. Surveillance: Gathering information and use it for illegal purpose
3. Espionage: Spying to get information to use it to counter or finish another computer.
4. Theft
Control measures
Employ guards
Burglar proofing
Reinforce weak access points
Install backup storages preferably out of the computer room
5. Computer Crimes
1. Trespass: Gaining access to information without permission.
2. Cracking: Guess work till one discovers weakness in security.
3. Hacking: Intentional breaking of codes and passwords to gain access.
4. Tapping: Sending an intelligent program to the host computer to get information.
5. Piracy: Making illegal copies of copyrighted software.
6. Fraud: Use of computers to cheat people with the intention of gaining money or
information.
7. Sabotage: Illegal destruction of data and information with the aim of crippling service
delivery or causing great loss to an organization.
8. Alteration: Illegal changing of data and information without permission with the aim of
gaining ormisinforming the authorized users.
Control measures against piracy
Make software cheap enough to increase affordability.
User license and certificates to identify originals.
Set installation passwords to deter illegal installation.
End of topic
computer.
The use of computer hardware or software for illegal activities, e.g., stealing, forgery defrauding,
etc.
b) Explain the meaning of each of the following with reference to computer crimes.
(7mks)
i) Cracking – use of guesswork over and over again trying to look for
weak access points in software in order to get access to data & information
without permission with the aim of gaining or misinforming the authorized users.
3. Outline four ways of preventing piracy with regard to data and information.
(4mks)
- Enact & enforce copyright laws and other regulatory frameworks that
(2 mks)
Controlling the movement of storage media (e.g. floppy disks, flash disk, etc)
ii) Explain how each of the two ways listen in b (i) above assist in controlling computer
viruses. (2mks)
Antivirus software helps to detect and remove the viruses from the
State six precautions that you would expect an organization to take to prevent
Lock the doors, (i.e. keep the computers in a strong room, which should remain firmly locked
Install security alarms at strategic access points so as to alert the security personnel in case of a
break in.
Use of special voice recorders that would be able to analyse the voice of a trespasser & check
Enforce data & information access control policies on all employees to control access to data
Use file passwords to prevent any person from getting access to the electronic files
6. Give four rules that must be observed in order to keep within the law when
- Should be collected, used & kept for specified lawful purposes (e.g., data should not be used for
unlawful gain)
- The owner of the data has a right to know what data is held by the person
- permission
- Do not collects irrelevant and overly too much information for a purpose.
- Name
- Date of birth
- ID. Number
- Residence
- Address
- Phone number
CHAPTER SIX
DATA REPRESENTATION IN A COMPUTER
Specific Objectives
By the end of the topic the learner should be able to:
Content
a.) Concepts and Reasons of data representation
b.) Definition of terms: bit, byte, nibble and word
c.) Types of data representation.
• Number Systems and their representation of integral values
i) Decimal
ii) Binary
iii) Octal
iv) Hexadecimal
'A
• Symbolic representation
i) Binary Coded Decimal Code (BCD)
ii) Extended Binary Coded Decimal Interchange Code (EBCDIC)
iii) American Standard Code for Information Interchange Code (ASCII)
d.) Conversion between binary and decimal
e.) Binary arithmetic operations
• Binary addition
• Binary subtraction
(i) ones complement
(ii) twos complement
Introduction
In this topic we will focus on the classification of computers according to their functionality:
1. Analog
2. Digital
3. Analog
In digital computers, the user input is first converted t h e n transmitted as electrical pulses
called periodic that can be represented by two distinct states ON and OFF. The ON state
may be represented by a “1” and OFF state by a “0”. The sequence of the two states results
to an electrical signal that the computer can understand.
Base Conversion
Decimal to binary
Divide by 2 noting the remainder from bottom. For fractional part multiply by 2 while
noting the remainder from top.
Example
Convert the decimal number 7.562510 into its binary equivalent
Solution
Convert the two parts separately
Integral part
2 7
2 3R1
2 1R1
0R1 7 is equivalent to 1112
Fractional part
Read this digits
0.5625 x 2 = 1.125
0.125 x 2 = 0.250
0.250 x 2 = 0.500
0.500 x 2 = 1.000
Since the product of the last step of the fractional part is zero. We stop here.
0.5625 x 2 = 0.10012
7.5625 = 111.10012
Binary to decimal:
The integral part
First write the place values starting from the right hand
side. Write each digit under its place value.
Multiply each digit under its corresponding place value i.e. 2^ (from
0, 1). Add up the products. The answer will be the decimal number
in base 10. The fractional part
Multiply each digit under its corresponding place value i.e. 2^ (from -1).
Decimal to octal
Divide by 8 noting the remainder from bottom. For fractional part multiply by 8 while
noting the remainder from top. The answer is to base 8.
Octal to decimal
The method is similar to converting binary to decimal but using 8 instead of 2.
Binary to octal
Divide the binary numbers in pairs of three from the right side. Then multiply each digit by
its place
value i.e. 2^. The answer is to base 8.
Octal to Binary
Divide each digit by 2.
Decimal to Hexadecimal
Just like the process done in converting decimal to binary but using 16. The answer is to base
16.
Hexadecimal to decimal
Like binary to decimal conversion but using 16^. The answer is to Base 10.
Binary to Hexadecimal
Divide into four parts, then multiply each digit by the place value of 2^, answer to base 16.
Hexadecimal to Binary
Divide each digit by 2. Answer to base 2.
3. Signed Magnitude
In decimal numbers, signed number has a prefix “+” for a positive number and (-) for
negative number may be represented by prefixing a digit ‘1’ to the number while a
positive number may be represented by prefixing a ‘0’ ie.
1710 100012 (unsigned)
-1710 To indicate it’s a negative number we add an extra bit (1) 100012
+1710 To indicate the positive number we add an extra bit (0)100012
Binary Arithmetic
Binary Addition
Binary addition rules
A+B SUM CARR
0+0 0 Y
0+1 1 0
0
1+0 1 0
1+1 0 1
1+1+1 1 1
Binary Subtractions
Rules
A-B DIFFERENCE BORROW
0-0 0 0
0-1 1 1
1-1 1 0
1-1 0 0
000001102
End of topic
signal. (2mks)
form.
receiving computer converts (demodulates)the analogue signal back to the original digital form.
(4mks)
value.
iv) word - The total number of bits that a single register of a particular
- Devices designed using binary logic are simple, more reliable & consume less
energy.
5. Distinguish between Binary and Octal number systems, and give an example of each.
(2mks)
Binary (base 2) system has just two states usually called “ON” and “OFF” or “0”
and “1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how you arrive at your
answer.
a) Convert the following Decimal numbers to their Binary equivalent.
i) 4510 (2mks)
2 45 Rem
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
1 1
4510 = 1011012
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
0.50 x 2 = 1.00 1
= 1002 = 100.112
(7x81) + (7x80)
56 + 7 = 6310
2 63 Rem
2 31 1
2 31 1
2 15 1
2 7 1
2 3 1
1 1
` =1111112
2 4 Rem
2 2 0
2 1 0
1 1
410 = 1002
1002
112 +
1112 1112
3 Rem
2 1 1
1 1
310 = 112
= 1407F16
82 81 80
7 6 7
7x82 + 6 x 81 + 7 x 80
448 + 48 + 7 = 50310
503 Rem
16 31 7
16 1 15
1 1
7678 = 1 F716
8. Use One’s compliment to solve the following the following sum: - 510 (2mks)
2 5 Rem
2 2 1
2 1 0
1 1
9. Perform the following conversions: (3mks)
2 34 Rem
2 17 0
2 8 1
2 4 0
2 2 0
2 1 0
1 1
34 10 =1000102 (2mks)
2 7 Rem
2 3 1
2 1 1
1 1
=1112
0.12 x2 0.250 0
= 0.0012
= 111.0012 (1mk)
25 24 23 22 21 20
1 0 1 1 0 1
=32 + 8 + 4+ 1
=4510
=2+0½+¼
7 0 2
= 32.12310
7 A B
22 21 20 21 20 21
000 111 0 11 . 0 1 0
=73.28
8 57 Rem
8 7 1
8 7 1
2 7 7
0.4 x 8 = 3.2 3
=718 71.318
11100111
00101110 +
101012
1102
11112
000010002 - 000001012
Step 2: Add the binary equivalent of the first value to the Two’s complement of
11111011 +
Step 1
7 A E
Step 2
2 4033 Rem
2 2016 1
2 1008 0
2 504 0
2 252 0
2 126 0
2 63 0
2 31 1
2 15 1
2 7 1
2 3 1
2 1 1
1 1
403310 = 1111110000012
DATA PROCESSING
Specific Objectives
Content
• Data collection
• Data input
• Processing
• Output
c.) Description of errors in data processing e.g.
• Transcription errors
• Transposition
• Manual/conventional
• Mechanical
• Electronic
• Accuracy
• Timeless
• Relevance
• Master
• Transaction
• Report
• Sort
• Backup
• Reference
• Sequential
• Random/direct
• Serial
• Indexed sequential
• On-line
• Distributed
• Time-sharing
• Batch processing
• Multi-processing
• Multi programming/multi-tasking
• Interactive processing
• Real-time
Introduction
Definition
This is the process of transforming data into a meaningful output i.e. information.
Data Processing Cycle
Data Collection
Processing
Data Output
This is the final activity of data processing cycle which produces the
information. Ways of data dissemination
Electronic presentation over media or television
Distribution of hard copies
Broadcasting the message over the internet
Mobile phones
Data Integrity
The accuracy and completeness of data intended in a computer or received from the
information system. Data integrity is determined by;
1. Accuracy: whether the data is true or false.
2. Timeliness: This relays the availability of data in time or whether it is already
outdated.
3. Relevance: Consider whether the expected output meets the processing cycle
requirements, the daily operations and the decision making.
4. Audibility (Verifiability): Ability of the user to check the accuracy and
completeness of information.
Advantages
Resources can be accessed sequentially or randomly
Records are not duplicated
Accessing of records can be fast if done randomly
Disadvantages
Storage media is rather expensive
Accessing records sequentially is time consuming
Processing records sequentially introduce redundancy
Application
Banking
Stock exchange
Stock control
Water/electricity
billing
Advantages
Files are maintained up to date.
Information is readily available for current decisions.
Files enquiries are possible through terminals (workstations).
Disadvantages
Systems are complex to develop.
Costly in terms of hardware, software, storage media e.t.c.
2. Real-time: Process incoming data as soon it occurs, updating transaction file
and giving immediate results.
Application
Air reservation
Hotel reservation
Chemical plant processing
Advantages
Information is readily available for instant decision making.
Provides immediate control.
Fast and reliable information.
Disadvantages
Requires complex and expensive operating system.
Aren’t easy to develop.
Require Front End Processors (FEPs) to relieve the central processor.
3. Distributed: Divides processing task to two or more computers on separate sites
connected by data transmission media.
Application
Banks where customers can be served from different branches but information is
updated at head branch.
Advantages
Less risk to system breakdown.
Incase of data loss, only a small portion of data is lost.
Reduces the load on the host computer hence faster processing.
Disadvantages
Requires more expensive CPUs.
Operating system is complex and more difficult to operate.
4. Timesharing: Terminals are connected to the central computer are given access to
the CPU apparently the same time.
Application
Bureau
Companies
Learning institutions
Advantages
Better services to users, for information/ output are fast.
File enquiries possible since files are held online.
User interaction possible through terminals.
Disadvantages
User has no control over the central computer.
Not reliable with regard to data security.
Response time is slow wher there are many
tasks.
5. Batch: Data is accumulated as a group (batch) over a specified period of time then
processed
Application
Payroll processing
Advantages
Simple to develop
Timing reports is not a necessity
Unit cost of processing is low
Disadvantages
Time lag between origination of transaction and the information available
Late information is not suitable in situations when instant decisions are
required.
Difficult to provide the desire priority schedule
6. Multiprocessing: Different processors are connected to the main processor like in
banks to update transactions made.
7. Multitasking/ multiprogrammining: Capable of handling more than one
task but the processes one at a time.
Advantages
Increase productivity of computer reducing CPU idle time
Reduces incidence of peripheral bound operations
Disadvantages
Requires more expensive CPUs
More sophisticated software is required to maintain data integrity.
End of topic
Data
Collection
Data Input
Data
processing
Output of
‘information’
Data collection involves getting the data/facts needed for processing from the
point of its origin to the computer
Data collection involves getting the original data to the ‘processing centre’,
transcribing it, converting it from one medium to another, and finally getting it
into the computer.
Data creation
Data transmission
Data preparation
Input validation
Sorting
The accuracy of the data entered in the computer directly determines the accuracy of the
information given out.
b) Give and explain two transcription and two computational errors committed during
data processing. (8mks)
Misreading errors: -they occur when the user reads source document
incorrectly, thus entering wrong values, e.g. a user may confuse 5 in the number
586 with S, and type S86 instead.
Data integrity refers to the dependability, timeliness, availability, relevance, accuracy &
completeness of data/information
Designing user interfaces that minimize chances of invalid data being entered.
Hotel reservations
Banking systems
Advantages
Fast &reliable
Disadvantages
Real time systems usually use 2 or more processors to share the workloads, which is
expensive.
7. Differentiate between CPU bound jobs and I/O bound jobs. (2mks)
CPU bound jobs require more of the CPU time to process these jobs. Most of the work the I/O
devices perform is on the Input; and Output; hence, they require very little CPU time.
8. Most companies are now shifting from the use of geographically distributed personal
computers. This method of data processing is known as Distributed Data Processing (DDP)
Required:
-Files
-Application software
-Data/information/messages
ii) Name four examples of industries and business organizations that extensively use
distributed processing systems. (4mks)
Banks
iii) List down two benefits and three risks that might be associated with the distributed
data processing system. (5mks)
Benefits
The use of low cost minicomputers minimizes the cost in data processing
The design & implementation of the system is less complex due to decentralization
Risks
Data duplication is very common
Security threats, i.e. the data & information sent one the network from one place
to
A Multi-programming system allows the user to run 2 or more programs, all of which are in the
computer’s main memory, at the same time.
10. State at least four advantages of storing data in computer files over the manual
filing system (4mks)
Cheaper
Enhances data integrity (i.e. accuracy and completeness)
A logical file is viewed in terms of what data items it contains and what
processing operations may be performed on the data
A physical file is viewed in terms of how the data items found in a file are
arranged on the storage media and how they can be processed.
12. Arrange the following components of the information system data hierarchy in
ascending order of complexity:
13. In a computer based information system, state the purpose of the following files, and
give one example where such a file may be required in a school.
(8mks)
i) Report file- It contains a set of relatively permanent records extracted from the data in a
master file.
They are used to prepare reports, which can ve printed at a later date, e.g. report on
student’s class performance in the term, extract of students who have not cleared their school
fees, report on absentees.
ii) Backup file- Used to backup data or to hold duplicate copies of data/information from
the computer’s fixed storage or main file for security purposes e.g. a copy of all the students
admitted in a school fees, report on absentees
iii) Reference file - Used for reference purposes. It contains records that are fairly permanent
or semi-permanent, e.g. Deductions in caution money, wage rates, tax deductions, employees
address, price lists etc.
iv) Sort file – used to sort/rank data according to a given order, e.g. ranking position in a
class of students.
It is the way records are arranged (laid out) within a particular file or any secondary storage
device in a computer
In sequential file organization, records are stored in a sorted order using a key
field, while in serial; the records are stored in the order they come into the file, and are not
sorted in any way.
In random file organization, records are stored in the file randomly and accessed directly, while
in indexed –sequential, the records are stored sequentially but accessed directly using an index.
CHAPTER EIGHT
ELEMENTARY PROGRAMMING PRINCIPLES
Specific Objectives
a) Define Programming;
b) Describe the various levels of programming languages;
c) State the advantages and disadvantages of each level of the programming
language;
d) Define the terms assembler, compiler, interpreter, source program and object
program;
e) Describe the stages of program development;
f) Describe the program control structures;
g) Define and develop algorithm, pseudo-code and flowchart.
Content
a.) Definition of Programming
b.) Levels of programming languages
• Low level language
i) Machine
ii) Assembly
i) assembler
ii) compiler
iii) interpreter
iv) source program
v) object program
e.) Program development
• problem recognition
• problem definition
• program design
• program coding
• program testing
• implementation
f. ) Program Control Structure
• Sequence
• Selection
• Iteration (looping)
g. ) Definition and development of Algorithm
• Pseudo-code
• Flow chart
Introduction
Program: A set of instructions
Programming: The process of developing computer instructions used to solve a particular
task.
Programming language: Special list of symbols that can be translated into machine
readable form by a computer when in a particular sequence or order.
Interpreter Compiler
Translates source Translate entire source code at
program one statement at once for execution
a time
Translates program code each Object code can be saved on a storage
time it media and run as required hence
is run hence slower the executed faster
compiling
Levels of Programming
Low Level
They were easy, understandable and hardware oriented hence not portable.
1. First Generation Language (1st GLs)/ Machine Language: they are written
using binary logic.
2. Second Generation Language (2nd GLs)/ Assembly Language: used
MNEMONICS (symbolic operation codes, shortened two or three words)
High Level
They are very close to human language and are machine independent, hence they are
portable
1. 3rd GLs (Structured procedural): Pascal, Formula Translator (Fortran),
COBOL,BASIC, Ada.
2. 4th GLs: They present programmers with programming tools. Examples;
Visual Basic, Visual Delphi, Visual COBOL.
3. 5th GLs: They depict human like intelligence- PROLOG, MERCURY, LISP and
OCCAM.
4. Object Oriented Programs (OOP): Simula, C++, Java and Small Talk.
5. Web scripting: Java, php (hypertext preprocessor), Visual Basic Script.
2. Processed faster
3. Stable and hard to crash
Disadvantages
1. Difficult and cumbersome to use and learn
2. Require highly trained personnel
3. Debugging is difficult
4. Machine dependent
Problem recognition
Reasons for development of a computerized program:
Problem or undesirable situation that prevents an individual from achieving their
goals.
Opportunity to improve the current system.
A new directive, given by the management requiring a change in status quo.
Problem analysis
Determining or defining the likely input, processing activities and the expected output.
Program Design
Actual development of program’s processing or problem solving logic called the
algorithm.
Program Coding
Process of converting a designed model into its equivalent program using programming
language.
Program Documentation
Writing of support materials explaining how program can be used by users, installed by
experts by operations and modified by programmers:
1. User oriented- enables the user to use the program easily and quickly.
2. Operator oriented: help to install and maintain the program.
3. Programmer oriented: provide necessary technical information for future
modification of programmers.
Algorithm Development
Pseudocode
Guidelines for designing a good Pseudocode
1. The statement must be short, clear and reliable
2. The statements must not have more than one meaning i.e. should be unambiguous
3. The Pseudocode lines should be clearly outlined and indented clearly
4. A Pseudocode should show clearly the start and stop of executable statements and
the control structures (to be discussed later in the section).
5. The input, output and processing statements should be clearly stated using keywords
like PRINT, READ, INPUT etc.
Program Flowcharts
Common symbols used in drawing program flowcharts are:
output
Start/ Stop
Process
Input/
Ellipse: denotes the beginning and end of the program
algorithm. Parallelogram: used to denote an input or
output operation.
Decisio
n
Advantages of Flowcharts
Gives programmer good visual reference of program function.
Serves as a program or system document.
It is easy to trace through from the start to find the action resulting
Selection
Execution of statement depends on a condition that returns true or false. There are four
types
IF…THEN
Only one IF option is available. All others are ignored during program execution.
General format: IF <condition> THEN
Statement;
END IF
IF…THEN…ELSE
Only two Ifs are the available option. The general
format: IF <condition> THEN
Statement;
ELSE
Statement;
END IF
Nested IF selection
There two or more If options and statements to be conditioned to make a selection.
General format; IF <condition> THEN
Statement
ELSE
IF <condition>
THEN Statement
ELSE
Statement
END IF
END IF
Case Selection
An alteration to Nested If especially where there are several options to choose from. The
flowchart not different from Nested IF.
CASE X OF
Label 1: statement 1
Label 2: statement 2
Label 3: statement 3
.
.
.
Label n: statement n- 1
ELSE Statement
n
END CASE
Iteration/ Looping
Repetition designed to execute the same block of code again and again till a certain
condition if fulfilled.
The WHILE…DO loop
General format
Pseudocode Flowchart
While <condition>
Do Statements
Statement Conditio
End while n Yes
?
No
End Loop
Repeat
Statement Statements
Until <condition>
Yes
Condition
?
No
End Loop
Statement
No
Condit
ion?
Yes
C ondit ion?
Statem
No
ent
Yes
End of topic
Features:
They are machine hardware-oriented
They are not portable, i.e. , a program written for one computer cannot be
installed and used on another computer of a different family
They use Mnemonic codes
They frequently used symbolic addresses.
b) Give three advantages of high-level languages as opposed to low-level
languages (3mks)
Easier to learn, understand and use
Easily portable, i.e. they can be transferred between computers of different
families and run with little or no modification
The programs are short & take shorter time to be translated
More flexible, hence they enhance the creativity of the programmer and
increase his/her productivity in the workplace
Easier to debug (correct errors)& maintain
Easy to modify
They are user-friendly & problem –oriented, hence can be used to solve
problems arising from the real world.
vii) Popularity: - the language selected should be suitable and /or successful in the market
with respect to the problems to be solved.
viii) Documentation: - It should have accompanying documentation (descriptions on how
to use the language or maintain the programs written in the language
ix) Availability of skilled programmers: - The language selected should have a pool of
readily available programmers to ease the programming activity, and reduce development
time.
11. a) State any four rules/guidelines that should be followed when drawing
program flowcharts. (4mks)
A flowchart should have only one entry (starting point) and one exit
point
The flowchart should be clear, neat and easy to follow
Use the correct symbol at each stage in the flowchart
The flowchart should not be open to more than one interpretation
Avoid overlapping the lines used’ to show the flow of logic as this can
create confusion in the flowchart
Make comparison instructions simple, i.e , capable of Yes/No answers
The logical flow should be clearly shown using arrows
Ensure that the flowchart is logically correct & complete
b) Give one advantage of pseudo codes over flowcharts (1mk)
Pseudo codes are easier to write and understand
They are convenient especially for long algorithms which span over
several pages.
Boolean
Stop
Expression
Counter
16. a) Increment
Define the term structured programming (2mks)
This is the technique of program design that allows large programs can be broken down into
smaller components/sub-programs called modules or sub-routines), each performing a
particular task.
b) List any two characteristics of Structured programming. (2mks)
Modules or sub-routines
Use of control structures in problems solving
Selection control
structure, e.g. If – then –else
b) IF...THEN…ELSE
selection
(2mks)
21.
a) With aid of a pseudo code and a flowchart, design an algorithm that
would:
Prompt the user to enter two number X and Y
Divide X by Y. However, if the value of Y is 0, the program should display an
error message “Error: Division by zero”.
START
PRINT (“Enter two numbers, X and Y”) Input X, Y
IF Y=0 THEN
PRINT ‘Error: division by zero’
ELSE
Quotient = X/Y
PRINT X, Y, Quotient
ENDIF
STOP
Flowchart
b)
Write down the assignment statement used in the algorithm above. (2mks)
Quotient=x/Y
22. Draw a flowchart for a program that is to prompt for N numbers, accumulate the
sum and them find the average. The output is the accumulated totals and the average.
23. Write a pseudo code
that reads temperature for each day in a week, in degree Celsius, converts the celcius
into Fahrenheit and then calculate the average weekly temperatures. The program
should output the calculated average in degrees Fahrenheit.
START
INPUT temperature in 0C
SET Initial day to 0
WHILE Initial day <=6 DO
F = 32 + (9c/5)
INPUT temperature in 0C
Initial day = Initial day + 1
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
24. Michael deposits 1,000 in a bank at an interest rat of 10% per year. At the end of
each year, the interest earned is added to the amount on deposit and this becomes the
new deposit for the next year.
Develop a pseudo code to determine the year in which the amount accumulated first
exceeds 2,000. Also for each year, print the year (starting from 1), the deposit, the
Interest earned, and the total accumulated at the end of the year.
START
Input initial deposit, Interest rate, and Target deposit
Set Deposit to 1000
Set Year to 0
REAPEAT
Year= Year + 1
Interest = Deposit x 10%
Total = Deposit +Interest
Deposit = total
UNTIL Deposit > 2000
PRINT Deposit, Year
STOP
25. Study the flowchart diagram below and answer the questions that follow:
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 = 34
26. Mwalimu savings society (MSS) Pays 5% interest on shares exceeding 100,000
shillings and 3% on shares that do not meet this target. However, no interest is paid on
deposits in the member’s MSS bank account
a) Design a pseudo code for a program that would:
START
PRINT “Enter member Name, share and Deposit”
INPUT Name, Shares, Deposit
IF shares > 100,000 THEN
Interest = 0.05 x Shares
ELSE
Interest = 0.03 x Shares
ENDIF
Total savings =Deposit + shares +Interest
PRINT Name, Total savings, Interest
STOP
a) Study the flowchart below and answer the questions that follow:
a) List all the outputs from the flowchart. (3mks)
b) What will be the output if the statement in the decision box is changed to?
(3mks)
i) M100
Only one value, 11 will be printed 1
iii) M = 100
values starting with 11 to infinity, i.e. , 11, 22, 44,………. 1
c) Modify the flowchart to print the sum of all the outputs. (9mks)
28. The
gross salary
of employees of
Mutson Chemist is based on the Basic and additional benefits. Employees with more
than 10 year’s experience get an additional pay of 10% of their basic salary. Bonuses
are given as per employees’ sales of the month as:
>200,000 15%
100,000 – 200,000 10%
Below 100,000 5%
Draw a flowchart for the program that will calculate Gross salary and output each
employee’s Basic salary, gross salary and all benefits. (15 mks)
CHAPTER NINE
ELEMENTARY PROGRAMMING PRINCIPLES
Specific Objectives
a) Describe a system;
b) Define an information system;
c) State the purpose of an information system;
d) Identify the stages of system development;
e) Develop a system using a case study;
f) Write a report on the case study.
Content
a.) Description o f a system
b.) Definition of an Information System
c.) Purpose of an Information System
d.) Stages of system development
• Problem recognition and definition
• Information gathering eg
i) investigation .
ii) observation
iii) interviews
iv) questionnaires
Description of a system
A system is described as either hard or soft system
Soft System
Their boundaries may be fluid or keep on changing.
Their goals and objectives usually conflict and may not be captured clearly because
they are human based.
It is difficult to precisely define exact measure of performance for
them. Examples: sales tracking and predicting systems, political
system,
Hard systems
They are systems whose goals and objectives are clearly defined and the outcome from
the system process are predictable and can be modeled accurately.
Characteristics of Systems
1. Holistic thinking: Combination of various components to create a complex whole.
2. Subsystems: A system doesn’t exist in solitude but may be a component of a large
system.
3. Boundary and environment: An external element whose changes in attitudes,
behavior and property affect respectively.
4. Processor: Transform or processes data from one state to another.
5. System entropy: The decaying or becoming useless because of the
improvement in technology, new management policies or the change in user
requirements.
6. Inputs and outputs: The system communicates to its environment by receiving
inputs and giving outputs.
7. Open and Close: The open system receives input from and gives output to the
environment while the closed system uses input as its own benefit thus building
itself from the output.
8. Purpose: The objectives that a system is supposed to achieve enable system
developers to measure the performance of a system during its operation.
9. Control: This is the method by which the system adapts to changes in the environment
in order to give the expected output or to perform to the expected level.
Input
Output
System
Processes System Processes
Control Feedback
Signal
Control
Information System
An arrangement of people, data processes and information that works together to support
and improve the day to day operation in a business and decision making. Purpose:
Supporting information processing task e.g. data collection, processing and
communication.
Helping in decision making by collecting operational data, analyzing it and generating
reports to be used in supporting decision making process i.e. online analytic process.
Enable information sharing
Advantages
One has the necessary material.
Disadvantages
Slow method
If wrong data was entered wrong information will be collected.
Interviews
Guidelines:
Interviewee must be informed in good time and the topic of discussion communicated
before to allow for adequate preparation.
Avoid personal biases in your questions.
Be careful about body language and proxemics.
Types of Interviews
Structured: Questions have been already organized or prepared and spaces for the
answers/responses.
Unstructured: Questions are not written or prepared.
Advantages
Non-verbal communication can be used.
Questions can be rephrased instantly for clarification and to probe the interviewee
further.
Gives adequate opportunity for the interviewer.
Interviewer is accessible to first hand information.
Disadvantages
It is difficult to organize interviews and they are time consuming.
Interviewee may not fully open up on some issues that may be personal or sensitive.
They are expensive to conduct.
Automated Methods
The uses of data capture devices like cameras, scanners and camcorders.
Advantages
The method is accurate.
Fast.
Disadvantages
Expensive equipment required.
Questionnaire
It is a special purpose document that allows a person to collect information and
opinions from the people who receive and respond to it.
Application
When limited amount of information is required from a large number of people.
People you need to gather information from are vastly dispersed.
Advantages
Since they are filled and returned in primary more sincere responses are
possible.
Respondent can fill the questionnaire at their own pace.
Disadvantages
Good ones are difficult to prepare.
The respondent may not fully understand the questions because of ambiguity of
language hence giving erroneous responses.
Time consuming in analyzing.
Observation
Advantages
Difficult concept for non-technical staff to explain can be observed.
Helps analysts become acquainted with the operational personnel.
Helps the analyst acquire know how needed to assist that have been recommended.
Can correct “hazy” understanding/ erroneous impressions.
Disadvantages
The person being interviewed can alter behavior leading to wrong requirement being
observed.
The need to be on-site consumes a lot of time.
The method cannot give information about past activities and problems.
3. System Classification
Deterministic system: system whose output is precisely known by their inputs
like the computer system.
Probalistic system: Output can only be predicted but not precise like in business
and economics.
Cybernetics system: Self system which adapts to the environment and regulate
their own behavior by accessing the feedback e.g. in human beings, plants.
4. Requirement Specification
Output Specification
Activities that entail generation of reports used to facilitate decision making. Factors to
consider;
Target audience.
Frequency of report generation.
Quality and format of output.
Input Specification
Content and volume of input.
Mode and device of input selection.
Layout and information sequence
File / data store specification
The key attribute/ field
Type of data
Length of each field
Back up and recovery strategies
Hardware and software specification
Economic factors e.g. prices
Operational factors e.g. reliability, upgradability, compatibility with existing resources
User-friendliness
5. System Construction
The coding, installing and testing modules and their components e.g. Input, output by
Using high-level structure language like PASCAL, COBOL e.t.c.
Fourth Generation languages- Visual Basic, Visual COBOL, Visual Delphi e.t.c.
Customizing the standard packages.
Testing
6. System Design
Development of flowcharts, data flow diagrams, structured charts e.tc.
7. System Implementation
The activities involved during this stage are: Installing the system, testing, converting from
old system to the new system and training the users.
File creation and convention: Setting up of master files to be used to support the new system.
Training the staff
Convert staff of user department on the effectiveness of the new system
Remove fear of change from them
Enabling staff cope with processing task of the new system
Methods used in training: documentations, film shows, manual reference, group discussions
and visits
Changeover
The process of changing over from old system to the new system.
1. Direct Changeover: The new system commences live operations and immediately
the old system is abandoned.
Advantages
Cheap method
Disadvantages
Places the organization in a do or die situation
Extremely risky
2. Parallel Changeover: Operations of the old system and the new system are run
alongside each other
Advantages
Provides a method of training in the new system
Personnel become familiar with the new system
Disadvantages
Costly to run two systems
Cross checking is difficult
Requires more staff hence more training is required
3. Phased Changeover: Implementation is done only on part of the new system at one
time or step by step.
Advantages
Allows the system to be implemented quickly
Less costly
Failure of the new system is limited
Cause minimal description
Disadvantages
Problems on assuming that the final sphere is implemented and converted
System Documentation
1. Reports on fact-finding
2. Requirement specification
3. System and module flowcharts
4. Table/ file structure description
5. Sample test data and expected output
6. Output reports.
CHAPTER TEN
• Limitations
f.) Elements of Networking
b) Data Signal
• Analog
• Digital
Content
a.) Definition of terms
i) computer networks
ii) data communication
Purpose and Limitations of networking
• Purpose
b.) Network software
• Operating systems
• Protocols
c.) Types of Networks
• Local Area Network (LAN)
• Metropolitan area Network (MAN)
• Wide Area Network (WAN)
d.) Types of Network topologies e.g.
• Ring
• Star
• Bus
Introduction
Computer Network: Collection of computers linked together using
transmission media for the purpose of communication and resource sharing.
Modes of Communication
1. Simplex- Communication in only one direction e.g. television and radio
broadcasting
2. Half duplex- Communication in both directions, one at a time e.g. Walkie Talkie
3. Full duplex- Communication in both directions simultaneously.
Types of Computer Network
1. Local Area Network (LAN)- Network that spans a relatively small geographical
area e.g. a building, a school etc.
2. Metropolitan Area Network (MAN) - Covers a metropolitan are like a town or a city
of typically a radius of between 5 to 50Km or MAN is made up of many LAN’s in a
metropolitan area.
3. Wide Area Network (WAN) – Covers a large geographical area like continent or the
world.
Advantages of LAN
1. Enables many users share expensive resources like printers and data.
2. Enables communication- sending messages and open chat sessions.
3. Capable of transmitting data very fast.
Purpose of Networking
1 Resource sharing- File sharing, mail exchange, sending faxes, schedule meetings
and print documents leading to less wastage of time and enhances greater productivity.
Roaming of officers who by virtue of their work cover long distance away from their
work place.
Time wastages in accessing organization information.
Remote communication is the process of transmission of data signals between
communications devices located at different geographical locations. Components of
remote communication are:
Remote Client- Computer that tries to access resources from another
computer on network.
Remote host- Computer being accessed on network
4. Cost effectiveness- Although the initial installation cost is high it cuts down most
expenses and adds value to service delivery.
Advantages
(i) Daily communication- paperless communication
environment.
(ii) Reduces transport cost for executive meetings.
(iii) Resource sharing e.g. printers, fax machine, optical drives, files and
applications.
5. Reliability
(i) Transfer of data with minimum errors from destination
(ii) Easy recovery incase of computer breakdown.
Limitations of Networking
1. Security issues- Data is prone to more illegal access threat in the network
2. High initial cost for software and hardware.
3. Moral and cultural effect- chartrooms and pornography.
4. Spread of terrorism and drug trafficking.
5. Overeliance on network thus network failure may halt the system or bring
down the organization.
Elements of Networking
A. Data Communication Media
1. Bounded (cabled) Media
Insulator
Wire
Conductor
Advantages
Used in the telephone systems
Cheap installation equipments
Cheap due to mass production of telephone
Disadvantages
Suffer a high attenuation rate.
Sensitive to EMI and eavesdropping
Low data transmission but more than
two line
Coaxial cables
Has a central copper core surrounded by a dielectric material (insulator) that is then
surrounded by a hollow mesh conductor covered by a shield. The braid (mesh conductor)
is made of copper/ aluminum and serves as the ground for the carrier wire. The braid
protects radio and electromagnetic interference. The thinner the conductor determines the
attenuation rate. Thinner have a high attenuation rate. Used in network blockade- A link
that connects two separate LAN’s
(ii) Thin coaxial cables (Thinnet)- has no dielectric insulator
(iii) Thick coaxial cables (Thicket)- has two dielectric insulators.
Copper core
Core insulator
Aluminum foil
Braided shielding
Outer layering
(b) Thicknet
Advantages
Stable even under high loads
Large bandwidth than twisted pair
Carry voice, data and video signals simultaneously
Resistant to radio and EMI than twisted pair cables.
Disadvantages
Thicket is hard to work with
Are relatively expensive to buy and install compared to twisted pare
Jacket
Light rays
Cor
e Cladding
Advantages
Immune to EMI and eavesdropping.
Fast and support high bandwidth.
Large distance can be covered- low attenuation
Used in hazardous places- Don’t generate electric signals.
Smaller and lighter than copper- Ideal for space limited situation
Disadvantages
Difficult installation since it must be carefully be handled
Expensive connectivity devices and media are required
Relatively complex to configure
Difficult and expensive to repair
Advantages
It is less prone to transmission errors.
It is capable of operating on both digital and analog data
Operates at a high speed.
Disadvantages
Signals affected by atmospheric conductors e.g. lightening
Additional numbers of repeaters are added after every few kilometers.
Satellite Transmission
Satellite in space
Downlink
Uplink
Satellite footprint: Area on earth where line of site can easily be located. Transmission
of signals to many recipients’ earth stations forms a point to multipoint transmission.
Very Small Aperture Terminal (VSAT): This technology refers to very small satellite
dish used in radio, data and TV communications. It enables direct access to satellite
communication instead of having to go through satellite owned or licensed satellite
gateway.
Advantages
Has a high band width.
Earth station can be installed on a customer property than layering extensive
cables.
Cheap since cost is not dependent on the distance.
Disadvantages
Expensive to install ground stations.
Heavy rains or bad weather increases loss of signals.
Any station can receive the signals.
Radio Communication
(i) High Frequency (HF) - Propagated by directing it to ionosphere on
earth. Then the ionosphere will reflect back to earth surface and the
receiver will pick it up.
(ii) Very High Frequency (VHF) - Transmitted over the earths surface.
Stationeries are place strategically to maintain the line of sight from one
another.
(iii) Ultra-High Frequency (UHF)- It is the same as VHF but require smaller
aerial because
they can be made to follow even narrow and direct path to the receiver
than VHF
(iv) Bluetooth- Enables people to use hand-held communication devices e.g. phones
PDA’sto access the internet. Network Bluetooth enabled devices is called a wireless
personal are network (WPAN) or piconet.
Infrared Transmission
Infrared transceivers must be within the line of sight in the same room because unlike
radio signals they cannot penetrate objects.
Network Software
Classifications of Network Software
a) Network operating system
b) Network protocols
Network operating system
Network operating system is specially designed to optimize the network computer ability
to respondto services request. Its functions are:
(i.) Provide access to network resources e.g. printers and folders.
(ii.) Enables nodes on network to communicate with each other more efficiently.
(iii.) Support interprocess communication i.e. enables various process on the
network communicate.
(iv.) Respond to request from application program running one network.
(v.) Support network services e.g. network cards, drivers and
protocols.
(vi.) Implementing network security features.
Network Protocols
They are a set of rules and procedures that govern communication between two different two
devices or people.
Layer Function
7. Application layer User application run here and generate request for data
transmission or open received files.
6. Presentation layer Adds formatting, display and encryption on information
to data
5. Session layer Sets up data transmission session between two
being presented.
communication
4. Transport layer Manages
devices. data transfer over the network to ensure
3. Network layer reliability.information is added to the data packet and
Address
routed to
2. Data link layer Adds error checking information and prepares data for
destination.
going into
1. Physical layer Data packetsconnections.
the physical are finally transmitted via the network and
through
transmission media in form of bits.
Network Topologies
This refers to the way in which computers her devices have been arranged or how data
is passed from one computer to another in the network.
Classifications of Network Topologies
1. Logical topology
2. Physical topology
Physical Topology
Bus Topology.
All the devices on the network are connected to a central cable called the bus r the
backbone. Each
end of the cable is connected to a terminator to avoid signal from bouncing back and
fourth on the cable causing signal distortion. The network address of computers on
the network is called the medium access control (MAC) address
Advantages of bus topology are:
It is to install.
It is less costly because doesn’t require a complete cable length per computer.
The disadvantages of bus topologies are:
Failure of central cable brings the whole network down.
Only one node can transmit message at a time.
Difficult to troubleshoot
Star Topology
All the devices are connected to the central hub (concentrator).
Computer
Central Computer
Computer comput
er
Computer Computer
Easy to configure.
If one node fails it doesn’t affect the other nodes.
It is easy to expand this topology.
Allows the centralization of key network resources.
Disadvantages
Ring Topology
All the components in this topology are connected to a single transmission cable forming
a ring styled connection of computers
Computer
Computer Computer
Computer
Computer
Advantages of Ring topology
Mesh Topology
Device in this topology are connected with repeating (redundant) cables between the
workstations. Each node is connected to one another.
Disadvantages
Expensive: Costly to provide the redundant cables.
Difficult to install and maintain.
Tree/Hierarchical Topology
All the nodes are connected in form of a tree with nodes as leaves and links as branches.
The branches are connected to one another by the means of devices called hubs.
Advantages of Hierarchical topology
If the node below the main node fails, the network does not fail.
Disadvantages
If the top node fails the entire network fails because it controls the other nodes.
Expensive to install since it is complex.
Printer
Hub
Bus/backbone
Network Security
Classification of Network Security
(i.) Share level security
(ii.) User level security
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you understand before
going to sleep!
Disadvantages of networking
- High initial installation cost (i.e., expensive to install).
- Security threats e.g., hacking, which posses a great danger to loss of
information
- Moral and cultural effects.
- Spread of terrorism, drug-trafficking and viruses.
- Over reliance on networks.
Disadvantage
o They suffer from high attenuation
o affected by electromagnetic fields
o It has low data transmission rates as compared to other cables
Advantages
o They have a large bandwidth (up to 1 Gbps) compared to twisted pair
cables
o They can carry voice, data and video signals simultaneously
o They are more resistant to radio and electromagnetic interference than
twisted pair cables
Disadvantages
o They are hard to work with
o They are expensive to buy & install
iii) Fibre optic cables is made of transparent glass and uses light to transmit data
signals from one point to another on the network.
Advantages
o It is immune to electromagnetic interference, and eavesdropping.
o It is fast and supports high bandwidth
o It has low attenuation; hence, a long distance can be covered
o It is small & light.
Disadvantages
o Difficult & expensive to install
o Once broken, it is difficult & expensive to repair.
iv) Wireless/microwave/radio transmission. (3mks)
In wireless transmission, no physical connections are used to transmit
data from one point to another. Instead a transmitting antenna & a
receiver aerial are used to facilitate the communication
Advantages
o wireless networks can span large geographical areas easily
o Can be used in very remote areas that do not have high cost physical
infrastructure like telephone lines
o Flexible.
Disadvantages
o The initial cost is very high
o It is relatively difficult to establish or configure.
7. Explain the function of the following network devices:
i) Network interface card (NIC)
NIC creates a physical link between the computer and the transmission media.
ii) Gateway
Gateways provide access to the Wide area networks & the Internet.
iii) Bridge
This is a network device that selectively determines the appropriate network
segment for which a message is meant to be delivered.
iv) Repeater
A repeater receives a weak signal on the network, cleans and amplifies it for transmission
over the next portion of the network. Signals become weak due to attenuation
8. List two advantages of cell phones over fixed lines. (2mks)
Are cheaper than fixed lines
Less prone to transmission errors
Can be used even where there are no telephone lines
Portable, i.e. can be carried around
9. a) Study the diagram below and answer the questions that follow:
i)
CHAPTER ELEVEN
Specific Objectives
• Financial Systems
a) accounting
b) banking
c) payroll
• Retail Systems
i) point of sale systems
ii) stock control
• Reservations Systems
i) hotels
ii) air-lines
• Communication Systems
i) Fax and telex
ii.) radio
iii.) television
iv.) video conferencing
v.) e-mail
vi.) telecommuting
vii.) internet
• Education
i) Computer Aided Learning (CAL)
ii) e-learning
iii) computer based simulation
• Industrial systems
i) simulation
ii) process control
iii) CAD (Computer Aided Design)/CAM (Computer Aided
Manufacture)
• Transportation Systems
i) air-traffic control
ii) Shipping control
iii) Automobile traffic control
• Entertainment Systems
i) Computers and movies
ii) Multi-media
• Virtual reality
i) Uses of virtual reality
ii) visor
• Library Systems
Library lending system
• Home use
• Health
• Expert systems
• Offices
Expert systems
• Offices
Expert systems
• Marketing
i) e-commerce
ii) business
Field work Report
Financial Systems
Payroll systems
This system helps an organization to process accurately information of employees including
gross pay and deductions and getting their net pay.
Accounting systems
(i.) Customer order entry and billing: Subsystem records incoming customer
orders authorizes delivery of items or services and produce invoice for customers
whoi don’t pay in advance
(ii.) Inventory management: Keeps track of items in stock and help the
management to determine which item to reorder.
(iii.) General ledger account: Keep track of how much a business makes and its
worthiness by summarizing the financial transactions producing a report called
balance sheet.
(iv.) Accounts payable: Keeps track of the amount the business sows other
organizations like the tax organizations, suppliers and transporters.
(v.) Accounts receivable: Keeps track or records the amount owed by the
customers.
Banking Systems
Education Systems
1. Computer Aided Instruction (CAI): The process of using computers to learn, drill
and practice particular education principles.
2. Computer Aided Learning (CAL): This is meant to drill the learner and present
particular education materials the way a teacher does in class.
3. E-learning: Lessons and lectures are presented from a central site like a website the
transacted to remote conference terminals or displayed on television screens.
4. Computer Aided Simulation: It refers to the science of representing behavior of
a real life situation by using computerized models.
Communication Systems
(i) Fax: During the process of sending the fax the document is scanned then
converted into analog form then transmitted. The receiver fax converts it into the
original softcopy the it prints the document.
(ii) Radio communication: Computers are used to:
Record and manage radio programmes for broadcasting.
Manage radio transmission and took performance.
Create slides, simulated objects and sound effects when preparing
electronic and printed media advertisements.
Downloading information from the internet like international news.
(iii) Television sets
Ceefax (teletext):This refers to the computerized service where news and
other information are provided on television screens to subscribers using an
add-on card. It involves simplex transmission
Videotext (view data)
(iv) Video conferencing: Use of computers, digital camera (camcorder), audio
capturing equipments and communication network to enable people from
different locations to see and talk to one another.
(v) Telecommuting: Situation where an employee work at home using a computer
connected to workplace network.
Advantages
Reduces transport cost.
Gives people the option of flex time.
Saves costs.
Reduces pollution and congestions inroads.
Disadvantages
Lack of discipline.
Work quality may suffer.
Few opportunities for brainstorming with colleagues.
Disappear of direct supervision.
(vi) Internet
World Wide Web: This is the collection of webpages, which may be made of
text, images, animations, sounds and video held on web servers.
E-mail: Electronic sending and receiving of messages, data, files or graphics in
the internet.
Industrial systems
(i) CAM and CAD
Computer Aided Design (CAD): Refers to the integration of computers
and graphics to aid in the design and drafting process. Examples of
software are: Softpan, Autocad and Archicad.
Computer Aided Manufacturing (CAM): It refers to the use of
computers to control machines in the manufacturing process e.g. Delta.
(ii) Industrial simulation: Allows activities that would otherwise be expensive
and dangerous to real life situation to be put under test. The Non Destructive
Testing (NDT) can be used to test motors and other machines with the use of
computers.
(iii) Process control: Computers are used to contol ongoing physical process
like regulating temperature, pressure and fluid flow.
Library Systems
(i) Lending system: Information system that manages the issuarance and the return
of the borrowed reading materials.
(ii) Inventory control: Manages the stock by checking for books currently in the
shelves and those on high demands for purpose of adding more.
(iii) Cataloging: A catalog refers to the collection of cards with information about
each book or reference materials found in the library. Electronic cataloging is
updated constantly when new reference materials are required.
Entertainment Systems
(i) Games: Games are now found on the Digital videos disks (DVDs) and
three- dimensional (3D) games are now possible on personal computers.
(ii) Music and video: Video compact disks (VCDs) and Digital versatile disks
(DVDs) have become a common feature in the music industry. In music industry
computers are used in recording, synthesizing, editing and adding special effects
on music. In video
industry, computers are used to produce high simulated and animated movies,
generate scenes and actors.
Transportation Systems
(i) Automobile traffic control: controlling traffic lights in road junctions.
(ii) Air traffic control: Computers are used to monitor air traffic movement, take
off and landing of aircrafts.
(iii) Shipping control: Controlling and guiding paths taken by spaceships and water
vessels as they travel to distant land using the Global Positioning System (GPS).
Home Use
(i) Preparing domestic budgets.
(ii) Entertainment.
(iii) Research.
(iv) Education.
Marketing
(i) Electronic commerce (e-commerce): Transactions are carried out directly
without physical interaction between the buyer and the seller.
(ii) Electronic presentation
(iii) Advertising
Virtual/ Artificial Reality/ Cyberspace/ Virtual Works/ Virtual
Environment
Condition in which a person is psychologically immersed in an artificial environment generated
by a computer system: Requirements
Head mounted display (HMD)/ Headgear: made up of two tiny display screens and
sound systems that channel images and sound from the source to the eye and early
presenting a stereo three dimensional (3D) sound effect in the virtual world.
Gloves: Allows the user to navigate through the virtual world and interact with virtual
objects. They have sensors that collect data about the movement of the hands and
relays the data into the system
Body suit: Worn during virtual reality session and iis made of condux
VR software
Applications
(i) Training in medicine, military education
(ii) Entertainment
(iii) Simulation
(iv) Study of human anatomy
(v) Exploring landscape, underneath
(vi) Crime scene reconstruction
Law Enforcement
Biometric analysis: fingerprints and facial identification.
Use of video camera e.g. in banks
Development of strong military bases which have international coordination by use of
a computer radar system
Jet fighters are computerized with correct control centers.
Teleworking
A situation where an employee works usually at home using at home using a computer
connected to work place.
Advantages
Reduces travel expenses due to reduction of unnecessary travel to work.
Gives people the option of flextime giving them the option of working long hours
part time.
Saves cost if people work from home.
Reduces pollution and congestion as a result of fewer people commuting to work.
Disadvantages
People who lack discipline may not do work, where as others may overwork.
Work quality may suffer if employees take the attitude “no one sees me doing the job
so it doesn’t matter.
Fewer opportunities of brain storming with colleagues.
Direct supervision disappears when people work from home.
End of topic
5. a) Write down all the input and output devices of an ATM machine of Pesa-
point in Kenya.
- Keyboard
- The ATM card
- Screen (Visual display)
- Printer
b) Telecommuting
A situation where an employee works in a location that is remote from the normal
place of work either on full-time or part-time basis.
10. Describe how computing has been applied to each of the following areas:
i) Transportation systems. (2mks)
- Used by railway corporations to coordinate the movement of their goods & wagons
- Used in airline industry for air traffic control, surveillance of airspace using radar
equipment
- Used in shipping control
- Used in automobile traffic control in busy towns, i.e. to simulate the timing of traffic
lights.
11. Suggest how computers may in future be made more user-friendly for
persons
that are:
a) Blind (1mk)
- Development of Braille keyboards, or engraved keyboards
- Computers can be installed with talking software, i.e., can store voice
patterns of the user
b) Without hands
- Use of voice-activated commands.
- Computers can be installed with powerful multimedia system & speech
recognition devices.
12. Give at least four reasons why a firm may decide to computerize its
operations
- Handling of errors easily
- Easy storage and retrieval of information
- Increased efficiency
- Higher quality work
- Reduced cost.
CHAPTER TWELVE
Specific Objectives
Content
a) Effects on employment
• job creation
• job replacement
• job displacement
b) Automated production
d) Breakthroughs
• Health care
• Education
• Communication
• Research
• Commerce
• Arts
• Entertainment
• Transport
e) Cultural effects
• Computer crimes
• Moral effects
• Artificial intelligence
i) expert systems
iii) robotics
Introduction
Issues Resulting from the use of ICT
Effects on employment
1. Job creation: New opportunities; computers operators, programmers, network
administration, information technology and information science managers, database
administrators, software developers, system analyst etc.
2. Job replacement: Clerical and repetitive tasks that require a large number of employees
have been made redundant. Computer illiterate are replaced.
3. Displacement: Loosing job, displacement of employees from another place
or department when computer skills are required.
Automated Production
Advantages
Disadvantages
Environment pollution: Huge garbage dumps of dead computer parts, printers, ink, tonner
cartridges, monitors and other computer accessories are disposed in landfills causing
environmental pollution. Nickel-cadmium laptop batteries that contain toxic cadmium which
when buried in a landfill can leak into underground water tables and attachment areas.
Cultural Effects
1. Flaming: writing online messages that use derogatory, obscene or dirty language.
2. Pornographic material
3. Computer crimes: hacking, eavesdropping, piracy etc.
4. ICT have erased people’s integrity by using computers as a tool to accomplice their
vices e.g. forge certificates, passports and other document.
5.
Breakthrough in ICT
It has changed lifestyles in health care, education, communication, research, commerce,
art and design, entertainment, transport etc.
4. Robotics: Computer controlled device that emulates human beings in carrying out
tasks that would otherwise be dangerous and different.
Merits
A robot can work on repetitive task without getting bored or tied.
Can work on dangerous areas unlike human beings
Increased production because they are capable of working at a
high speed
Leads to less operating expenses since less personnel is required
Demerits
Lead to job replacement
Expensive to install
3. Expanded superhighway
Involves integration of cabled and wired technologies for the purpose of data and
information transmission.
End of topic
6. State three reasons why users may resist the introduction of information and
communication Technology (ICT) to their place of work
(i) Fear of change- people are creatures of habit, hence are afraid of change
(ii) Fear of losing their jobs: By installing the computer into an organization, employees
fear that they might end up losing their jobs
(iii) Fear of failure – Since the computer is very new in a given working environment, the
people will be afraid that they might never get used to it.
(iv) Loss of control: The management fear that once a computer system is implemented,
they might lose control of the organization.
CHAPTER THIRTEEN
Specific Objectives
Content
i) Computer Operators
ii) Programmers
x) Computer Trainers
i) Colleges
ii) Institutions
iii) Polytechnics
iv) Universities
v) Research Institutions
Introduction
Computer Operator
1. Entering data into the computer for processing
2. Keeping up to date records (log files) of all information processing activities.
Computer Technician
1. Troubleshooting computer hardware software related problems
2. Assembling and upgrading computers and their components
3. Ensuring that all computer related accessories e.g. printers, storage media, modems
are in good working conditions
4. Help hardware engineers in designing and creating some computer components
e.g. motherboard, storage devices
System Analyst
1. Attributes/ Qualities of a good system analyst
2. Good problem solving skills and creativity: experience in problem solving
3. Good communication skills
4. Must have business knowledge
5. Technical knowledge in hardware, software and processing
Responsibilities
Reviewing the current manual system and making recommendations on
how to replace it
Preparing system specification
Working with programmers to construct and test the system
Preparing instruction manual
Coordinating training for users of the new system
Computer Programmer
1. Writes in-house application programs/ system programs
2. Customize commercial application packages to suite the organization needs
3. Test, install, debug and maintain programs developed
Software Engineers
1. Develop system and application software
2. Develop user and technical documents for the new software
3. Maintaining and updating software to meet day to day requirement while
overcoming challenges.
Computer Engineers
1. Design and develop computer components such as storage devices, motherboard
and other components
2. Determining the electrical power requirements of each computer component
3. Re-engineer computer components to enhance its functionality and efficiency
4. Design and develop engineers and manufacturing computer controlled devices such
as robots
Computer Trainer
1. Developing training reference materials
2. Guide learners on how to acquire knowledge through carrying out research
3. Advising learners on the best career opportunities in the broad field of ICT
4. Preparing learners for ICT examination
Network Administration
1. Set-up a computer network
2. Maintaining and enforce security measures on the network
3. Monitoring the use of network resources
4. Maintaining and troubleshooting network related problems
Computer Sales Representatives
1. Analyzing customer needs
2. Advertising them accordingly
Characteristics of a good computer sales representative
Must be confident
Be persuasive
Proficient in business communication
Research Institutions
1. Polytechnics: Offer diploma and certificate courses
2. Colleges: Offer diploma, certificate and craft courses.
End of topic
5. Explain two factors one would consider before enrolling for an ICT course in a
college
- The cost of the course
- Marketability of the course, i.e. whether it offers courses recognized both locally and
internationally.
- Basic course requirement, e.g. qualifications
- Job opportunities
PROJECT
Specific Objectives
GENERAL REQUIREMENTS
Schools intending to offer Computer Studies are expected to have the following minimum
equipment:
1) Computer Laboratory/classroom(s)
ii) Computer desks that accommodate monitor at eye level
iii) At least one computer per every four students (1:4) in Forms one and two and one
computer for every two students (1:2) for Forms three and four.
iv) At least one printer for every four computers
v) Printing Stationery
vi) Appropriate storage devices e.g. diskettes
vii) Storage facilities for diskettes and other consumables e.g. disk banks
viii) Appropriate software for the curriculum
ix) Relevant reference materials
Note: The computers to be used for the course should preferably be IBMs or
IBMcompatibles due to their low maintenance costs and availability of spare parts.
In addition to the above, the following facilities though not mandatory will greatly assist in
achieving the objectives of the course.
1. HARDWARE
i) The PCs should be Pentium I I or higher
ii) The PCs should have a CD-ROM drive
iii) At least one of the PCs in the school should be full multimedia
iv) A network environment
v) Internet connection
vii) Printers with graphic capabilities (not necessarily in colour)
2. SOFTWARE
i) It is recommended though not necessary that the operating system be a
Graphical User Interface (GUI)
ii) Software for the application packages may also be GUI - based which supports pointing
devices
iii) Up to date anti-virus software are highly recommended.