Introduction To Computers
Introduction To Computers
Class Format
• Lectures
• Discussion and Tests
• Student’ Presentation
Mode of Assessment
Course Topics:
Page 1 of 42
Introduction to Computers 2024
Today, almost all of us in the world make use of computers in one way or the other. It finds applications
in various fields of engineering, medicine, commercial, agriculture, education, research and others. Not
only in these sophisticated areas, but also in our daily lives, computers have become indispensable. They
are present everywhere, in all the devices that we use daily like planes, cars, games, washing machines,
microwaves etc. and in day to day computations like banking, reservations, Airtime & Mobile Money,
electronic mails, internet and many more.
✓ The word computer is derived from the word compute. Compute means to calculate. The
computer was originally defined as a superfast calculator. It had the capacity to solve
complex arithmetic and scientific problems at very high speed. But nowadays in addition
to handling complex arithmetic computations, computers perform many other tasks like
accepting, sorting, selecting, moving, comparing various types of information. They also
perform arithmetic and logical operations on alphabetic, numeric and other types of information.
This information provided by the user to the computer is data.
The data in one form, which is given to the computer, is the input or input data.
Information in another form that is presented by the computer after performing a process on it, called
output data.
The set of instructions given to the computer to perform various operations is called as the computer
program. The process of converting the input data into the required output form with the help of the
computer program is called as data processing. The computers are therefore also referred to as data
processors
✓ Therefore, a COMPUTER can also be defined as a fast and accurate data processing system
that accepts data, performs various operations on the data, has the capability to store the
data and produce the results on the basis of detailed step by step instructions given to it.
Course Objectives:
Page 2 of 42
Introduction to Computers 2024
Definitions:
✓ A computer is a programmable machine designed to perform arithmetic and logical
operations automatically and sequentially on the input given by the user and gives the
desired output after processing.
✓ A computer is an electronic device, operating under the control of instructions stored in its
own memory that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use
✓ A computer is fast and accurate data processing system that accepts data, performs
various operations on the data, has the capability to store the data and produce the
results on the basis of detailed step by step instructions given to it.
✓ A Computer is an electronic device that can perform activities that involve Mathematical,
Logical and graphical manipulations. Generally, the term is used to describe a collection
of devices that function together as a system.
A computer performs five major operations or functions irrespective of its size and make. These are
1. It accepts data or instructions as input,
2. It stores data and instruction
3. It processes data as per the instructions,
4. It controls all operations inside a computer, and
5. It gives results in the form of output.
Page 3 of 42
Introduction to Computers 2024
- Characteristics of Computers
The characteristics of computers that have made them so powerful and universally useful are speed,
accuracy, diligence, versatility and storage capacity. Let us discuss them briefly.
i. Speed
Computers work at an incredible speed. A powerful computer is capable of performing about 3-4
million simple instructions per second. computrs can perform millions of calculations in seconds
ii. Accuracy
In addition to being fast, computers are also accurate. Errors that may occur can almost always be
attributed to human error (inaccurate data, poorly designed system or faulty instructions/programs
written by the programmer)
iii. Diligence: Unlike human beings, computers are highly consistent. They do not suffer from human
traits of stress, boredom, sickness and tiredness resulting in lack of concentration. Computers,
therefore, are better than human beings in performing voluminous and repetitive jobs.
iv. Versatility
Computers are versatile machines and are capable of performing any task as long as it can be
broken down into a series of logical steps. The presence of computers can be seen in almost every
sphere – Railway/Air reservation, Banks, Hotels, Weather forecasting and many more.
v. Storage Capacity
Today’s computers can store large volumes of data. A piece of information once recorded (or
stored) in the computer, can never be forgotten and can be retrieved almost instantaneously.
vi. Precision: Computers are used to perform tasks in a way that ensures precision & exactness.
vii. Automation: Computers can be instructed to perform complex tasks automatically (which
increases the productivity).
viii. Cost effectiveness: Computers reduce the amount of paper work and human effort, thereby
reducing costs.
Class Discussion:
Thinking of the advantages & disadvantages of computers… where do the following points fall?
Other characteristics of computers:
1. Computers are made and programmed by human.
2. Computers have no feelings.
3. Computers are accurate.
Page 4 of 42
Introduction to Computers 2024
- “3.6 GHz Intel Core i7-7700 processor and 12GB RAM offers powerful performance for
multimedia projects, smooth multitasking, and effortless everyday computing.”
o (3.6 GHz 4th generation Intel Core i7-4790, 8 GB RAM)
- “1TB hard drive large digital warehouse to store all your files, photos, videos, music, and much
more” – 6 USB ports, including 2 USB 3.0 ports
- “HDMI output delivers crisp high-quality visuals and high-fidelity audio to a home theatre or
projector through a single cable connection”
o FYI: estimated cost 700 – 1,000 $ in 2023
- Last accessed from www.bestbuy.ca July 2017 (June 2015)
# Which Type of Computer Is Best for You?
- (This is very basic material to bring everyone up to a basic level) – Later sections can be more
challenging (e.g. using databases)
- No single model (let alone manufacturer) is best for everyone
- Ask yourself how you will use your machine, what things are the most important to you:
o Portability?
o Touch screen capability?
o Will you run programs that will ‘push’ your system, e.g., video editing, gaming, image and
3D graphic editing or will you use your computer mainly for common tasks (e.g., word
processing, entertainment, online browsing)
o Is gaming in general (even ones that don’t ‘push’ your system) important?
▪ If so consider a computer that is more commonly used.
o Future expandability and upgrade capability of your machine?
# Most Important Hardware (When Choosing A Computer)
- (This refers to hardware that distinguishes one computer from another computer, other pieces such
as hardware such as some sort of network connection is also crucial but not significantly different
from computer-to-computer).
- Processor (CPU – or the APU for some AMD models)
- Memory (RAM)
- Storage (hard drive)
Page 5 of 42
Introduction to Computers 2024
The computers of today are vastly different in appearance and performance as compared to the computers
of earlier days. But where did this technology come from and Where is it heading? To fully understand
the impact of computers on today’s world and the promises they hold for the future, it is important to
understand the evolution of computers.
History of Computers:
The term Computer came from the Latin word “computare” which means – to reckon – to sum up – to
calculate. Webster’s dictionary defines “computer” as any programmable electronic device that can
accept, store and process data and give output.
The old oxford English dictionary describes a computer as a person employed to make calculations
“before the machine, people were hired to do calculations”
- Abacus 3000 BC: A simple counting aid, was most likely invented in Babylonia
- The slide rule 1622: is a mechanical precursor of the pocket calculator, it was invented in England
by William Oughtred and was very commonly used until the 1970s when it was made obsolete for
most purposes by electronic calculators.
Page 6 of 42
Introduction to Computers 2024
Page 7 of 42
Introduction to Computers 2024
Page 8 of 42
Introduction to Computers 2024
Appliances of computers:
Today computers find widespread applications in all activities of the modern world.
Some of the major application areas include:
- Scientific, Engineering and Research: This is the major area where computers find vast
applications. They are used in areas, which require lot of experiments, mathematical calculations,
weather forecasting, and complex mathematical and engineering applications. Computer Aided
Design (CAD) and Computer Aided Manufacturing (CAM) help in designing robotics, automobile
manufacturing, automatic process control devices etc.
- Business: Record keeping, budgets, reports, inventory, payroll, invoicing, accounts are all the
areas of business and industry where computers are used to a great extent. Database management
is one of the major areas where computers are used on a large scale. The areas of application here
include banking, airline reservations, etc. where large amounts of data need to be updated, edited,
sorted, and searched from large databases.
- Information: This is the age of information. Television, Satellite communication, Internet,
networks are all based on computers.
- Education: Online training programs for students are becoming popular day by day. All the major
encyclopedias, dictionaries and books are now available in the digital form and therefore are easily
accessible to the student of today.
- Games and Entertainment: Computer games are popular with children and adults alike.
Computers are nowadays also used in entertainment areas like movies, sports, advertising etc.
- Agriculture:
i. Bioinformatics: The present role of bioinformatics is to aid agriculture researchers in gathering
and processing genomic data to study protein function.
ii. Remote Sensing & Geographic Information System: The trees, which are affected by disease, or
insect attack can be detected by remote sensing techniques much before human eyes see them. The
application of remote sensing data taken momentum in the field of agriculture and crop studies
especially crop production forecasting covering both crop inventory and crop yield forecast
models, drought assessment, soil mapping and soil degradation, command area monitoring, flood
damage assessment, land suitability mapping, insect pest infestation forecasting and widespread
availability of satellite signals that allow private use of Global Positioning System (GPS) made it
possible for farmers to spatially locate data from precision farming applications.
iii. Precision agriculture: Precision Agriculture is conceptualized by a system approach to re-
organize the total system of agriculture towards a low-input, high-efficiency, sustainable
agriculture. This new approach mainly benefits from the emergence and convergence of several
technologies, including the (GPS), geographic information system (GIS), miniaturized computer
components, automatic control, in-field and remote sensing, mobile computing, advanced
information processing, and telecommunications. Agricultural research is now capable of
Page 9 of 42
Introduction to Computers 2024
gathering more comprehensive data on production variability in both space and time. The desire to
respond to such variability on a fine-scale has become the goal of Precision Agriculture
- HealthCare:
Computers have become important part in hospitals, labs, and dispensaries. The computers are
being used in hospitals to keep the record of patients and medicines. It is also used in scanning and
diagnosing different diseases. ECG “electrocardiogram”, EEG “electroencephalogram”, MRI
“Magnetic resonance imaging”, Ultrasounds and CT Scans “Computerized Tomography” etc. are
also done by computerized machines. Some major fields of health care in which computers are
used are:
o Diagnostic System - Computers are used to collect data and identify cause of illness.
o Lab-diagnostic System - All tests can be done and reports are prepared by computer.
o Patient Monitoring System - These are used to check patient's signs for abnormality such
as in Cardiac Arrest, ECG etc.
o Pharma Information System - Computer checks Drug-Labels, Expiry dates, harmful
drug’s side effects etc.
o Surgery: Nowadays, computers are also used in performing surgery
o Medical Research: some biological disease, diagnosis, tests, drugs are contagious or even
toxic only machines can undertake.
Classifications of computers:
Types of
Computers
Page 10 of 42
Introduction to Computers 2024
1. Microcomputer:
Microcomputers are generally referred to as Personal Computers (PCs). They have smallest
memory and less power. They are widely used in day-to-day applications by students, lecturers,
scientist, reporters, etc. uses of Microcomputers: Word Processing, Home entertainment, Home
banking, Printing, Surfing the internet…
2. Minicomputer: Mini computers are more powerful than the microcomputers. They have higher
memory capacity and more storage capacity with higher speeds. These computers are mainly used
in process control systems. They are mainly used in applications like payrolls, financial
accounting, Computer aided design etc.
3. Mainframe:
Mainframe computers are very large computers which process data at very high speeds of the
order of several million instructions per second. They can be linked into a network with smaller
computers, microcomputers and with each other. They are typically used in large organizations,
government departments etc. mainly used in banks, Airline reservation, Weather forecasting,
Animated Cartoon etc.
Mainframe Supercomputer
Page 11 of 42
Introduction to Computers 2024
4. Supercomputer:
A super computer is the fastest, most powerful and most expensive computer, which is used for
complex tasks that require a lot of computational power. Super computers have multiple
processors, which process multiple instructions at the same time. Used by applications for
molecular chemistry, nuclear research, weather reports, processing geological data and advanced
physics Consists of several computers that work in parallel as a single system
Computer software, or just software, is the collection of computer programs and related data that provide
the instructions telling a computer what to do. The term was coined to contrast the old term hardware
(meaning physical devices). In contrast to hardware, software is intangible, meaning it "cannot be
touched". Software is also sometimes used in a more narrow sense, to include application software only.
Sometimes the term includes data that has traditionally not been associated with computers, such as film,
presses and records.
1. SYSTEM SOFTWARE
System software is the program that controls computer hardware and provide an environment for running
application software. It also maintains computer operation efficiently. The main components of system
software are the operating system “such as MS Windows, Unix and Apple's macOS” network operating
system include Novell NetWare, Microsoft Windows NT, Microsoft Windows 2000, Microsoft Windows
XP, Sun Solaris, Linux.
a) The computer BIOS and device firmware, which provides basic functionality to operate and control
the hardware connected to or built into the computer. The BIOS usually appears – before the
Windows “OS” starts – in-form of the name or logo of the computer being used. E.g. if you are using
HP computer, the logo of HP appears before the Windows starts. Similarly, if you are using DELL
computer, the name DELL will appear first and so on.
b) The Operating System is defined as an integrated set of programs which manage the various
resources and operations of a computer system. The operating system acts as an interface between the
humans and the computer. The operating system ensures smooth and efficient operation of a
computer.
o Memory management: Allocation of main memory and other storage to the system programs and
the user data and programs.
o Input/output management: Management of the input/output devices and their assignment to the
various programs that are being executed
o File management: The files have to be stored in various storage devices. They have to be
transferred from one storage device to another. This is taken care of by the Operating System.
Page 12 of 42
Introduction to Computers 2024
o Data security and integrity: The data and programs have to be handled in such a way that they do
not interfere with each other.
o Assigning priority to jobs: The operating system is the one which has to decide and allot priority
to the jobs which are to be executed.
- The Operating System allows the parts of a computer to work together by performing tasks like
transferring data between memory and disks or rendering output onto a display device. It also
provides a platform to run application software.
- An operating system is a program that acts as an interface between the software and the computer
hardware.
- It is specialized software that controls and monitors the execution of all other programs that reside
in the computer, including application programs and other system software.
2. APPLICATION SOFTWARE
Application software is computer software designed to help the user to perform singular or multiple
related specific tasks. Examples include enterprise software, accounting software, office suites, graphics
software, anti-Virus SW and media players.
Page 13 of 42
Introduction to Computers 2024
Unit Function
1.Input device Reads information from input media and enters to the computer in a coded form
2.CPU - Stores program and data => Memory Unit
- Performs arithmetic and logical functions => Arithmetic/logic unit
- Interprets program instructions and controls the input and output devices =>
Control unit
3. Storage device where data are stored
4. Output device decodes information and presents it to the user
Page 14 of 42
Introduction to Computers 2024
Central Processing Unit “CPU”: It is the part of the computer that carries out the instructions of a
computer program. It is the unit that reads and executes program instructions. Hence it is known as the ―
brain of the computer.
CPU has two main parts:
1. CPU – where the actual processing takes place; and
2. Main memory – where data are stored.
The contents of main memory can be transferred to auxiliary storage devices such as hard disks, floppy
diskettes, zip disks, compact disks, or USB flash disk.
The microprocessor is housed on a tiny silicon chip. Chip contains millions of switches and pathways that
help your computer make important decisions.
CPU knows which switches to turn on and which to turn off because it receives its instructions from
computer programs (software).
CPU has three primary sections: Arithmetic/logic unit, Control unit, Memory Unit as show on the table
above.
- The Motherboard
The motherboard serves as a single platform to connect all of the parts of a computer together. A
motherboard connects CPU, memory, hard drives, optical drives, video card, sound card, and other
ports and expansion cards directly or via cables. It can be considered as the backbone of a
computer.
Input Devices
Devices used to provide data and instructions to the computer are called Input devices.
Some important input devices are
Key board, Mouse, Scanner, MICR, Web camera, Microphone etc.
1. Keyboard: is an input device used for typing text into the computer.
Page 15 of 42
Introduction to Computers 2024
2. Mouse: is an input device that controls the movement of the cursor on a monitor.
3. Scanner: It is an input device that can read text or illustrations printed on paper and translate into
digital form.
Activity: spotting the following pictures, discuss the facts that made them input devices!
Output devices
Any device that is capable of representing information on a computer is called an Output device.
Output devices receive information from the CPU and present it to the user in the desired form.
Page 16 of 42
Introduction to Computers 2024
2. Printer: A printer is used to transfer data from a computer onto paper. The paper copy obtained
from a printer is often referred as ―printout‖.
RAM:
RAM is also known as read/write memory as information can be read from and written onto it. RAM is a
place in a computer that holds instructions for the computer, its programs and the data. The CPU can
directly access the data from RAM almost immediately. However, the storage of data and instructions in
RAM is temporary, till the time the computer is running. It disappears from RAM as soon as the power to
the computer is switched off. i.e. it is volatile memory.
RAMs
ROM:
It is called Read-only memory as information can only be read from and not written or changed onto
ROM. ROM is the built-in‘memory of a computer. It stores some basic input – output instructions put by
the manufacturer to operate the computer. The storage of data and instructions in ROM is permanent.
It does not depend on the power supply. i.e. it is non-volatile memory.
NB:
➢ RAM, refers to the amount of ‘working memory’ that your computer has. More specifically, RAM is
the feature of a computer that allows programs to run. The more RAM that a computer has, the faster
programs will run. Having more RAM also allows the user to run more programs concurrently.
Page 17 of 42
Introduction to Computers 2024
➢ ROM, refers to the storage space that a computer can hold. A computer ROM can only hold so many
programs and files. For this reason, ROM has been likened to ‘long-term memory’.
Secondary memory: The primary memory which is faster (and hence expensive) is generally not
sufficient for large storage of data. As a result, additional memory, called the ―auxiliary‖ or ―secondary
memory‖ is used. It is also referred as ―backup storage‖ as it is used to store large volume of data on a
permanent basis which can be transferred to the primary memory whenever required for processing.
Data are stored in secondary storage in the same binary codes as in the main (primary memory) storage.
Some of the devices of secondary storages are Floppy Disk, Hard Disk, CD-ROM, DVD and Flash drive.
➢ Hard Disk: is a permanent part of the computer where data and programs are saved. These disks
have storage capacities ranging from 1GB, 80 GB, 500 GB, to 1000 GB and more. Hard disks are
rewritable.
Magnetic hard drive (HDD) Solid state hard drive
(SSD)
Slower Faster (roughly double)
Less expensive More expensive
Hard drives with the highest Lower maximum storage
capacities are only magnetic capacity
Less ‘durable’ (may be affected More durable (no moving
by magnetic fields, physical parts)
jarring, temperature extremes)
➢ CD-ROM: CD-ROM stands for Compact Disk–Read Only Memory. It is used to store a wide
variety of information. Its main advantage is that it is portable and can hold a large amount of data.
➢ Flash Drive: It is a small, portable device that can be used to store, access and transfer data. Due
to its small size, it is commonly called Pen drive. It is also called USB drive. We can read, write,
copy, delete, and move data from computer to pen drive or pen drive to computer. It comes in
various storage capacities of 2GB, 4GB, 8GB etc. It is popular because it is easy to use and small
enough to be carried in a pocket. This device is plugged into the USB port of the computer and the
computer automatically detects this device.
Page 18 of 42
Introduction to Computers 2024
Memory Units:
Page 19 of 42
Introduction to Computers 2024
Computer Components:
Computer
Hardware Software
Computer is an electronic device that can perform activities that involve Mathematical, Logical
and graphical manipulations.
a) Computer Software are the set of programs that makes the hardware perform a set of tasks in
particular order.
i. System software: consists of a group of programs that control the operations of a computer
equipment including functions like managing memory, managing peripherals, loading,
storing, and is an interface between the application programs and the computer. MS DOS
(Microsoft’s Disk Operating System), UNIX are examples of system software.
ii. Application software: Software that can perform a specific task for the user, such as word
processing, accounting, budgeting or payroll, fall under the category of application
software.
iii. Utility Software: These are a set of programs or tools which are used in program
development or for performing limited tasks, eg. scandisk.
iv. Firmware: programs available on hardware are called Firmware.
b) Computer hardware are the physical parts or devices of the computer system
Page 20 of 42
Introduction to Computers 2024
What is data? Data can be defined as a representation of facts, concepts or instructions in a formalized
manner which should be suitable for communication, interpretation, or processing by human or electronic
machine.
Data is represented with the help of characters like alphabets (A-Z,a-z), digits (0-9) or special
characters(+,- ,/,*,<,>,= etc.).
What is Information?
Information is the processed data which has some meaningful values for the receiver & on which
decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following characteristics
Data processing is the re-structuring or re-ordering of data by people or machine to increase their
usefulness and add values for particular purpose. Data processing consists of basic steps input, processing
and output. These three steps constitute the data processing cycle.
Input - In this step the input data is prepared in some convenient form for processing. The form will
depend on the processing machine. For example, when electronic computers are used, the input data could
be recorded on any one of several types of input medium, such as flash disks, HDD and so on.
Processing - In this step input data is changed to produce information in a more useful form. For
example, pay- checks may be calculated from the time cards, or a summary of sales for the month may be
calculated from the sales orders, or student’s results for a semester may be calculated from tests,
assignments and final exam.
Output -Here the result of the proceeding processing step are collected. The particular form of the
output data depends on the use of the data. For example, output data may be pay-checks for employees, or
academic records for students.
Page 21 of 42
Introduction to Computers 2024
Data Gathering
1. Data is often collected to make statements or tell a story about a group or “population” of
interest. However, often a population is so large that we cannot possibly measure the variables of
interest for every person in the population. The alternative is to select a “sample” from the
population of interest. The tricky part of taking a sample is ensuring that the sample is
representative of the larger population about which you would like to make statements. The
illustration below may be helpful in understanding this:
2. A “population” is the larger group you want to learn about; a “sample” is a subset of that
population that is examined in order to generalize to the larger group.
3. Therefore, Data gathering is the process of collecting data and facts for certain use.
4. The early activities to conduct any type of research aimed at understanding the core problem that
need to be solved
5. There is often little existing documentation on current information system such as the campus
library
6. The existing documentation is likely not centralized e.g. it may be in personal desk, drawers etc.
7. The existing documentation is often out of date - need to observe what actually happens
Challenges for collecting data:
▪ There is need to have a checklist of types of information or documentation to gather/collect
▪ Challenges are:
Page 22 of 42
Introduction to Computers 2024
Sources of Information
• People
• Existing documentation will include many of:
– Organization charts
– Methods and procedures manuals
– Job descriptions
– Forms and reports
– Policy manuals
– Computer program documentation
– Computer operation manuals
– External sources (other companies, vendors)
Methods for gathering information
• Fact-finding techniques
– Interviewing
– Questionnaires
– Observation
– Documentation review
– Prototyping
• Which methods can be used to record student’s results?
Something to think about: Match the Methods above with their respective definitions…
- Is a planned meeting during which you obtain information from users of the existing system?
- Is a research instrument consisting of a series of questions for the purpose of gathering
information from respondents?
- Is the active acquisition of information from a primary source? observation can involve the
recording of data via the use of instruments
- Is the process whereby each party to a case sorts through and analyzes the documents and
data they possess (and later the documents and data supplied by their opponents through
discovery) to determine which are sensitive or otherwise
- is an early sample, model, or release of a product built to test a concept or process or to act as
a thing to be replicated or learned from
Page 23 of 42
Introduction to Computers 2024
DATA ANALYSIS:
8. People turn to data because they have a story to tell or a problem to solve. Most people start with a
question, then look to data for answers. Thus,
9. DATA ANALYSIS “DATA STUDY” can be defined as the process of identifying core problems
and propose solution to it.
10.Data is used to describe things by assigning a value to them. The values are then organized,
processed, and presented within a given context so that it becomes useful. Data can be in different
forms which can be categorized into qualitative and quantitative: “checklist of types of
information”
Qualitative data
- “Qualitative data” is data that uses words and descriptions. Qualitative data can be observed
but is subjective and therefore difficult to use for the purposes of making comparisons.
Descriptions of texture, taste, or an experience are all examples of qualitative data. Qualitative
data collection methods include focus groups, interviews, or open-ended items on a survey. The
OMS questionnaires do not collect qualitative data, but it is helpful to be aware of the
differentiation.
Quantitative data
- “Quantitative data” is data that is expressed with numbers. Quantitative data is data which can
be put into categories, measured, or ranked. Length, weight, age, cost, rating scales, are all
examples of quantitative data. Quantitative data can be represented visually in graphs and tables
and be statistically analyzed. The OMS questionnaires collect quantitative data.
Page 24 of 42
Introduction to Computers 2024
Page 25 of 42
Introduction to Computers 2024
As with all referencing styles, there are two parts: citing, and the reference list.
- Accurate referencing is a key component of good academic practice and enhances the presentation of
your work: it shows that your writing is based on knowledge and informed by appropriate academic
reading.
- You will ensure that anyone reading your work can trace the sources you have used in the
development of your work, and give you credit for your research efforts and quality.
- If you do not acknowledge another person’s work or ideas, you could be accused of plagiarism.
Plus your lecturers are very keen to see good reference lists. Impress them with the quality of the
information you use, and your references, and you will get even better marks.
✓ What Is A Citation?
When you use another person’s work in your own work, either by referring to their ideas, or by including
a direct quotation, you must acknowledge this in the text of your work. This acknowledgement is called a
citation.
When you are using the Harvard style, your citation should include:
Citing means repeating or copying out someone else’s words. You should cite when a formulation is so
precise that it would lose its meaning or significance if worded differently. When you cite someone else’s
work, you must put the text between quotation marks and provide a source reference.
Page 26 of 42
Introduction to Computers 2024
Citation styles
In the academic world there are strict rules for setting out source references. Each discipline has its own
citation style. Also, references are set out differently depending on whether you use them in a
bibliography, in the text itself, in a footnote or in an endnote. During your study you will learn which
citation styles should be used for your discipline.
- APA-style:
HAUCK, MARKUS. (November 01, 2009). Global warming and alternative causes of decline in arctic-
alpine and boreal-montane lichens in North-Western Central Europe. Global Change Biology, 15,11,
2653-2661.
- Chicago-style:
HAUCK, MARKUS. 2009. "Global warming and alternative causes of decline in arctic-alpine and boreal-
montane lichens in North-Western Central Europe". Global Change Biology. 15 (11): 2653-2661.
- MLA-style:
HAUCK, MARKUS. "Global Warming and Alternative Causes of Decline in Arctic-Alpine and Boreal-
Montane Lichens in North-Western Central Europe." Global Change Biology. 15.11 (2009): 2653-2661.
Print.
- Turabian:
HAUCK, MARKUS. 2009. "Global Warming and Alternative Causes of Decline in Arctic-Alpine and
Boreal-Montane Lichens in North-Western Central Europe". Global Change Biology. 15, no. 11: 2653-
2661.
The bibliography, source list or list of references is placed at the end of the text to provide an overview of
the information sources you have consulted. There are strict rules for compiling these lists, and there are
different styles for different disciplines (APA, MLA, Chicago, Vancouver, and Harvard).
Footnotes
Some citation styles do not use a bibliography, but footnotes to indicate the sources used. This means that
the source references appear at the bottom of each page instead of at the end of the text.
Page 27 of 42
Introduction to Computers 2024
➢ Avoiding plagiarism:
What is plagiarism?
Plagiarism means presenting someone else’s work as your own. Plagiarism is intellectual theft and is
regarded as academic misconduct.
Avoiding plagiarism
Plagiarism can be committed unintentionally. Make sure you always provide proper source references so
that others can see which ideas are not your own but found in publications by other authors. Providing
proper source references also enables other people to check these sources. See the boxes below for tips on
how to avoid plagiarism.
You should always provide a source reference when you use someone else’s work in your own text,
irrespective of whether you are citing directly from the work or describing it in your own words
(paraphrasing).
Statements such as “The rise of the internet has had a major impact on the development of society” do not
require a source reference. This statement is so widely known and accepted that it can be regarded as a
generally-known fact.
Grey areas
Unfortunately, it is not always clear whether a source reference is required. In such cases you will have to
decide for yourself. Your decision should be based on the principle that you do not want to present
someone else’s work as your own.
Sanctions
Committing plagiarism can have serious consequences for the perpetrator within the University, such as
exclusion from course units and even degree programs.
Page 28 of 42
Introduction to Computers 2024
A computer network is a system in which multiple computers are connected to each other to share
information and resources. OR
A network is an arrangement that enables two or more computers to communicate (talk) to each other.
Network Cables
Network cables are used to connect computers. The most commonly used cable is Category 5 cable RJ-
45.
Page 29 of 42
Introduction to Computers 2024
Distributors “Switch”
Router
Types of Networks
Networks can range from a small group of computers linked together in a class room to thousands
of computers linked together across the globe. Depending on the geographical location, networks
can be classified as
a) Local Area Network “LAN”:
If a network is confined to a single location, typically a building, it is called a LAN.
Ex: Set of interconnected computers within an office.
b) Metropolitan Area Network “MAN”:
A metropolitan area network is a network that is larger than a LAN, it connects the computers
distributed across multiple buildings.
Ex: the computers in all branches of an office within a city.
c) Wide Area Network “WAN”:
- When a network is located over wide areas such as cities, states, countries or even continents, it is
called a WAN.
- Ex:
o Computers in different branches of a Globalized company.
o Internet
Page 30 of 42
Introduction to Computers 2024
Internet
The internet is a global connection of computers. These computers are connected via a huge network of
telecommunication links. The internet allows you to access to a whole resource of data and information
stored at different sites (called hosts) and locations around the world. The communication links which
inter connect each host computer use a common method of transmission known as TCP/IP, which stands
for Transmission Control Protocol / Internet Protocol.
The internet is a worldwide network of computers all connected to each other by telephone lines, cables
and satellites. It’s like a huge library of information.
a) Modem:
A modem is a peripheral device that allows a computer to connect and communicate with other
computers. Modem stands for Modulator Demodulator.
b) Web Browser:
A browser is a software program that is necessary in order to view web pages on the web.
Ex: Internet Explorer, Netscape Navigator, Mozilla Firefox, Microsoft outlook express etc.
Page 31 of 42
Introduction to Computers 2024
c) Telephone line: A telephone line is required to transfer data from one computer to another. The
computer is connected to a modem, which, in turn, connected to a telephone line.
d) Subscription with Internet service provider (ISP):
ISPs are companies that provide access to the internet. We need subscription with any ISP to get an
Internet connection. Some of the ISPs in India are VSNL, MTNL, Sify, Specrta Net etc.
Intranet
Versus
Intranet Internet
Page 32 of 42
Introduction to Computers 2024
1. Internet is general to PCs all over the world whereas Intranet is specific to few PCs.
2. Internet has wider access and provides a better access to websites to large population whereas
Intranet is restricted.
3. Internet is not as safe as Intranet as Intranet can be safely privatized as per the need.
How the Internet Works
Computers can be connected together on networks. A computer on a network can communicate with
other computers on the same network by exchanging data and files or by sending and receiving
messages. Computers on a network can even work together on a large computation.
Today, millions of computers throughout the world are connected to a single huge network called the
Internet. New computers are being connected to the Internet every day. Computers can join the Internet
by using a modem to establish a connection through telephone lines. Broadband connections to the
Internet, such as DSL and cable modems, are increasingly common. They allow faster data transmission
than is possible through telephone modems.
There are elaborate protocols for communication over the Internet. A protocol is simply a detailed
specification of how communication is to proceed. For two computers to communicate at all, they must
both be using the same protocols. The most basic protocols on the Internet are the Internet Protocol (IP),
which specifies how data is to be physically transmitted from one computer to another and the
Transmission Control Protocol (TCP), which ensures that data sent using IP is received in its entirety
and without error. These two protocols, which are referred to collectively as TCP/IP, provide a
foundation for communication. Other protocols use TCP/IP to send specific types of information such as
web pages, electronic mail, and data files.
All communication over the Internet is in the form of packets. A packet consists of some data being sent
from one computer to another, along with addressing information that indicates where on the Internet that
data is supposed to go. Think of a packet as an envelope with an address on the outside and a
message on the inside. (The message is the data.) The packet also includes a “return address,” that
is, the address of the sender. A packet can hold only a limited amount of data; longer messages
must be divided among several packets, which are then sent individually over the net and reassembled
at their destination.
Page 33 of 42
Introduction to Computers 2024
Every computer on the Internet has an IP address , a number that identifies it uniquely among all
the computers on the net. The IP address is used for addressing packets. A computer can only send data
to another computer on the Internet if it knows that computer’s IP address. Since people prefer to use
names rather than numbers, most computers are also identified by names, called domain names.
For example, the main computer of the Mathematics Department at Hobart and William Smith
Colleges has the domain name math.hws.edu. (Domain names are just for convenience; your
computer still needs to know IP addresses before it can communicate. There are computers on the
Internet whose job it is to translate domain names to IP addresses. When you use a domain name, your
computer sends a message to a domain name server to find out the corresponding IP address. Then, your
computer uses the IP address, rather than the domain name, to communicate with the other computer.)
The Internet provides a number of services to the computers connected to it (and, of course, to the users of
those computers). These services use TCP/IP to send various types of data over the net. Among the most
popular services are instant messaging, file sharing, electronic mail, and the World-Wide Web. Each
service has its own protocols, which are used to control transmission of data over the network. Each
service also has some sort of user interface, which allows the user to view, send, and receive data through
the service.
For example, the email service uses a protocol known as SMTP (Simple Mail Transfer Protocol)
to transfer email messages from one computer to another. Other protocols, such as POP and IMAP, are
used to fetch messages from an email account so that the recipient can read them. A person who
uses email, however, doesn’t need to understand or even know about these protocols. Instead, they are
used behind the scenes by the programs that the person uses to send and receive email messages. These
programs provide an easy-to-use user interface to the underlying network protocols.
The World-Wide Web is perhaps the most exciting of network services. The World-Wide Web allows you
to request pages of information that are stored on computers all over the Internet. A Web page can
contain links to other pages on the same computer from which it was obtained or to other computers
anywhere in the world. A computer that stores such pages of information is called a web server. The
user interface to the Web is the type of program known as a web browser. Common web browsers
include Internet Explorer and Firefox. You use a Web browser to request a page of information. The
browser will send a request for that page to the computer on which the page is stored, and when a
response is received from that computer, the web browser displays it to you in a neatly formatted form. A
web browser is just a user interface to the Web. Behind the scenes, the web browser uses a protocol
called HTTP (Hyper Text Transfer Protocol) to send each page request and to receive the response from
the web server
Page 34 of 42
Introduction to Computers 2024
It refers to the collection of information accessible on the internet. The web is similar to a library. It
consists of millions & millions of pages of text, pictures, sounds and animation on various topics. These
pages, called web pages are stored on different computers that are connected to the internet. The web
pages have links between them i.e when we click a certain word or picture in a page, it will take us to
another page. These words or pictures that help to move from one page to another are called hyperlinks. A
collection of related web pages is known as a web site. A web site can be accessed by means of a unique
name assigned to it.
Internet was initially designed for the transmission of text basing on the protocols mentioned. In order to
transmit a graphically designed web page complete with pictures, embedded sound and animation a
special language was designed which is referred to as Hyper Text Mark up Language (HTML). HTML
uses special text codes to define the various elements of a web page.
The WWW support a protocol called Hyper Text Transfer Protocol (HTTP). All internet servers cannot
support HTTP and so the web can be regarded as a subset of the larger internet. HTTP provides a method
of transmitting a professionally laid out page over the text-based internet.
Uniform Resource Locator: (URL): Each web site has a unique address commonly referred to as a URL.
A URL specifies the exact location of the web page on the internet.
Page 35 of 42
Introduction to Computers 2024
E-mail or electronic mail is a service for sending or receiving messages electronically through a computer
network. The electronic mail uses various technologies that support electronic transmission of text, data
and graphics.
1. it is much faster than the normal mail. Messages can be sent within a matter of seconds to any part
in the world.
2. it can be sent to many people at the same time
3. E-mail is cheaper than a phone call and an ordinary mail
4. it can access information and file libraries on request
5. E-mail user can have a mail box which is accessed through a computer terminal
6. An E-mail message consists of two parts
a. A header specifying the address of the sender and the address of the receiver
b. The text of the message
7. The mailing system allows selecting messages for reading, displaying, saving, deleting,
forwarding and replying.
8. Mailing list can be created to send the same message to a group of people
E-Mail Address:
Ex: [email protected] in this Statistics is the user name and his account is in the domain
gmail.com Both the names are separated by the @symbol.
Page 36 of 42
Introduction to Computers 2024
Search Engines:
Search engines are utilities used to search for information on the web. A user interface is provided where
you can enter the word or phrase you are searching for. The search engine looks for the keywords we have
entered and returns the results of the search, providing links to relevant Web sites for us to choose from.
Some commonly used search engines are MSN, Alta Vista, Google, Yahoo! search and Infoseek etc.
The internet has millions of websites. You can search for almost anything – from recipes and local news,
to history and gardening tips.
• A search engine will scan through thousands of websites and WebPages on the internet and collect and
organize the information it thinks is most relevant to you.
You can make your searching more effective by following a few handy tips:
• Use key words not full sentences or questions. For example, instead of typing “I need tips for
diagnosing tuberculosis (TB)” simply type “Diagnosing Tuberculosis”
• If you can’t find what you want, try to use different words or a different way of expressing it
• Practice putting key words into the search box and pressing the search button
• A list of search results will appear, with the most popular websites near the top of the list
Page 37 of 42
Introduction to Computers 2024
Preliminary:
For so many reasons, Wellbeing has always been an overriding concern of human kind. Therefore, for
human beings to survive they need to know how to protect themselves and what to protect themselves
from. Similarly, for Computer Technology to function and encounter its purpose they need to be secured
as well. Thus, when taking different procedures to secure our computer systems, this branch of security is
called Computer Security
Information Technology has also some loopholes associated with it, like the possibility of stealing of vital
information and intentionally implanting destructive or malicious programs on the other's computer
system. The motive behind such activities is perhaps to show down the pace of an organization and harm
it economically. We shall discuss now about these malicious Software “Malwares”, which are often called
virus, worms, Trojan horse, logic bomb, spyware and so on.
1. Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a
virus might attach itself to a program such as a text program “MS Office word”. Each time the text
program runs, the virus run too, and it has the chance to reproduce (by attaching to other
programs) or wreak havoc.
2. E-mail viruses - An e-mail virus moves around in email messages, and usually replicates itself by
automatically mailing itself to dozens of people in the victim's e-mail address book.
Page 38 of 42
Introduction to Computers 2024
3. Worms - A worm is a small piece of software that uses computer networks and security holes to
replicate itself. A copy of the worm scans the network for another machine that has a specific
security hole. It copies itself to the new machine using the security hole, and then starts replicating
from there, as well.
4. Trojan horses - A Trojan horse is simply a computer program. The program claims to do one
thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard
disk). Trojan horses have no way to replicate automatically.
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer
virus passes from computer to computer like a biological virus passes from person to person.
There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a
fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to
reproduce by itself - it is not alive. Instead, a biological virus must inject its DNA into a cell. The viral
DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral
particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a
time, and the cell remains alive.
A computer virus shares some of these traits. A computer virus must piggyback on top of some other
program or document in order to get executed. Once it is running, it is then able to infect other programs or
documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but
there are enough similarities that the name stick.
Usage of Malware
– Malware is a program that must be triggered or somehow executed before it can infect your computer
system and spread to others.
– Here are some examples on how malware is distributed:
a) Social network
b) Pirated software “Infected Software”
c) Removable media (e.g. Flash Drives, HDD, Memory Drives)
d) Emails and Websites
Page 39 of 42
Introduction to Computers 2024
Malware Symptoms
While these types of malware differ greatly in how they spread and infect computers, they all can produce
similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms:
There are several general best practices that organizations and individual users should follow to prevent
malware infections. Some malware cases require special prevention and treatment methods, but following
these recommendations will greatly increase a user’s protection from a wide range of malware:
– Install and run anti-malware and firewall software. When selecting software, choose a program
that offers tools for detecting, quarantining, and removing multiple types of malware. At the
minimum, anti-malware software should protect against viruses, spyware, adware, Trojans, and
worms. The combination of anti-malware software and a firewall will ensure that all incoming and
existing data gets scanned for malware and that malware can be safely removed once detected.
– Keep software and operating systems up to date with current vulnerability patches. These patches
are often released to patch bugs or other security flaws that could be exploited by attackers.
– Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or
are from an unfamiliar source often contain malware.
Anti-Malware Program
– Anti-Malware program is used to prevent, detect, and remove computer viruses, worms, Trojan horses
and any other type of malware.
1. Antivirus program
– “Antivirus" is protective software designed to defend your computer against malicious software.
– In order to be an effective defense, the antivirus software needs to run in the background at all
times, and should be kept updated so it recognizes new versions of malicious software.
Page 40 of 42
Introduction to Computers 2024
Page 41 of 42
Introduction to Computers 2024
Think and justify other mechanism’s you would use to protect both your data and your computer
system!!!
Further readings:
Page 42 of 42